Bandwidth Estimation in Network Probing Techniques Utilizing Min-Plus Algebraic Methods
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
The Effectiveness of Jaya Optimization for Energy Aware Cluster Based Routing in Wireless Sensor Networks
Stress Analysis and Detection from Wearable Devices
Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks
Channel Estimation and It’s Techniques: A Survey
Performance Evaluation of Advanced Congestion Control Mechanisms for COAP
Impact of Mobility on Power Consumption in RPL
Implementation of Traffic Engineering Technique in MPLS Network using RSVP
FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique
DGS Based MIMO Microstrip Antenna for Wireless Applications
A Review on Optimized FFT/IFFT Architectures for OFDM Systems
Balanced Unequal Clustering AlgorithmFor Wireless Sensor Network
HHT and DWT Based MIMO-OFDM for Various ModulationSchemes: A Comparative Approach
Study and Comparison of Distributed Energy Efficient Clustering Protocols in Wireless Sensor Network: A Review
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
Mobile Ad Hoc Network (MANET) is a collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for Mobile Ad hoc Networks and prominent among them are DSR (Dynamic Source Routing), AODV (Ad hoc On-demand Distance Vector) and TORA (Temporary Ordered Routing Algorithm). This paper provides an overview of these protocols by presenting their advantages and disadvantages of the proactive, reactive and hierarchical protocols and then make a comparative analysis of their advantages and disadvantages. The objective is to make observations about how the advantages and disadvantages of these protocols can be improved.
Itrust assortment forwarding technique is a state free forwarding technique. But in geographic routing there is a lack of holistic design to be more efficient and robust. This paper present an overview of the Adhoc Routing Protocol which selects its forward based on the geographical position of packet destinations. In this topology each node knows its one hop locality in order to forward the packets. Maintenance of routes is not obligatory. It is a position based opportunistic routing protocol (Triviño-Cabrera,& Cañadas-Hurtado, 2011) in which several forwarding candidates supply the packet that has been acknowledged and if the best forwarder does not forward the packet in a particular time slot, then suboptimal candidate will take turn to forward the packet and it is highly forceful. The main request is the sender can obtain the current position of the destinations. In this paper, recently revealed protocols are discussed. and the authors probe the blow of several important hypothesis on our methodical results. This study provides brief description about all the position based routing protocols. Their performance was calculated and a graph was drawn on their result. The authors also propose a new technique to reduce the packet delay and drop.
The Secure Source-BAsed loose Synchronization (SOBAS) protocol is introduced, to securely synchronize the events in the network, without the transmission of explicit synchronization control messages. Nodes use their local time value and initial vector value as a one-time dynamic key to encrypt each message. SOBAS provides an effective dynamic en-route filtering mechanism, where the malicious data is filtered from the network. Instead of synchronizing each sensor globally, SOBAS focuses on ensuring that each source node is synchronized with the sink such that event reports generated by the sink are ordered properly. Hence, the objective of the SOBAS protocol is to provide a loose synchronization protocol for WSNs rather than a perfect synchronization among the nodes. With loose synchronization, it reduces the number of control messages needed for a WSN to operate providing the key benefits of reduced energy consumption as well as reducing the opportunity for malicious nodes to eavesdrop, intercept, or be made aware of the presence of the network. Thus, SOBAS (Source-BAsed loose Synchronization) provides energy efficient and an effective technique to securely synchronize the nodes on the data delivery path in the network.
In Adhoc networks, nodes will be trusted implicitly based on cooperation between the entities involved in routing operations. As wireless ranges of nodes are limited, the nodes cooperate with their neighbors in order to extend the entire size of the network. Trust is taken as security solution for OLSR protocol which fits particularly with characteristics of ad hoc networks. The explicit trust management allows entities to reason with about trust and to take decisions regarding other entities. In this paper, analysis of implicit trust for the OLSR protocol using trust specification language have been done and it is shown how trust based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, the prevention and countermeasure have been proposed to resolve the inconsistency. The same analysis of implicit trust using trust specification language can be implemented in other protocols.
WiMAX (Worldwide Interoperability for Microwave Access) is a long-range wireless networking standard developed by IEEE to solve the point to multipoint broadband outdoor wireless network problem. WiMAX provides wireless communication to areas where cable infrastructure is inadequate. It is designed to provide higher data rates. WiMAX forum promised to provide better service in means of better coverage and quality but at present in Dhaka city Bangladesh, WiMAX technology is unable to support the coverage or throughput recommended by WiMAX forum. End user subscribers are not getting their assigned bandwidth due to poor network arrangement, tall building density and vast population density. The essential necessity for this research is to improve coverage and quality and thereby making WiMAX technology as the best for wireless and mobile broadband communications. This paper focuses on the RSSI improvement of WiMAX network in Dhaka city, Bangladesh by making a site survey in real life and then analyzing with collecting data with theoretical data to evaluate the end user improvement by applying research solution.
Wireless Sensor Network is a collection of many sensor nodes and is more vulnerable to node replica attack. Among many physical attacks to sensor networks, the node clone is a serious and dangerous one because sensor nodes are generally short of tamper-resistance hardware components. An adversary can capture few nodes, extract code and all secret information to replica many nodes. That replica nodes act as a original node, and can freely enter the sensor network and then extend the adversary's capacities to perform the network maliciously and have whole control over the network. In the existing system, even though private keys are used for both identity and location of the sensor node, still the nodes are compromised by the attacker and also those methods are based on centralized system, and it increases communication burden and increases complexity to detect the clone node. To overcome these problems, two detection algorithms are proposed. Distributed Hash Table (DHT) is a decentralized, key-based caching and checking system to detect the clone node. DHT-based detection algorithm can use chord overlay network to detect node clone with high security level. Randomly Directed Exploration (RDE), a distributed system providing good communication performance, uses two methods probabilistic directed forwarding with random initial direction and border determination for detecting the clone node. RDE has high detection probability compared to DHT-based detection algorithms.