Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anitha, G.
- Performance Analysis of Various VANET Routing Protocols
Abstract Views :146 |
PDF Views:4
Authors
Source
Wireless Communication, Vol 4, No 1 (2012), Pagination: 13-18Abstract
Vehicular Ad hoc Network (VANET) is a wireless network that is formed in the fly between a collection of cars connected by wireless links. One of the most notorious problem in VANET to ensure that established routing paths do not break before the end of data transmission. Routing algorithm is an important research field for Vehicular Ad Hoc Network. This paper discusses the merits and demerits of the routing protocols. Finally it concludes by comparing the various routing protocols such as AODV, DSR, DSDV.Keywords
Ad Hoc Networks, AODV, DSR, Routing Protocols, VANET.- Pulse Compression Radar Using Matched Filter
Abstract Views :171 |
PDF Views:1
Authors
Affiliations
1 ECE Department, GITAM University, IN
1 ECE Department, GITAM University, IN
Source
Programmable Device Circuits and Systems, Vol 4, No 4 (2012), Pagination: 202-206Abstract
The pulse radars are mainly used for range resolution. Range resolution will be improved by improving very short pulses. This can be possible by using pulse compression techniques. Pulse compression allows us to achieve the average transmitted power of a relatively long pulse, while obtaining the range resolution corresponding to a short pulse. In this paper, two analog pulse compression techniques are going to solve by analyzing the following process. The first technique is “Correlation Processor” this is mainly used in narrow band & medium band radar operations. The second technique is “stretch Processor” which is used for extremely wide band radar operations. These two are techniques are used in matched filter along with the weighted functions (windows) in receiver.Keywords
Range Resolution, LFM Modulation, Correlation Processor, Stretch Processor & Weighted (Window) Functions.- Vision Aided Autonomous Forced Landing Site Selection for UAV Using Hyperspectral Image Processing
Abstract Views :166 |
PDF Views:1
Authors
Affiliations
1 Department of Aerospace Engineering, Madras Institute of Technology, Anna University, Chennai-600044, IN
1 Department of Aerospace Engineering, Madras Institute of Technology, Anna University, Chennai-600044, IN
Source
Digital Image Processing, Vol 4, No 7 (2012), Pagination: 361-366Abstract
The crucial phases in aircraft navigation are takeoff, cruise and landing. Most of the aircrafts accidents (around 25%)happen during landing phase, that’s why it’s such an important phase of aircraft cruise. So to increase the reliability in aircraft cruise, we propose an idea for landing of aircraft using Hyperspectral imaging (HSI) sensor, which has spectral richness than spatial. Unmanned air vehicle is not currently designed to process contextual information (land use, building types, and water bodies) to assist in landing and navigation. Instead, a human operator often provides manually gathered and synthesized contextual input through control commands. We need to detect safe-landing site in unstructured terrain where the key problem is for the onboard vision system to detect a suitable place to land without the aid of a structured landmark such as a helipad. This paper is intended to provide a Hyperspectral image vision based safety mechanism for UAVs to use in case of emergency landing in safe areas. The image for landing can be obtained using onboard Hyperspectral sensor known as spectrometer. The spectra of the known object can be compared with the object in current image and continue for landing. Here we use various algorithms for classification which are used to locate the landing site.Keywords
Forced Landing, Hyperspectral Images, UAV.- Calibration and Initial Alignment of Low Cost MEMS Inertial Navigation Sensors for UAV Application
Abstract Views :209 |
PDF Views:3
Authors
Affiliations
1 Department of Aerospace Engineering, Madras Institute of Technology, Anna University, Chennai 600044, IN
1 Department of Aerospace Engineering, Madras Institute of Technology, Anna University, Chennai 600044, IN
Source
Automation and Autonomous Systems, Vol 4, No 4 (2012), Pagination: 141-146Abstract
This work deals with an simple approach to calibrate low cost six degree of freedom MEMS inertial Navigation system to be used in Unmanned Air Vehicle (UAV). The accelerometer and gyroscope are modelled with inter axis misalignment correction. To determine calibration parameters of a tri axis accelerometer at least nine equations will be required to solve for nine unknowns (3 scale factor, 3 zero bias, 3 misalignment angles). In this simple approach three new linear equations were formulated to determine the calibration parameters thereby reducing number of positions needed in multi position test. The formulated methodology for accelerometer is validated by conducting twelve position tests. All combination of positions were attempted iteratively. After identifying the singularities, the study on the results suggests that only six positions are enough to solve nine unknowns. Similar methodology was applied to calibrate tri axial Gyroscope in rate test. Rate test results were studied and analysed with standard values provided my sensor manufacturer. A strap down inertial navigation system (SINS) error model is introduced, and the observability of the SINS error model is analyzed. Then on the basis of this SINS error model and a kalman filter is used to estimate the states of the error models. Based on the analysis of computer simulation results, a fast and precision initial alignment method is proposed for SINS on stationary base.Keywords
MEMS, IMU, Calibration, INS, Alignment.- Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm
Abstract Views :148 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Applications, Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, IN
1 Department of Computer Applications, Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 10, No 1 (2023), Pagination: 95-106Abstract
The Internet of Things (IoT) acts an imperative part in the Battlefield Network (BN) for group-based communication. The new technology is called Internet of Battlefield Things (IoBT) that delivers intelligence services on the battlefield to soldiers and commanders equipped with smart devices. Though it provides numerous benefits, it is also susceptible to many attacks, because of the open and remote deployment of Battlefield Things (BTs). It is more critical to provide security in such networks than in commercial IoT applications because they must contend with both IoT networks and tactical battlefield environments. Because of restricted resources, an attacker may compromise the BTs. The BT that has been seized by the adversary is called a malicious BT and it may launch several security attacks on the BN. To identify these malicious BTs, the IoBT network requires a reputation-based trust model. To address the black hole attack or malicious attack over Routing Protocol for Low Power and Lossy Networks (RPL) is a key objective of the proposed work. The proposed work is the combination of both machine learning algorithm and trust management and it is named as KmCtrust model. By removing malicious BTs from the network, only BTs participating in the mission are trusted, which improves mission performance in the IoBT network. The simulation analysis of KmCtrust model has witnessed the better results in terms of various performance metrics.Keywords
IoBT, RPL, Trust, Black Hole Attack, Multiple Regression, K-Means Clustering Algorithm, Security.References
- Burrell, D. N. (2021). Creating Diverse and Religiously Inclusive Workplace Cultures in Hyper-Connected, Technical, and cyber-Driven Organizations. International Journal of Sociotechnology and Knowledge Development, 13(3), 17–32. doi:10.4018/ IJSKD.2021070102
- K.Prathapchandran and T.Janani , “A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest – RFTRUST“ . Computer Networks. 198(10813), 1-20, 2021
- Farooq, M. J., & Zhu, Q. “Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)”. 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). doi:10.23919/wiopt.2017.7959892, 2017.
- Ferrara, P., Mandal, A. K., Cortesi, A., & Spoto, F. (2021). Static analysis for discovering IoT vulnerabilities. International Journal of Software Tools for Technology Transfer, 23(1), 71–88. doi:10.1007/s10009-020-00592-x
- Nobre, J., Rosario, D., Both, C., Cerqueira, E., & Gerla, M, “Toward Software-Defined Battlefield Networking”. IEEE Communications Magazine, 54(10), 152–157. doi:10.1109/mcom.2016.7588285, 2016.
- K.Prathapchandran and T.Janani, “Decision Tree Trust (DTTrust)-Based Authentication Mechanism to Secure RPL Routing Protocol in Internet of Battlefield Thing (IoBT)”, International Journal of Business Data Communications and Networking (IJBDCN), 1(17), pp.1-23, 2021.
- Pongle, P., & Chavan, G, “A Survey: Attacks on RPL and 6LoWPAN in IoT”. International Conference on Pervasive Computing (ICPC). doi:10.1109/pervasive.2015.7087034, 2015.
- Kamble, A., Malemath, V. S., & Patil, D, “Security Attacks and Secure Routing Protocols in RPL-Based Internet of Things: Survey”, International Conference on Emerging Trends & Innovation in ICT (ICEI). doi:10.1109/etiict.2017.7977006, 2017.
- Winter, T., “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, https://tools.ietf.org/html/rfc6550, 2012.
- Glissa G, Rachedi, A, & Meddeb, A, “A Secure Routing Protocol-Based on RPL for Internet of Things” . 2016 IEEE Global Communications Conference (GLOBECOM). doi:10.1109/glocom.2016.7841543,2016.
- Li, S., Iqbal, M., & Saxena, N. (2022). Future industry internet of things with zero-trust security. Information Systems Frontiers, 1-14.
- Koohang, A., Sargent, C. S., Nord, J. H., & Paliszkiewicz, J. (2022). Internet of Things (IoT): From awareness to continued use. International Journal of Information Management, 62, 102442.
- Marill, K. A, “Advanced Statistics: Linear Regression, Part II: Multiple Linear Regression. Academic Emergency Medicine” , 11(1), 94–102. doi: 10.1197/j.aem.2003.09.006, 2004.
- Ng, H. P., Ong, S. H., Foong, K. W. C., Goh, P. S., & Nowinski, W. L. (n.d.). “Medical Image Segmentation Using K-Means Clustering and Improved Watershed Algorithm”, IEEE Southwest Symposium on Image Analysis and Interpretation. doi:10.1109/ssiai.2006.1633722, 2006.
- Shanmugam, S., V., M. G., K., P., & T., J. (2022). Mitigating Black Hole Attacks in Routing Protocols Using a Machine Learning-Based Trust Model. International Journal of Socio technology and Knowledge Development (IJSKD), 14(1), 1-23. http://doi.org/10.4018/IJSKD.310067
- Nidheesh, N., Abdul Nazeer, K. A., & Ameer, P. M. “ An Enhanced Deterministic K-Means Clustering Algorithm for Cancer Subtype Prediction from Gene Expression Data” . Computers in Biology and Medicine, 91, 213–221. doi: 10.1016/j.compbiomed.2017.10.014, 2017.
- Cui, H., Ruan, G., Xue, J., Xie, R., Wang, L., & Feng, X, “ A Collaborative Divide-and-Conquer K-means Clustering Algorithm for Processing Large Data”, Proceedings of the 11th ACM Conference on Computing Frontiers - CF ‘14. doi:10.1145/2597917.2597918, 2014.
- Kavitha, A., Reddy, V. B., Singh, N., Gunjan, V. K., Lakshmanna, K., Khan, A. A., & Wechtaisong, C. (2022). Security in IoT Mesh Networks based on Trust Similarity. IEEE Access, 10, 121712-121724.
- S. Raza, L. Seitz, D. Sitenkov, G. Selander, “S3K: Scalable Security with Symmetric Keys − DTLS Key Establishment for the Internet of Things” , IEEE Trans. Autom. Sci. Eng. 13 (2016) 1270–1280, http://dx.doi.org/10.1109/TASE.2015.2511301, 2016.
- Rutravigneshwaran, P., Anitha, G. & Prathapchandran, K. “Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT)”. Int J Syst Assur Eng Manag. https://doi.org/10.1007/s13198-022-01719-w, 2022
- Hassan, T., Asim, M., Baker, T., Hassan, J., & Tariq, N. (2021). CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications. Transactions on Emerging Telecommunications Technologies, 32(3), e4224.
- Sahay, G. Geethakumari, B. Mitra and V. Thejas, “Exponential Smoothing-Based Approach for Detection of Blackhole Attacks in IoT,” IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Indore, India, 2018, pp. 1-6, doi: 10.1109/ANTS.2018.8710073,2018.
- Alamr, A. A., Kausar, F., Kim, J., & Seo, C, “A Secure ECC-Based RFID Mutual Authentication Protocol for Internet of Things”. The Journal of Supercomputing, 74(9), 4281–4294, 2018.
- Patel, H. B., & Jinwala, D. C, “ Blackhole Detection in 6LoWPAN-Based Internet of Things: An Anomaly Based Approach”. TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). doi:10.1109/tencon.2019.8929491,2019.
- Bostani, H., & Sheikhan, M, “ Hybrid of Anomaly-Based and Specification Based IDS for Internet of Things Using Unsupervised OPF Based on MapReduce Approach”. Computer Communications, 98, 52–71. doi:10.1016/j.comcom.2016.12.001, 2017.
- Seyedi, B., & Fotohi, R, “NIASHPT: A Novel Intelligent Agent-Based Strategy Using Hello Packet Table (HPT) Function for Trust Internet of Things”. The Journal of Supercomputing. doi:10.1007/s11227-019-03143-7,2020.
- Yahyaoui, A., Abdellatif, T., & Attia, R, “Hierarchical Anomaly-Based Intrusion Detection and Localization in IoT” 15th International Wireless Communications & Mobile Computing Conference (IWCMC). doi:10.1109/iwcmc.2019.8766574, 2019.
- Ullah, I., & Mahmoud, Q. H, “A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks”. Electronics, 9(3), 530. doi:10.3390/electronics9030530, 2020.
- Qureshi, K. N., Rana, S. S., Ahmed, A., & Jeon, G, “A Novel and Secure Attacks Detection Framework for Smart Cities Industrial Internet of Things”. Sustainable Cities and Society, 102343. doi: 10.1016/j.scs.2020.102343,2020.
- Airehrour D, Gutierrez JA, Ray SK , “SecTrust-RPL: a secure trust-aware RPL Routing protocol for Internet of Things” . Future Generation Computer System. https://doi.org/10.1016/j.future.2018.03.021., 2018
- Kandhoul, N., Dhurandher, S. K., & Woungang, I. T_CAFE: “A Trust based Security approach for Opportunistic IoT”., IET Communications. doi:10.1049/iet-com.2019.0657.2019.
- Airehrour D, Gutierrez JA, Ray SK , “A trust-aware RPL routing protocol to detect black hole and selective forwarding attacks” . J Telecommun Digital Econ 5(1):50–69. https://doi.org/10.18080/ jtde.v5n1.88,2017.
- Mehta, R., & Parmar, M. M, “ Trust-Based Mechanism for Securing IoT Routing Protocol RPL Against Wormhole & Grayhole Attacks” . 2018 3rd International Conference for Convergence in Technology (I2CT). doi:10.1109/i2ct.2018.8529426, 2018.
- Lim, J., Ko, Y.-B., Kim, D., & Kim, D, “ A Stepwise Approach for Energy Efficient Trust Evaluation in Military IoT Networks”. International Conference on Information and Communication Technology Convergence (ICTC). doi:10.1109/ictc.2018.8539353, 2018.
- Kamble, A., Malemath, V. S., & Patil, D. “Security Attacks and Secure Routing Protocols in RPL-Based Internet of Things: Survey”, International Conference on Emerging Trends & Innovation in ICT (ICEI). doi:10.1109/etiict.2017.7977006, 2017.
- Kaur, J., Singh, G., “A Blockchain-Based Machine Learning Intrusion Detection System for Internet of Things” . In: Daimi, K., Dionysiou, I., El Madhoun, N. (eds) Principles and Practice of Blockchains. Springer, Cham. https://doi.org/10.1007/978-3-031-10507-4_650,2023.
- Sun, Xi., Chang, G., & Li, F, “A Trust Management Model to Enhance Security of Cloud Computing Environments” , Second International Conference on Networking and Distributed Computing. doi:10.1109/icndc.2011.56. 2011.
- Alshehri, M. D., Hussain, F., Elkhodr, M., & Alsinglawi, B. S, “A Distributed Trust Management Model for the Internet of Things (DTM-IoT)” . EAI/Springer Innovations in Communication and Computing, 1–9. doi:10.1007/978-3-319-99966-1_1, 2019.
- Abdalla Ahmed, A. I., Ab Hamid, S. H., Gani, A., Suleman khan, & Khan, M. K, “ Trust and Reputation for Internet of Things: Fundamentals, Taxonomy, and Open Research Challenges”. Journal of Network and Computer Applications, 102409. doi:10.1016/j.jnca.2019.102409, 2019.
- J. H. Cho, A. Swami, and I. R. Chen, “A Survey on Trust Management for Mobile Ad Hoc Networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562-583. 2011.
- Guo, J., Chen, I.-R., & Tsai, J. J. P.,“ A Survey of Trust Computation Models for Service Management in Internet of Things Systems”. Computer Communications, 97, 1–14. doi:10.1016/j.comcom.2016.10.012, 2017. How to cite this article:
- Liqin, T., Chuang, L., & Tieguo, J. “ Quantitative Analysis of Trust Evidence in Internet” , International Conference on Communication Technology. doi:10.1109/icct.2006.342023, 2006.
- Tripathy, B. K., Jena, S. K., Bera, P., & Das, “ An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks”. Wireless Personal Communications. doi:10.1007/s11277-020-07423-x ,2020.
- Wang, B., Chen, X., & Chang, W. “A Light-Weight Trust-Based QoS Routing Algorithm for Ad Hoc Networks” . Pervasive and Mobile Computing, 13, 164–180. doi:10.1016/j.pmcj.2013.06.004, 2014.
- Wang, Y., Tian, Y., Miao, R., & Chen, W, “Heterogeneous IoTs Routing Strategy Based on Cellular Address” . IEEE International Conference on Smart Internet of Things (SmartIoT). doi:10.1109/smartiot.2018.00021,2018.
- Shabut, A. M., Kaiser, M. S., Dahal, K. P., & Chen, W, “ A Multidimensional Trust Evaluation Model for MANETs”, Journal of Network and Computer Applications. doi:10.1016/j.jnca.2018.07.008, 2018.
- Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. “ TBRS: A trust based recommendation scheme for vehicular CPS network”. Future Generation Computer Systems. doi:10.1016/j.future.2018.09.002, 2018.
- Iltaf, N., Ghafoor, A., & Zia, U. “ A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation” . EURASIP Journal on Wireless Communications and Networking, 2013(1). doi:10.1186/1687-1499-2013-189,2013.
- Airehrour, D., Gutierrez, J., & Ray, S. K, “ Securing RPL Routing Protocol from Blackhole Attacks Using a Trust-Based Mechanism” , 26th International Telecommunication Networks and Applications Conference (ITNAC). doi:10.1109/atnac.2016.7878793, 2016.