International Journal of Computer Networks and Communications Security

Volume 4, Issue 5, May 2016

 

 

 

Different Aspects of Localization Problem for Wireless Sensor Networks: A Review

Pages: 130-140 (11) | [Full Text] PDF (598 KB)
M Farrag, M Abo-Zahhad, MM Doss, JV Fayez
Department of Electrical and Electronics, Faculty of Engineering, Assiut University, Assiut, Egypt

Abstract -
This paper describes the wireless sensor networks, which is widely used in the last few decades. The hardware architecture of sensor node as a construction unit for WSN is illustrated with sensor applications. The localization process and its challenges are mentioned. A comparison between algorithms and techniques for sensor localization is presented. The factors that affect design issues including different topologies, mobility matter of sensor nodes, security issues, and finally future work and new trends for wireless sensor network localization.
 
Index Terms - Wireless Sensor Networks, Localization, Mobility, Security

Citation - M Farrag, M Abo-Zahhad, MM Doss, JV Fayez. "Different Aspects of Localization Problem for Wireless Sensor Networks: A Review." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 130-140.

 

Contribution to Improving the Treatment of CDR in Development Countries

Pages: 141-145 (5) | [Full Text] PDF (242 KB)
S NDIAYE, LT YELOME, N KAG-TEUBE, A RAIMY, SM FARSSI, S OUYA
Cheikh Anta Diop University, Polytechnic High School, Dakar, Senegal

Abstract -
Traffic is one of the most important values in the telecommunications sector. Unfortunately, most of the part of that value is beyond the control of the International Telecommunication Union (ITU) and the countries in development while on its mastery depend the accuracy and the relevance of the sector development policies. Today, it is clear that States, through the regulatory bodies, are focused on the statements made by telecommunication operators to issue invoices at the end of each month. The regulator has no visibility on incoming calls or calls made by the rest of the world to a particular country. For better management of this situation, we propose through this article a control system for regulators to have visibility on the incoming traffic. The system allows then, the State to be able to collect its share thats paid by the foreign operators and not by the local one.
 
Index Terms - Call Details record (CDR), Pricing, Traffic, Visibility, Volumetry

Citation - S NDIAYE, LT YELOME, N KAG-TEUBE, A RAIMY, SM FARSSI, S OUYA. "Contribution to Improving the Treatment of CDR in Development Countries." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 141-145.

 

Energy Aware Congestion Adaptive Randomized Routing in MANETs with Sleep Mode

Pages: 146-152 (7) | [Full Text] PDF (315 KB)
JK SINGH, P CHAKRABARTI, M KALLA
Assistant Professor, Department of CSE, Sir Padampat Singhania University, Udaipur (Raj.)
Professor and Head, Department of CSE, Sir Padampat Singhania University, Udaipur (Raj.)

Abstract -
MANETs are typically limited in resources like available wireless transmission bandwidth, available node battery power etc which makes the routing complex compare to the normal infrastructure based wireless network. Node mobility also makes the routing decision further hard. A packet drop in such network can be due to: Node Mobility, Congestion on network or node failure (energy drain or hardware failure). The MANETs nodes are typically running on battery power and energy issue is one major concern in MANET operation. If a nodes battery power drains completely, the node goes to power off state and thus the connectivity of the network is affected and network life time is reduced. The other concern in MANETs is Congestion. When a portion of a network has high incoming load then its capacity, packets start to drop and experience higher delay than normal, which reduces the throughput of the network and negatively affects the QoS parameters of the network. Congestion also causes low utilization of the network resources. In congestion, with each packet drop the energy used in transmission and reception is wasted. Thus higher energy efficiency can only be achieved, if energy issue and congestion issue are addressed together. This paper proposes a new Energy aware congestion adaptive randomized routing algorithm (EACAR-AODV) which addresses both the energy and congestion issue to achieve higher energy efficiency and QoS parameters. The proposed method is based on AODV and applies energy policy to include only high energy node, Random routing packet drop policy to control the RREQ flood to reduce energy consumption and congestion during path setup, and applies congestion policy based on current queue size of the node to find an alternate non-congested path. The proposed protocol is implemented in NS2 network simulator and compared with traditional AODV. The results show an improvement in both QoS parameters and Energy efficiency without introducing significant overhead.
 
Index Terms - Congestion Adaptive, Energy Aware, EACAR-AODV, Sleep Mode, Randomized MANET Routing

Citation - JK SINGH, P CHAKRABARTI, M KALLA. "Energy Aware Congestion Adaptive Randomized Routing in MANETs with Sleep Mode." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 146-152.

 

Contribution to Improving the Monitoring of Distribution and Consumption of Final Energy (Water, Electricity, Gas) in Developing Countries

Pages: 153-158 (6) | [Full Text] PDF (441 KB)
LT YELOME, S NDIAYE, N KAG-TEUBE, SM FARSSI, A RAIMY, S OUYA
Cheikh Anta Diop University, Polytechnic High School, Dakar, Senegal

Abstract -
If electricity, water and gas production has almost doubled since the 1970s, the share of developing countries has continued to contract. Public operators of final energy distribution in developing countries face a lot of problems such as measuring of consumption, bill collection, etc. The main objective of this paper is to propose a model based on recent measurement technologies (Internet of Things, big data, cloud computing, etc.) for energy distribution and consumption monitoring in developing countries. Our approach will help facilitate access to the final energy to households and businesses, the real-time measuring of consumption, collection of invoice amounts, detection and alert on failures, etc. This approach will also allow operators to increase their production and distribution capacity in developing countries. The different results obtained during simulations show the relevance of our approach.
 
Index Terms - Big Data Analytic, Cloud Computing, Development, Energy, Internet of things (IoT), Real Time, Smart Metering

Citation - LT YELOME, S NDIAYE, N KAG-TEUBE, SM FARSSI, A RAIMY, S OUYA. "Contribution to Improving the Monitoring of Distribution and Consumption of Final Energy (Water, Electricity, Gas) in Developing Countries." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 153-158.

 

Secure Transmission of Underlay Cognitive Radio with Passive Eavesdropping

Pages: 159-164 (6) | [Full Text] PDF (488 KB)
A Al-nahari, M Al-jamali, M. AlKhawlani
Department of Electrical Engineering, Ibb University, Ibb, Yemen
Department of Electronics Engineering, University of Science and Technology, Sana a, Yemen

Abstract -
The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesdropper, whose channel state information (CSI) is unknown at the transmitter side. Two beamforming techniques are proposed; transmit beamforming (BF) and beamforming with jamming (BFJ). We investigate the impact of using artificial jamming (AJ) signal in improving the secrecy performance of the SU in underlay CRNs, where the AJ noise signal is used to confuse the eavesdroppers channel. Two power constraints are considered in the system; transmit power constraint and the interference power threshold at the primary user (PU). The performance of the proposed techniques is analyzed in terms of the achievable secrecy rate and the secrecy outage probability.
 
Index Terms - CRNs, secrecy rate, artificial jamming, underlay cognitive radio, eavesdropping

Citation - A Al-nahari, M Al-jamali, M. AlKhawlani. "Secure Transmission of Underlay Cognitive Radio with Passive Eavesdropping." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 159-164.