{"title":"Energy Efficient Clustering using Modified Multi-Hop Clustering","authors":"M. Vimala, R. Ranjan","doi":"10.4018/ijwnbt.2019070103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070103","url":null,"abstract":"In recent years, WSN has been widely used for building the decision support system (DSS) for solving the real-world problem. Moreover, out of several fields, one of the interesting fields that requires DSS is the monitoring of agriculture environment. Nowadays, monitoring an agricultural environment has become one of the essential fields. IoT has been one of the eminent technologies in recent years and WSN model has played the parallel role into it. These sensors have a limited power supply and this affects the efficiency of the algorithm. In the past, several methods have been proposed for efficient clustering, however, these methods fail to provide satisfactory accuracy. Hence, this article proposes an energy efficient methodology named modified multi-hop clustering (MMHC). This methodology takes three steps. The first step is assembling the nodes where the nodes are assembled, the second step couples the nodes, and the third step detects the redundant nodes and discard them. The main advantage of MMHC is that it can select multiple redundant nodes at one time and discard, and this makes the algorithm more fast and efficient. Moreover, in order to evaluate the algorithm several parameters have been considered, such as energy consumption, number of failed nodes, number of active nodes, and communication overhead.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Wireless Communication Protocol and Security Privacy: Connectivity - UDP Protocols","authors":"K. Bai","doi":"10.4018/ijwnbt.2019070102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070102","url":null,"abstract":"The significant way of using the technology relies on the effective way of utilizing and regenerating the resources. Technology advancements increase day by day in each and every sector including construction, automobile, manufacture, production, bio-medical sciences and home appliances. The use of wireless protocols that bridges the gap with the Security and Privacy Issues in Internet of Things has been drastically in demand as always. Ipv6, IEEE 802.15.4, WirelessHart had played a vital role in the field of Internet of Things. Their impact can be further advanced with the specifications designed in Wireless Protocols. Robust and more secure bits preserving communication protocol leading the earlier protocols used.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123743581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Big Data Security, Privacy and Challenges Related to Smart Grid","authors":"K. Kumari, Mrunalini Marlakunta","doi":"10.4018/ijwnbt.2019070101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070101","url":null,"abstract":"The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Issues on IoT Environment In Wireless Network Communications","authors":"K. Gowthami","doi":"10.4018/ijwnbt.2019070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019070104","url":null,"abstract":"The Internet of Things (IoT) integrates a giant range of physical objects that measures items that are unambiguously known, ubiquitously interconnected and accessible through the web. IoT aims to remodel any object within the real-world into a computer that has sensing, communication, and management capabilities. There is a growing range of IoT devices associated degree applications, and this results in an increase within the range, and quality of malicious attacks. It is necessary to guard IoT systems against malicious attacks, particularly to stop attackers from getting management over the devices. The common place web security protocols square measure recognized as unsuitable in these varieties of networks, significantly because of some categories of IOT devices with unnatural resources.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122199015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverse Cooperatively Routed Wi-Fi Direct in the Advent of 5G Driven Designs","authors":"M. Wódczak","doi":"10.4018/ijwnbt.2019010102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2019010102","url":null,"abstract":"In this article, the instantiation of the logic behind the so-called “Multi-Connect” mode of Wi-Fi Direct is advocated for and prescribed in order to make it possible to increase, if not multiply, the data throughput attainable by a given P2P Device thanks to traffic aggregation. In general, the described extension to the existing standard, defined by the Wi-Fi Peer-to-Peer (P2P) Technical Specification, enables the reversal of the logical roles of a P2P Group Owner (P2P GO) and its respective P2P Clients, while ensuring that the general architectural framework of Wi-Fi Direct should remain unchanged for backward compatibility reasons. This is achieved with the aid of a number of specifically tailored modifications including: new P2P Attribute allocation, extended Group Owner determination, modified P2P State Machine operation, enhanced Concurrent and Non-Concurrent operation, as well as expanded Reverse Operation Logic definition. The concept is illustrated with and verified through the analysis of cumulative virtual channel capacity and, therefore, the expected data throughput gain.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Geocast Protocol with Information-Centric Perspective in Vehicular Ad-Hoc Networks (VANETs)","authors":"Houacine Abdelkrim, Mustapha Guezouri","doi":"10.4018/IJWNBT.2018070101","DOIUrl":"https://doi.org/10.4018/IJWNBT.2018070101","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) is subclass of network of mobile ad-hoc network (MANET) type, it has emerged as a platform that supports inter-vehicles communication to improve road traffic safety. A conventional packet-based routing protocol where a packet moves from a source to a destination untouched throughout the entire process no longer satisfies the requirements in VANETs because of the high mobility of vehicles. This article proposes a routing protocol with an information-centric perspective for the VANETs, the techniques invoked are: Geocast instead of the classical multicast and the aggregation location-based. The simulation results under NS-3 and SUMO show that this protocol can help to limit the redundancy of the messages exchanged by their aggregation without maintaining a hierarchical structure; which minimizes transmission costs and ensures reliability and performance.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load-Balance Energy Aware Ad-Hoc On Demand Multipath Distance Vector Routing Protocol (LBEA-AOMDV) for WSN","authors":"A. Sarhan, N. El-Fishawy, Mahmoud M. Shawara","doi":"10.4018/IJWNBT.2018070103","DOIUrl":"https://doi.org/10.4018/IJWNBT.2018070103","url":null,"abstract":"Nowadays, WSNs have received great importance because they are the best solutions that can be used in harsh environments. The main limitation in WSNs is the node power because the sensor node is battery powered and charging or replacing this battery is not applicable. Moreover, in mission-critical applications, sensor nodes can sense important data and the packet carrying this data must be given higher priority from the routing protocol. Most of the current routing protocols consider the node power but do not consider different paths for different priority data which may cause them to be delayed. This article proposes a load-balance energy aware ad-hoc on demand multipath distance vector (LBEA-AOMDV) protocol for wireless sensor networks, which is a multipath routing protocol, based on the original AOMDV. The proposed protocol shows that the paths are alternatively discovered on basis of an energy metric and instead of using only one path in data transmission, the network load is distributed through different paths. LBEA-AOMDV also uses a priority-based technique in which packets are assigned different priority levels and guided to different paths. The overall simulation results show that LBEA-AOMDV gives better performance when compared with AOMDV in terms of average consumed energy, end-to-end delay, number of dropped packets, average throughput and normalized routing load.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. L. Suntu, N. H. Odongo, S. M. Chege, O. K. Bishoge
{"title":"Robust Secured Roaming in Wireless Local Area Networks","authors":"S. L. Suntu, N. H. Odongo, S. M. Chege, O. K. Bishoge","doi":"10.4018/IJWNBT.2017070102","DOIUrl":"https://doi.org/10.4018/IJWNBT.2017070102","url":null,"abstract":"","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Usama Y. Mohamad, I. A. Shah, T. Hunziker, D. Dahlhaus
{"title":"Recursive Spatial Multiplexing with Adaptive Interference Whitening","authors":"Usama Y. Mohamad, I. A. Shah, T. Hunziker, D. Dahlhaus","doi":"10.4018/IJWNBT.2017070103","DOIUrl":"https://doi.org/10.4018/IJWNBT.2017070103","url":null,"abstract":"","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of PUE Attack in CRN with Reduced Error in Location Estimation Using Novel Bat Algorithm","authors":"Aasia Rehman, D. Prakash","doi":"10.4018/IJWNBT.2017070101","DOIUrl":"https://doi.org/10.4018/IJWNBT.2017070101","url":null,"abstract":"CognitiveRadioNetworkTechnologymakestheefficientutilizationofscarcespectrumresources byallowingtheunlicenseduserstoopportunisticallyusethelicensedspectrum.CognitiveRadio Networkduetoitsflexibleandopennatureisvulnerabletoanumberofsecurityattacks.Thispaper ismainlyconcernedwithoneofthephysicallayerattackcalledPrimaryUserEmulationAttackand itsdetection.ThispapersolvestheproblemofPUEattackbylocalizationtechniquebasedonTDOA measurementswithreducederrorinlocationestimationusingaNovelBatAlgorithm(NBA).Anumber ofcooperativesecondaryusersareusedfordetectingthePUEAbycomparingitsestimatedposition withtheknownpositionofincumbent.ThemaingoalofNBAistominimizetwofitnessfunctions namelynon-linearleastsquareandthemaximumlikelihoodinordertooptimizetheestimationerror. Afterevaluation,simulationresultsclearlydemonstratesthatNBAresultsinreducedestimationerror ascomparedtoTaylorSeriesEstimationandParticleSwarmOptimization. KEyWoRDS Cognitive Radio, Cognitive Radio Networks, Maximum Likelihood, Non-Linear Least Square, Novel Bat Algorithm, Primary User Emulation Attack, Taylor Series Estimation, Time Difference of Arrival","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}