Int. J. Wirel. Networks Broadband Technol.最新文献

筛选
英文 中文
Energy Efficient Clustering using Modified Multi-Hop Clustering 基于改进多跳聚类的节能聚类
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2019-07-01 DOI: 10.4018/ijwnbt.2019070103
M. Vimala, R. Ranjan
{"title":"Energy Efficient Clustering using Modified Multi-Hop Clustering","authors":"M. Vimala, R. Ranjan","doi":"10.4018/ijwnbt.2019070103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070103","url":null,"abstract":"In recent years, WSN has been widely used for building the decision support system (DSS) for solving the real-world problem. Moreover, out of several fields, one of the interesting fields that requires DSS is the monitoring of agriculture environment. Nowadays, monitoring an agricultural environment has become one of the essential fields. IoT has been one of the eminent technologies in recent years and WSN model has played the parallel role into it. These sensors have a limited power supply and this affects the efficiency of the algorithm. In the past, several methods have been proposed for efficient clustering, however, these methods fail to provide satisfactory accuracy. Hence, this article proposes an energy efficient methodology named modified multi-hop clustering (MMHC). This methodology takes three steps. The first step is assembling the nodes where the nodes are assembled, the second step couples the nodes, and the third step detects the redundant nodes and discard them. The main advantage of MMHC is that it can select multiple redundant nodes at one time and discard, and this makes the algorithm more fast and efficient. Moreover, in order to evaluate the algorithm several parameters have been considered, such as energy consumption, number of failed nodes, number of active nodes, and communication overhead.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Wireless Communication Protocol and Security Privacy: Connectivity - UDP Protocols 无线通信协议与安全隐私:连接- UDP协议综述
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2019-07-01 DOI: 10.4018/ijwnbt.2019070102
K. Bai
{"title":"A Review on Wireless Communication Protocol and Security Privacy: Connectivity - UDP Protocols","authors":"K. Bai","doi":"10.4018/ijwnbt.2019070102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070102","url":null,"abstract":"The significant way of using the technology relies on the effective way of utilizing and regenerating the resources. Technology advancements increase day by day in each and every sector including construction, automobile, manufacture, production, bio-medical sciences and home appliances. The use of wireless protocols that bridges the gap with the Security and Privacy Issues in Internet of Things has been drastically in demand as always. Ipv6, IEEE 802.15.4, WirelessHart had played a vital role in the field of Internet of Things. Their impact can be further advanced with the specifications designed in Wireless Protocols. Robust and more secure bits preserving communication protocol leading the earlier protocols used.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123743581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Big Data Security, Privacy and Challenges Related to Smart Grid 物联网大数据安全、隐私和与智能电网相关的挑战
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2019-07-01 DOI: 10.4018/ijwnbt.2019070101
K. Kumari, Mrunalini Marlakunta
{"title":"IoT Big Data Security, Privacy and Challenges Related to Smart Grid","authors":"K. Kumari, Mrunalini Marlakunta","doi":"10.4018/ijwnbt.2019070101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070101","url":null,"abstract":"The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues on IoT Environment In Wireless Network Communications 无线网络通信中物联网环境的安全问题
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2019-07-01 DOI: 10.4018/ijwnbt.2019070104
K. Gowthami
{"title":"Security Issues on IoT Environment In Wireless Network Communications","authors":"K. Gowthami","doi":"10.4018/ijwnbt.2019070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070104","url":null,"abstract":"The Internet of Things (IoT) integrates a giant range of physical objects that measures items that are unambiguously known, ubiquitously interconnected and accessible through the web. IoT aims to remodel any object within the real-world into a computer that has sensing, communication, and management capabilities. There is a growing range of IoT devices associated degree applications, and this results in an increase within the range, and quality of malicious attacks. It is necessary to guard IoT systems against malicious attacks, particularly to stop attackers from getting management over the devices. The common place web security protocols square measure recognized as unsuitable in these varieties of networks, significantly because of some categories of IOT devices with unnatural resources.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reverse Cooperatively Routed Wi-Fi Direct in the Advent of 5G Driven Designs 5G驱动设计下的反向协同路由Wi-Fi直连
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2019-01-01 DOI: 10.4018/ijwnbt.2019010102
M. Wódczak
{"title":"Reverse Cooperatively Routed Wi-Fi Direct in the Advent of 5G Driven Designs","authors":"M. Wódczak","doi":"10.4018/ijwnbt.2019010102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019010102","url":null,"abstract":"In this article, the instantiation of the logic behind the so-called “Multi-Connect” mode of Wi-Fi Direct is advocated for and prescribed in order to make it possible to increase, if not multiply, the data throughput attainable by a given P2P Device thanks to traffic aggregation. In general, the described extension to the existing standard, defined by the Wi-Fi Peer-to-Peer (P2P) Technical Specification, enables the reversal of the logical roles of a P2P Group Owner (P2P GO) and its respective P2P Clients, while ensuring that the general architectural framework of Wi-Fi Direct should remain unchanged for backward compatibility reasons. This is achieved with the aid of a number of specifically tailored modifications including: new P2P Attribute allocation, extended Group Owner determination, modified P2P State Machine operation, enhanced Concurrent and Non-Concurrent operation, as well as expanded Reverse Operation Logic definition. The concept is illustrated with and verified through the analysis of cumulative virtual channel capacity and, therefore, the expected data throughput gain.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Geocast Protocol with Information-Centric Perspective in Vehicular Ad-Hoc Networks (VANETs) 基于信息中心视角的车载Ad-Hoc网络地球广播协议
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2018-07-01 DOI: 10.4018/IJWNBT.2018070101
Houacine Abdelkrim, Mustapha Guezouri
{"title":"A Geocast Protocol with Information-Centric Perspective in Vehicular Ad-Hoc Networks (VANETs)","authors":"Houacine Abdelkrim, Mustapha Guezouri","doi":"10.4018/IJWNBT.2018070101","DOIUrl":"https://doi.org/10.4018/IJWNBT.2018070101","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) is subclass of network of mobile ad-hoc network (MANET) type, it has emerged as a platform that supports inter-vehicles communication to improve road traffic safety. A conventional packet-based routing protocol where a packet moves from a source to a destination untouched throughout the entire process no longer satisfies the requirements in VANETs because of the high mobility of vehicles. This article proposes a routing protocol with an information-centric perspective for the VANETs, the techniques invoked are: Geocast instead of the classical multicast and the aggregation location-based. The simulation results under NS-3 and SUMO show that this protocol can help to limit the redundancy of the messages exchanged by their aggregation without maintaining a hierarchical structure; which minimizes transmission costs and ensures reliability and performance.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load-Balance Energy Aware Ad-Hoc On Demand Multipath Distance Vector Routing Protocol (LBEA-AOMDV) for WSN 基于负载平衡能量感知的无线传感器网络自组织随需应变多路径距离矢量路由协议(LBEA-AOMDV)
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2018-07-01 DOI: 10.4018/IJWNBT.2018070103
A. Sarhan, N. El-Fishawy, Mahmoud M. Shawara
{"title":"Load-Balance Energy Aware Ad-Hoc On Demand Multipath Distance Vector Routing Protocol (LBEA-AOMDV) for WSN","authors":"A. Sarhan, N. El-Fishawy, Mahmoud M. Shawara","doi":"10.4018/IJWNBT.2018070103","DOIUrl":"https://doi.org/10.4018/IJWNBT.2018070103","url":null,"abstract":"Nowadays, WSNs have received great importance because they are the best solutions that can be used in harsh environments. The main limitation in WSNs is the node power because the sensor node is battery powered and charging or replacing this battery is not applicable. Moreover, in mission-critical applications, sensor nodes can sense important data and the packet carrying this data must be given higher priority from the routing protocol. Most of the current routing protocols consider the node power but do not consider different paths for different priority data which may cause them to be delayed. This article proposes a load-balance energy aware ad-hoc on demand multipath distance vector (LBEA-AOMDV) protocol for wireless sensor networks, which is a multipath routing protocol, based on the original AOMDV. The proposed protocol shows that the paths are alternatively discovered on basis of an energy metric and instead of using only one path in data transmission, the network load is distributed through different paths. LBEA-AOMDV also uses a priority-based technique in which packets are assigned different priority levels and guided to different paths. The overall simulation results show that LBEA-AOMDV gives better performance when compared with AOMDV in terms of average consumed energy, end-to-end delay, number of dropped packets, average throughput and normalized routing load.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust Secured Roaming in Wireless Local Area Networks 无线局域网的鲁棒安全漫游
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2017-07-01 DOI: 10.4018/IJWNBT.2017070102
S. L. Suntu, N. H. Odongo, S. M. Chege, O. K. Bishoge
{"title":"Robust Secured Roaming in Wireless Local Area Networks","authors":"S. L. Suntu, N. H. Odongo, S. M. Chege, O. K. Bishoge","doi":"10.4018/IJWNBT.2017070102","DOIUrl":"https://doi.org/10.4018/IJWNBT.2017070102","url":null,"abstract":"","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recursive Spatial Multiplexing with Adaptive Interference Whitening 自适应干扰白化的递归空间复用
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2017-07-01 DOI: 10.4018/IJWNBT.2017070103
Usama Y. Mohamad, I. A. Shah, T. Hunziker, D. Dahlhaus
{"title":"Recursive Spatial Multiplexing with Adaptive Interference Whitening","authors":"Usama Y. Mohamad, I. A. Shah, T. Hunziker, D. Dahlhaus","doi":"10.4018/IJWNBT.2017070103","DOIUrl":"https://doi.org/10.4018/IJWNBT.2017070103","url":null,"abstract":"","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of PUE Attack in CRN with Reduced Error in Location Estimation Using Novel Bat Algorithm 利用新型Bat算法降低定位误差的CRN中PUE攻击检测
Int. J. Wirel. Networks Broadband Technol. Pub Date : 2017-07-01 DOI: 10.4018/IJWNBT.2017070101
Aasia Rehman, D. Prakash
{"title":"Detection of PUE Attack in CRN with Reduced Error in Location Estimation Using Novel Bat Algorithm","authors":"Aasia Rehman, D. Prakash","doi":"10.4018/IJWNBT.2017070101","DOIUrl":"https://doi.org/10.4018/IJWNBT.2017070101","url":null,"abstract":"CognitiveRadioNetworkTechnologymakestheefficientutilizationofscarcespectrumresources byallowingtheunlicenseduserstoopportunisticallyusethelicensedspectrum.CognitiveRadio Networkduetoitsflexibleandopennatureisvulnerabletoanumberofsecurityattacks.Thispaper ismainlyconcernedwithoneofthephysicallayerattackcalledPrimaryUserEmulationAttackand itsdetection.ThispapersolvestheproblemofPUEattackbylocalizationtechniquebasedonTDOA measurementswithreducederrorinlocationestimationusingaNovelBatAlgorithm(NBA).Anumber ofcooperativesecondaryusersareusedfordetectingthePUEAbycomparingitsestimatedposition withtheknownpositionofincumbent.ThemaingoalofNBAistominimizetwofitnessfunctions namelynon-linearleastsquareandthemaximumlikelihoodinordertooptimizetheestimationerror. Afterevaluation,simulationresultsclearlydemonstratesthatNBAresultsinreducedestimationerror ascomparedtoTaylorSeriesEstimationandParticleSwarmOptimization. KEyWoRDS Cognitive Radio, Cognitive Radio Networks, Maximum Likelihood, Non-Linear Least Square, Novel Bat Algorithm, Primary User Emulation Attack, Taylor Series Estimation, Time Difference of Arrival","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信