Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Senthilkumar, A.
- Implementing Agile Project Management with Scrum in a Distributed Environment
Abstract Views :152 |
PDF Views:1
Authors
Affiliations
1 Wipro Technology, Bangalore, IN
2 MCA Department of RVS College of Computer Applications, Coimbatore, IN
1 Wipro Technology, Bangalore, IN
2 MCA Department of RVS College of Computer Applications, Coimbatore, IN
Source
Software Engineering, Vol 2, No 8 (2010), Pagination: 166-168Abstract
Today's Information Technology (IT) manager is under ever-increasing pressure to deliver results - in the form of applications that drive improvements to the bottom line - even while IT budgets are being significantly slashed. Agile methodologies such as eXtreme Programming (XP), SCRUM and Feature-Driven Development strive to reduce the cost of change throughout the software development process Agile development is hard and requires a great deal of discipline. Distributed development is harder still and requires yet more resolve to stay on track. Even teams working in the same room take a long time to form. When distributed this formation takes even longer. Plan to keep teams together or change them slowly over time to maximize your investment in them. Provide distributed teams with the right tools to work as effectively as possible and remove as many of the barriers created by distribution as possible. Expect to experiment with how you use these tools, be it video conference, conference phones, collaboration software, or work item tracking tools. The primary advantage to organizing a project around collaborating collocated teams is that it simplifies the day-to-day work of most team members. This paper talks about how to get the best results from the distributed team by using right tools.Keywords
Agile, Communication Tools, Distributed Environment, Scrum.- Multipath Routing Protocols in Wireless Sensor Networks: A Retrospective Review
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore – 641046, Tamil Nadu, IN
2 Department of Computer Science, Arignar Anna Government Arts College, Namakkal - 637002, Tamil Nadu, IN
1 Department of Computer Science, Bharathiar University, Coimbatore – 641046, Tamil Nadu, IN
2 Department of Computer Science, Arignar Anna Government Arts College, Namakkal - 637002, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 17 (2017), Pagination:Abstract
Objectives: To review the basic principles of Multi-path Routing Protocols (MRPs) design and its performance metrics. To discuss the assortment of MRPs overview for Wireless Sensor Networks (WSNs) based on its arrangement and delivery. Methods/Statistical Analysis: The enhanced reliability, load balance and security promote the multi-path routing as an appropriate tool in the domain of Wireless Sensor Networks (WSNs). In order to obtain simultaneous data transfer with reduced delay period, critical review is made based on the performance metrics, taxonomy of MRPs, and qualitative comparison. Findings: From the discussions, it can be concluded that most of the protocols achieved better load balance with improved performance. Coding based MRPs can perform with better reliability when compared to other protocols. Application/Improvements: The survey of earlier reports led to the decisions that the energy-efficient, reduced transmission delay with multiple pairs is the details to be studied in the domain of MRPs.Keywords
Energy Efficiency, Path Discovery, Routing Protocols, Wireless Sensor Networks- Consequence of Space Efficient Secret Sharing for Secure Multi-Path Data Delivery in WSN
Abstract Views :175 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore – 641046, Tamil Nadu, IN
2 Department of Computer Science, Arignar Anna Govt. Arts College, Namakkal – 637002, Tamil Nadu, IN
1 Department of Computer Science, Bharathiar University, Coimbatore – 641046, Tamil Nadu, IN
2 Department of Computer Science, Arignar Anna Govt. Arts College, Namakkal – 637002, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 10, No 10 (2017), Pagination:Abstract
Objective: Byzantine Attacks are more challenging to protect against and it may stop Transmitting and cheating with malicious data in Wireless Sensor Networks (WSN). The Primary objective is to give a solution to enhance the security in terms of Byzantine attacks. Methods/Analysis: In this paper, Space Efficient Secret Sharing (SESS) scheme is proposed for secured data delivery in the WSN. The SESS scheme primarily uses recursive polynomial interpolation and its secret size is optimized as kzz-1. Besides, this paper incorporates the Prufer Sequence and 3-node disjoint shortest Multipath Routing for optimizing the number of paths between the source and the destination. Findings: The implementation is mainly concern towards the effectiveness of SESS scheme over RS-coding scheme. Since, RS-coding scheme has more computation than the proposed. The key finding reveals that the proposed SESS scheme is outperformed in many instances. Conclusion: The simulation results depict the various performance metrics of WSN in terms of the quality of service. Among the list of metrics, the proposed SESS scheme is outperformed in optimizing the control packet overhead. It improves the average network lifetime, since it is consuming less energy.Keywords
Multi-Path Source Routing Scheme, Prufer Sequence, Space Efficient Secret Sharing (SESS), Wireless Sensor Network (WSN).- Energy Efficient Based Secure Data Transmission For Multi Hop Trust Management Technique Using Wireless Sensor Network
Abstract Views :102 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Arignar Anna Government Arts College, IN
1 Department of Computer Science, Arignar Anna Government Arts College, IN
Source
ICTACT Journal on Communication Technology, Vol 12, No 4 (2021), Pagination: 2582-2589Abstract
Secure data transfer is intended to keep data safe from illegal access, damage, or disruption. In this proposed technique, an intrusion prevention system is built to counter the rapidly growing threats offered by the current generation of malware, software, and exploits. As the number of intruders has grown, the network environment has become more complicated, making threat mitigation more difficult. Modern wireless sensor networks have emerged for the aim of transmitting important information and services to an ever-growing set of users. Security is the most important issues in wireless network. Using this proposed Multi Hop Trust Management (MHTM) approach; trust management technique is used to identify the trusted nodes with malicious node. Then secured and efficient way of data transmission are directed and communicated to any kind of networks re confirmed here. The result attained shows MHTM technique attains better performance than TSRP in stipulations of energy efficiency, data transmission delay, communication overhead, throughput, malicious sensor device misclassification rate and identification.Keywords
Wireless Sensor Network, Cluster Heads (CH), Cluster Member (CM), Malicious Nodes Identification (MNI) and Security.References
- S. Rizwana, K.M. Gayathri and N. Thangadurai, “Intrusion Detection Algorithm for Packet Loss Minimization in Wireless Sensor Networks”, International Journal of Engineering and Advanced Technology, Vol. 8, No. 6, pp. 69-74, 2019.
- T. Karthikeyan and K. Praghash, “Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) using Opposition Frog Leaping Algorithm to Resist Man-inMiddle Attack”, Wireless Personal Communications, Vol. 113, pp. 1-17, 2021.
- T. Karthikeyan and K. Praghash, “Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm”, Wireless Personal Communications, Vol. 116, pp. 1-16, 2021.
- R. Manikandan and M. Ramkumar, “Design of Autonomous Production using Deep Neural Network for Complex Job”, Materials Today: Proceedings, Vol. 4, pp. 1-12, 2021.
- Huangshui Hu, Youjia Han, Hongzhi Wang, Meiqin Yao and Chuhang Wang “Trust-Aware Secure Routing Protocol for Wireless Sensor Networks”, ETRI Journals, Vol. 20, No. 1, pp. 674-683, 2021.
- Iman Almomani, Bassam Al-Kasasbeh and Mousa ALAkhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks”, Journal of Sensors, Vol. 2016, pp. 1-16, 2016.
- Rupinder Singh, Jatinder Singh and Ravinder Singh “Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks”, Wireless Communications and Mobile Computing, Vol. 2017, pp. 1-15, 2017.
- Syed Muhammad Sajjada, Safdar Hussain Boukb and Muhammad Yousafa, “Neighbor Node Trust Based Intrusion Detection System for WSN”, Proceedings of International Conference on Emerging Ubiquitous Systems and Pervasive Networks, pp. 183-188, 2015.
- Umashankar Ghugar, Jayaram Pradhan, Sourav Kumar Bhoi and Rashmi Ranjan Sahoo, “LB-IDS: Securing Wireless Sensor Network using Protocol Layer Trust-Based Intrusion Detection System”, Journal of Computer Networks and Communications, Vol. 2019, pp. 1-14, 2019.
- Gonugunta Tulasi and R. Suresh, “Secure Data Transmission in Wireless Sensor Networks: Against Packet Dropping Attacks”, International Research Journal of Engineering and Technology, Vol.3, No. 7, pp. 2386-2389, 2016.
- Sushant Kumar Pandey “An Anomaly Detection TechniqueBased Intrusion Detection System for Wireless Sensor Network”, International Journal on Wireless and Mobile Computing, Vol. 1, No. 4, pp. 323-333, 2019.
- Zhang Huanan, Xing Suping and Wang Jiannan, “Security and Application of Wireless Sensor Network”, Proceedings of International Conference of Information and Communication Technology, pp. 486-492, 2021.
- Xinying Yu, Fengyin Li, Tao Li, Nan Wu, Hua Wang and Huiyu Zhou, “Trust‑Based Secure Directed Diffusion Routing protocol in WSN”, Journal of Ambient Intelligence and Humanized Computing, Vol. 43, pp. 1-13, 2020.
- Hanane Kalkha, Hassan Satori and Khalid Satori, “Preventing Black Hole Attack in Wireless Sensor Network using HMM”, Proceedings of International Conference of Intelligent Computing in Data Sciences, pp. 1-12, 2018.
- Parmar Amisha and V.B. Vaghela, “Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol”, Proceedings of International Conference on Communication, Computing and Virtualization, pp. 1-8, 2016.
- Reem Alattas, “Detecting Black-Hole Attacks in WSNs using Multiple Base Stations and Check Agents”, Proceedings of International Conference on Future Technologies, pp. 1020-1024, 2016.
- Mohammad Wazid, Avita Katal, Roshan Singh Sachan, R.H. Goudar and D.P. Singh “Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network”, Proceedings of International conference on Communication and Signal Processing, pp. 576-581, 2013.
- Jitendra Kurmi, Ram Singar Verma and Sarita Soni, “An Efficient and Reliable Methodology for Wormhole Attack Detection in Wireless Sensor Network”, Advances in Computational Sciences and Technology, Vol. 10, No. 5, pp. 1129-1138, 2017.
- Minimizing Energy Consumption in Vehicular Sensor Networks Using Relentless Particle Swarm Optimization Routing
Abstract Views :136 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Skyline University, NG
2 Department of Computer Science, Dr. N.G.P. Arts and Science College, Tamil Nadu, IN
3 Department of Computer Science and Applications, Sankara College of Science and Commerce, Tamil Nadu, IN
4 Department of Computer Science and Engineering, Annamalai University, Tamil Nadu, IN
5 Department of Computer and Information Science, Annamalai University, Tamil Nadu, IN
1 Department of Computer Science, Skyline University, NG
2 Department of Computer Science, Dr. N.G.P. Arts and Science College, Tamil Nadu, IN
3 Department of Computer Science and Applications, Sankara College of Science and Commerce, Tamil Nadu, IN
4 Department of Computer Science and Engineering, Annamalai University, Tamil Nadu, IN
5 Department of Computer and Information Science, Annamalai University, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 2 (2023), Pagination: 217-230Abstract
Increasing traffic issues, particularly in highly populated nations, have prompted recent interest in Vehicular Sensor Networks (VSNETs) from academics in several fields. Accident rates continue to rise, highlighting the need for a highly functional Smart Transport System (STS). Improvements to the STS should not be spread thin across the board but should concentrate on improving traffic flow, maintaining system reliability, and decreasing vehicle carbon dioxide and methane emissions. Current routing protocols for VSNETs consider various scenarios and approaches to provide safe and effective vehicle-to-infrastructure communication. The reliability of vehicle connections during data transmission has not been well explored. This paper proposes a Relentless Particle Swarm Optimization based Routing Protocol (RPSORP) for VSNET to use vehicle kinematics and mobility to identify vehicle location, send routing information packets to road-side devices, and choose the most reliable path for travel. RPSORP optimizes local and global search to minimize energy consumption in VSNET. The RPSORP is evaluated in the GNS3 simulator using Throughput, Packet Delivery, Delay, and Energy Consumption metrics. RPSORP has superior performance than state-of-the-art routing protocols.Keywords
VSNET, Routing, Swarming, PSO, Local-Search, Global-Search.References
- H. Khelifi, S. Luo, B. Nour, H. Moungla, S. H. Ahmed, and M. Guizani, “A blockchain-based architecture for secure vehicular Named Data Networks,” Comput. Electr. Eng., vol. 86, p. 106715, 2020, doi: 10.1016/j.compeleceng.2020.106715.
- O. S. Al-Heety, Z. Zakaria, M. Ismail, M. M. Shakir, S. Alani, and H. Alsariera, “A Comprehensive Survey: Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET,” IEEE Access, vol. 8, pp. 91028–91047, 2020, doi: 10.1109/ACCESS.2020.2992580.
- M. A. Hossain et al., “Multi-Objective Harris Hawks Optimization Algorithm Based 2-Hop Routing Algorithm for CR-VANET,” IEEE Access, vol. 9, pp. 58230–58242, 2021, doi: 10.1109/ACCESS.2021.3072922.
- M. Naderi, F. Zargari, and M. Ghanbari, “Adaptive beacon broadcast in opportunistic routing for VANETs,” Ad Hoc Networks, vol. 86, pp. 119–130, 2019, doi: 10.1016/j.adhoc.2018.11.011.
- M. Lingaraj and A. Prakash, “Power aware routing protocol (PARP) to reduce energy consumption in wireless sensor networks,” Int. J. Recent Technol. Eng., vol. 7, no. 5, pp. 380–385, Jan. 2019, Accessed: Apr. 07, 2021. [Online]. Available: https://www.ijrte.org/wpcontent/uploads/papers/v7i5/E1969017519.pdf
- T. N. Sugumar and N. R. Ramasamy, “mDesk: a scalable and reliable hypervisor framework for effective provisioning of resource and downtime reduction,” J. Supercomput., vol. 76, no. 2, pp. 1277–1292, Feb. 2020, doi: 10.1007/s11227-018-2662-5.
- A. J. Kadhim and S. A. H. Seno, “Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks,” Ad Hoc Networks, vol. 84, pp. 68–81, 2019, doi: 10.1016/j.adhoc.2018.09.018.
- L. Yao, J. Wang, X. Wang, A. Chen, and Y. Wang, “V2X Routing in a VANET Based on the Hidden Markov Model,” IEEE Trans. Intell. Transp. Syst., vol. 19, no. 3, pp. 889–899, 2018, doi: 10.1109/TITS.2017.2706756.
- K. A. Awan, I. Ud Din, A. Almogren, M. Guizani, and S. Khan, “StabTrust-A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks,” IEEE Access, vol. 8, pp. 21159–21177, 2020, doi: 10.1109/ACCESS.2020.2968948.
- R. Yarinezhad, “Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure,” Ad Hoc Networks, vol. 84, pp. 42–55, Mar. 2019, doi: https://doi.org/10.1016/j.adhoc.2018.09.016.
- D. BD and F. Al-Turjman, “A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks,” Ad Hoc Networks, vol. 97, p. 102022, 2020, doi: https://doi.org/10.1016/j.adhoc.2019.102022.
- S. Maurya, V. K. Jain, and D. R. Chowdhury, “Delay aware energy efficient reliable routing for data transmission in heterogeneous mobile sink wireless sensor network,” J. Netw. Comput. Appl., vol. 144, pp. 118–137, 2019, doi: https://doi.org/10.1016/j.jnca.2019.06.012.
- S. Jain, K. K. Pattanaik, and A. Shukla, “QWRP: Query-driven virtual wheel based routing protocol for wireless sensor networks with mobile sink,” J. Netw. Comput. Appl., vol. 147, p. 102430, 2019, doi: https://doi.org/10.1016/j.jnca.2019.102430.
- P. Srinivasa Ragavan and K. Ramasamy, “Software defined networking approach based efficient routing in multi-hop and relay surveillance using Lion Optimization algorithm,” Comput. Commun., vol. 150, pp. 764–770, 2020, doi: 10.1016/j.comcom.2019.11.033.
- Z. Sun, M. Wei, Z. Zhang, and G. Qu, “Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks,” Appl. Soft Comput. J., vol. 77, pp. 366–375, Apr. 2019, doi: 10.1016/j.asoc.2019.01.034.
- W. Qi, Q. Song, X. Kong, and L. Guo, “A traffic-differentiated routing algorithm in Flying Ad Hoc Sensor Networks with SDN cluster controllers,” J. Franklin Inst., vol. 356, no. 2, pp. 766–790, 2019, doi: 10.1016/j.jfranklin.2017.11.012.
- F. Al-Turjman, “Cognitive routing protocol for disaster-inspired Internet of Things,” Futur. Gener. Comput. Syst., vol. 92, pp. 1103– 1115, Mar. 2019, doi: 10.1016/j.future.2017.03.014.
- R. W. L. Coutinho, A. Boukerche, and A. A. F. Loureiro, “A novel opportunistic power controlled routing protocol for internet of underwater things,” Comput. Commun., vol. 150, pp. 72–82, Jan. 2020, doi: 10.1016/j.comcom.2019.10.020.
- R. Yarinezhad and S. N. Hashemi, “Solving the load balanced clustering and routing problems in WSNs with an fpt-approximation algorithm and a grid structure,” Pervasive Mob. Comput., vol. 58, p. 101033, 2019, doi: 10.1016/j.pmcj.2019.101033.
- M. Vigenesh and R. Santhosh, “An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks,” Comput. Electr. Eng., vol. 74, pp. 273–280, 2019, doi: 10.1016/j.compeleceng.2019.02.005.
- K. N. Qureshi, S. Din, G. Jeon, and F. Piccialli, “Link quality and energy utilization based preferable next hop selection routing for wireless body area networks,” Comput. Commun., vol. 149, pp. 382– 392, 2020, doi: 10.1016/j.comcom.2019.10.030.
- S. Rashidibajgan and R. Doss, “Privacy-preserving history-based routing in Opportunistic Networks,” Comput. Secur., vol. 84, pp. 244– 255, 2019, doi: 10.1016/j.cose.2019.03.020.
- E. P. M. Câmara Júnior, L. F. M. Vieira, and M. A. M. Vieira, “CAPTAIN: A data collection algorithm for underwater optical-acoustic sensor networks,” Comput. Networks, vol. 171, p. 107145, Apr. 2020, doi: 10.1016/j.comnet.2020.107145.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., vol. 120, no. 2, pp. 887–909, Apr. 2021, doi: 10.1007/s11277-021- 08495-z.
- R. Jaganathan and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) for Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, no. 1, pp. 1063–1074, 2021, doi: 10.12785/ijcds/100196.
- J. Xu et al., “Data transmission method for sensor devices in internet of things based on multivariate analysis,” Meas. J. Int. Meas. Confed., vol. 157, p. 107536, Jun. 2020, doi: 10.1016/j.measurement.2020.107536.
- G. Han, M. Xu, Y. He, J. Jiang, J. A. Ansere, and W. Zhang, “A dynamic ring-based routing scheme for source location privacy in wireless sensor networks,” Inf. Sci. (Ny)., vol. 504, pp. 308–323, 2019, doi: https://doi.org/10.1016/j.ins.2019.07.028.