Journal of Wireless Communications
Latest Publications


TOTAL DOCUMENTS

8
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By Lazarus Scientific Publishing

2377-3308

2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Palak Aggarwal ◽  
Santosh Kumar ◽  
Neha Garg ◽  
Sumeshwar Singh

Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. These issues are interrelated because of limited energy there are some restrictions on implementation of security. Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. It becomes necessary to identify such attack for secure routing of data in WSN. To detect this attack, trust mechanism has been proven as a successful technique. In this mechanism, each node verifies the trustworthiness of its neighbor node before packet transmission so that packets can only be transmitted to trustworthy nodes. But there is a problem of False Alarm with such trust-aware scheme. False alarm occurs when a good node’s trust value goes down due to natural packet dropping and being eliminated from the routing paths. This wastes network’s resources that further shortens network lifetime. In this paper, we have proposed a system for identification and recovery of false alarms (IRFA) which is the optimization of existing trust based system. But security solution needs to be energy efficient due to scarcity of energy resources in WSN. To provide energy efficiency, we have implemented proposed IRFA system in cluster based environment which detects insider packet drop attackers in an energy efficient manner. We have conducted OMNET++ simulation and results demonstrate that the proposed system performance is better than existing trust-based system in terms of packet delivery rate and energy efficiency which improves network lifetime.


2017 ◽  
Vol 2 (2) ◽  
Author(s):  
Niranjan Panigrahi ◽  
Pabitra Mohan Khilar

Wireless Sensor Networks (WSNs)  have received considerable attention in recent years because of its broad area of applications. In the same breadth, it also faces many challenges. Time synchronization is one of those fundamental challenges faced by WSN being a distributed system. Several approaches have been proposed in the last decade for time synchronization in WSNs. Recently, Consensus Time Synchronization (CTS) approaches are gaining popularity due its computational lightness, robustness and distributed nature. Though a rich set of CTS algorithms are proposed, their energy consumption has so far not been studied. Apart from synchronization precision, energy consumption should also be considered meticulously for time synchronization algorithms in energy-constraint WSNs. In this paper, a thorough energy consumption analysis is presented for some recent state-of-the-art CTS algorithms for WSN and tested by simulation. The simulation results will help in selecting an appropriate CTS algorithm that meets the requirements of synchronization accuracy and energy consumption for a specific WSN application.


2017 ◽  
Vol 2 (2) ◽  
Author(s):  
Hartati Hartati ◽  
Fitri Maya Puspita ◽  
Indrawati Indrawati

Along with the changing times, the internet is becoming essential for everyday life. As the internet service providers, ISPs are required to provide a good service so as to give satisfaction to consumers at a low price. However, ISPs are expected to not only take into account customer satisfaction, but also take into account the advantages gained by considering all the factors that exist. Therefore, ISPs are given the option of pricing schemes, namely flat fee, usage-based, and two part tariff pricing schemes to be applied to the utility function as a function of bandwidth decreases with increasing bandwidth to maximize the benefits ISPs with regard to the level of user satisfaction. This study analyzed the two types of customers, namely homogeneous and heterogeneous consumers. Consumers are divided into heterogeneous consumer of willingness to pay (high end and low end) and with different consumption levels (high demand and low demand).In the case of consumers with homogeneous and heterogeneous consumer of willingness to pay (high end and low end), optimal pricing scheme is obtained if the ISP uses a flat fee and a two-part tariff schemes. As for heterogeneous consumers with different consumption levels (high demand and low demand), the scheme of two part tariff is the optimal scheme to generate maximum profits.


2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Saurabh Mishra ◽  
Sandip Vijay

Wireless AdHoc and sensor networks are very broadly used in many remote applications. AdHoc networks still have problems in conveying data from one node to other node. This problem further increases with the mobile nodes. Now a days different routing algorithms are being developed for mobile wireless AdHoc networks. In this paper, some of them are discussed. Mobile Ad hoc networks and Mobile Wireless Sensor Networks are similar to each other as both depend on hop-to-hop routing. So, protocols developed for Mobile ad-hoc networks are also used in many Mobile sensor applications. In this paper Angle based DSR is discussed, which is developed for Mobile AdHoc networks or mobile Wireless Sensor Networks and derived from changes done in DSR, which was developed for MANETs. Moto of this paper is to give an idea that other protocols which were developed for MANETs can be completely used in Mobile WSNs, by having angle-based mechanism, as described in ADSR.


2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Mohamed Otman Twati ◽  
Abubaker B. Otman

In this paper, a modified approach for output power calculations of the nitrogen laser system is reported. The power calculations is based on the distributed parameter model of the Blumlein-line circuit along with the decoupling approach of the laser rate equation from the electrical circuit equations. The general laser power assumption is considered in calculating the output optical power. The effect of the laser gap inductance on both the electrical and optical power waveforms is simulated and discussed. The theoretical work presented here is quite general and could be applied to many other fast discharges laser systems, such as CO2 and copper vapor lasers.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Muhammad Aamir Nadeem

Cloud Computing is a recently emerged paradigm, for sure out of infancy but yet not matured, is aiming at provisioning of computing resources in most efficient and economical way. Virtualization is the key technique behind Cloud Computing. It adopts Service Oriented Architecture which enables its clients to transform their requirements problems into services thus benefited by the solution provided by the Cloud. Besides provisioning of computing and storage resources, it expanded the traditional threat environment. The vulnerabilities and threats to Cloud are the issues which if successfully overcome would make Cloud a digital fort for its users. This paper surveys the weaknesses in Cloud architecture, internet protocols, operating system and application software, and in crypto system. It also identifies the challenges related to Cloud security and counter measures to resolve those issues.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Vishal Choudhary ◽  
Sunil Taruna

Key set up and distribution in sensor network is a complex task due to inherent limitations in sensor networks. For reducing the “communication and computation overhead” we proposed that the sensor network is partitioned into different zones. Each zone has a separate intrusion detection system (IDS) and key distribution center (KDC).IDS can detect the activity in its area and communicate with its KDC. KDC is controlled by the base station. Our main concern is that how to make a secure link in between KDC to sensor nodes and KDC to the Base station. Here we will try to reduce the computation and communication overhead of the already overloaded base station by separating the intrusion detection work of the base station with a separate entity in each zone.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Stella Brach ◽  
Giovanni Caruso ◽  
Giuseppe Vairo

The field of energy harvesting experienced a constant growth in the last years, due to the possibility of developing standing-alone wireless portable devices with extended life. In this context, piezoelectric materials appear to be particularly effective for the development of harvesters able to scavenge energy from ambient vibrations. In this paper a piezoactuated cantilever beam used for energy harvesting purposes is considered, extracting energy from a vibration source applied at the clamped boundary. The piezoelectric dimensions and position are optimized in order to maximize the coupling on the vibration modes of interest. An electric circuit containing a resistor and an inductor, connected to the piezoelectric electrodes, is optimized, for extracting the maximum electric power for any frequency of the vibration source, accounting for several vibration modes of the structure. The inductance is used to compensate the presence of a mistuning between the vibration source and the cantilever resonance frequencies. Proposed analysis shows that a single inductance is much effective when the harvester can be treated essentially as a single-degree-of-freedom structure. For harvesters with multiple degrees-of-freedom a single inductance can perform only a trade-off compensation of the mistuning between the various modes.


Sign in / Sign up

Export Citation Format

Share Document