

Taking Binary Error Rate into Account to Improve OLSR Protocol |
Pages: 276-285 (10) | [Full Text] PDF (398 KB) |
T Yelemou, P Meseure, A Poussard |
Polytechnic University of Bobo-Dioulasso, Burkina FasoUniversity of Poitiers, XLIM-SIC CNRS Lab, France |
Abstract - This paper presents BER-OLSR, an enhanced OLSR protocol. We modify OLSR standard route choice and Multi-Point Relays (MPR) selection processes. Particularly, our new protocol takes into account Bit Error Rate (BER) of links during MPR selection and routing table calculation. MPR set of a node is populated so that access to each 2-hop-neighbor is ensured by the best path in terms of BER. For routing table calculation, lowest BER is privileged over lowest number of hops. Performances of this protocol are evaluated by simulation with realistic propagation and mobility models. We show that this new approach of OLSR routing protocol provides better packet delivery ratio and delay than the original OLSR algorithm, even in unfavorable conditions such as mobility or several interfering communications. |
Index Terms - Wireless Networks, Routing Algorithm, Quality of Service, Binary Error Rate, OLSR |
C itation - T Yelemou, P Meseure, A Poussard. "Taking Binary Error Rate into Account to Improve OLSR Protocol." International Journal of Computer Networks and Communications Security 4, no. 10 (2016): 276-285. |
SAT: Simulated Annealing and Tabu Search Based Routing Algorithm for Wireless Sensor Networks |
Pages: 286-293 (8) | [Full Text] PDF (484 KB) |
R Mohammadi, HB Noghabi |
Department of Electrical, Computer and IT Engineering, Zanjan Branch, Islamic Azad University, Zanjan, Iran |
Abstract - Wireless sensor networks that formed by gathering a large number of small sensor nodes are used in various fields. Choosing a suitable route for the transmission of data from the source to the destination can be effective in reducing energy consumption. There are different algorithms for routing in wireless sensor networks. But using an algorithm that helps us to choose a less power consuming path is very important. In this paper, we propose a simulated annealing based routing algorithm (SAT) to determine an optimal path from the source to a destination in wireless sensor networks. Creating neighbor paths is performed with the help of tabu search algorithm. Simulation for various networks is done with different number of nodes in which the sensor nodes are spread with balance and randomly. The results show a reduction in energy consumption and improvements of average length of distance in transferring information, in comparison to tabu search algorithm. |
Index Terms - Wireless Sensor Network, Simulated Annealing (SA),Energy Consumption, Routing, Meta Heuristic Algorithms |
C itation - R Mohammadi, HB Noghabi. "SAT: Simulated Annealing and Tabu Search Based Routing Algorithm for Wireless Sensor Networks." International Journal of Computer Networks and Communications Security 4, no. 10 (2016): 286-293. |
A Comprehensive Approach to Security Requirements Engineering |
Pages: 294-303 (10) | [Full Text] PDF (492 KB) |
I Maskani, J Boutahar, S Elghazi |
LISER Laboratory, ENSEM, Hassan II University, Casablanca, MoroccoSystems, architectures and networks Team, EHTP, Casablanca, Morocco |
Abstract - Softwares security depends greatly on how a system was designed, so its very important to capture security requirements at the requirements engineering phase. Previous research proposes different approaches, but each is looking at the same problem from a different perspective such as the user, the threat, or the goal perspective. This creates huge gaps between them in terms of the used terminology and the steps followed to obtain security requirements. This research aims to define an approach as comprehensive as possible, incorporating the strengths and best practices found in existing approaches, and filling the gaps between them. To achieve that, relevant literature reviews were studied and primary approaches were compared to find their common and divergent traits. To guarantee comprehensiveness, a documented comparison process was followed. The outline of our approach was derived from this comparison. As a result, our approach reconciles different perspectives to security requirements engineering by including: the identification of stakeholders, asset and goals, and tracing them later to the elicited requirements, performing risk assessment in conformity with standards and performing requirements validation. It also includes the use of modeling artifacts to describe threats, risks or requirements, and defines a common terminology. |
Index Terms - Security Requirements, Requirements Engineering, Security Standards, Comparison, Risk Analysis |
C itation - I Maskani, J Boutahar, S Elghazi. "A Comprehensive Approach to Security Requirements Engineering ." International Journal of Computer Networks and Communications Security 4, no. 10 (2016): 294-303. |