Volume-6 (Next Generation Computing Technologies)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Systematic Study on Proposed Routing Methods / Models in Soft Computing for Wireless Sensor Networks |
Country | : | India |
Authors | : | Mr.S.Nithyanandh || Dr.V.Jaiganesh |
Abstract: Wireless device Networks (WSNs) are outlined as dynamic, self-deployed, extremely unnatural structured network. It`s high process atmosphere with restricted and controlled transmission vary, processing, as well as restricted energy sources. The sever power constraints powerfully have an effect on the existence of active nodes and thus the network life. so as to prolong the network life time we've to beat the inadequacy in energy resources and preserve the process of the device nodes as long as potential. Power management approaches expeditiously scale back the device nodes energy consumption severally in every sensor node and therefore the accommodative economical routing technique has greatly appeals an excellent attention in analysis. The potential paradigms of soft-computing (SC) extremely self-addressed their ability and compatibility to overwhelm the advanced challenges in WSNs. This paper is introducing and measurement a number of the Soft Computing planned routing models for WSNs that optimally prolongs its life time. Keywords - WSN – Wireless Sensor Networks, SC – Soft Computing, Network, Routing
[1]. I F Akyildiz, W Su, Y Sankarasubramaniam and E Cayirci (2002) "Wireless sensor networks: a survey", Computer Networks Vol.
38, No. 4, pp. 393 – 422.
[2]. Averkin, A. N., Belenki, A. G., & Zubkov, G. (2007) "Soft Computing in Wireless Sensors Networks", In Conference of European
Society for Fuzzy Logic and Technology (EUSFLAT), No.1, pp. 387-390.
[3]. Zheng, J., & Jamalipour, A. (2009)"Wireless sensor networks: a networking perspective", published by A John & Sons, Inc., Wiley.
com
[4]. Romer, K., & Mattern, F, (2004)"The design space of wireless sensor networks", Wireless Communications, IEEE, Vol. 11, No. 6,
pp. 54–61.
[5]. Yoneki, E., & Bacon, J. (2005)"A survey of Wireless Sensor Network technologies: research trends and middleware's role",
University of Cambridge TR, 646..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancing Security in Wireless Sensor Network Using Cryptography Techniques and To Increase the Network Life Time |
Country | : | India |
Authors | : | C. Naveeth Babu || Dr. K. Karthikeyan |
Abstract: Wireless sensor network, which are basically spatially spread sensor nodes that disseminate the data throughout the network by using supportive environment. Security is an important factor that is needed to protect information and its availability, integrity and privacy. WSN protocol stack contains the physical layer, datalink layer, network layer, transport layer and application layer. In wireless network, deception attack will damage the network data and its integrity. This paper presents a symmetric key cryptographic technique engaged on the O-LEACH routing protocol which enhances and establish the security of wireless sensor networks. This protocol is chosen for this study as it is free from all threats which are based on the identity crisis. Threats such as sinkhole, selective forwarding, hello floods etc. can be identified and resolved as per the proposed scheme. In this paper the proposed scheme utilize the parameter such as network lifetime will increase to make the performance analysis
Keywords – wireless sensor network, O- leach protocol, symmetric key cryptographic technique, network security, threads, network lifetime
[1]. Sushma .et. al., "Security threats in wireless sensor networks", International journal of computer Science & Management studies,
ISSN: 2231-5268. Vol.11, Issue 01, may 2011.
[2]. Jyoti Attri.et al., "Study on cryptographic Techniques in computer network security'', Asian Journal of Advance Basic science.:
2(3) , 98-102 ISSN (online):2347-4114
[3]. Chun Hu Y. et al. ,"Ariadne: A Secure On-Demand Routing protocol for Ad Hoc Networks", Wireless Networks, Springer Science
Business Media, Inc. Manufactured in the Netherlands, 2005.
[4]. Vikash Kumar1.et al., "Wireless Sensor Networks : Security Issues, Challenges and Solutions", International Journal of Information
& Computation Technology, ISSN 0974-2239 Volume 4, Number 8, Apr 2014
[5]. Abhishek Pandey. et al., "A Survey on Wireless Sensor Networks security", International journal of computer Application (0975-
8887) Volume 3-No.2, June 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Performance Evaluation of AODV and AOMDV in Vehicular ADHOC Network |
Country | : | India |
Authors | : | R.Tamilselvi || Dr.V.Kathiresan |
Abstract:Vehicular Ad hoc Network (VANET) is a new way of communication which includes communication between vehicles moving at high speeds on the roads. VANET is subset of MANET. Vehicular Area Network providing emergency services and other information in both urban and rural setup. Vehicles can communicate with each through protocol. Protocols in VANET can classified as Topology Based ,Position Based , Geocast Based , Cluster Based ,Broadcast based , Infrastructure based . Reactive protocols Determine a route only when there is data to send. Each node forwards the request only once. Each node maintains a routing table that contains information about reaching destination nodes. In this paper Topology based reactive protocols AODV and AOMDV are presented.
Keywords: VANET, AODV, AOMDV, Reactive Protocol
[1]. Ms. Divya Rathi1 Mrs. R.R.Welekar2 "Performance Evaluation of AODV Routing Protocol in VANET with NS2" International
Journal of Interactive Multimedia and Artificial Intelligence, Vol. 4, Nº3
[2]. S. R. Das, E. M. Belding-Royer, and C. E. Perkins, "Ad hoc on-demand distance vector(AODV) routing," 2003.
[3]. S.R.Biradar et al. "Performance Evaluation and Comparison of AODV and AOMDV" International Journal on Computer Science
and Engineering Vol. 02, No. 02, 2010, 373-377
[4]. Arzoo Dahiya1 and Dr.R.K.Chauhan2 "Performance Evaluation Of aodv in Vanet Scenario"International Journal of Computer
Science, Engineering and Applications (IJCSEA) Vol.3, No.1, February 2013
[5]. Performance Evaluation of Routing Protocol in VANET with Vehicle-Node Density ,IEEEXlpore ,Wireless Communications
Networking and Mobile Computing (WiCOM), 2010 6th International Conference on23-25 Sept. 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Protection of DNS Server in DNS Traffic |
Country | : | India |
Authors | : | S.S.Suganya || Dr.V.Kathiresan |
Abstract:The domain name service (DNS) provides a demanding function in directing Internet traffic. The security of DNS is related to the whole Internet. DNS query log file provide the insights of the DNS security. Defending DNS servers from bandwidth violation is assisted by the ability to effectively mine DNS log data for statistical patterns. Almost every Internet communication is preceded by a translation of a DNS name to an IP address. DNS queries can be monitored through DNSQuerySniffer is a network snout utility that shows the DNS queries sent on your system. For every DNS query, the following information is displayed: Host Name, Port Number, Query ID, Request Type (A, AAAA, NS, MX, and so on), Request Time, Response Time, Duration, Response Code, Number of records, and the content of the returned DNS records. You can easily export the DNS queries information to csv/tab-delimited/xml/html file, or copy the DNS queries to the clipboard, and then paste them into Excel or other spreadsheet application.
Keywords: DNS, DNS Logs, DNS Queries, DNS Traffic
[1]. Marchal, S., Francois, J., Wagner, C., State, R., Dulaunoy, A., Engel, T., Festor, O.: DNSSM: A Large Scale Passive DNS Security
Monitoring Framework. In: Network Operations and Management Symposium (NOMS), 2012 IEEE. pp. 988–993 (Apr 2012).
[2]. Bilge, L., Sen, S., Balzarotti, D., Kirda, E., Kruegel, C.: Exposure: A Passive DNS Analysis Service to Detect and Report Malicious
Domains. ACM Trans. Inf. Syst. Secur. 16(4), 14:1–14:28 (Apr 2014).
[3]. Karasaridis, A., Meier-Hellstern, K., Hoeflin, D.: Detection of DNS Anomalies using Flow Data Analysis. In: Global
Telecommunications Conference, 2006. GLOBECOM'06. IEEE. pp. 1–6. IEEE (2006).
[4]. P. Bacher, T. Holz, M. Kotter, and G. WICH-ERSKI, ―Know your enemy: Tracking botnets, 2005,‖ URL http://www.honeynet.org/
papers/bots, vol. 4, pp. 24–33.
Books:
[5]. H. Choi, H. Lee, and H. Kim, ―Botgad: detecting botnets by capturing group activities in network traffic,‖ in Proceedings of the
Fourth International ICST Conference on COMmunication System software and middleware. ACM, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fundamentals and Applications of IoT |
Country | : | India |
Authors | : | V.Archana || S.Vinodhini |
Abstract:The huge network of devices connected to the Internet, including smart phones and tablets and almost anything with a sensor on it- cars, machines in production plants, jet engines, wearable devices, and more. These "things" collect and exchange data.IoT cuts diagonally different application domain verticals ranging from civilian to security sectors. These domains include agriculture, space, healthcare, manufacturing, construction, water, and mining, which are presently transitioning their bequest infrastructure to support IoT.
The Internet of Things refers to the ever-growing network of physical objects that mark an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. Thermostats, cars, lights, refrigerators, and more appliances can all be linked to the IoT. Therefore, in this paper we learn the essentials of this promising technology..
Keywords: Thermostats, smart phones, tablets, healthcare, mining...
[1]. Kosmatos, E.A., Tselikas, N.D. and Boucouvalas, A.C. (2011) Integrating RFIDs and Smart Objects into a Unified Internet of
Things Architecture. Advances in Internet of Things: Scientific Research, 1, 5-12.
[2]. Aggarwal, R. and Lal Das, M. (2012) RFID Security in the Context of "Internet of Things". First International Conference on
Security of Internet of Things, Kerala, 17-19 August 2012.
[3]. Biddlecombe, E. (2009) UN Predicts "Internet of Things". Retrieved July 6.
[4]. Reinhardt, A. (2004) A Machine-to-Machine Internet of Things.
[5]. Higgins, K.T. (2015). Working with the next generation of plant pros. Food Processing [Online]. Retrieved July 31, 2015
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Sensor Networks Overview and Study of Various Applications and Environmental Factors in WSNs |
Country | : | India |
Authors | : | Mr.S.Nithyanandh || Dr.V.Jaiganesh |
Abstract: In recent years an efficient design of a Wireless Sensor Network has become a leading area of research. A Sensor is a device that responds and detects some type of input from both the physical or environmental conditions, such as pressure, heat, light, etc. The output of the sensor is generally an electrical signal that is transmitted to a controller for further processing. A Wireless sensor network can be defined as a network of devices that can communicate the information gathered from a monitored field through wireless links. The data is forwarded through multiple nodes, and with a gateway, the data is connected to other networks like wireless Ethernet. WSN is a wireless network that consists of base stations and numbers of nodes (wireless sensors).These networks are used to monitor physical or environmental conditions like sound, pressure, temperature and co-operatively pass data through the network to a main location. Wireless sensor network refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location.
Keywords: WSN - Wireless Sensor Networks, Ethernet, Applications
[1]. M.A. Matin, Institut Teknologi Brunei, Brunei Darussalam
[2]. M.M. Islam, North South University, Dhaka, Bangladesh
[3]. B. Paul, M. A. Matin," Optimal Geometrical Sink Location Estimation for Two Tiered Wireless Sensor Networks" IET Wireless
Sensor Systems, vol.1, no.2, pp.74-84, June 2011,doi: 10.1049/iet-wss.2010.0073, IET UK.
[4]. Fabbri, F.; Buratti, C.; Verdone, R.; Riihij¨arvi, J.; M¨ah¨onen, P. Area Throughput and Energy Consumption for Clustered Wireless
Sensor Networks. In Proceedings of IEEE WCNC 2009, Budapest, Hungary, 2009
[5]. J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a survey, IEEE Wireless Communications (2004).
[6]. K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, Elsevier Journal of Ad Hoc Networks 3 (3)
(2005) 325–349.