Next-Generation Networks (eBook)
XVIII, 588 Seiten
Springer Singapore (Verlag)
978-981-10-6005-2 (ISBN)
Dr. D.K. Lobiyal is currently working as Professor at the School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India. He received his Ph.D. and M.Tech. (Computer Science) from the School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India in 1996 and 1991, respectively, and B.Tech. (Computer Science and Engineering) from Lucknow University, India in 1988. His research interests include Wireless Networks, Mobile Ad hoc Networks, Wireless Sensor Network, Wireless Multimedia Networks, Vehicular Ad hoc Networks (VANETs) and Natural Language Processing. Dr. Lobiyal has published papers in International journals and conferences including IEEE, Wiley & Sons, Springer, Inderscience, WSEAS, IGI Global and ACM.
Prof. Vibhakar Mansotra did his Masters in Physics in 1986 and M.Phil. Crystal Growth (Physics) in 1988 and also one-year PGDCA in 1990. After completing his M.Phil. and PGDCA he Joined the Department of Computer Science
and IT, University of Jammu as Ad hoc Lecturer in the year 1991 (February) and later got confirmed in the same Department in the year 1992 (October). In the year 1997, he went to the Indian Institute of Technology Delhi (IIT Delhi) for completing his M.Tech. Computer Science and completed the same in December 1998. After acquiring his M.Tech. degree from IIT Delhi, he took over as Head of the Department in April 2012 and remained in this position for three years up to April 2015. During his tenure as the Head of the Department, he contributed a lot to the growth of his Department and brought the Department on the national map as one of the best Departments in the country. During his tenure as Head he also started an M.Tech. programme in Computer Science in the Department, thereby bringing more laurels to the Department at the national level. During his tenure as Head he got the Best Teacher Award in Information Technology (IT) by Amar Ujala B-School Excellence Awards held in Bombay on 23rd November 2012 and also the Best Professor Award in Information Technology (IT) by LOKMAT National Education Leadership Awards held in Bombay on 13th February 2015. Besides his teaching achievements he has contributed extremely well to the design of new courses and programmes and has earned a name in his region. He has remained an active member of various academic bodies of the University and various neighbouring universities.Dr. Umang, IBM RAD Certified 'Associate Developer,' has completed her doctorate from University School of Information, Communications & Technology Department, Guru Gobind Singh Indraprastha University (GGSIPU), Delhi. Currently, Dr. Umang is working as an Assistant Professor at the Institute of Technology and Science, Ghaziabad, UP and has experience of more than 12 yrs in academics. She is an active researcher having interest in the area of Mobile Ad hoc Networks, Sensor Networks, Vehicular Ad hoc Networks (VANETs), Software Management and Software Engineering. She is guiding M.Tech./ Ph.D. students of various reputed universities. She has organized various conferences/seminars and faculty development programmes and has also worked as Editor and Joint Editor in Journals and Conferences. She has also authored a book titled 'Real Time System' and co-authored the title 'MCA IV Handbook' published by Pragati Publication, Meerut (UP). She is an active member of various societies and professional bodies including IEEE and a life member of the Computer Society of India (CSI). She has delivered lecture talks on the area of Information security, Mobile communications, Vehicular networks, Sensor networks, Ad hoc networks and its implementation in ns2. She has more than 40 research papers in esteemed national/international conferences and journals including ACM, IEEE, IET credited to her name and is also a reviewer of national/international journals.
This book comprises select proceedings of the 2015 annual conference of the Computer Society of India. The books focuses on next generation networks (NGN). An NGN is a packet-based network which can provide services including telecommunication services. NGNs make use of multiple broadband, quality-of-service-enabled transport technologies in which service-related functions are independent from underlying transport-related technologies. This volume includes contributions from experts on various aspects of NGNs. The papers included cover theory, methodology and applications of ad-hoc networks, sensor networks, and the internet. The contents also delve into how the new enterprise IT landscape of cloud services, mobility, social media usage and big data analytics creates different types of network traffic to the traditional mix of in-house client-server enterprise workloads. The contents of this book will be useful to researchers and professionals alike.
Dr. D.K. Lobiyal is currently working as Professor at the School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India. He received his Ph.D. and M.Tech. (Computer Science) from the School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India in 1996 and 1991, respectively, and B.Tech. (Computer Science and Engineering) from Lucknow University, India in 1988. His research interests include Wireless Networks, Mobile Ad hoc Networks, Wireless Sensor Network, Wireless Multimedia Networks, Vehicular Ad hoc Networks (VANETs) and Natural Language Processing. Dr. Lobiyal has published papers in International journals and conferences including IEEE, Wiley & Sons, Springer, Inderscience, WSEAS, IGI Global and ACM.Prof. Vibhakar Mansotra did his Masters in Physics in 1986 and M.Phil. Crystal Growth (Physics) in 1988 and also one-year PGDCA in 1990. After completing his M.Phil. and PGDCA he Joined the Department of Computer Science and IT, University of Jammu as Ad hoc Lecturer in the year 1991 (February) and later got confirmed in the same Department in the year 1992 (October). In the year 1997, he went to the Indian Institute of Technology Delhi (IIT Delhi) for completing his M.Tech. Computer Science and completed the same in December 1998. After acquiring his M.Tech. degree from IIT Delhi, he took over as Head of the Department in April 2012 and remained in this position for three years up to April 2015. During his tenure as the Head of the Department, he contributed a lot to the growth of his Department and brought the Department on the national map as one of the best Departments in the country. During his tenure as Head he also started an M.Tech. programme in Computer Science in the Department, thereby bringing more laurels to the Department at the national level. During his tenure as Head he got the Best Teacher Award in Information Technology (IT) by Amar Ujala B-School Excellence Awards held in Bombay on 23rd November 2012 and also the Best Professor Award in Information Technology (IT) by LOKMAT National Education Leadership Awards held in Bombay on 13th February 2015. Besides his teaching achievements he has contributed extremely well to the design of new courses and programmes and has earned a name in his region. He has remained an active member of various academic bodies of the University and various neighbouring universities.Dr. Umang, IBM RAD Certified “Associate Developer,” has completed her doctorate from University School of Information, Communications & Technology Department, Guru Gobind Singh Indraprastha University (GGSIPU), Delhi. Currently, Dr. Umang is working as an Assistant Professor at the Institute of Technology and Science, Ghaziabad, UP and has experience of more than 12 yrs in academics. She is an active researcher having interest in the area of Mobile Ad hoc Networks, Sensor Networks, Vehicular Ad hoc Networks (VANETs), Software Management and Software Engineering. She is guiding M.Tech./ Ph.D. students of various reputed universities. She has organized various conferences/seminars and faculty development programmes and has also worked as Editor and Joint Editor in Journals and Conferences. She has also authored a book titled “Real Time System” and co-authored the title “MCA IV Handbook” published by Pragati Publication, Meerut (UP). She is an active member of various societies and professional bodies including IEEE and a life member of the Computer Society of India (CSI). She has delivered lecture talks on the area of Information security, Mobile communications, Vehicular networks, Sensor networks, Ad hoc networks and its implementation in ns2. She has more than 40 research papers in esteemed national/international conferences and journals including ACM, IEEE, IET credited to her name and is also a reviewer of national/international journals.
Preface 6
The Organization of CSI-2015 9
Chief Patron 9
Patrons 9
Advisory Committee 9
Editorial Board 10
Contents 11
About the Editors 16
1 100 Gbps High-Speed Broadband Networks 18
Abstract 18
1 Introduction 19
2 Modulation 19
3 Dense Wavelength Division Multiplexing (DWDM) 19
4 Light Source 20
5 Coherent Detection 21
6 Comparison of PM-QPSK 22
7 Conclusion 23
References 23
2 Performance Variation of Routing Protocols with Mobility and Scalability in MANET 25
Abstract 25
1 Introduction 26
2 Categories of Routing Protocols 26
2.1 On-Demand Routing Protocols 26
2.1.1 Ad Hoc On-Demand Distance Vector (AODV) 27
2.2 Table Driven Routing Protocols 27
2.2.1 Optimized Link State Routing (OLSR) 27
3 Analysis Factor in MANET 27
3.1 Mobility 27
3.2 Scalability 28
4 Performance Metrics 28
4.1 Average End-to-End Delay 28
4.2 Average Throughput 28
5 Previous Work 29
6 Problem Statement 29
7 Objective 29
8 Research Methodology 29
9 Simulation Tool 30
10 Network Model Design 30
10.1 Application Configuration 30
10.2 Profile Configuration 30
10.3 Mobility Configuration 32
11 Scenarios and Parameters 32
11.1 DSR Parameters 33
12 Performance Evaluation Metrics 33
13 Performance Comparison of Protocols 34
13.1 Network Delay 34
13.2 Throughput 35
14 Results and Conclusion 36
15 Future Work 36
References 36
3 Variations in Routing Protocol Resulting in Improved Energy Utilization in WSN 38
Abstract 38
1 Introduction 39
2 Problem Definition 39
3 Parameters Analyzed 41
3.1 Throughput 41
4 Conclusions 45
References 46
4 Genetic Algorithm-Based Routing Protocol for Energy Efficient Routing in MANETs 47
Abstract 47
1 Introduction 47
1.1 Energy Efficient Routing Protocols 48
2 Genetic Algorithm 48
3 Simulation Design and Implementation 49
3.1 Experimental Setup and Proposed Algorithm 49
3.2 Experimental Result 51
3.3 Cross Over Operator 51
4 Results and Discussion 52
5 Conclusion and Future Work 53
6 Figures 54
References 54
5 IPv6 Security Issues—A Systematic Review 55
Abstract 55
1 Introduction 55
2 IPsec 56
3 Common Security Threats in IPv4 and IPv6 Networks 57
3.1 Sniffing Attacks 57
3.2 Application Layer Attacks 57
3.3 Flooding Attacks 58
3.4 Rogue Devices 58
3.5 Man-in-the-Middle Attacks 58
4 IPv6 Specific Security Threats 58
4.1 Reconnaissance Attack 58
4.2 Hop-by-Hop 59
4.3 Routing Header Attacks 59
4.4 Fragmentation Header Attacks 59
4.5 ICMPv6 and Multicast 60
5 Security Issues Related to Transition Mechanism 60
5.1 Dual Stack 60
5.2 Tunneling 60
5.3 NAT-PT 61
6 Conclusion 62
References 62
6 Moderating Bandwidth Starvation Using PQDWRR 64
Abstract 64
1 Introduction 64
2 Queue Scheduling Mechanisms 65
2.1 FIFO Queuing 66
2.2 Priority Queuing (PQ) 66
2.3 FQ 66
2.4 DWRR 66
3 Related Work 67
4 Proposed Algorithm 67
5 Simulations 68
6 Result Analysis 69
7 Conclusion and Future Scope 70
References 71
7 Coordinate-Based Void Detection and Recovery in WSN 72
Abstract 72
1 Introduction 72
2 Related Work 73
3 Proposed Algorithm 74
4 Simulation and Results 75
5 Conclusion and Future Scope 76
Acknowledgements 77
References 77
8 Optimized QoS-Based Node Disjoint Routing for Wireless Multimedia Sensor Networks 78
Abstract 78
1 Introduction 78
2 Related Work 79
3 Optimized QoS-Based Node Disjoint Routing 80
4 Simulation Environment 84
4.1 Simulation Parameters 84
4.2 Performance Metric for Simulation 85
4.3 Simulation Results 85
5 Conclusion 87
References 87
9 Review of Industrial Standards for Wireless Sensor Networks 89
Abstract 89
1 Introduction to Wireless Sensor Network (WSN) 89
2 Industrial Standards for WSN 90
2.1 WirelessHART 91
2.2 ISA 100.11a 92
2.3 Zigbee 92
2.4 6LoWPAN 93
2.5 IEEE 802.15.4e 93
3 Comparison of Different Industrial Standards for WSN 94
3.1 Research Gaps 97
4 Conclusion 97
Acknowledgements 98
References 98
10 Fairness and Performance Evaluation of Fuzzy-Based Resource Allocator for IEEE 802.16 Networks 100
Abstract 100
1 Introduction 100
2 Related Work 101
3 Proposed System 102
4 Results and Performance Evaluation 103
5 Conclusion 107
References 107
11 Intrusion Detection and Recovery of MANET by Using ACO Algorithm and Genetic Algorithm 108
Abstract 108
1 Introduction 108
2 Background 109
2.1 Intrusion Detection System (IDS) 109
2.2 Ant Colony Optimization (ACO) 110
2.3 Genetic Algorithm (GA) 110
3 The Proposed Intrusion Detection and Recovery Technique 111
3.1 Parameter Extraction and Detection of Intrusion 111
3.2 Recovery of Network from Intrusion 113
4 Experimental Results 113
5 Conclusion and Future Scope 119
References 119
12 Avoiding Attacks Using Node Position Verification in Mobile Ad Hoc Networks 121
Abstract 121
1 Introduction 121
2 Literature Survey 122
3 Methodology 122
3.1 Notations Are Used in Algorithms 123
3.2 Position Verification 124
4 Results 125
5 Conclusion 127
References 127
13 Algorithm for Multi-Hop Relay in Mobile Ad Hoc Networks 129
Abstract 129
1 Introduction 129
2 Literature Review 130
2.1 On the Delivery Probability of Two-Hop Relay MANETs with Erasure Coding 130
2.2 Delay Control in MANETS with Erasure Coding and F-Cast Relay 130
2.3 Message Drop and Scheduling in DTNs 132
2.4 Delay and Capacity in Ad Hoc Mobile Networks with F-Cast Relay Algorithms 132
3 Methodology 132
3.1 Algorithm of Proposed System 133
4 Results 134
5 Conclusion 135
References 135
14 Comparative Performance of Multipath Routing Protocols in Wireless Mesh Network 137
Abstract 137
1 Introduction 137
2 Multipath Routing in WMN 138
3 Multipath Routing Protocols 139
4 Simulation Environment 141
5 Conclusion 143
References 144
15 Energy-Efficient Approaches in Wireless Network: A Review 145
Abstract 145
1 Introduction 145
2 Layer-Based Approaches 146
2.1 Physical Layer 147
2.2 Data Link Layer 148
2.3 Network Layer 149
2.4 Transport Layer 151
2.5 Application Layer 152
3 Trends 153
4 Conclusion and Future Work 154
References 154
16 Developing Small Size Low-Cost Software-Defined Networking Switch Using Raspberry Pi 157
Abstract 157
1 Introduction 157
2 Related Work 159
3 Steps for Developing SDN Switch 159
4 Laboratory Setup 160
5 Conclusion 162
References 162
17 A Timestamp-Based Adaptive Gateway Discovery Algorithm for Ubiquitous Internet Access in MANET 163
Abstract 163
1 Introduction 164
2 Related Work 165
3 Proposed Gateway Discovery Mechanism 165
3.1 Algorithm for Calculation of Proactive Area 166
3.2 Algorithm for Congestion Mitigating Gateway Selection and Discovery Scheme 167
4 Performance Evaluation 168
4.1 Performance Metrics 168
4.2 Results and Discussion 169
5 Conclusions and Future Scope 171
References 171
18 A Directed Threshold Signature Scheme 173
Abstract 173
1 Introduction 173
1.1 Paper Organization 174
2 Preliminaries: Some Basic Tools 174
2.1 In This Paper, We Will Use the Following Public Parameters 174
2.2 Schnorr’s Signature Scheme 175
3 Directed Threshold Signature Scheme 175
3.1 Generation of Secret Key and Secret Shares for Group 175
3.2 Generation of Partial Signature by Any t Signer 176
3.3 Verification of Digital Signature {S, W, R, M} 176
3.4 Proof of Validity by Signature Receiver to Any Third Party C 177
4 Security Discussion 177
5 Illustration 178
5.1 Generation of Group Secret Key and Partial Secret Shares 178
5.2 Signature Generation by Any t Users 179
5.3 Signature Verification by B 179
5.4 Proof of Validity by B to Any Third Party C 179
6 Conclusion 180
References 180
19 Comparing Mesh Topology-Based Multicast Routing Protocols in MANETs 182
Abstract 182
1 Introduction 182
2 Mesh-Based Multicast Routing Protocols 183
2.1 Multicast Routing 183
2.2 Mesh-Based Multicast Routing 184
3 Description of Three Mesh-Based Protocols 184
3.1 ODMRP: On-Demand Multicast Routing Protocol 184
3.2 DCMP: Dynamic Core-Based Multicast Routing Protocol 184
3.3 CAMP: Core-Assisted Mesh Protocol 185
4 Comparing Points in the Protocols: Benefits and Limitations, Using the Simulation Model 185
4.1 Analyzing ODMRP 186
4.2 Analyzing DCMP 186
4.3 Analyzing CAMP 187
5 Technical Requirements for Creating a New Multicasting Protocol: A Solution 187
6 Conclusion 187
References 188
20 SER Performance Improvement in OFDM System Over Generalized K-fading Channel 189
Abstract 189
1 Introduction 189
2 System and Channel Model 191
2.1 Received Signal of OFDM Model 191
2.2 Model for Generalized K-fading Channel 191
2.3 OFDM with Repetition Codes 192
3 Simulation Results and Analysis 194
4 Conclusion 196
References 196
21 Automatic Classification of WiMAX Physical Layer OFDM Signals Using Neural Network 198
Abstract 198
1 Introduction 198
2 Related Work 200
3 Signal Model 202
4 Experiment and Results 205
4.1 Key Features 207
4.2 Training Phase 209
4.3 Testing Phase 209
5 Conclusion 212
References 213
22 Routing Protocols in CRAHNs: A Review 215
Abstract 215
1 Introduction 216
2 Routing Protocol in CRAHNs 216
3 Literature Survey 217
4 Research Gap 222
5 Conclusion 223
References 223
23 Cluster-Tree-Based Routing—A Step Towards Increasing WSN Longevity 226
Abstract 226
1 Introduction 226
2 Related Work 227
3 Conclusion 231
References 231
24 Performance Analysis of DTN Routing Protocol for Vehicular Sensor Networks 233
Abstract 233
1 Introduction 233
2 MaxProp Protocol 235
2.1 Methods for Dropping the Packets 235
3 Packet-Oriented Routing (POR) Protocol 236
4 Simulation Results and Compression Analysis 237
4.1 Packet Delivery Ratio 237
4.2 End-to-End Delay 238
4.3 Throughput 239
5 Conclusion and Future Work 240
References 241
25 Analyzing Virtual Traffic Light Using State Machine in Vehicular Ad Hoc Network 243
Abstract 243
1 Introduction 244
2 Virtual Traffic Light Protocol 245
3 Literature Review 246
4 State Machine of VTL 247
5 Conclusion and Future Scope 249
References 249
26 Design and Analysis of QoS for Different Routing Protocol in Mobile Ad Hoc Networks 250
Abstract 250
1 Introduction 250
2 Literature Survey 251
3 Proposed Routing Protocol Scheme 252
3.1 Improved-LABS 252
3.2 Context-Aware Adaptive Fuzzy (COAAF) 252
3.3 Context-Aware Adaptive Service (COAAS) 253
4 Results and Performance Analysis 254
5 Conclusion 255
References 255
27 An Agent-Based Solution to Energy Sink-Hole Problem in Flat Wireless Sensor Networks 257
Abstract 257
1 Introduction 258
2 Related Work 258
3 Proposed Work 259
3.1 Working Algorithm 260
4 Implementation and Results 261
5 Analytical Results 261
6 Concluding Remarks 263
References 264
28 Compact Low-Profile WiMAX-MIMO Antenna with Defected Ground Structure for Disaster Management 265
Abstract 265
1 Introduction 265
2 Antenna Design 267
3 Results and Discussion 268
3.1 Return Loss and Isolation 268
3.2 Radiation Pattern 269
3.3 Correlation Coefficient 269
3.4 Antenna Diversity Gain 270
4 Conclusion and Future Scope 270
References 271
29 A Comparative Study of Various Routing Classes and Their Key Goals in Wireless Sensor Networks 272
Abstract 272
1 Introduction 272
1.1 Routing Classes in WSNs 273
2 Data Centric Routing Protocols 274
3 Location-Based Routing Protocols 275
4 Hierarchical Routing Protocols 277
5 Conclusion 278
References 279
30 WLAN Channel Compatible Design Goal-Based Energy-Efficient Fibonacci Generator Design on FPGA 281
Abstract 281
1 Introduction 281
2 Energy-Efficient Techniques 282
2.1 Design Goals 282
2.2 Frequency Scaling 283
2.3 FPGA Technologies 284
3 Static Power Analysis 284
3.1 Static Power Consumptions at Different FPGA’s by Applying Area Reduction Design Goal 284
3.2 Static Power Consumptions at Different FPGA’s by Applying Balanced Design Goal 285
3.3 Static Power Consumptions at Different FPGA’s by Applying Power Optimization Design Goal 286
3.4 Static Power Consumptions at Different FPGA’s by Applying Minimum Runtime Design Goal 287
3.5 Static Power Consumptions at Different FPGA’s by Applying Timing Performance Design Goal 288
4 Dynamic Power Analysis 289
4.1 Dynamic Power Consumptions at Different FPGA’s by Applying Area Reduction Design Goal 289
4.2 Dynamic Power Consumptions at Different FPGA’s by Applying Balanced Design Goal 290
4.3 Dynamic Power Consumptions at Different FPGA’s by Applying Power Optimization Design Goal 291
4.4 Dynamic Power Consumptions at Different FPGA’s by Applying Minimum Runtime Design Goal 292
4.5 Dynamic Power Consumptions at Different FPGA’s by Applying Timing Performance Design Goal 293
5 Conclusion 294
6 Future Scope 294
References 295
31 NS-2-Based Analysis of Stream Control and Datagram Congestion Control with Traditional Transmission Control Protocol 296
Abstract 296
1 Introduction 297
1.1 Transport Layer Protocols 297
2 Simulation Result and Analysis 299
3 Conclusion 303
References 303
32 Wireless Power Transfer Using Microwaves 305
Abstract 305
1 Introduction 305
2 Materials and Method 307
3 Results and Discussion 308
4 Conclusion and Future Prospect 308
References 309
33 Performance Evaluation of AODV and DSR Routing Protocol on Varying Speed and Pause Time in Mobile Ad Hoc Networks 310
Abstract 310
1 Introduction 310
2 Related Work 311
3 Proposed Work 312
4 Simulation Results and Analysis 313
5 Conclusion 318
References 318
34 TCP- and UDP-Based Performance Evaluation of AODV and DSR Routing Protocol on Varying Speed and Pause Time in Mobile Ad Hoc Networks 320
Abstract 320
1 Introduction 320
2 Related Work 322
3 Research Methodology 322
4 Proposed Work 323
5 Experimental Results and Analysis 324
6 Conclusion 328
References 328
35 Hybrid Multi-commodity-Based Widest Disjoint Path Algorithm (HMBWDP) 330
Abstract 330
1 Introduction 330
2 Existing Algorithms 331
2.1 Profile Based Routing [9] 332
2.2 Main Aspects and Limitations of Profile-Based Routing 332
2.3 Widest Disjoint Path [10] Algorithm 333
3 Hybrid Multi-commodity-Based Widest Disjoint Path Algorithm 333
3.1 Problem Setup and Routing Requirements 334
3.2 Hybrid Multi-commodity-Based Widest Disjoint Path Algorithm 334
3.2.1 Multi-commodity Flow Preprocessing Phase 335
3.2.2 Path Selection Phase 336
4 Conclusions and Future Work 336
References 337
36 A Perusal of Replication in Content Delivery Network 338
Abstract 338
1 Introduction 338
2 Factors Affecting Replication 339
3 Existing Replication Strategies 340
4 Comparative Analysis 342
5 Conclusion 345
References 345
37 An Assessment of Reactive Routing Protocols in Cognitive Radio Ad Hoc Networks (CRAHNs) 347
Abstract 347
1 Introduction 347
2 Need for Routing in CRAHNs 348
2.1 Routing Challenges in CRAHNs 349
3 Types of Routing Protocols in CRAHNs [5] 351
3.1 Proactive Protocols 351
3.2 Reactive Protocols 351
3.3 Hybrid Protocols 352
4 Reactive Routing Protocol Schemes in CRAHNs 352
5 Analytic Overview 354
6 Conclusion 354
References 355
38 Analysis and Simulation of Low-Energy Adaptive Clustering Hierarchy Protocol 356
Abstract 356
1 Introduction 356
2 LEACH Protocol 358
3 Simulation Parameters 359
4 Results 361
5 LEACH Limitations/Assumptions 361
6 Conclusions 361
References 362
39 Packet Delay Prediction in MANET Using Artificial Neural Network 363
Abstract 363
1 Introduction 363
2 Background 364
3 Data Collection 365
4 ANN Model Development 365
5 Results and Discussion 366
6 Conclusion and Future Work 368
References 368
40 Detection of Hello Flood Attack on LEACH in Wireless Sensor Networks 370
Abstract 370
1 Introduction 371
2 LEACH and Its Phases 371
3 Attacks on LEACH 373
4 Hello Flood Attack 373
5 Simulation Model 374
5.1 Simulation Methodology 374
5.2 Simulation Parameters 375
6 Simulation Results 375
7 Detection Strategy and Results 377
8 Conclusion and Future Scope 379
Acknowledgment 379
41 Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks 381
Abstract 381
1 Introduction 381
2 LEACH—A Hierarchical Routing Protocol 383
3 Attacks Possible on LEACH 384
4 Selective Forwarding (Gray Hole) Attack 384
5 Objectives of Work 384
6 Simulation Environment 385
6.1 Simulation Methodology 385
6.2 Simulation Parameters 386
7 Simulation Results 386
7.1 Performance Metrics 386
7.2 Packet Delivery Ratio 387
7.3 Packet Loss 387
7.4 Remaining Energy of the Network 388
8 Detection Strategy 389
8.1 Results of Detection 389
9 Conclusion 389
Acknowledgements 390
References 390
42 H-LEACH: Modified and Efficient LEACH Protocol for Hybrid Clustering Scenario in Wireless Sensor Networks 391
Abstract 391
1 Introduction 391
2 LEACH Protocol 392
3 Literature Survey 393
4 H-LEACH: Proposed Protocol 394
5 Limitations and Assumptions 396
6 Conclusion and Future Scope 399
References 399
43 Implementing Chaotic and Synchronization Properties of Logistic Maps Using Artificial Neural Networks for Code Generation 401
Abstract 401
1 Introduction 401
2 Theoretical Considerations 403
2.1 Logistic Map as Chaos Generator 403
2.2 Synchronization in Logistic Maps 403
2.3 Artificial Neural Network (ANN) 404
3 Proposed Method of Using ANN-Aided Chaotic Sequence Generation Using Synchronized Logistic Maps 406
4 Experimental Details and Results 407
5 Conclusion 410
References 410
44 Enhancement of LAN Infrastructure Performance for Data Center in Presence of Network Security 411
Abstract 411
1 Introduction 411
2 Analysis of LAN 413
2.1 Assessment of Available LAN Technologies 413
2.2 Performance Analysis of Traffic Intensive Networks 414
2.3 Performance and Security Concerns 414
3 Designing of LAN 415
4 Implementation of LAN 417
5 Result Analysis of LAN 421
6 Conclusion 423
7 Future Scope 423
References 424
45 High-Speed TCP Session Tracking Using Multiprocessor Environments 425
Abstract 425
1 Introduction 426
2 Related Work 427
3 Proposed System Architecture 428
3.1 Maintaining Connection Records and Packet Flow 428
3.2 Data Flow 430
4 Parallelism 431
5 Experimental Results 432
6 Conclusion and Future Work 434
References 434
46 Integrated Next-Generation Network Security Model 436
Abstract 436
1 Introduction 436
2 Next-Generation Intrusion Prevention System 437
2.1 Need for NGIPS 438
2.2 Characteristics of NGIPS 438
3 Network Breach Exposure System 440
4 Cloud Antivirus 443
5 Anti-spam 445
6 Personalized Content Filtering 447
7 SPARTA 449
8 MONICAN 452
8.1 General Management 452
8.2 Network Routing and Services 453
8.3 Network Device Management 453
8.4 Threat Protection 453
8.5 Authentication 454
9 Integrated Approach 454
10 Conclusion and Future Work 454
References 455
47 Reliable Data Delivery Mechanism for Mobile Ad Hoc Network Using Cross-Layer Approach 457
Abstract 457
1 Introduction 457
2 Related Work and Motivation 458
3 Network Model and Assumptions 459
4 The Cross-Layer Technique 459
4.1 Buffering of Packets at the Transport Layer 460
5 Congestion Detection in Proposed Cross-Layer Design 461
6 Detection of Congestion Level 462
7 Performance Evaluation 463
8 Conclusion 466
References 466
48 Stable Period Extension for Heterogeneous Model in Wireless Sensor Network 468
Abstract 468
1 Introduction 469
2 Literature Review 469
3 Heterogeneity-Based Network Model 471
4 Protocol Description 472
5 Performance Evaluation 473
6 Conclusion 475
References 475
49 Congestion Control in Vehicular Ad Hoc Network: A Review 477
Abstract 477
1 Introduction 477
1.1 Characteristics of VANETs [6, 8, 9] 478
1.2 Challenges in Vehicular Ad Hoc Network [10] 478
1.3 Applications of VANETs [10, 13] 478
2 Congestion Control 479
2.1 Congestion Detection Component 479
2.2 Congestion Control Component 479
3 Review of Congestion Control Techniques for VANETs 480
3.1 The Congestion Detection Techniques 480
3.1.1 The Measurement-Based Congestion Detection Techniques 480
3.1.2 Event-Driven Detection Technique 480
3.1.3 MAC Blocking Detection Technique 481
3.2 Congestion Control Techniques 481
4 Conclusion 482
References 482
50 Mathematical Model for Wireless Sensor Network with Two Latent Periods 485
Abstract 485
1 Introduction 486
2 Model Formulation 487
3 Local Stability and Existence of Positive Equilibrium 488
4 Stability of the Worm-Free Equilibrium Stage 488
5 Simulation and Result 489
6 Conclusion 491
References 491
51 A Review of Underwater Wireless Sensor Network Routing Protocols and Challenges 493
Abstract 493
1 Introduction 494
2 Related Work 494
3 Characteristics of Channels 495
4 Differences in Underwater Sensor Network and Terrestrial Networks 495
5 Routing Protocols 496
5.1 Vector-Based Forwarding (VBF) 496
5.2 Distributed Minimum-Cost Clustering Protocol (DDD) 496
5.3 Energy Optimized Path Unaware Layered Routing Protocol (E-PULRP) 496
5.4 A Mobile Delay-Tolerant Approach (MCCP) 496
5.5 DBMR Protocol 497
5.6 GPS-Free Routing Protocol 497
5.7 Void-Aware Pressure Routing 497
5.8 Multi-level Routing Protocol 497
6 Conclusions 498
7 Future Scope 499
References 499
52 A Multi-metric-Based Algorithm for Cluster Head Selection in Multi-hop Ad Hoc Network 501
Abstract 501
1 Introduction 502
2 Related Work 502
3 Proposed Work 503
3.1 Node Neighbour 503
4 Node Lifetime 504
4.1 Node Stability 505
5 Analytical Model 506
5.1 Node Neighbour Matrix 506
5.2 Node Energy Information 507
5.3 Node Stability Matrix 507
5.4 Node Weight Matrix 507
6 Explanatory Example 508
7 Simulation Model and Performance Analysis 509
7.1 Energy Consumption 510
7.2 Throughput 510
7.3 Control Overhead 510
8 Conclusion and Future Work 511
References 512
53 Maximizing Lifetime of Wireless Sensor Network by Sink Mobility in a Fixed Trajectory 513
Abstract 513
1 Introduction 514
2 Related Work 514
3 Proposed Work 516
3.1 Route Discovery Phase 519
4 System Simulation and Performance Analysis 520
4.1 The Following Metrics Are Used to Evaluate the Performance 522
5 Conclusion and Future Work 523
References 523
54 Secure Communication in Cluster-Based Ad Hoc Networks: A Review 525
Abstract 525
1 Introduction 525
2 Security Aspects in Mobile Ad Hoc Networks 526
2.1 Security Challenges and Requirement 526
2.2 Security Attacks on Protocol Stacks 527
2.3 Security Measures to Avoid Attacks in Mobile Ad Hoc Network 527
3 Security Enhancement Through Cluster Heads 527
4 Comparative Analysis 530
5 Conclusion and Future Scope 532
Acknowledgements 532
References 532
55 Cluster Head Selection and Malicious Node Detection in Wireless Ad Hoc Networks 534
Abstract 534
1 Introduction 534
2 Cluster Head Formation 536
3 State-of-the-Art Scenario and Proposed Algorithm 537
4 Conclusion 540
References 540
56 Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges 542
Abstract 542
1 Introduction 542
2 Attack on Smartphone Wi-Fi 543
3 Role of DDoS Attack in Smartphone Wi-Fi 544
4 Defense Mechanisms Against DDoS Attack on Smartphone Wi-Fi Access Channel 545
5 Conclusion 547
References 548
57 Evaluating Pattern Classification Techniques of Neural Network Using k-Means Clustering Algorithm 549
Abstract 549
1 Introduction 550
2 Implementation and Simulation Design 564
2.1 Experiments 565
3 Results and Discussion 567
4 Conclusion 573
References 573
Erscheint lt. Verlag | 18.11.2017 |
---|---|
Reihe/Serie | Advances in Intelligent Systems and Computing | Advances in Intelligent Systems and Computing |
Zusatzinfo | XVIII, 588 p. 268 illus., 200 illus. in color. |
Verlagsort | Singapore |
Sprache | englisch |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Informatik ► Weitere Themen ► Hardware | |
Mathematik / Informatik ► Mathematik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Adaptive computer networks • CSI 2015 • Digital Life • Networking • Neural networks • ubiquitous computing |
ISBN-10 | 981-10-6005-3 / 9811060053 |
ISBN-13 | 978-981-10-6005-2 / 9789811060052 |
Haben Sie eine Frage zum Produkt? |
Größe: 17,2 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich