scholarly journals Secure and Opportunistic Routing in WSN using Associative Secure Optimized Routing Algorithm

2020 ◽  
Vol 8 (5) ◽  
pp. 3826-3834

Under wireless communication domain optimized routing for wireless networks is the trending scenario for research. Various older schemes faces performance issues such as consistency, alongside ensuring routing security which significantly causes performance degradation. Although the current mechanisms designed for routing are low-cost and precise positioning is also not essential but security still requires emphasis to be given during design. In this paper a secure and optimized routing technique is proposed for WSN mentioned as Associative Secure Optimized Routing (ASOR) Algorithm. Optimized data progression is the prime focus of ASOR alongside ensuring security to it. ASOR operates in two phases, in first phase it identifies and club the associative nodes based on the defined indulgent constant(IC) based on explicit trust, strength of link and link_quality parameters. Explicit trust and strength of link are directly measurable however to measure quality, survival time of link and the incurred delay are taken into consideration. Secondly the selection of optimized nodes using proposed ASOR is carried out through defined aptness function(AF) which is dependent on explicit_trust(ET), strength_of_link(SOL), node_quality(NQ) and distance. Proposed associative secure optimized routing scheme’s performance is evaluated based on metrics for adhoc sensor network of 100 dynamic nodes in the presence of worm_hole and black_hole attacks. Comparatively higher throughput and detection_rate whereas lower distance and delay are indicated by ASOR, which are relatively better than opposing methods. ASOR shows significantly high detection_rate and throughput as 55.7 and 44.1 respectively and comparatively less delay and distance as 13 and 168.2 which are significantly better than opposing methods. ASOR can be effectively used in WSN for real time application such as in agriculture, industries etc

2013 ◽  
Vol 2013 ◽  
pp. 1-16 ◽  
Author(s):  
Ved Prakash Bhardwaj ◽  
Nitin

Interconnection Network (IN) is a key element for all parallel processing applications. Multistage Interconnection Network (MIN) is an efficient IN for these applications, as it has the quality of excellent performance at low cost with high reliability. MINs are effective medium for message broadcasting. Doing the same task in faulty situations is a critical challenge. In this paper, we have presented a new Fault Tolerant Interconnection Network named as Irregular Advance Omega Network (IAON); also we have presented its routing algorithm. IAON is the modified form of Advance Omega Network. The proposed MIN can endure multiple faults and provides a suitable path between every source to every destination. We have examined the fault tolerance capacity of IAON and compared its performance with other existing MINs. In order to check the performance of proposed MIN, message broadcasting was performed in three conditions as follows: (1) when network was fault free; (2) when network was Single Switch Faulty in every stage; (3) when network was Double Switch Faulty in every stage. Results showed that IAON performed better than the earlier proposed MINs.


2019 ◽  
Vol 9 (01) ◽  
pp. 47-54
Author(s):  
Rabbai San Arif ◽  
Yuli Fitrisia ◽  
Agus Urip Ari Wibowo

Voice over Internet Protocol (VoIP) is a telecommunications technology that is able to pass the communication service in Internet Protocol networks so as to allow communicating between users in an IP network. However VoIP technology still has weakness in the Quality of Service (QoS). VOPI weaknesses is affected by the selection of the physical servers used. In this research, VoIP is configured on Linux operating system with Asterisk as VoIP application server and integrated on a Raspberry Pi by using wired and wireless network as the transmission medium. Because of depletion of IPv4 capacity that can be used on the network, it needs to be applied to VoIP system using the IPv6 network protocol with supports devices. The test results by using a wired transmission medium that has obtained are the average delay is 117.851 ms, jitter is 5.796 ms, packet loss is 0.38%, throughput is 962.861 kbps, 8.33% of CPU usage and 59.33% of memory usage. The analysis shows that the wired transmission media is better than the wireless transmission media and wireless-wired.


2017 ◽  
Vol 1 (2) ◽  
pp. 34
Author(s):  
Zulkarnain Zulkarnain ◽  
Nadjadji Anwar

The Research Center and Development of Water (Puslitbang) is currently developing the Submerged Breakwater in shallow sea area (PEGAR). The author is interested to examine the material that easily obtained in the field of RCP concrete cylinder. The observation is how it to be ability in function as submerged breakwater an go green and low cost. The physical model of wave transmission test is how the response to the structure in ability to damping of wave as the breakwater function. In this research breakwater used is submerged breakwater type by using concrete cylinder (buis beton). The purpose from this research is to know how the response of breakwater structure to the waves through it, with some variation of the structure by creating a structure with three variations of the arrangement and freeboard that is the relative depth with the crest width is constant. The wave generated test in this study is using regular waves in wave flume at FTSP Civil Engineering Department of Institute Technology Ten November. From the analysis of the effect of the installation of submerged breakwater by using concrete cylinder to the wave damping value, it can be concluded that the factors that are very influential is the freeboard and the composition of concrete cylinder. Scenario A (rigid vertical massive) is capable of producing the smallest value of kt is 0.33. As for scenario B (rigid horyzontal massive) with a damping value of 0.5, while the scenario C (rigid permeable) is only able to produce kt value of 0.71. Scenario A is better than scenario B and C Because the position of arrangement of A is very good used to damp wave in small or big freeboard conditions.


Author(s):  
Keyur Mahant ◽  
Hiren Mewada ◽  
Amit Patel ◽  
Alpesh Vala ◽  
Jitendra Chaudhari

Aim: In this article, wideband substrate integrated waveguide (SIW) and rectangular waveguide (RWG) transition operating in Ka-band is proposed Objective: In this article, wideband substrate integrated waveguide (SIW) and rectangular waveguide (RWG) transition operating in Ka-band is proposed. Method: Coupling patch etched on the SIW cavity to couple the electromagnetic energy from SIW to RWG. Moreover, metasurface is introduced into the radiating patch to enhance bandwidth. To verify the functionality of the proposed structure back to back transition is designed and fabricated on a single layer substrate using standard printed circuit board (PCB) fabrication technology. Results: Measured results matches with the simulation results, measured insertion loss is less than 1.2 dB and return loss is better than 3 dB for the frequency range of 28.8 to 36.3 GHz. By fabricating transition with 35 SRRs bandwidth of the proposed transition can be improved. Conclusion: The proposed transition has advantages like compact in size, easy to fabricate, low cost and wide bandwidth. Proposed structure is a good candidate for millimeter wave circuits and systems.


1996 ◽  
Vol 118 (3) ◽  
pp. 439-443 ◽  
Author(s):  
Chuen-Huei Liou ◽  
Hsiang Hsi Lin ◽  
F. B. Oswald ◽  
D. P. Townsend

This paper presents a computer simulation showing how the gear contact ratio affects the dynamic load on a spur gear transmission. The contact ratio can be affected by the tooth addendum, the pressure angle, the tooth size (diametral pitch), and the center distance. The analysis presented in this paper was performed by using the NASA gear dynamics code DANST. In the analysis, the contact ratio was varied over the range 1.20 to 2.40 by changing the length of the tooth addendum. In order to simplify the analysis, other parameters related to contact ratio were held constant. The contact ratio was found to have a significant influence on gear dynamics. Over a wide range of operating speeds, a contact ratio close to 2.0 minimized dynamic load. For low-contact-ratio gears (contact ratio less than two), increasing the contact ratio reduced gear dynamic load. For high-contact-ratio gears (contact ratio equal to or greater than 2.0), the selection of contact ratio should take into consideration the intended operating speeds. In general, high-contact-ratio gears minimized dynamic load better than low-contact-ratio gears.


Sensors ◽  
2019 ◽  
Vol 19 (23) ◽  
pp. 5209 ◽  
Author(s):  
Andrea Gonzalez-Rodriguez ◽  
Jose L. Ramon ◽  
Vicente Morell ◽  
Gabriel J. Garcia ◽  
Jorge Pomares ◽  
...  

The main goal of this study is to evaluate how to optimally select the best vibrotactile pattern to be used in a closed loop control of upper limb myoelectric prostheses as a feedback of the exerted force. To that end, we assessed both the selection of actuation patterns and the effects of the selection of frequency and amplitude parameters to discriminate between different feedback levels. A single vibrotactile actuator has been used to deliver the vibrations to subjects participating in the experiments. The results show no difference between pattern shapes in terms of feedback perception. Similarly, changes in amplitude level do not reflect significant improvement compared to changes in frequency. However, decreasing the number of feedback levels increases the accuracy of feedback perception and subject-specific variations are high for particular participants, showing that a fine-tuning of the parameters is necessary in a real-time application to upper limb prosthetics. In future works, the effects of training, location, and number of actuators will be assessed. This optimized selection will be tested in a real-time proportional myocontrol of a prosthetic hand.


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 917
Author(s):  
Ickjin Son ◽  
Grace Firsta Lukman ◽  
Mazahir Hussain Shah ◽  
Kwang-Il Jeong ◽  
Jin-Woo Ahn

Switched reluctance motors (SRMs) are simple in structure, easy to manufacture, magnet-less, brushless, and highly robust compared to other AC motors which makes them a good option for applications that operate in harsh environment. However, the motor has non-linear magnetic characteristics, and it comes with various pole-phase combinations and circuit topologies that causes many difficulties in deciding on which type to choose. In this paper, the viability of SRM as a low-cost, rugged machine for vehicle radiator cooling fan is considered. First, necessary design considerations are presented, then three commonly use types of SRM are analyzed: A 3-phase 6/4, 3-phase 12/8, and a 4-phase 8/6 to find their static and dynamic characteristics so the most suitable type can be selected. Simulation results show that the 8/6 SRM produces the highest efficiency with less phase current which reduces the converter burden. However, with asymmetric half bridge converter, eight power switches are required for 8/6 SRM and thus put a burden on the overall drive cost. As a solution, the Miller converter with only six switches for four phase SRM. To verify the proposed idea, the 8/6 SRM was manufactured and tested. The results show that Miller converter can be used for the proposed SRM with slightly reduced efficiency at 80.4%.


Smart Cities ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 919-937
Author(s):  
Nikos Papadakis ◽  
Nikos Koukoulas ◽  
Ioannis Christakis ◽  
Ilias Stavrakas ◽  
Dionisis Kandris

The risk of theft of goods is certainly an important source of negative influence in human psychology. This article focuses on the development of a scheme that, despite its low cost, acts as a smart antitheft system that achieves small property detection. Specifically, an Internet of Things (IoT)-based participatory platform was developed in order to allow asset-tracking tasks to be crowd-sourced to a community. Stolen objects are traced by using a prototype Bluetooth Low Energy (BLE)-based system, which sends signals, thus becoming a beacon. Once such an item (e.g., a bicycle) is stolen, the owner informs the authorities, which, in turn, broadcast an alert signal to activate the BLE sensor. To trace the asset with the antitheft tag, participants use their GPS-enabled smart phones to scan BLE tags through a specific smartphone client application and report the location of the asset to an operation center so that owners can locate their assets. A stolen item tracking simulator was created to support and optimize the aforementioned tracking process and to produce the best possible outcome, evaluating the impact of different parameters and strategies regarding the selection of how many and which users to activate when searching for a stolen item within a given area.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Sign in / Sign up

Export Citation Format

Share Document