SlideShare a Scribd company logo
1 of 9
Download to read offline
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
67 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes
T.Augusty Chandija Lincy1
and Mrs D.Regi Timna2
1
PG Scholar, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India.
2
Assistant Professor, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India.
Email: lincythavasiraj@gmail.com1
and regitimna@gmail.com2
Article Received: 30 December 2017 Article Accepted: 29 March 2018 Article Published: 31 May 2018
1. INTRODUCTION
Cognitive Radio networks can change its parameters by the sensing of the spectrum. It determines the vacant bands,
and makes use of these available bands in an opportunistic manner, improving the overall spectrum utilization.
With these capabilities, cognitive radio can operate in licensed as well as unlicensed bands. In licensed bands
wireless users with a specific license to communicate over the allocated band (PUs) [1], have the priority to access
the channel. In the Cognitive Radio Network Sensing-based Spectrum sharing is used but there are many types of
radio network. In the Spectrum Sensing that there will be a First the Primary users detect the licensed spectrum and
the time allocated for the licensed spectrum. There is also a another positive approach that during the spectrum
analysis there will be energy harvested during the transformation of spectrum from one node to another.
Section 2, the Identification of problems formulation related to the existing methods. Section 3 presents detailed
description of proposed techniques for solving plant related issue. Experiment results and discussions are described
in Section 4. Finally, the conclusion and further enhanced are given in Section 5.
PROBLEM DESCRIPTION AND PREVIOUS WORK
In the DSA Networks paper the cooperative spectrum sensing is used in a distributed DSA network under SSDF
attack. In the proposed system. The trust models used here is Beta distribution and Dirichlet distribution. Beta
distribution which assigns the trust values to the neighbor nodes at in a different time slots. Dirichlet distribution is
able to incorporate uncertainty in the trust values. But It is not linearly separable. In the DSS network the only
efficient spectrum is used here [2-12]. In this models is to share their licensed spectrum or is to reallocate other
spectrum in the allotted bands. In the Adaptive modulation schemes is to enable coexistence, interference
mitigation, Frequency, space, time cognizant protocols But It Should embrace more dynamic models of spectrum
ABSTRACT
Collaborative spectrum sensing (CSS) was visualize to improve the reliability of spectrum sensing in centralized cognitive radio networks (CRNs). A
popular attack in Collaborative Spectrum Sensing is the called spectrum sensing data falsification (SSDF) attack. There will be a punishment strategy
which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and
honest sensing activities. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the
retribution factor are introduced to give SUs to given in positive and honest sensing activities. Harvesting energy from ubiquitous radio frequency
(RF) signals in urban area is environmentally friendly and self-sustaining. Here Proposed a threshold-based framework for optimal spectral access
strategy and show that the threshold is optimal and traffic-dependent. The proposed threshold-based strategy takes into account both the spectral
access and energy harvesting opportunities provided by a particular traffic application. Also an iterative algorithm is used that selects a threshold
which maximizes the SU transmission opportunity subject to the overall harvested energy budget. Further, we illustrate the effects of different
Harvesting energy for the Primary users and the illerate algorithm is used here.
Keywords: Collaborative spectrum sensing, spectrum sensing data falsification, Fusion centre, Malicious Users, Secondary Users, Radio frequency.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
68 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
sharing. A Bayesian inference model based on propose of two reliability models: an optimistic one for a normal
system and a conservative one for a mission critical system.
The main advantage is Reliability may be caused by temporal But it has no strict convergence on the decision
reliability is achieved. In the spectrum sharing, a spatial separation region is defined around primary users to
protect them from secondary user induced interference [13-28]. This protection region called as an exclusion zone
or a protection zone . EZs are the primary ex-ante spectrum enforcement method used by regulators to protect the
incumbents from SU-induced interference. The concept of Multitiered Incumbent Protection Zones
2. PROBLEM IDENTIFICATION AND SOLUTION
2.1. Introduction
Keeping in mind the end goal to recognize and shield against the confused assault conduct of vindictive clients all
the more successfully and quickly [29-33], this paper proposes a novel notoriety based security instrument. In the
instrument, each SU is assigned a persistently refreshed thorough notoriety (CR) esteem by the FC as per its
announced detecting information.
Fig 1. Block diagram of proposed work
The CR esteem assesses the unwavering quality and accuracy of the individual client's detecting information sent to
the FC. Higher notoriety implies that the client's detecting information in the past are more helpful for the FC to
settle on the privilege worldwide choices. The CR esteem is an imperative reference in the following detecting
round. The far reaching notoriety fundamentally considers four affecting components of client dependability,
including current unwavering quality, authentic notoriety, remunerate factor and discipline factor. A malevolent
client gets low notoriety and combination weight because of submitting distorted detecting information, and the FC
debilitates its unsafe impact during the time spent information combination or straightforwardly disregards its
detecting comes about. The far reaching notoriety sufficiently measures and mirrors the unwavering quality of
individual detecting comes about for subjective clients in a suitable time scale and is always showed signs of
change and refreshed.
CRN
FORMATION
COLLABORAT
IVE
SPECTRUM
SENSING AND
HYPOTHESIS
REPORT
GENERATION
REPUTATION
BASED CLUSTERING
TRUST AND
PENALTY
VALUE
UPDATIONN
PERFORMANCE
EVALALUATION
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
69 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
2.2. Historical reputation
The notoriety is the subjective likelihood forecast of the subject concerning whether the question can finish a
specific cooperative movement accurately and non-devastatingly, and recorded detecting conduct mirrors the
dependability variety of intellectual clients. With a specific end goal to feature the recorded conduct of SUs in the
part of notoriety assessment, we present the chronicled notoriety.
2.3. Punishment Strategy
Since security has assumed a noteworthy part in CRNs, various research works have chiefly centered around
assault identification in view of discovery likelihood, yet few of them took the punishment of assaults into thought
and dismissed how to execute successful correctional methodologies against assailants
2.4. Penalty factor
The punishment scheme follows a habit of human society, that is the initial criminal punishment is light, and the
cumulative crime will be punished heavily. Therefore, the greater the threat is, the more serious of a punishment
should be imposed.
2.5. Harvested energy budget
We accept that SU shrewdly gets to a PU channel. Other than conventional data decoder (ID), each SU is furnished
with a RF vitality gatherer (EH) that can separate DC control from the got electromagnetic waves
3. RESULT AND DISCUSSION
Fig 2: CRN FORMATION
Fig 2 Node Deployment: shows that 71 nodes were created and node deployed at the area of 1700 1700 which has
simulation time of 55 seconds. Thus network was created in cognitive radios.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
70 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Fig 3: Separation of primary users and secondary users
Fig 3 shows that node 42 represents the fusion centre which decides the availability of spectrum in accordance with
the free bands in both primary and secondary users. In this dark blue color nodes comprises a single group of
primary users. The remaining nodes forms seven individual group of secondary users.
Fig 4: Initialization of trust value
Fig 4. This shows that the trust value is set to be 0.5. The nodes which have this trust value forms a group which
belongs to the fusion centre. Rather nodes will be considered as a malicious users.
Fig 5: Intragroup communication
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
71 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Fig 5 Based on the grouping of nodes there will be a colouring occurs. So that there will be a intragroup
Communication Occurs and there will be a fusion centre act as a base station. So that there will be a
Communication occurs between the nodes.
Fig 6: Starts spectrum sensing
Fig 6 shows that trust values are assigned to all the nodes as 0.5; Intragroup communication has been done between
the users and starts spectrum sensing.
Fig 7 : Assigning source and destination
Fig 7 shows that the transmission starts between primary users thereby assigning source node as 48 and destination
node as 43 and it is changeable for each and every primary users in order to data transmit. At the same time
secondary users sends its spectrum sensing to the fusion centre.
Fig 8: Transmission between primary users
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
72 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Fig 8 shows that the primary user detects the free space and assign the source and destination for the second time for
52 and 44 nodes.
Fig 9: SSDF attacker
Fig 9 shows that the trust value updation for every node and based on the updation the reward and penalty factor is
assigned. Based on the penalty factor the SSDF attacker node is identified
3.1. SIMULATION GRAPHS
Fig 10: False alarm probability
Fig 11: detection performance
Fig 10 shows the false alarm probability. The always opposite attack strategy refers to the attack mode that MUs
report after reversing the local decision result. Figures present the cooperative sensing performance under SSDF
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
73 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
attack. The horizontal axis accounts for the proportion of malicious users. The vertical axis in Figure represents the
global false alarm probability Qf , and the vertical axis in Figure represents the global misdetection probability Qm.
It can be seen from the Figures, when there is no malicious users in the network, the optimal sensing performance
can be achieved if K cognitive users are reliable nodes.
Fig 11 shows the detection performance. The detection performance , in which K - N0 RNs participate in the
collaboration, is inferior. The detection performance of the scheme with no reputation mechanism dropped
dramatically under the AO attack pattern, which means it is indispensable for CRNs to adopt a necessary and
effective security mechanism to defend against various types of spiteful attack behaviors. When the number of
MUs exceeds half of all cognitive users, the sensing performance is even worse than that of random guessing. The
proposed system achieve the equivalent performance of K - N0 reliable nodes, meaning that they can availably
identify the malicious SUs and eliminate their harmful effects via only using reliable reported results for fusion
decision making.
4. CONCLUSION
Generally trust is defined as a belief level that one sensor node puts on another node for a specific action according
to previous observation of behaviors. That is, the trust value is used to reflect whether a sensor node is willing and
able to act normally in WSNs. In this paper, a trust value ranges from 0 to 1. A value of 1 means completely
trustworthy and 0 means the opposite. In future we will consider recommendation trust, direct trust and indirect
trust models for further calculating SSDF attack efficiently. Direct trust is a kind of trust calculated based on the
direct communication behaviors. It reflects the trust relationship between two neighbor nodes. Recommendation
trust is defined as the calculation of trust based on recommendations from neighbor nodes. An efficient mechanism
is used to filter the recommendation information. The filtered reliable recommendations are calculated as the
recommendation trust. The indirect trust value is gained based on the recommendations from other nodes.
ACKNOLEDGEMENT
This work was supported in part by Department of Science & Technology (DST), FIST Program at Francis Xavier
Engineering College, Tirunelveli, Tamilnadu, India.
REFERENCES
[1] Muthukumaran. N and Ravi. R, 'Hardware Implementation of Architecture Techniques for Fast Efficient loss less Image
Compression System', Wireless Personal Communications, Volume. 90, No. 3, pp. 1291-1315, October 2016, SPRINGER.
[2] Muthukumaran. N and Ravi. R, 'The Performance Analysis of Fast Efficient Lossless Satellite Image Compression and
Decompression for Wavelet Based Algorithm', Wireless Personal Communications, Volume. 81, No. 2, pp. 839-859, March 2015,
SPRINGER.
[3] K. Khoshelham, C. Nardinocchi, E. Frontoni, A. Mancini, and P. Zingaretti, “Performance evaluation of automated approaches to
building detection in multi-source aerial data,” ISPRS Int. J. Photogramm. RemoteSens., vol. 65, no. 2010, pp. 123–133, Jan. 2010.
[4] Muthukumaran. N and Ravi. R, 'VLSI Implementations of Compressive Image Acquisition using Block Based Compression
Algorithm', The International Arab Journal of Information Technology, vol. 12, no. 4, pp. 333-339, July 2015.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
74 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
[5] Anil Lamba, "Uses Of Cluster Computing Techniques To Perform Big Data Analytics For Smart Grid Automation System",
International Journal for Technological Research in Engineering, Volume 1 Issue 7, pp.5804-5808, 2014.
[6] Anil Lamba, “Uses Of Different Cyber Security Service To Prevent Attack On Smart Home Infrastructure", International Journal
for Technological Research in Engineering, Volume 1, Issue 11, pp.5809-5813, 2014.
[7] Anil Lamba, "A Role Of Data Mining Analysis To Identify Suspicious Activity Alert System”, International Journal for
Technological Research in Engineering, Volume 2 Issue 3, pp.5814-5825, 2014.
[8] Anil Lamba, "To Classify Cyber-Security Threats In Automotive Doming Using Different Assessment Methodologies”,
International Journal for Technological Research in Engineering, Volume 3, Issue 3, pp.5831-5836, 2015.
[9] Anil Lamba, “A Study Paper On Security Related Issue Before Adopting Cloud Computing Service Model”, International Journal
for Technological Research in Engineering, Volume 3, Issue 4, pp.5837-5840, 2015.
[10] Muthukumaran. N and Ravi. R, 'Simulation Based VLSI Implementation of Fast Efficient Lossless Image Compression System
using Simplified Adjusted Binary Code & Golumb Rice Code', World Academy of Science, Engineering and Technology,
Volume. 8, No. 9, pp.1603-1606, 2014.
[11] Ruban Kingston. M,Muthukumaran. and N, Ravi. R, 'A Novel Scheme of CMOS VCO Design with reduce number of Transistors
using 180nm CAD Tool', International Journal of Applied Engineering Research, Volume. 10, No. 14, pp. 11934-11938, 2015.
[12] Muthukumaran. N and Ravi. R, 'Design and analysis of VLSI based FELICS Algorithm for lossless Image Compression',
International Journal of Advanced Research in Technology, Vol. 2, No. 3, pp. 115-119, March 2012.
[13] Manoj Kumar. B and Muthukumaran. N, 'Design of Low power high Speed CASCADED Double Tail Comparator', International
Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2, No. 4, pp.18-22, June 2016.
[14] Anil Lamba, "Uses Of Artificial Intelligent Techniques To Build Accurate Models For Intrusion Detection System”, International
Journal for Technological Research in Engineering, Volume 2, Issue 12, pp.5826-5830, 2015.
[15] Anil Lamba, "Mitigating Zero-Day Attacks In IOT Using A Strategic Framework", International Journal for Technological
Research in Engineering, Volume 4, Issue 1, pp.5711-5714, 2016.
[16] Anil Lamba, "Identifying & Mitigating Cyber Security Threats In Vehicular Technologies", International Journal for
Technological Research in Engineering, Volume 3, Issue 7, pp.5703-5706, 2016.
[17] Anil Lamba, "S4: A Novel & Secure Method For Enforcing Privacy In Cloud Data Warehouses", International Journal for
Technological Research in Engineering, Volume 3, Issue 8, pp.5707-5710, 2016.
[18] Anil Lamba, “Cyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing)”, Cikitusi Journal
for Multidisciplinary Research, Volume 1, Issue 2, July - December, pp.64-71, 2014.
[19] N. Muthukumaran, 'Analyzing Throughput of MANET with Reduced Packet Loss', Wireless Personal Communications, Vol. 97,
No. 1, pp. 565-578, November 2017, SPRINGER.
[20] P.Venkateswari, E.Jebitha Steffy, Dr. N. Muthukumaran, 'License Plate cognizance by Ocular Character Perception', International
Research Journal of Engineering and Technology, Vol. 5, No. 2, pp. 536-542, February 2018.
[21] N. Muthukumaran, Mrs R.Sonya, Dr.Rajashekhara and Chitra V, 'Computation of Optimum ATC Using Generator Participation
Factor in Deregulated System', International Journal of Advanced Research Trends in Engineering and Technology, Vol. 4, No. 1,
pp. 8-11, January 2017.
[22] Ms. A. Aruna, Ms.Y.Bibisha Mol, Ms.G.Delcy, Dr. N. Muthukumaran, 'Arduino Powered Obstacles Avoidance for Visually
Impaired Person', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 101-106, April 2018.
[23] Mrs. S. Murine Sharmili, Dr. N. Muthukumaran, 'Performance Analysis of Elevation & Building Contours Image using K-Mean
Clustering with Mathematical Morphology and SVM', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 80-85,
April 2018.
[24] Keziah. J, Muthukumaran. N, 'Design of K Band Transmitting Antenna for Harbor Surveillance Radar Application', International
Journal on Applications in Electrical and Electronics Engineering, Vol. 2, No. 5, pp. 16-20, May 2016.
[25] B.Renuka, B.Sivaranjani, A.Maha Lakshmi, Dr. N. Muthukumaran, 'Automatic Enemy Detecting Defense Robot by using Face
Detection Technique', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 495-501, April 2018.
Indo-Iranian Journal of Scientific Research (IIJSR)
Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018
75 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
[26] Ms.Mary Varsha Peter, Ms.V.Priya, Ms.H.Petchammal, Dr. N. Muthukumaran, 'Finger Print Based Smart Voting System', Asian
Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 357-361, April 2018.
[27] Anil Lamba, “A Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystems”, International Journal
of Current Engineering and Scientific Research (IJCESR), Volume-1, Issue-3, pp.48-55, 2014.
[28] Anil Lamba, “Analysing Sanitization Technique of Reverse Proxy Framework for Enhancing Database-Security”, International
Journal of Information and Computing Science, Volume 1, Issue 1, pp.30-44, 2014.
[29] Anil Lamba, “Enhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theory”, International
Journal of Advanced in Management, Technology and Engineering Sciences, Volume III, Issue I, pp.71-82, 2013.
[30] Anil Lamba, “Resolve Security Policies Conflicts Through Semantics Matching Alignment”, International Journal of Scientific
Research and Review, Volume 2, Issue 2, pp.43-58, 2013.
[31] Anil Lamba, “A Detailed Analysis of Data Security in a cloud Environment”, SURAJ PUNJ Journal for Multidisciplinary
Research, Volume 3, Issue 2, pp.43-51, 2013.
[32] Muthukumaran. N and Ravi. R, 'Quad Tree Decomposition based Analysis of Compressed Image Data Communication for Lossy
and Lossless using WSN', World Academy of Science, Engineering and Technology, Volume. 8, No. 9, pp. 1543-1549, 2014.
[33] O. Ok, “Automated detection of buildings from single VHR multi spectral images using shadow information and graph cuts,”
ISPRS Int. J.Photogram. Remote Sens., vol. 86, no. 12, pp. 21–40, Sep. 2013.

More Related Content

What's hot

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hackingijtsrd
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Secure routing path using trust values for
Secure routing path using trust values forSecure routing path using trust values for
Secure routing path using trust values forijcisjournal
 
Maximize resource utilization based channel access model with presence of re...
Maximize resource utilization based channel access model  with presence of re...Maximize resource utilization based channel access model  with presence of re...
Maximize resource utilization based channel access model with presence of re...IJECEIAES
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429IJRAT
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
 

What's hot (20)

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hacking
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Secure routing path using trust values for
Secure routing path using trust values forSecure routing path using trust values for
Secure routing path using trust values for
 
Maximize resource utilization based channel access model with presence of re...
Maximize resource utilization based channel access model  with presence of re...Maximize resource utilization based channel access model  with presence of re...
Maximize resource utilization based channel access model with presence of re...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 

Similar to Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes

A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
 
Signal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A ReviewSignal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A ReviewIRJET Journal
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...IRJET Journal
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...ijtsrd
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Analysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An AssessmentAnalysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An Assessmentijtsrd
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFOrahulmonikasharma
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networksijtsrd
 
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...rahulmonikasharma
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection systemiaemedu
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 

Similar to Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes (20)

A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Signal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A ReviewSignal Classification and Identification for Cognitive Radio: A Review
Signal Classification and Identification for Cognitive Radio: A Review
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
Performance Analysis of Sensor Node Energy in Wireless Sensor Networks A Pers...
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Analysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An AssessmentAnalysis of Energy in Wireless Sensor Networks An Assessment
Analysis of Energy in Wireless Sensor Networks An Assessment
 
Energy Consumption Minimization in WSN using BFO
 Energy Consumption Minimization in WSN using BFO Energy Consumption Minimization in WSN using BFO
Energy Consumption Minimization in WSN using BFO
 
A Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor NetworksA Study on Security in Wireless Sensor Networks
A Study on Security in Wireless Sensor Networks
 
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
Performance Analysis of Cognitive Radio Networks (IEEE 802.22) for Various Ne...
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 

More from Associate Professor in VSB Coimbatore

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Associate Professor in VSB Coimbatore
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Associate Professor in VSB Coimbatore
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Associate Professor in VSB Coimbatore
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionAssociate Professor in VSB Coimbatore
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Associate Professor in VSB Coimbatore
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...Associate Professor in VSB Coimbatore
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...Associate Professor in VSB Coimbatore
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Associate Professor in VSB Coimbatore
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Associate Professor in VSB Coimbatore
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Associate Professor in VSB Coimbatore
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Associate Professor in VSB Coimbatore
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Associate Professor in VSB Coimbatore
 

More from Associate Professor in VSB Coimbatore (20)

Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhoja’s Son and His Role in National Liberation Movements of ...
 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
 
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Roses’ Perfume Manufacturing Process by Using Work Study ...
 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee Retention
 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...
 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...
 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
 
Mass & Quark Symmetry
Mass & Quark SymmetryMass & Quark Symmetry
Mass & Quark Symmetry
 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes

  • 1. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 67 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes T.Augusty Chandija Lincy1 and Mrs D.Regi Timna2 1 PG Scholar, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India. 2 Assistant Professor, Department of Electronics and Communication Engineering, Francis Xavier Engineering College, Tirunelveli, India. Email: lincythavasiraj@gmail.com1 and regitimna@gmail.com2 Article Received: 30 December 2017 Article Accepted: 29 March 2018 Article Published: 31 May 2018 1. INTRODUCTION Cognitive Radio networks can change its parameters by the sensing of the spectrum. It determines the vacant bands, and makes use of these available bands in an opportunistic manner, improving the overall spectrum utilization. With these capabilities, cognitive radio can operate in licensed as well as unlicensed bands. In licensed bands wireless users with a specific license to communicate over the allocated band (PUs) [1], have the priority to access the channel. In the Cognitive Radio Network Sensing-based Spectrum sharing is used but there are many types of radio network. In the Spectrum Sensing that there will be a First the Primary users detect the licensed spectrum and the time allocated for the licensed spectrum. There is also a another positive approach that during the spectrum analysis there will be energy harvested during the transformation of spectrum from one node to another. Section 2, the Identification of problems formulation related to the existing methods. Section 3 presents detailed description of proposed techniques for solving plant related issue. Experiment results and discussions are described in Section 4. Finally, the conclusion and further enhanced are given in Section 5. PROBLEM DESCRIPTION AND PREVIOUS WORK In the DSA Networks paper the cooperative spectrum sensing is used in a distributed DSA network under SSDF attack. In the proposed system. The trust models used here is Beta distribution and Dirichlet distribution. Beta distribution which assigns the trust values to the neighbor nodes at in a different time slots. Dirichlet distribution is able to incorporate uncertainty in the trust values. But It is not linearly separable. In the DSS network the only efficient spectrum is used here [2-12]. In this models is to share their licensed spectrum or is to reallocate other spectrum in the allotted bands. In the Adaptive modulation schemes is to enable coexistence, interference mitigation, Frequency, space, time cognizant protocols But It Should embrace more dynamic models of spectrum ABSTRACT Collaborative spectrum sensing (CSS) was visualize to improve the reliability of spectrum sensing in centralized cognitive radio networks (CRNs). A popular attack in Collaborative Spectrum Sensing is the called spectrum sensing data falsification (SSDF) attack. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and honest sensing activities. There will be a punishment strategy which is present to see the reputation method, in which the honour factor and the retribution factor are introduced to give SUs to given in positive and honest sensing activities. Harvesting energy from ubiquitous radio frequency (RF) signals in urban area is environmentally friendly and self-sustaining. Here Proposed a threshold-based framework for optimal spectral access strategy and show that the threshold is optimal and traffic-dependent. The proposed threshold-based strategy takes into account both the spectral access and energy harvesting opportunities provided by a particular traffic application. Also an iterative algorithm is used that selects a threshold which maximizes the SU transmission opportunity subject to the overall harvested energy budget. Further, we illustrate the effects of different Harvesting energy for the Primary users and the illerate algorithm is used here. Keywords: Collaborative spectrum sensing, spectrum sensing data falsification, Fusion centre, Malicious Users, Secondary Users, Radio frequency.
  • 2. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 68 | P a g e ISSN: 2581-4362 Website: www.iijsr.com sharing. A Bayesian inference model based on propose of two reliability models: an optimistic one for a normal system and a conservative one for a mission critical system. The main advantage is Reliability may be caused by temporal But it has no strict convergence on the decision reliability is achieved. In the spectrum sharing, a spatial separation region is defined around primary users to protect them from secondary user induced interference [13-28]. This protection region called as an exclusion zone or a protection zone . EZs are the primary ex-ante spectrum enforcement method used by regulators to protect the incumbents from SU-induced interference. The concept of Multitiered Incumbent Protection Zones 2. PROBLEM IDENTIFICATION AND SOLUTION 2.1. Introduction Keeping in mind the end goal to recognize and shield against the confused assault conduct of vindictive clients all the more successfully and quickly [29-33], this paper proposes a novel notoriety based security instrument. In the instrument, each SU is assigned a persistently refreshed thorough notoriety (CR) esteem by the FC as per its announced detecting information. Fig 1. Block diagram of proposed work The CR esteem assesses the unwavering quality and accuracy of the individual client's detecting information sent to the FC. Higher notoriety implies that the client's detecting information in the past are more helpful for the FC to settle on the privilege worldwide choices. The CR esteem is an imperative reference in the following detecting round. The far reaching notoriety fundamentally considers four affecting components of client dependability, including current unwavering quality, authentic notoriety, remunerate factor and discipline factor. A malevolent client gets low notoriety and combination weight because of submitting distorted detecting information, and the FC debilitates its unsafe impact during the time spent information combination or straightforwardly disregards its detecting comes about. The far reaching notoriety sufficiently measures and mirrors the unwavering quality of individual detecting comes about for subjective clients in a suitable time scale and is always showed signs of change and refreshed. CRN FORMATION COLLABORAT IVE SPECTRUM SENSING AND HYPOTHESIS REPORT GENERATION REPUTATION BASED CLUSTERING TRUST AND PENALTY VALUE UPDATIONN PERFORMANCE EVALALUATION
  • 3. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 69 | P a g e ISSN: 2581-4362 Website: www.iijsr.com 2.2. Historical reputation The notoriety is the subjective likelihood forecast of the subject concerning whether the question can finish a specific cooperative movement accurately and non-devastatingly, and recorded detecting conduct mirrors the dependability variety of intellectual clients. With a specific end goal to feature the recorded conduct of SUs in the part of notoriety assessment, we present the chronicled notoriety. 2.3. Punishment Strategy Since security has assumed a noteworthy part in CRNs, various research works have chiefly centered around assault identification in view of discovery likelihood, yet few of them took the punishment of assaults into thought and dismissed how to execute successful correctional methodologies against assailants 2.4. Penalty factor The punishment scheme follows a habit of human society, that is the initial criminal punishment is light, and the cumulative crime will be punished heavily. Therefore, the greater the threat is, the more serious of a punishment should be imposed. 2.5. Harvested energy budget We accept that SU shrewdly gets to a PU channel. Other than conventional data decoder (ID), each SU is furnished with a RF vitality gatherer (EH) that can separate DC control from the got electromagnetic waves 3. RESULT AND DISCUSSION Fig 2: CRN FORMATION Fig 2 Node Deployment: shows that 71 nodes were created and node deployed at the area of 1700 1700 which has simulation time of 55 seconds. Thus network was created in cognitive radios.
  • 4. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 70 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Fig 3: Separation of primary users and secondary users Fig 3 shows that node 42 represents the fusion centre which decides the availability of spectrum in accordance with the free bands in both primary and secondary users. In this dark blue color nodes comprises a single group of primary users. The remaining nodes forms seven individual group of secondary users. Fig 4: Initialization of trust value Fig 4. This shows that the trust value is set to be 0.5. The nodes which have this trust value forms a group which belongs to the fusion centre. Rather nodes will be considered as a malicious users. Fig 5: Intragroup communication
  • 5. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 71 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Fig 5 Based on the grouping of nodes there will be a colouring occurs. So that there will be a intragroup Communication Occurs and there will be a fusion centre act as a base station. So that there will be a Communication occurs between the nodes. Fig 6: Starts spectrum sensing Fig 6 shows that trust values are assigned to all the nodes as 0.5; Intragroup communication has been done between the users and starts spectrum sensing. Fig 7 : Assigning source and destination Fig 7 shows that the transmission starts between primary users thereby assigning source node as 48 and destination node as 43 and it is changeable for each and every primary users in order to data transmit. At the same time secondary users sends its spectrum sensing to the fusion centre. Fig 8: Transmission between primary users
  • 6. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 72 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Fig 8 shows that the primary user detects the free space and assign the source and destination for the second time for 52 and 44 nodes. Fig 9: SSDF attacker Fig 9 shows that the trust value updation for every node and based on the updation the reward and penalty factor is assigned. Based on the penalty factor the SSDF attacker node is identified 3.1. SIMULATION GRAPHS Fig 10: False alarm probability Fig 11: detection performance Fig 10 shows the false alarm probability. The always opposite attack strategy refers to the attack mode that MUs report after reversing the local decision result. Figures present the cooperative sensing performance under SSDF
  • 7. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 73 | P a g e ISSN: 2581-4362 Website: www.iijsr.com attack. The horizontal axis accounts for the proportion of malicious users. The vertical axis in Figure represents the global false alarm probability Qf , and the vertical axis in Figure represents the global misdetection probability Qm. It can be seen from the Figures, when there is no malicious users in the network, the optimal sensing performance can be achieved if K cognitive users are reliable nodes. Fig 11 shows the detection performance. The detection performance , in which K - N0 RNs participate in the collaboration, is inferior. The detection performance of the scheme with no reputation mechanism dropped dramatically under the AO attack pattern, which means it is indispensable for CRNs to adopt a necessary and effective security mechanism to defend against various types of spiteful attack behaviors. When the number of MUs exceeds half of all cognitive users, the sensing performance is even worse than that of random guessing. The proposed system achieve the equivalent performance of K - N0 reliable nodes, meaning that they can availably identify the malicious SUs and eliminate their harmful effects via only using reliable reported results for fusion decision making. 4. CONCLUSION Generally trust is defined as a belief level that one sensor node puts on another node for a specific action according to previous observation of behaviors. That is, the trust value is used to reflect whether a sensor node is willing and able to act normally in WSNs. In this paper, a trust value ranges from 0 to 1. A value of 1 means completely trustworthy and 0 means the opposite. In future we will consider recommendation trust, direct trust and indirect trust models for further calculating SSDF attack efficiently. Direct trust is a kind of trust calculated based on the direct communication behaviors. It reflects the trust relationship between two neighbor nodes. Recommendation trust is defined as the calculation of trust based on recommendations from neighbor nodes. An efficient mechanism is used to filter the recommendation information. The filtered reliable recommendations are calculated as the recommendation trust. The indirect trust value is gained based on the recommendations from other nodes. ACKNOLEDGEMENT This work was supported in part by Department of Science & Technology (DST), FIST Program at Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India. REFERENCES [1] Muthukumaran. N and Ravi. R, 'Hardware Implementation of Architecture Techniques for Fast Efficient loss less Image Compression System', Wireless Personal Communications, Volume. 90, No. 3, pp. 1291-1315, October 2016, SPRINGER. [2] Muthukumaran. N and Ravi. R, 'The Performance Analysis of Fast Efficient Lossless Satellite Image Compression and Decompression for Wavelet Based Algorithm', Wireless Personal Communications, Volume. 81, No. 2, pp. 839-859, March 2015, SPRINGER. [3] K. Khoshelham, C. Nardinocchi, E. Frontoni, A. Mancini, and P. Zingaretti, “Performance evaluation of automated approaches to building detection in multi-source aerial data,” ISPRS Int. J. Photogramm. RemoteSens., vol. 65, no. 2010, pp. 123–133, Jan. 2010. [4] Muthukumaran. N and Ravi. R, 'VLSI Implementations of Compressive Image Acquisition using Block Based Compression Algorithm', The International Arab Journal of Information Technology, vol. 12, no. 4, pp. 333-339, July 2015.
  • 8. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 74 | P a g e ISSN: 2581-4362 Website: www.iijsr.com [5] Anil Lamba, "Uses Of Cluster Computing Techniques To Perform Big Data Analytics For Smart Grid Automation System", International Journal for Technological Research in Engineering, Volume 1 Issue 7, pp.5804-5808, 2014. [6] Anil Lamba, “Uses Of Different Cyber Security Service To Prevent Attack On Smart Home Infrastructure", International Journal for Technological Research in Engineering, Volume 1, Issue 11, pp.5809-5813, 2014. [7] Anil Lamba, "A Role Of Data Mining Analysis To Identify Suspicious Activity Alert System”, International Journal for Technological Research in Engineering, Volume 2 Issue 3, pp.5814-5825, 2014. [8] Anil Lamba, "To Classify Cyber-Security Threats In Automotive Doming Using Different Assessment Methodologies”, International Journal for Technological Research in Engineering, Volume 3, Issue 3, pp.5831-5836, 2015. [9] Anil Lamba, “A Study Paper On Security Related Issue Before Adopting Cloud Computing Service Model”, International Journal for Technological Research in Engineering, Volume 3, Issue 4, pp.5837-5840, 2015. [10] Muthukumaran. N and Ravi. R, 'Simulation Based VLSI Implementation of Fast Efficient Lossless Image Compression System using Simplified Adjusted Binary Code & Golumb Rice Code', World Academy of Science, Engineering and Technology, Volume. 8, No. 9, pp.1603-1606, 2014. [11] Ruban Kingston. M,Muthukumaran. and N, Ravi. R, 'A Novel Scheme of CMOS VCO Design with reduce number of Transistors using 180nm CAD Tool', International Journal of Applied Engineering Research, Volume. 10, No. 14, pp. 11934-11938, 2015. [12] Muthukumaran. N and Ravi. R, 'Design and analysis of VLSI based FELICS Algorithm for lossless Image Compression', International Journal of Advanced Research in Technology, Vol. 2, No. 3, pp. 115-119, March 2012. [13] Manoj Kumar. B and Muthukumaran. N, 'Design of Low power high Speed CASCADED Double Tail Comparator', International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2, No. 4, pp.18-22, June 2016. [14] Anil Lamba, "Uses Of Artificial Intelligent Techniques To Build Accurate Models For Intrusion Detection System”, International Journal for Technological Research in Engineering, Volume 2, Issue 12, pp.5826-5830, 2015. [15] Anil Lamba, "Mitigating Zero-Day Attacks In IOT Using A Strategic Framework", International Journal for Technological Research in Engineering, Volume 4, Issue 1, pp.5711-5714, 2016. [16] Anil Lamba, "Identifying & Mitigating Cyber Security Threats In Vehicular Technologies", International Journal for Technological Research in Engineering, Volume 3, Issue 7, pp.5703-5706, 2016. [17] Anil Lamba, "S4: A Novel & Secure Method For Enforcing Privacy In Cloud Data Warehouses", International Journal for Technological Research in Engineering, Volume 3, Issue 8, pp.5707-5710, 2016. [18] Anil Lamba, “Cyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing)”, Cikitusi Journal for Multidisciplinary Research, Volume 1, Issue 2, July - December, pp.64-71, 2014. [19] N. Muthukumaran, 'Analyzing Throughput of MANET with Reduced Packet Loss', Wireless Personal Communications, Vol. 97, No. 1, pp. 565-578, November 2017, SPRINGER. [20] P.Venkateswari, E.Jebitha Steffy, Dr. N. Muthukumaran, 'License Plate cognizance by Ocular Character Perception', International Research Journal of Engineering and Technology, Vol. 5, No. 2, pp. 536-542, February 2018. [21] N. Muthukumaran, Mrs R.Sonya, Dr.Rajashekhara and Chitra V, 'Computation of Optimum ATC Using Generator Participation Factor in Deregulated System', International Journal of Advanced Research Trends in Engineering and Technology, Vol. 4, No. 1, pp. 8-11, January 2017. [22] Ms. A. Aruna, Ms.Y.Bibisha Mol, Ms.G.Delcy, Dr. N. Muthukumaran, 'Arduino Powered Obstacles Avoidance for Visually Impaired Person', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 101-106, April 2018. [23] Mrs. S. Murine Sharmili, Dr. N. Muthukumaran, 'Performance Analysis of Elevation & Building Contours Image using K-Mean Clustering with Mathematical Morphology and SVM', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 80-85, April 2018. [24] Keziah. J, Muthukumaran. N, 'Design of K Band Transmitting Antenna for Harbor Surveillance Radar Application', International Journal on Applications in Electrical and Electronics Engineering, Vol. 2, No. 5, pp. 16-20, May 2016. [25] B.Renuka, B.Sivaranjani, A.Maha Lakshmi, Dr. N. Muthukumaran, 'Automatic Enemy Detecting Defense Robot by using Face Detection Technique', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 495-501, April 2018.
  • 9. Indo-Iranian Journal of Scientific Research (IIJSR) Peer-Reviewed Quarterly International Journal, Volume 2, Issue 2, Pages 67-75, April-June 2018 75 | P a g e ISSN: 2581-4362 Website: www.iijsr.com [26] Ms.Mary Varsha Peter, Ms.V.Priya, Ms.H.Petchammal, Dr. N. Muthukumaran, 'Finger Print Based Smart Voting System', Asian Journal of Applied Science and Technology, Vol. 2, No. 2, pp. 357-361, April 2018. [27] Anil Lamba, “A Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystems”, International Journal of Current Engineering and Scientific Research (IJCESR), Volume-1, Issue-3, pp.48-55, 2014. [28] Anil Lamba, “Analysing Sanitization Technique of Reverse Proxy Framework for Enhancing Database-Security”, International Journal of Information and Computing Science, Volume 1, Issue 1, pp.30-44, 2014. [29] Anil Lamba, “Enhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theory”, International Journal of Advanced in Management, Technology and Engineering Sciences, Volume III, Issue I, pp.71-82, 2013. [30] Anil Lamba, “Resolve Security Policies Conflicts Through Semantics Matching Alignment”, International Journal of Scientific Research and Review, Volume 2, Issue 2, pp.43-58, 2013. [31] Anil Lamba, “A Detailed Analysis of Data Security in a cloud Environment”, SURAJ PUNJ Journal for Multidisciplinary Research, Volume 3, Issue 2, pp.43-51, 2013. [32] Muthukumaran. N and Ravi. R, 'Quad Tree Decomposition based Analysis of Compressed Image Data Communication for Lossy and Lossless using WSN', World Academy of Science, Engineering and Technology, Volume. 8, No. 9, pp. 1543-1549, 2014. [33] O. Ok, “Automated detection of buildings from single VHR multi spectral images using shadow information and graph cuts,” ISPRS Int. J.Photogram. Remote Sens., vol. 86, no. 12, pp. 21–40, Sep. 2013.