A. Tedeschi, Daniele Midi, F. Benedetto, E. Bertino
{"title":"Statistically-enhancing the diagnosis of packet losses in WSNs","authors":"A. Tedeschi, Daniele Midi, F. Benedetto, E. Bertino","doi":"10.1504/IJMNDI.2017.082795","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.082795","url":null,"abstract":"Packet losses, an important class of adverse events in wireless sensor networks, can be caused by either misbehaving nodes, or attacks focused on the wireless links. Understanding the underlying cause is critical for effective response measures to restore network functionality. Midi et al. (2015) proposed an approach for fine-grained analysis (FGA) of packet losses that profiles the wireless links between the nodes using resident metrics, such as the received signal strength indicator (RSSI) and the link quality indicator (LQI), to accurately diagnose the root causes of the losses. In our work, we design an approach that enhances such previous approach by leveraging a statistical model for determining optimal system thresholds based on the variances of RSSI and LQI, and also supporting individual per-link thresholds. Our validation through real sensor data shows that our model is accurate and leads to an optimal fine-grained analysis of the underlying causes of packet losses.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"62 1","pages":"3-14"},"PeriodicalIF":0.0,"publicationDate":"2017-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91371992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulating cheated results acceptance rates for gossip-based volunteer computing","authors":"Nils Kopal, Henner Heck, Arno Wacker","doi":"10.1504/IJMNDI.2017.10003736","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10003736","url":null,"abstract":"In this article, we present two different methods to estimate the dissemination rates of cheated results for decentralised distribution algorithms designed for volunteer computing networks. First, we define gossip-based protocols and present a short taxonomy that is based on data sizes for categorisation of distribution algorithms. We show three different distribution algorithms that are suitable for volunteer computing based on gossip-based protocols. Here, we additionally present an attacker model showing different attack possibilities on such algorithms. To minimise the impact of cheaters on a volunteer computing job, we introduce cheat detection mechanisms based on positive and negative verification of computation results. Finally, to minimise the amount of needed cheat detection computations, we either use simulations with the help of cellular automatons and a mathematical model to estimate the dissemination rates of cheated results. With the help of our methods, the cheat detection rate can be adjusted in a way that the speed up is maximal and the computation overhead for the cheat detection is minimal.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"101 1","pages":"56"},"PeriodicalIF":0.0,"publicationDate":"2017-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80619241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specific buffer-aided full duplex relaying over LTE advanced networks","authors":"R. Vijayarani, L. Nithyanandan","doi":"10.1504/IJMNDI.2017.10003737","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10003737","url":null,"abstract":"Full duplex relaying is an emerging technique to transmit and receive simultaneously at the same frequency for enhancing the attainable spectral efficiency in long term evolution advanced (LTE-A) network. The adoption of buffering over relay network outperforms and achieves better outage probability than the conventional relaying. In case of full duplex relaying (FDR) both transmission and reception are happening in same orthogonal channels, the increase in buffer length and higher delay deteriorates the system quality of service (QoS). To achieve both spectral efficiency and QoS, full duplex relay with the separate buffers for receiving and re-transmitting is proposed. The optimal trusted relay selection scheme is incorporated for maximising the security with effective signal-to-interference and noise ratio, which significantly improves the relaying transmission and further Tabu search-based metaheuristic algorithm is used for dealing with the trusted relay selection problem. The performance of three models, i.e., FDR without buffer-aided (conventional FDR), FDR with general buffer and FDR with specific buffer is investigated and compared in terms of outage probability and throughput. The simulation results revealed that the proposed FDR with specific buffer-aided scheme provides better performance compared with other FDR methods.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"47 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2017-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89013347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of 3rd order cascaded multi-bit sigma delta modulator for ADC using internal feedback","authors":"Sonika, D. Neema, R. N. Patel","doi":"10.1504/IJMNDI.2017.10003740","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10003740","url":null,"abstract":"This paper presents a new design of third order cascaded multi-bit sigma delta modulator for analogue to digital converter. The proposed modulator is based on the conventional multibit cascaded sigma delta modulator with interstage feedback topology. Sigma delta systems favours a cascaded multi-bit architecture for higher resolution and wider bandwidth with extra effort focusing on suppressing the analogue nonlinearity. One of the major analogue non-idealities in a multi-bit cascaded sigma delta modulator is the DAC nonlinearity errors and one of the drawbacks is that performance will be limited by un-cancelled noise introducing from the nonlinear errors of multi-bit DAC. The idea of proposed architecture is to create extra feedback paths around the modulator to reduce the DAC error. In this paper, an improved version of cascaded multi-bit sigma delta modulator is proposed to overcome these problems. In addition, a third order cascaded low distortion ADC architecture is also proposed. Simulation results verify the superiority of both the proposed modulators.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"106 1","pages":"37"},"PeriodicalIF":0.0,"publicationDate":"2017-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74271827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology-aware overlay network in mobile IP environment","authors":"Lifeng Le","doi":"10.1504/IJMNDI.2017.10010154","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10010154","url":null,"abstract":"An overlay network is a computer network which is built on the top of an underlying physical network. With the mobile internet access becoming the leading tool, overlay must be changing with different IP addresses, which may incur a large number of unnecessary update messages to overlay network. In recent years, mobile IP is being spread widely as one of fundamental protocols of mobile internet, which can guarantee overlay network unchangeable. However, the overlay efficiency may be affected negatively due to the mismatch between overlay and mobile IP network. In this paper, we present a topology-aware overlay network model. In the model, we proposed near-home principle applied in the joining procedure in mobile IPv4 environment and near-ROSP principle in mobile IPv6 environment. In our simulation, our proposed near-home principle and near-ROSP principle could do better to alleviate the mismatch between overlay and mobile IP network.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"40 1","pages":"244"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74033878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed agent-based detection system using PSO and neural network for MANET","authors":"Reni K. K Cherian, A. S. Nargunam","doi":"10.1504/IJMNDI.2016.081659","DOIUrl":"https://doi.org/10.1504/IJMNDI.2016.081659","url":null,"abstract":"Due to dynamic and infrastructure less nature of mobile adhoc network, it is prone to various kinds of attacks. In this paper, we have proposed a distributed agent-based detection system for network layer attacks using PSO and neural network in MANET. In the proposed technique four agents are considered with different complementary role in order to detect attack. For efficient detection of the intrusion, the network is divided into small zones. In each zone one detection agent is presents to manage and detect the irregularity in node activities. Detection agent is found by using particle swarm optimisation PSO technique. After the detection of invader, response agent is generated and is reacted with the invader to avoid future damage. Also, back propagation neural BPN network is collaborated with the detection agent to detect the network attacks.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"6 1","pages":"185-195"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79377433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic key authentication protocol for RFID system","authors":"Haibing Mu, Zhen-Ting Zheng","doi":"10.1504/IJMNDI.2017.10010150","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10010150","url":null,"abstract":"RFID system faces a number of security problems with its pervasive using in all kinds of fields, such as the internet of things. According to the computing and storage limitation of the tag, we propose a mutual authentication protocol based on random numbers which can help determine the new keys with their fixed key seeds. The protocol mainly applies hash function and XOR operation which can be affordable for resource-constrained tags. As to the performance of the protocol, we discuss the security as well as its storage and computation overhead. Analysis shows that our protocol can resist common attacks with good effectiveness.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"75 1","pages":"210"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83798415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power saving technique for controlled broadcast of query packet in MANETs","authors":"Naeem Ahmad, S. Z. Hussain","doi":"10.1504/IJMNDI.2017.10010145","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10010145","url":null,"abstract":"In computer communication networks, every routing-protocol makes a route-discovery to find the optimal path which involves broadcasting of the query-packet over the network. It becomes too expensive when query-packets circulate unnecessarily in the network. These undesirable packets cause the problem of congestion in the network. Time-efficient BERS (tBERS) is one of the controlled flooding techniques that lessens such expenses. From our results, we analysed that its performance in terms of query-retransmission and link-breaks degrade as route-reconstruction problem increases. In such situations, we need to lessen the retransmission of query-packets due to link breaks. In this paper, we have proposed energy-efficient BERS (eBERS) technique that reduces the retransmission of the query-packets. It reduced the retransmission between the magnitude of 15%-20% and energy exhaustion ratio between 29%-56% in tBERS. Furthermore, eBERS also reduced the number of link breaks and average latency between 9%-25% and 36%-46%, respectively.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"1 1","pages":"158"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89835727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel sleep/wake protocol for target coverage based on trust evaluation for a clustered wireless sensor network","authors":"Pooja Chaturvedi, A. K. Daniel","doi":"10.1504/IJMNDI.2017.10010149","DOIUrl":"https://doi.org/10.1504/IJMNDI.2017.10010149","url":null,"abstract":"The advancement in the field of nanotechnology and its impact on processor technology has made the wireless communication more powerful and popular. Coverage and lifetime maximisation are two major challenges. The node scheduling approaches address these problems: 1) achieving the connectivity and desired coverage while keeping the optimal nodes in active state; 2) resolving conflicts while determining the nodes to keep in sleep state; 3) finding strategies that avoid waking up redundant nodes. A node scheduling protocol for target coverage as an extension of energy efficient coverage preserving protocol (EECP), which determined the set covers based on the coverage probability and trust values is proposed. The clustering mechanism based on residual energy, distance and degree of the nodes is used for the dynamic selection of cluster heads. The simulation results show that the proposed enhancement achieves the improvement in the network performance than the disjoint set cover (DSC) approach.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"9 1","pages":"199"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89705194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection system for mitigating attacks using energy monitoring in wireless sensor networks","authors":"B. Yasotha, T. Sasikala","doi":"10.1504/IJMNDI.2016.081663","DOIUrl":"https://doi.org/10.1504/IJMNDI.2016.081663","url":null,"abstract":"In wireless sensor network WSN, the existing literature works predicts the energy consumption using operational state transition model. In this method, each state should be known to the sink, in order to predict accurately. Also, in some cases, if the residual energy estimation is not based on the operational states of a sensor node, it may not reflect the exact amount of energy consumed by each node. In order to overcome these issues, in this paper, we propose to design an intrusion detection system to detect and mitigate the attacks using energy monitoring technique. In this technique, the malicious attacks are detected by monitoring the node's energy. The monitoring nodes predicts the energy using hidden Markov model HMM and compares it with the actual energy detected through an energy query technique. The detected attacks are classified based on the energy threshold levels. The attacks are then mitigated by establishing the attack-free route between source and destination, respectively. By simulation results, we show that the proposed technique increases the efficiency, reduces overhead and energy consumption.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"1 1","pages":"219-227"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84285527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}