This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
This document summarizes a research paper about denial of service (DoS) attacks on wireless sensor networks. It begins by outlining some key security goals for wireless sensor networks, including data confidentiality, integrity, availability, and authentication. It then discusses DoS attacks specifically, noting they aim to degrade efficient use of network resources. The document proposes that DoS attacks can occur at different layers of the OSI model. It provides examples of physical layer attacks like jamming and describes how frequency hopping can help counter jamming. In closing, it notes DoS attacks threaten the availability security goal for wireless sensor networks.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Source based Security Issues in WDM Systems IJECEIAES
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
This document provides an overview of mobile ad hoc networks (MANets) and security attacks against them. It discusses the following key points:
1. MANets are self-configuring, dynamic wireless networks without centralized administration or fixed infrastructure that allow nodes to connect to each other.
2. Security in MANets is challenging due to the lack of infrastructure and centralized monitoring. Common attacks target the physical, data link, network, transport, and multi-layers of the network.
3. Attacks discussed include flooding, blackhole, link spoofing, wormhole, denial of service, and traffic monitoring aimed at different layers of the network. Countermeasures are needed to strengthen MANet security.
A novel approach in identification of blood group using laser technologyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes the design of a workplace for assembling monoblock pumps. It begins with introducing the importance of productivity and ergonomics. It then describes conducting a work study which involves time motion study and anthropometric measurements of workers. Ergonomic analysis using CATIA software and RULA method revealed high risk postures. The analysis identified tasks like picking up heavy components and carrying assembled pumps over long distances as issues. Recommendations include redesigning worktables to suit smaller workers and implementing mechanical aids to reduce physical stresses.
Ultimate strength analysis of box girder under hoggong bending moment, torque...eSAT Publishing House
This document analyzes the ultimate strength of a box girder model under combined loading conditions using finite element analysis. It studies the Reckling No. 23 box girder model under hogging bending moment, torque moment, and water pressure. The analysis finds that higher proportions of bending moment or torque in the initial load result in higher ultimate strengths for the respective loads. It also finds that water pressure negatively impacts the ultimate strengths and accelerates hogging deformation. Relationships between the ultimate strengths under different loading conditions are presented.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document summarizes an article that proposes an adaptive broadcast mechanism to improve alert message dissemination in vehicular ad-hoc networks (VANETs). It aims to reduce the "broadcast storm problem" where redundant rebroadcasting of messages causes contention and packet collisions. The proposed Profile-driven Adaptive Warning message Dissemination System (PAWDS) algorithm dynamically adjusts broadcast parameters based on detected city roadmap profiles (simple, regular, complex layouts) and vehicle density to select the appropriate dissemination scheme (full, standard, reduced). Simulation results show PAWDS improves information dissemination accuracy and mitigates broadcast storm issues compared to traditional methods, though some nodes still repeatedly act as rebroadcasters.
Increasing network efficiency by preventing attacks at access layereSAT Publishing House
This document discusses increasing network efficiency by preventing attacks at the access layer. It describes common attacks like MAC address flooding, DHCP starvation, and DHCP spoofing that switches are vulnerable to. It then provides configurations for switch port security, DHCP snooping, and disabling unused ports to mitigate these attacks. These configurations aim to secure access layer switches and prevent malicious users from overloading the network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. The document discusses the development of a research computing framework (RCF) to support large-scale radiation oncology research.
2. The RCF was designed based on principles of layering, modularity, and separation of concerns. It provides tools and applications for tasks like image registration and treatment planning optimization.
3. The framework includes hardware like x86 clusters connected to medical accelerators for patient data as well as large storage systems. Software components are organized into modular and interchangeable layers isolated from device specifics.
Transmission of arm based real time ecg for monitoring remotely located patienteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document analyzes analytical solutions for square shape pressure microsensors. It presents equations to calculate sensor sensitivity based on factors like diaphragm size, burst pressure, and piezoresistor length. When a square silicon diaphragm is subjected to uniform pressure, its internal strain and resistance changes. This change can be measured using piezoresistors placed on the diaphragm edges in a wheatstone bridge circuit. Optimization results show the effective piezoresistor length for maximum output is around 10 micrometers. The analytical solutions and simulations agree with existing literature on modeling and designing piezoresistive pressure sensors.
This document presents a model for detecting the agent responsible for data leakage. It discusses adding fake objects to distributed data in order to identify the source if a leakage occurs. The model is implemented using C# and SQL Server. When an agent requests data, the distributor sends the original data along with randomly allocated fake objects. If the data is leaked, the distributor can analyze the fake objects to determine the guilty agent. An algorithm is provided and screenshots show modules for login, data sharing, and detecting the guilty agent using a probability calculation. The model aims to overcome limitations of existing watermarking techniques for data leakage detection.
- The document describes the design and testing of an automobile exhaust system. It discusses modeling and simulation of the exhaust system to better understand its dynamics and performance.
- A newly designed exhaust system is compared to an existing system. The new design shows lower back pressure, which improves engine performance. Various tests are conducted on the system, including material testing and leak testing, to evaluate its durability and ability to withstand internal pressures.
- The design aims to minimize exhaust noise while withstanding high temperatures and pressures from the engine. Finite element analysis is used to optimize the muffler design to maximize gas storage capacity within weight constraints. Test results show the material and design meet required specifications.
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A study on geographical characteristics of the krishna western delta using gi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It is observed that different protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs typically communicate directly with a centralized controller or satellite. In this paper we survey the different research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the development of a framework, which is radically simplifies the development of software for sensor network applications and characteristic Features of Sensor Networks.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
This document reviews various energy efficient techniques for wireless sensor networks. It discusses several routing protocols that have been proposed to reduce energy consumption and extend the lifetime of wireless sensor networks, including a 3D geographical routing protocol, a trust and energy aware routing protocol, and a directional transmission based energy aware routing protocol. It also reviews security attacks that can occur in mobile ad hoc networks, such as black hole attacks, wormhole attacks, and denial of service attacks. Finally, the document summarizes several papers that have studied and proposed improvements to energy efficient routing techniques.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
Abstract A mobile ad hoc network is a self-configured wireless network in which any mobile node can freely access the network at any time without the need of any fixed infrastructures. Due to high dynamic characteristics, these types of networks are easily prone to various security attacks. There are various mechanisms which provide secure communication i.e., certificate revocation. In this paper, the main challenge of certificate revocation (i.e., to revoke the certificates of the intruders inorder to permanently exclude them from the network activities) is accomplished by adopting CCRVC scheme that also deals with false accusations apart from outperforming the other techniques in case of revoking the intruders certificates. Also this scheme enhances the reliability as well as accuracy as it can vindicate the warned nodes promptly based on the threshold based mechanism. Energy of the nodes must be utilized in an effective manner inorder to secure the network for longer durations as the mobile nodes operate on their batteries. Further, a new technique was proposed, to utilize the energy of the nodes effectively by switching the CHs in a timely manner (since the CHs are likely to lose more energy). Experimental results evaluated by using NS-2 show that the proposed scheme EECCRVC is efficient enough in providing secure communications along with effective energy utilization in mobile ad hoc networks. Keywords: Mobile ad hoc networks, Security, Network Simulator, Certificate Revocation, Energy Utilization
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
The document proposes a Portable and Data Security Tolerance-based Energy-Efficient Framework (PDST-EEF) for maintaining data security while lowering energy usage of sensor devices in smart grid environments. PDST is developed to ensure data privacy using an authentication method integrated with cryptographic signatures to detect various attacks like denial of service and replay attacks. EEF then presents an energy-efficient cybersecurity mechanism for sensor networks in smart grids. It identifies malicious nodes, forms groups, and allocates keys with less energy. Experimental results show that PDST-EEF improves authentication time by a second with 5.06% less energy usage. The framework aims to provide high-level security for sensor networks while minimizing their energy consumption.
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
Wireless Sensor Networks (WSNs) are effective devices used for remote surveillance, device failure prediction,
and housing energy control in numerous smart grid implementations. Several interaction structures and remedies,
such as broadband networks, cable networks, Wireless Sensor networks, have been suggested to assist
Smart Grid implementations. Owing to their cheap, dynamic nature, robustness, and low energy profile, WSNs
are attractive devices, and preserving a low energy pattern is an essential factor in WSN. Implementing quality
services and safety techniques in sensor networks is challenging in smart grid applications. Thus, in this article,
Portable and Data Security Tolerancebased Energy-Efficient Framework(PDST-EEF) has been proposed for
maintaining a high standard of data security by lowering the sensor device energy usage in smart grid surroundings.
PDST model is developed to ensure data privacy in sensor networks by utilizing an authentication
method integrated with the cryptographic signature model to detect the various attacks. PDST identifies and
separates attacks like denial of service and replay efficiently. EEF presents a low-power cyber safety mechanism
on sensor networks with smart grid tracking applications. EEF is modeled with different stages like identifying
anti-nodes, group development, and allocating keys less energy. EEF can operate with higher power efficiency
techniques while preserving sustained throughput and reliability ideals. The experimental result shows that the
PDST-EEF’s specific request and authentication period is often enhanced by just a second with less energy usage
of 5.06%.
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
This document discusses using mobile sensors to improve target coverage and network connectivity in wireless sensor networks. It first defines key concepts in mobile wireless sensor networks like coverage, connectivity, and network lifetime. It then reviews existing literature on algorithms for mobile sensor deployment to optimize target coverage and network connectivity with minimum movement. The proposed method aims to deploy mobile sensors with no movement needed to achieve both target coverage and network connectivity. The goal is to minimize energy consumption from sensor movement.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Similar to Improvement of quality of service parameters using (20)
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
This document summarizes a product called H-HUTS that aims to provide sustainable disaster recovery housing. H-HUTS uses cardboard and origami-inspired modular construction to quickly provide temporary shelters after disasters. The cardboard shelters are designed to be upgraded into permanent homes over time using low-cost materials like shotcrete or concrete. The modular design allows for flexibility and community participation in construction. Testing has shown the shelters can withstand wind loads and provide adequate insulation. The goal of H-HUTS is to not just provide initial shelter but help disaster-affected communities regain permanency in housing and recover in the long-term.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
Improvement of quality of service parameters using
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 579
IMPROVEMENT OF QUALITY OF SERVICE PARAMETERS USING
REINVENTED FSMAC PROTOCOL FOR WIRELESS SENSOR
NETWORKS
S. S. Agrawal1
, K. D. Kulat2
, M. B. Daigavane3
1
Assiatant Professor, Electronics and Telecommunication, SKNCOE, Pune, Maharashtra, India,
2
Professor, Electronics and computer science, VNIT, Nagpur, Maharashtra, India
3
Professor, Electronics and power Electronics, SD College of Engg., Wardha
sujata.agrawal@rediffmail.com, kdkulat@ece.vnit.ac.in, mdai@rediffmail.com
Abstract
Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring,
industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to
access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor
Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate
node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in
carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b)
the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network
performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy
Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters
are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms
of successful data transmission rate and throughput of the network.
Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Wireless Sensor Networks (WSN) are gaining lot of attention
Because of its over increasing usage. WSNs are large network
of Small, Battery-operated sensor nodes which are situated
randomly in a vast geo-graphical area[1]. Denial-of –Service
(DoS) Attack destroys the network resources so that sensor
nodes behave unpredictably. These attacks are becoming very
sensitive issue in WSNs. DoS Attack disturbs the balance
between efficiency and fairness of common channel access
[2]. The adoption of wireless sensor networks by applications
that require complex operations, ranging from health care to
industrial monitoring, has brought forward a new challenge of
fulfilling the quality of service (QoS) requirements of these
applications. QoS support is a challenging issue because of
highly resource constrained nature of sensor nodes, unreliable
wireless links and harsh operation environments. In this paper,
we focus on the QoS enhancement at the MAC layer against
DoS Attack. While the early research on WSNs has mainly
focused on monitoring applications, such as agriculture and
environmental monitoring, based on low-rate data collection,
current WSN applications can support more complex
operations ranging from health care to industrial monitoring
and automation. This emerging application domain is that
performance and quality of service (QoS) assurances are
becoming crucial as opposed to the best-effort performance in
traditional monitoring applications.
International Telecommunication Union (ITU)
Recommendation E.800 (09/08) has defined QoS as: ‘‘Totality
of characteristics of a telecommunications service that bear on
its ability to satisfy stated and implied needs of the user of the
service’’.
QoS brings the ability of giving different priorities to various
users, applications, and data flows, frames or packets based on
their requirements by controlling the resource sharing. Hence
higher level of performance over others can be provided
through a set of measurable service parameters such as delay,
jitter, available bandwidth, and packet loss. Collisions and
consequently retransmissions due to Dos Attack have direct
impact the overall networking metrics such as throughput,
delay and energy efficiency. Since the MAC layer coordinates
the sharing of the wireless medium, it is responsible for
minimizing the number of collisions.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 580
Fuzzy Logic Secure Media Access Control (FSMAC) Protocol
[3] gives good solution against DoS Attacks. It reduces the
rate of false detection as well as increases the successful
packet transmission rate.
In proposed paper, FSMAC protocol is re-established using
new intrusion detecting parameters. These parameters are
number of time node sensed free channel and Variation in
channel sense period. FSMAC protocol first finds out the
intrusion using pre-defined intrusion detector indicators.
Fuzzy Logic (FL) is used innovatively for decision making.
Appropriate countermeasures are taken to reduce the
destruction of attacks basing on intrusion detection results.
Simulations are carried in Matlab with 20 nodes to verify the
effect.
The rest of the paper is arranged as following:
A survey of the research in security issues in sensor networks
and overview on DoS Attack are presented in section 2. The
Computational intelligence and Fuzzy Logic Theory is
outlined in section 3. The structure of proposed FSMAC
algorithm with new parameters is explained in section 4. The
network scenario implemented in order to validate the secure
MAC and results obtained are discussed in section 5. Finally
the concluding remarks are made.
2. PRELIMINARIES
In this section, present security issues in wireless sensor
network are discussed as well as DoS Attack is explained in
brief.
2.1. Current Security Issues
Wireless links are very sensitive to passive eavesdropping,
message replaying and message distortion. Weakly protected
nodes that move into hostile environments can be easily
compromised. Due to dynamic topology, authorization of
administration becomes difficult. The scale of deployment of a
WSN requires conscious decision about trade-offs among
various security measures. These issues are discussed and
mechanisms to achieve secure communication in WSNs are
presented in [6]. Various security challenges in wireless sensor
networks are analyzed and important issues that need to be
addressed for ensuring adequate security are summarized in
[7].
Secure routing is a major research area. Types of routing
attacks and their countermeasures are presented in [8].
Researchers have proposed several methods of securing the
MAC layer against the attacks by adversaries. DoS attacks and
their countermeasures at the CSMA/CA MAC layer are
discussed in [18] and [19].
2.2 Overview of DoS Attack
DoS attacks are classified into three groups: collision,
unfairness and exhaustion attacks based on their mechanism.
In a collision attack, the attacker sends data packets regardless
of the status of the broadcast medium. Such packets collide
with the data or control packets from the legitimate sensor
nodes. Using this mechanism, the collision only happens in the
exchanging period of RTS and CTS packets, which means the
data packet sending process is a non-collision process.
In an unfairness attack, for most RTS/CTS-based MAC
protocols, each node has the same priority to get the common
channel. The first tried node governs the channel. Besides, all
other nodes have to wait for a random length time before
trying to transmit packets. This rule could ensure that every
node accesses common channel fairly. Adversaries could
utilize these characteristics to attack the network. They send
out packets just waiting for a very short time or without
waiting. This causes the common channel used more by
adversaries than by normal nodes. This is what we called
unfairness attack. the adversary transmits an unusually large
number of packets when the medium is free. This prevents the
legitimate sensors from transmitting their packets.
In an exhaustion attack, the adversary transmits an abnormally
large number of RTS packets to the normal sensor nodes,
which exhausts them prematurely.
3. BACKGROUND TECHNIQUES
Under this Heading, techniques used against DoS Attack are
discussed.
3.1 Computational Intelligence
Computational Intelligence (CI) is proper tool used to solve
security problems of DOS Attack in wireless sensor networks.
CI parameters are encouraged by nature. [2][3]. Different
parameters of CI have been successfully used in past few
years to address various challenges. CI provides adaptive
mechanisms that exhibit intelligent behavior in complex and
dynamic environments like WSNs.
CI works very flexibly, autonomously and robustly against
dynamic topology changes, transmission failures and attacked
scenario. CI fuses elements of learning, adaptation, evolution
and fuzzy logic to create intelligent machines. In addition to
paradigms like neural networking, reinforcement learning,
evolutionary computing and fuzzy computing, swarm
intelligence, artificial immune systems. Parameters of CI have
found practical applications in areas such as product design,
robotics, intelligent control, and biometrics and sensor
networks. Researchers have successfully used CI techniques to
address many challenges in WSNs [2] [10].
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 581
The literature has a few articles that use CI approaches for
WSN security. The applications available in the literature have
handled the issue of Denial-of-Service (DoS) attacks at the
node level. Individual sensor node is resources- energy,
bandwidth, computation, memory constrained device.
Therefore, algorithms that involve high computational and
storage burdens are not attractive. So Fuzzy logic and compact
NNs are among solutions discussed.
3.2. Fuzzy Logic
Human reasoning includes measure of imprecision and
uncertainty where as Set theory allows elements to be either
included in a set or not. Human reasoning is marked by the
use of linguistic variables like most, many, frequently, seldom
etc. This approximate reasoning is modeled by fuzzy logic.
Fuzzy logic is a multivalued logic that allows intermediate
values to be defined between conventional threshold values
[15].
Fuzzy systems allow the use of fuzzy sets to draw conclusions
and to make decisions. Fuzzy sets differ from classical sets in
that they allow an object to be a partial member of a set. In
fuzzy systems, the dynamic behavior of a system is
characterized by a set of linguistic fuzzy rules based on the
knowledge of a human expert. Fuzzy rules are of the general
form:
IF antecedent(s) THEN consequent(s)
Where antecedents and consequents are propositions
containing linguistic variables. Antecedents of a fuzzy rule
form a combination of fuzzy sets through the use of logic
operations [3]. Thus, fuzzy sets and fuzzy rules together form
the knowledge base of a rule-based inference system as shown
in Fig 1 [3].
Fig. 1 shows the structure of a fuzzy logic system (FLS) [15].
When an input is applied to a FLS then the inference engine
computes the output set corresponding to each rule. The
defuzzifier then computes a crisp output from these rule output
sets [3] [11].
Fig-1: Fuzzy Inference Engine
4. PROPOSED FSMAC ALGORITHM
This section discusses design of FSMAC protocol algorithm
with new parameters.
4.1 Selection of Intrusion Detector
When collision attack intrudes the network, attackers send
massive packets into the common channel when detecting this
channel is busy. As a result, more RTS, CTS, ACK and even
data packets may be destroyed. Due to the collisions caused by
attackers. See Fig. 2. Moreover, the average latency of data
packet is prolonged because of more retransmitting control
packets and data packets [4] [9].
Under normal condition, without any attacks, it is fair for each
node to transmit data over the common channel from long-
term statistic view. Since nodes have to wait for a random
time before sending RTS to try to hold the common channel.
Only the first successful one can be allowed to transmit data
over the common channel. Data packets of normal sensor
nodes are supposed to wait longer time at MAC layer, when
unfairness attackers prevent other normal sensor nodes from
transmitting. This is done by holding the channel ahead of
time [3][8].
Differing from collision attack and unfairness attack,
exhaustion attackers work almost same as other normal sensor
nodes, except for sending RTS repeatedly to some normal
sensor nodes. As a result, the arrival rate of RTS at victim
nodes will increase dramatically. Besides this, data packets
should wait longer time, since the common channel is more
utilized for transmitting RTS by attackers [4].
As well as for unfairness attack as the channel is free, attacker
is ready to attack which causes an attack. There is specific
Non-fuzzy
Inputs
Rule Base
Fuzzy Sets
Non-fuzzy
Outputs
Fuzzification DefuzzificationInference
Engine
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 582
time for transmitting RTS to the receiver, but at the time of
exhaustion attack, because of large number of RTS are sent
over receiver, length of that period gets minimized.
From above analysis, it shows that the intrusions may be
detected by monitoring abnormal alterations of some sensitive
network parameters. They are:
• A great number of RTS packets are received by victim
nodes for exhaustion attacks.
• Average waiting time becomes very long for both
unfairness attacks and collision attacks.
• Collision takes place considerably often in collision
attacks.
• When more the times channel is sensed free by a certain
node, possibility of intruded DOS Attack is high and
vice-versa.
• If channel sense period is more possibility of attack will
be less.
By observing abnormal changes in No. of times node sensed
free channel and Variation in channel sense period.
In this paper, chosen parameters are as follows:
• Number of times node sensed free channel.
• Variation in channel sense period.
4.2 FSMAC Algorithm Description
Fig. 2 shows the mechanism of the proposed secure MAC
algorithm. There are addition of two modules-intrusion and
defense module into original CSMA/CA protocol.
Fig-2: Intrusion Detection System
Each sensor node is provided with it's own security system.In
FSMAC, intrusion module of each sensor node monitors the
intrusion detection parameters and periodically checks
whether intrusion happens or not. If intrusion is happened then
the defense module of the sensor node will be triggered by
Fuzzy Logic System (FLS) intrusion detection module.
Defense module will inform physical layer and Mac layer to
switch to different Radio Frequency (RF) band to start or stop
the transmission. This sensor node will get back to the original
RF band or restarts information exchanging over network after
this period, as well as intrusion detection will be resumed.
Each sensor node monitors, Free sensed channel and Channel
sense period, which are the inputs or antecedents of FLS
intrusion module. Then according to the output or consequent
possibility of intrusion found of FLS intrusion detection
module, security systems make a decision whether the
intrusion exists or not.
For proposed FLS, linguistic variables or antecedents are used
to represent, Number of times Channel sensed free and
variation in Channel sense period. These antecedents are
divided into three levels i.e. Low, Moderate, High. The output
i.e. Possibility of intrusion detection is divided into five i.e.
Very Low, Low, Moderate, High, Very High. As every
antecedent has three fuzzy subsets and there are two
antecedent, 6 possibilities of consequents.
From behavior of these inputs the paper may discuss the
behavior of consequents i.e. possibility of intrusion applying
Fuzzy Logic as follows:
Antecedent 1: Number of times Chanel is sensed free.
Antecedent 2: Variation in Channel Sense period.
Consequent: possibility of intrusion Detection.
Table-1: The rule base for intrusion detection.
Antecedent 1 Antecedent 2 Consequents
Low Low Very High
Low Moderate High
Moderate High Moderate
Moderate Low Moderate
High Moderate High
High High Very Low
A defense module is trigged, when intrusion is found. Defense
module takes countermeasures to reduce the effects of
attackers on the network.
During the intrusion period, it is an energy waste or unsafe
action for normal sensor nodes to transmit or receive. Because
the transmitting or receiving is almost unsuccessful or spied
by attackers when enemies attack the network Thus it is an
appropriate and effective choice for the normal nodes to
switch to a different RF band to make transmission or to stop
transmitting and receiving.
The paper focuses on intrusion detection and increasing the
lifespan of protocol. For example, if it choose stopping
transmitting and receiving mechanism to implement defense
function There is no information on attacks duration, it can't
make the node sleep until attacks stop. So, after a period of
sleep, this node should wake up to make data transmission and
detect the intrusion again. This node will stay at this state until
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 583
intrusion is found again. At sleep mode, there is no
transmitting and receiving, bModrut sensing still continues.
In order to make new secure algorithm, this has no centre
control available for general WSNs. This defense scheme, like
intrusion detection scheme, is also distributive i.e. each sensor
node's defense schedule has no any relationship with other
sensor node's [3]
5. RESULTS AND DISCUSSION
5.1. Simulation Setup
The paper runs simulations using MATLAB simulator. Thirty
sensor nodes are deployed randomly in an area of l km X l km,
and communication range (radius) is 500m. Nodes are set to
be initially with energy of 2 J. The destination for each sensor
node will be randomly chosen.
First it checks the behavior of CSMA/CA protocol and then it
separately tests the influences of each DoS attack i.e. collision
attack, Unfairness attack and Exhaustion attack on CSMA/CA
protocol. In each experiment, there is only one type of attack
introduced. The attacker is an abnormal sensor node, which
has been captured and reprogrammed by enemies successfully
before the system starts to work.
5.2 Simulation Results
Parameter metrics are defined to testify the effects of our
algorithm. It is,
• Possibility of successful detection (Pd): Pd is the
possibility of nodes making correct detection.
• Possibility of false detection (Pfd): Pfd is the possibility of
nodes making false detection.
• Data packet successful transmission rate (Rst ): Rst is the
rate of successfully transmitted data packets to all data
packets transmitted.
• Throughput: It represents the total number of packets
received successfully by a receiver per second. It can also
be defined as the total amount of data a receiver actually
receives from sender divided by the time taken by the
receiver to obtain the last packet. It also represents the
packet overhead within the route.
• Graph of Successful packet transmission are shown
below:
Fig-3: Graph of successful data transmission with FSMAC
protocol having 3 intrusion detection parameters.
Fig-4: Graph of successful data transmission for reinvented
FSMAC protocol having 2 intrusion detection parameters.
From above graph, it is observed that rate of successful data
transmission is more for reinvented FSMAC protocol and
combined protocol than Attacked CSMA/CA protocol and
existing FSMAC protocol.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 584
Fig-5: Graph of successful data transmission for FSMAC
protocol having 5 intrusion detection parameters.
Throughput for CSMA/CA without any Attack is 92.80%
Throughput for different DoS Attacks are calculated as
follows:
Table-2: Throughput for Collision Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
68.41% 81.68% 92.33% 90.29%
Table-3: Throughput for Exhaustion Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
76.64% 89.73% 88.90% 90.30%
Table-4: Throughput for Unfairness Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
75.61% 86.61% 94.86% 88.98%
CONCLUSIONS
From above study, it shows that, reinvented FSMAC protocol
gives good performance against Dos Attack and following
Conclusions are made:
1. FSMAC protocol with pre-defined new parameters gives
better detection than existing FSMAC protocol.
2. Rate of Successful data transmission is increased for
reinvented as well as for combined FSMAC protocol.
3. Throughput is remarkably increased for reinvented FSMAC
protocol in case of Collision and Unfairness Attack.
ACKNOWLEDGEMENTS
The authors can acknowledge any person/authorities in this
section. This is not mandatory.
REFERENCES
[1]. Xiuli Ren and Haibin Yu, "Security Mechanisms for
Wireless Sensor Networks", IJCSNS International Journal of
Computer Science and Network Security, VOL.6 No.3, March
2006.
[2]. Raghavendra V. Kulkarni, Anna Förster, and Ganesh
Kumar Venayagamoorthy “Computational Intelligence in
Wireless Sensor Networks: A Survey” IEEE Communication
Surveys & Tutorials, VOL. 13, NO. 1, First Quarter 2011.
[3]. Qingechun Ren and Qilian Liang ,“Fuzzy Logic-
optimized Secure Media Access Control (FSMAC) Protocol
for Wireless sensor Networks” CIHSPS-2005 IEEE
International Conference on Computational intelligence for
Home and Security and Personal Safety 2005.
[4]. Alberto Lopez Toledo and Xiaodong Wang, “Robust
Detection of MAC layer Denial-of-service attacks in
CSMA/CA Wireless Networks”, IEEE Transactions on
Information Forensics and Security,Vol.3 No.3 September
2008 .
[5]. Taimur Farooq,David lewellyn-Jones Madjid
Merabti,“MAC layer DOS Attack in IEEE802.11
Networks”,location:Liverpool Jon Moores University
K.ISBN:978-1-902560-24-3, April 2010.
[6]. E. Shi and A. Perrig, "Designing secure sensor networks,"
IEEE Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43,2004.
[7]. F. Hu and N. K. Sharma, "Security considerations in ad
hoc sensor networks," Ad Hoc Networks, vol. 3, no. 1, pp. 69-
89, 2005.
[8]. C. Karlof and D. Wagner, "Secure routing in wireless
sensor networks: Attacks and countermeasures," Elsevier's
AdHoc Networks Journal,Special Issue on Sensor Network
Applications and Protocols, vol. 1, no. 2-3, pp. 293-315,
September 2003.
[9]. A. R. M. Kamal, "Adaptive secure routing in ad hoc
mobile network," Master's thesis, Royal Institute of
Technology (KTH), Stockholm, Sweden, Nov 2004.
[10]. Jethro Shell, Simon Coupland, Eric Goodyer “Fuzzy
Data Fusion for Fault Detection in Wireless Sensor Networks”
ISBN 2010.
[11]. Vikram Gupta, “Denial of Service Attacks at the MAC
Layer in Wireless Ad Hoc Networks”, Proceedings of
MILCOM 2002, vol. 2, 7-10 Oct.2002.
[12]. Yihong Zhou, Dapeng Wu ,Scott M. Nettles, “Analyzing
and Preventing MAC-Layer Denial of Service Attacks for
Stock 802.11 Systems” ISBN 2004.
[13]. Hongfa Wang , “A Robust Mechanism for Wireless
Sensor Network Security” IEEE Conference on wireless
communication 2010.
[14]. John E. Dickerson, Jukka Juslin, Ourania Koukousoula,
Julie A. Dickerson “Fuzzy Intrusion Detection” Joint 9th IFSA
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 585
world congress and 20th NAFIPS International conference
VO.4 2001, PP 2165-2170.
[15]. H. Chan, A. Perrig, “Security and Privacy in Sensor
Networks ," Oct. 2003, pp. l 03 - IOS.
[16]. O. Kacllirski, R. Gulla, " Effective Intrusion Detection
Using Multiple Sensors in Wireless Ad Hoc Networks ,"
SFGCOMM '03, Aug. 2003.
[17]. Anthony D.Wood and Jon A. Stankovic,“Denial-of
Service attacks in sensor network”.
[18]. Adam Stubblefield. John Ioannidis, Aviel D. Rubin,
“Using the Fluhrer, Mantin, and Shamir Attack to Break
WEP”.
[19]. Adrian Perrig, Robert Szewczyk, Victor Wen, David
Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor
Networks”.
BIOGRAPHIES
Sujata S Agrawal completed her B.E(E&T.C)
Degreefrom Nagpur University in 1992 and
ME degree in 2005from Government college
of engineering, Aurangabad.She is persuing
her Ph.D. degree in Electronics Engineering
from RSTMNagpur University, India.Having a total
experience of 14 years, she is currently associated with
Smt.Kashibai Navale college of engineering, Pune as Assistant
Professor in the Electronics & telecommunication Department.
She is the Life Member of the Indian Society for technical
Education.
Kishore D. Kulat completed his degrees in
Electrical Engineering, BE in 1980, from VRCE
(at present VNIT) Nagpur and ME degree in
1984 from VJTI, Mumbai, India. He completed
his Ph.D. degree in Electronics Engineering, in
the year 2003 from VNIT, Nagpur. Having a total experience
of more than 25 years, he is currently associated with VNIT,
as Professor in the Electronics & Computer Science
Department. With his profound knowledge & experience in
his field he is guiding around 15 research scholars for their
doctoral degree. Two have been awarded the Ph. D. degree.
He has published around 15 Journal Papers, more than 25
papers in International Conferences & more than 40 have been
published in National Conferences. Has worked as Reviewer
for many National & International conferences.He is a
member of Board of Studies for Electronics Engineering,
Nagpur University for last 10years. He is member of
Professional societies like IETE, IEI and ISTE. With all his
faith in God, Dr. K. D. Kulat believes in achieving excellence
through the process of continuous upgradation.
Manoj B. Daigavane obtained the B.E. Degree
in Power Electronics Engineering from Nagpur
University, India in 1988.He received the M.S.
Degree in Electronics and Control Engineering
from Birla Institute of Technology and Science,
Pilani (Raj) India in 1994. He also obtained the M.E. Degree
in Power Electronics Engineering from Rajeev Gandhi
University of Technology, Bhopal (M.P), India in 2001. He
received Ph D Degree in Electrical Engineering from RSTM
Nagpur University, India in 2009. Since Sept.1988- June
2007, he had been with the Department of Electronics and
Power Electronics Engineering, B.D.College of Engineering,
Sewagram (Wardha), affiliated to the Nagpur University,
India. Since July 1, 2007 toApr 30, 2009, he was Professor &
Head of Electrical and Electronics Engineering, Disha
Institute of Mgmt. andTech., Raipur (C.G.) where he is
engaged in teaching & research. Presently, he is Principal of S.
D. College of Engineering, Wardha – Maharashtra (India),
since May 01, 2009. His main areas of interest are Design of
electronic circuit, resonant converters, Power quality issues,
DSP applications and Power electronics for motor drives. He
has been responsible for the development of Electrical
Machines and Power Electronics Laboratories He is a Member
of the Institution of Engineers (India) and a Life Member of
the Indian Society for technical education.