The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network infrastructure today has become highly evolved and is required to support converged IP applications such as the triple play of video, voice and data. All of these applications have numerous means of implementation and myriad protocols. More emphasis on quality is being placed on communications equipment manufacturers and network providers alike to provide high quality user experience for applications...
This paper proposes RADICAL independent component analysis (ICA) algorithm for detection of DS-CDMA signals and also effect of fading on ICA based detection of DS-CDMA has been studied. ICA based technique is based on independence of source signals and these conditions are satisfied in multi-user CDMA environment. Combining an ICA element to conventional signal detection reduces multiple access interference...
Composed of mobile nodes, MANETs rely on the entire collaboration of nodes to provide routing and forwarding functions. Many solutions have been proposed to enforce the collaboration of nodes in MANETs. Most of them rely on monitoring mechanisms to detect selfish or malicious behaviors. These mechanisms have in common the implicit use of MAC layer information in their detection process. This paper...
A particularly severe attack on routing protocols in mobile ad hoc networks (MANETs) is the collusion attack, in which a pair of colluding attackers prevent routes to a specific node (targeted node) from being established. This attack has devastating impact on Optimized Link State Routing (OLSR) protocol which is one of the standard routing protocols for MANETs. When there is a collusion attack in...
Sensor network is receiving considerable attention as one of the key technologies to keep track of the parameters in the industrial field. Wireless sensor networks (WSN) integrate sensor technology, embedded technology, distributed information processing and network communication. The nodes of WSN serve the functions of perceiving and routing. Power consumption is the key factor affecting the longevity...
A mobile ad-hoc network (MANET) is a collection of mobile nodes which communicate over radio. These kinds of networks are very flexible and thus they do not require any fixed infrastructure or central administration. Therefore, mobile ad-hoc networks can be deployed easily and used as temporary communication links. The biggest challenge in these kinds of networks is to find a path between the communication...
In the present scenario, mobile communication is being widely used in the areas where infrastructure-based telecommunication systems are unavailable or to deploy one is not cost effective. However, often users suffer due to the fact that mobile devices have very low computational capability and thus are incapable of executing many applications with higher resource requirements. In a mobile adhoc network...
Non uniform energy consumption of the nodes is a major area of concern in cluster based data gathering architectures proposed for wireless sensor networks in the literature and is an active area of research over recent past years. The solutions suggested in the literature, for uniform distribution of energy consumption, require rotation of clusterhead role among sensor nodes but every such rotation...
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks (WSN). In this regard, symmetric key cryptography is very attractive in WSN. In this paper, we have proposed Mobile Agent (MA) Based Secure Location aware Key Establishment (MASLKE). In MASLKE, MAs find the location of sensor nodes and this information is used for key generation and distribution. MASLKE...
The real time communication networks are designed to support multimedia applications requiring quality of services (QoS). The multicasting is needed when number of users want to communicate simultaneously. This paper present an approach based on evolutionary programming to solve the QoS constrained multicast routing problem, which is a NP complete problem. The multicast tree is obtained corresponding...
The GPRS network has been well integrated in global system for mobile (GSM) network, the most dominant cellular standard, to accomplish efficient spectrum utilization for data traffic. It has become a popular service which carries critical business and social information of many subscribers. The issue of survivability for a GPRS network requires more investigation. This work introduces a new measure...
Locating mobile agents in a network of mobile agent systems still represents an open research issue. The cost of location management strategies mainly depends on the cost of search and update. We have developed a location management technique, named broadcasting with search by path chase (BSPC), applicable for multi-region environments. Using a Petri net tool we modeled, analyzed and simulated BSPC...
One of the key challenging aspects of peer-to-peer systems has been efficient search for objects. To achieve this, we need to minimize the number of nodes that have to be searched, thereby use minimum number of messages during the search process. This can be done by selectively sending requests to nodes having higher probability of a hit for the queried object. In this paper we present an algorithm...
Clustering algorithms in wireless sensor network are used to save energy consumption. Existing clustering algorithms did not consider the energy optimization inside the clusters and they created new clusters once the cluster head of a cluster becomes dead. The removal and creation of new clusters create communication overhead. Here we propose a clustering algorithm for specific area of deployment...
Scanning tools are commonly used by intruders for identifying vulnerable hosts and applications in a network. So from security perspective, to identify the attack in its initial stage and to minimize the impact of attack, it is important to detect scanning activities in a network. We have mainly considered TCP flow because most of the Internet application uses it as a transport protocol. Traditionally,...
It is anticipated that wearable wireless sensors in body area network (BAN) will increase the functionality of lifestyle and health care devices to gradually match the needs of society by year 2010 and people will carry their personal Body Area Network. The applications in areas like lifestyle, assisted living, sports, entertainment functionalities, toxic levels in the lungs of a Fire-Fighter, radiation...
With the rapid growth of the Internet and other Internet-protocol related applications, many improvements have been made at the data link layer in wireless systems to support a wider variety of data services. However, further improvements in packet data admission, scheduling and policing between nodes in the network are necessary to maximize throughput and user satisfaction. In the above three, scheduling...
Grids now-a-days comprise of individual resources. These types of grids are called dynamic grids. The centralized grid services are being gradually replaced by distributed and scalable algorithms. One such grid service is dissemination of resource information (DRI) state among the nodes. Every node in a dynamic grid has resource information associated with it. There are different methods proposed...
These wireless ad hoc sensor networks (WSNs) have received considerable academia research attention at present. The main purpose of a sensor network is information gathering and delivery. Therefore, the quantity and quality of the data delivered to the end-user is very important. The energy-constrained sensor nodes in WSNs operate on limited batteries, so it is a very important issue to use energy...
Wireless sensor networks attract applications ranging from border security to commercial market, and demand efficient security solution par application requirements. This paper presents a password-based authenticated key agreement protocol that allows mutual authentication and secure data transmission between sensor network and user. The protocol is well-suited in the resource-constrained sensor nodes,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.