Managing Resources for Futuristic Wireless Networks - Advances in Wireless Technologies and Telecommunication
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 12)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781522594932, 9781522594956

Author(s):  
Jhum Swain

A mobile ad hoc network (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the node partake in acting as both router and host and is in charge for accelerating packets to other nodes. This chapter discusses the various attacks on different layers and on various security protocols. So, designing a secure routing protocol is a main challenge in MANET. As we all know, this is a mobile ad hoc network so nodes in the network dynamically establish paths among each other so it is vulnerable to different kinds of threats. So, in this case, we need secured communication among the nodes present in the network.


Author(s):  
Puspanjali Mallik

The internet of things (IoT) fulfils abundant demands of present society by facilitating the services of cutting-edge technology in terms of smart home, smart healthcare, smart city, smart vehicles, and many more, which enables present day objects in our environment to have network communication and the capability to exchange data. These wide range of applications are collected, computed, and provided by thousands of IoT elements placed in open spaces. The highly interconnected heterogeneous structure faces new types of challenges from a security and privacy concern. Previously, security platforms were not so capable of handling these complex platforms due to different communication stacks and protocols. It seems to be of the utmost importance to keep concern about security issues relating to several attacks and vulnerabilities. The main motive of this chapter is to analyze the broad overview of security vulnerabilities and its counteractions. Generally, it discusses the major security techniques and protocols adopted by the IoT and analyzes the attacks against IoT devices.


Author(s):  
Muhammad Irfan ◽  
Ayaz Ahmad ◽  
Raheel Ahmed

Single carrier frequency division multiple access (SC-FDMA) is a promising uplink transmission technique that has the characteristic of low peak to average power ratio. The mobile terminal uplink transmission depends on the batteries with limited power budget. Moreover, the increasing number of mobile users needs to be accommodated in the limited available radio spectrum. Therefore, efficient resource allocation schemes are essential for optimizing the energy consumption and improving the spectrum efficiency. This chapter presents a comprehensive and systematic survey of resource allocation in SC-FDMA networks. The survey is carried out under two major categories that include centralized and distributed approaches. The schemes are also classified under various rubrics including optimization objectives and constraints considered, single-cell and multi-cell scenarios, solution types, and perfect/imperfect channel knowledge-based schemes. The advantages and limitations pertaining to these categories/rubrics have been highlighted, and directions for future research are identified.


Author(s):  
Daniel Minoli ◽  
Benedict Occhiogrosso

Cyber physical systems (CPSs) are software-intensive smart distributed systems that support physical components endowed with integrated computational capabilities. Tiered, often wireless, networks are typically used to collect or push the data generated or required by a distributed set of CPS-based devices. The edge-to-core traffic flows on the tiered networks can become overwhelming. Thus, appropriate traffic engineering (TE) algorithms are required to manage the flows, while at the same time meeting the delivery requirements in terms of latency, jitter, and packet loss. This chapter provides a basic overview of CPSs followed by a discussion of a newly developed TE method called ‘constrained average', where traffic is by design allowed to be delayed up to a specified, but small value epsilon, but with zero packet loss.


Author(s):  
Utkarsha Sumedh Pacharaney ◽  
Ranjan Bala Jain ◽  
Rajiv Kumar Gupta

The chapter focuses on minimizing the amount of wireless transmission in sensory data gathering for correlated data field monitoring in wireless sensor networks (WSN), which is a major source of power consumption. Compressive sensing (CS) is a new in-node compression technique that is economically used for data gathering in an energy-constrained WSN. Among existing CS-based routing, cluster-based methods offer the most transmission-efficient architecture. Most CS-based clustering methods randomly choose nodes to form clusters, neglecting the topology structure. A novel base station (BS)-assisted cluster, spatially correlated cluster using compressive sensing (SCC_CS), is proposed to reduce number of transmissions in and form the cluster by exploiting spatial correlation based on geographical proximity. The proposed BS-assisted clustering scheme follows hexagonal deployment strategy. In SCC_CS, cluster heads are solely involved in data gathering and transmitting CS measurements to BS, saving intra-cluster communication cost, and thus, network life increases as proved by simulation.


Author(s):  
Mamata Rath ◽  
Sushruta Mishra

Vehicular ad hoc networks (VANETs) have evolved as an invigorating network system and application domain in current communication technology. In smart city applications context, there are smart vehicles embedded with sensors and dynamically programmed IoT devices, which are to be managed and controlled energetically. Progressively, vehicles are being furnished with surrounded actuators, handling signals, and wireless communication abilities. This chapter focuses on the fact that this special network has opened various possible outcomes for intense and potential extraordinary applications on security, effectiveness, comfort, confidentiality effort, and interest while they are significantly vibrant. Irrespective of many challenges such as high frequency of topology change and link failure possibility, routing management in VANET has been successful in traffic scenario during vehicle-to-vehicle communication.


Author(s):  
Meena T. ◽  
Ravi Sankar Sangam

In recent days, the usage of drones was increased and extended to various domains such as surveillance, photography, military, rescue, etc. Drones are small flying computers with on-board sensors and camera with a limited battery and coverage area. Due to the limited coverage area, usage of standalone drones in the above-mentioned domains such as rescue and military is restrictive. Multi-drones with self-organizing network can help to solve the above discussed issues. Hence, this chapter presents an extensive review on drone networks in which the core areas such as coverage, connectivity, link establishment, etc. are discussed. Finally, this chapter concludes by leveraging the challenges in state-of-the-art technologies in drone networking.


Author(s):  
L. Naga Durgaprasad Reddy

This chapter researches in the area of software-defined networking. Software-defined networking was developed in an attempt to simplify networking and make it more secure. By separating the control plane (the controller)—which decides where packets are sent—from the data plane (the physical network)—which forwards traffic to its destination—the creators of SDN hoped to achieve scalability and agility in network management. The application layer (virtual services) is also separate. SDN increasingly uses elastic cloud architectures and dynamic resource allocation to achieve its infrastructure goals.


Author(s):  
Vaishali Vilas Sarbhukan ◽  
Lata Ragha

The mobility and scalability brought by wireless networks made it possible in many applications. In MANET, discovering the stable, secure, and reliable routes is a challenging research problem due to the open nature of wireless communications. In Zhexiong Wei Routing Trust scheme (ZWRT), Bayesian approach and Dempster Shafer theory is used to evaluate more realistic trust value. Mohamed et al proposed Establishing STAble and Reliable Routes (ESTAR) system in heterogeneous multihop wireless networks. The above existing methods failed to solve the complete problem of information loss in MANETs. There are several other reasons due to which the information may loss in MANETS, such as mobility and congestion of mobile nodes. Therefore, the novel Enhanced Trust-based Secure Routing (ETSR) scheme is presented to deliver stable, reliable, and secure data communication in MANETs. The simulation results demonstrate that ETSR routing protocol improve QoS performance as compared to state-of-the-art techniques.


Author(s):  
Archana Sharma

Truthful authentication with secure communication is necessary in location-based services to protect from various risks. The purpose of this research is to identify security risks in mobile transactions especially in location-based services like mobile banking. The factors need to be identified the reasons of customer distrust in mobile banking. In addition, the security issues with mobile banking systems and mobile devices are highlighted. The chapter finds which approach is more suitable and secure for mobile banking transaction between customer and bank. The research predominantly focuses upon customer trust, security issues, and transaction costs owing to different technology standards of mobile commerce. The first phase highlights the various location-based services in m-commerce, various technology standards, customer trust, and perceived risk, and further, at next level, it highlights the various problems associated mobile database and a comparative study of various replication protocols, transaction security issues, and LBS security challenges.


Sign in / Sign up

Export Citation Format

Share Document