Design Frameworks for Wireless Networks -

Design Frameworks for Wireless Networks (eBook)

eBook Download: PDF
2019 | 1st ed. 2020
XXI, 433 Seiten
Springer Singapore (Verlag)
978-981-13-9574-1 (ISBN)
Systemvoraussetzungen
171,19 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book provides an overview of the current state of the art in wireless networks around the globe, focusing on utilizing the latest artificial intelligence and soft computing techniques to provide design frameworks for wireless networks. These techniques play a vital role in developing a more robust algorithm suitable for the dynamic and heterogeneous environment, making the network self-managed, self-operational, and self-configurational, and efficiently reducing uncertainties and imprecise information.

Dr. Santosh Kumar Das received his Ph.D. degree in Computer Science and Engineering from Indian Institute of Technology (ISM), Dhanbad, India, in 2018 and completed his M. Tech. degree in Computer Science and Engineering from Maulana Abul Kalam Azad University of Technology (erstwhile WBUT), West Bengal, India, in 2013. He is currently working as Assistant Professor at School of Computer Science & Engineering, National Institute of Science and Technology, Berhampur, Odisha-761008. He is having more than eight years teaching experience. He has contributed more than 25 research papers. His research interests mainly focus on Ad-hoc and Sensor Network, Artificial Intelligence, Soft Computing, and Mathematical modeling.

Mr. Sourav Samanta is currently working as Assistant Professor in the Department of Computer Science and Engineering at University Institute of Technology, The University of Burdwan, West Bengal, India. Before joining the University Institute of Technology, he worked as lecturer at the GobindpurSephali Memorial Polytechnic, Guskara, Burdwan, West Bengal. He has completed M. Tech in Computer Science and Engineering from JIS College of Engineering, Kalyani, West Bengal and completed B.E in Information Technology from University Institute of Technology, Burdwan, West Bengal respectively. He has more than six years, academic experience.

His research area includes Bio Inspired Computing, Quantum Machine Learning and Information Security, Networking. He has published 40 research papers in various reputed International Journals and Conference and co-authored a book. He is a regular reviewer of IEEE Access and IEEE Sensor Journals. He serves as Program Committee member for various International Conferences. He has an interest in interdisciplinary research. He is a member of Computer Society of India and International Association of Engineers.

Dr. Nilanjan Dey is an Assistant Professor (Senior Grade) in Department of Information Technology at Techno India College of Technology (under Techno India Group), Kolkata, India. He has completed his PhD. in 2015 from Jadavpur Univeristy, Kolkata, India. He is a Visiting Fellow of Wearables Computing Laboratory,Department of Biomedical Engineering Univeristy of Reading, UK. He is the Visiting Professor of College of Information and Engineering, Wenzhou Medical University, P.R. China and Duy Tan University, Vietnam. He has held honorary position of Visiting Scientist at Global Biomedical Technologies Inc., CA, USA (2012-2015). He is a Research Scientist at Laboratory of Applied Mathematical Modeling in Human Physiology, Territorial Organization of- Scientific and Engineering Unions, Bulgaria, Associate Researcher of Laboratoire RIADI, University of Manouba, Tunisia and Scientific Member of - Politécnica of Porto. Before he joined Techno India College of Technology, he has served as an Assistant Professor at JIS College of Engineering and Bengal College of Engineering and Technology.

With more than 10 years of teaching and research experience, he has authored/edited more than 40 books with Elsevier, Wiley, CRC Press and Springer, and published more than 350 research articles. He is the Editor-in-Chief of Int. J. of Ambient Computing and Intelligence (IJACI, IGI Global,UK, Scopus), Int. J. of Rough Sets and Data Analysis (IGI Global,US, DBLP,ACM dl). He is the Series Co-Editor of Springer Tracts in Nature-Inspired Computing (STNIC), Springer and Advances in Ubiquitous Sensing Applications for Healthcare (AUSAH), Elsevier, Series Editor of Computational Intelligence in Engineering Problem Solving and Intelligent Signal processing and data analysis, CRC Press (FOCUS/Brief Series), De Gruyter Series on the Internet of Things and Advances in Geospatial Technologies (AGT) Book Series, (IGI Global), US, serves as an editorial board member of several international journals, including International Journal of Image Mining (IJIM), Inderscience, Associated Editor of IEEE Access (SCI-Indexed), and International Journal of Information Technology, Springer.

In addition, he was awarded as one among the top 10 most published academics in the field of Computer Science in India during the period of consideration 2015-17 during 'Faculty Research Awards' organized by Careers 360 at New Delhi, India on March 20, 2018.

His main research interests include Medical Imaging, Machine learning, Computer Aided Diagnosis as well as Data Mining. He has been on program committees of over 50 international conferences, a workshop organizer of 5 workshops, and acted as a program co-chair and/or advisory chair of more than 10 international conferences. 

He has given more than 50 invited lectures in 10 countries, including many invited plenary/keynote talks at the international conferences such as ITITS2017 (China), TIMEC2017 (Egypt) and BioCom2018 (UK) etc.

Dr. Rajesh Kumar  received a B.Tech. Degree with Honours from National Institute of Technology, Kurukshetra, India, in 1994. He also earned a M.E. Degree with Honours from the Malaviya National Institute of Technology, Jaipur, India in 1997; he earned a PhD. Degree from the Malaviya National Institute of Technology, Jaipur and University of Rajasthan, Jaipur in 2005. He was awarded Post Doctorate Research Fellow in the Department of Electrical and Computer Engineering at the National University of Singapore (NUS), Singapore, from 2009 to 2011. He is currently serving as Professor and Head. He is also adjunct faculty to Centre of Energy and Environment at Malaviya National Institute of Technology, Jaipur, India.

Dr. Kumar has carried out extensive research in various areas of theory and practice of intelligent systems, bio and nature inspired algorithms, smart grid, power electronics, power management, applications of AI to image processing and robotics. He has published more than 450 papers in international refereed journals and conferences. He has received and published 12 patents. He has supervised 15 PhD and 35 Master thesis. Dr. Kumar has won the Career Award for Young Teachers, Government of India in 2000. He received 06 best thesis awards, 05 academic awards, 12 best paper awards, 04 professional awards and 30 student awards.

He is Vice Chairman, IEEE Rajasthan Sub Section and Executive Member, IEEE PES-IAS Delhi Chapter and Computer Society of India, Rajasthan Section. He is Associate Editor of IEEE ITeN (Industrial Electronics Technology News), Associate Editor, Swarm and Evolutionary Computation, Associate Editor, IET Renewable and Power Generation, Associate Editor, IET Power Electronics, Deputy Editor-in-Chief, CAAI Transactions on Intelligent Technology, Associate Editor, International Journal of Bio Inspired Computing. He is an Editorial Member of more than 15 Journals. Dr. Kumar is also Senior Member IEEE (USA), Fellow IET (UK), Fellow IE (INDIA), Fellow IETE, Life Member CSI, Senior Member IEANG and Life Member ISTE.

This book provides an overview of the current state of the art in wireless networks around the globe, focusing on utilizing the latest artificial intelligence and soft computing techniques to provide design frameworks for wireless networks. These techniques play a vital role in developing a more robust algorithm suitable for the dynamic and heterogeneous environment, making the network self-managed, self-operational, and self-configurational, and efficiently reducing uncertainties and imprecise information.

Foreword 6
Preface 9
Objective of the Book 9
Organization of the Book 10
List of Reviewers 15
Contents 17
About the Editors 19
Design and Enhancement of Security and Privacy Technique 22
An Analysis and Comparison of Security Protocols on Wireless Sensor Networks (WSN) 23
1 Introduction 24
2 Literature Survey 25
3 Security in Wireless Sensor Networks (WSN) 26
3.1 Sanctuary Requirements in WSN 26
3.2 Constraints in WSN 27
3.3 Security Threat Models 28
3.4 Security Solutions in WSN 32
4 Key Management Systems 33
4.1 Protocols and Methods Classification 34
5 Analysis and Discussion 37
5.1 Analysis Method 37
5.2 Discussion 38
6 Conclusions 39
References 39
On the Security Weaknesses in Password-Based Anonymous Authentication Scheme for E-Health Care 42
1 Introduction 43
1.1 Threat Model 44
1.2 Bio-hash Function 44
1.3 Contribution 45
1.4 Organization of This Article 45
2 Literature Review 46
3 Overview of Mishra et al. mishra:bar Protocol 47
3.1 Registration Phase 47
3.2 Login Phase 48
3.3 Verification Phase 50
3.4 Password Change Phase 50
3.5 Smart Card Revocation Phase 51
4 Cryptanalysis of Mishra et al. mishra:bar Scheme 51
4.1 Designing Imperfection in Login Phase 51
4.2 Designing Imperfection in Authentication Phase 51
4.3 Designing Imperfection in Password Change Phase 52
4.4 Lack of Biometric Update or Change Phase 53
4.5 Strong Replay Attack 53
4.6 Clock Synchronization Problem 53
5 Performance Comparison 54
6 Future Scope 57
7 Conclusion 57
References 57
Integrated Probabilistic Relevancy Classification (PRC) Scheme for Intrusion Detection in SCADA Network 60
1 Introduction 61
2 Related Work 63
3 Proposed Method 66
3.1 Preprocessing 69
3.2 String Matching 71
3.3 Clustering and Classification 71
4 Performance Analysis 74
4.1 Confusion Matrix 75
4.2 Error Rate 76
4.3 Recall 76
4.4 False Detection Rate 77
4.5 Classification Result for Existing and Proposed Classifiers 78
4.6 Sensitivity, Specificity, and Accuracy 78
5 Conclusion 81
References 81
Intrusion Detection System in Internet of Things 83
1 Introduction 84
2 Motivation 84
3 Internet of Thing 85
3.1 IoT Architecture 85
3.2 Life Cycle of IoT and Possible Attacks 86
4 Comparison of Internet of Things and Traditional IP Network 88
4.1 IoT Protocol Stack 88
4.2 IPv6 Border Router (6BR) 90
5 Intrusion Detection System 90
5.1 Intrusion Detection Approaches 91
6 Cyberattacks in IoT Applications 92
6.1 Wormhole Attack 93
6.2 Sinkhole Attack 93
6.3 Selective Forwarding Attack 94
6.4 Sybil Attack and Clone ID Attack 94
6.5 Hello Flood Attack 94
6.6 Denial of Service (DOS) Attack 94
7 Security in IoT Applications 95
7.1 IPSec Capabilities in IoT System 95
7.2 Challenges and Design Criteria of IoT Security System 96
7.3 Need of IDSs in IoT 96
8 Intrusion Detection System in IoT Applications 97
8.1 Intrusion Detection System for Dos Attack 97
8.2 Intrusion Detection System for Wormhole Attack 100
8.3 Intrusion Detection System for Sinkhole Attack 102
8.4 Intrusion Detection System for Internet of Things 104
8.5 Comparative Analysis of SVELTE and INTI IDSs 108
9 Conclusion 109
References 110
Deep Learning and Machine Learning Techniques for Intrusion Detection and Prevention in Wireless Sensor Networks: Comparative Study and Performance Analysis 112
1 Introduction 113
2 Literature Survey 113
3 Proposed Methodology 115
4 Comparative Analysis and Discussions 116
4.1 Support Vector Machine 119
4.2 Naïve Bayes 122
4.3 Random Forest 124
4.4 Decision Tree 126
4.5 K-Nearest Neighbor 129
5 Deep Learning Approach 131
6 Conclusion 133
References 135
Design of Automation and Troubleshooting Technique 138
Study and Design of Route Repairing Mechanism in MANET 139
1 Introduction 140
2 Related Work 141
3 Proposed Work 146
3.1 Route Discovery 147
3.2 Route Recovery 148
4 Simulation Results and Analysis 157
4.1 Packet Delivery Ratio 160
4.2 End-to-End Delay 161
4.3 Packet Loss 161
5 Conclusion 163
References 163
A Comprehensive Parameterized Resource Allocation Approach for Wireless Sensor Networks 166
1 Introduction 167
1.1 Background of Wireless Sensor Network 169
1.2 Features of Wireless Sensor Networks 171
1.3 Challenges and Constraints 172
1.4 Energy 172
1.5 Congestion 173
1.6 Node Deployment 173
1.7 Wireless Medium 174
1.8 Hardware Constraints 174
1.9 Security 175
2 Related Work 176
3 System Model and Problem Statement 181
4 Algorithm Design: CPRA 182
5 Performance Evaluation 185
5.1 Parameters for Performance Evaluation 186
6 Conclusion 188
References 189
Effect of Wormhole Attacks on MANET 191
1 Introduction 192
2 Related Works 193
3 Characteristics of MANET 194
3.1 Ins and Outs of MANET 194
3.2 Working Principal of MANET 195
3.3 Commonly Used Terms in AODV Ecosystem 196
4 Problem Formulation 197
5 Wormhole Attack 197
5.1 Attack Medium 198
5.2 Attacking Modes 200
5.3 Effects of the Attack 200
6 Simulation Environment 201
6.1 Attack Simulation 202
7 Conclusion 207
References 208
Distributed Online Fault Diagnosis in Wireless Sensor Networks 210
1 Introduction 210
2 Faults, Errors, and Failures in Sensor Networks 212
3 Related Work 213
4 System Model 215
4.1 Assumptions, Notations, and Their Meanings 215
4.2 Network Model 216
4.3 Fault Model 217
5 Data Modeling and Problem Formulation 218
5.1 Data Model 219
5.2 Problem Formulation 220
6 Distributed Intermittent Self Fault Diagnosis Algorithm 220
7 Analysis of the Distributed Fault Diagnosis Algorithm 221
7.1 Data Analysis of an Intermittent Faulty Sensor 221
7.2 Mathematical Analysis of the Distributed Fault Diagnosis Algorithm 224
8 Result and Discussion 226
8.1 Simulation Model 227
8.2 Confidence Interval 230
9 Conclusion 232
References 232
Ambient Intelligence for Patient-Centric Healthcare Delivery: Technologies, Framework, and Applications 235
1 Introduction 235
2 Supporting Technologies for Ambient Intelligence Systems 238
2.1 Sensors 238
2.2 Networks 241
2.3 Human–Computing Interface 241
2.4 Pervasive Computing 242
2.5 Artificial Intelligence 243
2.6 Software Agent 243
2.7 Internet of Things 244
3 Emergence of Ambient Intelligence in Healthcare Delivery 244
3.1 Medical Information Systems 245
3.2 Wearable Devices 246
3.3 Ambient Assisted Living (AAL) 247
3.4 Health Knowledge 247
3.5 Intelligent Diagnosis 248
3.6 Work Flow Process 248
4 Role of Wireless Body Area Networks in Healthcare AmI Systems 248
5 Patient-Centric Ambient Healthcare Framework 252
5.1 Sensing and Communication 254
5.2 Context-Aware Reasoning Engine 254
5.3 Case-Based Reasoning Engine 255
5.4 Intelligent Techniques and Data Mining Services 256
5.5 Cloud Server Storage and Data Management 256
5.6 Sensory Data Fusion Using Markov Chain Model 257
5.7 Web Services Module 258
6 Major Applications of AmI in Healthcare 259
6.1 Uninterrupted Health Status Monitoring 259
6.2 Activity Recognition 260
6.3 Human Stress and Energy Expenditure Assessment 260
7 Illustration Case—Ambient Assisted Care (AAC) at Hospital 260
8 Conclusion and Future Scope 263
References 264
Design of Optimization Based Network Lifetime Enhancement Technique 267
Evolutionary Algorithms for Coverage and Connectivity Problems in Wireless Sensor Networks: A Study 268
1 Introduction 268
2 Sensing and Communication Model 270
2.1 Binary Sensing Model 270
2.2 Probabilistic Sensing Model 270
2.3 Communication Model 271
3 Coverage and Connectivity 271
3.1 Coverage 271
3.2 Connectivity 273
4 Evolutionary Algorithms for Coverage and Connectivity 273
4.1 Genetic Algorithm 274
4.2 Harmony Search Algorithm 278
4.3 Ant Colony Optimization 280
4.4 Non-dominated Sorting Genetic Algorithm (NSGA–II) 283
4.5 Some Other Evolutionary Algorithms 285
5 Research Challenges and Open Issues 286
5.1 Optimum Node Deployment 286
5.2 Three-Dimensional Networks 286
5.3 Lifetime Maximization of Networks 286
5.4 Fault Tolerance 287
5.5 Real-Time Protocols 287
5.6 Nonuniformity in Sensing and Communication Range 287
5.7 Coverage and Connectivity in Presence of Obstacles 287
6 Conclusion 288
References 288
Nature-Inspired Algorithms for k-Coverage and m-Connectivity Problems in Wireless Sensor Networks 292
1 Introduction 293
1.1 Author’s Contribution 294
1.2 Organization of the Chapter 295
2 Nature-Inspired Algorithms 295
2.1 Genetic Algorithm 295
2.2 Particle Swarm Optimization 296
2.3 Differential Evolution 296
2.4 Gravitational Search Algorithm 297
3 Network Model and Problem Formulation 299
3.1 Network Model 299
3.2 Terminologies 299
3.3 Problem Definition 300
3.4 Derivation of Fitness Function 301
4 GA-Based Approach 302
4.1 Chromosome Encoding 302
4.2 Initialization of Population 303
4.3 Fitness Function 303
4.4 Selection, Crossover, and Mutation Operation 303
5 PSO-Based Approach 304
5.1 Particle Representation 304
5.2 Fitness Function 304
5.3 Velocity and Position Update 305
6 DE-Based Approach 305
6.1 Vector Representation 305
6.2 Fitness Function 305
6.3 Mutation 305
6.4 Crossover 305
6.5 Selection 306
7 GSA-Based Approach 306
7.1 Agent Representation 306
7.2 Update Velocity, Mass, Position, and Force 306
7.3 Fitness Function 307
8 Experimental Results 307
9 Conclusion 308
References 309
Swarm Intelligent Based Detection in the Uplink of Large-Scale MIMO Wireless Communication Systems 313
1 Introduction 314
2 System Model 316
3 Traditional Detection Techniques 317
3.1 Zero Forcing 317
3.2 Minimum Mean Square Error 319
3.3 Maximum Likelihood Detection and Sphere Decoder 319
4 SSO-Based Large MIMO Detection 320
5 ACO-Based Large MIMO Detection 323
6 Simulation Results and Discussion 324
7 Conclusion 327
References 328
A Nonlinear Strategy Management Approach in Software-Defined Ad hoc Network 331
1 Introduction 332
1.1 Emergence Role in Softwarization 332
1.2 Frameworks and Architectures 333
1.3 Applications of SDANET in Social Networking 334
1.4 Implementation Issues and Prospective Solutions 334
1.5 Motivations 336
1.6 Our Contributions 336
1.7 Structure of the Paper 337
2 Literature Review 337
3 Proposed Model 338
3.1 Outline 338
3.2 Network Model 339
3.3 Parameter Structure 341
3.4 Strategy Mapping for Route Selection 342
3.5 Nonlinear Formulation for Route Selection 344
4 Simulation Environment and Performance Analysis 347
4.1 Simulation Model 349
4.2 Performance Metrics 349
5 Conclusion 353
References 353
Image Encryption in IoT Devices Using DNA and Hyperchaotic Neural Network 357
1 Introduction 357
1.1 Internet of Multimedia Things 358
1.2 Encryption Techniques in Images 359
1.3 Latest Trends in Image Encryption Using DNA and Neural Networks 361
2 Relevant Sources of Literature 366
2.1 Neural Network-Based Chaotic System for Encryption 366
2.2 Heterogenous Chaotic Neural Network and DNA Encoding 368
2.3 Color Image Encryption Based on Fractional-Order Hyperchaotic Systems 369
3 Our Proposed Work 369
4 Analysis of the Test Results 380
5 Application 383
6 Conclusion 383
References 384
Design and Implementation of Efficient Routing Protocol 386
Implementation of Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Networks 387
1 Introduction 388
1.1 Wireless Body Area Network (WBAN) 388
1.2 Architecture of WBAN 389
1.3 Application of WBAN 389
1.4 Superframe Structure 390
1.5 Objective of MAC Layer 392
2 Literature Review 393
3 Problem Statement 394
3.1 Traffic Priority Aware Medium Access Control Protocol (TAMAC) 395
3.2 Suggested Superframe Structure 396
4 Performance Evaluation 400
4.1 Simulation Implementation 401
4.2 Analysis of Results 402
5 Conclusion 404
References 404
Enhanced Shortest Path Routing Protocol Using Fuzzy C-Means Clustering for Compromised WSN to Control Risk 406
1 Introduction 407
2 Related Work 408
3 Proposed Work 409
3.1 Network Model 409
3.2 Reputation System in WSN 409
3.3 Enhanced Secure Shortest Path Routing with CRs 410
4 Performance Assessment and Result 414
4.1 Simulation Setup 415
4.2 Success Rate of Package Delivery 415
4.3 Average Length of the Routing Paths 416
4.4 Totality in Transmitting the Data 418
4.5 Energy Efficiency of ESPRA 419
4.6 Performance Discussion 419
5 Conclusion 420
References 421
Fuzzy Petri Nets-Based Intelligent Routing Protocol for Ad Hoc Network 423
1 Introduction 423
2 Related Works 424
3 Preliminaries 427
3.1 Fuzzy Logic 427
3.2 Petri Nets 428
4 Proposed Work 428
4.1 Evaluation of FC 429
4.2 Route Selection by Using FPN 431
5 Performance Evaluation 434
6 Conclusion 437
References 437

Erscheint lt. Verlag 10.8.2019
Reihe/Serie Lecture Notes in Networks and Systems
Lecture Notes in Networks and Systems
Zusatzinfo XXI, 433 p. 182 illus., 108 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Technik Nachrichtentechnik
Schlagworte Ad-Hoc Network • Aggregation Technique • Automation System • Intelligence System • Optimization • routing protocol • Wireless Body Area Network • wireless sensor network
ISBN-10 981-13-9574-8 / 9811395748
ISBN-13 978-981-13-9574-1 / 9789811395741
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 14,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
17,43