{"title":"Mobility models and performance of FISHEYE, LANMAR, OLSR and AODV","authors":"Deepak Kumar, Suresh C. Gupta","doi":"10.1109/WOCN.2013.6616237","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616237","url":null,"abstract":"A mobile ad hoc network (MANET) is an infrastructure less and self-configuring network of mobile devices which dynamically form a network without the help of any centralized administration. Frequently changing network topology needs efficient dynamic routing protocols. The performance of any routing protocol depends on the duration of interconnection among the nodes in the network for transferring the data. This interconnection results in an average connected path for whole network. The node mobility affects the number of average path as well as the performance of the routing protocols. A mobility model has an impact on the performance of Routing protocols. This paper aims to compare performance of some of the widely used routing protocols viz. FISHEYE, LANMAR, OLSR and AODV etc. for different mobility models viz. File Mobility model, Random Waypoint Mobility model and Group mobility Model.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaibhav Mishra, P. Tripathi, Pragati Rana, H. Joshi
{"title":"Performance analysis of comb type pilot aided channel estimation in OFDM with different pilot sequences","authors":"Vaibhav Mishra, P. Tripathi, Pragati Rana, H. Joshi","doi":"10.1109/WOCN.2013.6616197","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616197","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is the wireless access technique which has become eminent in the field of research and has gained legendary importance due to its advantages. Channel estimation is one of the crucial characteristics for scrutinizing the performance of the OFDM systems. In this paper, firstly a characteristic of a Rayleigh fading channel is analyzed. Next, comb type pilot arrangement for channel estimation is used with different interpolation techniques for inspecting the channel response. The channel performance is also examined, using various pilot sequences like binary random sequence, hadamard sequence and complex sequence. Simulation results demonstrate that the use of different pilot sequences affect the channel performance, thereby leading to noble channel estimation practices.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of fault patterns on systems level diagnosis of mesh networks","authors":"H. O. Srivastava, Suresh C. Gupta","doi":"10.1109/WOCN.2013.6616236","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616236","url":null,"abstract":"Fault Diagnostics is one of the major requirements for assuring dependability of complex systems. In Systems level diagnostic procedures applied to computer interconnection networks, the processors diagnose each other and under certain conditions faulty processors can be identified. This paper simulates a system-level diagnosis algorithm for mesh with wraparound, topology to locate the faulty units in the system. It is observed that diagnosis cost varies with the number of faulty units, and also with the fault pattern. Also, simulation has been done for special fault patterns for which correct and complete diagnosis of the system cannot be done.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepak Simaiya, Utkarsh Sharma, Abhishek N. Tripathi
{"title":"Simulation and performance evaluation of energy efficient MAC protocols for wireless sensor networks","authors":"Deepak Simaiya, Utkarsh Sharma, Abhishek N. Tripathi","doi":"10.1109/WOCN.2013.6616241","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616241","url":null,"abstract":"In wireless sensor networks (WSNs), idle listening is one of the most significant sources of energy consumption. In order to limit this problem many synchronous and asynchronous approaches have been proposed. Synchronous approaches reduce the idle listening by sharing schedule information. Exchange of schedule information again results in extra overhead on energy consumption. Asynchronous approach (RI-MAC) uses receiver initiated beacon to do same. In this paper, we analyze and evaluate the performance of S-MAC and RI-MAC protocol for WSNs in two different scenarios namely Contending Flow and Data Gathering. Evaluation of these MAC protocols will be in terms of certain performance parameters, while considering energy consumption in overall period as well as in idle listening period as the major performance parameter.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121479278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of visibility and temperature patterns of Indian cities and it's clustering to identify the effect of presence of aerosol particles in the atmosphere","authors":"Vijay Anand Sullare, A. Khan, B. Gour","doi":"10.1109/WOCN.2013.6616179","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616179","url":null,"abstract":"Variations in ambient air quality data are caused by changes in the pollutant emission rate, and meteorological and topographical conditions of the place. Mass concentration of aerosol is a measure of air quality and aerosol source strength at a particular location. It has been shown that clear sky visibility over land has decreased globally over the past 30 years, indicative of an increase in aerosols, or airborne particulates, over the world's continents during that time. The change in climatic conditions is of great concern in environment, industry and agriculture. The disturbance of temperature and other climate factors due to presence of aerosol particles in air, results in global climate changes. The aim of this research is to develop artificial neural network based clustering method for ambient atmospheric condition prediction in Indian city. Self-Organizing Map (SOM) Neural Network to divide data into four clusters which represents association in between atmospheric conditions belonging to cities of one cluster due to the amount of aerosol particles present in the atmosphere of those cities. The experimental results determined climate changes due to concentration of aerosol particles in the atmosphere of different cities in India and the correlation in between change in visibility and change in the temperature during the months of March to June.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126622934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pankaj B. Pawar, Pankaj K. Kawadkar, Malti Nagle, Padmashree Kunthe Ambare
{"title":"Analysis of signature and signature free bufferoverflow detection for gif and jpg format","authors":"Pankaj B. Pawar, Pankaj K. Kawadkar, Malti Nagle, Padmashree Kunthe Ambare","doi":"10.1109/WOCN.2013.6616181","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616181","url":null,"abstract":"Internet threat have different form of attacks, considering individual users to obtain control over data and network. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's threshold and overwrites it to neighboring memory. The techniques to avoid buffer overflow vulnerability vary per architecture, Operating system and memory region. The Signature based buffer overflow detection finds the particular Signature and if that found it blocks it to protect form malicious attack. The remaining request are consider for checking against the buffer size and grant to server if the buffer of request is less than or equal to defined threshold value of buffer. Signature free first filters and extracts instruction sequences from a request. Finally it compares the number of useful instructions to a threshold to determine if this instruction sequence contains code. Signature free thus it can block new and unknown buffer overflow attacks, Signature free is also immunized from most attack-side code obfuscation methods. Since Signature free is transparent to the servers that protected, it is efficient for economical Internet wide deployment with very low deployment and maintenance cost. We are proposing novel techniques for preventing buffer overflow during the transmission of images of different formats. In this paper we have discuss and evaluate certain tools and techniques which prevent buffer overflows. We have also discussed some modern tools and techniques with their pros and cons.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of U-shape microstrip patch antenna for WiMAX applications at 2.5 GHz","authors":"Sanjeev Dwivedi, A. Rawat, R. Yadav","doi":"10.1109/WOCN.2013.6616214","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616214","url":null,"abstract":"The microstrip u-shape patch antennas are gaining attenuation in various WiMAX applications since last two decade. The u-shape Microstrip antenna has become a rapidly growing area of research with their potential application like mobiles and satellite communication. In this paper design of u-shape microstrip antennas is proposed at 2.5 GHz. It can be used in WiMAX communication systems. The objective of this paper is to analyze, design and validate rectangular u-shape microstrip patch antenna. The substrate material rogers RT/duroid 5880 with permittivity of 2.2 and dielectric loss tangent 0.0009 is selected for u-shape microstrip patch antenna design. The HFSS 13 based model is proposed to measured different bandwidths and gain for different dimensions.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123063355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information theft through covert channel by exploiting HTTP post method","authors":"Nishi Tomar, M. Gaur","doi":"10.1109/WOCN.2013.6616180","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616180","url":null,"abstract":"Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Individual vs cooperative spectrum sensing for Cognitive Radio Networks","authors":"Pulkit Sharma, V. Abrol","doi":"10.1109/WOCN.2013.6616216","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616216","url":null,"abstract":"Cognitive Radio Networks provide a solution to the spectrum scarcity in wireless communication. It works on principle of dynamic spectrum management, which enables the secondary user to use the licensed spectrum of primary user opportunistically. To implement it we have to detect the absence of primary signal technically called detecting a spectrum hole. In this paper performance of both individual and cooperative spectrum sensing are evaluated under various parameters (like SNR, sensing time, number of users). Simulation results shows that cooperative spectrum sensing performs better than individual spectrum sensing.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128622103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless power transfer to underground sensors using resonant magnetic induction","authors":"K. A. Menon, Vippalapalli Vikas, B. Hariharan","doi":"10.1109/WOCN.2013.6616192","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616192","url":null,"abstract":"Wireless communication systems play an increasingly integral role in society. Currently underground sensor networks are used in many applications for security purposes, environmental applications, infrastructure maintenance etc. The major problem, associated with sensor networks, is in providing the power supply to enable the networks to work for long durations. This paper presents a novel technique to wirelessly, supply power to the underground sensor networks using the magnetic induction principle. In addition, using the resonating principle further ensures maximum efficiency of this proposed system. Experimental results to prove the feasibility of this novel technique for supplying wireless power are presented.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122475022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}