SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA, Vol.17, No.2, April 2019, pp.676~682
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i2. 9621 ๏ฎ 676
Received April 17, 2018; Revised December 18, 2018; Accepted January 26, 2019
A decentralized paradigm for resource-aware
computing in wireless Ad hoc networks
Heerok Banerjee*1
, S Murugaanandam2
, V Ganapathy3
Department of Information Technology, School of Computing, SRM Institute of Science and Technology,
Mahatma Gandhi Rd, Potheri, SRM Nagar, Kattankulathur, Tamil Nadu 603203, India
*Corresponding author, e-mail: heerokbanerjee_ra@srmuniv.edu.in1
,
murugaanandam.s@ktr.srmuniv.ac.in2
, ganapathy.v@ktr.srmuniv.ac.in3
Abstract
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in
the wake of data-intensive applications that work on sensitive and private data, which requires providing
strong network security guarantees via encryption and authentication algorithms, as well as rethinking
algorithms to compute on the network peripheries without moving data. In many security and privacy-
critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized
privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have
proposed a decentralized networking architecture that adopts collaborative processing techniques and
operates within the tradeoff between network security and performance. We have investigated the design
and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed
scheme with the help of extensive simulation tools.
Keywords: Ad hoc networks, decentralized computing, grid computing, peer-to-peer networking,
wireless networks
Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
The emergence of IoT and grid computing is a harbinger for the reinvestigation of
network reliability measures and security policies in order to save such technologies from
scrutiny and misuse. Moreover, the advent of such technologies has led manufacturers to
produce cheap network-capable devices in large quantities. Refrigerators, DVRs, thermostats,
and even minute utilities such as light-bulbs have been redesigned to be networking capable
and to provide an extra convenience through remote controlling services. As observed, many of
these devices have weak security and are considerably configured with easily penetrable
security measures [1, 2]. To overcome these issues related to network reliability and security,
we concentrate on decentralized network architectures that balances the trade-off between
network security and network performance [2]. One of the key goals achieved by the
decentralization of networked systems is increasing the variability in the distribution of failure
nodes inside an autonomous system, which contributes in building a resilient network to sustain
from critical network failures.
Over the years, the World Wide Web has rapidly transformed from an obscure platform
for publishing content to a primary infrastructure of learning and commerce. But, the majority of
its users are unaware that the internet has suffered substantial changes in its organization and
infrastructure over the time of its expansion. The early web consisted of chaotic and
complicated navigations, where organization and management of data were heavily distributed.
The early rise of the internet was supported by distributed protocols which failed to provide
consistency and an effective delivery. So, it was evident that the web needed to be consolidated
into an uncompromised and curated service platform to reach the requirements of businesses
and the general audience. This practice towards the consolidation of the internet architecture
led to the introduction of two key activities, namely, routing mechanisms and self-organizing
topologies. While several novel routing mechanisms and self-organizing architectures have
been designed and implemented over the years, they have failed critically in terms of providing
security and reliability [3]. Additionally, the dilemma of prioritizing performance over security has
always been imperative [4] and is one of the key factors in determining the limitations of a
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
A decentralized paradigm for resource-aware computing in wireless... (Heerok Banerjee)
677
networking architecture. The prioritization of performance and QoS over security certainly leads
to poor integrity of data and network security. This trade-off between network security and
performance has yielded many security-centric and performance-centric architectures that are
operated in our day to day life. However, such architectures have not remained consistent
throughout the period of their development. Several ramifications in the past have led to
protocols pertaining to high performance and low reliability [5], whereas modern approaches
consider security and user-privacy on top. In this paper, we propose the design of decentralized
networks and discuss the performance of security-centric protocols which are equipped to deal
with the growing necessity of digital data as represented in Table 1.
Centralized networks are a group of interconnected devices that are governed and
monitored at a single node which acts as a communicating agent with neighboring networks.
Essentially, the entire networking process which comprises of validation, encryption/decryption,
computation, routing, interpretation and re-organization, is also centralized and is much
expected to be a primary target for disrupting the entire network. On the other hand,
decentralized networks do not propagate information through a single point. Devices are
selected stochastically and are interconnected with each other forming many peer-to-peer
networks that provide secure and reliable communication and hence serve concrete privacy and
anonymity over the network [6]. In this paper, we have proposed a novel architecture accounting
both, the performance and the security measures involved during the design of distributed ad
hoc networks for accommodating multi-objective networking applications and also provided a
blueprint to implement decentralized systems using contemporary simulation frameworks [7, 8].
2. Research Methodology
We conducted several quasi-experimental evaluations of widely accepted
architectures [9], with promising historical evidences. Our evaluations inclined mostly towards
the underlying security measures and methodological foundations of network analytics, based
on which most of the design was framed.
Firstly, we attempted to identify the architectural constraints existent in traditional
networked architecture and compared them extensively with major details [9, 10]. Consequently,
we simulated the protocols designed for wireless ad hoc networks with typically large network
participants and introduced various dynamic changes (load variations, topological updates,
inbound congestions) to conduct quasi-experimental observations. We recorded some of the
network performance metrics such as response time, module-to-module delay, packet drop
ratio etc. Additionally, we conducted several benchmark tests and observed anomalies in these
conventional models. Table 1 reproduces the characteristics of different network architectures
and illustrates that the proposed community-based architecture promises reliable, secure and
uniform connectivity amongst its community nodes.
Table 1. Comparison of Different Network Architectures
Model
Property
Client-Server
(Conventional)
Peer-Peer Decentralized Community based
Control Centralized Centralized Decentralized
Connection Model Address-based Address-based Service-based
Request One-one One-Many Cooperative (1โ†’N)
Reply One-one One-one Collaborative (Mโ†’N)
Feature Unilateral Unilateral Multilateral
Nodes Passive Active Active
Load Server Congestion Peer Congestion NIL
3. Proposed Architecture
The proposed architecture namely Autonomous Collaborative Decentralized-
Community Network (ACDCN) is a self-organizing logical topology for incorporating
collaborative networking capabilities by distributing the workload to its neighboring collaborators.
The member nodes are selected by considering the bilateral connectivity and availability of
resources. A publisher node introduces a complex process, which is further disseminated in the
community network by introducing pairs of collaborations and shared data pools [10, 11].
Figure 2 shows that the community nodes acknowledge at least three of their neighboring
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 676-682
678
collaborators. In such decentralized architectures, a community node retains full freedom to
connect with the community via any existent member node, and thus, decreases the threat of
intrusion.
The objective of this architecture is to distribute data and reduce the computational
workload amongst its community nodes. The underlying network consists of non-community
member nodes that act as proxy members as shown in Figure 1, to transfer data from one
community to another. These nodes are not aware of inter-community transactions and do not
participate in sharing the workload of the network. The non-member nodes assure a feasible
path to allow a bilateral communication between communities and exchange of data in a
stochastic manner. On a large scale, community nodes also publish requests recursively for
other community networks, only if the entire community is exhausted. The subscriber nodes
receive triggered updates from the publisher and compute on the provided data [11]. Hence, the
proposed architecture allows distribution of data-intensive operations and adds a feature to the
QoS factor by the collaboration of computational power.
Figure 1. Overview of collaborative decentralized-community network architecture
The key features of the proposed architecture are discussed:
a. Fault-Tolerance and Stability
Conventional network models follow a centralized channel of communication and are
easy to maintain. However, since there is only a single point of failure, this leads to an insecure
and vulnerable threat to the entire system. Such central nodes are keen to network attacks and
the instability and the overhead of the central node impact the entire performance of the
network [12]. Centralized systems are highly unstable whereas distributed decentralized
systems are very stable where singleton failure is negligible and does not cause much chaos as
compared to centralized systems. However, distributed systems have a limitation in terms of
reliable communication and security. A hybridized architecture, accounting decentralization of
data-intensive distributed systems, yields a decentralized community-based architecture of
networked systems, which is fault tolerant and highly stable.
b. Publisher-Subscriber Protocol
A community-based network architecture serves as a publish-subscribe platform where
community nodes can publish their share of tasks and broadcast them to the entire
community [13]. Community networks are time-stamped and can provide much more security. In
the proposed architecture, a publisher-subscribe mechanism is implemented which offers an
effective solution to distribute the load uniformly on demand. When a community node has
insufficient computing resources to complete a task, the node publishes the request to all the
community members [14], thereby relieving itself from huge computations and alleviating some
memory to rejoining the community network.
c. Autonomy and Self-Organization
The dynamism exhibited by such large-scale networks requires some degree of
autonomy and self-organization [15, 16]. Inspired by the cooperation in economic communities
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
A decentralized paradigm for resource-aware computing in wireless... (Heerok Banerjee)
679
and the Autonomous Decentralized System (ADS) architecture [6], we propose the concept of
Autonomous Collaborative Decentralized-Community Networks (ACDCN) which are intended to
meet the rapid dynamism of the network requirements [17]. It categorizes and customizes tasks
specific to collaborator specifications and is completely decentralized while selecting the
collaborator, in the sense, each community node performs the same set of operations as
subjected to the network but with random participants. In such decentralized schemes,
conventional machine learning techniques are feasible to yield self-learning algorithms and
meta-heuristic algorithms for large computations (hierarchical classification, path determination
and content management) with respect to time-variant attributes [18].
4. Simulation Modelling and Performance Analysis
The simulation setup of the proposed architecture ACDCN was performed by using
OMNet++ [7] and the data is visualized with matplotlib [8]. Initially, for setting an environment of
a small-scale topology as shown in Figure 2, we have taken the number of nodes n=7 and the
maximum number of collaborators m=5. We then introduce a composite and complex
task ฦ’(node [0]) solvable in polynomial time T(ษณ) to the community network. Node [0] allocates
memory to complete a subpart of ฦ’(node [0]) and publishes the residual work ฦ’(7,4)(node [0]) as a
subset of the initial task to the community network with four collaborators namely, node [1], node
[2], node [3] and node [4]. The collaborating members are notified by sharing a hash table. Each
collaborator follows the same procedure, i.e., it randomly selects a subtask and adds itself to the
community network by measuring two parameters, namely residual buffer size ฮตk and
propagation delay ฮšconst. Figure 2 illustrates the simulation environment:
Figure 2. ACDCN simulation-topology and components (n=7, m=5)
mathematically, the completion time for a task can be formulated as follows:
๐‘‡ (๐‘“(๐‘›,๐‘š)
(๐‘›๐‘œ๐‘‘๐‘’[๐‘–])) = ๐œ‚(๐‘–) + ๐œŽ ร— ๐‘‡(โˆ‘ ๐‘š
๐‘Ž=๐‘–+1 ๐‘“(๐‘›,๐‘›โˆ’๐‘Ž)
(๐‘›๐‘œ๐‘‘๐‘’[๐‘Ž]) + ๐œ… ๐‘๐‘œ๐‘›๐‘ ๐‘ก) (1)
Here, ษณ(i) denotes the individual time taken by node [i] to compute its own task, ฯƒ is the
collaboration index of the community network and ฮšconst is the constant propagation delay,
assuming that the channel operates at uniform delays. The optimal time to solve the task
ฦ’(node [i]) is T(ษณ) = ษณ(0) + ษณ(1) + ษณ(2) + ษณ(3)+ .....+ ษณ(m) . If the number of collaborating nodes tends
to reach n-1, then we can put limit from {m} to {n-1} to determine the non-parametric equation as
given:
๐‘‡(๐œ‚) = ๐œ‚(0) + ๐œŽ(โˆ‘ ๐‘›โˆ’1
๐‘Ž=1 ๐‘“(๐‘›,๐‘›โˆ’๐‘Ž)
(๐‘›๐‘œ๐‘‘๐‘’[๐‘Ž]) + (๐‘› โˆ’ 1) ร— ๐œ… ๐‘๐‘œ๐‘›๐‘ ๐‘ก) (2)
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 676-682
680
๐‘‡(๐œ‚) = ๐œ‚(0) + (
๐œŽ
1โˆ’๐œŽ
) ร— (๐‘› โˆ’ 1) ร— ๐œ… ๐‘๐‘œ๐‘›๐‘ ๐‘ก โ‡’ 0 < ๐œŽ < 1 (3)
We used non-parametric estimation techniques to estimate suitable values for ฯƒ in
order to achieve an optimal response time [19, 20]. After the simulation was carried out, we
extracted the simulation data and using Qtiplot, we attempted to fit the data into the proposed
linear mathematical model to determine the accuracy of the proposed model. The simulation
was carried out by initiating the community nodes at random locations, each equipped with
three types of modules namely, an application module, a routing module and three queuing
modules. The application module generates the complex tasks and encapsulates the set of
subtasks in a test program. This test program is embedded in a packet and then forwarded to
the routing module. The routing module is responsible for determining the optimal route to a
potential collaborator and forwarding the packet to the next hop. The data received by the
collaborator is again interpreted by the application module and further decomposed to be
executed collaboratively.
5. Results and Discussion
After performing the simulation of the proposed system, we analyzed the performance
of the system based on the mathematical model given in equation (3). We plotted the graphs of
conventional QoS metrics used to determine the efficiency of a network architecture.
The metrics along with the obtained graphs are given below in relevance to the performance of
the proposed system.
The number of hops encountered by the packet essentially refers to the number of
recursive calls to the test program. We observed that the initial hops are variant and gradually
synchronizes to a consistent value which remains uniform for the rest of the simulation period.
Initially, m collaborators of fixed buffer size are unoccupied and can distribute sub-parts of the
test program amongst themselves. Hence, the community nodes follow a non-linear curve as
shown in Figure 3(a) As the residual memory available to the community members decreases
as a function of time, a lesser number of complex queries could be served collaboratively. As a
result, the collaborator then operates with an average congestion, which was observed to be
11 kbps per collaborator, as depicted from Figure 3(c). For optimal response time, we specify
different collaborative indices ฯƒ [equation (3)] for a subset of collaborators. By varying the value
of ฯƒ, we limit the number of collaborations for a set of given tasks depending upon the workload
shared by the collaborator.
The TTL parameter plays an important role in managing congestion and balancing
packet drop ratio. Every packet header contains a lifespan of the packet which is referred to as
the Time To Lease (TTL). If a certain amount of time expires, then the packet is discarded and
the buffer is released. Hence it is significant to re-evaluate routing and resource provisioning
algorithms to attain maximum delivery ratio and minimize the number of discarded packets [21].
The simulation results show that the number of packets dropped is multivariate and exhibit
linearity in Figure 3(b). The average number of packets lost is calculated to be approximately
1528, which is relatively low as compared to other application layer protocols. Such losses can
be avoided by adopting efficient routing mechanisms in the network, which proactively
determine the optimal path to the destination with lesser cost [22, 23].
When the test program is completely executed, the results of each successive recursion
are sent to the publisher. The subscribers then re-organize the data to generate the response to
the publisher as shown in Figure 2. Figure 3(d) plots the number of packets successfully
delivered to the destination node over time. The plot shows that the proposed system resembles
a linear curve in delivering the packets with minimal variations. Hence, our proposed model can
be considered as a linear model. Since the value of the collaborative indices is set to arbitrary
values, we observe different response time from different collaborators. This subroutine
scheduling of execution of subtasks helps in determining the set of most suitable collaborators
with sharable resources. Also, the time taken for data aggregation and reorganization is
reduced as the completed set of subtasks are priority organized by the publisher whenever a
response is received. The application layer is also responsible for aggregating data and
schedules the task i.e. to either notify the potential collaborators or organize incoming
responses.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
A decentralized paradigm for resource-aware computing in wireless... (Heerok Banerjee)
681
(a). Mean hop count per 100 observations (b). Packet Dropped over time
(c). Mean Congestion (d). Packets Delivered over time
Figure 3. Recorded QoS measures of the proposed model
6. Conclusion
In this paper, we have proposed a scalable decentralized community-based network
architecture that primarily encounters security bottlenecks and introduces collaborative
operations mostly suitable for ad hoc networks [20, 24]. Some intriguing fields in which such
decentralized schemes can be adopted are Home IoT networks, VANETs, UW-WSN etc., [9].
The results obtained with the help of extensive simulation studies illustrate that Autonomous
Decentralized Systems (ADS) are more effective when collaborative computing mechanisms
are adopted [23]. However, one of the main challenges in such a decentralized scheme is
increasing the efficiency of resource management and the routing mechanism [22, 25, 26].
In future, we plan to investigate the supportability of meta-heuristic approaches for solving path
optimization problems and consolidate the routing module by adopting fuzzy based ant-colony
optimization systems. Moreover, the collaborating index of the community network is measured
specifically for homogeneous networks. We plan to measure the performance of heterogeneous
community networks with time-variant propagation delays [18] and estimate a mathematical
model for determining the response time using the same procedure as described in this paper.
We also plan to determine the accuracy of Bayesian models for such decentralized schemes.
After the validation of these experiments, we can come to a comprehensive understanding of
whether such Autonomous Decentralized Systems exhibit congruent behaviors in varied
environments and are scalable to accommodate the requirements of large-scale distributed
networks [23, 24].
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 676-682
682
References
[1] M Razzaq, M Qureshi, S Gill, S Ullah. Security Issues in the Internet of Things (IoT): A
Comprehensive Study. International Journal of Advanced Computer Science and Applications
(IJACSA). 2017; 8(5): 383-388.
[2] L M Taraouco, L M Bertholdo, L Z Granville, L M R Arbiza, F Carbone, M Marotta, J J C De
Santanna. Internet of things in healthcare: Interoperability and security issues. IEEE International
Conference on Communications (ICC). 2012: 6121-6125.
[3] S Subhashini, V kavitha. A Survey on security issues in service delivery models of cloud computing.
Journal of Network and Computer Applications. 2011; 34(1): 1-11.
[4] K Ragab, T Ono, N Kaji, K Mori. An Efficient Communication Technology for Autonomous
Decentralized Community Information System. IEEE ISADS. 2003;
[5] M Rajesh, JM Gnanasekar. Congestion control scheme for Heterogeneous Wireless Ad Hoc
Networks using self-adjust hybrid model. International Journal of Pure and Applied Mathematics.
2017; 116(21): 519-536.
[6] K Mori. Autonomous Decentralized Systems: Concept, Data Field Architecture and Future Trends. 1st
Int. Sym. On ADS, (ISADS '93), IEEE. 1993: 28-34,
[7] OMNet++: https://www.omnetpp.org/; Accesed 13th December 2017.
[8] MatplotLib: https://matplotlib.org/; Accesed 12th April 2018.
[9] Paul D H Hines, Seth Blumsack, Markus Schlapfer. Centralized vs Decentralized Infrastructure
Networks; arXiv preprint; 1510.08792; 2015.
[10] Zhuang SQ, Zhao BY, Joseph AD, Katz RH, Kubiatowicz JD. Bayeux: An architecture for scalable
and fault-tolerant wide-area data dissemination. 11th International Workshop on Network and
operating systems support for digital audio and video, ACM. 2001: 11-20.
[11] Ingham, David B, Fabio Panzieri, and Santosh K Shrivastava. Constructing dependable Web
services. Advances in Distributed Systems, Springer. 2000: 277-294.
[12] Jung, Jaeyeon, Balachander Krishnamurthy, Michael Rabinovich. Flash crowds and denial of service
attacks: Characterization and implications for CDNs and web sites. 11th international conference on
World Wide Web, ACM. 2002: 293-304.
[13] Costa, Paolo. Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks.
IEEE Journal on selected areas in communications. 2008; 26(5): 784-760.
[14] Paul D H Hines, Seth Blumsack, Markus Schlapfer. When are decentralized infrastructure networks
preferable to centralized ones. 50th
Hawaii International Conference on System Science. 2017:
3241-3250.
[15] S Chan, R Donner, S Lรคmmer. Urban road networksโ€“spatial networks with universal geometric
features ?. The European Physical Journal B. 2011; 84(4): 563โ€“577.
[16] Bashan, Y Berezin, S V Buldyrev, S Havlin. The extreme vulnerability of interdependent spatially
embedded networks. Nature Physics. 2013; 9(10): 667-672.
[17] L G Roberts. Beyond Mooreโ€™s law: Internet growth trend. IEEE Computer. 2000; 33(1): 117-119
[18] Selivanov, A, Fradkov, A, Fridman, E. Passification-based decentralized adaptive synchronization of
dynamical networks with time-varying delays. Journal of the Franklin Institute; 2015; 352(1): 52-72.
[19] Mehmeti, F, Spyropoulos, T Performance analysis of mobile data offloading in heterogeneous
networks. IEEE Transactions on Mobile Computing; 2017; 16(2): 482-497.
[20] Mori, K Trend of autonomous decentralized systems. Distributed Computing Systems, 10th IEEE
International Workshop on Future Trends; 2004; 213-216.
[21] R Subramanyan, J M Alonso, J B Fortes. A scalable SNMP-based distributed monitoring system for
heterogeneous network computing. ACM/IEEE Conference on Supercomputing; 2000; 14.
[22] Jegan Govindasamy, Samundiswamry Punniakody. A comparative study of Reactive, Proactive and
Hybrid Routing Protocol in Wireless Sensor Network under wormhole attack. Journal of Electrical
Systems and Information Technology. 2017.
[23] M E Coimbra, M Selimi, A P Francisco, F Freitag, L Veiga. Gelly-scheduling: Distributed Graph
processing for service placement in community networks. 33rd
Annual ACM Symposium on Applied
Computing; 2018; 151-160.
[24] Hao Yin, Dongchao Guo, Kai Wang. Hyperconnected Network: A Decentralized Trust Computing and
Networking Paradigm. IEEE Network; 32(1): 112-117.
[25] H Banerjee, S Murugaanandam, V Ganapathy. Low-Energy Aware Routing Mechanism for Wireless
Sensor Networks. International Journal of Engineering Research in Computer Science & Engineering
(IJERCSE); 2018; 5(1): 112-117.
[26] S Murugaanandam, K Sundaran, V Ganapathy. Comparison of cluster based Routing Protocols in
Wireless Sensor Network: A Recent Survey. International Journal of Pure and applied Mathematics;
2016; 114(7): 559-571.

More Related Content

What's hot

Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
ย 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
ย 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
ย 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
ย 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
ย 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
ย 
User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksIRJET Journal
ย 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
ย 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
ย 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
ย 
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSPROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSIJNSA Journal
ย 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
ย 
Present Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignPresent Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignEvaObinna
ย 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Pvrtechnologies Nellore
ย 
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...ranjith kumar
ย 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
ย 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
ย 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedtanvir616
ย 

What's hot (20)

Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
ย 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
ย 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
ย 
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
ย 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
ย 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
ย 
L010517180
L010517180L010517180
L010517180
ย 
User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
ย 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
ย 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
ย 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
ย 
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSPROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKS
ย 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
ย 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
ย 
Present Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved DesignPresent Day Internet Design, Architecture, Performance and an Improved Design
Present Day Internet Design, Architecture, Performance and an Improved Design
ย 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...
ย 
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
ย 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
ย 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
ย 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
ย 

Similar to A decentralized paradigm for resource-aware computing in wireless Ad hoc networks

A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
ย 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
ย 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentCSCJournals
ย 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
ย 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...IJNSA Journal
ย 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
ย 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
ย 
J031101064069
J031101064069J031101064069
J031101064069theijes
ย 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform IJECEIAES
ย 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
ย 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
ย 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdfJohn Paul
ย 
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDINFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDIJNSA Journal
ย 
In network aggregation techniques for wireless sensor networks - a survey
In network aggregation techniques for wireless sensor networks - a surveyIn network aggregation techniques for wireless sensor networks - a survey
In network aggregation techniques for wireless sensor networks - a surveyGungi Achi
ย 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
ย 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
ย 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
ย 
A survey of models for computer networks management
A survey of models for computer networks managementA survey of models for computer networks management
A survey of models for computer networks managementIJCNCJournal
ย 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
ย 

Similar to A decentralized paradigm for resource-aware computing in wireless Ad hoc networks (20)

A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
ย 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
ย 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing Environment
ย 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
ย 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
ย 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
ย 
Ijciet 08 02_002
Ijciet 08 02_002Ijciet 08 02_002
Ijciet 08 02_002
ย 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
ย 
J031101064069
J031101064069J031101064069
J031101064069
ย 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform
ย 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
ย 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
ย 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
ย 
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRIDINFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
ย 
In network aggregation techniques for wireless sensor networks - a survey
In network aggregation techniques for wireless sensor networks - a surveyIn network aggregation techniques for wireless sensor networks - a survey
In network aggregation techniques for wireless sensor networks - a survey
ย 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
ย 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
ย 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
ย 
A survey of models for computer networks management
A survey of models for computer networks managementA survey of models for computer networks management
A survey of models for computer networks management
ย 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ย 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
ย 

Recently uploaded

Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...
Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...
Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...Call Girls Mumbai
ย 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
ย 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
ย 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
ย 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
ย 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
ย 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
ย 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
ย 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
ย 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
ย 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
ย 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
ย 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
ย 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
ย 
Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X79953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
ย 

Recently uploaded (20)

Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...
Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...
Bhubaneswar๐ŸŒนCall Girls Bhubaneswar โคKomal 9777949614 ๐Ÿ’Ÿ Full Trusted CALL GIRL...
ย 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
ย 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
ย 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
ย 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
ย 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
ย 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
ย 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
ย 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
ย 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
ย 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
ย 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
ย 
Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
Call Girls in South Ex (delhi) call me [๐Ÿ”9953056974๐Ÿ”] escort service 24X7
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
ย 

A decentralized paradigm for resource-aware computing in wireless Ad hoc networks

  • 1. TELKOMNIKA, Vol.17, No.2, April 2019, pp.676~682 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i2. 9621 ๏ฎ 676 Received April 17, 2018; Revised December 18, 2018; Accepted January 26, 2019 A decentralized paradigm for resource-aware computing in wireless Ad hoc networks Heerok Banerjee*1 , S Murugaanandam2 , V Ganapathy3 Department of Information Technology, School of Computing, SRM Institute of Science and Technology, Mahatma Gandhi Rd, Potheri, SRM Nagar, Kattankulathur, Tamil Nadu 603203, India *Corresponding author, e-mail: heerokbanerjee_ra@srmuniv.edu.in1 , murugaanandam.s@ktr.srmuniv.ac.in2 , ganapathy.v@ktr.srmuniv.ac.in3 Abstract A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy- critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools. Keywords: Ad hoc networks, decentralized computing, grid computing, peer-to-peer networking, wireless networks Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction The emergence of IoT and grid computing is a harbinger for the reinvestigation of network reliability measures and security policies in order to save such technologies from scrutiny and misuse. Moreover, the advent of such technologies has led manufacturers to produce cheap network-capable devices in large quantities. Refrigerators, DVRs, thermostats, and even minute utilities such as light-bulbs have been redesigned to be networking capable and to provide an extra convenience through remote controlling services. As observed, many of these devices have weak security and are considerably configured with easily penetrable security measures [1, 2]. To overcome these issues related to network reliability and security, we concentrate on decentralized network architectures that balances the trade-off between network security and network performance [2]. One of the key goals achieved by the decentralization of networked systems is increasing the variability in the distribution of failure nodes inside an autonomous system, which contributes in building a resilient network to sustain from critical network failures. Over the years, the World Wide Web has rapidly transformed from an obscure platform for publishing content to a primary infrastructure of learning and commerce. But, the majority of its users are unaware that the internet has suffered substantial changes in its organization and infrastructure over the time of its expansion. The early web consisted of chaotic and complicated navigations, where organization and management of data were heavily distributed. The early rise of the internet was supported by distributed protocols which failed to provide consistency and an effective delivery. So, it was evident that the web needed to be consolidated into an uncompromised and curated service platform to reach the requirements of businesses and the general audience. This practice towards the consolidation of the internet architecture led to the introduction of two key activities, namely, routing mechanisms and self-organizing topologies. While several novel routing mechanisms and self-organizing architectures have been designed and implemented over the years, they have failed critically in terms of providing security and reliability [3]. Additionally, the dilemma of prioritizing performance over security has always been imperative [4] and is one of the key factors in determining the limitations of a
  • 2. TELKOMNIKA ISSN: 1693-6930 ๏ฎ A decentralized paradigm for resource-aware computing in wireless... (Heerok Banerjee) 677 networking architecture. The prioritization of performance and QoS over security certainly leads to poor integrity of data and network security. This trade-off between network security and performance has yielded many security-centric and performance-centric architectures that are operated in our day to day life. However, such architectures have not remained consistent throughout the period of their development. Several ramifications in the past have led to protocols pertaining to high performance and low reliability [5], whereas modern approaches consider security and user-privacy on top. In this paper, we propose the design of decentralized networks and discuss the performance of security-centric protocols which are equipped to deal with the growing necessity of digital data as represented in Table 1. Centralized networks are a group of interconnected devices that are governed and monitored at a single node which acts as a communicating agent with neighboring networks. Essentially, the entire networking process which comprises of validation, encryption/decryption, computation, routing, interpretation and re-organization, is also centralized and is much expected to be a primary target for disrupting the entire network. On the other hand, decentralized networks do not propagate information through a single point. Devices are selected stochastically and are interconnected with each other forming many peer-to-peer networks that provide secure and reliable communication and hence serve concrete privacy and anonymity over the network [6]. In this paper, we have proposed a novel architecture accounting both, the performance and the security measures involved during the design of distributed ad hoc networks for accommodating multi-objective networking applications and also provided a blueprint to implement decentralized systems using contemporary simulation frameworks [7, 8]. 2. Research Methodology We conducted several quasi-experimental evaluations of widely accepted architectures [9], with promising historical evidences. Our evaluations inclined mostly towards the underlying security measures and methodological foundations of network analytics, based on which most of the design was framed. Firstly, we attempted to identify the architectural constraints existent in traditional networked architecture and compared them extensively with major details [9, 10]. Consequently, we simulated the protocols designed for wireless ad hoc networks with typically large network participants and introduced various dynamic changes (load variations, topological updates, inbound congestions) to conduct quasi-experimental observations. We recorded some of the network performance metrics such as response time, module-to-module delay, packet drop ratio etc. Additionally, we conducted several benchmark tests and observed anomalies in these conventional models. Table 1 reproduces the characteristics of different network architectures and illustrates that the proposed community-based architecture promises reliable, secure and uniform connectivity amongst its community nodes. Table 1. Comparison of Different Network Architectures Model Property Client-Server (Conventional) Peer-Peer Decentralized Community based Control Centralized Centralized Decentralized Connection Model Address-based Address-based Service-based Request One-one One-Many Cooperative (1โ†’N) Reply One-one One-one Collaborative (Mโ†’N) Feature Unilateral Unilateral Multilateral Nodes Passive Active Active Load Server Congestion Peer Congestion NIL 3. Proposed Architecture The proposed architecture namely Autonomous Collaborative Decentralized- Community Network (ACDCN) is a self-organizing logical topology for incorporating collaborative networking capabilities by distributing the workload to its neighboring collaborators. The member nodes are selected by considering the bilateral connectivity and availability of resources. A publisher node introduces a complex process, which is further disseminated in the community network by introducing pairs of collaborations and shared data pools [10, 11]. Figure 2 shows that the community nodes acknowledge at least three of their neighboring
  • 3. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 676-682 678 collaborators. In such decentralized architectures, a community node retains full freedom to connect with the community via any existent member node, and thus, decreases the threat of intrusion. The objective of this architecture is to distribute data and reduce the computational workload amongst its community nodes. The underlying network consists of non-community member nodes that act as proxy members as shown in Figure 1, to transfer data from one community to another. These nodes are not aware of inter-community transactions and do not participate in sharing the workload of the network. The non-member nodes assure a feasible path to allow a bilateral communication between communities and exchange of data in a stochastic manner. On a large scale, community nodes also publish requests recursively for other community networks, only if the entire community is exhausted. The subscriber nodes receive triggered updates from the publisher and compute on the provided data [11]. Hence, the proposed architecture allows distribution of data-intensive operations and adds a feature to the QoS factor by the collaboration of computational power. Figure 1. Overview of collaborative decentralized-community network architecture The key features of the proposed architecture are discussed: a. Fault-Tolerance and Stability Conventional network models follow a centralized channel of communication and are easy to maintain. However, since there is only a single point of failure, this leads to an insecure and vulnerable threat to the entire system. Such central nodes are keen to network attacks and the instability and the overhead of the central node impact the entire performance of the network [12]. Centralized systems are highly unstable whereas distributed decentralized systems are very stable where singleton failure is negligible and does not cause much chaos as compared to centralized systems. However, distributed systems have a limitation in terms of reliable communication and security. A hybridized architecture, accounting decentralization of data-intensive distributed systems, yields a decentralized community-based architecture of networked systems, which is fault tolerant and highly stable. b. Publisher-Subscriber Protocol A community-based network architecture serves as a publish-subscribe platform where community nodes can publish their share of tasks and broadcast them to the entire community [13]. Community networks are time-stamped and can provide much more security. In the proposed architecture, a publisher-subscribe mechanism is implemented which offers an effective solution to distribute the load uniformly on demand. When a community node has insufficient computing resources to complete a task, the node publishes the request to all the community members [14], thereby relieving itself from huge computations and alleviating some memory to rejoining the community network. c. Autonomy and Self-Organization The dynamism exhibited by such large-scale networks requires some degree of autonomy and self-organization [15, 16]. Inspired by the cooperation in economic communities
  • 4. TELKOMNIKA ISSN: 1693-6930 ๏ฎ A decentralized paradigm for resource-aware computing in wireless... (Heerok Banerjee) 679 and the Autonomous Decentralized System (ADS) architecture [6], we propose the concept of Autonomous Collaborative Decentralized-Community Networks (ACDCN) which are intended to meet the rapid dynamism of the network requirements [17]. It categorizes and customizes tasks specific to collaborator specifications and is completely decentralized while selecting the collaborator, in the sense, each community node performs the same set of operations as subjected to the network but with random participants. In such decentralized schemes, conventional machine learning techniques are feasible to yield self-learning algorithms and meta-heuristic algorithms for large computations (hierarchical classification, path determination and content management) with respect to time-variant attributes [18]. 4. Simulation Modelling and Performance Analysis The simulation setup of the proposed architecture ACDCN was performed by using OMNet++ [7] and the data is visualized with matplotlib [8]. Initially, for setting an environment of a small-scale topology as shown in Figure 2, we have taken the number of nodes n=7 and the maximum number of collaborators m=5. We then introduce a composite and complex task ฦ’(node [0]) solvable in polynomial time T(ษณ) to the community network. Node [0] allocates memory to complete a subpart of ฦ’(node [0]) and publishes the residual work ฦ’(7,4)(node [0]) as a subset of the initial task to the community network with four collaborators namely, node [1], node [2], node [3] and node [4]. The collaborating members are notified by sharing a hash table. Each collaborator follows the same procedure, i.e., it randomly selects a subtask and adds itself to the community network by measuring two parameters, namely residual buffer size ฮตk and propagation delay ฮšconst. Figure 2 illustrates the simulation environment: Figure 2. ACDCN simulation-topology and components (n=7, m=5) mathematically, the completion time for a task can be formulated as follows: ๐‘‡ (๐‘“(๐‘›,๐‘š) (๐‘›๐‘œ๐‘‘๐‘’[๐‘–])) = ๐œ‚(๐‘–) + ๐œŽ ร— ๐‘‡(โˆ‘ ๐‘š ๐‘Ž=๐‘–+1 ๐‘“(๐‘›,๐‘›โˆ’๐‘Ž) (๐‘›๐‘œ๐‘‘๐‘’[๐‘Ž]) + ๐œ… ๐‘๐‘œ๐‘›๐‘ ๐‘ก) (1) Here, ษณ(i) denotes the individual time taken by node [i] to compute its own task, ฯƒ is the collaboration index of the community network and ฮšconst is the constant propagation delay, assuming that the channel operates at uniform delays. The optimal time to solve the task ฦ’(node [i]) is T(ษณ) = ษณ(0) + ษณ(1) + ษณ(2) + ษณ(3)+ .....+ ษณ(m) . If the number of collaborating nodes tends to reach n-1, then we can put limit from {m} to {n-1} to determine the non-parametric equation as given: ๐‘‡(๐œ‚) = ๐œ‚(0) + ๐œŽ(โˆ‘ ๐‘›โˆ’1 ๐‘Ž=1 ๐‘“(๐‘›,๐‘›โˆ’๐‘Ž) (๐‘›๐‘œ๐‘‘๐‘’[๐‘Ž]) + (๐‘› โˆ’ 1) ร— ๐œ… ๐‘๐‘œ๐‘›๐‘ ๐‘ก) (2)
  • 5. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 676-682 680 ๐‘‡(๐œ‚) = ๐œ‚(0) + ( ๐œŽ 1โˆ’๐œŽ ) ร— (๐‘› โˆ’ 1) ร— ๐œ… ๐‘๐‘œ๐‘›๐‘ ๐‘ก โ‡’ 0 < ๐œŽ < 1 (3) We used non-parametric estimation techniques to estimate suitable values for ฯƒ in order to achieve an optimal response time [19, 20]. After the simulation was carried out, we extracted the simulation data and using Qtiplot, we attempted to fit the data into the proposed linear mathematical model to determine the accuracy of the proposed model. The simulation was carried out by initiating the community nodes at random locations, each equipped with three types of modules namely, an application module, a routing module and three queuing modules. The application module generates the complex tasks and encapsulates the set of subtasks in a test program. This test program is embedded in a packet and then forwarded to the routing module. The routing module is responsible for determining the optimal route to a potential collaborator and forwarding the packet to the next hop. The data received by the collaborator is again interpreted by the application module and further decomposed to be executed collaboratively. 5. Results and Discussion After performing the simulation of the proposed system, we analyzed the performance of the system based on the mathematical model given in equation (3). We plotted the graphs of conventional QoS metrics used to determine the efficiency of a network architecture. The metrics along with the obtained graphs are given below in relevance to the performance of the proposed system. The number of hops encountered by the packet essentially refers to the number of recursive calls to the test program. We observed that the initial hops are variant and gradually synchronizes to a consistent value which remains uniform for the rest of the simulation period. Initially, m collaborators of fixed buffer size are unoccupied and can distribute sub-parts of the test program amongst themselves. Hence, the community nodes follow a non-linear curve as shown in Figure 3(a) As the residual memory available to the community members decreases as a function of time, a lesser number of complex queries could be served collaboratively. As a result, the collaborator then operates with an average congestion, which was observed to be 11 kbps per collaborator, as depicted from Figure 3(c). For optimal response time, we specify different collaborative indices ฯƒ [equation (3)] for a subset of collaborators. By varying the value of ฯƒ, we limit the number of collaborations for a set of given tasks depending upon the workload shared by the collaborator. The TTL parameter plays an important role in managing congestion and balancing packet drop ratio. Every packet header contains a lifespan of the packet which is referred to as the Time To Lease (TTL). If a certain amount of time expires, then the packet is discarded and the buffer is released. Hence it is significant to re-evaluate routing and resource provisioning algorithms to attain maximum delivery ratio and minimize the number of discarded packets [21]. The simulation results show that the number of packets dropped is multivariate and exhibit linearity in Figure 3(b). The average number of packets lost is calculated to be approximately 1528, which is relatively low as compared to other application layer protocols. Such losses can be avoided by adopting efficient routing mechanisms in the network, which proactively determine the optimal path to the destination with lesser cost [22, 23]. When the test program is completely executed, the results of each successive recursion are sent to the publisher. The subscribers then re-organize the data to generate the response to the publisher as shown in Figure 2. Figure 3(d) plots the number of packets successfully delivered to the destination node over time. The plot shows that the proposed system resembles a linear curve in delivering the packets with minimal variations. Hence, our proposed model can be considered as a linear model. Since the value of the collaborative indices is set to arbitrary values, we observe different response time from different collaborators. This subroutine scheduling of execution of subtasks helps in determining the set of most suitable collaborators with sharable resources. Also, the time taken for data aggregation and reorganization is reduced as the completed set of subtasks are priority organized by the publisher whenever a response is received. The application layer is also responsible for aggregating data and schedules the task i.e. to either notify the potential collaborators or organize incoming responses.
  • 6. TELKOMNIKA ISSN: 1693-6930 ๏ฎ A decentralized paradigm for resource-aware computing in wireless... (Heerok Banerjee) 681 (a). Mean hop count per 100 observations (b). Packet Dropped over time (c). Mean Congestion (d). Packets Delivered over time Figure 3. Recorded QoS measures of the proposed model 6. Conclusion In this paper, we have proposed a scalable decentralized community-based network architecture that primarily encounters security bottlenecks and introduces collaborative operations mostly suitable for ad hoc networks [20, 24]. Some intriguing fields in which such decentralized schemes can be adopted are Home IoT networks, VANETs, UW-WSN etc., [9]. The results obtained with the help of extensive simulation studies illustrate that Autonomous Decentralized Systems (ADS) are more effective when collaborative computing mechanisms are adopted [23]. However, one of the main challenges in such a decentralized scheme is increasing the efficiency of resource management and the routing mechanism [22, 25, 26]. In future, we plan to investigate the supportability of meta-heuristic approaches for solving path optimization problems and consolidate the routing module by adopting fuzzy based ant-colony optimization systems. Moreover, the collaborating index of the community network is measured specifically for homogeneous networks. We plan to measure the performance of heterogeneous community networks with time-variant propagation delays [18] and estimate a mathematical model for determining the response time using the same procedure as described in this paper. We also plan to determine the accuracy of Bayesian models for such decentralized schemes. After the validation of these experiments, we can come to a comprehensive understanding of whether such Autonomous Decentralized Systems exhibit congruent behaviors in varied environments and are scalable to accommodate the requirements of large-scale distributed networks [23, 24].
  • 7. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 676-682 682 References [1] M Razzaq, M Qureshi, S Gill, S Ullah. Security Issues in the Internet of Things (IoT): A Comprehensive Study. International Journal of Advanced Computer Science and Applications (IJACSA). 2017; 8(5): 383-388. [2] L M Taraouco, L M Bertholdo, L Z Granville, L M R Arbiza, F Carbone, M Marotta, J J C De Santanna. Internet of things in healthcare: Interoperability and security issues. IEEE International Conference on Communications (ICC). 2012: 6121-6125. [3] S Subhashini, V kavitha. A Survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 2011; 34(1): 1-11. [4] K Ragab, T Ono, N Kaji, K Mori. An Efficient Communication Technology for Autonomous Decentralized Community Information System. IEEE ISADS. 2003; [5] M Rajesh, JM Gnanasekar. Congestion control scheme for Heterogeneous Wireless Ad Hoc Networks using self-adjust hybrid model. International Journal of Pure and Applied Mathematics. 2017; 116(21): 519-536. [6] K Mori. Autonomous Decentralized Systems: Concept, Data Field Architecture and Future Trends. 1st Int. Sym. On ADS, (ISADS '93), IEEE. 1993: 28-34, [7] OMNet++: https://www.omnetpp.org/; Accesed 13th December 2017. [8] MatplotLib: https://matplotlib.org/; Accesed 12th April 2018. [9] Paul D H Hines, Seth Blumsack, Markus Schlapfer. Centralized vs Decentralized Infrastructure Networks; arXiv preprint; 1510.08792; 2015. [10] Zhuang SQ, Zhao BY, Joseph AD, Katz RH, Kubiatowicz JD. Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination. 11th International Workshop on Network and operating systems support for digital audio and video, ACM. 2001: 11-20. [11] Ingham, David B, Fabio Panzieri, and Santosh K Shrivastava. Constructing dependable Web services. Advances in Distributed Systems, Springer. 2000: 277-294. [12] Jung, Jaeyeon, Balachander Krishnamurthy, Michael Rabinovich. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites. 11th international conference on World Wide Web, ACM. 2002: 293-304. [13] Costa, Paolo. Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE Journal on selected areas in communications. 2008; 26(5): 784-760. [14] Paul D H Hines, Seth Blumsack, Markus Schlapfer. When are decentralized infrastructure networks preferable to centralized ones. 50th Hawaii International Conference on System Science. 2017: 3241-3250. [15] S Chan, R Donner, S Lรคmmer. Urban road networksโ€“spatial networks with universal geometric features ?. The European Physical Journal B. 2011; 84(4): 563โ€“577. [16] Bashan, Y Berezin, S V Buldyrev, S Havlin. The extreme vulnerability of interdependent spatially embedded networks. Nature Physics. 2013; 9(10): 667-672. [17] L G Roberts. Beyond Mooreโ€™s law: Internet growth trend. IEEE Computer. 2000; 33(1): 117-119 [18] Selivanov, A, Fradkov, A, Fridman, E. Passification-based decentralized adaptive synchronization of dynamical networks with time-varying delays. Journal of the Franklin Institute; 2015; 352(1): 52-72. [19] Mehmeti, F, Spyropoulos, T Performance analysis of mobile data offloading in heterogeneous networks. IEEE Transactions on Mobile Computing; 2017; 16(2): 482-497. [20] Mori, K Trend of autonomous decentralized systems. Distributed Computing Systems, 10th IEEE International Workshop on Future Trends; 2004; 213-216. [21] R Subramanyan, J M Alonso, J B Fortes. A scalable SNMP-based distributed monitoring system for heterogeneous network computing. ACM/IEEE Conference on Supercomputing; 2000; 14. [22] Jegan Govindasamy, Samundiswamry Punniakody. A comparative study of Reactive, Proactive and Hybrid Routing Protocol in Wireless Sensor Network under wormhole attack. Journal of Electrical Systems and Information Technology. 2017. [23] M E Coimbra, M Selimi, A P Francisco, F Freitag, L Veiga. Gelly-scheduling: Distributed Graph processing for service placement in community networks. 33rd Annual ACM Symposium on Applied Computing; 2018; 151-160. [24] Hao Yin, Dongchao Guo, Kai Wang. Hyperconnected Network: A Decentralized Trust Computing and Networking Paradigm. IEEE Network; 32(1): 112-117. [25] H Banerjee, S Murugaanandam, V Ganapathy. Low-Energy Aware Routing Mechanism for Wireless Sensor Networks. International Journal of Engineering Research in Computer Science & Engineering (IJERCSE); 2018; 5(1): 112-117. [26] S Murugaanandam, K Sundaran, V Ganapathy. Comparison of cluster based Routing Protocols in Wireless Sensor Network: A Recent Survey. International Journal of Pure and applied Mathematics; 2016; 114(7): 559-571.