A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bhoi, A. D.
- Propagation Models for Analysis of AdHoc Routing Protocols Based on Multi Ray Modeling
Authors
1 G.H. Raisoni College of Engineering, Rashtrasant Tukadoji Maharaja Nagpur University, Nagpur, Maharashtra, IN
2 G.H. Raisoni Institute of Engineering & Technology, University of Pune, Maharashtra, IN
3 Nagpur, Maharashtra, IN
Source
Wireless Communication, Vol 5, No 8 (2013), Pagination: 323-327Abstract
Realistic simulation scenarios are critical to correctly assess the performance of mobile ad-hoc networks. In order to evaluate the large number of protocol proposals of recent years, profound models for mobility and radio propagation are needed. The radio wave propagation model has a strong impact on the results of the simulation run. It is important to use a good radio propagation model to determine the performance of the links. The model must include the effects of multipath reflections. An empirical radio propagation environment model, comprising a loss model specific to the local urban topology, is used to optimize network operation.
We evaluate the robustness of simplified radio propagation models for indoor MANET simulations. This work describes a high accuracy propagation multi-ray model based on the use of a ray-tracer.
Keywords
Indoor, MANET, Radio Propagation, Ray Tracing.- Implementation and Analysis of Authentication in Wireless Sensor Network using ZigBee
Authors
1 G.H Raisoni Institute of Engineering and Technology, Wagholi, Pune, IN
Source
Wireless Communication, Vol 9, No 5 (2017), Pagination: 92-95Abstract
Most Wireless Sensor Network (WSN) consist of various sensor nodes deployed at various locations. As these nodes are deployed at remote locations their security issue gains importance. Algorithms used for security depends on key size, computational time, power requirement. There are various symmetric and asymmetric cryptography algorithms like AES, DES, 3DES and RSA, ECC algorithm etc. Symmetric algorithm have advantages, as same key for encryption and decryption, lower power consumption. Asymmetric cryptography includes complex computations so hard to decrypt but also require more power than symmetric cryptographic algorithms. So considering advantages and disadvantages of both cryptographic techniques, in this proposed system, combining of AES and ECC for Wireless Sensor Network (WSN) using ZigBee. In this system data gathered from temperature, humidity and smoke sensor are applied to ECC encryption and then send to ZigBee transmitter. At receiver side data is decrypted using ECC algorithm and original data is recovered.Keywords
WSN, AES, RSA, ECC, ZigBee, Hybrid, Symmetric, Asymmetric, Cryptography.References
- Li Chunqing, Zhang Jiancheng, “Research of ZigBee’s data security and protection”, International Forum on Computer Science-Technology and Applications 2009, IEEE, 2009, pp 298 - 302.
- P.D. Khambre, S.S.Sambhare, P.S. Chavan, “Secure Data in Wireless Sensor Network via AES” " International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012
- Kristin Lauter, “The Advantages of Elliptical Curve Cryptography for Wireless Security”, IEEE Wireless Communications 2004
- G.V.S. Raju and Rehan Akbani,"Elliptic Curve Cryptosystem and its Applications ", IEEE 2003.
- Meng Qianqian and Bao Kejin, “Security analysis for wireless networks based on ZigBee”, IEEE,vol 1, 2009, pp 158 - 160.
- Bin Yang, “Study on security of wireless sensor network based on ZigBee standard." International Conference on Computational Intelligence and Security, IEEE, 2009, pp 426 - 430.
- Madhumita Panda, "Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER) 2014
- Saif Al-alak, Zuriati Ahmed, Azizol Abdullah and Shamala Subramiam, “AES and ECC Mixed for ZigBee Wireless Sensor Security”, International Scholarly and Scientific Research & Innovation 5(9) 2011
- https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
- William Stallings, “Cryptography and Network Security- Principles and Practice” NY: Prentice Hall, 2011
- https://msdn.microsoft.com
- Sunil Gupta, Harsh Kumar Verma and AL Sangal, “Authentication Protocol for Wireless Sensor Networks” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering 2010.
- G. Jai Arul Jose and C. Sajeev,” The security of elliptic curve cryptography over RSA cryptography” Elixir Comp. Sci. & Engg. 2011
- S. Subasree and N. K. Sakthivel, “Design of a New Security Protocol using Hybrid Cryptographic Algorithms” IJRRAS 2010
- S. Aruna, D. Anitha, Promit Roy and Riddhi Datta, “ Survey of Hybrid Cryptography Algorithms in WSN using ZigBee”, IJCTA 2016
- N. Kumar, “A Secure communication wireless sensor networks through hybrid (AES+ECC) algorithm”, von LAP LAMBERT Academic Publishing, vol. 386, 2012.
- Performance Analysis of Route Discovery Model Based on RSS
Authors
1 G.H Raisoni Institute of Engineering and Technology, Wagholi, Pune, IN
Source
Wireless Communication, Vol 9, No 5 (2017), Pagination: 96-100Abstract
Recently wireless communication devices have increased and therefore it has created the need for developing new technologies. The growing number of users wants to communicate with each other anywhere and anytime without relying on any existing infrastructure or centralized access point. A Wireless Ad-hoc NETwork (WANET) or Mobile Ad-hoc NETwork (MANET) has no centralized control, no topology and is infrastructure-less. In MANET few nodes come together to form network. Even if the source and the destination nodes will not be in direct communication range, still they connected to each other with multi-hop scenarios. In such network many nodes may join or leave in real networks. In this paper an efficient route discovery algorithm for finding the shortest path between two nodes which are randomly moving in the free space are considered. Calculating and analyzing the relationship of RSS with the changing node distance scenarios for different protocols is studied. The focus will be given on the simulation and analysis of the behavior of routing protocols for MANETS. The results show that denser the network grows the hopping is reduced whereas the path success rate is increased.
Keywords
Dijkstra, MANETS, Mobility Model, RSS, Route Discovery, Simulink, WANETS, WSN.References
- Jiuqiang Xu, Wei Liu, Fenggao Lang, Yuanyuan Zhang, Chenglong Wang “Distance Measurement Model Based on RSSI in WSN” Received May18, 2010; revised June 9, 2010; accepted June 18, 2010.
- Sharmila Sankar and Dr. V. Sankaranarayanan “A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs”
- Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA Email:natarajan.meghanathan@jsums.edu Graph Theory Algorithms for Mobile Ad Hoc Networks”
- Anu Dahiya and Vinit Kumar M.Tech. Scholar, CSE Department, VCE, Rohtak, Haryana (India) “Performance Measurement of Dijkstra using WSN: A Review” International Journal of Engineering, Applied and Management Sciences Paradigms, Vol. 26, Issue 01 Publishing Month: July 2015
- Tuulia Kullberg Helsinki University of Technology “Performance of the Ad-hoc On-Demand Distance Vector Routing Protocol”
- Mihail L. Sichitiu Dept. of Electrical and Computer Eng., Campus Box 7911, NC State University, Raleigh, NC, 27695,” Mobility Models for Ad Hoc Networks”
- “Routing Protocols for WANET: MATLAB Implementation”
- Fan Bai and Ahmed Helmy University of Southern California, U.S.A ”A SURVEY OF MOBILITY MODELS in Wireless Adhoc Networks”
- Haitham Y. Adarbah, Shakeel Ahmad, Member, IEEE, Bassel Arafeh, Member, IEEE, and Alistair Duffy, Fellow, IEEE “Efficient Broadcasting for Route discovery in Mobile Adhoc network”
- Min-Te Sun and Ten-Hwang Lai Department of Computer and Information Science The Ohio State University, Columbus, OH 43210, USA “Location Aided Broadcast in Wireless Ad Hoc Network Systems”
- Ambreen, Haque Nawaz Faculty of Information Technology, Department of Computer Science, Sindh Madressatul Islam University – Karachi International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com ( “Wireless Sensor Network Through Shortest Path Route” ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2, February 2013)
- R. S. Mangrulkar, Dr. Mohammad Atique Reseach Scholar, S.G.B.A.U, Assistant Professor, Department of Computer Engineering, B.D.College of Engineering, Sevagram, Wardha, Maharashtra, India Associate Professor, P.G. Department of Computer Science and Engineering, S.G.B.A.U Amravati, Maharashtra, India rsmangrulkar@gmail.com, mohd.atique@gmail.com “Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile Adhoc Network “
- A. D. Bhoi, Dr. R. D. Kharadkar and Dr. A. Y. Deshmukh ”Propagation Models for Analysis of AdHoc Routing Protocols based on Multi Ray Modeling” CiiT International Journal of Wireless Communication, Vol 5, No 8, August 2013.
- Brad Williams, Tracy Camp Department of Math and Computer Science Colorado School of Mines Golden, CO80401 email: {bwilliam,tcamp}@mines.edu URL: http://toilers.mines.edu 15 March 2002 ”Comparison of Broadcasting Techniques for Mobile Ad Hoc Networks”.
- Abderezak Touzene, Ishaq Al-Yahyai Department of Computer Science Sultan Qaboos University Muscat, OMAN touzene, m024178@squ.edu.om ”Performance Analysis of a Grid Based Route Discovery in AODV Routing Algorithm for MANET” 2014 Second International Conference on Artificial Intelligence, Modelling and Simulation.