SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Top Read Articles in Wireless&
Mobile Networks
International Journal of Wireless & Mobile
Networks (IJWMN)
ISSN: 0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR
NETWORKS USING DUTY CYCLE TECHNIQUE AND MULTI-HOP
ROUTING
Ali Sedighimanesh1, Mohammad Sedighimanesh2 and Javad Baqeri3
1,2,3 Department of Electrical, Computer and It Engineering, Islamic Azad University of
Qazvin
ABSTRACT
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment
and sending collected data to the sink. The most significant issues in wireless sensor
networks, despite the recent progress is the trouble of the severe limitations of energy
resources.Since that in different applications of sensor nets, we could throw a static or mobile
sink, then all aspects of such networks should be planned with an awareness of energy.One of
the most significant topics related to these networks, is routing. One of the most widely used
and efficient methods of routing isa hierarchy (based on clustering) method. In The present
study with the objective of cutting down energy consumption and persistence of network
coverage, we have offered a novel algorithm based on clustering algorithms and multihop
routing.To achieve this goal, first, we layer the network environment based on the size of the
network.We will identify the optimal number of cluster heads and every cluster head based
on the mechanism of topology control will start to accept members.Likewise, we set the first
layer as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the
sensors and then stop using energy and the remaining nodes in this layer will join the gate’s
nodes because they hold a critical part in bettering the functioning of the system. Cluster
heads off following layers send the information to cluster heads in the above layer until sent
data will be sent to gate’s nodes and finally will be sent to sink. We have tested the proposed
algorithm in two situations 1) when the sink is off and 2)when a sink is on and simulation
data shows that proposed algorithm has better performance in terms of the life span of a
network than LEACH and ELEACH protocols.
KEYWORDS
Wireless sensor networks, Lifetime, Hierarchical clustering, Hierarchical Routing, Cluster
Topology.
Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn02.pdf
Volume Link: https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] L. Borges, F. Velez, and A. Lebres, “Survey on the Characterization and Classification of
Wireless Sensor Networks Applications,” IEEE Communications Surveys & Tutorials, vol.
XX, no. X. pp. 1–1, 2014.
[2] H. Asharioun, H. Asadollahi, T.-C. Wan, and N. Gharaei, “A Survey on Analytical
Modeling and Mitigation Techniques for the Energy Hole Problem in Corona-Based Wireless
Sensor Network,” Wirel. Pers. Commun., vol. 81, no. 1, pp. 161–187, 2015.
[3] F. Shaukat, “A Survey on Testing Network Applications and Protocols,” vol. 2, no. 02.
pp. 316–325, 2015.
[4] G. Sara and D. Sridharan, “Routing in mobile wireless sensor network: a survey,”
Telecommun. Syst., vol. 57, no. 1, pp. 51–79, 2014.
[5] R. C. Carrano, D. Passos, L. C. S. Magalhaes, and C. V. N. Albuquerque, “Survey and
Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” Communications
Surveys & Tutorials, IEEE, vol. 16, no. 1. pp. 181–194, 2014.
[6] “Energy-efficient routing protocols in wireless sensor networks A survey 2013.”.
[7] G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, “Management and applications of trust
in Wireless Sensor Networks: A survey,” Journal of Computer and System Sciences, vol. 1.
pp. 1–16, 2013.
[8] S. A. Sert, H. Bagci, and A. Yazici, “MOFCA: Multi-objective fuzzy clustering algorithm
for wireless sensor networks,” Appl. Soft Comput., vol. 30, no. 0, pp. 151–165, May 2015.
[9] D. V Jose and G. Sadashivappa, “Mobile Sink Assisted Energy Efficient Routing
Algorithm for Wireless Sensor Networks,” The World of Computer Science and Information
Technology, vol. 5, no. 2. pp. 16–22, 2015.
[10] A. Ali Ahmed, “An enhanced real-time routing protocol with load distribution for
mobile wireless sensor networks,” Comput. Networks, vol. 57, no. 6, pp. 1459–1473, Apr.
2013.
[11] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient
communication protocol for wireless microsensor networks,” System Sciences, 2000.
Proceedings of the 33rd Annual Hawaii International Conference on. p. 10 pp. vol.2, 2000.
[12] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gathering in sensor
information systems,” in IEEE Aerospace Conference Proceedings, 2002, vol. 3, pp. 1125–
1130.
[13] M. F. K. Abad and M. A. J. Jamali, “Modify LEACH Algorithm for Wireless Sensor
Network,” Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 219–224, 2011.
[14] D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A. M. Memon, and T. Zaman,
“MODLEACH: A variant of LEACH for WSNs,” in Proceedings - 2013 8th International
Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA
2013, 2013, pp. 158–163.
[15] M. Ghiasabadi, M. Sharifi, N. Osati, S. Beheshti, and M. Sharifnejad, “TEEN: a routing
protocol for enhanced efficiency in wireless sensor networks,” 2008 Second Int. Conf. Futur.
Gener. Commun. Netw., vol. 1, no. C, pp. 2009–2015, 2001.
[16] A. Manjeshwar and D. P. Agrawal, “APTEEN: a hybrid protocol for efficient routing
and comprehensive information retrieval in wireless,” in Proceedings 16th International
Parallel and Distributed Processing Symposium, 2002, p. 8 pp.
[17] O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering
approach for ad hoc sensor networks,” IEEE Trans. Mob. Comput., vol. 3, no. 4, pp. 366–
379, 2004.
[18] S. Chand, S. Singh, and B. Kumar, “Heterogeneous HEED Protocol for Wireless Sensor
Networks,” Wirel. Pers. Commun., vol. 77, no. 3, pp. 2117–2139, 2014.
[19] O. Boyinbode, H. Le, and M. Takizawa, “A survey on clustering algorithms for wireless
sensor networks,” Int. J. Space-Based Situated Comput., vol. 1, no. 2–3, pp. 130–136, 2011.
[20] N. A. Pantazis, S. A. Nikolidakis, and D. D. Vergados, “Energy-Efficient Routing
Protocols in Wireless Sensor Networks: A Survey,” IEEE Commun. Surv. Tutorials, vol. 15,
no. 2, pp. 551–591, 2013.
[21] K. Chen, “Unequal Cluster-Based Routing Protocol in Wireless Sensor Networks,”
Journal of Networks, vol. 8, no. 11. 2013.
[22] Y. Jiang, W. Shi, X. Wang, and H. Li, “A distributed routing for wireless sensor
networks with mobile sink based on the greedy embedding,” Ad Hoc Networks, vol. 20. pp.
150–162, 2014.
[23] Z. Han, J. Wu, J. Zhang, L. Liu, and K. Tian, “A general self-organized tree-based
energy-balance routing protocol for wireless sensor network,” IEEE Transactions on Nuclear
Science, vol. 61, no. 2. pp. 732–740, 2014.
[24] J. Zhu, C.-H. Lung, and V. Srivastava, “A hybrid clustering technique using quantitative
and qualitative data for wireless sensor networks,” Ad Hoc Networks, vol. 25, Part A, no. 0,
pp. 38–53, Feb. 2015.
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN
DOWNLINK LTE SELF-ORGANIZING NETWORKS
Hana Jouini1, Mohamed Escheikh1,Kamel Barkaoui2 and Tahar Ezzedine1
1University of Tunis El Manar, Enit, Sys’Com , 1002 Tunis, Tunisia
2Cedric-Cnam : 2 Rue Conté 75003 Paris, France
ABSTRACT
This article investigates mobility load balancing (MLB) algorithm implementation through
network simulator (ns-3) in long term evolution (LTE) systems employing orthogonal
frequency division multiple access (OFDMA) for downlink (DL) data transmission. MLB is
introduced by the third generation partnership project (3GPP) as a key target of LTE self-
organizing networks (SONs) [1]. Our contribution is twofold. First, we implemented
elementary procedures (EPs) related to load management (LM) function of the X2-
application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’.
Second, we implemented a MLB based adaptive handover (HO) algorithm enabling to
configure adaptively HO hysteresis threshold for each neighbouring cell, of an overloaded
cell, according to its current load information. Numerical results show how, through suitable
simulation scenarios, MLB enables enhancing network performance in terms of overall
throughput, packet loss ratio (PLR) and fairness without incurring HO overhead.
KEYWORDS
LTE, load management, X2AP, elementary procedure, mobility load balancing
Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn06.pdf
Volume Link: https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] European Telecommunications Standards Institute. LTE; Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Self-configuring and self-optimizing network (SON)
use cases and solutions, 2011.
[2] European Telecommunications Standards Institute. LTE; Evolved universal terrestrial
radio access network (E-UTRAN); X2 application protocol (X2AP), 2013.
[3] Kyuho Son, Song Chong, and G. Veciana. Dynamic association for load balancing and
interference avoidance in multi-cell networks. Wireless Communications, IEEE Transactions
on, 8(7):3566–3576, July 2009.
[4] P Mūnoz, R Barco, and I de la Bandera. Load balancing and handover joint optimization
in lte networks using fuzzy logic and reinforcement learning. Computer Networks, 76:112–
125, 2015.
[5] Wen-Yu Li, Xiang Zhang, Shu-Cong Jia, Xin-Yu Gu, Lin Zhang, Xiao-Yu Duan, and
JiaRu Lin. A novel dynamic adjusting algorithm for load balancing and handover co-
optimization in lte son. Journal of Computer Science and Technology, 28(3):437–444, 2013.
[6] Ridha Nasri and Zwi Altman. Handover adaptation for dynamic load balancing in 3gpp
long term evolution systems. arXiv preprint arXiv:1307.1212, 2013.
[7] Zhang Peng Huang, Jing Liu, Qiang Shen, Jin Wu, and Xiaoying Gan. A threshold-based
multi-traffic load balance mechanism in lte-a networks. In Wireless Communications and
Networking Conference (WCNC), 2015 IEEE, pages 1273–1278. IEEE, 2015.
[8] Qi-Ping Yang, Jae-Woo Kim, and Tae-Hyong Kim. Mobility prediction and load
balancing based adaptive handovers for lte systems. International Journal on Computer
Science and Engineering, 4(4):638, 2012.
[9] European Telecommunications Standards Institute. LTE ; Evolved Universal Terrestrial
Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification, Nov. 2012.
[10] Lte protocols and specifications. http://lteworld.org/lte-protocols-specifications.
Accessed: Dec. 2015.
[11] X2 interface function in lte a connection between two enodebs.
http://www.teletopix.org/4g-lte/x2-
interface-function-in-lte-a-connection-between-two-enodebs/. Accessed: Dec. 2015.
[12] Christopher Cox. An introduction to LTE: LTE, LTE-advanced, SAE and 4G mobile
communications. John Wiley & Sons, 2012.
[13] Alcatel-lucent. The LTE Network Architecture: A comprehensive tutorial, 2013.
[14] Self-organizing networks. http://www.3gpp.org/technologies/keywords-acronyms/105-
son. Accessed: Dec. 2015.
[15] Panagiotis Fotiadis, Michele Polignano, Daniela Laselva, Benny Vejlgaard, Preben Mo-
gensen, Ralf Irmer, and Neil Scully. Multi-layer mobility load balancing in a heterogeneous
lte network. In Vehicular Technology Conference (VTC Fall), 2012 IEEE, pages 1–5. IEEE,
2012.
[16] Dah-Ming Chiu and Raj Jain. Analysis of the increase and decrease algorithms for
congestion avoidance in computer networks. Computer Networks and ISDN systems,
17(1):1–14, 1989.
[17] Network simulator 3. url: https://www.nsnam.org/. Accessed: Mai 2015.
[18] Nicola Baldo, Manuel Requena-Esteso, Marco Miozzo, and Raymond Kwan. An open
source model for the simulation of LTE handover scenarios and algorithms in ns-3.In
Proceedings of the 16th ACM international conference on Modelling, analysis & simulation
of wireless and mobile systems, pages 289–298. ACM, 2013.
[19] Tracy Camp, Jeff Boleng, and Vanessa Davies. A survey of mobility models for ad
hocnetwork research. Wireless communications and mobile computing, 2(5):483–502, 2002.
[20] Fan Bai and Ahmed Helmy. A survey of mobility models. Wireless Ad hoc
Networks.University of Southern California, USA, 206, 2004.
[21] European Telecommunications Standards Institute. Self-Organizing Networks (SON)
Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information
Service (IS), 2012.
MULTI-STAGES CO-OPERATIVE/NONCOOPERATIVE SCHEMES
OF SPECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS
Anwar Mousa1 and Tara Javidi2
University of California, San Diego (UCSD)- Jacobs School of Engineering
9500 Gilman Dr., La Jolla, CA 92093-0407
ABSTRACT
Searching for spectrum holes in practical wireless channels where primary users experience
multipath fading and shadowing, with noise uncertainty, limits the detection performance
significantly. Moreover, the detection challenge will be tougher when different band types
have to be sensed, with different signal and spectral characteristics, and probably overlapping
spectra. Besides, primary user waveforms can be known (completely or partially) or unknown
to allow or forbid cognitive radios to use specific kinds of detection schemes! Hidden
primary user’s problem, and doubly selective channel oblige the use of cooperative sensing to
exploit the spatial diversity in the observations of spatially located cognitive radio users.
Incorporated all the aforementioned practical challenges as a whole, this paper developed a
new multistage detection scheme that intelligently decides the detection algorithm based on
power, noise, bandwidth and knowledge of the signal of interest. The proposed scheme
switches between individual and cooperative sensing and among featured based sensing
techniques (cyclo-stationary detection and matched filter) and sub-band energy detection
according to the characteristics of signal and band of interest.Compared to the existing
schemes, performance evaluations show reliable results in terms of probabilities of detection
and mean sensing times under the aforementioned conditions.
KEYWORDS
spectrum sensing,local and cooperative,cognitive radio, sub-band energy detection,
probability of detection, mean detection time
Full Text: http://aircconline.com/ijwmn/V8N4/8416ijwmn01.pdf
Volume Link: https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] J. Kantiand G. Singh Tomar “Various Sensing Techniques in Cognitive Radio Networks:
A Review” International Journal of Grid and Distributed Computing Vol. 9, No. 1 (2016),
pp.145-154.
[2] SenerDikmese, Paschalis C. Sofotasios, TeroIhalainen, Markku Renfors and
MikkoValkama, “Efficient Energy Detection Methods for Spectrum Sensing under Non-Flat
Spectral Characteristics,” IEEE Journal on Selected Areas in Communications (JSAC),
DOI:10.1109/JSAC.2014.236-1074, Oct. 2014.
[3] W. Yue, B. Zheng, and Q. Meng, “Cyclostationary property based spectrum sensing
algorithms for primary detection in cognitive radio systems,” Journal of Shanghai Jiaotong
University (Science), vol. 14, no. 6, pp. 676–680, Dec. 2009
[4] H. Sun et al., “Wideband spectrum sensing for cognitive radio networks- a survey” IEEE
Wireless Communications • April 2013, pp 74-81
[5] Ejaz et al. " SNR-based adaptive spectrum sensing for cognitive radio networks".
International Journal of Innovative Computing, Information and Control Vol. 8, No: 9, 6095–
6106 (2012)
[6] Ejaz et al. " I3S: Intelligent spectrum sensing scheme for cognitive radio networks"
EURASIP Journal onWireless Communications and Networking 2013, 2013:26
[7] Amardip Kumar et al. "An Adaptive and Efficient Local Spectrum Sensing Scheme in
Cognitive Radio Networks" International Journal of Computer Applications (0975 – 8887)
Volume72– No.23, June 2013
[8] W Yue, B Zheng, Q Meng, W Yue, Combined energy detection one-order cyclostationary
feature detection techniques in cognitive radio systems. J China Univ. Posts Telecommun.
17(4), 18–25 (2010)
[9] K. Srisomboo et al., “Two-stage Spectrum Sensing for Cognitive Radio under Noise
Uncertainty” Proceeding of the Eighth International Conference on Mobile Computing, 2015,
pp 19-24.
[10] WEjaz, NU Hasan, MA Azam, HS Kim, Improved local spectrum sensing for cognitive
radio networks. EURASIP J. Adv. Signal Process(2012).http://
asp.eurasipjournals.com/content/2012/1/242
[11] S Geethu, GL Narayanan, A novel high speed two stage detector for spectrum sensing.
Elsevier Procedia Technol.6,682–689(2012)
[12] PR Nair, APVinod, KGSmitha, AKKrishna, Fast two-stage spectrum detector for
cognitive radios in uncertain noise channels. IET Commun. 6(11),1341–1348(2012)
[13] Akyildiz, Ian F. et al.,"Cooperative spectrum sensing in cognitive radio networks: A
survey", Physical Communication 4 (2011) 40–62.
[14] Lamiaa Khalid and AlaganAnpalagan, “Adaptive Assignment of Heterogeneous Users
for GroupBased Cooperative Spectrum Sensing” IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, VOL. 15, NO. 1, pp 232-246, 2016.
[15] J. So, T. Kwon “Limited reporting-based cooperative spectrum sensing for multiband
cognitive radio networks” Int. J. Electron. Commun. (AEÜ) 70 (2016) 386–397
[16] W.-Y. Lee, I.F. Akyildiz, Optimal spectrum sensing framework for cognitive radio
networks, IEEE Transactions on Wireless Communications 7 (10) (2008) 3845–3857.
[17] E. Peh, Y.-C. Liang, Y.L. Guan, Y. Zeng, Optimization of cooperative sensing in
cognitive radio networks: a sensing-throughput tradeoff view, IEEE Transactions on
Vehicular Technology 58 (9) (2009) 5294–5299.
[18] A. Ghasemi, E.S. Sousa, Spectrum sensing in cognitive radio networks: the cooperation-
processing tradeoff, Wireless Communicationsand Mobile Computing 7 (9) (2007) 1049–
1060.
[19] X. Zhou, J. Ma, G. Li, Y. Kwon, A. Soong, Probability-based combination for
cooperative spectrum sensing, IEEE Transactions on Communications 58 (2) (2010) 463–
466.
[20] Tandra, R., et al.,"SNR walls for signal detection", IEEE J. Sel. Topics Signal Process.,
2008, 2, (1), pp. 4–17.
[21] Amardip Kumar et al. "An Adaptive and Efficient Local Spectrum Sensing Scheme in
Cognitive Radio Networks" International Journal of Computer Applications (0975 – 8887)
Volume72– No.23, June 2013
[22] W. Yue, B. Zheng, Q. Meng and W. Yue, Combined energy detection and one-order
cyclostationary feature detection techniques in cognitive radio systems, The Journal of China
Universities of Posts and Telecommunications, vol.17, no.4, pp.18-25, 2010.
[23] IEEE Computer Society, IEEE Std 802.22–2011 Part 22: Cognitive Wireless RAN
Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and
Procedures for Operation in the TV Bands. IEEE Standard for Information Technology, 1–
672 (2011)
COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES
FOR OFDM SYSTEMS USING MATLAB
Raghad K. Mohammed
Department of Basic Sciences, College of Dentistry
University of Baghdad, Baghdad, Iraq
ABSTRACT
This paper compares the performance of various channel estimation techniques for OFDM
systems over quasi-static channels using MATLab. It compares the performance of five
channel estimation techniques, these are: decision directed (DD), linear interpolation, second-
order interpolation, discrete Fourier transform (DFT) interpolation, minimum mean square
error (MMSE) interpolation. The performance is evaluated in terms of two widely-used
performance measures, namely, bit-error rate (BER) and the mean square error (MSE) for
different levels of signal-to-noise ratio (SNR). The OFDM model is explained and
implemented using MATLab to run different simulations. The simulation results demonstrate
that the DD channel estimation provides the lowest BER and MSE as compared to
interpolation techniques, at the cost of extra processing delay and comparatively sensitive to
channel variations between OFDM symbols. Also, the MMSE interpolation outperforms all
other interpolation techniques.
KEYWORDS
OFDM, pilot-based channel estimation, pilot allocation, direct decision, interpolation channel
estimation, LS, MMSE, MATLab
Full Text: https://aircconline.com/ijwmn/V11N3/11319ijwmn02.pdf
Volume Link: https://airccse.org/journal/jwmn_current19.html
REFERENCES
[1] Henrik Schulze and Christian Luders. Theory and Applications of OFDM and CDMA:
Wideband Wireless Communications. John Wiley & Sons, 2006.
[2] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang. MIMO-OFDM
Wireless Communications with MATLAB, John Wiley & Sons, August 2010.
[3] Mathuranathan Viswanathan. Digital Modulations using MATLab: Build Simulation
Models from Scratch. E-book, June, 2017.
[4] Srishtansh Pathak and Himanshu Sharma. Channel Estimation in OFDM Systems.
International Journal of Advanced Research in Computer Science and Software Engineering
(IJARCSSE), Vol.3, No.3, pp. 312-327, 2013.
[5] Elizabeth A. Thompson, Charles McIntosh, James Isaacs, Eric Harmison, Ross Sneary.
Robot Communication Link Using 802.11n or 900 MHz OFDM. Journal of Network and
Computer Applications (JNCA), Vol. 52, Issue 6, pp. 37-51, June 2015.
[6] Jeffrey G. Andrews, Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX-
Understanding Broadband Wireless Networking. Prentice Hall, Second Edition, 2007.
[7] Christopher Cox. An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile
Communications. John-Wiley & Sons, March 2012.
[8] Mehdi Alasti, Behnam Neekzad, Jie Hui, and Rath Vannithamby. Quality of Service in
WiMAX and LTE Networks. IEEE Communications Magazine, Vol. 48, Issue 5, May 2010.
[9] Deepak Sharma and Praveen Srivastava. OFDM Simulator Using MATLAB.
International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 9,
pp. 493-496, September 2013.
[10] S. S. Ghorpade and S. V. Sankpal. Behavior of OFDM System Using MATLAB
Simulation. International Journal of Innovative Technology and Research (IJITR), Vol., No.
1, Issue No. 3, pp. 249 – 252, April - May 2013.
[11] S. Sadinov, P. Daneva, and P. Kogias. Description and Simulation of OFDM Reception
Process Journal of Engineering Science and Technology Review, Vol. 7, No. 4, pp. 18-22,
2014.
[12] Orlandos Grigoriadis and H. Srikanth Kamath. BER Calculation Using MATLAB
Simulation for OGDM Transmission. Proceedings of the International Multi-Conference of
Engineers and Computer Scientists (IMECS), Vol II, Hong Kong, 19-21 March 2008.
[13] Kala Praveen Bagadi and Susmita Das. MIMO-OFDM Channel Estimation Using Pilot
Carries. International Journal of Computer Applications (0975 – 888 (IJCA), Vol. 2, No. 3,
May 2010.
[14] H. Sinha, R. Meshram, and G.R. Sinha. BER Performance Analysis of MIMO-OFDM
over Wireless Channel. International Journal of Pure and Applied Mathematics (IJPAM),
Vol. 118, No. 5, pp. 195- 206, 2018.
[15] Pratima Manhas and M.K Soni. OFDM Performance Evaluation under Different Fading
Channels using Matlab Simulink. Indonesian Journal of Electrical Engineering and Computer
Science, Vol. 5, No. 2, pp. 260-266, 2017.
[16] A. Z. M. Touhidul Islam. A Comparative Performance Study of OFDM System with the
Implementation of Comb Pilot-Based MMSE Channel Estimation. International Journal on
Computational Sciences & Applications (IJCSA), Vol.3, No.6, pp. 45-53, December 2013.
[17] D. Khosla, S. Singh, R. Singh, and S. Goyal. OFDM Modulation Technique & its
Applications: A Review. Proceedings of the International Conference on Innovations in
Computing (ICIC 2017), pp. 101-105, 2017.
[18] Fateme Salehi, Mohammad‐Hassan Majidi, and Naaser Neda. Channel Estimation Based
on Learning Automata for OFDM Systems. International Journal of Communication Systems,
Vol. 321, Issue 12, August, 2018.
[19] Navjot Kaur and Neetu Gupta. Simulation and Analysis of OFDM and SC-FDMA with
STBC using Different Modulation Techniques. International Journal of Advanced Research
in Computer Engineering & Technology (IJARCET), Vol. 4, Issue 11, pp. 4184-4189,
November 2015.
[20] Himanshi Jain and Vikas Nandal. A Comparison of Various Channel Estimation
Techniques to Improve Fading Effects in MIMO over Different Fading Channels.
International Journal of Current Engineering and Technology (IJCET), Vol. 6, No. 4, pp.
1382-1386, 2016.
[21] Kussum Bhagat and Jyoteesh Malhotra. Performance Evaluation of Channel Estimation
Techniques in OFDM-based Mobile Wireless System. International Journal of Future
Generation Communication and Networking (IJFGCN), Vol. 8, No. 3, pp. 53-60, 2015.
[22] Vishal Sharma and Harleen Kaur. On BER Evaluation of MIMO-OFDM Incorporated
Wireless System. International Journal for Light and Electron Optics, Vol. 127, Issue 1, pp.
203-205, January 2016.
[23] N. Kumar and Anuradha. BER Analysis of Conventional and Wavelet Based OFDM in
LTE using Different Modulation Techniques. IEEE Engineering and Computational
Sciences, March 2014.
[24] M Divya. Bit Error Rate Performance of BPSK Modulation and OFDM-BPSK with
Rayleigh Multiple Channel. International Journal of Engineering and Advanced Technology
(IJEAT), Vol. 2, Issue 4, April 2013.
[25] Song Wang, Jinli Cao, Jiankun Hu. A Frequency Domain Subspace Blind Channel
Estimation Method for Trailing Zero OFDM Systems. Journal of Network and Computer
Applications (JNCA), Vol. 34, Issue 1, pp. 116-120, January 2011.
[26] Li Li. Advanced Channel Estimation and Detection Techniques for MIMO and OFDM
Systems. PhD Thesis, University of York, UK, 2013.
[27] S. Patil and A. N. Jadhav. Channel Estimation Using LS and MMSE Estimators. KIET
International Journal of Communications & Electronics, Vol. 2, No.1, pp. 51-55, April 2014.
[28] Anwar Yousef Al-Tarawneh. An Improved Performance OFDM Channel Estimation
Using PilotSymbol-Aided Technique. MSc Thesis, Mutah University, Jordan, 2015.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE
MANAGEMENT: ONTOSMART SYSTEM
L. Nachabe 3, M. Girod-Genet 1 and B. ElHassan 2
1Department of Réseaux et Services Multimédia Mobiles, Telecom SudParis University,
Evry, France
2 Department of Electricity and Electronics, Faculty of Engineering, Branch 1, Lebanese
University, Tripoli, Lebanon.
3 American University of Culture & Education, Faculty of Science, Beirut, Lebanon.
ABSTRACT
In 2020 more than50 billions devices will be connected over the Internet. Every device will
be connected to anything, anyone, anytime and anywhere in the world of Internet of Thing or
IoT. This network will generate tremendous unstructured or semi structured data that should
be shared between different devices/machines for advanced and automated service delivery in
the benefits of the user’s daily life. Thus, mechanisms for data interoperability and automatic
service discovery and delivery should be offered. Although many approaches have been
suggested in the state of art, none of these researches provide a fully interoperable, light,
flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and
service management through service oriented paradigm. It proposes sensors/actuators and
scenarios independent flexible context aware and distributed architecture for IoT systems, in
particular smart home systems.
KEYWORDS
Smart-Home, IoT, Multi-Agent, distributed systems, WSN, semantic, Ontology, sensing as a
service, interoperability, semantic interoperability.
Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn03.pdf
Volume Link: https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] C. Levy and D. Wong, “Towards a smart society,” no. June, 2014.
[2] C. Devices and F. D. Rates, “5G : The Internet for Everyone and Everything.”
[3] Huawei, “5G : A Technology Vision,” Huawei, White paer, pp. 1–16, 2014.
[4] “Smart Society project,” 2016. [Online]. Available: http://www.smart-society-
project.eu/about/.
[5] A. Zaslavsky, C. Perera, and D. Georgakopoulos, “Sensing as a Service and Big Data,”
Proc. Int. Conf. Adv. Cloud Comput., no. July, pp. 21–29, 2012.
[6] X. Sheng, X. Xiao, J. Tang, and G. Xue, “Electrical Engineering and Computer Science
Sensing as a service : A cloud computing system for mobile phone sensing Sensing as a
Service : A Cloud Computing System for Mobile Phone Sensing,” 2012.
[7] Matt Turck, “Internet of Things: Are We There Yet? (The 2016 IoT Landscape),” 2016.
[Online]. Available: http://mattturck.com/2016/03/28/2016-iot-landscape/.
[8] S. C. Workshop, “IERC - IoT European Research Cluster -Role Bring together the EU-
funded projects and policy activities with the aim of : Sustaining Europe ’ s leading position
in the future Internet of Things within a global context,” no. September 2014, 2017.
[9] T. Instruments, “The Internet of Things : Opportunities & Challenges,” p. 17.
[10] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A
vision, architectural elements, and future directions,” Futur. Gener. Comput. Syst., vol. 29,
no. 7, pp. 1645– 1660, 2013.
[11] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for the Internet of
Things,” in Computer Science and Information Systems (FedCSIS), 2011 Federated
Conference on, 2011, pp. 949–955.
[12] T. George and B. George, “OWL-S : Semantic Markup for Web Services.”
[13] S. N. Nambi, C. Sarkar, R. V. Prasad, and A. Rahim, “A unified semantic knowledge
base for IoT,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on, 2014, pp. 575–
580.
[14] M. Compton, P. Barnaghi, L. Bermudez, R. GarcíA-Castro, O. Corcho, S. Cox, J.
Graybeal, M. Hauswirth, C. Henson, A. Herzog, and others, “The SSN ontology of the W3C
semantic sensor network incubator group,” Web Semant. Sci. Serv. Agents World Wide
Web, vol. 17, pp. 25–32, 2012.
[15] V. B. M. Wick, “No Title,” 2016. [Online]. Available:
http://www.geonames.org/ontology/documentation.html.
[16] W. Wang, S. De, R. Toenjes, E. Reetz, and K. Moessner, “A comprehensive ontology
for knowledge representation in the internet of things,” in Trust, Security and Privacy in
Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on,
2012, pp. 1793–1798.
[17] L. Nachabe, M. Girod-Genet, and B. ElHassan, “Unified Data Model for Wireless
Sensor Network MyOntoSens Ontology,” IEEE Sens. J., 2015.
[18] L. Nachabe, B. Elhassan, J. Khawaja, and H. Salloum, “Semantic Smart Home System :
OntoSmart to monitor and Assist habitant,” vol. 10, pp. 78–86, 2016.
[19] B. Parsia and E. Sirin, “Pellet: An owl dl reasoner,” in Third International Semantic Web
ConferencePoster, 2004, vol. 18.
[20] J. Ferber, Multi-agent systems: an introduction to distributed artificial intelligence, vol.
1. AddisonWesley Reading, 1999.
[21] B. Technologies, “Bluetooth ® low energy technology.”
[22] M. Lanthaler and C. Gütl, “On using JSON-LD to create evolvable RESTful services,”
in Proceedings of the Third International Workshop on RESTful Design, 2012, pp. 25–32.
[23] Z. Shelby, K. Hartke, and C. Bormann, “RFC 7252: The Constrained Application
Protocol (CoAP).” p. 112, 2014.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-
ADVANCED NETWORKS
Magri Hicham1, Noreddine Abghour2 and Mohammed Ouzzif1
1 RITM Research Lab,ESTC , Hassan II University ,Casablanca, Morocco
2 FSAC, Hassan II University,Casablanca, Morocco
ABSTRACT
Device-to-Device (D2D) communication is a new technology that offer many advantages for
the LTEadvanced network such us wireless peer-to-peer services and higher spectral
efficiency. It is also considered as one of promising techniques for the 5G wireless
communications system and used in so many different fields such as network traffic
offloading, public safety, social services and applications such as gaming and military
applications . The goal of this paper is to present advances on the current 3GPP LTE-
advanced system related to Device-to-Device (D2D). In this paper, we provide an overview
of the D2D types based on the communication spectrum of D2D transmission, namely Inband
D2D communication and Outband D2D communication. Then we present the advantages and
disadvantages of each D2D mode. Moreover, architecture and protocol enhancements for
D2D communications under LTE-A network are described.
KEYWORDS
D2D;LTE-advanced;Inband D2D;Outband D2D;3GPP;5G.
Full Text: https://aircconline.com/ijwmn/V8N1/8116ijwmn02.pdf
Volume Link: https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] E.SREE HARSHA1, T. TIRUPAL2 “LTE-Advanced Cellular Networks for D2D
Communications” International Journal of Scientific Engineering and Technology Research
Volume.03, IssueNo.18, August-2014.
[2] Arash Asadi ,Qing Wang, , and Vincenzo Mancuso,” A Survey on Device-to-Device
Communication in Cellular Networks” arXiv:1310.0720v6 [cs.GT] 29 Apr 2014.
[3] Doppler, K.; Rinne, M.P.; Janis, P.; Ribeiro, C.; Hugl, K “Device-to-Device
Communications; Functional Prospects for LTE-Advanced Networks” ICC Workshops 2009.
[4] Xuemin Shen “Device-to-Device Communication in 5G Cellular Networks” IEEE
Network March/April 2015 .
[5] Dimitris Tsolkas, Eirini Liotou, Nikos Passas and Lazaros Merakos “LTE-A Access,
Core, and Protocol Architecture for D2D Communication ”Springer International Publishing
Switzerland 2014 .
[6] Zhijian Lin • Zhibin Gao • Lianfen Huang • Chi-Yuan Chen • Han-Chieh Chao “Hybrid
Architecture Performance Analysis for Device-to-Device Communication in 5G Cellular
Network” © Springer Science+Business Media New York 2015.
[7] K. Akkarajitsakul, P. Phunchongharn, E. Hossain, and V. K. Bhargava, “Mode selection
for energyefficient D2D communications in LTEadvanced networks: A coalitional game
approach,” in Proceedings of IEEE ICCS, 2012, pp. 488–492.
[8] Chithra B Das “A Study on Device To Device Communication in Wireless Mobile
Network” International Journal of Modern Communication Technologies & Research
(IJMCTR) ISSN: 2321- 0850, Volume-3, Issue-3, March 2015.
[9] T. Peng, Q. Lu, H. Wang, S. Xu, and W. Wang, “Interference avoidance mechanisms in
the hybrid cellular and device-to-device systems,” in Proceedings of IEEE PIMRC, 2009, pp.
617–621.
[10] C.-H. Yu, K. Doppler, C. Ribeiro, and O. Tirkkonen, “Performance impact of fading
interference to device-to-device communication underlaying cellular networks,” in
Proceedings of IEEE PIMRC, 2009, pp. 858–862.
[11] H. E. Elkotby, K. M. Elsayed, and M. H. Ismail, “Exploiting interference alignment for
sum rate enhancement in D2D-enabled cellular networks,” in Proceedings of IEEE WCNC,
2012, pp. 1624– 1629
[12] A.Osseiran, K. Doppler, C. Ribeiro, M. Xiao, M. Skoglund, and J. Manssour, “Advances
in device-todevice communications and Network coding for IMT-Advanced,” ICT Mobile
Summit, 2009
[13] C. Xu, L. Song, Z. Han, Q. Zhao, X. Wang, and B. Jiao, “Interference aware resource
allocation for device-to-device communications as an underlay using sequential second price
auction,” in Proceedings of IEEE ICC, 2012, pp. 445–449.
[14] S. Xu, H. Wang, T. Chen, Q. Huang, and T. Peng, “Effective interference cancellation
scheme for device-to-device communication underlaying cellular networks,” in Proceedings
of IEEE VTC-Fall, 2010, pp. 1–5.
[15] W. Xu, L. Liang, H. Zhang, S. Jin, J. C. Li, and M. Lei, “Performance enhanced
transmission in device-to-device communications: Beamforming or interference
cancellation?” in Proceedings of IEEE GLOBECOM, 2012, pp. 4296–4301.
[16] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto- device relay
algorithm with optimal resource utilization,” IEEE Transactions on Vehicular Technology,
vol. 62, no. 5, pp. 2315– 2326, Jun. 2013.
[17] X. Bao, U. Lee, I. Rimac, and R. R. Choudhury, “DataSpotting: offloading cellular
traffic via managed device-to-device data transfer at data spots,” ACM SIGMOBILE Mobile
Computing and Communications Review, vol. 14, no. 3, pp. 37–39, 2010.
[18] X. Chen, L. Chen, M. Zeng, X. Zhang, and D. Yang, “Downlink resource allocation for
device-todevice communication underlaying cellular networks,” in Proceedings of IEEE
PIMRC, 2012, pp. 232–237
[19] M. Ji, G. Caire, and A. F. Molisch, “Wireless device-to-device Caching networks: Basic
principles and system performance,”arXiv preprintarXiv:1305.5216, 2013.
[20] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement of an interference limited
area for device-to-device uplink underlaing cellular networks,” IEEE Transactions on Wireles
Communications, vol. 10, no. 12, pp. 3995–4000, December 2011.
[21] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls,and Z. Turnyi,
“Design aspects of network assisted device-to- device communications,” IEEE
Communications Magazine, vol. 50, no. 3, pp.170–177, 2012.
[22] R. Zhang, X. Cheng, L. Yang, and B. Jiao, “Interference-aware Graph based resource
sharing for device-to-device communications underlaying cellular networks,” in Proceedings
of IEEE WCNC, 2013, pp. 140–145.
[23] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) Communication in MU-MIMO
cellular networks,” in Proceedings of IEEE GLOBE COM,2012, pp. 3583–3587.
[24] N. Golrezaei, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device
communications for high-throughput wire less video networks,” in Proceedings of IEEE ICC,
2012, pp. 7077–7081.
[25] Bin Guo, Shaohui Sun, Qiubin Gao “Interference Management for D2D
Communications Underlying Cellular Networks at Cell Edge” ICWMC 2014 .
[26] S. Shalmashi, G. Miao, and S. Ben Slimane, “Interference management for multiple
device-to-device communications underlaying cellular networks,” IEEE International
Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2013, pp. 223-
227.
[27] J. Shin, J. P. Choi, and J.-W. Choi , “An autonomous interference avoidance scheme for
D2D communications through frequency overhearing,” International Conference on ICT
Convergence (ICTC), 2013, pp. 1074-1075.
[28] H. Min, and J. Lee, “Capacity Enhancement Using an Interference Limited Area for
Device-toDevice Uplink Underlaying Cellular Networks,” IEEE Transactions on Wireless
Communications, vol. 10, no. 12, Dec. 2011, pp. 3995-4000.
[29] K. Doppler, M Rinne, C. Wijiting, C. B. Ribeiro, and K. Hugl, “Device-to-Device
Communication as an Underlay to LTE-Advanced Networks,” Communications Magazine,
IEEE, vol. 47, no. 12, Dec. 2009, pp 42-49. Copyright
[30] Ji Lianghai Klein, A. ; Kuruvatti, N. ; Schotten, H.D “System Capacity Optimization
Algorithm for D2D Underlay Operation “Communications Workshops (ICC), 2014 IEEE.
[31] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto-device relay
algorithm with optimal resource utilization,” IEEE Transactions on Vehicular Technology,
vol. 62, no. 5, pp. 2315– 2326, Jun. 2013.
[32] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) communication in MU-MIMO
cellular networks,” in Proceedings of IEEE GLOBECOM,2012, pp. 3583–3587.
[33] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls, and Z. Turnyi,
“Design aspects of network assisted device-to-device communications,” IEEE
Communications Magazine, vol. 50, no. 3, pp. 170–177, 2012.
[34] W. ALLIANCE, “Wi-Fi Peer-to-Peer (P2P) Specification v1. 1,” WI-FI ALLIANCE
SPECIFICATION, vol. 1, pp. 1–159, 2010
[35] Z. Alliance, “Zigbee specification,” Document 053474r06, Version, vol. 1, 2006.
[36] S. Bluetooth, “Bluetooth specification version 1.1,” Available HTTP: http://www.
bluetooth. com, 2001
[37] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink Packet forwarding in
hybrid wireless networks,” in Proceedings of the fourth international conference on Future
energy systems, 2013.
[38] On the compound impact of opportunistic scheduling and D2D communications in
cellular networks, Accepted for publication in ACM MSWIM, 2013.
[39] C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, “Resource allocation using a reverse iterative
combinatorial auction for device-to-device underay cellular networks,” in Proceedings of
IEEE GLOBECOM, 2012, pp. 4542–4547.
[40] A. Asad , V.Mancuso” On the compound impact of opportunistic scheduling and D2D
communications in cellular networks”, Accepted for publication in ACM MSWIM, 2013.
[41] A. Asad , V.Mancuso” “WiFi Direct and LTE D2D in action,” Accepted for publication
in IEEE Wireless Days, 2013.
[42] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Device-to-device collaboration
through distributed storage,” in Proceedings of IEEE GLOBECOM, 2012, pp. 2397–2402.
[43] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink packet forwarding in
hybrid wireless networks,” in Proceedings of the fourth international conference on Future
energy systems, 2013, pp. 261–262.
[44] R1-132861. Final report of 3GPP TSG RAN WG1 #73 v1.0.0, August 2013.
[45] 3GPP TR 22.803 v12.1.0, “Feasibility study for proximity services (ProSe)” 2013
[46] R1-132115, “Discussions on LTE device to device communication”, ZTE, May 2013
[47] 3GPP TS 29.343 V12.1.0 (2014-12), “Proximity-services (ProSe) function to ProSe
application server aspects (PC2)”; Stage 3 (Release 12).
[48] B.Raghothaman, E. Deng, R. Pragada, G. Sternberg, T. Deng, and K.Vanganuru,
“Architecture and protocols for LTE-based device to device communication,” in Proc. IEEE
Int. Conf. Computing, Networking Communications, San Diego, CA, Jan. 2013, pp. 895–
899.
[49] 3GPP TS 23.303 version 12.2.0 Release 12, Proximity-based services (ProSe); Stage.2.
ETSI TS 123 303 V12.2.0. 2014-09.
[50] Athul Prasad, Andreas Kunz, Genadi Velev, Konstantinos Samdanis, and JaeSeung Song
, Energy Efficient D2D Discovery for Proximity Services in 3GPP LTE-Advanced Networks.
IEEE vehicular technology magazine ,December 2014.
[51] 3GPP TS 24.334: "Proximity-services (Prose) User Equipment (UE) to Proximity-
services (ProSe) Function aspects (PC3); Stage 3".June2014
[52] 3GPP TS 29.344 V12.3.0 (2015-06), Proximity-services (ProSe) Function to Home
Subscriber Server (HSS) aspects; Stage 3 (Release 12), June 2015.
[53] S. Mumtaz and J. Rodriguez (eds.), Smart Device to Smart Device Communication,
DOI: 10.1007/978-3-319-04963-2_1,Springer International Publishing Switzerland 2014.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH
NEW METHOD
Mohammad Sedighimanesh1, Javad Baqeri2 and Ali Sedighimanesh3
1,2,3Department of Electrical, Computer and It Engineering, Islamic Azad University of
Qazvin, Qom, Iran
ABSTRACT
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy
restrictions. As the performance of Sensor Networks is strongly dependence to the network
lifetime, researchers seek a way to use node energy supply effectively and increasing network
lifetime. As a consequence, it is crucial to use routing algorithms result in decrease energy
consumption and better bandwidth utilization. The purpose of this paper is to increase
Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering Network
environment, it is divided into two virtual layers (using distance between sensor nodes and
base station) and then regarding to sensors position in each of two layers, residual energy of
sensor and distance from base station is used in clustering. In this article, we compare
proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous
environment (with equal energy for all sensors) and heterogeneous one (energy of half of
sensors get doubled), also for static and dynamic situation of base station. Results show that
our proposed algorithm delivers improved performance.
KEYWORDS
Wireless Sensor Networks (WSNs), Routing protocols, Clustering in Wireless Sensor
Networks
Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn04.pdf
Volume Link: https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] N. Pantazis, S. A. Nikolidakis, and D. D. Vergados, "Energy-efficient routing protocols in
wireless sensor networks: A survey," Communications Surveys & Tutorials, IEEE, vol. 15,
pp. 551-591, 2013.
[2] S. A. Nikolidakis, D. Kandris, D. D. Vergados, and C. Douligeris, "Energy efficient
routing in wireless sensor networks through balanced clustering," Algorithms, vol. 6, pp. 29-
42, 2013.
[3] V. Choudhary and M. K. Mahajan, "Energy-Efficient Protocols in Wireless Sensor
Networks: A Survey," Energy, vol .4 , . 2014
]4[ A. Nayyar and A. Gupta, "A Comprehensive Review of Cluster-Based Energy Efficient
Routing Protocols in Wireless Sensor Networks," IJRCCT, vol. 3, pp. 104-110, 2014.
http://ijrcct.org/index.php/ojs/article/view/539
[5] Y. Sheng, Z. Baoxian, L. Cheng, and H. Mouftah, "Routing protocols for wireless sensor
networks with mobile sinks: a survey," Communications Magazine, IEEE, vol. 52, pp. 150-
157, 2014.
[6] C. Tunca, S. Isik, M. Y. Donmez, and C. Ersoy, "Distributed Mobile Sink Routing for
Wireless Sensor Networks: A Survey," Communications Surveys & Tutorials, IEEE, vol. 16,
pp. 877-897, 2014.
[7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient
communication protocol for wireless microsensor networks," in System Sciences, 2000.
Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol.2.
[8] W. Akkari, B. Bouhdid, and A. Belghith, "LEATCH: Low Energy Adaptive Tier
Clustering Hierarchy," Procedia Computer Science, vol. 52, pp. 365-372, 2015. Article
(CrossRef Link)
[9] S. Mottaghi and M. R. Zahabi, "Optimizing LEACH clustering algorithm with mobile
sink and rendezvous nodes," AEU-International Journal of Electronics and Communications,
vol. 69, pp. 507- 514, 2015.
[10] F. Xiangning and S. Yulin, "Improvement on LEACH protocol of wireless sensor
network," in Sensor Technologies and Applications, 2007. SensorComm 2007. International
Conference on, 2007, pp. 260-264 .
[11] N. Sharma and A. Nayyar, "A Comprehensive Review of Cluster Based Energy Efficient
Routing Protocols for Wireless Sensor Networks," International Journal of Application or
Innovation in Engineering & Management (IJAIEM), vol. 3, 2014.
[12] D. Goyal and M. R. Tripathy, "Routing protocols in wireless sensor networks: A
survey," in Advanced Computing & Communication Technologies (ACCT), 2012 Second
International Conference on, 2012, pp. 474-480.
[13] N. A. Latiff, N. A. Latiff, and R. Ahmad, "Enhancement of Wireless Sensor Network
Lifetime with Mobile Base Station Using Particle Swarm Optimization," International
Review on Computers and Software (IRECOS ( , vol. 10, pp. 189-199, 2015.
[14] S. Mahajan, J. Malhotra, and S. Sharma, "An energy balanced QoS based cluster head
selection strategy for WSN," Egyptian Informatics Journal, vol. 15, pp. 189-199, 2014.
[15] S. A. Sert, H. Bagci, and A. Yazici, "MOFCA :Multi-objective fuzzy clustering
algorithm for wireless sensor networks," Applied Soft Computing, vol. 30, pp. 151-165,
2015.
SHARED INFORMATION BASED SECURITY SOLUTION FOR
MOBILE AD HOC NETWORKS
Shailender Gupta1 and Chander Kumar2
1Department of Electronics Engineering, YMCA Institute of Engineering, Faridabad
2Department of Computer Engineering, YMCA Institute of Engineering, Faridabad
ABSTRACT
The mobile ad hoc networks get subjected to security threats like other wireless networks.
But due to their peer to peer approach and absence of infrastructural resources the mobile ad
hoc networks can not use strong cryptographic mechanisms as used by their other wireless
counterparts. This led to the development of trust based methods as security solutions
wherein a trusted node is relaxed from security checks when the trust value reaches to a
particular limit. The trust methods are prone to security risks but have found their acceptance
due to efficiency over computationally expensive and time consuming cryptographic
methods. The major problem with the trust methods is the period during which trust is
growing and is yet to reach the requisite threshold. This paper proposes security mechanism
dependent upon Random Electronic Code Book (RECB) combined with permutation
functions. The proposed mechanism has low time complexity, is easier to implement,
computationally inexpensive and has very high brute force search value. It can be used as the
temporary security guard during the trust growth phase. The impetus behind the proposed
design is the reliance upon shared information between the peers in the ad hoc networks.
KEYWORDS
Ad hoc Networks, Security, Trust, Cryptography
Full Text: http://airccse.org/journal/jwmn/0210s13.pdf
Volume Link: https://airccse.org/journal/jwmn_current10.html
REFERENCES
1. Wireless LAN media access control (MAC) and physical layer(PHY) specifications, IEEE
Standard 802.11, First edition, 1999
2. Rafael Timoteo de Sousa Jr., Robson de Oliveira Albuquerque, Maíra Hanashiro, Yamar
Aires da Silva and Paulo Roberto de, Lira Gondim, “Towards Establishing Trust in MANET:
an Integrated Approach for Auto-configuration, Authentication and certification”
International Journal of Forensic Computer Science, IJoFCS(2006) I, 33-40
3. Brian B. Luu, Barry J. O’Brien, David G. Baran, and Rommie L. Hardy” A Soldier-Robot
Ad Hoc Network” Proceedings of the Fifth Annual IEEE International Conference on
Pervasive Computing and Communications Workshops(PerComW'07)
4. C.E. Perkins and E.M. Royer. Ad hoc on demand Distance Vector routing, mobile
computing systems and applications, 1999. Proceedings. WMCSA ’99. Second IEEE
Workshop on, 1999, p90 - p100.
5. Murthy, S. and J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless
Networks, ACM Mobile Networks and App. J., Special Issue on Routing in Mobile
Communication Networks, Oct. 1996, pp. 183-97.
6. L. Zhou and Z. J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, Nov.
1999.
7. S. Marti and T. Giuli and K. Lai and M. Baker, “Mitigating Routing Misbehavior in
Mobile ad hoc networks,” in The Sixth Annual ACM/IEEE International Conference on
Mobile Computing and Networking, Boston, MA, USA, Aug. 2000.
8. F. Wang, B. Vetter, and S. Wu. Secure routing protocols: Theory and practice. Technical
report, North Carolina State University, May 1997.
9. C. Perkins, E. Belding-Royer, and S. Das. RFC3561: ad hoc on-demand distance vector
(AODV) routing. Internet RFCs, 2003.
10. D.B. Johnson, D.A. Maltz, J. Broch, et al. DSR: The dynamic source routing protocol for
multihop wireless ad hoc networks. Ad hoc networking, 5:139–172, 2001.
11. Z.J. Haas. A New Routing Protocol for the Reconfigurable Wireless Networks. In
Proceedings of the IEEE International Conference on Universal Personal Communications
(ICUPC, pages 562–566, 1997.
12. C.E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector
routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication
Review, 24(4):234–244, 1994.
13. Y.C. Hu, D.B. Johnson and A. Perrig, “SEAD: Secure efficient distance vector routing for
mobile wireless ad hoc networks,” IEEE, Proceedings of the Fourth IEEE Workshop on
Mobile Computing Systems and Applications (WMCSA’02), 0-7695-1647-5, 2002.
14. Y. Hu, A. Perrig and D. Johnson, Ariadne: A Secure On-demand Routing Protocol for Ad
Hoc Networks, in Proceedings of ACM MOBICOM’02, 2002.
15. P. Papadimitratos and Z.J. Haas. “Secure routing for mobile ad hoc networks,” SCS
Communication Networks and Distributed Systems Modeling and Simulation Conference
(CNDS 2002), Jan 2002.
16. B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A secure routing protocol for ad hoc
networks,” in Proceedings of the International Conference on Network Protocols (ICNP), pp.
78- 87, 2002.
17. ftp://MANET.itd.nrl.navy.mil/pub/MANET/2001-10.mail, October 8, 2001.M. Zapata, N.
Asokan, “Securing ad hoc routing protocols”, WiSe’02, ACM 1-5813-585-8, September 28,
2002, pp.1-10.
18. S. Marti, T.J. Giuli, K. Lai, and M. Baker. “Mitigating routing misbehavior in mobile ad
hoc networks,” in Proc. 6th Annual Int. Conf. on Mobile Computing and Networking
(MobiCom'00), Boston, MA, August 2000, pp.255-265.
19. S. Buchegger and J. Le Boudec, “Performance analysis of the CONFIDANT protocol:
(Cooperation of nodes - fairness in dynamic adhoc networks),” in Proc. IEEE / ACM
Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc'02), Lausanne,
Switzerland, June 2002, pp.226-336.
20. P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node
cooperation in mobile ad hoc networks,” Communication and Multimedia Security
Conference (CMS'02), September 2002.
21. Q. He, D. Wu and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive
Scheme for Ad-hoc Networks", in Proc. IEEE WCNC2004, Mar. ’04.
22. S. Bansal and M. Baker, “Observation-based cooperation enforcement in ad hoc
networks,” Research Report cs.NI/0307012, Stanford University, 2003. (ocean 22)
23. A. A. Pirzada, C. McDonald and A. Datta, “ Performance Comparison of Trust Based
Reactive Routing Protocols” IEEE transaction on mobile computing, Vol. 5, No. 6, June
2006, pp 695- 710.
24. “Cryptography and Network Security: Principles and Practices”, William Stallings,
Pearson Education, First Indian Reprint, 2003.
25. “Introduction to Automata Theory, Languages and Computation” , J. E. Hopcroft, Rajeev
Motwani, J. D. Ullman, Pearson Education Second impression 2009.
26. S. Capkun, L. Buttyan, and J. P. Hubaux, “ Self Organised Public Key Management for
Mobil Ad hoc Networks” IEEE transaction on Mobile Computing, Vol. 2, No. 1, Jan 2003,
pp 52-64.
27. “Ad hoc Wireless Networks: Architectures and Protocols”, C. S. R. Murthy and B. S.
Manoj Pearson Education Fourth impression 2009.
28. www.random.Org
29. http:www.robertnz.net/true_rng.html
SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO
CELLULAR NETWORKS
1Shiqi Xing, 2 Pantha Ghosal, 3 Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan
Sandrasegaran
Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia.
ABSTRACT
LTE is an emerging wireless communication technology to provide high- speed data service
for the mobile phones and data terminals. To improve indoor coverage and capacity
Femtocells are included in 3GPP since Release 8. There is no common simulation platform is
available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented
open source simulator which incorporates a complete protocol stack can be used for
simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides
the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment
with interference from Microcells and Macrocell users along with the scripting.
KEYWORDS
Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB),
Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to
Interference Plus Noise Ratio(SINR), Physical Layer(PHY)
Full Text: https://airccse.org/journal/jwmn/6614ijwmn01.pdf
Volume Link: https://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork,
2008.
[2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile
Broadband. Academia Press, USA, 2008.
[3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE
femtocells using an open source simulator," in EURASIP Journal on Wireless
Communication and Networking, 2012.
[4] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an
opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011.
[5] Raheem, Rand, Aboubaker Lasebae, and Jonathan Loo. "Performance Evaluation of LTE
Network via Using Fixed/Mobile Femtocells." Advanced Information Networking and
Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014.
[6] WCDMA for UMTS – HSPA Evolution and LTE, Fourth Edition. Edited by Harri Holma
and Antti Toskala © 2007 John Wiley & Sons, Ltd. ISBN: 978-0-470-31933-8
[7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, and Z. Jie,
"Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE
Wireless Commun., vol. 18, pp. 22-30, 2011.
[8] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells
in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE
Trans. Wireless Commun., vol. 18 pp. 2011.
[9] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From
homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study,"
in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011.
[10] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for
femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio
Commun. , Palo Alto, USA, pp. 1–5, 2009.
[11] Siemens, R1-060135, “Interference Mitigation by Partial Frequency Reuse,” 3GPP RAN
WG1#42, London, UK, January 2006.
[12] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network
research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug.
2002.
[13] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, " A system-level simulation
framework for LTE Femtocell," in Proc. of International Conference on Simulation Tools and
Techniques(ICST), Desenzano, Italy, pp.1-3, 2012.
[14] http://www.infoutils.com/frequency-reuse-in-ofdma-based-ltewimax-system/
Fault Detection and Recovery in Wireless Sensor Network Using
Clustering
Abolfazl Akbari1 , Arash Dana2 , Ahmad Khademzadeh3 and Neda Beikmahdavi4
1Dept. of Computer Engineering, Islamic Azad University Ayatollah Amoli Branch, Amol,
Iran
2Islamic Azad University, Central Tehran Branch, Tehran, Iran
3Iran Telecom Research Center, Tehran, Iran
4 Islamic Azad University Ayatollah Amoli Branch, Amol, Iran
ABSTRACT
Some WSN by a lot of immobile node and with the limited energy and without further charge
of energy. Whereas extension of many sensor nodes and their operation. Hence it is
normal.unactive nodes miss their communication in network, hence split the network. For
avoidance split of network, we proposed a fault recovery corrupted node and Self Healing is
necessary. In this Thesis, we design techniques to maintain the cluster structure in the event
of failures caused by energy-drained nodes. Initially, node with the maximum residual energy
in a cluster becomes cluster heed and node with the second maximum residual energy
becomes secondary cluster heed. Later on, selection of cluster heed and secondary cluster
heed will be based on available residual energy. We use Matlab software as simulation
platform quantities. like, energy consumption at cluster and number of clusters is computed
in evaluation of proposed algorithm. Eventually we evaluated and compare this proposed
method against previous method and we demonstrate our model is better optimization than
other method such as Venkataraman, in energy consumption rate.
KEY WORDS
Sensor Networks, clustering, fault detection, fault recovery.
Full Text: https://airccse.org/journal/jwmn/0211ijwmn12.pdf
Volume Link: https://airccse.org/journal/jwmn_current11.html
REFERENCES
[1] A. Bharathidasas, and V. Anand, “Sensor networks: An overview”, Technical report,
Dept. of Computer Science, University of California at Davis, 2002
[2] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable
coordination in sensor networks", in Proceedings of ACM Mobicom, Seattle, Washington,
USA, August 1999, pp. 263-- 270, ACM.
[3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor
Networks", IEEE Communications Magazine, pp. 102--114, August 2002.
[4] D. Estrin, L. Girod, G. Pottie, M. Srivastava, “Instrumenting the world with wireless
sensor networks”, In Proceedings of the International Conference on Acoustics, Speech and
Signal Processing (ICASSP 2001.
[5] E. S. Biagioni and G. Sasaki, “Wireless sensor placement for reliable and efficient data
collection”, in the 36th International Conference on Systems Sciences, Hawaii, January 2003.
[6] G. Gupta and M. Younis, “Load-Balanced Clustering in Wireless Sensor Networks”, in
the Proceedings of International Conference on Communication (ICC 2003), Anchorage, AK,
May 2003.
[7] J. Chen, S. Kher and A. Somani, “Distributed Fault Detection of Wireless Sensor
Networks”, in DIWANS'06. 2006. Los Angeles, USA: ACM Pres.
[8] F. Koushanfar, M. Potkonjak, A. Sangiovanni- Vincentelli, “Fault Tolerance in Wireless
Ad-hoc Sensor Networks”, Proceedings of IEEE Sensors 2002, June, 2002.
[9] W. L. Lee, A. Datta, and R. Cardell-Oliver, “Network Management in Wireless Sensor
Networks”, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications, edited
by M. K. Denko and L. T. Yang, American Scientific Publishers.
[10] G. Venkataraman, S. Emmanuel and S.Thambipillai, “Energy-efficient cluster-based
scheme for failure management in sensor networks” IET Commun, Volume 2, Issue 4, April
2008 Page(s):528 – 537
[11] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks”,
Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007.
[12] L. M. S. D. Souza, H. Vogt and M. Beigl, “A survey on fault tolerance in wireless sensor
networks”, 2007.
[13] W. L Lee, A.D., R. Cordell-Oliver, WinMS: Wireless Sensor Network-Management
System, An Adaptive Policy-Based Management for Wireless Sensor Networks. 2006.
[14] L. B. Ruiz, I. G.Siqueira, L. B. Oliveira, H. C. Wong, J.M. S. Nigeria, and A. A. F.
Loureiro. “Fault management in event-driven wireless sensor networks”, MSWiM’04,
October 4-6, 2004, Venezia, Italy
[15] G. Gupta and M. Younis; Fault tolerant clustering of wireless sensor networks;
WCNC’03, pp. 1579.1584.
[16] M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary
detection in sensor networks”, in Proceedings of the 24th Annual Joint Conference of the
IEEE Computer and Communications Societies (INFOCOM '05), vol. 2, pp. 902–913,
Miami, Fla, USA, March 2005
[17] C. Hsin and M.Liu, “Self-monitoring of Wireless Sensor Networks”, Computer
Communications, 2005. 29: p. 462-478
[18] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks”,
Comput. Commun., 2002, 25, (14), pp. 1273-1282.
[19] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient
Communication Protocol for Wireless Microsensor Networks," Proc. Hawaii Int'l Conf.
System Sciences 2000.
[20] GUPTA G., YOUNIS M.: ‘Fault-tolerant clustering of wireless sensor networks’. Proc.
IEEE WCNC, New Orleans, USA,March 2003, vol. 3, p. 1579 – 1584
[21] N. Bulusu, J. Heidemann and D. Estrin, ”GPS-less Low Cost Outdoor Localization For
Very Small Devices”, IEEE Personal Communications, Special Issue on "Smart Spaces and
Environments", Vol. 7, No. 5, pp. 28-34, October 2000.
[22] Radhika Nagpal, ”Organizing a Global Coordinate System from Local Information on an
Amorphous Computer”, MIT AI Memo 1666, August 1999

Weitere ähnliche Inhalte

Was ist angesagt?

J031101064069
J031101064069J031101064069
J031101064069
theijes
 
Sensors 13-11032
Sensors 13-11032Sensors 13-11032
Sensors 13-11032
Suriya M
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
IJECEIAES
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
ijtsrd
 
Analysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An AssessmentAnalysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An Assessment
ijtsrd
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
Lifetime centric load balancing mechanism in wireless sensor network based Io...
Lifetime centric load balancing mechanism in wireless sensor network based Io...Lifetime centric load balancing mechanism in wireless sensor network based Io...
Lifetime centric load balancing mechanism in wireless sensor network based Io...
IJECEIAES
 

Was ist angesagt? (20)

TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
J031101064069
J031101064069J031101064069
J031101064069
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And Engineering
 
Sensors 13-11032
Sensors 13-11032Sensors 13-11032
Sensors 13-11032
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
D010332935
D010332935D010332935
D010332935
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
Analysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An AssessmentAnalysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An Assessment
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology
 
Routing Design Issues in Heterogeneous Wireless Sensor Network
Routing Design Issues in Heterogeneous Wireless Sensor Network Routing Design Issues in Heterogeneous Wireless Sensor Network
Routing Design Issues in Heterogeneous Wireless Sensor Network
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Lifetime centric load balancing mechanism in wireless sensor network based Io...
Lifetime centric load balancing mechanism in wireless sensor network based Io...Lifetime centric load balancing mechanism in wireless sensor network based Io...
Lifetime centric load balancing mechanism in wireless sensor network based Io...
 
A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...
 
Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...Most viewed articles - International Journal of Advanced Smart Sensor Network...
Most viewed articles - International Journal of Advanced Smart Sensor Network...
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 

Ähnlich wie Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJWMN)

An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile network
Basil John
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
ijtsrd
 

Ähnlich wie Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJWMN) (20)

TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile network
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Santhosh hj shivaprakash
Santhosh hj shivaprakashSanthosh hj shivaprakash
Santhosh hj shivaprakash
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
TOP 20 Cited Wireless & Mobile Networks Research Articles 2021
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 

Kürzlich hochgeladen

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 

Kürzlich hochgeladen (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 

Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJWMN)

  • 1. Top Read Articles in Wireless& Mobile Networks International Journal of Wireless & Mobile Networks (IJWMN) ISSN: 0975-3834 [Online]; 0975-4679 [Print] http://airccse.org/journal/ijwmn.html
  • 2. CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNIQUE AND MULTI-HOP ROUTING Ali Sedighimanesh1, Mohammad Sedighimanesh2 and Javad Baqeri3 1,2,3 Department of Electrical, Computer and It Engineering, Islamic Azad University of Qazvin ABSTRACT A wireless sensor network is composed of many sensor nodes, that have beengiven out in a specific zoneandeach of them hadanability of collecting information from the environment and sending collected data to the sink. The most significant issues in wireless sensor networks, despite the recent progress is the trouble of the severe limitations of energy resources.Since that in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of such networks should be planned with an awareness of energy.One of the most significant topics related to these networks, is routing. One of the most widely used and efficient methods of routing isa hierarchy (based on clustering) method. In The present study with the objective of cutting down energy consumption and persistence of network coverage, we have offered a novel algorithm based on clustering algorithms and multihop routing.To achieve this goal, first, we layer the network environment based on the size of the network.We will identify the optimal number of cluster heads and every cluster head based on the mechanism of topology control will start to accept members.Likewise, we set the first layer as gate layer and subsequently identifying the gate’s nodes, we’d turn away half of the sensors and then stop using energy and the remaining nodes in this layer will join the gate’s nodes because they hold a critical part in bettering the functioning of the system. Cluster heads off following layers send the information to cluster heads in the above layer until sent data will be sent to gate’s nodes and finally will be sent to sink. We have tested the proposed algorithm in two situations 1) when the sink is off and 2)when a sink is on and simulation data shows that proposed algorithm has better performance in terms of the life span of a network than LEACH and ELEACH protocols. KEYWORDS Wireless sensor networks, Lifetime, Hierarchical clustering, Hierarchical Routing, Cluster Topology. Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn02.pdf Volume Link: https://airccse.org/journal/jwmn_current16.html
  • 3. REFERENCES [1] L. Borges, F. Velez, and A. Lebres, “Survey on the Characterization and Classification of Wireless Sensor Networks Applications,” IEEE Communications Surveys & Tutorials, vol. XX, no. X. pp. 1–1, 2014. [2] H. Asharioun, H. Asadollahi, T.-C. Wan, and N. Gharaei, “A Survey on Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Corona-Based Wireless Sensor Network,” Wirel. Pers. Commun., vol. 81, no. 1, pp. 161–187, 2015. [3] F. Shaukat, “A Survey on Testing Network Applications and Protocols,” vol. 2, no. 02. pp. 316–325, 2015. [4] G. Sara and D. Sridharan, “Routing in mobile wireless sensor network: a survey,” Telecommun. Syst., vol. 57, no. 1, pp. 51–79, 2014. [5] R. C. Carrano, D. Passos, L. C. S. Magalhaes, and C. V. N. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 1. pp. 181–194, 2014. [6] “Energy-efficient routing protocols in wireless sensor networks A survey 2013.”. [7] G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, “Management and applications of trust in Wireless Sensor Networks: A survey,” Journal of Computer and System Sciences, vol. 1. pp. 1–16, 2013. [8] S. A. Sert, H. Bagci, and A. Yazici, “MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks,” Appl. Soft Comput., vol. 30, no. 0, pp. 151–165, May 2015. [9] D. V Jose and G. Sadashivappa, “Mobile Sink Assisted Energy Efficient Routing Algorithm for Wireless Sensor Networks,” The World of Computer Science and Information Technology, vol. 5, no. 2. pp. 16–22, 2015. [10] A. Ali Ahmed, “An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks,” Comput. Networks, vol. 57, no. 6, pp. 1459–1473, Apr. 2013. [11] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on. p. 10 pp. vol.2, 2000. [12] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gathering in sensor information systems,” in IEEE Aerospace Conference Proceedings, 2002, vol. 3, pp. 1125– 1130. [13] M. F. K. Abad and M. A. J. Jamali, “Modify LEACH Algorithm for Wireless Sensor Network,” Int. J. Comput. Sci. Issues, vol. 8, no. 5, pp. 219–224, 2011. [14] D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A. M. Memon, and T. Zaman, “MODLEACH: A variant of LEACH for WSNs,” in Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013, 2013, pp. 158–163.
  • 4. [15] M. Ghiasabadi, M. Sharifi, N. Osati, S. Beheshti, and M. Sharifnejad, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks,” 2008 Second Int. Conf. Futur. Gener. Commun. Netw., vol. 1, no. C, pp. 2009–2015, 2001. [16] A. Manjeshwar and D. P. Agrawal, “APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless,” in Proceedings 16th International Parallel and Distributed Processing Symposium, 2002, p. 8 pp. [17] O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mob. Comput., vol. 3, no. 4, pp. 366– 379, 2004. [18] S. Chand, S. Singh, and B. Kumar, “Heterogeneous HEED Protocol for Wireless Sensor Networks,” Wirel. Pers. Commun., vol. 77, no. 3, pp. 2117–2139, 2014. [19] O. Boyinbode, H. Le, and M. Takizawa, “A survey on clustering algorithms for wireless sensor networks,” Int. J. Space-Based Situated Comput., vol. 1, no. 2–3, pp. 130–136, 2011. [20] N. A. Pantazis, S. A. Nikolidakis, and D. D. Vergados, “Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey,” IEEE Commun. Surv. Tutorials, vol. 15, no. 2, pp. 551–591, 2013. [21] K. Chen, “Unequal Cluster-Based Routing Protocol in Wireless Sensor Networks,” Journal of Networks, vol. 8, no. 11. 2013. [22] Y. Jiang, W. Shi, X. Wang, and H. Li, “A distributed routing for wireless sensor networks with mobile sink based on the greedy embedding,” Ad Hoc Networks, vol. 20. pp. 150–162, 2014. [23] Z. Han, J. Wu, J. Zhang, L. Liu, and K. Tian, “A general self-organized tree-based energy-balance routing protocol for wireless sensor network,” IEEE Transactions on Nuclear Science, vol. 61, no. 2. pp. 732–740, 2014. [24] J. Zhu, C.-H. Lung, and V. Srivastava, “A hybrid clustering technique using quantitative and qualitative data for wireless sensor networks,” Ad Hoc Networks, vol. 25, Part A, no. 0, pp. 38–53, Feb. 2015.
  • 5. MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZING NETWORKS Hana Jouini1, Mohamed Escheikh1,Kamel Barkaoui2 and Tahar Ezzedine1 1University of Tunis El Manar, Enit, Sys’Com , 1002 Tunis, Tunisia 2Cedric-Cnam : 2 Rue Conté 75003 Paris, France ABSTRACT This article investigates mobility load balancing (MLB) algorithm implementation through network simulator (ns-3) in long term evolution (LTE) systems employing orthogonal frequency division multiple access (OFDMA) for downlink (DL) data transmission. MLB is introduced by the third generation partnership project (3GPP) as a key target of LTE self- organizing networks (SONs) [1]. Our contribution is twofold. First, we implemented elementary procedures (EPs) related to load management (LM) function of the X2- application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs ’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’. Second, we implemented a MLB based adaptive handover (HO) algorithm enabling to configure adaptively HO hysteresis threshold for each neighbouring cell, of an overloaded cell, according to its current load information. Numerical results show how, through suitable simulation scenarios, MLB enables enhancing network performance in terms of overall throughput, packet loss ratio (PLR) and fairness without incurring HO overhead. KEYWORDS LTE, load management, X2AP, elementary procedure, mobility load balancing Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn06.pdf Volume Link: https://airccse.org/journal/jwmn_current16.html
  • 6. REFERENCES [1] European Telecommunications Standards Institute. LTE; Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Self-configuring and self-optimizing network (SON) use cases and solutions, 2011. [2] European Telecommunications Standards Institute. LTE; Evolved universal terrestrial radio access network (E-UTRAN); X2 application protocol (X2AP), 2013. [3] Kyuho Son, Song Chong, and G. Veciana. Dynamic association for load balancing and interference avoidance in multi-cell networks. Wireless Communications, IEEE Transactions on, 8(7):3566–3576, July 2009. [4] P Mūnoz, R Barco, and I de la Bandera. Load balancing and handover joint optimization in lte networks using fuzzy logic and reinforcement learning. Computer Networks, 76:112– 125, 2015. [5] Wen-Yu Li, Xiang Zhang, Shu-Cong Jia, Xin-Yu Gu, Lin Zhang, Xiao-Yu Duan, and JiaRu Lin. A novel dynamic adjusting algorithm for load balancing and handover co- optimization in lte son. Journal of Computer Science and Technology, 28(3):437–444, 2013. [6] Ridha Nasri and Zwi Altman. Handover adaptation for dynamic load balancing in 3gpp long term evolution systems. arXiv preprint arXiv:1307.1212, 2013. [7] Zhang Peng Huang, Jing Liu, Qiang Shen, Jin Wu, and Xiaoying Gan. A threshold-based multi-traffic load balance mechanism in lte-a networks. In Wireless Communications and Networking Conference (WCNC), 2015 IEEE, pages 1273–1278. IEEE, 2015. [8] Qi-Ping Yang, Jae-Woo Kim, and Tae-Hyong Kim. Mobility prediction and load balancing based adaptive handovers for lte systems. International Journal on Computer Science and Engineering, 4(4):638, 2012. [9] European Telecommunications Standards Institute. LTE ; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification, Nov. 2012. [10] Lte protocols and specifications. http://lteworld.org/lte-protocols-specifications. Accessed: Dec. 2015. [11] X2 interface function in lte a connection between two enodebs. http://www.teletopix.org/4g-lte/x2- interface-function-in-lte-a-connection-between-two-enodebs/. Accessed: Dec. 2015. [12] Christopher Cox. An introduction to LTE: LTE, LTE-advanced, SAE and 4G mobile communications. John Wiley & Sons, 2012. [13] Alcatel-lucent. The LTE Network Architecture: A comprehensive tutorial, 2013. [14] Self-organizing networks. http://www.3gpp.org/technologies/keywords-acronyms/105- son. Accessed: Dec. 2015. [15] Panagiotis Fotiadis, Michele Polignano, Daniela Laselva, Benny Vejlgaard, Preben Mo- gensen, Ralf Irmer, and Neil Scully. Multi-layer mobility load balancing in a heterogeneous
  • 7. lte network. In Vehicular Technology Conference (VTC Fall), 2012 IEEE, pages 1–5. IEEE, 2012. [16] Dah-Ming Chiu and Raj Jain. Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Computer Networks and ISDN systems, 17(1):1–14, 1989. [17] Network simulator 3. url: https://www.nsnam.org/. Accessed: Mai 2015. [18] Nicola Baldo, Manuel Requena-Esteso, Marco Miozzo, and Raymond Kwan. An open source model for the simulation of LTE handover scenarios and algorithms in ns-3.In Proceedings of the 16th ACM international conference on Modelling, analysis & simulation of wireless and mobile systems, pages 289–298. ACM, 2013. [19] Tracy Camp, Jeff Boleng, and Vanessa Davies. A survey of mobility models for ad hocnetwork research. Wireless communications and mobile computing, 2(5):483–502, 2002. [20] Fan Bai and Ahmed Helmy. A survey of mobility models. Wireless Ad hoc Networks.University of Southern California, USA, 206, 2004. [21] European Telecommunications Standards Institute. Self-Organizing Networks (SON) Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information Service (IS), 2012.
  • 8. MULTI-STAGES CO-OPERATIVE/NONCOOPERATIVE SCHEMES OF SPECTRUM SENSING FOR COGNITIVE RADIO SYSTEMS Anwar Mousa1 and Tara Javidi2 University of California, San Diego (UCSD)- Jacobs School of Engineering 9500 Gilman Dr., La Jolla, CA 92093-0407 ABSTRACT Searching for spectrum holes in practical wireless channels where primary users experience multipath fading and shadowing, with noise uncertainty, limits the detection performance significantly. Moreover, the detection challenge will be tougher when different band types have to be sensed, with different signal and spectral characteristics, and probably overlapping spectra. Besides, primary user waveforms can be known (completely or partially) or unknown to allow or forbid cognitive radios to use specific kinds of detection schemes! Hidden primary user’s problem, and doubly selective channel oblige the use of cooperative sensing to exploit the spatial diversity in the observations of spatially located cognitive radio users. Incorporated all the aforementioned practical challenges as a whole, this paper developed a new multistage detection scheme that intelligently decides the detection algorithm based on power, noise, bandwidth and knowledge of the signal of interest. The proposed scheme switches between individual and cooperative sensing and among featured based sensing techniques (cyclo-stationary detection and matched filter) and sub-band energy detection according to the characteristics of signal and band of interest.Compared to the existing schemes, performance evaluations show reliable results in terms of probabilities of detection and mean sensing times under the aforementioned conditions. KEYWORDS spectrum sensing,local and cooperative,cognitive radio, sub-band energy detection, probability of detection, mean detection time Full Text: http://aircconline.com/ijwmn/V8N4/8416ijwmn01.pdf Volume Link: https://airccse.org/journal/jwmn_current16.html
  • 9. REFERENCES [1] J. Kantiand G. Singh Tomar “Various Sensing Techniques in Cognitive Radio Networks: A Review” International Journal of Grid and Distributed Computing Vol. 9, No. 1 (2016), pp.145-154. [2] SenerDikmese, Paschalis C. Sofotasios, TeroIhalainen, Markku Renfors and MikkoValkama, “Efficient Energy Detection Methods for Spectrum Sensing under Non-Flat Spectral Characteristics,” IEEE Journal on Selected Areas in Communications (JSAC), DOI:10.1109/JSAC.2014.236-1074, Oct. 2014. [3] W. Yue, B. Zheng, and Q. Meng, “Cyclostationary property based spectrum sensing algorithms for primary detection in cognitive radio systems,” Journal of Shanghai Jiaotong University (Science), vol. 14, no. 6, pp. 676–680, Dec. 2009 [4] H. Sun et al., “Wideband spectrum sensing for cognitive radio networks- a survey” IEEE Wireless Communications • April 2013, pp 74-81 [5] Ejaz et al. " SNR-based adaptive spectrum sensing for cognitive radio networks". International Journal of Innovative Computing, Information and Control Vol. 8, No: 9, 6095– 6106 (2012) [6] Ejaz et al. " I3S: Intelligent spectrum sensing scheme for cognitive radio networks" EURASIP Journal onWireless Communications and Networking 2013, 2013:26 [7] Amardip Kumar et al. "An Adaptive and Efficient Local Spectrum Sensing Scheme in Cognitive Radio Networks" International Journal of Computer Applications (0975 – 8887) Volume72– No.23, June 2013 [8] W Yue, B Zheng, Q Meng, W Yue, Combined energy detection one-order cyclostationary feature detection techniques in cognitive radio systems. J China Univ. Posts Telecommun. 17(4), 18–25 (2010) [9] K. Srisomboo et al., “Two-stage Spectrum Sensing for Cognitive Radio under Noise Uncertainty” Proceeding of the Eighth International Conference on Mobile Computing, 2015, pp 19-24. [10] WEjaz, NU Hasan, MA Azam, HS Kim, Improved local spectrum sensing for cognitive radio networks. EURASIP J. Adv. Signal Process(2012).http:// asp.eurasipjournals.com/content/2012/1/242 [11] S Geethu, GL Narayanan, A novel high speed two stage detector for spectrum sensing. Elsevier Procedia Technol.6,682–689(2012) [12] PR Nair, APVinod, KGSmitha, AKKrishna, Fast two-stage spectrum detector for cognitive radios in uncertain noise channels. IET Commun. 6(11),1341–1348(2012) [13] Akyildiz, Ian F. et al.,"Cooperative spectrum sensing in cognitive radio networks: A survey", Physical Communication 4 (2011) 40–62. [14] Lamiaa Khalid and AlaganAnpalagan, “Adaptive Assignment of Heterogeneous Users for GroupBased Cooperative Spectrum Sensing” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, pp 232-246, 2016.
  • 10. [15] J. So, T. Kwon “Limited reporting-based cooperative spectrum sensing for multiband cognitive radio networks” Int. J. Electron. Commun. (AEÜ) 70 (2016) 386–397 [16] W.-Y. Lee, I.F. Akyildiz, Optimal spectrum sensing framework for cognitive radio networks, IEEE Transactions on Wireless Communications 7 (10) (2008) 3845–3857. [17] E. Peh, Y.-C. Liang, Y.L. Guan, Y. Zeng, Optimization of cooperative sensing in cognitive radio networks: a sensing-throughput tradeoff view, IEEE Transactions on Vehicular Technology 58 (9) (2009) 5294–5299. [18] A. Ghasemi, E.S. Sousa, Spectrum sensing in cognitive radio networks: the cooperation- processing tradeoff, Wireless Communicationsand Mobile Computing 7 (9) (2007) 1049– 1060. [19] X. Zhou, J. Ma, G. Li, Y. Kwon, A. Soong, Probability-based combination for cooperative spectrum sensing, IEEE Transactions on Communications 58 (2) (2010) 463– 466. [20] Tandra, R., et al.,"SNR walls for signal detection", IEEE J. Sel. Topics Signal Process., 2008, 2, (1), pp. 4–17. [21] Amardip Kumar et al. "An Adaptive and Efficient Local Spectrum Sensing Scheme in Cognitive Radio Networks" International Journal of Computer Applications (0975 – 8887) Volume72– No.23, June 2013 [22] W. Yue, B. Zheng, Q. Meng and W. Yue, Combined energy detection and one-order cyclostationary feature detection techniques in cognitive radio systems, The Journal of China Universities of Posts and Telecommunications, vol.17, no.4, pp.18-25, 2010. [23] IEEE Computer Society, IEEE Std 802.22–2011 Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands. IEEE Standard for Information Technology, 1– 672 (2011)
  • 11. COMPARING VARIOUS CHANNEL ESTIMATION TECHNIQUES FOR OFDM SYSTEMS USING MATLAB Raghad K. Mohammed Department of Basic Sciences, College of Dentistry University of Baghdad, Baghdad, Iraq ABSTRACT This paper compares the performance of various channel estimation techniques for OFDM systems over quasi-static channels using MATLab. It compares the performance of five channel estimation techniques, these are: decision directed (DD), linear interpolation, second- order interpolation, discrete Fourier transform (DFT) interpolation, minimum mean square error (MMSE) interpolation. The performance is evaluated in terms of two widely-used performance measures, namely, bit-error rate (BER) and the mean square error (MSE) for different levels of signal-to-noise ratio (SNR). The OFDM model is explained and implemented using MATLab to run different simulations. The simulation results demonstrate that the DD channel estimation provides the lowest BER and MSE as compared to interpolation techniques, at the cost of extra processing delay and comparatively sensitive to channel variations between OFDM symbols. Also, the MMSE interpolation outperforms all other interpolation techniques. KEYWORDS OFDM, pilot-based channel estimation, pilot allocation, direct decision, interpolation channel estimation, LS, MMSE, MATLab Full Text: https://aircconline.com/ijwmn/V11N3/11319ijwmn02.pdf Volume Link: https://airccse.org/journal/jwmn_current19.html
  • 12. REFERENCES [1] Henrik Schulze and Christian Luders. Theory and Applications of OFDM and CDMA: Wideband Wireless Communications. John Wiley & Sons, 2006. [2] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang. MIMO-OFDM Wireless Communications with MATLAB, John Wiley & Sons, August 2010. [3] Mathuranathan Viswanathan. Digital Modulations using MATLab: Build Simulation Models from Scratch. E-book, June, 2017. [4] Srishtansh Pathak and Himanshu Sharma. Channel Estimation in OFDM Systems. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol.3, No.3, pp. 312-327, 2013. [5] Elizabeth A. Thompson, Charles McIntosh, James Isaacs, Eric Harmison, Ross Sneary. Robot Communication Link Using 802.11n or 900 MHz OFDM. Journal of Network and Computer Applications (JNCA), Vol. 52, Issue 6, pp. 37-51, June 2015. [6] Jeffrey G. Andrews, Arunabha Ghosh, and Rias Muhamed. Fundamentals of WiMAX- Understanding Broadband Wireless Networking. Prentice Hall, Second Edition, 2007. [7] Christopher Cox. An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications. John-Wiley & Sons, March 2012. [8] Mehdi Alasti, Behnam Neekzad, Jie Hui, and Rath Vannithamby. Quality of Service in WiMAX and LTE Networks. IEEE Communications Magazine, Vol. 48, Issue 5, May 2010. [9] Deepak Sharma and Praveen Srivastava. OFDM Simulator Using MATLAB. International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 9, pp. 493-496, September 2013. [10] S. S. Ghorpade and S. V. Sankpal. Behavior of OFDM System Using MATLAB Simulation. International Journal of Innovative Technology and Research (IJITR), Vol., No. 1, Issue No. 3, pp. 249 – 252, April - May 2013. [11] S. Sadinov, P. Daneva, and P. Kogias. Description and Simulation of OFDM Reception Process Journal of Engineering Science and Technology Review, Vol. 7, No. 4, pp. 18-22, 2014. [12] Orlandos Grigoriadis and H. Srikanth Kamath. BER Calculation Using MATLAB Simulation for OGDM Transmission. Proceedings of the International Multi-Conference of Engineers and Computer Scientists (IMECS), Vol II, Hong Kong, 19-21 March 2008. [13] Kala Praveen Bagadi and Susmita Das. MIMO-OFDM Channel Estimation Using Pilot Carries. International Journal of Computer Applications (0975 – 888 (IJCA), Vol. 2, No. 3, May 2010. [14] H. Sinha, R. Meshram, and G.R. Sinha. BER Performance Analysis of MIMO-OFDM over Wireless Channel. International Journal of Pure and Applied Mathematics (IJPAM), Vol. 118, No. 5, pp. 195- 206, 2018.
  • 13. [15] Pratima Manhas and M.K Soni. OFDM Performance Evaluation under Different Fading Channels using Matlab Simulink. Indonesian Journal of Electrical Engineering and Computer Science, Vol. 5, No. 2, pp. 260-266, 2017. [16] A. Z. M. Touhidul Islam. A Comparative Performance Study of OFDM System with the Implementation of Comb Pilot-Based MMSE Channel Estimation. International Journal on Computational Sciences & Applications (IJCSA), Vol.3, No.6, pp. 45-53, December 2013. [17] D. Khosla, S. Singh, R. Singh, and S. Goyal. OFDM Modulation Technique & its Applications: A Review. Proceedings of the International Conference on Innovations in Computing (ICIC 2017), pp. 101-105, 2017. [18] Fateme Salehi, Mohammad‐Hassan Majidi, and Naaser Neda. Channel Estimation Based on Learning Automata for OFDM Systems. International Journal of Communication Systems, Vol. 321, Issue 12, August, 2018. [19] Navjot Kaur and Neetu Gupta. Simulation and Analysis of OFDM and SC-FDMA with STBC using Different Modulation Techniques. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 4, Issue 11, pp. 4184-4189, November 2015. [20] Himanshi Jain and Vikas Nandal. A Comparison of Various Channel Estimation Techniques to Improve Fading Effects in MIMO over Different Fading Channels. International Journal of Current Engineering and Technology (IJCET), Vol. 6, No. 4, pp. 1382-1386, 2016. [21] Kussum Bhagat and Jyoteesh Malhotra. Performance Evaluation of Channel Estimation Techniques in OFDM-based Mobile Wireless System. International Journal of Future Generation Communication and Networking (IJFGCN), Vol. 8, No. 3, pp. 53-60, 2015. [22] Vishal Sharma and Harleen Kaur. On BER Evaluation of MIMO-OFDM Incorporated Wireless System. International Journal for Light and Electron Optics, Vol. 127, Issue 1, pp. 203-205, January 2016. [23] N. Kumar and Anuradha. BER Analysis of Conventional and Wavelet Based OFDM in LTE using Different Modulation Techniques. IEEE Engineering and Computational Sciences, March 2014. [24] M Divya. Bit Error Rate Performance of BPSK Modulation and OFDM-BPSK with Rayleigh Multiple Channel. International Journal of Engineering and Advanced Technology (IJEAT), Vol. 2, Issue 4, April 2013. [25] Song Wang, Jinli Cao, Jiankun Hu. A Frequency Domain Subspace Blind Channel Estimation Method for Trailing Zero OFDM Systems. Journal of Network and Computer Applications (JNCA), Vol. 34, Issue 1, pp. 116-120, January 2011. [26] Li Li. Advanced Channel Estimation and Detection Techniques for MIMO and OFDM Systems. PhD Thesis, University of York, UK, 2013. [27] S. Patil and A. N. Jadhav. Channel Estimation Using LS and MMSE Estimators. KIET International Journal of Communications & Electronics, Vol. 2, No.1, pp. 51-55, April 2014. [28] Anwar Yousef Al-Tarawneh. An Improved Performance OFDM Channel Estimation Using PilotSymbol-Aided Technique. MSc Thesis, Mutah University, Jordan, 2015.
  • 14. SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEM L. Nachabe 3, M. Girod-Genet 1 and B. ElHassan 2 1Department of Réseaux et Services Multimédia Mobiles, Telecom SudParis University, Evry, France 2 Department of Electricity and Electronics, Faculty of Engineering, Branch 1, Lebanese University, Tripoli, Lebanon. 3 American University of Culture & Education, Faculty of Science, Beirut, Lebanon. ABSTRACT In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will generate tremendous unstructured or semi structured data that should be shared between different devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus, mechanisms for data interoperability and automatic service discovery and delivery should be offered. Although many approaches have been suggested in the state of art, none of these researches provide a fully interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service management through service oriented paradigm. It proposes sensors/actuators and scenarios independent flexible context aware and distributed architecture for IoT systems, in particular smart home systems. KEYWORDS Smart-Home, IoT, Multi-Agent, distributed systems, WSN, semantic, Ontology, sensing as a service, interoperability, semantic interoperability. Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn03.pdf Volume Link: https://airccse.org/journal/jwmn_current16.html
  • 15. REFERENCES [1] C. Levy and D. Wong, “Towards a smart society,” no. June, 2014. [2] C. Devices and F. D. Rates, “5G : The Internet for Everyone and Everything.” [3] Huawei, “5G : A Technology Vision,” Huawei, White paer, pp. 1–16, 2014. [4] “Smart Society project,” 2016. [Online]. Available: http://www.smart-society- project.eu/about/. [5] A. Zaslavsky, C. Perera, and D. Georgakopoulos, “Sensing as a Service and Big Data,” Proc. Int. Conf. Adv. Cloud Comput., no. July, pp. 21–29, 2012. [6] X. Sheng, X. Xiao, J. Tang, and G. Xue, “Electrical Engineering and Computer Science Sensing as a service : A cloud computing system for mobile phone sensing Sensing as a Service : A Cloud Computing System for Mobile Phone Sensing,” 2012. [7] Matt Turck, “Internet of Things: Are We There Yet? (The 2016 IoT Landscape),” 2016. [Online]. Available: http://mattturck.com/2016/03/28/2016-iot-landscape/. [8] S. C. Workshop, “IERC - IoT European Research Cluster -Role Bring together the EU- funded projects and policy activities with the aim of : Sustaining Europe ’ s leading position in the future Internet of Things within a global context,” no. September 2014, 2017. [9] T. Instruments, “The Internet of Things : Opportunities & Challenges,” p. 17. [10] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Futur. Gener. Comput. Syst., vol. 29, no. 7, pp. 1645– 1660, 2013. [11] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for the Internet of Things,” in Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on, 2011, pp. 949–955. [12] T. George and B. George, “OWL-S : Semantic Markup for Web Services.” [13] S. N. Nambi, C. Sarkar, R. V. Prasad, and A. Rahim, “A unified semantic knowledge base for IoT,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on, 2014, pp. 575– 580. [14] M. Compton, P. Barnaghi, L. Bermudez, R. GarcíA-Castro, O. Corcho, S. Cox, J. Graybeal, M. Hauswirth, C. Henson, A. Herzog, and others, “The SSN ontology of the W3C semantic sensor network incubator group,” Web Semant. Sci. Serv. Agents World Wide Web, vol. 17, pp. 25–32, 2012. [15] V. B. M. Wick, “No Title,” 2016. [Online]. Available: http://www.geonames.org/ontology/documentation.html. [16] W. Wang, S. De, R. Toenjes, E. Reetz, and K. Moessner, “A comprehensive ontology for knowledge representation in the internet of things,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, 2012, pp. 1793–1798.
  • 16. [17] L. Nachabe, M. Girod-Genet, and B. ElHassan, “Unified Data Model for Wireless Sensor Network MyOntoSens Ontology,” IEEE Sens. J., 2015. [18] L. Nachabe, B. Elhassan, J. Khawaja, and H. Salloum, “Semantic Smart Home System : OntoSmart to monitor and Assist habitant,” vol. 10, pp. 78–86, 2016. [19] B. Parsia and E. Sirin, “Pellet: An owl dl reasoner,” in Third International Semantic Web ConferencePoster, 2004, vol. 18. [20] J. Ferber, Multi-agent systems: an introduction to distributed artificial intelligence, vol. 1. AddisonWesley Reading, 1999. [21] B. Technologies, “Bluetooth ® low energy technology.” [22] M. Lanthaler and C. Gütl, “On using JSON-LD to create evolvable RESTful services,” in Proceedings of the Third International Workshop on RESTful Design, 2012, pp. 25–32. [23] Z. Shelby, K. Hartke, and C. Bormann, “RFC 7252: The Constrained Application Protocol (CoAP).” p. 112, 2014.
  • 17. DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE- ADVANCED NETWORKS Magri Hicham1, Noreddine Abghour2 and Mohammed Ouzzif1 1 RITM Research Lab,ESTC , Hassan II University ,Casablanca, Morocco 2 FSAC, Hassan II University,Casablanca, Morocco ABSTRACT Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced network such us wireless peer-to-peer services and higher spectral efficiency. It is also considered as one of promising techniques for the 5G wireless communications system and used in so many different fields such as network traffic offloading, public safety, social services and applications such as gaming and military applications . The goal of this paper is to present advances on the current 3GPP LTE- advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the D2D types based on the communication spectrum of D2D transmission, namely Inband D2D communication and Outband D2D communication. Then we present the advantages and disadvantages of each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under LTE-A network are described. KEYWORDS D2D;LTE-advanced;Inband D2D;Outband D2D;3GPP;5G. Full Text: https://aircconline.com/ijwmn/V8N1/8116ijwmn02.pdf Volume Link: https://airccse.org/journal/jwmn_current16.html
  • 18. REFERENCES [1] E.SREE HARSHA1, T. TIRUPAL2 “LTE-Advanced Cellular Networks for D2D Communications” International Journal of Scientific Engineering and Technology Research Volume.03, IssueNo.18, August-2014. [2] Arash Asadi ,Qing Wang, , and Vincenzo Mancuso,” A Survey on Device-to-Device Communication in Cellular Networks” arXiv:1310.0720v6 [cs.GT] 29 Apr 2014. [3] Doppler, K.; Rinne, M.P.; Janis, P.; Ribeiro, C.; Hugl, K “Device-to-Device Communications; Functional Prospects for LTE-Advanced Networks” ICC Workshops 2009. [4] Xuemin Shen “Device-to-Device Communication in 5G Cellular Networks” IEEE Network March/April 2015 . [5] Dimitris Tsolkas, Eirini Liotou, Nikos Passas and Lazaros Merakos “LTE-A Access, Core, and Protocol Architecture for D2D Communication ”Springer International Publishing Switzerland 2014 . [6] Zhijian Lin • Zhibin Gao • Lianfen Huang • Chi-Yuan Chen • Han-Chieh Chao “Hybrid Architecture Performance Analysis for Device-to-Device Communication in 5G Cellular Network” © Springer Science+Business Media New York 2015. [7] K. Akkarajitsakul, P. Phunchongharn, E. Hossain, and V. K. Bhargava, “Mode selection for energyefficient D2D communications in LTEadvanced networks: A coalitional game approach,” in Proceedings of IEEE ICCS, 2012, pp. 488–492. [8] Chithra B Das “A Study on Device To Device Communication in Wireless Mobile Network” International Journal of Modern Communication Technologies & Research (IJMCTR) ISSN: 2321- 0850, Volume-3, Issue-3, March 2015. [9] T. Peng, Q. Lu, H. Wang, S. Xu, and W. Wang, “Interference avoidance mechanisms in the hybrid cellular and device-to-device systems,” in Proceedings of IEEE PIMRC, 2009, pp. 617–621. [10] C.-H. Yu, K. Doppler, C. Ribeiro, and O. Tirkkonen, “Performance impact of fading interference to device-to-device communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2009, pp. 858–862. [11] H. E. Elkotby, K. M. Elsayed, and M. H. Ismail, “Exploiting interference alignment for sum rate enhancement in D2D-enabled cellular networks,” in Proceedings of IEEE WCNC, 2012, pp. 1624– 1629 [12] A.Osseiran, K. Doppler, C. Ribeiro, M. Xiao, M. Skoglund, and J. Manssour, “Advances in device-todevice communications and Network coding for IMT-Advanced,” ICT Mobile Summit, 2009 [13] C. Xu, L. Song, Z. Han, Q. Zhao, X. Wang, and B. Jiao, “Interference aware resource allocation for device-to-device communications as an underlay using sequential second price auction,” in Proceedings of IEEE ICC, 2012, pp. 445–449. [14] S. Xu, H. Wang, T. Chen, Q. Huang, and T. Peng, “Effective interference cancellation scheme for device-to-device communication underlaying cellular networks,” in Proceedings of IEEE VTC-Fall, 2010, pp. 1–5.
  • 19. [15] W. Xu, L. Liang, H. Zhang, S. Jin, J. C. Li, and M. Lei, “Performance enhanced transmission in device-to-device communications: Beamforming or interference cancellation?” in Proceedings of IEEE GLOBECOM, 2012, pp. 4296–4301. [16] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto- device relay algorithm with optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315– 2326, Jun. 2013. [17] X. Bao, U. Lee, I. Rimac, and R. R. Choudhury, “DataSpotting: offloading cellular traffic via managed device-to-device data transfer at data spots,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 14, no. 3, pp. 37–39, 2010. [18] X. Chen, L. Chen, M. Zeng, X. Zhang, and D. Yang, “Downlink resource allocation for device-todevice communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2012, pp. 232–237 [19] M. Ji, G. Caire, and A. F. Molisch, “Wireless device-to-device Caching networks: Basic principles and system performance,”arXiv preprintarXiv:1305.5216, 2013. [20] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement of an interference limited area for device-to-device uplink underlaing cellular networks,” IEEE Transactions on Wireles Communications, vol. 10, no. 12, pp. 3995–4000, December 2011. [21] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls,and Z. Turnyi, “Design aspects of network assisted device-to- device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp.170–177, 2012. [22] R. Zhang, X. Cheng, L. Yang, and B. Jiao, “Interference-aware Graph based resource sharing for device-to-device communications underlaying cellular networks,” in Proceedings of IEEE WCNC, 2013, pp. 140–145. [23] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) Communication in MU-MIMO cellular networks,” in Proceedings of IEEE GLOBE COM,2012, pp. 3583–3587. [24] N. Golrezaei, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device communications for high-throughput wire less video networks,” in Proceedings of IEEE ICC, 2012, pp. 7077–7081. [25] Bin Guo, Shaohui Sun, Qiubin Gao “Interference Management for D2D Communications Underlying Cellular Networks at Cell Edge” ICWMC 2014 . [26] S. Shalmashi, G. Miao, and S. Ben Slimane, “Interference management for multiple device-to-device communications underlaying cellular networks,” IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2013, pp. 223- 227. [27] J. Shin, J. P. Choi, and J.-W. Choi , “An autonomous interference avoidance scheme for D2D communications through frequency overhearing,” International Conference on ICT Convergence (ICTC), 2013, pp. 1074-1075. [28] H. Min, and J. Lee, “Capacity Enhancement Using an Interference Limited Area for Device-toDevice Uplink Underlaying Cellular Networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 12, Dec. 2011, pp. 3995-4000.
  • 20. [29] K. Doppler, M Rinne, C. Wijiting, C. B. Ribeiro, and K. Hugl, “Device-to-Device Communication as an Underlay to LTE-Advanced Networks,” Communications Magazine, IEEE, vol. 47, no. 12, Dec. 2009, pp 42-49. Copyright [30] Ji Lianghai Klein, A. ; Kuruvatti, N. ; Schotten, H.D “System Capacity Optimization Algorithm for D2D Underlay Operation “Communications Workshops (ICC), 2014 IEEE. [31] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto-device relay algorithm with optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315– 2326, Jun. 2013. [32] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) communication in MU-MIMO cellular networks,” in Proceedings of IEEE GLOBECOM,2012, pp. 3583–3587. [33] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls, and Z. Turnyi, “Design aspects of network assisted device-to-device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp. 170–177, 2012. [34] W. ALLIANCE, “Wi-Fi Peer-to-Peer (P2P) Specification v1. 1,” WI-FI ALLIANCE SPECIFICATION, vol. 1, pp. 1–159, 2010 [35] Z. Alliance, “Zigbee specification,” Document 053474r06, Version, vol. 1, 2006. [36] S. Bluetooth, “Bluetooth specification version 1.1,” Available HTTP: http://www. bluetooth. com, 2001 [37] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink Packet forwarding in hybrid wireless networks,” in Proceedings of the fourth international conference on Future energy systems, 2013. [38] On the compound impact of opportunistic scheduling and D2D communications in cellular networks, Accepted for publication in ACM MSWIM, 2013. [39] C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, “Resource allocation using a reverse iterative combinatorial auction for device-to-device underay cellular networks,” in Proceedings of IEEE GLOBECOM, 2012, pp. 4542–4547. [40] A. Asad , V.Mancuso” On the compound impact of opportunistic scheduling and D2D communications in cellular networks”, Accepted for publication in ACM MSWIM, 2013. [41] A. Asad , V.Mancuso” “WiFi Direct and LTE D2D in action,” Accepted for publication in IEEE Wireless Days, 2013. [42] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Device-to-device collaboration through distributed storage,” in Proceedings of IEEE GLOBECOM, 2012, pp. 2397–2402. [43] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink packet forwarding in hybrid wireless networks,” in Proceedings of the fourth international conference on Future energy systems, 2013, pp. 261–262. [44] R1-132861. Final report of 3GPP TSG RAN WG1 #73 v1.0.0, August 2013. [45] 3GPP TR 22.803 v12.1.0, “Feasibility study for proximity services (ProSe)” 2013 [46] R1-132115, “Discussions on LTE device to device communication”, ZTE, May 2013
  • 21. [47] 3GPP TS 29.343 V12.1.0 (2014-12), “Proximity-services (ProSe) function to ProSe application server aspects (PC2)”; Stage 3 (Release 12). [48] B.Raghothaman, E. Deng, R. Pragada, G. Sternberg, T. Deng, and K.Vanganuru, “Architecture and protocols for LTE-based device to device communication,” in Proc. IEEE Int. Conf. Computing, Networking Communications, San Diego, CA, Jan. 2013, pp. 895– 899. [49] 3GPP TS 23.303 version 12.2.0 Release 12, Proximity-based services (ProSe); Stage.2. ETSI TS 123 303 V12.2.0. 2014-09. [50] Athul Prasad, Andreas Kunz, Genadi Velev, Konstantinos Samdanis, and JaeSeung Song , Energy Efficient D2D Discovery for Proximity Services in 3GPP LTE-Advanced Networks. IEEE vehicular technology magazine ,December 2014. [51] 3GPP TS 24.334: "Proximity-services (Prose) User Equipment (UE) to Proximity- services (ProSe) Function aspects (PC3); Stage 3".June2014 [52] 3GPP TS 29.344 V12.3.0 (2015-06), Proximity-services (ProSe) Function to Home Subscriber Server (HSS) aspects; Stage 3 (Release 12), June 2015. [53] S. Mumtaz and J. Rodriguez (eds.), Smart Device to Smart Device Communication, DOI: 10.1007/978-3-319-04963-2_1,Springer International Publishing Switzerland 2014.
  • 22. INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD Mohammad Sedighimanesh1, Javad Baqeri2 and Ali Sedighimanesh3 1,2,3Department of Electrical, Computer and It Engineering, Islamic Azad University of Qazvin, Qom, Iran ABSTRACT One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering Network environment, it is divided into two virtual layers (using distance between sensor nodes and base station) and then regarding to sensors position in each of two layers, residual energy of sensor and distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors) and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base station. Results show that our proposed algorithm delivers improved performance. KEYWORDS Wireless Sensor Networks (WSNs), Routing protocols, Clustering in Wireless Sensor Networks Full Text: https://aircconline.com/ijwmn/V8N4/8416ijwmn04.pdf Volume Link: https://airccse.org/journal/jwmn_current16.html
  • 23. REFERENCES [1] N. Pantazis, S. A. Nikolidakis, and D. D. Vergados, "Energy-efficient routing protocols in wireless sensor networks: A survey," Communications Surveys & Tutorials, IEEE, vol. 15, pp. 551-591, 2013. [2] S. A. Nikolidakis, D. Kandris, D. D. Vergados, and C. Douligeris, "Energy efficient routing in wireless sensor networks through balanced clustering," Algorithms, vol. 6, pp. 29- 42, 2013. [3] V. Choudhary and M. K. Mahajan, "Energy-Efficient Protocols in Wireless Sensor Networks: A Survey," Energy, vol .4 , . 2014 ]4[ A. Nayyar and A. Gupta, "A Comprehensive Review of Cluster-Based Energy Efficient Routing Protocols in Wireless Sensor Networks," IJRCCT, vol. 3, pp. 104-110, 2014. http://ijrcct.org/index.php/ojs/article/view/539 [5] Y. Sheng, Z. Baoxian, L. Cheng, and H. Mouftah, "Routing protocols for wireless sensor networks with mobile sinks: a survey," Communications Magazine, IEEE, vol. 52, pp. 150- 157, 2014. [6] C. Tunca, S. Isik, M. Y. Donmez, and C. Ersoy, "Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey," Communications Surveys & Tutorials, IEEE, vol. 16, pp. 877-897, 2014. [7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol.2. [8] W. Akkari, B. Bouhdid, and A. Belghith, "LEATCH: Low Energy Adaptive Tier Clustering Hierarchy," Procedia Computer Science, vol. 52, pp. 365-372, 2015. Article (CrossRef Link) [9] S. Mottaghi and M. R. Zahabi, "Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes," AEU-International Journal of Electronics and Communications, vol. 69, pp. 507- 514, 2015. [10] F. Xiangning and S. Yulin, "Improvement on LEACH protocol of wireless sensor network," in Sensor Technologies and Applications, 2007. SensorComm 2007. International Conference on, 2007, pp. 260-264 . [11] N. Sharma and A. Nayyar, "A Comprehensive Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks," International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, 2014. [12] D. Goyal and M. R. Tripathy, "Routing protocols in wireless sensor networks: A survey," in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012, pp. 474-480. [13] N. A. Latiff, N. A. Latiff, and R. Ahmad, "Enhancement of Wireless Sensor Network Lifetime with Mobile Base Station Using Particle Swarm Optimization," International Review on Computers and Software (IRECOS ( , vol. 10, pp. 189-199, 2015.
  • 24. [14] S. Mahajan, J. Malhotra, and S. Sharma, "An energy balanced QoS based cluster head selection strategy for WSN," Egyptian Informatics Journal, vol. 15, pp. 189-199, 2014. [15] S. A. Sert, H. Bagci, and A. Yazici, "MOFCA :Multi-objective fuzzy clustering algorithm for wireless sensor networks," Applied Soft Computing, vol. 30, pp. 151-165, 2015.
  • 25. SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS Shailender Gupta1 and Chander Kumar2 1Department of Electronics Engineering, YMCA Institute of Engineering, Faridabad 2Department of Computer Engineering, YMCA Institute of Engineering, Faridabad ABSTRACT The mobile ad hoc networks get subjected to security threats like other wireless networks. But due to their peer to peer approach and absence of infrastructural resources the mobile ad hoc networks can not use strong cryptographic mechanisms as used by their other wireless counterparts. This led to the development of trust based methods as security solutions wherein a trusted node is relaxed from security checks when the trust value reaches to a particular limit. The trust methods are prone to security risks but have found their acceptance due to efficiency over computationally expensive and time consuming cryptographic methods. The major problem with the trust methods is the period during which trust is growing and is yet to reach the requisite threshold. This paper proposes security mechanism dependent upon Random Electronic Code Book (RECB) combined with permutation functions. The proposed mechanism has low time complexity, is easier to implement, computationally inexpensive and has very high brute force search value. It can be used as the temporary security guard during the trust growth phase. The impetus behind the proposed design is the reliance upon shared information between the peers in the ad hoc networks. KEYWORDS Ad hoc Networks, Security, Trust, Cryptography Full Text: http://airccse.org/journal/jwmn/0210s13.pdf Volume Link: https://airccse.org/journal/jwmn_current10.html
  • 26. REFERENCES 1. Wireless LAN media access control (MAC) and physical layer(PHY) specifications, IEEE Standard 802.11, First edition, 1999 2. Rafael Timoteo de Sousa Jr., Robson de Oliveira Albuquerque, Maíra Hanashiro, Yamar Aires da Silva and Paulo Roberto de, Lira Gondim, “Towards Establishing Trust in MANET: an Integrated Approach for Auto-configuration, Authentication and certification” International Journal of Forensic Computer Science, IJoFCS(2006) I, 33-40 3. Brian B. Luu, Barry J. O’Brien, David G. Baran, and Rommie L. Hardy” A Soldier-Robot Ad Hoc Network” Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops(PerComW'07) 4. C.E. Perkins and E.M. Royer. Ad hoc on demand Distance Vector routing, mobile computing systems and applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, 1999, p90 - p100. 5. Murthy, S. and J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks, Oct. 1996, pp. 183-97. 6. L. Zhou and Z. J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, Nov. 1999. 7. S. Marti and T. Giuli and K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile ad hoc networks,” in The Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Boston, MA, USA, Aug. 2000. 8. F. Wang, B. Vetter, and S. Wu. Secure routing protocols: Theory and practice. Technical report, North Carolina State University, May 1997. 9. C. Perkins, E. Belding-Royer, and S. Das. RFC3561: ad hoc on-demand distance vector (AODV) routing. Internet RFCs, 2003. 10. D.B. Johnson, D.A. Maltz, J. Broch, et al. DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad hoc networking, 5:139–172, 2001. 11. Z.J. Haas. A New Routing Protocol for the Reconfigurable Wireless Networks. In Proceedings of the IEEE International Conference on Universal Personal Communications (ICUPC, pages 562–566, 1997. 12. C.E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review, 24(4):234–244, 1994. 13. Y.C. Hu, D.B. Johnson and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” IEEE, Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), 0-7695-1647-5, 2002. 14. Y. Hu, A. Perrig and D. Johnson, Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks, in Proceedings of ACM MOBICOM’02, 2002.
  • 27. 15. P. Papadimitratos and Z.J. Haas. “Secure routing for mobile ad hoc networks,” SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan 2002. 16. B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A secure routing protocol for ad hoc networks,” in Proceedings of the International Conference on Network Protocols (ICNP), pp. 78- 87, 2002. 17. ftp://MANET.itd.nrl.navy.mil/pub/MANET/2001-10.mail, October 8, 2001.M. Zapata, N. Asokan, “Securing ad hoc routing protocols”, WiSe’02, ACM 1-5813-585-8, September 28, 2002, pp.1-10. 18. S. Marti, T.J. Giuli, K. Lai, and M. Baker. “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. 6th Annual Int. Conf. on Mobile Computing and Networking (MobiCom'00), Boston, MA, August 2000, pp.255-265. 19. S. Buchegger and J. Le Boudec, “Performance analysis of the CONFIDANT protocol: (Cooperation of nodes - fairness in dynamic adhoc networks),” in Proc. IEEE / ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc'02), Lausanne, Switzerland, June 2002, pp.226-336. 20. P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” Communication and Multimedia Security Conference (CMS'02), September 2002. 21. Q. He, D. Wu and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks", in Proc. IEEE WCNC2004, Mar. ’04. 22. S. Bansal and M. Baker, “Observation-based cooperation enforcement in ad hoc networks,” Research Report cs.NI/0307012, Stanford University, 2003. (ocean 22) 23. A. A. Pirzada, C. McDonald and A. Datta, “ Performance Comparison of Trust Based Reactive Routing Protocols” IEEE transaction on mobile computing, Vol. 5, No. 6, June 2006, pp 695- 710. 24. “Cryptography and Network Security: Principles and Practices”, William Stallings, Pearson Education, First Indian Reprint, 2003. 25. “Introduction to Automata Theory, Languages and Computation” , J. E. Hopcroft, Rajeev Motwani, J. D. Ullman, Pearson Education Second impression 2009. 26. S. Capkun, L. Buttyan, and J. P. Hubaux, “ Self Organised Public Key Management for Mobil Ad hoc Networks” IEEE transaction on Mobile Computing, Vol. 2, No. 1, Jan 2003, pp 52-64. 27. “Ad hoc Wireless Networks: Architectures and Protocols”, C. S. R. Murthy and B. S. Manoj Pearson Education Fourth impression 2009. 28. www.random.Org 29. http:www.robertnz.net/true_rng.html
  • 28. SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO CELLULAR NETWORKS 1Shiqi Xing, 2 Pantha Ghosal, 3 Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan Sandrasegaran Centre for Real-time Information Networks School of Computing and Communications, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, Australia. ABSTRACT LTE is an emerging wireless communication technology to provide high- speed data service for the mobile phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with interference from Microcells and Macrocell users along with the scripting. KEYWORDS Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB), Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to Interference Plus Noise Ratio(SINR), Physical Layer(PHY) Full Text: https://airccse.org/journal/jwmn/6614ijwmn01.pdf Volume Link: https://airccse.org/journal/jwmn_current14.html
  • 29. REFERENCES [1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork, 2008. [2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile Broadband. Academia Press, USA, 2008. [3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE femtocells using an open source simulator," in EURASIP Journal on Wireless Communication and Networking, 2012. [4] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011. [5] Raheem, Rand, Aboubaker Lasebae, and Jonathan Loo. "Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells." Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014. [6] WCDMA for UMTS – HSPA Evolution and LTE, Fourth Edition. Edited by Harri Holma and Antti Toskala © 2007 John Wiley & Sons, Ltd. ISBN: 978-0-470-31933-8 [7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, and Z. Jie, "Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE Wireless Commun., vol. 18, pp. 22-30, 2011. [8] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE Trans. Wireless Commun., vol. 18 pp. 2011. [9] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study," in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011. [10] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio Commun. , Palo Alto, USA, pp. 1–5, 2009. [11] Siemens, R1-060135, “Interference Mitigation by Partial Frequency Reuse,” 3GPP RAN WG1#42, London, UK, January 2006. [12] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug. 2002. [13] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, " A system-level simulation framework for LTE Femtocell," in Proc. of International Conference on Simulation Tools and Techniques(ICST), Desenzano, Italy, pp.1-3, 2012. [14] http://www.infoutils.com/frequency-reuse-in-ofdma-based-ltewimax-system/
  • 30. Fault Detection and Recovery in Wireless Sensor Network Using Clustering Abolfazl Akbari1 , Arash Dana2 , Ahmad Khademzadeh3 and Neda Beikmahdavi4 1Dept. of Computer Engineering, Islamic Azad University Ayatollah Amoli Branch, Amol, Iran 2Islamic Azad University, Central Tehran Branch, Tehran, Iran 3Iran Telecom Research Center, Tehran, Iran 4 Islamic Azad University Ayatollah Amoli Branch, Amol, Iran ABSTRACT Some WSN by a lot of immobile node and with the limited energy and without further charge of energy. Whereas extension of many sensor nodes and their operation. Hence it is normal.unactive nodes miss their communication in network, hence split the network. For avoidance split of network, we proposed a fault recovery corrupted node and Self Healing is necessary. In this Thesis, we design techniques to maintain the cluster structure in the event of failures caused by energy-drained nodes. Initially, node with the maximum residual energy in a cluster becomes cluster heed and node with the second maximum residual energy becomes secondary cluster heed. Later on, selection of cluster heed and secondary cluster heed will be based on available residual energy. We use Matlab software as simulation platform quantities. like, energy consumption at cluster and number of clusters is computed in evaluation of proposed algorithm. Eventually we evaluated and compare this proposed method against previous method and we demonstrate our model is better optimization than other method such as Venkataraman, in energy consumption rate. KEY WORDS Sensor Networks, clustering, fault detection, fault recovery. Full Text: https://airccse.org/journal/jwmn/0211ijwmn12.pdf Volume Link: https://airccse.org/journal/jwmn_current11.html
  • 31. REFERENCES [1] A. Bharathidasas, and V. Anand, “Sensor networks: An overview”, Technical report, Dept. of Computer Science, University of California at Davis, 2002 [2] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable coordination in sensor networks", in Proceedings of ACM Mobicom, Seattle, Washington, USA, August 1999, pp. 263-- 270, ACM. [3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, pp. 102--114, August 2002. [4] D. Estrin, L. Girod, G. Pottie, M. Srivastava, “Instrumenting the world with wireless sensor networks”, In Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP 2001. [5] E. S. Biagioni and G. Sasaki, “Wireless sensor placement for reliable and efficient data collection”, in the 36th International Conference on Systems Sciences, Hawaii, January 2003. [6] G. Gupta and M. Younis, “Load-Balanced Clustering in Wireless Sensor Networks”, in the Proceedings of International Conference on Communication (ICC 2003), Anchorage, AK, May 2003. [7] J. Chen, S. Kher and A. Somani, “Distributed Fault Detection of Wireless Sensor Networks”, in DIWANS'06. 2006. Los Angeles, USA: ACM Pres. [8] F. Koushanfar, M. Potkonjak, A. Sangiovanni- Vincentelli, “Fault Tolerance in Wireless Ad-hoc Sensor Networks”, Proceedings of IEEE Sensors 2002, June, 2002. [9] W. L. Lee, A. Datta, and R. Cardell-Oliver, “Network Management in Wireless Sensor Networks”, to appear in Handbook on Mobile Ad Hoc and Pervasive Communications, edited by M. K. Denko and L. T. Yang, American Scientific Publishers. [10] G. Venkataraman, S. Emmanuel and S.Thambipillai, “Energy-efficient cluster-based scheme for failure management in sensor networks” IET Commun, Volume 2, Issue 4, April 2008 Page(s):528 – 537 [11] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks”, Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007. [12] L. M. S. D. Souza, H. Vogt and M. Beigl, “A survey on fault tolerance in wireless sensor networks”, 2007. [13] W. L Lee, A.D., R. Cordell-Oliver, WinMS: Wireless Sensor Network-Management System, An Adaptive Policy-Based Management for Wireless Sensor Networks. 2006. [14] L. B. Ruiz, I. G.Siqueira, L. B. Oliveira, H. C. Wong, J.M. S. Nigeria, and A. A. F. Loureiro. “Fault management in event-driven wireless sensor networks”, MSWiM’04, October 4-6, 2004, Venezia, Italy [15] G. Gupta and M. Younis; Fault tolerant clustering of wireless sensor networks; WCNC’03, pp. 1579.1584.
  • 32. [16] M. Ding, D. Chen, K. Xing, and X. Cheng, “Localized fault-tolerant event boundary detection in sensor networks”, in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), vol. 2, pp. 902–913, Miami, Fla, USA, March 2005 [17] C. Hsin and M.Liu, “Self-monitoring of Wireless Sensor Networks”, Computer Communications, 2005. 29: p. 462-478 [18] S. Chessa and P. Santi, “Crash faults identification in wireless sensor networks”, Comput. Commun., 2002, 25, (14), pp. 1273-1282. [19] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Proc. Hawaii Int'l Conf. System Sciences 2000. [20] GUPTA G., YOUNIS M.: ‘Fault-tolerant clustering of wireless sensor networks’. Proc. IEEE WCNC, New Orleans, USA,March 2003, vol. 3, p. 1579 – 1584 [21] N. Bulusu, J. Heidemann and D. Estrin, ”GPS-less Low Cost Outdoor Localization For Very Small Devices”, IEEE Personal Communications, Special Issue on "Smart Spaces and Environments", Vol. 7, No. 5, pp. 28-34, October 2000. [22] Radhika Nagpal, ”Organizing a Global Coordinate System from Local Information on an Amorphous Computer”, MIT AI Memo 1666, August 1999