Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jangra, Ajay
- Ca-LEACH: a Communication Controlling Agent Based Low Energy Adaptive ClusteringHierarchy Algorithm for Wireless Sensor Network
Abstract Views :172 |
PDF Views:4
Authors
Ajay Jangra
1,
Amisha Dhiman
1
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
Source
Wireless Communication, Vol 5, No 7 (2013), Pagination: 281-287Abstract
Energy efficiency is a major concern in designing a protocol for WSN. Clustering sensor nodes is an important and effective way of achieving this goal. However LEACH is an elegant example of clustered based structure which uses TDMA based MAC protocol for preserving energy still it has some drawbacks. One of the main drawback is it has no optimal data aggregation technique and it provides no reliability in terms of data transportation. Better data aggregation technique may reduce the overall energy dissipation for a cluster in LEACH as battery consumption is important fact taken to be in consideration which is a scarce resource and can‟t replace further in the network after battery loss. By introducing role of controlling agenta novel protocol Ca-LEACH is developed which basically relies on two main factors i.e. reliability in terms of all data packet delivery and energy efficiency which is based on optimal data aggregation technique which helps to reduce the energy dissipation and reducing delay in terms of data delivery to BS. MATLAB simulation shows that considering controlling agent for selection of CH and for measuring packet loss ratio in between the communication path of each CH to BS provides a significant way to reduce the energy consumption and reliability in the network.Keywords
WSN, Energy Efficiency, Reliability, Clustering, LEACH, Communication Controlling Agent (Ca), MATLAB.- Robust Location Aware Wormhole Detection Technique for Wireless Sensor Network
Abstract Views :190 |
PDF Views:3
Authors
Ajay Jangra
1,
Bhavana
1
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
Source
Wireless Communication, Vol 5, No 7 (2013), Pagination: 288-293Abstract
The Wireless Sensor Networks are typically deployed in ubiquitous and pervasive applications that make them susceptible to various forms of security attacks. In addition, due to the limited battery capacity, processing and memory powered sensor nodes make it difficult to devise the security protocols that are inherently resource intensive. Due to lack of security, nodes tend to get compromised by the adversaries. These nodes attract the data towards itself and either modifies the data and denies forwarding it. This paper ensures that the sensor network is secure to large extend by eliminating the compromised nodes. One of the potent forms of attacks is the Wormhole attacks - a Denial of Service attack on the network layer. Wormhole attacks enable an attacker with limited resources and no cryptographic material to disrupt wireless networks. In wormhole attack, an attacker records packet at one location in the network, tunnels them (possibly selectively) to another location and retransmits them there into the network. In this paper, present an algorithm for detecting wormhole attacks in wireless sensor network.Keywords
GPS, Range Free Localization, Wormhole Attack, WSN.- Performance Enhancement of ZRP Using Uniform BER Factor in MANETs
Abstract Views :135 |
PDF Views:3
Authors
Ajay Jangra
1,
Manisha
1
Affiliations
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
1 Department of Computer Science and Engineering, University Institute of Engineering & Technology, Kurukshetra University Kurukshetra, IN
Source
Wireless Communication, Vol 5, No 7 (2013), Pagination: 294-299Abstract
Wireless Ad-Hoc networks are usually defined as an autonomous system of nodes connected by wireless links and communicating in a multi-hop fashion. The benefits of ad-hoc networks are many, but the most important one is their ease of deployment without centralized administration or fixed infrastructure, thereby enabling an inexpensive way to achieve the goal of ubiquitous communications. Ad hoc network uses different types of protocols like reactive protocols and proactive protocols. It can also use the combination of these two types, called hybrid protocol. Hybrid protocol uses limited scope proactive approach to maintain routes towards a surrounding zone and reactive approach to communicate with farther destinations. In this paper, the concept Bit Error Ratio (BER) factor is introduced to improve the performance of hybrid protocol.Keywords
Wireless Mobile Ad-Hoc Networks, QoS, MANET, Hybrid, Reactive, Proactive.- Prosperity, Risks and Challenges in Cloud Computing
Abstract Views :128 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
2 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
1 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN
2 Department of Computer Science and Engineering, U.I.E.T., Kurukshetra University, Kurukshetra, IN