Friday, May 17, 2019

A Markovian Model for Internet of Things Application

Osama Salameh, Mohammed Awad and Fadi AbuAlrub

 Department of Computer Systems Engineering, Arab American University, Palestine

ABSTRACT 

Internet of Things (IoT) allows communication among human-to-things, things-to-human, and things-to things that are incorporated into an information networks allowing automatic information interchange and the processing of data at real time. In this paper, we conduct a performance analysis of a real application defined through four traffic classes with the priorities present in smart cities using Continuous Time Markov Chains(CTMC). Based on a finite capacity queuing system, we propose a new cost-effective analytical model with a push-out management scheme in favor of the highest priority (emergency) traffic. Based on the analytical model, several performance measures for different traffic classes have been studied extensively including blocking probability; push out probability, delay, channel utilization as well as overall system performance. 

KEYWORDS

 Performance analysis, Markov chain, IoT





Fuzzy Gene Optimized Reweight Boosting Classification for Energy Efficient Data Gathering in WSN

J.Srimathi1 and V.Valli Mayil2 

1Ph.d, Research Scholar, Bharathiar University, India 2Head & Associate Professor, Dept. of Computer Science &Applications, Periyar Maniammai University, Thanjavur, India 

ABSTRACT 

The energy is a major resource to obtain efficient data gathering and increasing network lifetime (NL). The various techniques are introduced for data aggregation, but energy optimized sensor node (SN) selection was not carried out to further enhance NL. In order to improve the energy efficient data gathering in WSN, a Fuzzy Gene Energy Optimized Reweight Boosting Classification (FGEORBC) Technique is introduced with lesser time consumption. In FGEORBC technique, the Residual Energy (RE) of SN in the WSN is computed. After calculating SN residual energy, fuzzy logic is applied to determine higher energy nodes and lower energy nodes using threshold value. For finding the optimal higher energy SNs, then Ranked Gaussian gene optimization technique is applied. If the node satisfies the fitness criterion, then the node is selected as an optimal higher energy SN. Otherwise, the rank selection, ring crossover, and Gaussian mutation process are carried out until the condition gets satisfied. After that, the sink node collects the data packets (DP) from the optimal higher energy SNs. In the sink node, Reweight Boosting Classification is carried out to classify the sensed DP and it sends to the base station (BS) for further processing. Simulation of FGEORBC technique is carried out using different parameters such as energy consumption (EC), NL, data gathering time and classification accuracy (CA) with respect to a number of SN and a number of DP. The results observed that FGEORBC technique improves the data gathering and NL with minimum time as well as EC than the state-of-the-art methods. 

KEYWORDS

WSN, data gathering, residual energy, fuzzy logic, Ranked Gaussian gene optimization, data classification, Reweight Boosting Classification

An Enhancement of Cluster-Based False Data Filtering Scheme Through Dynamic Security Selection in Wireless Sensor Networks

Jungsub Ahn and Taeho Cho 

Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea 

ABSTRACT

Today, wireless sensor networks (WSNs) are applied to various industries such as building automation, medical, security, intelligent agriculture, and disaster monitoring. A WSN consists of hundreds to thousands of tiny sensor nodes that perform monitoring tasks. A small sensor node has a limited amount of internal memory and energy resources. Sensor nodes are used to detect a variety of data in specific environmental areas. As a result, WSN should be energy efficient. Sensor nodes are vulnerable to false report injection attacks because they are deployed in an open environment. A false report injection attack consumes the limited energy of a node more quickly and confuses the user. CFFS has been proposed to prevent such an attack using a method of en-route filtering false reports by dividing nodes into clusters. However, the CFFS scheme is vulnerable for repeated false report injection attacks. In this paper, we propose an approach to prolong the WSN lifetime by adjusting the dynamic security threshold value and using a fuzzy logic-based key redistribution selection of cluster head nodes. The proposed method increases the detection rate for repeated false report injection attacks by adding the additional key distribution phase in the existing method. The experimental results show that the energy efficiency of the proposed method was increased by 40.278%. 

KEYWORDS

False Report Injection Attack, Cluster-based False Data Filtering, Network Lifetime Extension, FuzzyLogic System. 

RB-IEMRP: Relay Based Improved Throughput Energy-Efficient Multi-Hop Routing Protocol for INTRA Body Sensor Network (INTRA-WBSN)

Tarique Rashid1 , Sunil Kumar2 , Akshay Verma2 , Prateek Raj Gautam2 and Arvind Kumar2 . 

1Electrical and Electronics Engineering Department Katihar Engineering College, Katihar,India 2Electronics and Communication Engineering Department Motilal Nehru National Institute of Technology Allahabad, India

ABSTRACT

 In this paper, we have proposed a Relay based Improved Throughput and Energy-efficient Multi-hop Routing Protocol (Rb-IEMRP) for the Intra Wireless Body Sensor Network (Intra-WBSN). Moreover, mathematical analysis has been presented, to calculate the minimum number of relay nodes require to be deployed corresponding to the bio-sensor nodes in Intra-WBSN. Normal sensing data from bio-sensor nodes forwarded to BNC through relay nodes while emergency data is directly transmitted to BNC. Relays nodes are placed in the patients' cloth. It can be easily replaced or recharged that facilitates effective health monitoring. The proposed routing protocol has achieved better network stability, network lifetime, energy efficiency and throughput as compared to Stable Increased Throughput Multi-Hop Protocol for Link Efficiency in Wireless Body Area Networks (SIMPLE) and Reliable Energy Efficient Critical Data Routing in Wireless Body Area Networks (REEC) routing protocols. It has been validated through simulation results. 

KEYWORDS

Intra wireless body sensor network (Intra-WBSN), Body node coordinator (BNC), Relay, Wireless body sensor network (WBSN), Energy efficiency. 


Allocation of Virtual Firewall Functions in NFV-Based Networks with Minimum Network Cost

Shin-ichi Kuribayashi 

Department of Computer and Information Science, Seikei University, Japan

ABSTRACT

 NFV-based network implements a variety of network functions with software on general-purpose servers and this allows the network operator to select any capacity and location of network functions without any physical constraints. It is essential for economical NFV-based network design to determine the place where each network function should be located in the network and what its capacity should be. The authors proposed an algorithm of virtual routing function allocation in the NFV-based network for minimizing the network cost and provided effective allocation guidelines for virtual routing functions. This paper proposes the deployment algorithm of virtual firewall function in addition to virtual routing function for minimizing the network cost. Our evaluation results have revealed the following: (1) Installing a packet filtering function, which is a part of the firewall function, in the sending-side area additionally can reduce wasteful transit bandwidth and routing processing and thereby reduce the network cost. (2) The greater the number of packets filtered by packet filtering function in the sending-side area, the more the reduction of network cost is increased. (3) The greater the bandwidth cost relative to the routing function cost, the greater the effect of statistical multiplexing on reducing the network cost. (4) The proposed algorithm would be approaching about 95% of the deployment with the optimal solution. 

KEYWORDS

NFV, resource allocation, the virtual routing function, minimum total network cost



Energy Consumption Reduction in Wireless Sensor Network Based on Clustering

Gholamreza Farahani 

Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science and Technology (IROST), Tehran, Iran

ABSTRACT 

One of the important issues in the routing protocol design in Wireless Sensor Networks (WSNs) is minimizing energy consumption and maximizing network lift time. Nowadays networks and information systems are one of the main parts of modern life that without them, people cannot live. On the hand, the impairment of these networks leads to great and incalculable costs. In this paper, a new method based on clustering has presented that problem of energy consumption is solved. The proposed algorithm is that energy-based clustering can create clusters of the same energy level and distribute energy efficiency across the WNS nodes. This proposed clustering protocol classify network nodes based on energy and neighbourhood criteria and attempts to better balance energy in clusters and ultimately increase network lifetime and maintain network coverage. Results are shown that the proposed algorithm is on average 40% better than LEACH algorithm and 14% better than IBLEACH algorithm. 

KEYWORDS 

Wireless Sensor Network, Clustering, LEACH Algorithm, IBLEACH Algorithm.

Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks

C. Manikandan, P. Neelamegam, S.Rakesh Kumar, G. Venkat Babu, and Sai Siva Satwik Kommi

School of Electrical and Electronics Engineering, SASTRA Deemed University, Thanjavur, Tamil Nadu, India

ABSTRACT 

MU-MIMO (Multi-User MIMO) has been a promising technique for vehicular networks to achieve faster communication. Conventional MU-MIMO transceiver is designed with One-dimensional (1-D) improper modulation schemes such as Binary Phase Shift Keying (BPSK) and Multilevel Amplitude Shift Keying (MASK) failed to yield standard ABER (average bit error rate). To achieve high reliability, a novel MUMIMO uplink transceiver system is designed under PAPC (Per-Antenna Power Constraint) by assuming perfect and imperfect channel state information (CSI). MIMO communication channels are perceptible. Hence, security of the proposed system is improved by novel pseudorandom key generation technique using randomized synthetic colour image. Analytical design for proposed systems is carried and simulated for various p-norm constraints. Simulation results show higher reliability and security than the existing system. It also satisfies the linearity constraint of a power amplifier, which makes the system more suitable for practical applications.

KEYWORDS

MU-MIMO, Uplink, PAPC, 1-D improper modulation, Perfect & imperfect CSI, Colour Image, Pseudorandom key generation.

VIVoNet: Visually-Represented, Intent-Based, Voice-Assisted Networking

Amar Chaudhari, Amrita Asthana, Atharva Kaluskar, Dewang Gedia, Lakshay Karani, Levi Perigo, Rahil Gandotra and Sapna Gangwar

 Interdisciplinary Telecom Program, University of Colorado Boulder, USA 

ABSTRACT

 Networks have become considerably large, complex and dynamic. The configuration, operation, monitoring, and troubleshooting of networks is a cumbersome and time-consuming task for the network administrators as they must deal with the physical layer, underlying protocols, addressing systems, control rules, and many other low-level details. This research paper proposes an Intent-based networking system (IBNS) coupled with voice-assistance that can abstract the underlying network infrastructure and allow administrators to alter its behavior by expressing intents via voice commands. The system also displays the real-time network topology along with the highlighted intents on an interactive web application that can be used for network diagnostics. Compared to traditional networks, the concepts of software-defined networking (SDN) make it easier to integrate a voice assistant that allows configuring the network based on intents. 

KEYWORDS 

Network Management, SDN, Voice-Assistance, Intent-Based Networking & Realtime Visualization