Refine your search
Co-Authors
Journals
- International Journal of Plant Protection
- Artificial Intelligent Systems and Machine Learning
- The Indian Journal of Nutrition and Dietetics
- ICTACT Journal on Soft Computing
- International Journal of Innovative Research and Development
- ICTACT Journal on Image and Video Processing
- International Journal of Computer Networks and Applications
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Gupta, Rajeev
- Succession of Various Insect Pollinators/Visitors Visiting on Niger Crop (Guizotia abyssinica Cass.)
Abstract Views :241 |
PDF Views:1
Authors
Affiliations
1 R.M.D., College of Agriculture and Research Station, AMBIKAPUR (C.G.), IN
2 Department of Entomology, College of Agriculture, Indira Gandhi Krishi Vishwavidyalaya, RAIPUR (C.G.), IN
1 R.M.D., College of Agriculture and Research Station, AMBIKAPUR (C.G.), IN
2 Department of Entomology, College of Agriculture, Indira Gandhi Krishi Vishwavidyalaya, RAIPUR (C.G.), IN
Source
International Journal of Plant Protection, Vol 8, No 1 (2015), Pagination: 93-98Abstract
Studies on the succession of various insect pollinators/ visitors on niger crop was undertaken during the Rabi 2011-12. Total 15 species of insect pollinators/ visitors were found visiting on niger flowers. Amongst the pollinators/visitors, Apis cerana indica appeared first on niger flower followed by Apis florea, Danaus chrysippus, Eristalis sp., Pelopidas mathias, Apis dorsata, Musca domestica, Nazara virudula, Dysdercus cingulatus, Leptocorisa acuta, Amata passelis, Chrysomya bezziana, Coccinella septumpunctata, Vespa cincta and sarcophaga sp. They were found visiting on niger flower throughout the bloomimg period.Keywords
Niger Crop, Succession of Insect Pollinators/Visitors.- An Artificial Intelligent Method for Tuning of PID Controller
Abstract Views :201 |
PDF Views:6
Authors
Affiliations
1 Electronics Engineering, RTU Kota, Kota, IN
2 Electronics Engineering, Modi Institute of Technology, Kota, IN
1 Electronics Engineering, RTU Kota, Kota, IN
2 Electronics Engineering, Modi Institute of Technology, Kota, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 4, No 7 (2012), Pagination: 416-420Abstract
This Paper tries to explore the potential of using artificial intelligence method in controllers and their advantages over conventional methods. PID controller, being the most widely used controller in industrial applications, needs efficient method to control the different parameters of the plant. This Paper asserts that the conventional approach of PID tuning is not very efficient due to the presence of non-linearity in the system of the plant. The output of the conventional PID system has a quite high overshoot and settling time. Tuning of the PID parameters continues to be important as these parameters have a great influence on the stability and performance of the control system. This paper proposes a method based on the ant colony optimization technique (ACO) to determine the parameters of the Proportional Integral Derivative (PID) controller for getting best performance for a given plant. The method searches the PID parameter that realizes the expected step response of the plant. It is based upon maximization of a fitness function. The plant model is represented by the transfer function T(s) of a low damping plant. The PID parameter is computed by ACO-based PID tuning method. The method show the effectiveness of the proposed tuning method.Keywords
Ant Colony Optimization, PID Controller.- Dietary Fat and Fatty Acid Intake in Rural Subjects
Abstract Views :186 |
PDF Views:0
Authors
Affiliations
1 Department of Medicine, Monilek Hospital and Research Centre, Jawahar Nagar, Jaipur, IN
1 Department of Medicine, Monilek Hospital and Research Centre, Jawahar Nagar, Jaipur, IN
Source
The Indian Journal of Nutrition and Dietetics, Vol 34, No 9 (1997), Pagination: 221-224Abstract
Dietary surveys in indian urban areas show a defective cardioprotective diet in all the socio-economic strata. More literate and upper socioeconomic status (SES) persons consume more calories, saturated fat and fruits and vegetabies and have lower intake of unsaturated fats and n-s fatty acids, persons of lower SES have greater consumption of unsaturated fats lower consumption of fruits and vegetables.- Performance of PID Controller of Nonlinear System Using Swarm Intelligence Techniques
Abstract Views :163 |
PDF Views:2
Authors
Affiliations
1 Department of Electronics Engineering, Rajasthan Technical University, IN
1 Department of Electronics Engineering, Rajasthan Technical University, IN
Source
ICTACT Journal on Soft Computing, Vol 6, No 4 (2016), Pagination: 1314-1318Abstract
In this paper swarm intelligence based PID controller tuning is proposed for a nonlinear ball and hoop system. Particle swarm optimization (PSO), Artificial bee colony (ABC), Bacterial foraging optimization (BFO) is some example of swarm intelligence techniques which are focused for PID controller tuning. These algorithms are also tested on perturbed ball and hoop model. Integral square error (ISE) based performance index is used for finding the best possible value of controller parameters. Matlab software is used for designing the ball and hoop model. It is found that these swarm intelligence techniques have easy implementation & lesser settling & rise time compare to conventional methods.Keywords
Swarm Intelligence, Ball and Hoop System, PID Controller, Integral Square Error.- Reduced Order Model of U-Tube Steam Generator and Application of Fuzzy and LQR in its Level Control
Abstract Views :184 |
PDF Views:2
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Rajasthan Technical University, IN
1 Department of Electronics and Communication Engineering, Rajasthan Technical University, IN
Source
ICTACT Journal on Soft Computing, Vol 6, No 3 (2016), Pagination: 1192-1197Abstract
The water level of the U-tube steam generator (UTSG) in a nuclear power unit, which is an important process parameter, must be maintained in a safe range whether the unit is working under fixed or variable conditions. In this paper, a higher order UTSG model derived from the state equations is reduced using Balanced Truncation technique. Two controllers using Fuzzy logic and LQR techniques have been designed for the reduced UTSG model to control its water level. Comparison of these two controllers has also been shown through the simulation results. Also, a comparative analysis of the reduced order model and a previously developed UTSG model is presented by simulating both UTSG models with Fuzzy Logic and LQR techniques and the results are compared.Keywords
Nuclear Reactor, UTSG Model, Model Order Reduction, LQR, Fuzzy Logic.- Tuning of PID Controller Using Pso Algorithm and Compare Results of Integral Errors for AVR System
Abstract Views :144 |
PDF Views:5
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 4 (2013), Pagination: 58-68Abstract
The paper Present to design PID controller parameters for an unstable Automatic Voltage Regulator system using Particle swarm optimization (PSO). The design goal is to minimize the integral errors and reduce transient response by minimizing overshoot, settling time and rise time of step response. First an objective function is defined, and then by minimizing the objective functions using real-coded PSO, the optimal controller parameters can be assigned. The avr system taken for case study is inherently unstable, highly nonlinear and after tuning of PID using PSO, results stable system.Keywords
AVR system, Feedback System, Optimization, PID controller, PSO- A Robust Non-Blind Hybrid Color Image Watermarking with Arnold Transform
Abstract Views :213 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics Engineering, Rajasthan Technical University, IN
1 Department of Electronics Engineering, Rajasthan Technical University, IN
Source
ICTACT Journal on Image and Video Processing, Vol 9, No 1 (2018), Pagination: 1814-1820Abstract
Due to development of the internet technologies and other services, requirement of rightful ownership and copyright is highly required. Hence to protect the copyrighted data from unauthorized user, a robust non-blind hybrid color image watermarking scheme is presented. In this proposed scheme, we use color watermark instead of gray watermark which is generally used in most of the existing digital image watermarking techniques. YCbCr color space used to separate the R, G and B channel of images. Y channel of color watermark is embedded into corresponding Y channel of cover image using proposed scheme. Arnold transform are used to scramble the watermark image before embedding process in order to provide more security. The singular value of bands is going to embed with singular values of watermark by making use of variable scaling factor (α). As original image is required at the time of extraction of watermark hence propose scheme belong to non-blind technique group. The two-fidelity parameter namely Peak signal to noise ratio (PSNR) and structural similarity (SSIM) index are used to measure the imperceptibility whereas similarity between original and extracted watermark is measured by using normalized correlation coefficient (NCC). We also compared the results of proposed scheme with other existing watermarking schemes. The experimental results prove effectiveness of the proposed image watermarking scheme in term of robustness and imperceptibility.Keywords
Watermarking, Copyright Protection, Stationary Wavelet Transform, Singular Value Decomposition (SVD), Arnold Transform, PSNR, SSIM, NCC.References
- W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for Data Hiding”, IBM System Journal, Vol. 35, No. 3, pp.313-336, 1996.
- E.T. Lin and E.J. Delp, “A Review of Data Hiding in Digital Images”, Proceedings of International Conference on Image Processing, Image Quality, Image Capture Systems, pp.274-278, 1999.
- P.H.W. Wong, O.C. Au and G.Y.M. Yeung, “A Novel Blind Multiple Watermarking Technique for Images”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 813-830, 2003.
- A.P. Singh and A. Mishra, “Wavelet Based Watermarking on Digital Image”, Indian Journal of computer Science and Engineering, Vol. 1, No. 2, pp. 86-91, 2011.
- G. Dayalin Leena and S. Selva Dhayanithy, “Robust Image Watermarking in Frequency Domain”, International Journal of Innovation and Applied Studies, Vol. 2, No. 4, pp.582-587, 2013.
- S. Agreste, G. Andaloro, D. Prestipino and L. Puccio, “An Image Adaptive, Wavelet-Based Watermarking of Digital Images”, Journal of Computational and Applied Mathematics, Vol. 210, pp. 13-21, 2007.
- S. Agreste and G. Andaloro, “A New Approach to Preprocessing Digital Image for Wavelet-based
- Watermark”, Journal of Computational and Applied Mathematics, Vol. 221, pp. 274-283, 2008.
- E. Vahedi, R.A. Zoroofi and M. Shiva, “Toward A New Wavelet- based Watermarking Approach for Color Images using Bio-Inspired Optimization Principles”, Digital Signal Processing, Vol. 22, pp. 153-162, 2012.
- N.H. Golea, R. Seghir and R. Benzid, “A Blind RGB Color Image watermarking based on Singular Value Decomposition”, Proceedings of IEEE International Conference on Computer Systems and Applications, pp. 771-776, 2010.
- L. Wu, J. Zhang, W. Deng and D. He, “Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm”, Proceedings of IEEE International Conference on Information Science and Engineering, pp. 12-23, 2009.
- M. Gupta, G. Parmar, R. Gupta and M. Saraswat, “Digital Image Watermarking using Uncorrelated Color Space”, Proceedings of IEEE Symposium on Computer Applications and Industrial Electronics, pp. 1-7, 2014.
- Samira Lagzian, Mohsen Soryani and Mahmood Fathy, “A New Robust Watermarking Scheme Based on RDWTSVD”, International Journal of Intelligent Information Processing, Vol. 2, No. 1, pp. 1-8, 2011.
- G. Tripathi, M. K. Pandey and S. Agrawal “Performance Analysis of Non-Blind Arnold Integrated Hybrid Image Watermarking Technique with DWT-SVD”, Journal of Emerging Technologies and Innovative Research, Vol. 4, No. 3, pp. 207-211, 2017.
- Nilanjan Dey, Anamitra Bardhan Roy and Sayantan Dey, “A Novel Approach of Color Image Hiding using RGB Color Planes and DWT”, International Journal of Computer Applications, Vol. 36, No. 5, pp. 16-24, 2011.
- P.V. Nagarjuna and K. Ranjeet, “Robust Blind Digital Image Watermarking Scheme Based on Stationary Wavelet Transform”, Proceedings of 6th International Conference on Contemporary Computing, pp. 8-10, 2013.
- Fangjun Huang and Z.H. Guan, “A Hybrid SVD-DCT Watermarking Method based on LPSNR”, Pattern Recognition Letters, Vol. 25, No. 15, pp. 1769-1775, 2014.
- USC-SIPI Image Database, Available at: http://sipi.usc.edu /database/ database. php.
- Design Fractional Order PIλDμ Controller for CSTR using TLBO Optimization Algorithm
Abstract Views :664 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics Engineering, Rajasthan Technical University, IN
1 Department of Electronics Engineering, Rajasthan Technical University, IN
Source
ICTACT Journal on Soft Computing, Vol 9, No 4 (2019), Pagination: 1967-1973Abstract
Optimization techniques serve as significantly easier yet one of the best methods to tune PID controllers. Response of these techniques are unforeseeable and usually vary on the basis of different parameters. Fractional order controllers provide a more accurate control in comparison to traditional PID controllers. This paper deals with the Concentration control of an Isothermal CSTR using FOPID Controller, for which a comparative study of a newly developed algorithm, teaching learning based optimization (TLBO) algorithm with the very popular Particle swarm optimization (PSO) algorithm is performed. Both PSO and TLBO are population based algorithms where PSO was inspired by behavior of animal groups while TLBO got inspiration from the idea of learning of a group of students and the effect of teacher on them. A comparative analysis of different Performance Indices is also provided.Keywords
CSTR, FOPID Controller, Particle Swarm Optimisation, Teaching Learning Based Optimization.References
- Y. Chen, I. Petras and D. Xue, “Fractional Order Control-A Tutorial”, Proceedings of American Control Conference, pp. 1397-1411, 2009.
- R. Eberhart and J. Kennedy, “A New Optimizer using Particle Swarm Theory”, Proceedings of 6th International Symposium on Micro Machine and Human Science, pp. 39- 43, 1995.
- R.V. Rao, V.J. Savsani and D.P. Vakharia, “TeachingLearning-based Optimization: A Novel Method for Constrained Mechanical Design Optimization Problems”, Computer-Aided Design, Vol. 43, No. 3, pp. 303-315, 2011.
- R.V. Rao, “Teaching Learning Based Optimization Algorithm and its Engineering Applications”, Springer, 2016.
- L. Gao, “Modeling and Dynamics Analyses of Immobilized CSTR Bioreactor using Transfer Function Model”, Proceedings of International Symposium on Information Technologies in Medicine and Education, pp. 692-695, 2012.
- N. Kumar and N. Khanduja, “Mathematical Modelling and Simulation of CSTR using MIT Rule”, Proceedings of IEEE 5th India International Conference on Power Electronics, pp. 1-5, 2012.
- A. Singh and V. Sharma, “Concentration Control of CSTR through Fractional Order PID Controller by using Soft Techniques”, Proceedings of 4th International Conference on Computing, Communications and Networking Technologies, pp. 1-6, 2013.
- Indranil Pan and Saptarshi Das, “Fractional Order Fuzzy Control of Hybrid Power System with Renewable Generation using Chaotic PSO”, ISA Transactions, Vol. 62, pp. 19-29, 2016.
- Saptarshi Das, Indranil Pan, Shantanu Das and Amitava Gupta, “A Novel Fractional Order Fuzzy PID Controller and its Optimal Time Domain Tuning based on Integral Performance Indices”, Engineering Applications of Artificial Intelligence, Vol. 25, No. 2, pp. 430-442, 2012.
- Z. Bingul and O. Karahan, “Tuning of Fractional PID Controllers using PSO Algorithm for Robot Trajectory Control”, Proceedings of IEEE International Conference on Mechatronics, pp. 955-960, 2011.
- Yinggan Tang, Mingyong Cui, Changchun Hua, Lixiang Li and Yixian Yang, “Optimum Design of Fractional Order PIλDμ Controller for AVR System using Chaotic Ant Swarm”, Expert Systems with Applications, Vol. 39, No. 8, pp. 6887-6896, 2012.
- Banaja Mohanty, “TLBO Optimized Sliding Mode Controller for Multi-Area Multi-Source Nonlinear Interconnected AGC System”, International Journal of Electrical Power and Energy Systems, Vol. 73, pp. 872-881, 2015.
- Rabindra Kumar Sahu, Sidhartha Panda, Umesh Kumar Rout and Dillip Kumar Sahoo, “Teaching Learning based Optimization Algorithm for Automatic Generation Control of Power System using 2-DOF PID Controller”, International Journal of Electrical Power and Energy Systems, Vol. 77, pp. 287-301, 2016.
- Shamik Chatterjee and V. Mukherjee, “PID Controller for Automatic Voltage Regulator using Teaching Learning based Optimization Technique”, International Journal of Electrical Power and Energy Systems, Vol. 77, pp. 418-429, 2016.
- Cluster Head Election in Wireless Sensor Network: A Comprehensive Study and Future Directions
Abstract Views :239 |
PDF Views:0
Authors
Rekha
1,
Rajeev Gupta
2
Affiliations
1 Department of Computer Science and Applications, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
2 Department of Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
1 Department of Computer Science and Applications, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
2 Department of Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
Source
International Journal of Computer Networks and Applications, Vol 7, No 6 (2020), Pagination: 178-192Abstract
Due to the advancement of wireless communication interchanges, electronic technology, and micro-electromechanical devices, Wireless Sensor Network (WSN) has got advanced as a promising zone of research. WSN consists of a collection of sensor nodes having a little calculative capability, limited memory, and constrained energy assets. Clusters are formed from the collection of sensor nodes whose leader node (Cluster head) can send the sensed information from hubs to the BS. To condense the power consumption and boost group longevity, the cluster head executes data accumulation. This paper discusses many algorithms based on deterministic, probabilistic, adaptive, fuzzy logic, and Multi-attribute decisionmaking techniques for clustering and cluster head election. Existing algorithms enhance the network lifetime and energy efficiency but fail to provide a better quality of service and security. So many issues and challenges have been laid down and it is concluded that when computational intelligence is combined with network intelligence then QoS and security both can be provided along with the network longevity and energy efficiency in homogeneous as well as a heterogeneous environment.Keywords
Wireless Sensor Network (WSN), Deterministic Schemes, Adaptive, Schemes, Probabilistic Schemes, Multi- Attribute Decision Making Schemes (MADM), Fuzzy Based Cluster Head Election Schemes.References
- Y. Al-obaisat and R. Braun, “On Wireless Sensor Networks : Architectures, Protocols, Applications , and Management Routing Protocols for WSNs,” in Proceedings of the 2nd international conference on wireless broadband and ultra wideband communication (AusWireless), 2007, pp. 1–11.
- T. M. Behera, S. K. Mohapatra, U. C. Samal, M. S. Khan, M. Daneshmand, and A. H. Gandomi, “Residual Energy Based Cluster-head Selection in WSNs for IoT Application,” IEEE Internet Things J., vol. 6, no. 3, pp. 5132–5139, 2019.
- B. K. Debroy, M. S. Sadi, and M. Al Imran, “An efficient approach to select cluster head in Wireless Sensor Networks,” J. Commun., vol. 6, no. 7, pp. 529–539, 2011, doi: 10.4304/jcm.6.7.529-539.
- P. K. Batra and K. Kant, “LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks,” J. Wirel. Networks, vol. 22, no. 1, pp. 49–60, 2016, doi: 10.1007/s11276-015-0951-y.
- A. Abed, A. Alkhatib, and G. S. Baicher, “Wireless Sensor Network Architecture,” in International Conference on Computer Networks and Communication Systems, 2012, vol. 35, no. Cncs2012, pp. 11–15.
- A. Zeb et al., “Clustering Analysis in Wireless Sensor Networks: The Ambit of Performance Metrics and Schemes Taxonomy,” Int. J. Distrib. Sens. Networks, vol. 12, no. 7, pp. 1–24, 2016, doi: 10.1177/155014774979142.
- S. R. Jino Ramson and D. Jackuline Moni, “Applications of Wireless Sensor Networks - A survey,” Proc. IEEE Int. Conf. Innov. Electr. Electron. Instrum. Media Technol. ICIEEIMT 2017, vol. 2017-Janua, no. July, pp. 325–329, 2017, doi: 10.1109/.2005.1467103.
- A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Comput. Commun., vol. 30, no. 14–15, pp. 2826–2841, 2007, doi: 10.1016/j.comcom.2007.05.024.
- S. Verma, N. Sood, and A. K. Sharma, “Genetic Algorithm-based Optimized Cluster Head selection for single and multiple data sinks in Heterogeneous Wireless Sensor Network,” Appl. Soft Comput. J., vol. 85, p. 105788, 2019, doi: 10.1016/j.asoc.2019.105788.
- L. Xu, R. Collier, and G. M. P. O’Hare, “A Survey of Clustering Techniques in WSNs and Consideration of the Challenges of Applying Such to 5G IoT Scenarios,” IEEE Internet Things J., vol. 4, no. 5, pp. 1229–1249, 2017, doi: 10.1109/JIOT.2017.2726014.
- S. Aslam, N. U. Hasan, J. W. Jang, and K. G. Lee, “Optimized energy harvesting, cluster-head selection and channel allocation for IoTs in smart cities,” Sensors (Switzerland), vol. 16, no. 12, 2016, doi: 10.3390/s16122046.
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications,” Int. J. Distrib. Sens. Networks, vol. 2014, 2014, doi: 10.1155/2014/357430.
- W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” Proc. 33rd Annu. Hawaii Int. Conf. Syst. Sci., vol. 1, pp. 1–10, 2000, doi: 10.1109/HICSS.2000.926982.
- S. V. Manikanthan and T. Padmapriya, “An efficient cluster head selection and routing in mobile WSN,” Int. J. Interact. Mob. Technol., vol. 13, no. 10, pp. 56–70, 2019, doi: 10.3991/ijim.v13i10.11303.
- A. A. Baradaran and K. Navi, “HQCA-WSN: High-quality clustering algorithm and optimal cluster head selection using fuzzy logic in wireless sensor networks,” Fuzzy Sets Syst., vol. 389, pp. 114–144, 2020, doi: 10.1016/j.fss.2019.11.015.
- X. Yuan, M. Elhoseny, H. K. El-Minir, and A. M. Riad, “A Genetic Algorithm-Based, Dynamic Clustering Method Towards Improved WSN Longevity,” J. Netw. Syst. Manag., vol. 25, no. 1, pp. 21–46, 2017, doi: 10.1007/s10922-016-9379-7.
- M. Elhoseny, X. Yuan, Z. Yu, C. Mao, H. K. El-Minir, and A. M. Riad, “Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2194–2197, 2015, doi: 10.1109/LCOMM.2014.2381226.
- M. Wu, H. Liu, and Q. Min, “Lifetime enhancement by cluster head evolutionary energy efficient routing model for WSN,” in 6th International Conference on Instrumentation and Measurement, Computer, Communication and Control, IMCCC 2016, 2016, pp. 545–548, doi: 10.1109/IMCCC.2016.86.
- K. N. Dattatraya and K. R. Rao, “Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN,” J. King Saud Univ. - Comput. Inf. Sci., no. xxxx, 2019, doi: 10.1016/j.jksuci.2019.04.003.
- P. L. Rajarajeswari and N. K. Karthikeyan, “Hyper-geometric energy factor based semi-Markov prediction mechanism for effective cluster head election in WSNs,” J. Intell. Fuzzy Syst., vol. 32, no. 4, pp. 3111–3120, 2017, doi: 10.3233/JIFS-169254.
- A. E. Fawzy, A. Amer, M. Shokair, and W. Saad, “Proposed intermittent Cluster Head selection scheme for efficient energy consumption in WSNs,” in 34th National Radio Science Conference (NRSC), 2017, no. NRSC, pp. 275–283, doi: 10.1109/NRSC.2017.7893486.
- S. P. Dongare and R. S. Mangrulkar, “Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks,” Phys. Procedia, vol. 78, no. December 2015, pp. 423–430, 2016, doi: 10.1016/j.procs.2016.02.084.
- G. Indranil, D. Riordan, and S. Srinivas, “Cluster-head election using fuzzy logic for wireless sensor networks,” in Proceedings of Annual Communication Networks and Services Research Conference, 2005, pp. 255–260, doi: 10.1109/CNSR.2005.27.
- N. A. Torghabeh, M. R. A. Totonchi, and M. H. Y. Moghaddam, “Cluster head selection using a two-level fuzzy logic in wireless sensor networks,” in CCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings I, 2010, vol. 2, pp. 357–361, doi: 10.1109/ICCET.2010.5485483.
- H. Kavandi, M. Meghdadi, and M. Bayat, “A Method for Optimizing of the Energy Consumption in Wireless Sensor Networks By Dynamic Selection of Cluster Head Using Fuzzy Logic,” Indian J. Sci. Res., vol. 7, no. 1, pp. 1018–1025, 2014.
- M. Taheri and Y. S. Kavian, “Energy Efficient Algorithm for Wireless Sensor Networks using Fuzzy Logic,” Int. J. Comput. Appl., vol. 89, no. 14, pp. 1–5, 2014, doi: 10.5120/15696-4055.
- S. Gupta and N. Marriwala, “Improved distance energy based LEACH protocol for cluster head election in wireless sensor networks,” in 4th IEEE International Conference on Signal Processing, Computing and Control, ISPCC 2017, 2017, pp. 91–96, doi: 10.1109/ISPCC.2017.8269656.
- D. Izadi, J. Abawajy, and S. Ghanavati, “A new energy efficient cluster-head and backup selection scheme in WSN,” in Proceedings of the 2013 IEEE 14th International Conference on Information Reuse and Integration, 2013, pp. 408–415, doi: 10.1109/IRI.2013.6642500.
- E. Thenmozhi and S. Audithan, “Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks,” Indian J. Sci. Technol., vol. 9, no. 15, pp. 1–6, 2016, doi: 10.17485/ijst/2016/v9i15/77749.
- D. Jia, H. Zhu, S. Zou, and P. Hu, “Dynamic Cluster Head Selection Method for Wireless Sensor Network,” IEEE Sens. J., vol. 16, no. 8, pp. 2746–2754, 2016, doi: 10.1109/JSEN.2015.2512322.
- D. Agrawal and S. Pandey, “FUCA: Fuzzy-based unequal clustering algorithm to prolong the lifetime of wireless sensor networks,” Int. J. Commun. Syst., vol. 31, no. 2, pp. 1–18, 2018, doi: 10.1002/dac.3448.
- P. Neamatollahi and M. Naghibzadeh, “Distributed unequal clustering algorithm in large-scale wireless sensor networks using fuzzy logic,” J. Supercomput., vol. 74, no. 6, pp. 1–24, 2018, doi: 10.1007/s11227-018-2261-5.
- P. S. Mehra, M. N. Doja, and B. Alam, “Fuzzy based enhanced cluster head selection (FBECS) for WSN,” J. King Saud Univ. - Sci., vol. 32, no. 1, pp. 390–401, 2018, doi: 10.1016/j.jksus.2018.04.031.
- H. Natarajan and S. Selvaraj, “A Fuzzy Based Predictive Cluster Head Selection Scheme for Wireless Sensor Networks,” Proc. 8th Int. Conf. Sens. Technol. Liverpool, UK A, pp. 560–566, 2014.
- J. Kim, S. Park, Y.-J. Han, and T. Chung, “CHEF: cluster head election mechanism using fuzzy logic in wireless sensor networks,” in 10th international conference on Advance Communication Technology, 2008, vol. 1, pp. 654–659, doi: 10.1109/ICACT.2008.4493846.
- A. Krishnakumar and V. Anuratha, “An Energy-Efficient Cluster Head Selection of LEACH Protocol for Wireless Sensor Networks,” in InNextgen Electronic Technologies: Silicon to Software (ICNETS2), 2017 International Conference on, IEEE., 2017, pp. 57–61.
- S. A. Sahaaya Arul Mary and J. B. Gnanadurai, “Enhanced Zone Stable Election Protocol based on Fuzzy Logic for Cluster Head Election in Wireless Sensor Networks,” Int. J. Fuzzy Syst., vol. 19, no. 3, pp. 799–812, 2017, doi: 10.1007/s40815-016-0181-1.
- S. B. S and S. V. U, “Super Cluster Head Selection and Energy Efficient Round Robin Load Balancing Technique in Wireless Sensor Networks,” Int. J. Eng. Sci. Comput., vol. 7, no. 4, pp. 10065–10072, 2017.
- A. Al-Baz and A. El-Sayed, “A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks,” Int. J. Commun. Syst., vol. 31, no. 1, pp. 57–61, 2017, doi: 10.1002/dac.3407.
- K. Ramesh, “Improved Fair-Zone Technique Using Mobility Prediction In WSN,” Int. J. Adv. Smart Sens. Netw. Syst., vol. 2, no. 2, pp. 23–32, 2012, doi: 10.5121/ijassn.2012.2203.
- K. Somasundaram, S. Saritha, and K. Ramesh, “Enhancement of network lifetime by improving the leach protocol for large scale WSN,” Indian J. Sci. Technol., vol. 9, no. 16, 2016, doi: 10.17485/ijst/2016/v9i16/92242.
- K.Ramesh and K.Somasundaram, “a Comparative Study of Clusterhead Selection Algorithms in Wireless Sensor Networks,” Int. J. Comput. Sci. Eng. Surv., vol. 2, no. 4, pp. 153–164, 2011, doi: 10.1002/fut.
- A. Al-Baz and A. El-Sayed, “A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks,” Int. J. Commun. Syst., vol. 31, no. 1, pp. 1–13, 2018, doi: 10.1002/dac.3407.
- A. M. E. Tamizharasi, J. J. S. M. E, A. K. Priya, and R. Maarlin, “Energy Aware Heuristic Approach for Cluster Head Selection in Wireless Sensor Networks,” Bull. Electr. Eng. Informatics, vol. 6, no. 1, pp. 70–75, 2017, doi: 10.11591/eei.v6i1.598.
- Z. Siqing, T. Yang, and Y. Feiyue, “ScienceDirect ScienceDirect Fuzzy Logic-Based Clustering Algorithm for Multi-hop Wireless Fuzzy Logic-Based Clustering Algorithm for Multi-hop Wireless Sensor Networks Sensor Networks,” Procedia Comput. Sci., vol. 131, pp. 1095–1103, 2018, doi: 10.1016/j.procs.2018.04.270.
- W. I. S. W. Din, S. Yahya, R. Jailani, M. N. Taib, A. I. M. Yassin, and R. Razali, “Fuzzy logic for cluster head selection in wireless sensor network,” in AIP Conference Proceedings, 2016, vol. 1774, p. 050006, doi: 10.1063/1.4965093.
- A. Yan and B. Wang, “An adaptive WSN clustering scheme based on neighborhood energy level,” in 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC), 2017, pp. 1170–1173.
- K. A. Prasath and T. Shankar, “RMCHS: Ridge method based cluster head selection for energy efficient clustering hierarchy protocol in WSN,” 2015 Int. Conf. Smart Technol. Manag. Comput. Commun. Control. Energy Mater. ICSTM 2015 - Proc., no. May, pp. 64–70, 2015, doi: 10.1109/ICSTM.2015.7225391.
- The, P. T., Manh, V. N., & Hung, T. C. (2018, February). Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 113-119). IEEE.
- P. Nayak and A. Devulapalli, “A Fuzzy Logic-Based Clustering Algorithm for WSN to Extend the Network Lifetime,” IEEE Sens. J., vol. 16, no. 1, pp. 137–144, 2016, doi: 10.1109/JSEN.2015.2472970.
- S. Murugaanandam and V. Ganapathy, “Reliability-based cluster head selection methodology using fuzzy logic for performance improvement in wsns,” IEEE Access, vol. 7, pp. 87357–87368, 2019, doi: 10.1109/ACCESS.2019.2923924.
- R. Ranganathan, B. Somanathan, and K. Kannan, “Fuzzy-Based Cluster Head Amendment (FCHA) Approach to Prolong the Lifetime of Sensor Networks,” Wirel. Pers. Commun., vol. 110, no. 3, pp. 1533–1549, 2020, doi: 10.1007/s11277-019-06800-5.
- S. Biswas, J. Saha, T. Nag, C. Chowdhury, and S. Neogy, “A Novel Cluster Head Selection Algorithm for Energy-Efficient Routing in Wireless Sensor Network,” 2016 IEEE 6th Int. Conf. Adv. Comput., pp. 588–593, 2016, doi: 10.1109/IACC.2016.114.
- M. Patil and C. Sharma, “Energy efficient cluster head selection to enhance network connectivity for wireless sensor network,” in Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on, 2016, pp. 175–179.
- D. Sharma, S. Verma, and K. Sharma, “Network Topologies in Wireless Sensor Networks : A Review,” Int. J. Electron. Commun. Technol., vol. 4, pp. 93–97, 2013, doi: 2230-7109.
- Y. Hu, H. Liu, and J. Liang, “Cluster-Head Election Using Fuzzy Logic Systems in Radar Sensor Networks,” in Proceedings of the 2015 International Conference on Communications, Signal Processing, and Systems, 2016, pp. 171–179.
- P. Azad and V. Sharma, “Clusterhead selection using multiple attribute decision making (MADM) approach in wireless sensor networks,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 115, pp. 141–142, 2013.
- F. Hamzeloei and M. K. Dermany, “A TOPSIS Based Cluster Head Selection for Wireless Sensor Network,” Procedia Comput. Sci., vol. 58, pp. 8–15, 2016, doi: 10.1016/j.procs.2016.09.005.
- H. Farman et al., “Analytical network process based optimum cluster head selection in wireless sensor network,” PLoS One, vol. 12, no. 7, pp. 1–28, 2017.
- B. Muhammad, R. Bilal, and R. Young, “Fuzzy-TOPSIS based Cluster Head selection in mobile wireless sensor networks,” J. Electr. Syst. Inf. Technol., pp. 1–16, 2017, doi: 10.1016/j.jesit.2016.12.004.
- P. Rajpoot and P. Dwivedi, “Multiple Parameter Based Energy Balanced and Optimized Clustering for WSN to Enhance the Lifetime Using MADM,” Wirel. Pers. Commun., vol. 106, no. 2, pp. 829–877, 2019, doi: 10.1007/s11277-019-06192-6.
- P. T. Karthick and C. Palanisamy, “Optimized cluster head selection using krill herd algorithm for wireless sensor network,” Automatika, vol. 60, no. 3, pp. 340–348, 2019, doi: 10.1080/00051144.2019.1637174.
- V. Pal, G. Singh, and R. P. Yadav, “SCHS: Smart Cluster Head Selection Scheme for Clustering Algorithms in Wireless Sensor Networks,” Wirel. Sens. Netw., vol. 04, no. 11, pp. 273–280, 2012, doi: 10.4236/wsn.2012.411039.
- X. Kuang, L. Liu, Q. Liu, and L. Xiang, “A clustering approach based on convergence degree chain for wireless sensor networks,” Secur. Commun. Networks, vol. 5, no. June 2011, pp. 422–437, 2015, doi: 10.1002/sec.
- A. Lipare, D. R. Edla, and R. Dharavath, “Energy Efficient Routing Structure to Avoid Energy Hole Problem in Multi-Layer Network Model,” Wirel. Pers. Commun., vol. 112, no. 4, pp. 2575–2596, 2020, doi: 10.1007/s11277-020-07165-w.
- Performance Evaluation of a MANET based Secure and Energy Optimized Communication Protocol (E2S-AODV) for Underwater Disaster Response Network
Abstract Views :236 |
PDF Views:0
Authors
Karan Singh
1,
Rajeev Gupta
2
Affiliations
1 Department of Computer Science and Applications, M.M. Institute of Computer Technology and Business Management, MMDU, Mullana, IN
2 Department of Computer Science and Engineering, M.M. Engineering College, MMDU, Mullana, IN
1 Department of Computer Science and Applications, M.M. Institute of Computer Technology and Business Management, MMDU, Mullana, IN
2 Department of Computer Science and Engineering, M.M. Engineering College, MMDU, Mullana, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 1 (2021), Pagination: 11-27Abstract
In recent years, the role of telecommunications in Under Water Mobile Ad-hoc Network (UWMANET) has emerged as a significant field during disaster prevention and rescue operations. Various disaster prevention and rescue supported applications are introduced in these years for flood, tsunamis, and underwater earthquakes. While communication in UWMANET, the existing communication system has some limitations like high energy utilization, tremendous packet loss rate, and delay. Sensor nodes can be deployed for data collection from the dense underwater environment. In UWMANET, security is another critical aspect of secure data transmission. In this paper, a new UWMANET based routing protocol, i.e., E2S-AODV (Energy Efficient Secure Ad-hoc On-demand Distance Vector) is designed and tested for Under Water Disaster Response Network (UWDRN) in a controlled environment. The optimum route for data transmission is selected by Pigeons Swarm Optimization (PiSO). PiSO reduces the hop count in the chosen shortest path. Hello, messages are broadcasted to inform their neighbors that the connection to the host is active. LDW technique is used to authenticate these hello messages. For security purposes, original event message encrypted with CST (Ciphertext Stealing Technique) and qu-Vanstone ECC based public-key cryptography. To utilize energy efficiently, E2S-AODV introduced two energy concepts drains rate finder and residual energy finder. Results that are compared with existing disaster-based protocols; are pro-motive and assure an improved quality of service (QoS) achievement in terms of many multipronged metrics like energy efficiency, reliability, security, scalability, delay, and Throughput, etc. E2S-AODV achieved a 2% improvement in PDR, 5% enhancement in Throughput, 8% reduction in end-to-end delay, and 11% reduction in energy utilization compared to its near existing competent.Keywords
Energy Efficiency, End-to-End Delay, E2S-AODV, MANET, PDR, QoS, Security, Throughput, UWDRN, UWMANET.References
- K. Singh, and A. K. Yadav. A Qualitative and Quantitative Analysis of Routing Protocols in MANET, International Journal of Advanced Research in Computer and Communication Engineering, 5(7), 2016.
- K. Singh, and R. Gupta. Comparative Assessment and Performance Analysis of Numerous Mobile Ad-Hoc Network Routing Protocols, Journal of Computational and Theoretical Nanoscience, Vol. 16, pp. 3906–3911, 2019.
- K. Singh, and R. Gupta. SO-AODV: A Secure and Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol over AODV with Quality Metrics for Disaster Response Applications, To be Published in Journal of Information and Technology Reserch (JITR), 14(3), by IGI global publications , US, 2020.
- K. Singh, and R. Gupta. E2S-AODV: An Energy Efficient Multipronged Reliable Strategy ensuring Secure and Scalable QoS over Disaster Response Applications, International Journal of Advanced Trends in Computer Science and Engineering, Volume 9, No.4, July – August 2020.
- A. K. Yadav, and A. Kush. E2-SCRP: An Energy Efficient Secure Cluster based Routing Protocol for 3D Underwater Acoustic MANET (UWMANET), International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-3075, 8(11), 2019.
- Shanen Yu, Shuai Liu, Peng Jiang, "A High-Efficiency Uneven Cluster Deployment based on Network Layered for Event Coverage in UWSNs", Sensors Basel, MDPI, Vol. 16, Issue.2, PP. 2016.
- Seyed Mohammed Ghoreyshi, AlirezaShahrabi, TuleenBoutaleb, Mohsen Khalily, "Mobile Data Gathering with Hop-Constrained Clustering in Underwater Sensor Networks", IEEE Access, vol.7, pp. 21118-21132.
- S. Cai, Y. Zhu, T. Wang, G. Xu, A. Liu and X. Liu, "Data Collection in Underwater Sensor Networks based on Mobile Edge Computing," in IEEE Access, vol. 7, pp. 65357-65367, 2019, doi: 10.1109/ACCESS.2019.2918213.
- Fang Zhu, Junfang Wei, "An Energy Efficient Routing Protocol Based on Layers and Unequal Clusters in Underwater Wireless Sensor Networks". Journal of Sensors. 2018. 1-10.
- Guilista Khan, Rakesh Kumar Dwivedi, "Autonomous Deployment and Adjustment of Nodes in UWSN to Achieve Blanket Coverage (ADAN-BC)", International Journal of Information Technology, PP. 1-10, 2018.
- Zhongsi Wang, Bang Wang, "A Novel Node Sinking Algorithm for 3D Coverage and Connectivity in Underwater Sensor Networks", Ad Hoc Networks, Vol. 56, PP. 43-35, 2017.
- Mohammed Reza Khosravi, HmaidHabibRostami, "Efficient Routing for Dense UWSNs with High-Speed Mobile Nodes using Spherical Divisions", The Journal of Supercomputing, Vol. 74, Issue 2, PP. 696-716, 2018.
- Gomathi R.M, J Martin Leo Manickam, "Energy Efficient Shortest Path Routing Protocol for Underwater Acoustic Wireless Sensor Network", Wireless Personal Communications, Vol.98, Issue.4, PP. 1-14, 2017
- R.M. Gomathi, J. Martin Leo Manickam, "Energy Efficient Static Node Selection in Underwater Acoustic Wireless Sensor Network", Wireless Personal Communications, pp. 1-19.
- ChhaganLal, Roberto Petroccia, KonstantinosPelekanakis, Mauro Conti, Joao Alves, "Toward the Development of Secure Underwater Acoustic networks", IEEE Journal of Oceanic Engineering, IEEE Journal of Oceanic Engineering, Vol.12, issue.4, PP. 1075-1087, 2017.
- Yue Zhao, Bo Tian, Zhouguo Chen, Yiming Liu, Jianwei Ding, "An Energy-Efficient Key Agreement Mechanism for Underwater Sensor Networks", Lecture Notes in Electrical Engineering, Vol. 450, PP.1-13, 2017.
- Jing Yan, Xian Yang, XiaoyuanLuo, Calian Chen, "Energy Efficient Data Collection over AUV-assisted Underwater Acoustic Sensor Network", IEEE Systems Journal, PP. 1-12, 2018.
- Bisen, Dhananjay & Sharma, Sanjeev. (2017). An enhanced performance through agent-based secure approach for mobile ad hoc networks. International Journal of Electronics. 105. 1-21. 10.1080/00207217.2017.1355019.
- T. S. Vamsi, P. Kumar, and T. Sruthi. Performance Analysis of AODV Routing Protocol in MANET under Blackhole Attack, Journal of Engineering Research and Application, ISSN: 2248-9622, 9(5), pp. 58-63, 2019.
- Sathiamoorthy, J., Ramakrishnan, B. A Reliable Data Transmission in EAACK MANETs Using Hybrid Three-Tier Competent Fuzzy Cluster Algorithm. Wireless Pers Commun 97, 5897–5916 (2017). https://doi.org/10.1007/s11277-017-4817-8
- Mohanakrishnan, U., Bhagavathiperumal, R. & Jayaraman, S. A Trusted Waterfall Framework Based Peer to Peer Protocol for Reliable and Energy Efficient Data Transmission in MANETs. Wireless Pers Commun 102, 95–124 (2018). https://doi.org/10.1007/s11277-018-5829-8.
- C. Perkins, E. B. Royer, and S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing, Retrieved March 1, 2001.
- Andel, Todd & Yasinsac, Alec. (2006). On the credibility of MANET simulations. Computer. 39. 48 - 54. 10.1109/MC.2006.242.
- Arora, D., Millman, E. & Neville, S.W. Enabling richer statistical MANET simulations through cluster computing. Cluster Comput 16, 989–1003 (2013).
- Ochola, Elisha & Eloff, Mm & Van der Poll, John. (2012). Mobile ad-hoc network security challenges under AODV routing protocol. 113-122.
- Pandya, Morli. (2013). Review on security issues of AODV routing protocol for MANETs. IOSR Journal of Computer Engineering. 14. 127-134. 10.9790/0661-145127134.
- Alghfari, Fawaz & Saeed, Khalid. (2016). Energy Consumption Analysis of AODV and ABHMAODV Routing Protocols in MANET.
- Anjum, S.S., Noor, R.M. & Anisi, M.H. Review on MANET Based Communication for Search and Rescue Operations. Wireless Pers Commun 94, 31–52 (2017).
- Sara, Getsy & Subu, Neelavathy & Sridharan, D.. (2010). Evaluation and Comparison of Emerging Energy Efficient Routing Protocols in MANET. ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY. 1. 37-46. 10.21917/ijct.2010.0006.
- M. Barati, K. Atefi, F. Khosravi and Yashar Azab Daftari, "Performance evaluation of energy consumption for AODV and DSR routing protocols in MANET," 2012 International Conference on Computer & Information Science (ICCIS), Kuala Lumpeu, 2012, pp. 636-642, doi: 10.1109/ICCISci.2012.6297107.
- Mostafa Abd-El-Barr, Bambang Sarif, "Swarm intelligence versus direct cover algorithms in synthesis of Multi-Valued Logic functions", Applied Computing and Informatics Available online 10 March 2020.
- N. Khanna and K. K. Naik, "Design and implementation of an energy efficient routing approach based on existing AODV protocol in Mobile Adhoc Networks for military," 2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES), Sultanpur, 2016, pp. 216-222, doi: 10.1109/ICETEESES.2016.7581388.
- P. Paranavithana and A. Jayakody, "Compromising AODV for better performance: Improve energy efficiency in AODV," 2017 6th National Conference on Technology and Management (NCTM), Malabe, 2017, pp. 201-204, doi: 10.1109/NCTM.2017.7872854.
- Patel, Maitri & Patel, Manish. (2018). Energy Efficient Routing Using Residual Energy and Stability in Mobile Ad-Hoc Network. 857-861. 10.1109/ICIRCA.2018.8597298.
- Shivashankar, & Suresh, H.N. & Varaprasad, Golla & Jayanthi, Guruswamy. (2014). Designing Energy Routing Protocol With Power Consumption Optimization in MANET. Emerging Topics in Computing, IEEE Transactions on. 2. 192-197. 10.1109/TETC.2013.2287177.
- Sharma, Manmohan & Rashid, Mamoon. (2020). Security Attacks In MANET -A Comprehensive Study.
- Vu Khanh, Quy & Hung, Le. (2020). A Trade-off between Energy Efficiency and High-Performance in Routing for Mobile Ad hoc Networks. Journal of Communications. 10.12720/jcm.15.3.263-269.
- Anjum, Shaik & Md. Noor, Rafidah & Anisi, Hossein. (2015). Review on MANET Based Communication for Search and Rescue Operations. Wireless Personal Communications. 10.1007/s11277-015-3155-y.
- M. Zaki, Salim & Ngadi, Md & Razak, Shukor. (2009). A review of delay aware routing protocols in MANET. ISSR Journals, CS Letters. Vol. 1 (1). 1-12.
- Z. Chen, W. Zhou, S. Wu and L. Cheng, "An Adaptive on-Demand Multipath Routing Protocol With QoS Support for High-Speed MANET," in IEEE Access, vol. 8, pp. 44760-44773, 2020, doi: 10.1109/ACCESS.2020.2978582.
- Gutiérrez, Daniel & Askalani, M. & Toral, S.L. & Barrero, Federico & Asimakopoulou, Eleana & Bessis, Nik. (2015). A Survey on Multihop Ad Hoc Networks for Disaster Response Scenarios. International Journal of Distributed Sensor Networks. 2015. 10.1155/2015/647037.
- Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
Abstract Views :189 |
PDF Views:0
Authors
Rekha
1,
Rajeev Gupta
2
Affiliations
1 Department of Computer Science and Applications, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
2 Department of Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
1 Department of Computer Science and Applications, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
2 Department of Computer Science and Engineering, Maharishi Markandeshwar (Deemed to be University), Mullana (Ambala), IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 1 (2021), Pagination: 67-78Abstract
Wireless Sensor Networks (WSN) is arising as a potential computing platform in diverse zones such as weather forecasting, modern robotization, medical health care, and military systems, etc. Since the sensors are constantly gathering information from the actual world and communicate with one another through remote connections, keeping up the security and protection of WSN communication is a prerequisite. In this paper, safe confirmation and key organization scheme dependent on Elliptic Curve Cryptography (ECC) has been suggested to make sure about information/picture transmission in WSNs. The scheme proposed in this paper is protected, competent, and appropriate for providing sensor technology based IoT services and applications. The protocol provides all the security features such as mutual authentication, confidentiality, data integrity, perfect forward secrecy, fair key agreement, etc. and is secure against hello flood attack, DoS attack, man-in-middle attack, etc. Simulation software AVISPA has confirmed the safety of the protocol for the known assaults. The performance analysis ensures the superiority of the projected proposal over the existing schemes.Keywords
WSN, Security, Elliptical Curve Cryptography (ECC), Automated Validation of Internet Security Protocols and Applications (AVISPA).References
- J. Ramasamy and J. S. Kumaresan, “Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks,” Wirel. Pers. Commun., vol. 112, no. 3, pp. 1355–1368, 2020, doi: 10.1007/s11277-020-07106-7.
- A. Durresi, V. Paruchuri, R. Kannan, and S. S. Iyengar, “Data Integrity Protocol for Sensor Networks,” Int. J. Distrib. Sens. Networks, vol. 1, no. 2, pp. 205–214, 2005, doi: 10.1080/15501320590966459.
- W. Wang, D. Peng, H. Wang, H. Sharif, and H. H. Chen, “Energy-constrained quality optimization for secure image transmission in wireless sensor networks,” Adv. Multimed., vol. 2007, pp. 1–9, 2007, doi: 10.1155/2007/25187.
- Sachin Gajjar, Mohanchur Sarkar and Kankar Dasgupta. Article: Cluster Head Selection Protocol using Fuzzy Logic for Wireless Sensor Networks. International Journal of Computer Applications 97(7):38-43, July 2014.
- D. Sharma, A. P. Bhondekar, A. Ojha, A. K. Shukla, and C. Ghanshyam, “A traffic aware cluster head selection mechanism for hierarchical wireless sensor networks routing,” 2016 4th Int. Conf. Parallel, Distrib. Grid Comput. PDGC 2016, pp. 673–678, 2016, doi: 10.1109/PDGC.2016.7913207.
- A. B. Kaimal, S. Manimurugan, and C. S. C. Devadass, “Image Compression Techniques : A Survey,” Int. J. Eng. Invent., vol. 2, no. 4, pp. 26–28, 2013.
- L. Sha, W. E. I. Wu, and B. Li, “Novel Image Set Compression Algorithm Using Rate-Distortion Optimized Multiple Reference Image Selection,” IEEE Access, vol. 6, pp. 66903–66913, 2018, doi: 10.1109/ACCESS.2018.2879378.
- R. Naveen, “An Improved Image Compression Algorithm Using Wavelet and Fractional Cosine Transforms,” Int. J. Image, Graph. Signal Process., vol. 10, no. 11, pp. 19–27, 2018, doi: 10.5815/ijigsp.2018.11.03.
- G. S. Rao, G. V. Kumari, and B. P. Rao, “Image Compression Using Neural Network for Biomedical Applications,” Soft Comput. Probl. Solving. Springer, Singapore, pp. 107–119, 2019, doi: 10.1007/978-981-13-1595-4.
- K. Chatterjee, A. De, and D. Gupta, “A Secure and Efficient Authentication Protocol in Wireless Sensor Network,” Wirel. Pers. Commun., vol. 81, no. 1, pp. 17–37, 2015, doi: 10.1007/s11277-014-2115-2.
- D. De Oliveira Gonçalves and D. G. Costa, “A survey of image security in wireless sensor networks,” J. Imaging, vol. 1, no. 1, pp. 4–30, 2015, doi: 10.3390/jimaging1010004.
- M. Elhoseny, H. Elminir, A. Riad, and X. Yuan, “A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption,” J. King Saud Univ. - Comput. Inf. Sci., vol. 28, no. 3, pp. 262–275, 2016, doi: 10.1016/j.jksuci.2015.11.001.
- A. Mehmood, M. M. Umar, and H. Song, “ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks,” Ad Hoc Networks, vol. 55, pp. 97–106, 2017, doi: 10.1016/j.adhoc.2016.10.007.
- Y. H. B, Z. Aliouat, S. Harous, and A. Bentaleb, on Elliptic Curve Cryptography, vol. 1. Springer International Publishing.
- K. Gupta, S. Silakari, R. Gupta, and S. A. Khan, “An ethical way for image encryption using ECC,” 2009 1st Int. Conf. Comput. Intell. Commun. Syst. Networks, CICSYN 2009, pp. 342–345, 2009, doi: 10.1109/CICSYN.2009.33.
- H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” Proc. - IEEE Symp. Secur. Priv., vol. 2003-Janua, pp. 197–213, 2003, doi: 10.1109/SECPRI.2003.1199337.
- Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070-1078.
- Isawa, R., & Morii, M. (2011). One-time password authentication scheme to solve stolen verifier problem. In Proceedings of the Forum on Information Technology (pp. 225-228).
- T. PonSelvalingam, S. Mahalakshmi, and S. Kurshid Jinna, “Re-authentication in Wireless Sensor Network,” Int. J. Comput. Appl., vol. 55, no. 8, pp. 32–41, 2012, doi: 10.5120/8777-2720.
- Watro, Ronald, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus. "TinyPK: securing sensor networks with public key technology." In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59-64. 2004. doi: 10.1145/1029102.1029113.
- E. Mykletun, J. Girao, and D. Westhoff, “Public key based cryptoschemes for data concealment in wireless sensor networks,” IEEE Int. Conf. Commun., vol. 5, no. c, pp. 2288–2295, 2006, doi: 10.1109/ICC.2006.255111.
- L. B. Oliveira et al., “SecLEACH-On the security of clustered sensor networks,” Signal Processing, vol. 87, no. 12, pp. 2882–2895, 2007, doi: 10.1016/j.sigpro.2007.05.016.
- D. Wu, G. Hu, G. Ni, W. Li, and Z. Zhang, “Research on secure routing protocols in wireless sensor networks,” Chinese J. Sensors Actuators, vol. 21, no. 7, pp. 1195–1201, 2008.
- Raj, E. D. (2012). An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks–Edrleach. IOSR Journal of Computer Engineering (IOSRJCE), 2(2), 39-44.
- S. Sahraoui, Somia; Bouam, “Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks,” Int. J. Commun. Networks Inf. Secur., vol. 5, no. 3, pp. 178–185, 2013.
- Biswas, K., Muthukkumarasamy, V., & Singh, K. (2014). An encryption scheme using chaotic map and genetic operations for wireless sensor networks. IEEE Sensors Journal, 15(5), 2801-2809.
- Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, “An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks,” J. Netw. Comput. Appl., vol. 76, pp. 37–48, 2016, doi: 10.1016/j.jnca.2016.10.001.
- D. He, N. Kumar, and N. Chilamkurti, “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless,” Inf. Sci. (Ny)., vol. 321, pp. 263–277, 2015, doi: 10.1016/j.ins.2015.02.010.
- Elhoseny, M., Farouk, A., Batle, J., Shehab, A., & Hassanien, A. E. (2017). Secure image processing and transmission schema in cluster-based wireless sensor network. In Handbook of research on machine learning innovations and trends (pp. 1022-1040). IGI Global.
- Shankar, K., & Elhoseny, M. (2019). Secure Image Transmission in Wireless Sensor Network (WSN) Applications. Springer International Publishing.
- Sumalatha, M.S., Nandalal, V. An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN). J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-01834-1
- C. T. Chen, C. C. Lee, and I. C. Lin, “Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments,” PLoS One, vol. 15, no. 4, pp. 1–28, 2020, doi: 10.1371/journal.pone.0232277.
- Benenson, Z., Gedicke, N., & Raivio, O. (2005). Realizing robust user authentication in sensor networks. Real-World Wireless Sensor Networks (REALWSN), 14, 52.
- H. L. Yeh, T. H. Chen, P. C. Liu, T. H. Kim, and H. W. Wei, “A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography,” Sensors, vol. 11, no. 5, pp. 4767–4779, 2011, doi: 10.3390/s110504767.
- Kumar, P., Sain, M., & Lee, H. J. (2011, February). An efficient two-factor user authentication framework for wireless sensor networks. In 13th International Conference on Advanced Communication Technology (ICACT2011) (pp. 574-578). IEEE.
- B. Vaidya, D. Makrakis, and H. T. Mouftah, “Improved two-factor user authentication in wireless sensor networks,” 2010 IEEE 6th Int. Conf. Wirel. Mob. Comput. Netw. Commun. WiMob’2010, vol. 8, no. 3, pp. 600–606, 2010, doi: 10.1109/WIMOB.2010.5645004.
- D. Mishra, A. Kumar, and S. Mukhopadhyay, “Expert Systems with Applications A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards,” Expert Syst. Appl., vol. 41, no. 18, pp. 8129–8143, 2014, doi: 10.1016/j.eswa.2014.07.004.
- Khan, M. K., & Zhang, J. (2007). Improving the security of ‘a flexible biometrics remote user authentication scheme’. Computer Standards & Interfaces, 29(1), 82-85.
- R. Dalia and R. Gupta, “Cluster Head Selection Technique for Improving The Network Lifetime in WSN using ANP,” SSRN Electron. J., pp. 1–6, 2020, doi: 10.2139/ssrn.3564867.
- A. Armando, D. Basin, J. Cuellar, M. Rusinowitch, and L. Viganò, “AVISPA: Automated Validation of Internet Security Protocols and Applications,” ERCIM News, vol. 64, 2006.