SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
International Journal of Computer Networks &
Communications (IJCNC)
(Scopus, ERA Listed)
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
http://airccse.org/journal/ijcnc.html
Current Issue: July 2019, Volume 11,
Number 4 --- Table of Contents
http://airccse.org/journal/ijc2019.html
PAPER -01
MULTI-OBJECTIVE OPTIMIZATION ASSISTED
NETWORK CONDITION AWARE QOS-ROUTING
PROTOCOL FOR MANETS: MNCQM
Shashi Raj K1
and Siddesh G K2
1
Department of Electronics and Communication, Dayananda Sagar College of
Engineering, Bengaluru, India
2
Department of Electronics and Communication, JSS Academy of Technical Education,
Bengaluru, India
ABSTRACT
The exponential rise in wireless communication systems and allied applications has revitalized
academia-industries to achieve more efficient data transmission system to meet Quality-of-
Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc
Network (MANET) is found potential to provide decentralized and infrastructure less
communication among multiple distributed nodes across network region. However, dynamic
network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc
often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens
the horizon for intruders to penetrate the network and causes performance degradation. Unlike
classical MANET protocols where major efforts have been made on single network parameter
based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA)
Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for
Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase
implementation where at first it performs node-profiling under dynamic network topology for
which three factors; irregular MAC information exchange, queuing overflow and topological
variations have been considered. Towards this objective node features like Packet Forwarding
Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a
neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to
estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy
nodes. In the second phase of implementation, a novel Evolutionary Computing assisted non-
disjoint best forwarding path selection model is developed that exploits node’s and allied link’s
connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA
algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to
estimate best forwarding node. One key feature of the proposed model is dual-supplementary
forwarding path selection that enables alternate path formation in case of link outage and thus
avoids any iterative network discovery phase.
KEYWORDS
MANET, QoS communication, Node-trustworthiness, Network awareness, Evolutionary
computing based routing decision.
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc01.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance
Issues and Evaluation Considerations”, IETF WG Charter, http://www.ietf.org/html.charters/manet-
charter.html, January 1999.
[2] Z. Iqbal, S. Khan, Amjad Mehmood, Jaime Lloret, and Nabil Ali Alrajeh “Adaptive Cross-Layer
Multipath Routing Protocol for Mobile Ad Hoc Networks” Hindawi Publishing Corporation
Journal of Sensors Volume 2016, Article ID 5486437, 18 pages.
[3] C. T. Calafate, M. P. Malumbres, J. Oliver, J. C. Cano and P. Manzoni, "QoS Support in MANETs: a
Modular Architecture Based on the IEEE 802.11e Technology," in IEEE Transactions on Circuits and
Systems for Video Technology, vol. 19, no. 5, pp. 678-692, May 2009.
[4] Z. Li and X. Yang, "A Reliability-Oriented Web Service Discovery Scheme with Cross-Layer Design
in MANET," 2016 IEEE International Conference on Web Services, San Francisco, CA, 2016, pp.
404-411.
[5] S. V. Sangolli and J. Thyagarajan, "An efficient congestion control scheme using cross-layered
approach and comparison of TCP variants for mobile ad-hoc networks (MANETs)," 2014 First
International Conference on Networks & Soft Computing, Guntur, 2014, pp. 30-34.
[6] P. Samar and S. B. Wicker, “On the behavior of communication links of a node in a multi-hop
mobile environment,” in proceedings 5th ACM Intl. symposium on Mobile ad hoc networking and
computing, 2004.
[7] D. Chen and P. K. Varshney, “QoS support in wireless sensor networks: a survey”, International
Conference on Wireless Networks, ICWN '04, Las Vegas, USA, June 2004, pp. 227-233.
[8] F. Xia, “QoS Challenges and opportunities in wireless sensor/actuator networks”, Sensors 2008,
vol.8, no.2, 2008, pp. 1099-1110.
[9] Y.J. Li, C.S. Chen, Y.Q. Song and Z. Wang, “Real-time QoS support in wireless sensor networks:
a survey”, 7th IFAC International Conference on Fieldbuses and Networks in Industrial and
Embedded Systems, FeT’07, Toulouse, France, 2007.
[10] H. Alwan and A. Agarwal, “A Survey on Fault Tolerant Routing Techniques in Wireless Sensor
Networks”, in proceedings of the Third International Conference on Sensor Technologies and
Applications, Athens/Glyfada, Greece, 2009, pp. 366-371.
[11] K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie, “Protocols for self organization of a wireless
sensor network,” IEEE Personal Communications, vol. 7, no. 5, 2000, pp. 16–27.
[12] K. Akkaya and M. Younis, “An Energy-Aware QoS Routing Protocol for Wireless Sensor
Networks”, in proceedings of the 23rd International Conf. on Distributed Computing Systems
Workshops, 2003, pp. 710-715.
[13] J. Chen, R. Lin, Y. Li and Y. Sun, “LQER: A Link Quality Based Routing for Wireless Sensor
Networks”, Sensors, vol. 8, 2008, pp.1025- 1038.
[14] B. C. Villaverde, S. Rea and D. Pesch, “Multi- objective Cross-Layer Algorithm for Routing over
Wireless Sensor Networks”, Third International Conference on Sensor Technologies and
Applications, Athens/Glyfada, Greece, 2009, pp. 568-574.
[15] P.A. Abdul Saleem, Dr. Naveen Kumar “Cross Layer Design Approach in Wireless Mobile
ADHOC Network Architecture” International Journal of Advanced Research in Computer and
Communication Engineering Vol. 2, Issue 3, March 2013.
[16] Y. Fang, Y. Zhou, X. Jiang and Y. Zhang, "Practical Performance of MANETs Under Limited Buffer
and Packet Lifetime," in IEEE Systems Journal, vol. 11, no. 2, pp. 995-1005, June 2017.
[17] Y. H. Chen, E. H. K. Wu and G. H. Chen, "Bandwidth-Satisfied Multicast by Multiple Trees and
Network Coding in Lossy MANETs," in IEEE Systems Journal, vol. 11, no. 2, pp. 1116-1127, June
2017.
[18] Y. Komai, Y. Sasaki, T. Hara and S. Nishio, " ${k}$ Nearest Neighbor Search for Location-
Dependent Sensor Data in MANETs," in IEEE Access, vol. 3, pp. 942-954, 2015.
[19] R. Jia et al., "Optimal Capacity–Delay Tradeoff in MANETs With Correlation of Node
Mobility," in IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1772-1785, Feb. 2017.
[20] S. Sett, P. Kumar Guha Thakurta “Effect of optimal cluster head placement in MANET through multi
objective GA”, In IEEE International Conference on Advances in Computer Engineering and
Applications(ICACEA), pp. 832-837, 2015.
[21] D. Barman Roy Rituparna Chaki “MCBHIDS: Modified layered cluster based algorithm for black
hole IDS”, In Annual IEEE India Conference (INDICON), pp.1-6, 2013.
[22] Neha Gupta, Rajeev Kumar Singh, Manish Shrivastava, “Cluster formation through improved
weighted clustering algorithm (IWCA) for mobile ad-hoc networks”, Tenth IEEE International
Conference on Wireless and Optical Communications Networks(WOCN), pp. 1-5, 2013.
[23] M. Rath, B. Pati and B. K. Pattanayak, "Cross layer based QoS platform for multimedia transmission
in MANET," In 11th International Conference on Intelligent Systems and Control (ISCO),
Coimbatore, 2017, pp. 402-407.
[24] M. A. Gawas, L. J. Gudino and K. R. Anupama, "Cross layer multi QoS metric routing for
multimedia traffic in 802.11E over MANETs," 2016 Eighth International Conference on Ubiquitous
and Future Networks (ICUFN), Vienna, 2016, pp. 582-587.
[25] Z. Li and X. Yang, "A Reliability-Oriented Web Service Discovery Scheme with Cross-Layer Design
in MANET," 2016 IEEE International Conference on Web Services (ICWS), San Francisco, CA,
2016, pp. 404-411.
[26] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc
networks,” in proceedings of the 6th annual ACM Intl. conference on Mobile computing and
networking, 2000.
[27] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the
detection of routing misbehavior in MANETs,” IEEE Transactions on Mobile Computing, 6(5):536-
550, 2007.
[28] T. Sheltami, A. Basabaa, and E. Shakshuki, “A3acks: adaptive three acknowledgments intrusion
detection system for MANETs,” Journal of Ambient Intelligence and Humanized Computing,
5(4):611–620, 2014.
[29] E. M. Shakshuki, N. Kang, and T. R. Sheltami, “Eaack—a secure intrusion-detection system for
MANETs, ” IEEE Transactions on Industrial Electronics, 60(3):1089–1098, 2013.
[30] D. S. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughput path metric for
multihop wireless routing,” Wireless Networks, 11(4):419-434, 2005.
[31] B. Shebaro, D. Midi, and E. Bertino, “Fine-grained analysis of packet losses in wireless sensor
networks,” in 11th IEEE Intl. Conference on Sensing, Communication, and Networking (SECON),
2014.
[32] S. Buchegger and J. L. Boudec, “Performance analysis of the confidant protocol,” in proceedings
of the 3rd ACM Intl. conference on Mobile ad hoc networking & computing, 2002.
[33] A. Shabut, K. Dahal, S. Bista, and I. Awan, “Recommendation based trust model with an effective
defence scheme for MANETs,” IEEE Transactions on Mobile Computing, 14(10):2101–2115, 2015.
[34] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile
ad hoc networks,” in IEEE Intl. Conference on Performance, Computing, and Communications, 2004.
[35] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node
cooperation in mobile ad hoc networks,” in Advanced Communications and Multimedia Security,
Springer, 2002.
[36] F. Anjum and R. Talpade, “Lipad: lightweight packet drop detection for ad hoc networks,” in 60th
IEEE Vehicular Technology Conf., volume 2, 2004.
[37] F. V. Jensen, Bayesian Networks and Decision Graphs. New Jersey: Springer-Verlag, 2001.
[38] E. Castillo, J. M. Gutierrez, and A. S. Hadi, Expert Systems and probabilistic Network Models. New
York: Springer-Verlag, 1997.
[39] T. H. Sureshbhai, M. Mahajan and M. K. Rai, "An Investigational Analysis of DSDV, AODV and
DSR Routing Protocols in Mobile Ad Hoc Networks," 2018 International Conference on Intelligent
Circuits and Systems (ICICS), Phagwara, pp. 281-285, 2018.
[40] Saghian, Malihe, Ravanmehr, Reza, “Efficient QoS-aware Middleware for Resource Discovery in
Mobile Ad Hoc Networks”, Adhoc & Sensor Wireless Networks, Vol. 43 Issue 3/4, p283-312,2019.
[41] Shashi Raj K, Siddesh G K,"QoS Oriented Cross-synch Routing Protocol for Event Driven,
Mission-critical Communication Over MANET: Q-CSRPM", International Journal of Computer
Network and Information Security(IJCNIS), Vol.10, No.11, pp.18-30, 2018.DOI:
10.5815/ijcnis.2018.11.03.
AUTHORS
Shashi Raj K. is a research scholar in the department of Electronics and
Communication Engineering at Dayananda Sagar College of Engineering,
Bengaluru. He has received his B.E degree in Electronics and Communication
Engineering and M.Tech degree in VLSI Design and Embedded Systems from
VTU, Belgaum. He has eleven international, one national journal publications
and three international conference publications to his credit. His research area and area of specialization
includes Wireless Networks, VLSI and Embedded systems. He is a life member
of the Indian Society for Technical Education.
Dr. Siddesh G. K. is a Professor and Head of the department of Electronics and
Communication Engineering at JSS Academy of Technical Education,
Bengaluru. He obtained his B chelors and Masters Degree in Electronics and
Communication Engineering from Bangalore University and Manipal Academy
of Higher Education, Karnataka respectively. He also obtained his doctrol
degree from Visvesvaraya Technological University Belgaum, Karnataka,
India. He has 20 international journal publications and 5 international conference publication to his credit.
His research area and area of specialization includes Wireless communication, Computer Networks, Image
and Data compression and Processing.
PAPER -02
A MAC PROTOCOL WITH DYNAMIC ALLOCATION
OF TIME SLOTS BASED ON TRAFFIC PRIORITY IN
WIRELESS BODY AREA NETWORKS
Sabin Bhandari and Sangman Moh
Department of Computer Engineering, Chosun University, Gwangju, South Korea
ABSTRACT
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or
inside the human body. Given specific requirements, WBANs can significantly improve
healthcare, diagnostic monitoring, and other medical services. However, the existing standards
such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of
WBANs. Many medium access control (MAC) protocols have been studied so far, most of which
are derived from the IEEE 802.15.4 superframe structure with some improvements and
adjustments. However, the MAC protocols do not provide the required quality of service (QoS)
for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol
for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic
priority, providing the required QoS. According to the performance evaluation results, the
proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC
in terms of transmission time, system throughput, energy efficiency, and collision ratio.
KEYWORDS
Wireless body area network; Medium access control, Energy efficiency; Quality of service;
Traffic priority; IEEE 802.15.4
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc02.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] D. Fernandes, A. G. Ferreira, R. Abrishambaf, J. Mendes, andJ. Cabral, (2018) “Survey and
taxonomy of transmissions power control mechanisms for wireless body area networks,” IEEE
Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1292-1328
[2] IEEE, (2006) “IEEE Std.802.15.4: Wireless medium access control (MAC) and physical layer
(PHY) specifications for low data rate wireless personal area networks (WPAN),” Piscataway,
NJ, USA
[3] X. Yang, L. Wang, and Z. Zhang, (2018) “Wireless body area networks MAC protocol for energy
efficiency and extending lifetime,” IEEE Sensors Letters, vol. 2, no. 1, pp. 1-4
[4] B. Liu, Z. Yan, and C. W. Chen, (2017) “Medium access control for wireless body area networks
with QoS provisioning and energy efficient design,” IEEE Transactions on Mobile Computing, vol.
16, no. 2, pp. 422-434
[5] S. Ullah, M. Chen, and K. Kwak, (2012) “Throughput and delay analysis of IEEE 802.15.6 based
CSMA/CA protocol,” Journal of Medical Systems, vol. 36, no. 6, pp. 3875-3891
[6] S. Bhandari and S. Moh, (2015) “A survey of MAC Protocols for cognitive radio body area
networks,” Sensors, vol. 15, pp. 9189-9209
[7] E. Kartsakli, A. Lalos, A. Antonopoulos, S. Tennina, M. Renzo, L. Alonso, and C. Verikoukis,
(2014) “A survey on M2M systems for mHealth: A wireless communications perspective,” Sensors,
vol. 14, pp. 18009-18052
[8] R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, (2014) “A survey on wireless body
area networks: Technologies and design challenges,” IEEE Communications Surveys & Tutorials,
vol. 16, pp. 1635-1657
[9] T. Le and S. Moh, (2015) “Interference mitigation schemes for wireless body area sensor
networks: A comparative survey,” Sensors, vol. 15, pp. 13805-18838
[10] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, (2003) “Analysis of IEEE 802.11e for
QoS support in wireless LANs,” IEEE Wireless Communications, vol. 10, No. 3, pp. 40-50
[11] N. F. Timmons and W. G. Scanlon, (2004) “Analysis of the performance of IEEE 802.15.4 for
medical sensor body area networking,” in Proc. of 1st Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, pp. 16-24
[12] T. Falck, J. Espina, J. P. Ebert, and D. Dietterle, (2006) “BASUMA – The sixth sense for chronically
ill patients,” in Proc. of International Workshop on Wearable and Implantable Body Sensor Networks,
pp. 1-6
[13] G. Fang and E. Dutkiewicz, (2009) “BodyMAC: Energy efficient TDMA-based MAC protocol for
Wireless Body Area Network,” in Proc. of 9th International Symposium on Communications and
Information Technology, pp. 1455-1459
[14] Z. Yan and B. Liu, (2011) “A context aware MAC protocol for medical wireless body area network,”
in Proc. of 7th Int. Wireless Communication and Mobile Computing Conf. (IWCMC 2011), pp. 2133-
2138
[15] L. Huaming and T. Jindong, (2010) “Heartbeat-driven medium-access control for body sensor
networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 44-51
[16] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li, and R. Kohno, (2009) “Scalable and robust medium access
control protocol in wireless body area networks,” in Proc. of IEEE 20th International Symposium
on Personal, Indoor and Mobile Radio Communications, pp. 2127-2131
[17] W. Lee, S. H. Rhee, Y. Kim, and H. Lee, (2009) “An efficient multi-channel management protocol
for wireless body area networks,” in Proc. of International Conference on Information Networking,
pp.1-5
[18] I. Anjum, N. Alam, M. A. Razzaque, M. Mehedi Hassan, and A. Alamri, (2013) “Traffic priority and
load adaptive mac protocol for qos provisioning in body sensor networks,” International Journal of
Distributed Sensor Networks, vol. 2013, pp. 1-9
[19] K. S. Kwak and S. Ullah, (2010) “A traffic-adaptive MAC protocol for WBAN,” in Proc. of IEEE
GLOBECOM Workshops, pp. 1286-1289
[20] O. Md. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, (2011) “ATLAS: A traffic load aware sensor
MAC design for collaborative body area sensor networks,” Sensors, vol. 11, no.12, pp. 11560-11580
[21] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, (2012) “TAD-MAC: traffic-aware dynamic
MAC protocol for wireless body area sensor networks,” IEEE Journal on Emerging and Selected
Topics in Circuits and Systems, vol. 2, no. 1, pp. 109-119
[22] B. Kim and J. Cho, (2012) “A novel priority-based channel access algorithm for contention-based
MAC protocol in WBANs,” in Proc. of 6th International Conference on Ubiquitous Information
Management and Communication (ICUIMC 2012), pp. 1-5
[23] S. Ullah, M. Imran, and M. Alnuem, (2014) “A hybrid and secure priority-guaranteed MAC protocol
for wireless body area network,” International Journal of Distributed Sensor Networks, vol. 2014, pp.
1-7
[24] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, (2011) “A novel medium access control protocol with low
delay and traffic adaptivity for wireless body area networks,” Journal of Medical Systems, pp. 1265-
1275
[25] S. Jin, Z. Weixia, and Z. Zheng, (2013) “Priority-based adaptive timeslot allocation scheme for
wireless body area network,” in Proc. of 13th International Symposium on Communications and
Information Technologies, pp. 609-614
[26] Y. Zhang and G. Dolmans, (2010) “Priority-guaranteed MAC protocol for emerging wireless body
area networks,” Annals of Telecommunications, vol. 66, pp. 229-241
[27] X. Liang and I. Balasingham, (2007) “Performance analysis of the IEEE 802.15.4 based ECG
monitoring network,” in Proc. of 7th International Conferences on Wireless and Optical
Communications, pp. 99-104
[28] S. Bhandari, K. Singh, and S. Moh, (2017) “Traffic-Aware Medium Access Control Protocol for
Wireless Body Area Networks,” in Proc. of InfoWare 2017 Conference, pp. 1-6
AUTHORS
Sabin Bhandari received his B.E. degree in electronics and communication
engineering from Tribhuvan University, Nepal in 2010. He worked as a lecturer
and project assistant in Kantipur Engineering College, Nepal from 2011 to 2014.
He completed his M.E. degree in computer engineering from Chosun University,
Gwangju, South Korea in 2016. His current research interests include wireless body
area networks, wireless sensor networks, and cognitive radio.
Sangman Moh received his Ph.D. degree in computer engineering from Korea
Advanced Institute of Science and Technology (KAIST), Korea in 2002. Since late
2002, he has been a professor at the Dept. of Computer Engineering at Chosun
University, Korea. From 2006 to 2007, he was on leave at Cleveland State
University, USA. His research interests include mobile computing and networking,
ad hoc and sensor networks, cognitive radio networks, and parallel and distributed
computing systems. He has published more than 200 papers in international and
domestic journals and conference proceedings, and has held more than 40 overseas
and domestic patents. He serves on the program committees of international
conferences and workshops in his areas of interest as a chair or member. Dr. Moh
is a member of the IEEE, the ACM, the IEICE, the KIISE, the IEIE, the KIPS, the
KICS, the KMMS, the IEMEK, the KISM, and the KPEA.
PAPER -03
FUZZY INFORMER HOMED ROUTING PROTOCOL
FOR WIRELESS SENSOR NETWORK
Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh
Department of Computer Science & Engineering, Faculty of Engineering and
Technology, Panjab University, Chandigarh, India
ABSTRACT
A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect
meaningful environmental information and send them to the base station. During these processes,
nodes are prone to failure, due to the energy depletion, hardware or software failure, etc.
Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet
delivery. To address these objectives a novel method called fuzzy informer homed routing
protocol is introduced. The proposed method tries to distribute the workload between every
sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head
communication range estimation. The simulation results show that the proposed method can
significantly reduce energy consumption as compared with IHR and DHR protocols.
Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first
node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that
the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor
networks.
KEYWORDS
Wireless Sensor Network; Routing Protocols; Fault Tolerance; Energy Efficiency; Clustering
Algorithms; Fuzzy Logic system
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc03.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] Atero,F. J., Vinagre,J. J.,Ramiro J. and Wilby,M. “A low energy and adaptive routing architecture for
efficient field monitoring in heterogeneous wireless sensor networks,” In proc. IEEE Int. Conf. on
High Performance Computing and Simulation, Istanbul, Turkey, 2011, pp.449 – 455.
[2] Baroutis, N. and Younis, M., (2017)“Load-conscious maximization of base-station location privacy in
wireless sensor networks,” Computer Networks, 124, pp.126-139.
[3] Kakamanshadi, G., Gupta, S. and Singh, S. "A survey on fault tolerance techniques in Wireless
Sensor Networks," In proc. IEEE Int. Conf. on Green Computing and Internet of Things, India, 2015,
pp. 168-173.
[4] Biswas, S., Das, R. and Chatterjee, P., (2018)“Energy-efficient connected target coverage in multi-
hop wireless sensor networks,” In Industry Interactive Innovations in Science, Engineering and
Technology, Springer, Singapore, pp. 411-421.
[5] Bagci, H. and Yazici, A., (2013)“An energy aware fuzzy approach to unequal clustering in
wireless sensor networks,” Applied Soft Computing, vol. 13, no.4, pp.1741-1749.
[6] Mittal, N., Singh, U. and Sohi, B.S., (2017)“A stable energy efficient clustering protocol for wireless
sensor networks,”Wireless Networks, vol.23, no.6, pp.1809-1821.
[7] Pachlor, R. and Shrimankar, D., (2018)“EEHCCP: an energy-efficient hybrid clustering
communication protocol for wireless sensor network,” In Ad Hoc Networks, Springer, Cham,
vol.223, pp. 199-207.
[8] Wang, J., Niu, J., Wang, K. and Liu, W., (2018)“An energy efficient fuzzy cluster head selection
algorithm for WSNs,” In IEEE International Workshop on Advanced Image Technology (IWAIT),
pp. 1-4.
[9] Tamandani, Y.K., Bokhari, M.U. and Shallal, Q.M., (2017)“Two-step fuzzy logic system to achieve
energy efficiency and prolonging the lifetime of WSNs,” Wireless Networks, vol.23, no.6, pp.1889-1899.
[10] Torghabeh, N. A., Totonchi, M. R. A. and Moghaddam, M. H. Y. “Cluster Head Selection using a
Two-Level Fuzzy Logic in Wireless Sensor Networks,” In proc. 2nd IEEE Int. Conf. on Computer
Engineering and Technology, China, 2010, pp.357–361.
[11] Messaoudi, A., Elkamel, R., Helali, A. and Bouallegue, R.,“Distributed fuzzy logic based routing
protocol for wireless sensor networks,” In proc. 24thIEEE Int. Conf. onSoftware,
Telecommunications and Computer Networks (SoftCOM), 2016,pp. 1-7.
[12] Arjunan, S. and Sujatha P., (2017)“A survey on unequal clustering protocols in Wireless Sensor
Networks,”Journal of King Saud University-Computer and Information Sciences,vol. xx, PP.1-14.
[13] Meikang, Q., Ming, Z., Li, J., Liu, J., Quan, G. and Zhu, Y., (2013)“Informer homed routing fault
tolerance mechanism for wireless sensor networks,” Journal of Systems Architecture, vol. 59,
pp.260-270, May. 2013.
[14] Jain, N., Vokkarane, V.M. and Wang, J.P., “Performance analysis of dual-homed fault tolerant
routing in wireless sensor networks,” In proc. IEEE Conf. on Technologies for Homeland Security,
Waltham, 2008, pp. 474–479.
[15] Abedi, R. H., Aslam, N. and Ghani, S., "Fault tolerance analysis of heterogeneous wireless sensor
network," In proc. 24th IEEECanadian Conf. on Electrical and Computer Engineering, Canada, 2011,
pp.175-179.
[16] Akyildiz, F. and Vuran, C. Wireless sensor networks. 1st ed. Georgia, Institute of Technology, USA:
John Wiley & Sons, 2010, pp.48-49.
[17] Xiaoling, W., Cho, J., Brian, J. d. and Lee, S., "Energy-aware routing for wireless sensor networks by
AHP," In IFIP Int. Workshop on Software Technologies for Embedded and Ubiquitous Systems,
Springer Berlin Heidelberg, 2007, pp. 446-455.
[18] Masdari, M. and Naghiloo, F., (2017)“Fuzzy Logic-Based Sink Selection and Load Balancing in
Multi-Sink Wireless Sensor Networks,” Wireless Personal Communications, vol.97, no.2, pp.2713-
2739.
[19] El Alami, H. and Najid, A., “March. Energy-efficient fuzzy logic cluster head selection in wireless
sensor networks,” In proc.IEEE Int. Conf. on Information Technology for Organizations
Development (IT4OD), 2016, pp. 1-7.
[20] Agrawal, D. and Pandey, S., (2017)“FUCA: Fuzzy‐based unequal clustering algorithm to prolong the
lifetime of wireless sensor networks,” International Journal of Communication Systems, vol.31, no.2,
pp.1-18
[21] Shankar, T., Karthikeyan, A., Sivasankar, P., and Rajesh A., (2017)“Hybrid approach for optimal
cluster head selection in WSN using leach and monkey search algorithms,” Journal of
Engineering Science and Technology, vol.12, no.2, pp.506-517.
[22] Adhikary, D.R.D. and Mallick, D.K., (2017)“An Energy Aware Unequal Clustering Algorithm
using Fuzzy Logic for Wireless Sensor Networks,” Journal of ICT Research and Applications,
vol.11, no.1, pp.55-76.
[23] Sert, S.A., Bagci, H. and Yazici, A., (2015)“MOFCA: Multi-objective fuzzy clustering algorithm for
wireless sensor networks,” Applied Soft Computing, vol.30, pp.151-165.
[24] Logambigai, R. and Kannan, A., (2016)“Fuzzy logic based unequal clustering for wireless sensor
networks,”Wireless Networks, vol.22, no.3, pp.945-957.
AUTHOR
GholamrezaKakamanshadi received the M.Tech. degree in Computer
Engineering from BharatiVidyapeeth University, Pune, India, in 2012. He is
currently pursuing his Ph.D. in the Department of CSE, University Institute of
Engineering & Technology, Panjab University, Chandigarh, India. His research
interests are Wireless sensor network, Body area network, Internet of Things and
Network security.
Savita Gupta received the B.Tech and M.E. degree in both Computer Science and
Engineering. She obtained her Ph.D. degree in 2007 in the field of Medical Image
Processing. She has been into the teaching profession since 1992 and has published
more than 70 papers in refereed International Journals and conference proceedings.
Presently, she is working as Director in the University Institute of Engineering &
Technology, Panjab University, Chandigarh, India. She has completed various
research projects funded by various agencies like DST, AICTE, and MHRD. Her
research interests include Medical image processing, Wavelet based image
compression and denoising, Network security and Wireless sensor networks.
Sukhwinder Singh received the B.Tech degree in 1991 and M.E. degree in 1999. he
obtained his Ph.D. degree in 2006 from IIT, Roorkee. Presently, he is working as a
professor in the Department of CSE, University Institute of Engineering &
Technology, Panjab University, Chandigarh, India. His research interests include
Medical Image Processing and Analysis, Biomedical Signal Processing, Information
Retrieval, Wireless Sensor Networks, Body Area Networks, Cognitive Enhancement,
Machine Intelligence.
PAPER -04
AN OPTIMUM ENERGY CONSUMPTION HYBRID
ALGORITHM FOR XLN STRATEGIC DESIGN IN
WSN’S
Md. Khaja Mohiddin1
and V. B. S. Srilatha Indira Dutt2
1
Research Scholar, Department of ECE, GITAM (Deemed to be University),
Visakhapatnam, Andhra Pradesh, India
2
Associate Professor, Department of ECE, GITAM (Deemed to be University), Visakhapatnam,
Andhra Pradesh, India
ABSTRACT
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP)
algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure
employs the mobility aware protocol that senses the mobility concerned to each node with the
utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data
specific to the distance among individual nodes. With the help of this theory, the neighbour list
will be updated only to those nodes which are mobile resulting in less energy consumption when
compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm,
clustering head (CH) election algorithm has also been specified to identify the relevant clusters
whether they exists within the network region or not. Also clustering multi-hop routing (CMHR)
algorithm was implemented in which the node can identify the cluster to which it belongs
depending upon the distance from each cluster surrounding the node. Finally comprising the
AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol
structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results
in energy consumption and also by reducing the energy wastage with respect to each node. The
effective results had been illustrated through Network Simulator-II platform.
KEYWORDS
IEEE 802.15.4, AODV Protocol, Two Ray Ground Propagation Model, Mobility Error Prediction
(MEP)Algorithm, Clustering Multi-Hop Routing (CMHR) Algorithm, Energy Consumption,
End-to-End Delay; Throughput
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc04.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] Marwan Al-Jemeli and Fawnizu A. Hussin, (2015) “An Energy Efficient Cross-Layer Network
Operation Model for IEEE 802.15.4-Based Mobile Wireless Sensor Networks”, IEEE Sensor
Journal, Vol. 10, No. 2, pp.684-692.
[2] Md. Khaja Mohiddin and V.B.S. Srilatha Indira Dutt, (2017) “Minimization of Energy Consumption
Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs”, Proceedings of
the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications,
Advances in Intelligent Systems and Computing, Vol. 515, pp741-751.
[3] Md. Khaja Mohiddin and V.B.S. Srilatha Indira Dutt, (2017) “An Efficient Energy Optimization
XLN Operation Model for IEEE 802.15.4-Based Mobile WSNs”, International Journal of Control
Theory and Applications, Vol. 10, No. 9, pp255-264.
[4] Sudhakar Pandey and Deepika Agrawal, (2017) “An ED-Based Enhanced Energy Efficient Cross
Layer Model for Mobile Wireless Sensor Network”, National Academic Science Letter, Vol. 40,
No. 6, pp421-427.
[5] K. Lalitha, R. Thangarajan, Siba K. Udgata, C. Poongodi and Ambika Prasad Sahu, (2017) “GCCR:
An Efficient Grid Based Clustering and Combinational Routing in Wireless Sensor Networks”,
Wireless Personal Communication, Vol. 97, pp1075-1095.
[6] Kartinah Zen, Daryoush Habibi, Alexander Rassau and Iftekhar Ahmad, (2008) “Performance
Evaluation of IEEE 802.15.4 for Mobile Sensor Networks”, 5th IFIP International Conference on
Wireless and Optical Communications Networks, pp1-5.
[7] Xinbing Wang, Xiaojun Lin, Qingsi Wang and Wentao Luan, (2013) “Mobility Increases the
Connectivity of Wireless Networks”, IEEE/ACM transactions on networking, Vol. 21, No. 2.
[8] SamerA. B.Awwad, CheeKyun Ng, NorK.Noordin and Mohd. Fadlee A. Rasid, (2010) “Cluster
Based Routing Protocol for Mobile Nodes in Wireless Sensor Network”, Wireless Personal
Communications, Vol. 61, pp251-281.
[9] Tao Yang, Tetsuya Oda, Leonard Barolli, Jiro Iwashige, Arjan Durresi and Fatos Xhafa, (2012)
“Investigation of Packet Loss in Mobile WSNs for AODV Protocol and Different Radio Models”,
26th IEEE International Conference on Advanced Information Networking and Applications, pp709-
715.
[10] Tommaso Melodia, Dario Pompili and Ian F. Akyildiz, (2010) “Handling Mobility in Wireless
Sensor and Actor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 2, pp160-173.
[11] Woo-Yong Lee, Kyeong Hur and Doo-Seop Eom, (2008) “Navigation of Mobile Node in Wireless
Sensor Networks without Localization”, Proceedings of IEEE International Conference on Multi-
sensor Fusion and Integration for Intelligent Systems, pp1-7.
[12] Shibo He, Jiming Chen, David K.Y. Yau and Youxian Sun, (2012) “Cross-Layer Optimization of
Correlated Data Gathering in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing,
Vol. 11, No. 11, pp1678-1691.
[13] Mehmet C. Vuran and Ian F. Akyildiz, (2010) “XLP: A Cross-Layer Protocol for Efficient
Communication in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No.
11, pp1578-1591.
[14] Jianping Wang, Deying Li, Guoliang Xing and Hongwei Du, (2010) “Cross- Layer Sleep Scheduling
Design in Service-Oriented Wireless Sensor Networks”, IEEE Transactions on Mobile Computing,
Vol. 9, No. 11, pp1622-1633.
[15] Emad Felemban, Serdar Vural, Robert Murawski, Eylem Ekici, Kangwoo Lee, Youngbag Moon and
Sangjoon Park, (2010) “SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with
Sectored Antennas”, IEEE Transactions on Mobile Computing, Vol. 9, No. 8, pp1072-1088.
[16] Pangun Park, Carlo Fischione, Alvise Bonivento, Karl Henrik Johansson and Alberto L. Sangiovanni-
Vincentelli, (2011) “Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless
Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 10, No. 6, pp821-838.
[17] Liqi Shi and Abraham O. Fapojuwo, (2010) “TDMA Scheduling with Optimized Energy Efficiency
and Minimum Delay in Clustered Wireless Sensor Networks”, IEEE Transactions on Mobile
Computing, Vol. 9, No. 7, pp927-940.
[18] Hsueh-Wen Tseng, Shan-Chi Yang, Ping-Cheng Yeh and Ai-Chun Pang, (2011) “A Cross-Layer
Scheme for Solving Hidden Device Problem in IEEE 802.15.4 Wireless Sensor Networks”, IEEE
Sensor Journal, Vol. 11, No. 2, pp493-504.
[19] F. Yu, S. Park, E. Lee and S.-H. Kim, (2009) “Elastic routing: a novel geographic routing for mobile
sinks in wireless sensor networks”, IET Communications, Vol.4, No.6. pp716-727.
[20] Yuan-Yao Shih, Wei-Ho Chung, Pi-Cheng Hsiu and Ai-Chun Pang, (2013) “A Mobility-Aware
Node Deployment and Tree Construction Framework for ZigBee Wireless Networks”, IEEE
Transactions on Vehicular Technology, Vol. 62, No. 6, pp2763-2779.
[21] S. Deng, J. Li and L. Shen, (2011) “Mobility-Based Clustering Protocol for Wireless Sensor
Networks with Mobile Nodes”, IET Wireless Sensor Systems, Vol. 1, No. 1, pp39-47.
[22] L. Karim and N. Nasser, (2012) “Reliable location-aware routing protocol for mobile wireless sensor
network”, IET Communications, Vol. 6, No. 14, pp2149-2158.
[23] Bashir Yahya and Jalel Ben-Othman, (2009) “An Energy Efficient and QoS Aware Multipath Routing
Protocol for Wireless Sensor Networks”, IEEE 34th Conference on Local Computer Networks.
[24] Debnath Bhattacharyya, Tai-hoon Kim and Subhajit Pal, (2010) “A Comparative Study of Wireless
Sensor Networks and their Routing Protocols”, Sensors, pp10506-10523.
[25] Subhajit Pal, Debnath Bhattacharyya, Geetam S. Tomar and Taihoon Kim, (2010) “Wireless Sensor
Networks and its Routing Protocols: A Comparative Study”, International Conference on
Computational Intelligence and Communication Networks, pp314-319.
[26] Dilip D. Chaudhary and Dr. L. M. Waghmare, (2013) “Energy Efficiency and Latency Improving
Protocol for Wireless Sensor Networks”, International Conference on Advances in Computing,
Communications and Informatics (ICACCI), pp1303-1308.
[27] Giuseppe Anastasi, Marco Conti and Mario Di Francesco, (2011) “A Comprehensive Analysis of
the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks”, IEEE Transactions
on Industrial Informatics, Vol. 7, No. 1.
[28] Martin Enzinger, (2012) “Energy-Efficient Communication in Wireless Sensor Networks”,
Network Architectures and Services, pp25-31.
[29] Jun Yu and Xueying Zhang, (2015) “A Cross-Layer Wireless Sensor Network Energy-Efficient
Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission
Lines”, Journal of Sensors, pp1-13.
[30] Mounib Khanafer, Mouhcine Guennoun, and Hussein T. Mouftah, (2011) “A Survey of Beacon-
Enabled IEEE 802.15.4 MAC Protocols in Wireless Sensor Networks”, IEEE Communications
Surveys & Tutorials, Vol. 16, No. 2, pp856-876.
[31] Asma Mesmoudi, Mohammed Feham and Nabila Labraoui, (2013) “Wireless Sensor Networks
Localization Algorithms: A Comprehensive Survey”, International Journal of Computer Networks
& Communications (IJCNC), Vol. 5, No. 6, pp45-64.
[32] Haithem Ben Chikha, Amira Makhlouf and Wiem Ghazel, (2000) “Performance Analysis of AODV
and DSR Routing Protocols for IEEE 802.15.4/Zig-Bee”.
[33] Wu Youjun and Nie Jingnan, (2000) “Performance Evaluation for Cross-Layer AODV Protocol in
CDMA-Based Ad-Hoc Networks”, Funded by National Natural Science Foundation of China
(60503049) and by the open research fund of National Mobile Communications Research Laboratory,
Southeast University (N200602).
[34] Mario Di Francesco, Giuseppe Anastasi, Marco Conti, Sajal K. Das, and Vincenzo Neri, (2011)
“Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks: An Adaptive and
Cross-Layer Approach”, IEEE Journal on Selected Areas in Communications, Vol. 29, No. 8,
pp1508-1524.
[35] Kiran Maraiya, Kamal Kant and Nitin Gupta, (2011) “Application based Study on Wireless Sensor
Network”, International Journal of Computer Applications, Vol. 21, No. 8, pp9-15.
[36] Marco Cattani, S¸ tefan Guna and Gian Pietro Picco, (2011) “Group Monitoring in Mobile Wireless
Sensor Networks”, IEEE.
[37] Chih-Min Chao and Hsin-Hsiang Wang, (2004) “The Bottleneck Problem in Large Scale IEEE
802.15.4/ZigBee Networks”, International Journal of Signal and Imaging Systems Engineering, pp1-
17.
[38] Norrozila Sulaiman, Ghaidaa M. Abdulsahib, Osamah I. Khalaf and Muamer N. Mohammed, (2014)
“Effect of Using Different Propagation’s on Performance of OLSR and DSDV Routing
Protocols”, 5th International Conference on Intelligent Systems, Modeling and Simulation, pp540-
545.
[39] Divya Upadhyay, P. Banerjee and A.L.N Rao, (2014) “Critical Performance Comparison of On-
Demand Routing Protocols for Optimal Application in Wireless Sensor Network”, 5th International
Conference- Confluence The Next Generation Information Technology Summit, pp462-466.
[40] Francesca Cuomo, Anna Abbagnale and Emanuele Cipollone, (2011) “Crosslayer network formation
for energy-efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks”, Ad Hoc Networks (Elsevier),
pp1-15.
.
AUTHORS
Md. Khaja Mohiddin received his B. Tech Degree in Electronics and
Communication Engineering from Al-Ameer College of Engineering & Information
Technology affiliated to JNTU, Andhra Pradesh, India, in 2009, M.Tech. Degree in
Digital Electronics & Communication Systems from Chaitanya Engineering
College affiliated to JNTU, Andhra Pradesh, India, in 2012. He is currently
pursuing the Ph.D. in Wireless Sensor Network from GITAM University,
Visakhapatnam, Andhra Pradesh, India. He is currently working as an Assistant
Professor in the Department of Electronics and Telecommunication Engineering,
Bhilai Institute of Technology, Raipur, (C.G.).
V. B. S. Srilatha Indira Dutt received her B. Tech. Degree in Electronics and
Communication Engineering from Nagarjuna University, Andhra Pradesh, India, in
1994, M. Tech. Degree in Radar and Microwave Engineering from Andhra
University, Andhra Pradesh, India, in 2007. She was awarded with Ph.D. degree in
Global Positioning System from the Andhra University, Andhra Pradesh, India, in
2011. She is currently working as an Associate Professor in the Department of
Electronics and Communication Engineering, GITAM Institute of Technology,
GITAM University (GITAM), Visakhapatnam, Andhra Pradesh, India. Her research
interests include Global Positioning System, Satellite Signal processing and Mobile Communications. She
published more than 40 research papers in referred international journals, and international and national
conferences.
PAPER -05
A FRACTAL BASED IMAGE CIPHER USING KNUTH
SHUFFLE METHOD AND DYNAMIC DIFFUSION
Shafali Agarwal
Plano, Texas 75025, USA
ABSTRACT
This paper proposes a fractal-based image encryption algorithm which follows permutation-
substitution structure to maintain confusion and diffusion properties. The scheme consists of three
phases: key generation process; pixel permutation using the Knuth shuffle method; and the
dynamic diffusion of scrambled image. A burning ship fractal function is employed to generate a
secret key sequence which is further scanned using the Hilbert transformation method to increase
the randomness. The chaotic behavior of the fractal strengthens the key sensitivity towards its
initial condition. In the permutation phase, the Knuth shuffle method is applied to a noisy plain
image to change the index value of each pixel. To substitute the pixel values, a dynamic diffusion
is suggested in which each scrambled pixel change its value by using the current key pixel and
the previously ciphered image pixel. To enhance the security of the cryptosystem, the secret key
is also modified at each encryption step by performing algebraic transformations. The visual and
numerical analysis demonstrates that the proposed scheme is reliable to secure transmission of
gray as well as color images.
KEYWORDS
Burning ship fractal, Knuth shuffle method, Image encryption, Hilbert transformation, dynamic
diffusion
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc05.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] C. A. Pickover, Computers, Pattern, Chaos, and Beauty: Graphics from an Unseen World. Courier
Corporation, 2001.
[2] B. B. Mandelbrot, The fractal geometry of nature, vol. 173. WH freeman New York, 1983.
[3] B. Howell, A. Reese, and M. Basile, “Fractal Cryptology,” New Mexico High School,
Supercomputing Challenge Final Report, 2003.
[4] G. B. Huntress, “Encryption using a fractal key,” US6782101 B1, 24-Aug-2004.
[5] M. Ivo, R. Jasek, and P. Varacha, “Analysis of the Fractal Structures For the Information
Encrypting Process,” International Journal of Computers, vol. 6, no. 4, pp. 224–231, 2012.
[6] R. M. Crownover, Introduction to fractals and chaos. Jones and Bartlett, 1995.
[7] M. Alia and A. Samsudin, “A new public-key cryptosystem based on mandelbrot and julia fractal
sets,” Asian Journal of Information Technology, AJIT, vol. 6, no. 5, pp. 567–575, 2007.
[8] V. Rozouvan, “Modulo image encryption with fractal keys,” Optics and Lasers in Engineering, vol.
47, no. 1, pp. 1–6, 2009.
[9] A. Chopra, M. Ahmad, and M. Malik, “An enhanced modulo-based image encryption using chaotic
and fractal keys,” in Computer Engineering and Applications (ICACEA), 2015 International
Conference on Advances in, 2015, pp. 501–506
.
[10] S. Kumar, “Public Key Cryptographic System Using Mandelbrot Sets,” in MILCOM 2006 - 2006
IEEE Military Communications conference, 2006, pp. 1–5.
[11] Y. Sun, L. Chen, R. Xu, and R. Kong, “An image encryption algorithm utilizing Julia Sets and
Hilbert Curves,” PloS one, vol. 9, no. 1, p. e84655, 2014.
[12] Y. Sun, R. Kong, X. Wang, and L. Bi, “An image encryption algorithm utilizing Mandelbrot set,”
in Chaos-Fractals Theories and Applications (IWCFTA), 2010 International Workshop on, 2010, pp.
170–173
.
[13] S. Sattari, A. Akkasi, R. A. Lari, and M. Khodaparasti, “Cryptography in social networks using
wavelet transform, fractals and chaotic functions,” International Research Journal of Applied and
Basic Sciences, Science Explorer Publications, ISSN, pp. 1627–1635, 2015.
[14] H. Kashanian, M. Davoudi, and H. Khorramfar, “Image Encryption using chaos functions and
fractal key,” International Journal of Computer Science and Network Security (IJCSNS), vol. 16, no.
10, p. 87, 2016.
[15] Q. Zhang, S. Zhou, and X. Wei, “An efficient approach for DNA fractal-based image encryption,”
Appl. Math. Inf. Sci, vol. 5, pp. 445–459, 2011.
[16] M. Mikhail, Y. Abouelseoud, and G. ElKobrosy, “Two-Phase Image Encryption Scheme Based on
FFCT and Fractals,” Security and Communication Networks, 2017. [Online]. Available:
https://www.hindawi.com/journals/scn/2017/7367518/abs/. [Accessed: 09-Nov-2017].
[17] H. Oğraş and M. Türk, “A Robust Chaos-Based Image Cryptosystem with an Improved Key
Generator and Plain Image Sensitivity Mechanism,” Journal of Information Security, vol. 08, no.
01, pp. 23–41, 2017.
[18] S. K. Abd-El-Hafiz, A. G. Radwan, S. H. A. Haleem, and M. L. Barakat, “A fractal-based image
encryption system,” IET Image Processing, vol. 8, no. 12, pp. 742–752, May 2014.
[19] S. H. AbdElHaleem, A. G. Radwan, and S. K. Abd-El-Hafiz, “Design of pseudo random keystream
generator using fractals,” in 2013 IEEE 20th International Conference on Electronics, Circuits, and
Systems (ICECS), 2013, pp. 877–880.
[20] S. Agarwal, “Secure Image Transmission Using Fractal and 2D-Chaotic Map,” Journal of
Imaging, vol. 4, no. 1, p. 17, 2018.
[21] J. Shaw, O. Saha, and A. Chaudhuri, “An Approach for Secured Transmission of Data using
Fractal based Chaos,” in IJCA Proceedings on National Conference on Communication
Technologies & its impact on Next Generation Computing, 2012, pp. 13–17.
[22] Y. Sun, R. Xu, L. Chen, and X. Hu, “Image compression and encryption scheme using fractal
dictionary and Julia set,” IET Image Processing, vol. 9, no. 3, pp. 173–183, 2014.
[23] S. Zhu, C. Zhu, and W. Wang, “A novel image compression-encryption scheme based on chaos and
compression sensing,” IEEE Access, vol. 6, pp. 67095–67107, 2018.
[24] K. Faraoun, “Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and
its Application to Images Encryption.,” Int. Arab J. Inf. Technol., vol. 7, no. 3, pp. 231–240, 2010.
[25] A. M. Meligy, H. A. Diab, and M. S. El-Danaf, “Chaos Encryption Algorithm using Key
Generation from Biometric Image,” International Journal of Computer Applications, vol. 149, no.
11, 2016.
[26] S. M. Hussain and H. Al-Bahadili, “A DNA-Based Cryptographic Key Generation Algorithm.”
[27] Y. Li, C. Wang, and H. Chen, “A hyper-chaos-based image encryption algorithm using pixel-level
permutation and bit-level permutation,” Optics and Lasers in Engineering, vol. 90, pp. 238–246,
2017.
[28] M. Ahmad, M. N. Doja, and M. S. Beg, “Security analysis and enhancements of an image
cryptosystem based on hyperchaotic system,” Journal of King Saud University-Computer and
Information Sciences, 2018.
[29] C. Fu, G. Zhang, M. Zhu, Z. Chen, and W. Lei, “A New Chaos-Based Color Image Encryption
Scheme with an Efficient Substitution Keystream Generation Strategy,” Security and Communication
Networks, vol. 2018, 2018.
[30] S. Sun, “A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level
scrambling and bit-level scrambling,” IEEE Photonics Journal, vol. 10, no. 2, pp. 1–14, 2018.
[31] Q. Yin and C. Wang, “A New Chaotic Image Encryption Scheme Using Breadth-First Search
and Dynamic Diffusion,” International Journal of Bifurcation and Chaos, vol. 28, no. 04, p.
1850047, 2018.
[32] S. Hammami, “State feedback-based secure image cryptosystem using hyperchaotic synchronization,”
ISA transactions, vol. 54, pp. 52–59, 2015.
[33] X. Wang, X. Zhu, and Y. Zhang, “An image encryption algorithm based on Josephus traversing
and mixed chaotic map,” IEEE Access, vol. 6, pp. 23733–23746, 2018.
[34] Z. Hua, B. Xu, F. Jin, and H. Huang, “Image Encryption Using Josephus Problem and Filtering
Diffusion,” IEEE Access, vol. 7, pp. 8660–8674, 2019.
[35] X. Huang and G. Ye, “An Image Encryption Algorithm Based on Time-Delay and Random
Insertion,” Entropy, vol. 20, no. 12, p. 974, 2018.
[36] Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image encryption,”
Information Sciences, vol. 480, pp. 403–419, 2019.
[37] M. Alawida, A. Samsudin, J. S. Teh, and R. S. Alkhawaldeh, “A new hybrid digital chaotic system
with applications in image encryption,” Signal Processing, vol. 160, pp. 45–58, 2019.
[38] M. Asgari-Chenaghlu, M.-A. Balafar, and M.-R. Feizi-Derakhshi, “A novel image encryption
algorithm based on polynomial combination of chaotic maps and dynamic function generation,”
Signal Processing, vol. 157, pp. 1–13, 2019.
[39] H. J. Yakubu, E. G. Dada, S. B. Joseph, and A. K. Anukem, “A New Chaotic Image Encryption
Algorithm for Digital Colour Images Using Rabinovich-Fabrikant Equations,” International
Journal of Computer Science and Information Security (IJCSIS), vol. 17, no. 1, 2019.
[40] Z. Tang, Y. Yang, S. Xu, C. Yu, and X. Zhang, “Image Encryption with Double Spiral Scans and
Chaotic Maps,” Security and Communication Networks, vol. 2019, 2019
.
[41] B. B. Mandelbrot, “Fractal aspects of the iteration of z→ Λz (1-z) for complex Λ and z,” Annals
of the New York Academy of Sciences, vol. 357, no. 1, pp. 249–259, 1980.
[42] M. Michelitsch and O. E. Rössler, “Spiral structures in Julia sets and related sets,” in Spiral
symmetry, World Scientific, 1992, pp. 129–134.
[43] M. Michelitsch and O. E. Rössler, “The ‘burning ship’ and its quasi-Julia sets,” Computers &
graphics, vol. 16, no. 4, pp. 435–438, 1992.
[44] S. Agarwal and A. Negi, “INVENTIVE BURNING SHIP,” International Journal of Advances in
Engineering & Technology, vol. 6, no. 4, p. 1788, 2013.
[45] S. Agarwal and A. Negi, “Burning Ship and Its Quasi Julia Images Using Mann Iteration,” in Recent
Advances in Intelligent Informatics, Springer, 2014, pp. 401–410.
[46] T. Sivakumar and R. Venkatesan, “Image encryption based on pixel shuffling and random key
stream,” International Journal of Computer and Information Technology, vol. 3, no. 06, 2014.
[47] T. K. Hazra and S. Bhattacharyya, “Image encryption by blockwise pixel shuffling using Modified
Fisher Yates shuffle and pseudorandom permutations,” in Information Technology, Electronics and
Mobile Communication Conference (IEMCON), 2016 IEEE 7th Annual, 2016, pp. 1–6.
[48] N. D. Gagunashvili, “Chi-square tests for comparing weighted histograms,” Nuclear Instruments and
Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated
Equipment, vol. 614, no. 2, pp. 287–296, 2010.
[49] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,”
International Journal of Bifurcation and Chaos, vol. 16, no. 08, pp. 2129–2151, 2006.
[50] C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28,
no. 4, pp. 656–715, 1949.
[51] Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,”
Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in
Telecommunications (JSAT), pp. 31–38, 2011.
[52] Y. Wu, Y. Zhou, J. P. Noonan, and S. Agaian, “Design of image cipher using latin squares,”
Information Sciences, vol. 264, pp. 317–339, 2014.
[53] J. Wu, X. Liao, and B. Yang, “Image encryption using 2D Hénon-Sine map and DNA approach,”
Signal Processing, vol. 153, pp. 11–23, 2018.
AUTHOR
Shafali Agarwal has received MCA degree from UPTU, Lucknow in 2004 and
M.Phil in Computer Science from Alagappa University, Karaikudi, Tamil Nadu in
2013. She got her Ph.D. in Computer Science from Singhania University, India in
2014. She has served as a faculty member in the Department of Computer
Applications in JSSATE, Noida till June 2016. She has published more than 15
research papers in various International journals and conferences indexed in Scopus,
Emerging Sources Citation Index, Springer, ACM, Thomson Reuters, google scholar
and in many more. She was awarded a best paper presentation award in a conference
ICVISP held in Las Vegas, USA. Her research interest includes fractal, cryptography and image
processing.
PAPER -06
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO
DENIAL OF SERVICE ATTACKS
B.Prabadevi1
, N.Jeyanthi1
, Nur Izura Udzir2
and Dhinaharan Nagamalai3
1
School of Information Technology and Engineering, Vellore Institute of Technology,
Vellore, India
2
Department of Computer Science, Universiti Putra Malaysia, Malaysia
3
Wireilla Net Solutions, Australia
ABSTRACT
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing
environment. Through various packet analyzers or sniffers available free of cost, the network
packets can be captured and analyzed. The sensitive information of the victim like user
credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be
stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in
the network from a variety of its catalog of attacks. An effective and trusted framework for
detecting and preventing these sniffing has greater significance in today’s computing. A counter
hack method to avoid data theft is to encrypt sensitive information. This paper provides an
analysis of the most prominent sniffing attacks. Moreover, this is one of the most important
strides to guarantee system security. Also, a Lattice structure has been derived to prove that
sniffing is the prominent activity for DoS or DDoS attacks.
KEYWORDS
Sniffing, Sensitive Data, Intrusion Detection, DDoS, Lattice Structure;
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc05.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] B. Prabadevi and N. Jeyanthi, "Distributed Denial of service attacks and its effects on Cloud
environment- a survey," The 2014 International Symposium on Networks, Computers and
Communications, Hammamet, 2014, pp. 1-5. doi: 10.1109/SNCC.2014.6866508.
[2] B.Prabadevi and Jeyanthi.N,” A Review on Various Sniffing Attacks and its Mitigation
Techniques”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 12, No. 3,
pp.1117~1125, 2018.
[3] Lithuanian national Computer Emergency Response Team, “CERT-LT activity report,” CERT,
Lithuania, 2018, [Online]. Available: https://www.cert.lt/en/statistics.html.
[4] Candid Wueest. “Security Response: The continued rise of DDoS attacks” Symantec. White paper.
1.0, 2014.[ Online]. Available:
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-
continued-rise-of-ddos-attacks.pdf
[5] Anu, P., and S. Vimala. "A survey on sniffing attacks on computer networks." In 2017 International
Conference on Intelligent Computing and Control (I2C2), pp. 1-5. IEEE, 2017.
[6] N. M. Prajapati, A. Mishra and P. Bhanodia, “Literature survey - IDS for DDoS attacks,” in
Proceedings of 2014 Conference on IT in Business, Industry and Government (CSIBIG), Indore,
2014, pp. 1-3. doi: 10.1109/CSIBIG.2014.7056943.
[7] Anupama Mishra, B. B. Gupta, & R. C. Joshi, “A Comparative study of Distributed Denial of
Service Attacks, Intrusion Tolerance and Mitigation Techniques,” in Proceedings of European
Intelligence and Security Informatics Conference, Athens, Greece, 2011, pp. 286-289.
[8] A. Barth, J. Caballero and D. Song, “Secure Content Sniffing for Web Browsers, or How to Stop
Papers from Reviewing Themselves,” in Proceedings of 2009 30th IEEE Symposium on Security
and Privacy, Berkeley, CA, 2009, pp. 360-371.
[9] A. Barua, H. Shahriar and M. Zulkernine, "Server-Side Detection of Content Sniffing Attacks," in
Proceedings of 2011 IEEE 22nd International Symposium on Software Reliability Engineering,
Hiroshima, 2011, pp. 20-29.
[10] Syed Imran Ahmed Qadri & Kiran Pandey, “Tag-Based Client-Side Detection of Content Sniffing
Attacks with File Encryption and File Splitter Technique,” International Journal of Advanced
Computer Research, vol.2, no.5, pp. 215-221, 2012.
[11] P. Arote and K. V. Arya, "Detection and Prevention against ARP Poisoning Attack Using Modified
ICMP and Voting," in Proceedings of 2015 International Conference on Computational Intelligence
and Networks, Bhubaneshwar, 2015, pp. 136-141.
[12] H. Salim, Z. Li, H. Tu and Z. Guo, "Preventing ARP Spoofing Attacks through Gratuitous Decision
Packet," in Proceedings of 2012 11th International Symposium on Distributed Computing and
Applications to Business, Engineering & Science, Guilin, 2012, pp. 295-300.
[13] P. Pandey, "Prevention of ARP spoofing: A probe packet based technique," 2013 3rd IEEE
International Advance Computing Conference (IACC), Ghaziabad, 2013, pp. 147-153.
[14] Imtiyaz Ahmad lone and Md. Ataullah, “A Survey on Various Solutions of ARP Attacks,”
International Journal of Advanced Research in Computer Science and Software Engineering, vol.3,
no.2, pp. 299- 303, 2013.
[15] Kulshrestha, A. and Dubey, S.K. (2014) A Literature Review on Sniffing Attacks in Computer
Network. International Journal of Advanced Engineering Research and Science, 1, 2.
[16] Abdul Nasir Khan, Kalim Qureshi and Sumair Khan, “An Intelligent Approach of Sniffer
Detection,” The International Arab Journal of Information Technology, vol.9, no.1, pp.9-15, 2012.
[17] Mahjabin, Tasnuva, Yang Xiao, Guang Sun, and Wangdong Jiang. "A survey of distributed denial-of-
service attack, prevention, and mitigation techniques." International Journal of Distributed Sensor
Networks 13, no. 12 (2017): 1550147717741463.
[18] Shaun Waterman. “DDoS attacks are growing faster in size, complexity—arbor report, 2017”,
http://edscoop.com/ddos-attacks-growing-faster-in-size-complexity-arbor-report (accessed 10 March
2017.
[19] Arbor Networks’ 12th Annual Worldwide Infrastructure Security Report Finds Attacker Innovation
and IoT Exploitation Fuel DDoS Attack Landscape, 2017.
[20] NETSCOUT Arbor Special Report, “Insight Into The Global Threat Landscape”, NETSCOUT
Arbor’s 13th Annual Worldwide Infrastructure Security Report,
https://pages.arbornetworks.com/rs/082-KNA
087/images/13th_Worldwide_Infrastructure_Security_Report.pdf2017.
[21] “DDoS Attack Size Explodes Worldwide: SaaS and Cloud Services Increasingly Targeted-
NETSCOUT 14th annual WISR report”, https://www.netscout.com/press-releases/netscout-releases-
14th-annual-worldwide-infrastructure, 19th March, 2019.
[22] Animesh Dubey, Ravindra Gupta and Gajendra Singh Chandel, “An Efficient Partition Technique
to reduce the Attack Detection Time with Web-based Text and PDF files,” International Journal
of Advanced Computer Research (IJACR), vol. 3, no.9, pp.80-86, 2013.
[23] Shweta Pandey and Abhishek Singh Chauhan, “Secure Content Sniffing For Web Browsers: A
Survey,” International Journal of Advanced Research in Computer and Communication Engineering,
vol.2, no.9, pp.3595 – 3601, 2013.
[24] S. Ford, M. Cova, C. Kruegel, and G. Vigna. “Analyzing and Detecting Malicious Flash
Advertisements,” in Proceedings of Annual Computer Security Applications Conference ACSAC,
Honolulu, Hawaii, 2009, pp.363-372.
[25] H. Shahriar and M. Zulkernine, "PhishTester: Automatic Testing of Phishing Attacks," in
Proceedings of 2010 Fourth International Conference on Secure Software Integration and Reliability
Improvement, Singapore, 2010, pp. 198-207.
[26] M. Khonji, Y. Iraqi and A. Jones, "Mitigation of spear phishing attacks: A Content-based Authorship
Identification framework," in Proceedings of 2011 International Conference for Internet Technology
and Secured Transactions, Abu Dhabi, 2011, pp. 416-421.
[27] H. Shahriar and M. Zulkernine, "Injecting Comments to Detect JavaScript Code Injection Attacks," in
Proceedings of 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops,
Munich, 2011, pp. 104-109.
[28] Misganaw Tadesse Gebre, Kyung-Suk Lhee and ManPyo Hong, "A robust defence against Content-
Sniffing XSS attacks," in Proceedings of 6th International Conference on Digital Content, Multimedia
Technology and its Applications, Seoul, 2010, pp. 315-320.
[29] Sadeghian, Amirmohammad, Mazdak Zamani, and Suhaimi Ibrahim, "SQL injection is still alive: a
study on SQL injection signature evasion techniques," in Proceedings of International Conference on
Informatics and Creative Multimedia (ICICM), 2013, pp. 265-268. IEEE, 2013.
[30] Samvedi, Abhishek, Sparsh Owlak, and Vijay Kumar Chaurasia. "Improved Secure Address
Resolution Protocol." arXiv preprint arXiv:1406.2930 (2014).
[31] Jean-Paul Tremblay & R Manohar, “Discrete mathematical structures with applications to computer
science,” New Delhi, India, Tata McGraw-Hill, 1997.
[32] B.Prabadevi and N.Jeyanthi, A framework to mitigate ARP Sniffing attacks by Cache Poisoning,” Int.
J. Advanced Intelligence Paradigms, vol.10, no.1/2, pp.146-159, 2018.
[33] D. Plummer, An Ethernet Address Resolution Protocol - or - Converting Network Protocol
Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware", RFC-826, MIT,
November,1982.
[34] D. Bruschi, A. Ornaghi and E. Rosti, "S-ARP: a secure address resolution protocol," in
Proceedings of 19th Annual Computer Security Applications Conference, 2003, pp. 66-74.
[35] Lootah, W., Enck, W., and McDaniel, P. “TARP: Ticket-based address resolution protocol,”
Computer Networks, vol. 51, no.15, pp.4322-4337, 2007.
[36] S. Y. Nam, D. Kim and J. Kim, "Enhanced ARP: preventing ARP poisoning-based man-in-the-middle
attacks," in IEEE Communications Letters, vol. 14, no. 2, pp. 187-189, February 2010.
[37] Dangol, S. Selvakumar, and M. Brindha, “Genuine ARP (GARP)”, ACM SIGSOFT Softw. Eng.
Notes, vol. 36, no. 4, pp. 1, 2011.
[38] Kumar, S. and Tapaswi, S., “A centralized detection and prevention technique against ARP
poisoning,” in Proceedings of 2012 IEEE International Conference on Cyber Security, Cyber
Warfare and Digital Forensic (CyberSec), pp. 259-264, 2012.
PAPER -07
APPLYING GEO-ENCRYPTION AND ATTRIBUTE
BASED ENCRYPTION TO IMPLEMENT SECURE
ACCESS CONTROL IN THE CLOUD
Abu Salim1
, Sachin Tripathi2
and Rajesh Kumar Tiwari3
1
Department of Computer Science, College of CS & IT, Jazan University, Jazan,
Kingdom of Saudi Arabia (KSA)
2
Department of Computer Science Engineering, Indian Institute of Technology, Dhanbad,
Jharkhand, India
3
Department of Computer Science and Engineering, RVS College of Eng. & Tech.,
Jamshedpur, Jharkhand, India
ABSTRACT
Cloud computing is utility-based computing provides many benefits to its clients but security is
one aspect which is delaying its adoptions. Security challenges include data security, network
security and infrastructure security. Data security can be achieved using Cryptography. If we
include location information in the encryption and decryption process then we can bind access to
data with the location so that data can be accessed only from the specified locations. In this paper,
we propose a method based on the symmetric cryptography, location-based cryptography and
ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to
the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to
encrypt the secret key and the location lock value before uploading on the server. User will
download encrypted data and the symmetric secret key XORed with the Location Lock value,
using his attributes based secret key he can obtain first XORed value of Symmetric secret key and
location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used
to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to
ensure Integrity and Availability of the data. This protocol can be used in the Bank, government
organization, military services or any other industry those are having their offices/work location
at a fixed place, so data access can be bounded to that location.
KEYWORDS
Cloud Computing, Secure Access Control, Security issues, Cryptography, Geo Encryption,
Attribute-Based Encryption, CP- ABE.
For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc07.pdf
Volume Link: http://airccse.org/journal/ijc2019.html
REFERENCES
[1] Sadiku M.,Musa S., Momoh O., “Cloud computing: opportunities and challenges,” IEEE Potentials
,pp. 34–36,2014.
[2] Juels A., Burton J., Kaliski S., “Pors: proofs of retrievability for large files,” in: Proc. of ACM
CCS, Alexandria, VA, October 2007.
[3] Ateniese G. at el. “Provable data possession at untrusted stores,” Proceedings of the 14th ACM
conference on Computer and communications security, Alexandria, Virginia, USA, November 02-
October 31, 2007.
[4] The NIST Definition of Cloud Computing: https://www.nist.gov/sites/default/files/documents/itl/
cloud/cloud-def-v15.pdf. Accessed on 05 Sep 2017.
[5] Chandran N., Arulkumar S.,“Utilization of Random Key and Sobel Filter Based Edge Detection
for Secure Data Transmission,” IJIRCCE, Vol. 1, Issue 10, pp. 2376-2380, 2013.
[6] Dimitrios Z., Dimitrios L., “Addressing cloud computing security issues,” Future Generation
Computer Systems, Vol. 28, Issue 3,pp. 583–592, 2012
[7] Stallings W., Cryptography and Network Security: Principles and Practice, 6th edition, Pearson
Education.
[8] Mandal P.C., “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and
Blowfish,” Journal of Global Research in Computer Science, Volume 3, No. 8,pp. 67-70, 2012.
[9] Bethencourt J, Sahai A, Waters B., “Ciphertext-policy attribute-based Encryption,” IEEE
Symposium on Security and Privacy, 2007.
[10] Sahai A., Waters B., “Fuzzy identity-based encryption,” In EUROCRYPT, pp. 457-473, 2005.
[11] Chandran N. at el.,“Advances in Cryptology. CRYPTO 2009 Lecture Notes in Computer Science,”
Volume 5677, pp 391-407, 2009.
[12] https://www.novatel.com/tech-talk/velocity/velocity-2013/understanding-the-difference-
between-anti-spoofing-and-anti-jamming/ , Accessed on 20-04-2019.
[13] Hong H, Sun Z , “Achieving secure data access control and efficient key updating in mobile
multimedia sensor networks”. Multimedia Tools and Applications 77(4):4477–4490, 2018.
[14] Qiu S, Liu JQ, Shi YF et al . “ Hidden policy ciphertext-policy attribute-based encryption with
keyword search against keyword guessing attack”. Volume 8880 of the series Lecture Notes in
Computer Science. Inf Syst Secure 60:052105,2017.
[15] Li LF, Chen XW, Jiang H et al. “ P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based
Encryption for clouds”. 2016 17th IEEE/ACIS International Conference on Software Engineering,
Artificial Intelligence, Networking and Parallel/ Distributed Computing (SNPD), 575-580, 2016
[16] Scott L., Dorothy E. Denning, “Location Based Encryption & Its Role in Digital Cinema
Distribution”, Proceedings of ION GPS/GNSS , pp. 288-297, 2003.
[17] Fuqaha A., Ibrahim O.,” Geo-encryption protocol for mobile networks,” Computer
Communications, pp. 2510–2517, 2007.
[18] Firoozjaei MD., Vahidi J, “Implementing Geo-encryption in GSM Cellular Network,” IEEE,pp. 299-
302,2012
[19] Reddy P., Sudha KR., Sanyasi P., “A Modified Location-Dependent Image Encryption for Mobile
Information System,” IJEST,pp. 1060-1065,2010.
AUTHORS
Sachin Tripathi received his M.Tech & PhD degree from IIT (ISM) Dhanbad. He joined Indian School of
Mines, Dhanbad on 21st November 2005 and currently he is working as Associate Professor in the
Department of Computer Science and Engineering. Before that he joined, Haldia Institute of Technology,
Haldia, West Bengal, in July 2005, as a Lecturer in the Department of Computer Science and Engineering.
His reserch interest is focussed on Computer Networks, Internet multicasting applications, Mobile IP.
Rajesh Kumar Tiwari received his MCA from Nagpur University in 2002 and PhD in the field of Data
Security form Birla Institute of Technology, Ranchi in the year 2010. Currently, he Professor and Head of
Department Computer Science and Engineering at R.V.S. College of Engineering and Technology,
Jamshedpur, Jharkhand, India. His research is focused on data security, network security, cloud computing
and database management system.
Abu Salim received his B.Tech (CSE) from Dr. RML Avadh University, Faizabad in 2003 and M.Tech
from JNTU Kakinada in 2009. Currently he is pursuing PhD from IIT (ISM) Dhanbad as Part Time
Research Scholar and working as Lecturer in the Jazan University, KSA. His research is focused on data
security, network security and cloud computing.

Más contenido relacionado

La actualidad más candente

An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
Mohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...Amir Shokri
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies Radha Mahalle
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESMusthafa Tema
 
Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020ijmnct
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 

La actualidad más candente (17)

An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
CV-Behnam_Rahnama-EN
CV-Behnam_Rahnama-ENCV-Behnam_Rahnama-EN
CV-Behnam_Rahnama-EN
 
Mohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz Resume
Mohamad Aziz Resume
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
Atul
AtulAtul
Atul
 
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
66 71
66 7166 71
66 71
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLESIEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
IEEE PROJECTS IN JAVA & DOTNET 2013-2014 TITLES
 
Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020
 
Future Wireless Networks
Future Wireless NetworksFuture Wireless Networks
Future Wireless Networks
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 

Similar a New research articles 2019 - July issue : International Journal of Computer Networks & Communications (IJCNC)

International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...ijassn
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJUTop Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJUijujournal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similar a New research articles 2019 - July issue : International Journal of Computer Networks & Communications (IJCNC) (20)

International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
Top Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJUTop Read Articles in April 2020 - IJU
Top Read Articles in April 2020 - IJU
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 

Más de IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

Más de IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Último

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 

Último (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 

New research articles 2019 - July issue : International Journal of Computer Networks & Communications (IJCNC)

  • 1. International Journal of Computer Networks & Communications (IJCNC) (Scopus, ERA Listed) ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html Current Issue: July 2019, Volume 11, Number 4 --- Table of Contents http://airccse.org/journal/ijc2019.html
  • 2. PAPER -01 MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PROTOCOL FOR MANETS: MNCQM Shashi Raj K1 and Siddesh G K2 1 Department of Electronics and Communication, Dayananda Sagar College of Engineering, Bengaluru, India 2 Department of Electronics and Communication, JSS Academy of Technical Education, Bengaluru, India ABSTRACT The exponential rise in wireless communication systems and allied applications has revitalized academia-industries to achieve more efficient data transmission system to meet Quality-of- Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted non- disjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase. KEYWORDS MANET, QoS communication, Node-trustworthiness, Network awareness, Evolutionary computing based routing decision.
  • 3. For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc01.pdf Volume Link: http://airccse.org/journal/ijc2019.html REFERENCES [1] S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, IETF WG Charter, http://www.ietf.org/html.charters/manet- charter.html, January 1999. [2] Z. Iqbal, S. Khan, Amjad Mehmood, Jaime Lloret, and Nabil Ali Alrajeh “Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks” Hindawi Publishing Corporation Journal of Sensors Volume 2016, Article ID 5486437, 18 pages. [3] C. T. Calafate, M. P. Malumbres, J. Oliver, J. C. Cano and P. Manzoni, "QoS Support in MANETs: a Modular Architecture Based on the IEEE 802.11e Technology," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 5, pp. 678-692, May 2009. [4] Z. Li and X. Yang, "A Reliability-Oriented Web Service Discovery Scheme with Cross-Layer Design in MANET," 2016 IEEE International Conference on Web Services, San Francisco, CA, 2016, pp. 404-411. [5] S. V. Sangolli and J. Thyagarajan, "An efficient congestion control scheme using cross-layered approach and comparison of TCP variants for mobile ad-hoc networks (MANETs)," 2014 First International Conference on Networks & Soft Computing, Guntur, 2014, pp. 30-34. [6] P. Samar and S. B. Wicker, “On the behavior of communication links of a node in a multi-hop mobile environment,” in proceedings 5th ACM Intl. symposium on Mobile ad hoc networking and computing, 2004. [7] D. Chen and P. K. Varshney, “QoS support in wireless sensor networks: a survey”, International Conference on Wireless Networks, ICWN '04, Las Vegas, USA, June 2004, pp. 227-233. [8] F. Xia, “QoS Challenges and opportunities in wireless sensor/actuator networks”, Sensors 2008, vol.8, no.2, 2008, pp. 1099-1110. [9] Y.J. Li, C.S. Chen, Y.Q. Song and Z. Wang, “Real-time QoS support in wireless sensor networks: a survey”, 7th IFAC International Conference on Fieldbuses and Networks in Industrial and Embedded Systems, FeT’07, Toulouse, France, 2007. [10] H. Alwan and A. Agarwal, “A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks”, in proceedings of the Third International Conference on Sensor Technologies and Applications, Athens/Glyfada, Greece, 2009, pp. 366-371. [11] K. Sohrabi, J. Gao, V. Ailawadhi, and G. Pottie, “Protocols for self organization of a wireless sensor network,” IEEE Personal Communications, vol. 7, no. 5, 2000, pp. 16–27. [12] K. Akkaya and M. Younis, “An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks”, in proceedings of the 23rd International Conf. on Distributed Computing Systems Workshops, 2003, pp. 710-715.
  • 4. [13] J. Chen, R. Lin, Y. Li and Y. Sun, “LQER: A Link Quality Based Routing for Wireless Sensor Networks”, Sensors, vol. 8, 2008, pp.1025- 1038. [14] B. C. Villaverde, S. Rea and D. Pesch, “Multi- objective Cross-Layer Algorithm for Routing over Wireless Sensor Networks”, Third International Conference on Sensor Technologies and Applications, Athens/Glyfada, Greece, 2009, pp. 568-574. [15] P.A. Abdul Saleem, Dr. Naveen Kumar “Cross Layer Design Approach in Wireless Mobile ADHOC Network Architecture” International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 3, March 2013. [16] Y. Fang, Y. Zhou, X. Jiang and Y. Zhang, "Practical Performance of MANETs Under Limited Buffer and Packet Lifetime," in IEEE Systems Journal, vol. 11, no. 2, pp. 995-1005, June 2017. [17] Y. H. Chen, E. H. K. Wu and G. H. Chen, "Bandwidth-Satisfied Multicast by Multiple Trees and Network Coding in Lossy MANETs," in IEEE Systems Journal, vol. 11, no. 2, pp. 1116-1127, June 2017. [18] Y. Komai, Y. Sasaki, T. Hara and S. Nishio, " ${k}$ Nearest Neighbor Search for Location- Dependent Sensor Data in MANETs," in IEEE Access, vol. 3, pp. 942-954, 2015. [19] R. Jia et al., "Optimal Capacity–Delay Tradeoff in MANETs With Correlation of Node Mobility," in IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1772-1785, Feb. 2017. [20] S. Sett, P. Kumar Guha Thakurta “Effect of optimal cluster head placement in MANET through multi objective GA”, In IEEE International Conference on Advances in Computer Engineering and Applications(ICACEA), pp. 832-837, 2015. [21] D. Barman Roy Rituparna Chaki “MCBHIDS: Modified layered cluster based algorithm for black hole IDS”, In Annual IEEE India Conference (INDICON), pp.1-6, 2013. [22] Neha Gupta, Rajeev Kumar Singh, Manish Shrivastava, “Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks”, Tenth IEEE International Conference on Wireless and Optical Communications Networks(WOCN), pp. 1-5, 2013. [23] M. Rath, B. Pati and B. K. Pattanayak, "Cross layer based QoS platform for multimedia transmission in MANET," In 11th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, 2017, pp. 402-407. [24] M. A. Gawas, L. J. Gudino and K. R. Anupama, "Cross layer multi QoS metric routing for multimedia traffic in 802.11E over MANETs," 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, 2016, pp. 582-587. [25] Z. Li and X. Yang, "A Reliability-Oriented Web Service Discovery Scheme with Cross-Layer Design in MANET," 2016 IEEE International Conference on Web Services (ICWS), San Francisco, CA, 2016, pp. 404-411. [26] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in proceedings of the 6th annual ACM Intl. conference on Mobile computing and networking, 2000. [27] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Transactions on Mobile Computing, 6(5):536- 550, 2007.
  • 5. [28] T. Sheltami, A. Basabaa, and E. Shakshuki, “A3acks: adaptive three acknowledgments intrusion detection system for MANETs,” Journal of Ambient Intelligence and Humanized Computing, 5(4):611–620, 2014. [29] E. M. Shakshuki, N. Kang, and T. R. Sheltami, “Eaack—a secure intrusion-detection system for MANETs, ” IEEE Transactions on Industrial Electronics, 60(3):1089–1098, 2013. [30] D. S. De Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughput path metric for multihop wireless routing,” Wireless Networks, 11(4):419-434, 2005. [31] B. Shebaro, D. Midi, and E. Bertino, “Fine-grained analysis of packet losses in wireless sensor networks,” in 11th IEEE Intl. Conference on Sensing, Communication, and Networking (SECON), 2014. [32] S. Buchegger and J. L. Boudec, “Performance analysis of the confidant protocol,” in proceedings of the 3rd ACM Intl. conference on Mobile ad hoc networking & computing, 2002. [33] A. Shabut, K. Dahal, S. Bista, and I. Awan, “Recommendation based trust model with an effective defence scheme for MANETs,” IEEE Transactions on Mobile Computing, 14(10):2101–2115, 2015. [34] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, “On intrusion detection and response for mobile ad hoc networks,” in IEEE Intl. Conference on Performance, Computing, and Communications, 2004. [35] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Advanced Communications and Multimedia Security, Springer, 2002. [36] F. Anjum and R. Talpade, “Lipad: lightweight packet drop detection for ad hoc networks,” in 60th IEEE Vehicular Technology Conf., volume 2, 2004. [37] F. V. Jensen, Bayesian Networks and Decision Graphs. New Jersey: Springer-Verlag, 2001. [38] E. Castillo, J. M. Gutierrez, and A. S. Hadi, Expert Systems and probabilistic Network Models. New York: Springer-Verlag, 1997. [39] T. H. Sureshbhai, M. Mahajan and M. K. Rai, "An Investigational Analysis of DSDV, AODV and DSR Routing Protocols in Mobile Ad Hoc Networks," 2018 International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, pp. 281-285, 2018. [40] Saghian, Malihe, Ravanmehr, Reza, “Efficient QoS-aware Middleware for Resource Discovery in Mobile Ad Hoc Networks”, Adhoc & Sensor Wireless Networks, Vol. 43 Issue 3/4, p283-312,2019. [41] Shashi Raj K, Siddesh G K,"QoS Oriented Cross-synch Routing Protocol for Event Driven, Mission-critical Communication Over MANET: Q-CSRPM", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.11, pp.18-30, 2018.DOI: 10.5815/ijcnis.2018.11.03.
  • 6. AUTHORS Shashi Raj K. is a research scholar in the department of Electronics and Communication Engineering at Dayananda Sagar College of Engineering, Bengaluru. He has received his B.E degree in Electronics and Communication Engineering and M.Tech degree in VLSI Design and Embedded Systems from VTU, Belgaum. He has eleven international, one national journal publications and three international conference publications to his credit. His research area and area of specialization includes Wireless Networks, VLSI and Embedded systems. He is a life member of the Indian Society for Technical Education. Dr. Siddesh G. K. is a Professor and Head of the department of Electronics and Communication Engineering at JSS Academy of Technical Education, Bengaluru. He obtained his B chelors and Masters Degree in Electronics and Communication Engineering from Bangalore University and Manipal Academy of Higher Education, Karnataka respectively. He also obtained his doctrol degree from Visvesvaraya Technological University Belgaum, Karnataka, India. He has 20 international journal publications and 5 international conference publication to his credit. His research area and area of specialization includes Wireless communication, Computer Networks, Image and Data compression and Processing.
  • 7. PAPER -02 A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORITY IN WIRELESS BODY AREA NETWORKS Sabin Bhandari and Sangman Moh Department of Computer Engineering, Chosun University, Gwangju, South Korea ABSTRACT In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio. KEYWORDS Wireless body area network; Medium access control, Energy efficiency; Quality of service; Traffic priority; IEEE 802.15.4 For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc02.pdf Volume Link: http://airccse.org/journal/ijc2019.html
  • 8. REFERENCES [1] D. Fernandes, A. G. Ferreira, R. Abrishambaf, J. Mendes, andJ. Cabral, (2018) “Survey and taxonomy of transmissions power control mechanisms for wireless body area networks,” IEEE Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1292-1328 [2] IEEE, (2006) “IEEE Std.802.15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low data rate wireless personal area networks (WPAN),” Piscataway, NJ, USA [3] X. Yang, L. Wang, and Z. Zhang, (2018) “Wireless body area networks MAC protocol for energy efficiency and extending lifetime,” IEEE Sensors Letters, vol. 2, no. 1, pp. 1-4 [4] B. Liu, Z. Yan, and C. W. Chen, (2017) “Medium access control for wireless body area networks with QoS provisioning and energy efficient design,” IEEE Transactions on Mobile Computing, vol. 16, no. 2, pp. 422-434 [5] S. Ullah, M. Chen, and K. Kwak, (2012) “Throughput and delay analysis of IEEE 802.15.6 based CSMA/CA protocol,” Journal of Medical Systems, vol. 36, no. 6, pp. 3875-3891 [6] S. Bhandari and S. Moh, (2015) “A survey of MAC Protocols for cognitive radio body area networks,” Sensors, vol. 15, pp. 9189-9209 [7] E. Kartsakli, A. Lalos, A. Antonopoulos, S. Tennina, M. Renzo, L. Alonso, and C. Verikoukis, (2014) “A survey on M2M systems for mHealth: A wireless communications perspective,” Sensors, vol. 14, pp. 18009-18052 [8] R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, (2014) “A survey on wireless body area networks: Technologies and design challenges,” IEEE Communications Surveys & Tutorials, vol. 16, pp. 1635-1657 [9] T. Le and S. Moh, (2015) “Interference mitigation schemes for wireless body area sensor networks: A comparative survey,” Sensors, vol. 15, pp. 13805-18838 [10] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, (2003) “Analysis of IEEE 802.11e for QoS support in wireless LANs,” IEEE Wireless Communications, vol. 10, No. 3, pp. 40-50 [11] N. F. Timmons and W. G. Scanlon, (2004) “Analysis of the performance of IEEE 802.15.4 for medical sensor body area networking,” in Proc. of 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 16-24 [12] T. Falck, J. Espina, J. P. Ebert, and D. Dietterle, (2006) “BASUMA – The sixth sense for chronically ill patients,” in Proc. of International Workshop on Wearable and Implantable Body Sensor Networks, pp. 1-6 [13] G. Fang and E. Dutkiewicz, (2009) “BodyMAC: Energy efficient TDMA-based MAC protocol for Wireless Body Area Network,” in Proc. of 9th International Symposium on Communications and Information Technology, pp. 1455-1459 [14] Z. Yan and B. Liu, (2011) “A context aware MAC protocol for medical wireless body area network,” in Proc. of 7th Int. Wireless Communication and Mobile Computing Conf. (IWCMC 2011), pp. 2133- 2138
  • 9. [15] L. Huaming and T. Jindong, (2010) “Heartbeat-driven medium-access control for body sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 44-51 [16] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li, and R. Kohno, (2009) “Scalable and robust medium access control protocol in wireless body area networks,” in Proc. of IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2127-2131 [17] W. Lee, S. H. Rhee, Y. Kim, and H. Lee, (2009) “An efficient multi-channel management protocol for wireless body area networks,” in Proc. of International Conference on Information Networking, pp.1-5 [18] I. Anjum, N. Alam, M. A. Razzaque, M. Mehedi Hassan, and A. Alamri, (2013) “Traffic priority and load adaptive mac protocol for qos provisioning in body sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-9 [19] K. S. Kwak and S. Ullah, (2010) “A traffic-adaptive MAC protocol for WBAN,” in Proc. of IEEE GLOBECOM Workshops, pp. 1286-1289 [20] O. Md. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, (2011) “ATLAS: A traffic load aware sensor MAC design for collaborative body area sensor networks,” Sensors, vol. 11, no.12, pp. 11560-11580 [21] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, (2012) “TAD-MAC: traffic-aware dynamic MAC protocol for wireless body area sensor networks,” IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 2, no. 1, pp. 109-119 [22] B. Kim and J. Cho, (2012) “A novel priority-based channel access algorithm for contention-based MAC protocol in WBANs,” in Proc. of 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2012), pp. 1-5 [23] S. Ullah, M. Imran, and M. Alnuem, (2014) “A hybrid and secure priority-guaranteed MAC protocol for wireless body area network,” International Journal of Distributed Sensor Networks, vol. 2014, pp. 1-7 [24] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, (2011) “A novel medium access control protocol with low delay and traffic adaptivity for wireless body area networks,” Journal of Medical Systems, pp. 1265- 1275 [25] S. Jin, Z. Weixia, and Z. Zheng, (2013) “Priority-based adaptive timeslot allocation scheme for wireless body area network,” in Proc. of 13th International Symposium on Communications and Information Technologies, pp. 609-614 [26] Y. Zhang and G. Dolmans, (2010) “Priority-guaranteed MAC protocol for emerging wireless body area networks,” Annals of Telecommunications, vol. 66, pp. 229-241 [27] X. Liang and I. Balasingham, (2007) “Performance analysis of the IEEE 802.15.4 based ECG monitoring network,” in Proc. of 7th International Conferences on Wireless and Optical Communications, pp. 99-104 [28] S. Bhandari, K. Singh, and S. Moh, (2017) “Traffic-Aware Medium Access Control Protocol for Wireless Body Area Networks,” in Proc. of InfoWare 2017 Conference, pp. 1-6
  • 10. AUTHORS Sabin Bhandari received his B.E. degree in electronics and communication engineering from Tribhuvan University, Nepal in 2010. He worked as a lecturer and project assistant in Kantipur Engineering College, Nepal from 2011 to 2014. He completed his M.E. degree in computer engineering from Chosun University, Gwangju, South Korea in 2016. His current research interests include wireless body area networks, wireless sensor networks, and cognitive radio. Sangman Moh received his Ph.D. degree in computer engineering from Korea Advanced Institute of Science and Technology (KAIST), Korea in 2002. Since late 2002, he has been a professor at the Dept. of Computer Engineering at Chosun University, Korea. From 2006 to 2007, he was on leave at Cleveland State University, USA. His research interests include mobile computing and networking, ad hoc and sensor networks, cognitive radio networks, and parallel and distributed computing systems. He has published more than 200 papers in international and domestic journals and conference proceedings, and has held more than 40 overseas and domestic patents. He serves on the program committees of international conferences and workshops in his areas of interest as a chair or member. Dr. Moh is a member of the IEEE, the ACM, the IEICE, the KIISE, the IEIE, the KIPS, the KICS, the KMMS, the IEMEK, the KISM, and the KPEA.
  • 11. PAPER -03 FUZZY INFORMER HOMED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh Department of Computer Science & Engineering, Faculty of Engineering and Technology, Panjab University, Chandigarh, India ABSTRACT A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful environmental information and send them to the base station. During these processes, nodes are prone to failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet delivery. To address these objectives a novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head communication range estimation. The simulation results show that the proposed method can significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor networks. KEYWORDS Wireless Sensor Network; Routing Protocols; Fault Tolerance; Energy Efficiency; Clustering Algorithms; Fuzzy Logic system For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc03.pdf Volume Link: http://airccse.org/journal/ijc2019.html
  • 12. REFERENCES [1] Atero,F. J., Vinagre,J. J.,Ramiro J. and Wilby,M. “A low energy and adaptive routing architecture for efficient field monitoring in heterogeneous wireless sensor networks,” In proc. IEEE Int. Conf. on High Performance Computing and Simulation, Istanbul, Turkey, 2011, pp.449 – 455. [2] Baroutis, N. and Younis, M., (2017)“Load-conscious maximization of base-station location privacy in wireless sensor networks,” Computer Networks, 124, pp.126-139. [3] Kakamanshadi, G., Gupta, S. and Singh, S. "A survey on fault tolerance techniques in Wireless Sensor Networks," In proc. IEEE Int. Conf. on Green Computing and Internet of Things, India, 2015, pp. 168-173. [4] Biswas, S., Das, R. and Chatterjee, P., (2018)“Energy-efficient connected target coverage in multi- hop wireless sensor networks,” In Industry Interactive Innovations in Science, Engineering and Technology, Springer, Singapore, pp. 411-421. [5] Bagci, H. and Yazici, A., (2013)“An energy aware fuzzy approach to unequal clustering in wireless sensor networks,” Applied Soft Computing, vol. 13, no.4, pp.1741-1749. [6] Mittal, N., Singh, U. and Sohi, B.S., (2017)“A stable energy efficient clustering protocol for wireless sensor networks,”Wireless Networks, vol.23, no.6, pp.1809-1821. [7] Pachlor, R. and Shrimankar, D., (2018)“EEHCCP: an energy-efficient hybrid clustering communication protocol for wireless sensor network,” In Ad Hoc Networks, Springer, Cham, vol.223, pp. 199-207. [8] Wang, J., Niu, J., Wang, K. and Liu, W., (2018)“An energy efficient fuzzy cluster head selection algorithm for WSNs,” In IEEE International Workshop on Advanced Image Technology (IWAIT), pp. 1-4. [9] Tamandani, Y.K., Bokhari, M.U. and Shallal, Q.M., (2017)“Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs,” Wireless Networks, vol.23, no.6, pp.1889-1899. [10] Torghabeh, N. A., Totonchi, M. R. A. and Moghaddam, M. H. Y. “Cluster Head Selection using a Two-Level Fuzzy Logic in Wireless Sensor Networks,” In proc. 2nd IEEE Int. Conf. on Computer Engineering and Technology, China, 2010, pp.357–361. [11] Messaoudi, A., Elkamel, R., Helali, A. and Bouallegue, R.,“Distributed fuzzy logic based routing protocol for wireless sensor networks,” In proc. 24thIEEE Int. Conf. onSoftware, Telecommunications and Computer Networks (SoftCOM), 2016,pp. 1-7. [12] Arjunan, S. and Sujatha P., (2017)“A survey on unequal clustering protocols in Wireless Sensor Networks,”Journal of King Saud University-Computer and Information Sciences,vol. xx, PP.1-14. [13] Meikang, Q., Ming, Z., Li, J., Liu, J., Quan, G. and Zhu, Y., (2013)“Informer homed routing fault tolerance mechanism for wireless sensor networks,” Journal of Systems Architecture, vol. 59, pp.260-270, May. 2013. [14] Jain, N., Vokkarane, V.M. and Wang, J.P., “Performance analysis of dual-homed fault tolerant routing in wireless sensor networks,” In proc. IEEE Conf. on Technologies for Homeland Security, Waltham, 2008, pp. 474–479.
  • 13. [15] Abedi, R. H., Aslam, N. and Ghani, S., "Fault tolerance analysis of heterogeneous wireless sensor network," In proc. 24th IEEECanadian Conf. on Electrical and Computer Engineering, Canada, 2011, pp.175-179. [16] Akyildiz, F. and Vuran, C. Wireless sensor networks. 1st ed. Georgia, Institute of Technology, USA: John Wiley & Sons, 2010, pp.48-49. [17] Xiaoling, W., Cho, J., Brian, J. d. and Lee, S., "Energy-aware routing for wireless sensor networks by AHP," In IFIP Int. Workshop on Software Technologies for Embedded and Ubiquitous Systems, Springer Berlin Heidelberg, 2007, pp. 446-455. [18] Masdari, M. and Naghiloo, F., (2017)“Fuzzy Logic-Based Sink Selection and Load Balancing in Multi-Sink Wireless Sensor Networks,” Wireless Personal Communications, vol.97, no.2, pp.2713- 2739. [19] El Alami, H. and Najid, A., “March. Energy-efficient fuzzy logic cluster head selection in wireless sensor networks,” In proc.IEEE Int. Conf. on Information Technology for Organizations Development (IT4OD), 2016, pp. 1-7. [20] Agrawal, D. and Pandey, S., (2017)“FUCA: Fuzzy‐based unequal clustering algorithm to prolong the lifetime of wireless sensor networks,” International Journal of Communication Systems, vol.31, no.2, pp.1-18 [21] Shankar, T., Karthikeyan, A., Sivasankar, P., and Rajesh A., (2017)“Hybrid approach for optimal cluster head selection in WSN using leach and monkey search algorithms,” Journal of Engineering Science and Technology, vol.12, no.2, pp.506-517. [22] Adhikary, D.R.D. and Mallick, D.K., (2017)“An Energy Aware Unequal Clustering Algorithm using Fuzzy Logic for Wireless Sensor Networks,” Journal of ICT Research and Applications, vol.11, no.1, pp.55-76. [23] Sert, S.A., Bagci, H. and Yazici, A., (2015)“MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks,” Applied Soft Computing, vol.30, pp.151-165. [24] Logambigai, R. and Kannan, A., (2016)“Fuzzy logic based unequal clustering for wireless sensor networks,”Wireless Networks, vol.22, no.3, pp.945-957. AUTHOR GholamrezaKakamanshadi received the M.Tech. degree in Computer Engineering from BharatiVidyapeeth University, Pune, India, in 2012. He is currently pursuing his Ph.D. in the Department of CSE, University Institute of Engineering & Technology, Panjab University, Chandigarh, India. His research interests are Wireless sensor network, Body area network, Internet of Things and Network security.
  • 14. Savita Gupta received the B.Tech and M.E. degree in both Computer Science and Engineering. She obtained her Ph.D. degree in 2007 in the field of Medical Image Processing. She has been into the teaching profession since 1992 and has published more than 70 papers in refereed International Journals and conference proceedings. Presently, she is working as Director in the University Institute of Engineering & Technology, Panjab University, Chandigarh, India. She has completed various research projects funded by various agencies like DST, AICTE, and MHRD. Her research interests include Medical image processing, Wavelet based image compression and denoising, Network security and Wireless sensor networks. Sukhwinder Singh received the B.Tech degree in 1991 and M.E. degree in 1999. he obtained his Ph.D. degree in 2006 from IIT, Roorkee. Presently, he is working as a professor in the Department of CSE, University Institute of Engineering & Technology, Panjab University, Chandigarh, India. His research interests include Medical Image Processing and Analysis, Biomedical Signal Processing, Information Retrieval, Wireless Sensor Networks, Body Area Networks, Cognitive Enhancement, Machine Intelligence.
  • 15. PAPER -04 AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S Md. Khaja Mohiddin1 and V. B. S. Srilatha Indira Dutt2 1 Research Scholar, Department of ECE, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, India 2 Associate Professor, Department of ECE, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, India ABSTRACT In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform. KEYWORDS IEEE 802.15.4, AODV Protocol, Two Ray Ground Propagation Model, Mobility Error Prediction (MEP)Algorithm, Clustering Multi-Hop Routing (CMHR) Algorithm, Energy Consumption, End-to-End Delay; Throughput
  • 16. For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc04.pdf Volume Link: http://airccse.org/journal/ijc2019.html REFERENCES [1] Marwan Al-Jemeli and Fawnizu A. Hussin, (2015) “An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless Sensor Networks”, IEEE Sensor Journal, Vol. 10, No. 2, pp.684-692. [2] Md. Khaja Mohiddin and V.B.S. Srilatha Indira Dutt, (2017) “Minimization of Energy Consumption Using X-Layer Network Transformation Model for IEEE 802.15.4-Based MWSNs”, Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, Advances in Intelligent Systems and Computing, Vol. 515, pp741-751. [3] Md. Khaja Mohiddin and V.B.S. Srilatha Indira Dutt, (2017) “An Efficient Energy Optimization XLN Operation Model for IEEE 802.15.4-Based Mobile WSNs”, International Journal of Control Theory and Applications, Vol. 10, No. 9, pp255-264. [4] Sudhakar Pandey and Deepika Agrawal, (2017) “An ED-Based Enhanced Energy Efficient Cross Layer Model for Mobile Wireless Sensor Network”, National Academic Science Letter, Vol. 40, No. 6, pp421-427. [5] K. Lalitha, R. Thangarajan, Siba K. Udgata, C. Poongodi and Ambika Prasad Sahu, (2017) “GCCR: An Efficient Grid Based Clustering and Combinational Routing in Wireless Sensor Networks”, Wireless Personal Communication, Vol. 97, pp1075-1095. [6] Kartinah Zen, Daryoush Habibi, Alexander Rassau and Iftekhar Ahmad, (2008) “Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Networks”, 5th IFIP International Conference on Wireless and Optical Communications Networks, pp1-5. [7] Xinbing Wang, Xiaojun Lin, Qingsi Wang and Wentao Luan, (2013) “Mobility Increases the Connectivity of Wireless Networks”, IEEE/ACM transactions on networking, Vol. 21, No. 2. [8] SamerA. B.Awwad, CheeKyun Ng, NorK.Noordin and Mohd. Fadlee A. Rasid, (2010) “Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network”, Wireless Personal Communications, Vol. 61, pp251-281. [9] Tao Yang, Tetsuya Oda, Leonard Barolli, Jiro Iwashige, Arjan Durresi and Fatos Xhafa, (2012) “Investigation of Packet Loss in Mobile WSNs for AODV Protocol and Different Radio Models”, 26th IEEE International Conference on Advanced Information Networking and Applications, pp709- 715. [10] Tommaso Melodia, Dario Pompili and Ian F. Akyildiz, (2010) “Handling Mobility in Wireless Sensor and Actor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 2, pp160-173. [11] Woo-Yong Lee, Kyeong Hur and Doo-Seop Eom, (2008) “Navigation of Mobile Node in Wireless Sensor Networks without Localization”, Proceedings of IEEE International Conference on Multi- sensor Fusion and Integration for Intelligent Systems, pp1-7.
  • 17. [12] Shibo He, Jiming Chen, David K.Y. Yau and Youxian Sun, (2012) “Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 11, No. 11, pp1678-1691. [13] Mehmet C. Vuran and Ian F. Akyildiz, (2010) “XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 11, pp1578-1591. [14] Jianping Wang, Deying Li, Guoliang Xing and Hongwei Du, (2010) “Cross- Layer Sleep Scheduling Design in Service-Oriented Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 11, pp1622-1633. [15] Emad Felemban, Serdar Vural, Robert Murawski, Eylem Ekici, Kangwoo Lee, Youngbag Moon and Sangjoon Park, (2010) “SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas”, IEEE Transactions on Mobile Computing, Vol. 9, No. 8, pp1072-1088. [16] Pangun Park, Carlo Fischione, Alvise Bonivento, Karl Henrik Johansson and Alberto L. Sangiovanni- Vincentelli, (2011) “Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 10, No. 6, pp821-838. [17] Liqi Shi and Abraham O. Fapojuwo, (2010) “TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 7, pp927-940. [18] Hsueh-Wen Tseng, Shan-Chi Yang, Ping-Cheng Yeh and Ai-Chun Pang, (2011) “A Cross-Layer Scheme for Solving Hidden Device Problem in IEEE 802.15.4 Wireless Sensor Networks”, IEEE Sensor Journal, Vol. 11, No. 2, pp493-504. [19] F. Yu, S. Park, E. Lee and S.-H. Kim, (2009) “Elastic routing: a novel geographic routing for mobile sinks in wireless sensor networks”, IET Communications, Vol.4, No.6. pp716-727. [20] Yuan-Yao Shih, Wei-Ho Chung, Pi-Cheng Hsiu and Ai-Chun Pang, (2013) “A Mobility-Aware Node Deployment and Tree Construction Framework for ZigBee Wireless Networks”, IEEE Transactions on Vehicular Technology, Vol. 62, No. 6, pp2763-2779. [21] S. Deng, J. Li and L. Shen, (2011) “Mobility-Based Clustering Protocol for Wireless Sensor Networks with Mobile Nodes”, IET Wireless Sensor Systems, Vol. 1, No. 1, pp39-47. [22] L. Karim and N. Nasser, (2012) “Reliable location-aware routing protocol for mobile wireless sensor network”, IET Communications, Vol. 6, No. 14, pp2149-2158. [23] Bashir Yahya and Jalel Ben-Othman, (2009) “An Energy Efficient and QoS Aware Multipath Routing Protocol for Wireless Sensor Networks”, IEEE 34th Conference on Local Computer Networks. [24] Debnath Bhattacharyya, Tai-hoon Kim and Subhajit Pal, (2010) “A Comparative Study of Wireless Sensor Networks and their Routing Protocols”, Sensors, pp10506-10523. [25] Subhajit Pal, Debnath Bhattacharyya, Geetam S. Tomar and Taihoon Kim, (2010) “Wireless Sensor Networks and its Routing Protocols: A Comparative Study”, International Conference on Computational Intelligence and Communication Networks, pp314-319. [26] Dilip D. Chaudhary and Dr. L. M. Waghmare, (2013) “Energy Efficiency and Latency Improving Protocol for Wireless Sensor Networks”, International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp1303-1308. [27] Giuseppe Anastasi, Marco Conti and Mario Di Francesco, (2011) “A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks”, IEEE Transactions on Industrial Informatics, Vol. 7, No. 1.
  • 18. [28] Martin Enzinger, (2012) “Energy-Efficient Communication in Wireless Sensor Networks”, Network Architectures and Services, pp25-31. [29] Jun Yu and Xueying Zhang, (2015) “A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines”, Journal of Sensors, pp1-13. [30] Mounib Khanafer, Mouhcine Guennoun, and Hussein T. Mouftah, (2011) “A Survey of Beacon- Enabled IEEE 802.15.4 MAC Protocols in Wireless Sensor Networks”, IEEE Communications Surveys & Tutorials, Vol. 16, No. 2, pp856-876. [31] Asma Mesmoudi, Mohammed Feham and Nabila Labraoui, (2013) “Wireless Sensor Networks Localization Algorithms: A Comprehensive Survey”, International Journal of Computer Networks & Communications (IJCNC), Vol. 5, No. 6, pp45-64. [32] Haithem Ben Chikha, Amira Makhlouf and Wiem Ghazel, (2000) “Performance Analysis of AODV and DSR Routing Protocols for IEEE 802.15.4/Zig-Bee”. [33] Wu Youjun and Nie Jingnan, (2000) “Performance Evaluation for Cross-Layer AODV Protocol in CDMA-Based Ad-Hoc Networks”, Funded by National Natural Science Foundation of China (60503049) and by the open research fund of National Mobile Communications Research Laboratory, Southeast University (N200602). [34] Mario Di Francesco, Giuseppe Anastasi, Marco Conti, Sajal K. Das, and Vincenzo Neri, (2011) “Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks: An Adaptive and Cross-Layer Approach”, IEEE Journal on Selected Areas in Communications, Vol. 29, No. 8, pp1508-1524. [35] Kiran Maraiya, Kamal Kant and Nitin Gupta, (2011) “Application based Study on Wireless Sensor Network”, International Journal of Computer Applications, Vol. 21, No. 8, pp9-15. [36] Marco Cattani, S¸ tefan Guna and Gian Pietro Picco, (2011) “Group Monitoring in Mobile Wireless Sensor Networks”, IEEE. [37] Chih-Min Chao and Hsin-Hsiang Wang, (2004) “The Bottleneck Problem in Large Scale IEEE 802.15.4/ZigBee Networks”, International Journal of Signal and Imaging Systems Engineering, pp1- 17. [38] Norrozila Sulaiman, Ghaidaa M. Abdulsahib, Osamah I. Khalaf and Muamer N. Mohammed, (2014) “Effect of Using Different Propagation’s on Performance of OLSR and DSDV Routing Protocols”, 5th International Conference on Intelligent Systems, Modeling and Simulation, pp540- 545. [39] Divya Upadhyay, P. Banerjee and A.L.N Rao, (2014) “Critical Performance Comparison of On- Demand Routing Protocols for Optimal Application in Wireless Sensor Network”, 5th International Conference- Confluence The Next Generation Information Technology Summit, pp462-466. [40] Francesca Cuomo, Anna Abbagnale and Emanuele Cipollone, (2011) “Crosslayer network formation for energy-efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks”, Ad Hoc Networks (Elsevier), pp1-15. .
  • 19. AUTHORS Md. Khaja Mohiddin received his B. Tech Degree in Electronics and Communication Engineering from Al-Ameer College of Engineering & Information Technology affiliated to JNTU, Andhra Pradesh, India, in 2009, M.Tech. Degree in Digital Electronics & Communication Systems from Chaitanya Engineering College affiliated to JNTU, Andhra Pradesh, India, in 2012. He is currently pursuing the Ph.D. in Wireless Sensor Network from GITAM University, Visakhapatnam, Andhra Pradesh, India. He is currently working as an Assistant Professor in the Department of Electronics and Telecommunication Engineering, Bhilai Institute of Technology, Raipur, (C.G.). V. B. S. Srilatha Indira Dutt received her B. Tech. Degree in Electronics and Communication Engineering from Nagarjuna University, Andhra Pradesh, India, in 1994, M. Tech. Degree in Radar and Microwave Engineering from Andhra University, Andhra Pradesh, India, in 2007. She was awarded with Ph.D. degree in Global Positioning System from the Andhra University, Andhra Pradesh, India, in 2011. She is currently working as an Associate Professor in the Department of Electronics and Communication Engineering, GITAM Institute of Technology, GITAM University (GITAM), Visakhapatnam, Andhra Pradesh, India. Her research interests include Global Positioning System, Satellite Signal processing and Mobile Communications. She published more than 40 research papers in referred international journals, and international and national conferences.
  • 20. PAPER -05 A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION Shafali Agarwal Plano, Texas 75025, USA ABSTRACT This paper proposes a fractal-based image encryption algorithm which follows permutation- substitution structure to maintain confusion and diffusion properties. The scheme consists of three phases: key generation process; pixel permutation using the Knuth shuffle method; and the dynamic diffusion of scrambled image. A burning ship fractal function is employed to generate a secret key sequence which is further scanned using the Hilbert transformation method to increase the randomness. The chaotic behavior of the fractal strengthens the key sensitivity towards its initial condition. In the permutation phase, the Knuth shuffle method is applied to a noisy plain image to change the index value of each pixel. To substitute the pixel values, a dynamic diffusion is suggested in which each scrambled pixel change its value by using the current key pixel and the previously ciphered image pixel. To enhance the security of the cryptosystem, the secret key is also modified at each encryption step by performing algebraic transformations. The visual and numerical analysis demonstrates that the proposed scheme is reliable to secure transmission of gray as well as color images. KEYWORDS Burning ship fractal, Knuth shuffle method, Image encryption, Hilbert transformation, dynamic diffusion For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc05.pdf Volume Link: http://airccse.org/journal/ijc2019.html
  • 21. REFERENCES [1] C. A. Pickover, Computers, Pattern, Chaos, and Beauty: Graphics from an Unseen World. Courier Corporation, 2001. [2] B. B. Mandelbrot, The fractal geometry of nature, vol. 173. WH freeman New York, 1983. [3] B. Howell, A. Reese, and M. Basile, “Fractal Cryptology,” New Mexico High School, Supercomputing Challenge Final Report, 2003. [4] G. B. Huntress, “Encryption using a fractal key,” US6782101 B1, 24-Aug-2004. [5] M. Ivo, R. Jasek, and P. Varacha, “Analysis of the Fractal Structures For the Information Encrypting Process,” International Journal of Computers, vol. 6, no. 4, pp. 224–231, 2012. [6] R. M. Crownover, Introduction to fractals and chaos. Jones and Bartlett, 1995. [7] M. Alia and A. Samsudin, “A new public-key cryptosystem based on mandelbrot and julia fractal sets,” Asian Journal of Information Technology, AJIT, vol. 6, no. 5, pp. 567–575, 2007. [8] V. Rozouvan, “Modulo image encryption with fractal keys,” Optics and Lasers in Engineering, vol. 47, no. 1, pp. 1–6, 2009. [9] A. Chopra, M. Ahmad, and M. Malik, “An enhanced modulo-based image encryption using chaotic and fractal keys,” in Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in, 2015, pp. 501–506 . [10] S. Kumar, “Public Key Cryptographic System Using Mandelbrot Sets,” in MILCOM 2006 - 2006 IEEE Military Communications conference, 2006, pp. 1–5. [11] Y. Sun, L. Chen, R. Xu, and R. Kong, “An image encryption algorithm utilizing Julia Sets and Hilbert Curves,” PloS one, vol. 9, no. 1, p. e84655, 2014. [12] Y. Sun, R. Kong, X. Wang, and L. Bi, “An image encryption algorithm utilizing Mandelbrot set,” in Chaos-Fractals Theories and Applications (IWCFTA), 2010 International Workshop on, 2010, pp. 170–173 . [13] S. Sattari, A. Akkasi, R. A. Lari, and M. Khodaparasti, “Cryptography in social networks using wavelet transform, fractals and chaotic functions,” International Research Journal of Applied and Basic Sciences, Science Explorer Publications, ISSN, pp. 1627–1635, 2015. [14] H. Kashanian, M. Davoudi, and H. Khorramfar, “Image Encryption using chaos functions and fractal key,” International Journal of Computer Science and Network Security (IJCSNS), vol. 16, no. 10, p. 87, 2016. [15] Q. Zhang, S. Zhou, and X. Wei, “An efficient approach for DNA fractal-based image encryption,” Appl. Math. Inf. Sci, vol. 5, pp. 445–459, 2011. [16] M. Mikhail, Y. Abouelseoud, and G. ElKobrosy, “Two-Phase Image Encryption Scheme Based on FFCT and Fractals,” Security and Communication Networks, 2017. [Online]. Available: https://www.hindawi.com/journals/scn/2017/7367518/abs/. [Accessed: 09-Nov-2017].
  • 22. [17] H. Oğraş and M. Türk, “A Robust Chaos-Based Image Cryptosystem with an Improved Key Generator and Plain Image Sensitivity Mechanism,” Journal of Information Security, vol. 08, no. 01, pp. 23–41, 2017. [18] S. K. Abd-El-Hafiz, A. G. Radwan, S. H. A. Haleem, and M. L. Barakat, “A fractal-based image encryption system,” IET Image Processing, vol. 8, no. 12, pp. 742–752, May 2014. [19] S. H. AbdElHaleem, A. G. Radwan, and S. K. Abd-El-Hafiz, “Design of pseudo random keystream generator using fractals,” in 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 2013, pp. 877–880. [20] S. Agarwal, “Secure Image Transmission Using Fractal and 2D-Chaotic Map,” Journal of Imaging, vol. 4, no. 1, p. 17, 2018. [21] J. Shaw, O. Saha, and A. Chaudhuri, “An Approach for Secured Transmission of Data using Fractal based Chaos,” in IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing, 2012, pp. 13–17. [22] Y. Sun, R. Xu, L. Chen, and X. Hu, “Image compression and encryption scheme using fractal dictionary and Julia set,” IET Image Processing, vol. 9, no. 3, pp. 173–183, 2014. [23] S. Zhu, C. Zhu, and W. Wang, “A novel image compression-encryption scheme based on chaos and compression sensing,” IEEE Access, vol. 6, pp. 67095–67107, 2018. [24] K. Faraoun, “Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption.,” Int. Arab J. Inf. Technol., vol. 7, no. 3, pp. 231–240, 2010. [25] A. M. Meligy, H. A. Diab, and M. S. El-Danaf, “Chaos Encryption Algorithm using Key Generation from Biometric Image,” International Journal of Computer Applications, vol. 149, no. 11, 2016. [26] S. M. Hussain and H. Al-Bahadili, “A DNA-Based Cryptographic Key Generation Algorithm.” [27] Y. Li, C. Wang, and H. Chen, “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation,” Optics and Lasers in Engineering, vol. 90, pp. 238–246, 2017. [28] M. Ahmad, M. N. Doja, and M. S. Beg, “Security analysis and enhancements of an image cryptosystem based on hyperchaotic system,” Journal of King Saud University-Computer and Information Sciences, 2018. [29] C. Fu, G. Zhang, M. Zhu, Z. Chen, and W. Lei, “A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy,” Security and Communication Networks, vol. 2018, 2018. [30] S. Sun, “A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling,” IEEE Photonics Journal, vol. 10, no. 2, pp. 1–14, 2018. [31] Q. Yin and C. Wang, “A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion,” International Journal of Bifurcation and Chaos, vol. 28, no. 04, p. 1850047, 2018. [32] S. Hammami, “State feedback-based secure image cryptosystem using hyperchaotic synchronization,” ISA transactions, vol. 54, pp. 52–59, 2015.
  • 23. [33] X. Wang, X. Zhu, and Y. Zhang, “An image encryption algorithm based on Josephus traversing and mixed chaotic map,” IEEE Access, vol. 6, pp. 23733–23746, 2018. [34] Z. Hua, B. Xu, F. Jin, and H. Huang, “Image Encryption Using Josephus Problem and Filtering Diffusion,” IEEE Access, vol. 7, pp. 8660–8674, 2019. [35] X. Huang and G. Ye, “An Image Encryption Algorithm Based on Time-Delay and Random Insertion,” Entropy, vol. 20, no. 12, p. 974, 2018. [36] Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image encryption,” Information Sciences, vol. 480, pp. 403–419, 2019. [37] M. Alawida, A. Samsudin, J. S. Teh, and R. S. Alkhawaldeh, “A new hybrid digital chaotic system with applications in image encryption,” Signal Processing, vol. 160, pp. 45–58, 2019. [38] M. Asgari-Chenaghlu, M.-A. Balafar, and M.-R. Feizi-Derakhshi, “A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation,” Signal Processing, vol. 157, pp. 1–13, 2019. [39] H. J. Yakubu, E. G. Dada, S. B. Joseph, and A. K. Anukem, “A New Chaotic Image Encryption Algorithm for Digital Colour Images Using Rabinovich-Fabrikant Equations,” International Journal of Computer Science and Information Security (IJCSIS), vol. 17, no. 1, 2019. [40] Z. Tang, Y. Yang, S. Xu, C. Yu, and X. Zhang, “Image Encryption with Double Spiral Scans and Chaotic Maps,” Security and Communication Networks, vol. 2019, 2019 . [41] B. B. Mandelbrot, “Fractal aspects of the iteration of z→ Λz (1-z) for complex Λ and z,” Annals of the New York Academy of Sciences, vol. 357, no. 1, pp. 249–259, 1980. [42] M. Michelitsch and O. E. Rössler, “Spiral structures in Julia sets and related sets,” in Spiral symmetry, World Scientific, 1992, pp. 129–134. [43] M. Michelitsch and O. E. Rössler, “The ‘burning ship’ and its quasi-Julia sets,” Computers & graphics, vol. 16, no. 4, pp. 435–438, 1992. [44] S. Agarwal and A. Negi, “INVENTIVE BURNING SHIP,” International Journal of Advances in Engineering & Technology, vol. 6, no. 4, p. 1788, 2013. [45] S. Agarwal and A. Negi, “Burning Ship and Its Quasi Julia Images Using Mann Iteration,” in Recent Advances in Intelligent Informatics, Springer, 2014, pp. 401–410. [46] T. Sivakumar and R. Venkatesan, “Image encryption based on pixel shuffling and random key stream,” International Journal of Computer and Information Technology, vol. 3, no. 06, 2014. [47] T. K. Hazra and S. Bhattacharyya, “Image encryption by blockwise pixel shuffling using Modified Fisher Yates shuffle and pseudorandom permutations,” in Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2016 IEEE 7th Annual, 2016, pp. 1–6. [48] N. D. Gagunashvili, “Chi-square tests for comparing weighted histograms,” Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, vol. 614, no. 2, pp. 287–296, 2010. [49] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 08, pp. 2129–2151, 2006.
  • 24. [50] C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. [51] Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), pp. 31–38, 2011. [52] Y. Wu, Y. Zhou, J. P. Noonan, and S. Agaian, “Design of image cipher using latin squares,” Information Sciences, vol. 264, pp. 317–339, 2014. [53] J. Wu, X. Liao, and B. Yang, “Image encryption using 2D Hénon-Sine map and DNA approach,” Signal Processing, vol. 153, pp. 11–23, 2018. AUTHOR Shafali Agarwal has received MCA degree from UPTU, Lucknow in 2004 and M.Phil in Computer Science from Alagappa University, Karaikudi, Tamil Nadu in 2013. She got her Ph.D. in Computer Science from Singhania University, India in 2014. She has served as a faculty member in the Department of Computer Applications in JSSATE, Noida till June 2016. She has published more than 15 research papers in various International journals and conferences indexed in Scopus, Emerging Sources Citation Index, Springer, ACM, Thomson Reuters, google scholar and in many more. She was awarded a best paper presentation award in a conference ICVISP held in Las Vegas, USA. Her research interest includes fractal, cryptography and image processing.
  • 25. PAPER -06 LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS B.Prabadevi1 , N.Jeyanthi1 , Nur Izura Udzir2 and Dhinaharan Nagamalai3 1 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India 2 Department of Computer Science, Universiti Putra Malaysia, Malaysia 3 Wireilla Net Solutions, Australia ABSTRACT Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks. KEYWORDS Sniffing, Sensitive Data, Intrusion Detection, DDoS, Lattice Structure; For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc05.pdf Volume Link: http://airccse.org/journal/ijc2019.html
  • 26. REFERENCES [1] B. Prabadevi and N. Jeyanthi, "Distributed Denial of service attacks and its effects on Cloud environment- a survey," The 2014 International Symposium on Networks, Computers and Communications, Hammamet, 2014, pp. 1-5. doi: 10.1109/SNCC.2014.6866508. [2] B.Prabadevi and Jeyanthi.N,” A Review on Various Sniffing Attacks and its Mitigation Techniques”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 12, No. 3, pp.1117~1125, 2018. [3] Lithuanian national Computer Emergency Response Team, “CERT-LT activity report,” CERT, Lithuania, 2018, [Online]. Available: https://www.cert.lt/en/statistics.html. [4] Candid Wueest. “Security Response: The continued rise of DDoS attacks” Symantec. White paper. 1.0, 2014.[ Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the- continued-rise-of-ddos-attacks.pdf [5] Anu, P., and S. Vimala. "A survey on sniffing attacks on computer networks." In 2017 International Conference on Intelligent Computing and Control (I2C2), pp. 1-5. IEEE, 2017. [6] N. M. Prajapati, A. Mishra and P. Bhanodia, “Literature survey - IDS for DDoS attacks,” in Proceedings of 2014 Conference on IT in Business, Industry and Government (CSIBIG), Indore, 2014, pp. 1-3. doi: 10.1109/CSIBIG.2014.7056943. [7] Anupama Mishra, B. B. Gupta, & R. C. Joshi, “A Comparative study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques,” in Proceedings of European Intelligence and Security Informatics Conference, Athens, Greece, 2011, pp. 286-289. [8] A. Barth, J. Caballero and D. Song, “Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves,” in Proceedings of 2009 30th IEEE Symposium on Security and Privacy, Berkeley, CA, 2009, pp. 360-371. [9] A. Barua, H. Shahriar and M. Zulkernine, "Server-Side Detection of Content Sniffing Attacks," in Proceedings of 2011 IEEE 22nd International Symposium on Software Reliability Engineering, Hiroshima, 2011, pp. 20-29. [10] Syed Imran Ahmed Qadri & Kiran Pandey, “Tag-Based Client-Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique,” International Journal of Advanced Computer Research, vol.2, no.5, pp. 215-221, 2012. [11] P. Arote and K. V. Arya, "Detection and Prevention against ARP Poisoning Attack Using Modified ICMP and Voting," in Proceedings of 2015 International Conference on Computational Intelligence and Networks, Bhubaneshwar, 2015, pp. 136-141. [12] H. Salim, Z. Li, H. Tu and Z. Guo, "Preventing ARP Spoofing Attacks through Gratuitous Decision Packet," in Proceedings of 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science, Guilin, 2012, pp. 295-300. [13] P. Pandey, "Prevention of ARP spoofing: A probe packet based technique," 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, 2013, pp. 147-153. [14] Imtiyaz Ahmad lone and Md. Ataullah, “A Survey on Various Solutions of ARP Attacks,” International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, no.2, pp. 299- 303, 2013. [15] Kulshrestha, A. and Dubey, S.K. (2014) A Literature Review on Sniffing Attacks in Computer Network. International Journal of Advanced Engineering Research and Science, 1, 2.
  • 27. [16] Abdul Nasir Khan, Kalim Qureshi and Sumair Khan, “An Intelligent Approach of Sniffer Detection,” The International Arab Journal of Information Technology, vol.9, no.1, pp.9-15, 2012. [17] Mahjabin, Tasnuva, Yang Xiao, Guang Sun, and Wangdong Jiang. "A survey of distributed denial-of- service attack, prevention, and mitigation techniques." International Journal of Distributed Sensor Networks 13, no. 12 (2017): 1550147717741463. [18] Shaun Waterman. “DDoS attacks are growing faster in size, complexity—arbor report, 2017”, http://edscoop.com/ddos-attacks-growing-faster-in-size-complexity-arbor-report (accessed 10 March 2017. [19] Arbor Networks’ 12th Annual Worldwide Infrastructure Security Report Finds Attacker Innovation and IoT Exploitation Fuel DDoS Attack Landscape, 2017. [20] NETSCOUT Arbor Special Report, “Insight Into The Global Threat Landscape”, NETSCOUT Arbor’s 13th Annual Worldwide Infrastructure Security Report, https://pages.arbornetworks.com/rs/082-KNA 087/images/13th_Worldwide_Infrastructure_Security_Report.pdf2017. [21] “DDoS Attack Size Explodes Worldwide: SaaS and Cloud Services Increasingly Targeted- NETSCOUT 14th annual WISR report”, https://www.netscout.com/press-releases/netscout-releases- 14th-annual-worldwide-infrastructure, 19th March, 2019. [22] Animesh Dubey, Ravindra Gupta and Gajendra Singh Chandel, “An Efficient Partition Technique to reduce the Attack Detection Time with Web-based Text and PDF files,” International Journal of Advanced Computer Research (IJACR), vol. 3, no.9, pp.80-86, 2013. [23] Shweta Pandey and Abhishek Singh Chauhan, “Secure Content Sniffing For Web Browsers: A Survey,” International Journal of Advanced Research in Computer and Communication Engineering, vol.2, no.9, pp.3595 – 3601, 2013. [24] S. Ford, M. Cova, C. Kruegel, and G. Vigna. “Analyzing and Detecting Malicious Flash Advertisements,” in Proceedings of Annual Computer Security Applications Conference ACSAC, Honolulu, Hawaii, 2009, pp.363-372. [25] H. Shahriar and M. Zulkernine, "PhishTester: Automatic Testing of Phishing Attacks," in Proceedings of 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement, Singapore, 2010, pp. 198-207. [26] M. Khonji, Y. Iraqi and A. Jones, "Mitigation of spear phishing attacks: A Content-based Authorship Identification framework," in Proceedings of 2011 International Conference for Internet Technology and Secured Transactions, Abu Dhabi, 2011, pp. 416-421. [27] H. Shahriar and M. Zulkernine, "Injecting Comments to Detect JavaScript Code Injection Attacks," in Proceedings of 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops, Munich, 2011, pp. 104-109. [28] Misganaw Tadesse Gebre, Kyung-Suk Lhee and ManPyo Hong, "A robust defence against Content- Sniffing XSS attacks," in Proceedings of 6th International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, 2010, pp. 315-320. [29] Sadeghian, Amirmohammad, Mazdak Zamani, and Suhaimi Ibrahim, "SQL injection is still alive: a study on SQL injection signature evasion techniques," in Proceedings of International Conference on Informatics and Creative Multimedia (ICICM), 2013, pp. 265-268. IEEE, 2013. [30] Samvedi, Abhishek, Sparsh Owlak, and Vijay Kumar Chaurasia. "Improved Secure Address Resolution Protocol." arXiv preprint arXiv:1406.2930 (2014).
  • 28. [31] Jean-Paul Tremblay & R Manohar, “Discrete mathematical structures with applications to computer science,” New Delhi, India, Tata McGraw-Hill, 1997. [32] B.Prabadevi and N.Jeyanthi, A framework to mitigate ARP Sniffing attacks by Cache Poisoning,” Int. J. Advanced Intelligence Paradigms, vol.10, no.1/2, pp.146-159, 2018. [33] D. Plummer, An Ethernet Address Resolution Protocol - or - Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware", RFC-826, MIT, November,1982. [34] D. Bruschi, A. Ornaghi and E. Rosti, "S-ARP: a secure address resolution protocol," in Proceedings of 19th Annual Computer Security Applications Conference, 2003, pp. 66-74. [35] Lootah, W., Enck, W., and McDaniel, P. “TARP: Ticket-based address resolution protocol,” Computer Networks, vol. 51, no.15, pp.4322-4337, 2007. [36] S. Y. Nam, D. Kim and J. Kim, "Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks," in IEEE Communications Letters, vol. 14, no. 2, pp. 187-189, February 2010. [37] Dangol, S. Selvakumar, and M. Brindha, “Genuine ARP (GARP)”, ACM SIGSOFT Softw. Eng. Notes, vol. 36, no. 4, pp. 1, 2011. [38] Kumar, S. and Tapaswi, S., “A centralized detection and prevention technique against ARP poisoning,” in Proceedings of 2012 IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 259-264, 2012. PAPER -07
  • 29. APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE ACCESS CONTROL IN THE CLOUD Abu Salim1 , Sachin Tripathi2 and Rajesh Kumar Tiwari3 1 Department of Computer Science, College of CS & IT, Jazan University, Jazan, Kingdom of Saudi Arabia (KSA) 2 Department of Computer Science Engineering, Indian Institute of Technology, Dhanbad, Jharkhand, India 3 Department of Computer Science and Engineering, RVS College of Eng. & Tech., Jamshedpur, Jharkhand, India ABSTRACT Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location. KEYWORDS Cloud Computing, Secure Access Control, Security issues, Cryptography, Geo Encryption, Attribute-Based Encryption, CP- ABE. For More Details: http://aircconline.com/ijcnc/V11N4/11419cnc07.pdf Volume Link: http://airccse.org/journal/ijc2019.html REFERENCES
  • 30. [1] Sadiku M.,Musa S., Momoh O., “Cloud computing: opportunities and challenges,” IEEE Potentials ,pp. 34–36,2014. [2] Juels A., Burton J., Kaliski S., “Pors: proofs of retrievability for large files,” in: Proc. of ACM CCS, Alexandria, VA, October 2007. [3] Ateniese G. at el. “Provable data possession at untrusted stores,” Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, November 02- October 31, 2007. [4] The NIST Definition of Cloud Computing: https://www.nist.gov/sites/default/files/documents/itl/ cloud/cloud-def-v15.pdf. Accessed on 05 Sep 2017. [5] Chandran N., Arulkumar S.,“Utilization of Random Key and Sobel Filter Based Edge Detection for Secure Data Transmission,” IJIRCCE, Vol. 1, Issue 10, pp. 2376-2380, 2013. [6] Dimitrios Z., Dimitrios L., “Addressing cloud computing security issues,” Future Generation Computer Systems, Vol. 28, Issue 3,pp. 583–592, 2012 [7] Stallings W., Cryptography and Network Security: Principles and Practice, 6th edition, Pearson Education. [8] Mandal P.C., “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish,” Journal of Global Research in Computer Science, Volume 3, No. 8,pp. 67-70, 2012. [9] Bethencourt J, Sahai A, Waters B., “Ciphertext-policy attribute-based Encryption,” IEEE Symposium on Security and Privacy, 2007. [10] Sahai A., Waters B., “Fuzzy identity-based encryption,” In EUROCRYPT, pp. 457-473, 2005. [11] Chandran N. at el.,“Advances in Cryptology. CRYPTO 2009 Lecture Notes in Computer Science,” Volume 5677, pp 391-407, 2009. [12] https://www.novatel.com/tech-talk/velocity/velocity-2013/understanding-the-difference- between-anti-spoofing-and-anti-jamming/ , Accessed on 20-04-2019. [13] Hong H, Sun Z , “Achieving secure data access control and efficient key updating in mobile multimedia sensor networks”. Multimedia Tools and Applications 77(4):4477–4490, 2018. [14] Qiu S, Liu JQ, Shi YF et al . “ Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack”. Volume 8880 of the series Lecture Notes in Computer Science. Inf Syst Secure 60:052105,2017. [15] Li LF, Chen XW, Jiang H et al. “ P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds”. 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/ Distributed Computing (SNPD), 575-580, 2016 [16] Scott L., Dorothy E. Denning, “Location Based Encryption & Its Role in Digital Cinema Distribution”, Proceedings of ION GPS/GNSS , pp. 288-297, 2003. [17] Fuqaha A., Ibrahim O.,” Geo-encryption protocol for mobile networks,” Computer Communications, pp. 2510–2517, 2007. [18] Firoozjaei MD., Vahidi J, “Implementing Geo-encryption in GSM Cellular Network,” IEEE,pp. 299- 302,2012 [19] Reddy P., Sudha KR., Sanyasi P., “A Modified Location-Dependent Image Encryption for Mobile Information System,” IJEST,pp. 1060-1065,2010. AUTHORS
  • 31. Sachin Tripathi received his M.Tech & PhD degree from IIT (ISM) Dhanbad. He joined Indian School of Mines, Dhanbad on 21st November 2005 and currently he is working as Associate Professor in the Department of Computer Science and Engineering. Before that he joined, Haldia Institute of Technology, Haldia, West Bengal, in July 2005, as a Lecturer in the Department of Computer Science and Engineering. His reserch interest is focussed on Computer Networks, Internet multicasting applications, Mobile IP. Rajesh Kumar Tiwari received his MCA from Nagpur University in 2002 and PhD in the field of Data Security form Birla Institute of Technology, Ranchi in the year 2010. Currently, he Professor and Head of Department Computer Science and Engineering at R.V.S. College of Engineering and Technology, Jamshedpur, Jharkhand, India. His research is focused on data security, network security, cloud computing and database management system. Abu Salim received his B.Tech (CSE) from Dr. RML Avadh University, Faizabad in 2003 and M.Tech from JNTU Kakinada in 2009. Currently he is pursuing PhD from IIT (ISM) Dhanbad as Part Time Research Scholar and working as Lecturer in the Jazan University, KSA. His research is focused on data security, network security and cloud computing.