i-manager's Journal on Wireless Communication Networks (JWCN)


Volume 7 Issue 3 October - December 2018

Research Paper

A Framework for Physical Home Security Using Mobile Intrusion Detection System

Shefiu Olusegun Ganiyu* , Abideen Ismail **, Joseph A. Ojeniyi ***, Toheeb Adediran****
* Lecturer, Department of Information and Media Technology, Federal University of Technology Minna, Nigeria.
** Research Scholar, Department of Telecommunication Engineering, Federal University of Technology Minna, Nigeria.
*** Lecturer, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
**** PG Scholar, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
Ganiyu,S.O., Ismail,A., Ojeniyi,J.A., Adediran,T. (2018). A Framework for Physical Home Security Using Mobile Intrusion Detection System.i-manager's Journal on Wireless Communication Networks,7(3), 1-9. https://doi.org/10.26634/jwcn.7.3.15931

Abstract

Physical Intrusion Detection Systems (PIDS) are deployed as complementary security measures to ensure safety of home and other edifices from burglars. Several systems have been proposed for physical intrusion using single or multiple detection sensors, surveillance cameras amongst others. Often, some systems send messages containing text, image or video of suspected intruders to responders via wireless communication networks. However, the systems were custombuilt from assemblage of disparate hardware components, which increased the cost of implementation and required some levels of expertise to setup. Also, research efforts to curtail false intrusion alerts from the PIDS have not been sufficiently addressed. Thus, this paper presents a framework for Mobile-based Physical Intrusion Detection System (MPIDS) that turns smart mobile devices to PIDS for home or personal usage. Subsequently, the framework was conceptually and empirically validated for physical home security. In reality, the proposed M-PIDS could save cost, reduce false intrusion alert rate and minimize setup effort, while increasing physical security for smart city dwellers.

Research Paper

On the Issues of Communication in FANET: A Light Fidelity Based Approach

B. O. Sadiq* , Deepa**, M. B. Mu’azu***, Y. A. Sha’aban****
*-**** Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria.
Sadiq.B.O., Adedokun,E.A., Mu'azu,M.B., Sha'aban,Y.A.(2018). On the Issues of Communication in FANET: A Light Fidelity Based Approach. i-manager's Journal on Wireless Communication Networks, 7(3),10-18. https://doi.org/10.26634/jwcn.7.3.15607

Abstract

This paper presents a novel approach of using Light-Fidelity to network Flying Ad-hoc Network (FANET) for information sharing in a cooperative and collaborative manner. Its inherent characteristics such as the security, nature of the links, bandwidth requirement make the choice of the communication medium in FANET important. However, due to the special features of Light Fidelity (Li-Fi) such as the inability to penetrate wall which makes it secure, the speed of data transfer greater than 1Gbps, makes it suitable as a communication medium for FANET. This work developed a Li-Fi transmitter and Receiver Circuit for FANET. This developed circuit is expected to be used as an inbuilt communication system for information sharing. The developed system was used to demonstrate the proof of concept to the product via laboratory experiment. The test bed was connected to a computer system which served as the ground terminal. In addition, test for communication range and connectivity were carried out. The communication range is currently24 m.

Research Paper

Utilizing Priority-Based Queen Bee Algorithm for Power Conservation in Wireless Sensor Networks

Alireza Jahani* , Sogol Rabei Savoji**, Mahdiye Bagheri***, Hooman Soori Roodavari****
* Assistant Professor and Head, Department of Information Technology, Mehralborz Institute of Higher Education, Tehran, Iran.
** Teacher and Research Assistant, Department of Information Technology.
***-**** Graduate, Department of Information Technology Engineering, Mehralborz Institute of Higher Education, Tehran, Iran.
Jahani,A., Savoji,S.R., Bagheri,M., Roodavari,H.S. (2018). Utilizing Priority-Based Queen Bee Algorithm for Power Conservation in Wireless Sensor Networks. i-manager's Journal on Wireless Communication Networks, 7(3),19-31. https://doi.org/10.26634/jwcn.7.3.15517

Abstract

Wireless Sensor Networks form small nodes that calculate and communicate with each other. In such networks, fault tolerance and security must be improved. In addition, maintaining node energy is one of the most important problems in node operation. Since wireless sensor networks have energy constraints, power conservation in these networks is very important and faces challenges. The aim of this study is to study the challenges and factors affecting node failure as well as the techniques and challenges related to power conservation. Since this study describes and introduces the performance of wireless sensor networks by including features, dimensions and relevant constraints, an appropriate algorithm for power conservation in wireless sensor networks is attempted. Therefore, power conservation techniques were studied in this paper to increase the fault tolerance of these network types and the performance of each method is separately described in different energy degradation conditions by providing a comparative table. The solution presented is a combination of priority-based methods and the Queen Bee algorithm and is introduced and analyzed to create energy-efficient clusters in wireless sensor networks. Therefore, the "Queen Bee Algorithm based on priority "(PQBA) is presented to improve power conservation and achieve the desired energy consumption. The simulation results in the CupCarbon simulator showed that more active points in the wireless sensor network lead to more clusters that reduce energy consumption by increasing the number of clusters and thus increase network lifetime.

Research Paper

Localization in Wireless Sensor Networks Using TLBO

Gaurav Sharma* , Rajesh A.**
*Assistant Professor, Department of Electronics and Communication Engineering, CVR College of Engineering, Hyderabad, Telangana, India.
** Associate Professor, Department of Electronics and Communication Engineering, CVR College of Engineering, Hyderabad, Telangana, India.
Sharma,G., Rajesh,A. (2018). Localization in Wireless Sensor Networks Using TLBO. i-manager's Journal on Wireless Communication Networks, 7(3),32-37. https://doi.org/10.26634/jwcn.7.3.15932

Abstract

Localization is one of the most critical issues for Wireless Sensor Networks (WSN), since numerous applications rely upon the exact location of the sensor nodes. In last two decades, many range based and range free localization algorithms have been proposed. Generally range free algorithms are more effective, but having poor localization accuracy. Distance Vector Hop (DV-Hop) algorithm has pulled more attention of scientists because of its steadiness, practicality and less equipment cost. To accomplish higher accuracy in range free localization algorithms, an Improved DV-Hop based on Teaching Learning Based Optimization (IDV-Hop based on TLBO) algorithm has been proposed. In the proposed method, normal hop size of the node is changed by refreshing a correction factor in it. For further enhancing the precision, TLBO method has been applied in IDV-Hop, since confinement is the optimization problem whose aim is to minimize the location errors in WSNs. The procedure of TLBO is partitioned into two stages: Teacher stage and Learner stage and it is free from the calculation parameters. With the assistance of limited populace possible region, IDV-Hop based on TLBO finds the normal nodes more precisely and accomplishes higher convergence rate. Simulation results demonstrate that proposed algorithm is effective and more precise in terms of localization accuracy compared to DVHop, DV-Hop based on Genetic Algorithm (GADV-Hop) and DV-Hop based on PSO (Particle Swarm Optimization) algorithms.

Research Paper

Implementation of Internet Access in MPLS-VPN Technique on ISP

T. U. Reshma* , Komala James**
* PG Scholar, Department of Electronics and Communication Engineering, Valliammai Engineering College, Tamil Nadu, India.
** Head, Department of Electronics and Communication Engineering, Valliammai Engineering College, Tamil Nadu, India.
Reshma, T.U., James, K. (2018). Implementation of Internet Access in MPLS-VPN Technique on ISP. i-manager's Journal on Wireless Communication Networks, 7(3),38-45. https://doi.org/10.26634/jwcn.7.3.15747

Abstract

This paper proposes internet access along with MPLS VPN network to provide internet access connectivity for the customer along with their MPLS VPN connectivity. MPLS VPN network are service providers that provide MPLS Layer 3 VPN service connectivity for customers. Usually customer request internet access from the service provider that contains access. It is possible, that in case of MPLS VPN, service provider can provide internet access for customer as well. Internet access for VPN can be provided by a variety of ways with the MPLS architecture. Here internet access is provided to customer through internet service provider in ISP router. In current generation, it is very much necessary to access the Internet from an MPLS-based VPN along with addition to progressing to maintain the VPN connectivity among corporate sites. This model configuration focused on providing Internet access from the VPN Routing and Forwarding (VRF) that contains the default route to the Internet Gateway Router (IGW).

The proposed system uses three internet service providers, which provide connectivity to the customer. Three ISPs are used to provide MPLS VPN service to the customer and the fourth ISP router is used to provide internet access for the customer who also has MPLS VPN service. The below session describes how to design an MPLS CORE for internet access such that VPN remains secure. The implementation of internet over MPLS VPN is simulated by using a software GNS3 (Graphic Network Simulator) tool, which provides internet access by implementing internet in MPLS VPN technique on ISPs. The principle of this paper is to demonstrate the model configuration used to access the Internet from a Multiprotocol Label Switching (MPLS)-based VPN using a global routing technique.