{"title":"IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK","authors":"K. Sundaravadivel","doi":"10.21917/ijct.2019.0283","DOIUrl":"https://doi.org/10.21917/ijct.2019.0283","url":null,"abstract":"Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43718538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGN OF METAMATERIAL INSPIRED HIGH GAIN PATCH ANTENNA","authors":"T. Sathiyapriya, V. Gurunathan, A. Shafeek","doi":"10.21917/ijct.2019.0287","DOIUrl":"https://doi.org/10.21917/ijct.2019.0287","url":null,"abstract":"","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68378422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QUEUEING ANALYSIS OF MOBILE ADHOC NETWORKS EQUIPPED WITH COGNITIVE RADIO TECHNOLOGY","authors":"Neeta Singh, Jyoti Singh","doi":"10.21917/ijct.2018.0273","DOIUrl":"https://doi.org/10.21917/ijct.2018.0273","url":null,"abstract":"In this paper, the Mobile Ad Hoc Networks (MANETs) with integrated Primary/Secondary User (PU or SU) traffic has been considered. Nodes in the MANET are equipped with Cognitive Radio Technology (CRT). The blocking probability and dropping probability for SUs are obtained by considering a 3D Markov Chain analytical model. To provide efficient service to PUs, we offer priority of channels, higher priority and lower priority is given to PUs and SUs, respectively. The expressions for blocking probability, dropping probability, throughput and non-completion of SU are established. Sensitivity analysis is carried out to explore the effect of system parameters. It is observed that Ad Hoc network utilized the unused spectrum of the existing legacy systems in an opportunistic manner in addition to using the unlicensed spectrum. The results show an improved performance in terms of blocking probabilities, dropping probabilities of SU and over all throughput of the system.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46350014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Navaz, S. Athinarayanan, S. Sameena, R. Kavitha
{"title":"DISTRIBUTED LOAD BALANCING ALGORITHM FOR WIRELESS SENSOR NETWORK","authors":"K. Navaz, S. Athinarayanan, S. Sameena, R. Kavitha","doi":"10.21917/ijct.2018.0279","DOIUrl":"https://doi.org/10.21917/ijct.2018.0279","url":null,"abstract":"A Wireless Sensor Network (WSN) comprises of spatially scattered autonomous sensors to screen physical or natural conditions and to amiably go their information through the system to a Base Station. Grouping is a basic assignment in Wireless Sensor Networks for vitality effectiveness and system quality. Grouping through Central Processing Unit in remote sensor systems is outstanding and being used for quite a while. In this paper, we propose a few procedures that balance the vitality utilization of these hubs and guarantee greatest system lifetime by adjusting the activity stack as similarly as could be expected under the circumstances. Directly grouping through dispersed strategies is being produced for conveying with the issues like system lifetime and vitality. In our work, we connected both concentrated and conveyed kmeans clustering calculation in system test system. K-means is a model based algorithm that surrogates between two noteworthy advances, passing on perceptions to groups and processing cluster focuses until the point when a ceasing standard is satisfied. Improved results are accomplished and related which demonstrate that conveyed clustering is compelling than brought together grouping.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47580291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRANSPORT TUNNELING SYSTEM WITH A COMMUNICATION HACKING FRAMEWORK","authors":"S. Kodama, Rei Nakagawa","doi":"10.21917/ijct.2018.0281","DOIUrl":"https://doi.org/10.21917/ijct.2018.0281","url":null,"abstract":"This paper aims to reduce the transfer restrictions of networks at the transport layer under prohibition-in-principle rules, and to introduce a communication system that virtualizes a programmable network function. The second aim facilitates the realization of the first. Specifically, we target Intranets that restrict transport-layer communications using a firewall. When such an organization’s networks serve multiple departments, external communication to a department is restricted to the available transport number under the rule of the prohibition-in-principle. Our proposed transport proxy system architecture represents the transfer of network applications via well-known protocols such as HTTP (80), using the urgent pointer in the transmission control protocol header. Our architecture improves the flexibility and scalability of the network without requiring complex encapsulation. Finally, the framework is demonstrated through an experimental implementation of the system. Moreover, adding the transport tunneling system offered flexibility while barely affecting the download time of the files.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46627726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INVESTIGATIONS ON PERFORMANCE CHARACTERISTICS OF FBMC: A PHY LAYER FOR NEXT GENERATION TELECOM","authors":"R. S. S. Maukthika, P. Namratha, P. Hari","doi":"10.21917/ijct.2018.0277","DOIUrl":"https://doi.org/10.21917/ijct.2018.0277","url":null,"abstract":"Filter bank multicarrier (FBMC) is one of the proposed physical layers for 5G, which promises to enable future technologies like cognitive radio, robotic automation, virtual reality etc. This paper highlights how FBMC outperforms orthogonal frequency division multiplexing (OFDM) in various aspects such as data rate, spectral efficiency etc. Moreover, it provides a detailed mathematical analysis of polyphase decomposition of filter banks in FBMC and throws light on significance of offset quadrature amplitude modulation (OQAM) in dealing with channel impairments. The significance of massive MIMO systems along with the suitability of FBMC in its application has also been addressed.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41721444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE RESEARCH ON ENERGY EFFICIENT WATCHING METHOD USING CLUSTER HEADER IN WSN","authors":"Won Chol Jang, Jong Ae Choe, Du Ho Pak","doi":"10.21917/ijct.2018.0274","DOIUrl":"https://doi.org/10.21917/ijct.2018.0274","url":null,"abstract":"Many problems in WSN security are same as in the traditional network. However, some problems are different at all in computer network such as internet, because of characteristics of WSN self. Sensor nodes of WSN cannot use coding such as public key, complicated authorization and the firewall, because sensor nodes have limited energy and there are little hardware resources such as computation, memory and signal processing. So, recently, they have researched on secure routing and configuration of trust system and optimization of watching node alignment. In previous works, they referred the watching attack of WSN of which topology is routing, but they have not referred the watching attack of WSN of which topology is clustering. First, we configure trust system and propose the optimization of watching node’s position and watching period in clustering WSN in this paper. Second we compare and analyze the proposed method and the method in routing WSN by mathematical modeling.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68378116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SINGLE AND DOUBLE ELEMENT PIFA MIMO ANTENNA WITH DGS FOR 5G MOBILE COMMUNICATION","authors":"C. Supratha, S. Robinson","doi":"10.21917/ijct.2018.0280","DOIUrl":"https://doi.org/10.21917/ijct.2018.0280","url":null,"abstract":"","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47072365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NEW CHANNEL ASSIGNMENT METHOD IN COGNITIVE RADIO SYSTEM","authors":"C. P. Mallikarjuna Gowda, T. Vijayakumar","doi":"10.21917/ijct.2018.0275","DOIUrl":"https://doi.org/10.21917/ijct.2018.0275","url":null,"abstract":"In this paper, a novel method to estimate the unsuccessful probability is proposed by combining the unnecessary probability and the blocking probability. The Unnecessary probability is the probability when the mobile node is unnecessarily handed over and the blocking probability is the one when the network is not able to assign the channel to the mobile now. A new design of new channel assignment method for cognitive radio system is presented. The first fit method and the random assignment methods are also implemented for the cognitive radio application as a baseline. The PU and SU call blocking are modeled for all the three methods. It is shown that advantages of first fit method and the random assignment methods are combined into the new method, namely, selective assignment method. Simulation are conducted for the various network parameters like number of channels, number of links, load on each link, percentage of the PU versus SU calls etc. It is shown that selective assignment method yields better results than that of the first fit method and the random assignment methods. Finally, the blocking probabilities are combined with the unnecessary handover probabilities of a three-node network to determine the unsuccessful handover probabilities of the first fit, random assignment and selective assignment methods.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48124510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COOPERATIVE SPECTRUM SENSING SCHEME USING FUZZY LOGIC TECHNIQUE","authors":"Rohit Kantikar, R. Yelalwar","doi":"10.21917/ijct.2018.0276","DOIUrl":"https://doi.org/10.21917/ijct.2018.0276","url":null,"abstract":"In communication system spectrum has a crucial role and wireless technologies are increasing rapidly it is required to make efficient use of spectrum to satisfy the spectrum scarcity problem. Using spectrum efficiently can be done by cognitive radio because of its ability to sense surrounding environment. Cognitive radio sense unoccupied spectrum by detecting the primary users’ presence or absence in the spectrum. Using more than one cognitive radio in the detection process will increase the efficiency of spectrum usage and prevent interference between signals. Using machine learning techniques for the implementation of intelligent cognitive radio increase efficiency and detection performance and detect signal at low SNR condition. Fuzzy logic machine learning technique is implemented which is based on fuzzy membership functions and fusion centre. Energy detection is used to classify signal and noise at each cognitive radio after that each cognitive radio output information convert into membership function and apply fuzzy rules such as algebraic sum, the algebraic product give a final decision about the signal presence or absence. Simulation results show that the proposed system gives much better results compared to the conventional energy detection system and improves the performance of the system.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46595843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}