International Journal of Computer Networks and Communications Security

Volume 5, Issue 5, May 2017

 

 

Comparing PSWF, Hermite Pulses For High Speed Communication Using N-PSM
 

Comparing PSWF, Hermite Pulses For High Speed Communication Using N-PSM

Pages: 90-95 (6) | [Full Text] PDF (497 KB)
P JADHAV, J GOMES
St. Francis Institute of Technology Mumbai, Department of Electronics and TelecommunicationN-PSM Technique, Transceiver, PSWF, Hermite, Correlation

Abstract -
Wireless technologies provide quick and easy access to information. Data rate/throughput is very important for multimedia communication. High-speed communication is recently achieved by using technologies such as UWB, OFDM etc. N-Dimensional Pulse Shape Modulation (N-PSM) is one of the modulation technique used to achieve high data rate based on the family of orthogonal pulses e.g. Prolate Spheroidal Wave Function (PSWF) and Hermite waveforms. Transceiver system based on N-PSM using PSWF and Hermite has been implemented in MATLAB and compared in this paper. Performance evaluation of the N-PSM is carried out over Additive White Gaussian Noise (AWGN) channel for different values of N to measure Bit Error Rate (BER). It has been found that a combination of PSWF and Hermite pulses can be used for high-speed modulation if these pulses are orthogonal to each other since both the types of pulses achieve same bit error rate over AWGN.
 
Index Terms - N-PSM Technique, Transceiver, PSWF, Hermite, Correlation

Citation - P JADHAV, J GOMES. "Comparing PSWF, Hermite Pulses For High Speed Communication Using N-PSM." International Journal of Computer Networks and Communications Security 5, no. 5 (2017): 90-95.

Security issues in Protocols of TCP/IP Model at Layers Level
 

Security issues in Protocols of TCP/IP Model at Layers Level

Pages: 96-104 (9) | [Full Text] PDF (607 KB)
AM Alotaibi, BF Alrashidi, S Naz, Z Parveen
University of Hail, Department of Computer Science, Hail, Saudi Arabia

Abstract -
It is widely recognized that data security has become of critical importance for most organizations. This paper gives an overview of the security issues in the Transmission Control Protocol (TCP)/Internet Protocol (IP) model, specifically the protocol of each layer. The paper defines the functionality of each layer in TCP/IP model within the popular protocol for each. Then it investigates each protocol attack by covering their purposes and how they work. Overall, the objective of this research is to conclude which layer and protocol have become the biggest issues in TCP/IP layers.
 
Index Terms - Network Security, TCP/IP Models, Security Threats, Data Protection, Internet Protocol, Flood

Citation - AM Alotaibi, BF Alrashidi, S Naz, Z Parveen. "Security issues in Protocols of TCP/IP Model at Layers Level." International Journal of Computer Networks and Communications Security 5, no. 5 (2017): 96-104.

Adaptive Scheme for Outliers Detection in Wireless Sensor Networks
 

Adaptive Scheme for Outliers Detection in Wireless Sensor Networks

Pages: 105-114 (10) | [Full Text] PDF (763 KB)
BO Yenke, M Aboubakar, C Titouna, AAA Ari, AM Gueroui
LASE Laboratory, University of Ngaoundere, CAMEROON
LI-PaRAD Laboratory, Universite Paris Saclay, University of Versailles Saintt-Quentin-en-Yvelines, FRANCE
Department of Computer Science, Faculty of Mathematics and Computer Science, University of Batna 2, ALGERIA
Department of Mathematics and Computer Science, Faculty of Science, University of Maroua, CAMEROON

Abstract -
Nowadays, Wireless Sensor Networks (WSNs) have become a way of information gathering and monitoring. These particular kinds of ad hoc networks find applications in various fields such as healthcare, army and environment, etc. However, WSNs are subjected to a number of faults, either due to the worst communication links, the hostile environment in which they are deployed or due to energy constraints. Thereby, to ensure the Quality of Service (QoS) in such networks, it is important that WSNs become capable of detecting and recovering erroneous data. In this way, many outlier detection techniques have been proposed. These techniques are based on information theory, statistics and other techniques. The Nearest Neighbour Search is one of these techniques. It uses the Euclidean or Mahalanobis distance for detecting outliers in a given sensor networks. In this paper, we proposed a distributed adaptive approach for the detection of outliers. The proposed approach is based on Euclidean or Mahalanobis distance, depending on the size of the data collected. Extensive experiments have been conducted and the results confirmed the effectiveness of the proposal.
 
Index Terms - Wireless Sensor Networks, Outlier Detection, Mahalanobis Distance, Eucidean Distance, Fault Tolerance

Citation - BO Yenke, M Aboubakar, C Titouna, AAA Ari, AM Gueroui. "Adaptive Scheme for Outliers Detection in Wireless Sensor Networks." International Journal of Computer Networks and Communications Security 5, no. 5 (2017): 105-114.