

Different Aspects of Localization Problem for Wireless Sensor Networks: A Review |
Pages: 130-140 (11) | [Full Text] PDF (598 KB) |
M Farrag, M Abo-Zahhad, MM Doss, JV Fayez |
Department of Electrical and Electronics, Faculty of Engineering, Assiut University, Assiut, Egypt |
Abstract - This paper describes the wireless sensor networks, which is widely used in the last few decades. The hardware architecture of sensor node as a construction unit for WSN is illustrated with sensor applications. The localization process and its challenges are mentioned. A comparison between algorithms and techniques for sensor localization is presented. The factors that affect design issues including different topologies, mobility matter of sensor nodes, security issues, and finally future work and new trends for wireless sensor network localization. |
Index Terms - Wireless Sensor Networks, Localization, Mobility, Security |
C itation - M Farrag, M Abo-Zahhad, MM Doss, JV Fayez. "Different Aspects of Localization Problem for Wireless Sensor Networks: A Review." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 130-140. |
Contribution to Improving the Treatment of CDR in Development Countries |
Pages: 141-145 (5) | [Full Text] PDF (242 KB) |
S NDIAYE, LT YELOME, N KAG-TEUBE, A RAIMY, SM FARSSI, S OUYA |
Cheikh Anta Diop University, Polytechnic High School, Dakar, Senegal |
Abstract - Traffic is one of the most important values in the telecommunications sector. Unfortunately, most of the part of that value is beyond the control of the International Telecommunication Union (ITU) and the countries in development while on its mastery depend the accuracy and the relevance of the sector development policies. Today, it is clear that States, through the regulatory bodies, are focused on the statements made by telecommunication operators to issue invoices at the end of each month. The regulator has no visibility on incoming calls or calls made by the rest of the world to a particular country. For better management of this situation, we propose through this article a control system for regulators to have visibility on the incoming traffic. The system allows then, the State to be able to collect its share thats paid by the foreign operators and not by the local one. |
Index Terms - Call Details record (CDR), Pricing, Traffic, Visibility, Volumetry |
C itation - S NDIAYE, LT YELOME, N KAG-TEUBE, A RAIMY, SM FARSSI, S OUYA. "Contribution to Improving the Treatment of CDR in Development Countries." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 141-145. |
Energy Aware Congestion Adaptive Randomized Routing in MANETs with Sleep Mode |
Pages: 146-152 (7) | [Full Text] PDF (315 KB) |
JK SINGH, P CHAKRABARTI, M KALLA |
Assistant Professor, Department of CSE, Sir Padampat Singhania University, Udaipur (Raj.)Professor and Head, Department of CSE, Sir Padampat Singhania University, Udaipur (Raj.) |
Abstract - MANETs are typically limited in resources like available wireless transmission bandwidth, available node battery power etc which makes the routing complex compare to the normal infrastructure based wireless network. Node mobility also makes the routing decision further hard. A packet drop in such network can be due to: Node Mobility, Congestion on network or node failure (energy drain or hardware failure). The MANETs nodes are typically running on battery power and energy issue is one major concern in MANET operation. If a nodes battery power drains completely, the node goes to power off state and thus the connectivity of the network is affected and network life time is reduced. The other concern in MANETs is Congestion. When a portion of a network has high incoming load then its capacity, packets start to drop and experience higher delay than normal, which reduces the throughput of the network and negatively affects the QoS parameters of the network. Congestion also causes low utilization of the network resources. In congestion, with each packet drop the energy used in transmission and reception is wasted. Thus higher energy efficiency can only be achieved, if energy issue and congestion issue are addressed together. This paper proposes a new Energy aware congestion adaptive randomized routing algorithm (EACAR-AODV) which addresses both the energy and congestion issue to achieve higher energy efficiency and QoS parameters. The proposed method is based on AODV and applies energy policy to include only high energy node, Random routing packet drop policy to control the RREQ flood to reduce energy consumption and congestion during path setup, and applies congestion policy based on current queue size of the node to find an alternate non-congested path. The proposed protocol is implemented in NS2 network simulator and compared with traditional AODV. The results show an improvement in both QoS parameters and Energy efficiency without introducing significant overhead. |
Index Terms - Congestion Adaptive, Energy Aware, EACAR-AODV, Sleep Mode, Randomized MANET Routing |
C itation - JK SINGH, P CHAKRABARTI, M KALLA. "Energy Aware Congestion Adaptive Randomized Routing in MANETs with Sleep Mode." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 146-152. |
Contribution to Improving the Monitoring of Distribution and Consumption of Final Energy (Water, Electricity, Gas) in Developing Countries |
Pages: 153-158 (6) | [Full Text] PDF (441 KB) |
LT YELOME, S NDIAYE, N KAG-TEUBE, SM FARSSI, A RAIMY, S OUYA |
Cheikh Anta Diop University, Polytechnic High School, Dakar, Senegal |
Abstract - If electricity, water and gas production has almost doubled since the 1970s, the share of developing countries has continued to contract. Public operators of final energy distribution in developing countries face a lot of problems such as measuring of consumption, bill collection, etc. The main objective of this paper is to propose a model based on recent measurement technologies (Internet of Things, big data, cloud computing, etc.) for energy distribution and consumption monitoring in developing countries. Our approach will help facilitate access to the final energy to households and businesses, the real-time measuring of consumption, collection of invoice amounts, detection and alert on failures, etc. This approach will also allow operators to increase their production and distribution capacity in developing countries. The different results obtained during simulations show the relevance of our approach. |
Index Terms - Big Data Analytic, Cloud Computing, Development, Energy, Internet of things (IoT), Real Time, Smart Metering |
C itation - LT YELOME, S NDIAYE, N KAG-TEUBE, SM FARSSI, A RAIMY, S OUYA. "Contribution to Improving the Monitoring of Distribution and Consumption of Final Energy (Water, Electricity, Gas) in Developing Countries." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 153-158. |
Secure Transmission of Underlay Cognitive Radio with Passive Eavesdropping |
Pages: 159-164 (6) | [Full Text] PDF (488 KB) |
A Al-nahari, M Al-jamali, M. AlKhawlani |
Department of Electrical Engineering, Ibb University, Ibb, YemenDepartment of Electronics Engineering, University of Science and Technology, Sana a, Yemen |
Abstract - The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesdropper, whose channel state information (CSI) is unknown at the transmitter side. Two beamforming techniques are proposed; transmit beamforming (BF) and beamforming with jamming (BFJ). We investigate the impact of using artificial jamming (AJ) signal in improving the secrecy performance of the SU in underlay CRNs, where the AJ noise signal is used to confuse the eavesdroppers channel. Two power constraints are considered in the system; transmit power constraint and the interference power threshold at the primary user (PU). The performance of the proposed techniques is analyzed in terms of the achievable secrecy rate and the secrecy outage probability. |
Index Terms - CRNs, secrecy rate, artificial jamming, underlay cognitive radio, eavesdropping |
C itation - A Al-nahari, M Al-jamali, M. AlKhawlani. "Secure Transmission of Underlay Cognitive Radio with Passive Eavesdropping." International Journal of Computer Networks and Communications Security 4, no. 5 (2016): 159-164. |