Cognitive radio network’s primary challenge is sensing of primary user signal and efficiently handling the spectrum availability. Spectrum sensing is the way ahead and vital for Dynamic Spectrum Access, where malicious users deploy Spectrum Sensing Data Falsification (SSDF) attacks. This paper discusses the technique to calculate the importance of using nodes for primary as well as secondary users. It prevents spectrum problems to primary users from Spectrum Sensing Data Falsification by secondary us ers and also shields secondary users from unauthorized primary users. Simulation runs of the novel approach using usual network conditions and SSDF attacks greatly bought down the error rate of spectrum decision and at the same time improved the detection rate of malicious cognitive nodes.
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
The main objective of this project is to design an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. In this project, investigating blind sparsity order estimation (SOE) techniques is an open research issue. To address this, this project presents an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. Finally, this project propose a technique to estimate the sparsity order of the wideband spectrum with compressive measurements using the maximum eigenvalue of the measured signal's covariance matrix. .
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
The main objective of this project is to design an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. In this project, investigating blind sparsity order estimation (SOE) techniques is an open research issue. To address this, this project presents an eigenvalue-based compressive SOE technique using asymptotic random matrix theory. Finally, this project propose a technique to estimate the sparsity order of the wideband spectrum with compressive measurements using the maximum eigenvalue of the measured signal's covariance matrix. .
Mobile Adhoc Network (MANET) is a self-configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA's etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme.
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
Mobile Ad hoc network is an infrastructure less communication network with limited resources. To maintain virtual
infrastructure for communication broadcasting mechanisms is used. Due to lack of energy efficiency in Mobile Ad
hoc network, there is a need to develop an efficient broadcasting model which enhances energy efficiency. Also
nodes with malicious behaviour cause an internal threat that disobeys the standard and degrades the performance of
routing protocols. This paper introduced an enhanced rebroadcasting algorithm, where rebroadcasting decision for
next hop is immediate or delayed on the basis of trust value and energy level of particular node. This approach helps
to decrease number of rebroadcast, energy consumption and also enhances security. The decision is made with trust
value associated with node, their remaining energy and total number of uncovered nodes.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKSIJCNC Journal
The rapidly growing number of wireless devices running applications that require high bandwidths, has
resulted in increasing demands for the unlicensed frequency spectrum. Given the scarcity of allocated
unlicensed frequencies, meeting such demands can become a serious concern. Cognitive Radio (CR)
technology opens the door for the opportunistic use of the licensed spectrum to partially address the issues
relevant to the limited availability of unlicensed frequencies. Combining CR and Wi-Fi to form the socalled
White-Fi networks, has been proposed for achieving higher spectrum utilization. This article
discusses the spectrum sensing in White-Fi networks and the impacts that it has on the QoS of typical
applications. It also reports the analysis of such impacts through various simulation studies. Our results
demonstrate the advantages of an adaptive sensing strategy that is capable of changing the related
parameters based on QoS requirements. We also propose such a sensing strategy that can adapt to the
IEEE 802.11e requirements. The goal of the proposed strategy is the enhancement of the overall QoS of the
applications while maintaining efficient sensing of the spectrum. Simulation results of the scenarios that
implement the proposed mechanisms demonstrate noticeable QoS improvements compared to cases where
common sensing methods are utilized in IEEE802.11 networks.
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
With exponential rise in the internet applications and wireless communications, higher and efficient data transfer rates are required. Hence proper and effective spectrum is the need of the hour, As spectrum demand increases there are limited number of bands available to send and receive the data. Optimizing the use of these bands efficiently is one of the tedious tasks. Various techniques are used to send the data at same time, but for that we have to know which bands are free before sending the data. For this purpose various spectrum sensing approaches came with variety of solutions. In this paper the sensing problem is tackled with the use of hybrid spectrum sensing method, This new networking paradox uses the Centralized concept of spectrum sensing and creates one of the most trusted spectrums sensing mechanism. This proposed technique is simulated using MATLAB software.This paper also provides comparative study of various spectrum sensing methodologies.
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
In this proposed work a trust-based routing protocol is developed to route messages through the
highly trusted nodes to minimize the probability of dropping the messages. Thus improve the network
performance in terms of throughput and packet delivery ratio. The proposed design contains a novel secure
reactive routing protocol for Mobile ad hoc networks (MANETs), called TRIUMF (Trust-Based Routing
Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack). In the
proposed protocol trust among nodes is represented by trust value, which consists of cooperation score, direct
trust and indirect trust. The proposed trust routing allows controlled degree of selfishness to give an incentive to
the selfish nodes to declare its selfishness behavior to its neighbor nodes, which reduce the searching time of
misbehaving nodes to search for the malicious nodes only. In the proposed routing protocol two node-disjoint
routes between the source and destination nodes are selected based on their path trust values, one marked as
primary and the other as secondary. In this work both DLL-ACK and end- to-end TCP-ACK as monitoring
tools to monitor the behavior of routing path nodes: if the data packet successfully transmitted, then the path
nodes trust value are updated positively; otherwise, if a malicious behavior is detected then the path searching
tool starts to identify the malicious nodes and isolate them from the routing path and the network. Finally this
scheme reduces the searching time of malicious nodes, and the routing protocol avoids the isolated misbehaving
node from sharing in all future routes, which improves the overall network throughput.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
This documentation is on Routing in Wireless Sensor Networks. It deals majorly with two protocols, LEACH and Rumor Routing. Both the protocols were simulated in NS2 in the linux environment and have the images of the simulation.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
Maximize resource utilization based channel access model with presence of re...IJECEIAES
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
Performance evaluation of various cooperative spectrum sensing algorithms for...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
Mobile Ad hoc network is an infrastructure less communication network with limited resources. To maintain virtual
infrastructure for communication broadcasting mechanisms is used. Due to lack of energy efficiency in Mobile Ad
hoc network, there is a need to develop an efficient broadcasting model which enhances energy efficiency. Also
nodes with malicious behaviour cause an internal threat that disobeys the standard and degrades the performance of
routing protocols. This paper introduced an enhanced rebroadcasting algorithm, where rebroadcasting decision for
next hop is immediate or delayed on the basis of trust value and energy level of particular node. This approach helps
to decrease number of rebroadcast, energy consumption and also enhances security. The decision is made with trust
value associated with node, their remaining energy and total number of uncovered nodes.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
SPECTRUM SENSING STRATEGY TO ENHANCE THE QOS IN WHITE-FI NETWORKSIJCNC Journal
The rapidly growing number of wireless devices running applications that require high bandwidths, has
resulted in increasing demands for the unlicensed frequency spectrum. Given the scarcity of allocated
unlicensed frequencies, meeting such demands can become a serious concern. Cognitive Radio (CR)
technology opens the door for the opportunistic use of the licensed spectrum to partially address the issues
relevant to the limited availability of unlicensed frequencies. Combining CR and Wi-Fi to form the socalled
White-Fi networks, has been proposed for achieving higher spectrum utilization. This article
discusses the spectrum sensing in White-Fi networks and the impacts that it has on the QoS of typical
applications. It also reports the analysis of such impacts through various simulation studies. Our results
demonstrate the advantages of an adaptive sensing strategy that is capable of changing the related
parameters based on QoS requirements. We also propose such a sensing strategy that can adapt to the
IEEE 802.11e requirements. The goal of the proposed strategy is the enhancement of the overall QoS of the
applications while maintaining efficient sensing of the spectrum. Simulation results of the scenarios that
implement the proposed mechanisms demonstrate noticeable QoS improvements compared to cases where
common sensing methods are utilized in IEEE802.11 networks.
Hybrid Spectrum Sensing Method for Cognitive Radio IJECEIAES
With exponential rise in the internet applications and wireless communications, higher and efficient data transfer rates are required. Hence proper and effective spectrum is the need of the hour, As spectrum demand increases there are limited number of bands available to send and receive the data. Optimizing the use of these bands efficiently is one of the tedious tasks. Various techniques are used to send the data at same time, but for that we have to know which bands are free before sending the data. For this purpose various spectrum sensing approaches came with variety of solutions. In this paper the sensing problem is tackled with the use of hybrid spectrum sensing method, This new networking paradox uses the Centralized concept of spectrum sensing and creates one of the most trusted spectrums sensing mechanism. This proposed technique is simulated using MATLAB software.This paper also provides comparative study of various spectrum sensing methodologies.
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
In this proposed work a trust-based routing protocol is developed to route messages through the
highly trusted nodes to minimize the probability of dropping the messages. Thus improve the network
performance in terms of throughput and packet delivery ratio. The proposed design contains a novel secure
reactive routing protocol for Mobile ad hoc networks (MANETs), called TRIUMF (Trust-Based Routing
Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack). In the
proposed protocol trust among nodes is represented by trust value, which consists of cooperation score, direct
trust and indirect trust. The proposed trust routing allows controlled degree of selfishness to give an incentive to
the selfish nodes to declare its selfishness behavior to its neighbor nodes, which reduce the searching time of
misbehaving nodes to search for the malicious nodes only. In the proposed routing protocol two node-disjoint
routes between the source and destination nodes are selected based on their path trust values, one marked as
primary and the other as secondary. In this work both DLL-ACK and end- to-end TCP-ACK as monitoring
tools to monitor the behavior of routing path nodes: if the data packet successfully transmitted, then the path
nodes trust value are updated positively; otherwise, if a malicious behavior is detected then the path searching
tool starts to identify the malicious nodes and isolate them from the routing path and the network. Finally this
scheme reduces the searching time of malicious nodes, and the routing protocol avoids the isolated misbehaving
node from sharing in all future routes, which improves the overall network throughput.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATIONIAEME Publication
Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
This documentation is on Routing in Wireless Sensor Networks. It deals majorly with two protocols, LEACH and Rumor Routing. Both the protocols were simulated in NS2 in the linux environment and have the images of the simulation.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
A STUDY ON QUANTITATIVE PARAMETERS OF SPECTRUM HANDOFF IN COGNITIVE RADIO NET...ijwmn
The innovation of wireless technologies requires dynamic allocation of spectrum band in an efficient
manner. This has been achieved by Cognitive Radio (CR) networks which allow unlicensed users to make
use of free licensed spectrum, when the licensed users are kept away from that spectrum. The cognitive
radio makes decision, switching from primary user to secondary user and vice-versa, based on its built-in
interference engine. It allows secondary users to makes use of a channel based on its availability i.e. on the
absence of the primary user and they should vacate the channel once the primary user re-enters and
continue their communication on another available channel and this process in the cognitive radio is
known as spectrum mobility. The main objective of spectrum mobility is that, there is no interruption
caused due to the channel occupied by secondary users and maintains a good quality of service. In order to
achieve better spectrum mobility, it is mandatory to choose an effective spectrum handoff strategy with the
capability of predicting spectrum mobility. The handoff strategy with its parameters and its impact is an
important concept in spectrum mobility but fairly explored. In this paper an empirical study on quantitative
parameters involved in spectrum mobility prediction are discussed in detail. These parameters are studied
extensively because they play a vital role in the spectrum handoff process moreover the impact of these
parameters in various handoff methods can be used to predict the effectiveness of the system.
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...IJASRD Journal
Today increasing demand for the radio spectrum access due to many new wireless networks such Bluetooth, share it and so on. The radio spectrum is the part of the Electromagnetic spectrum with frequencies from 3 KHz to 300 GHz and these are generally used in Telecommunication. Existing method tells that in a Cognitive Radio network, secondary users can access unused licensed spectrum bands. The Collaborative spectrum sensing has been used for the sensing reports from Secondary User’s are sent to one or more decision making authorities to produce more reliable decisions on the spectrum usage. However, in the presence of misbehaving or malicious secondary users, the integrity of the reports sent by SUs needs to be assessed to avoid interference with Primary User’s. Our proposed is an efficiently accessing the spectrum sharing among primary users and secondary users. In this project, they consider a cognitive radio with the primary and secondary links. By using Cognitive Radio, the unlicensed spectrum uses the licensed channel for data transmission. The proposed Channel Side Information at the cognitive radio network is generally used to maintain which primary user channels are ideal and arranged them in a priority based queue. The proposed system uses the Spectrum Sharing algorithm which calculates the load of the information which transfers. It provides a power minimization allocation approach, low power consumption. Result show that the both spectrum sensing and data transmission/receiving functions.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
Abstract A cognitive radio network is considered as a key technology for future wireless communications. The motivation behind cognitive ra-dio is the effective usage of limited spectrum. Cognitive radio networks are designed to opportunistically exploit the underutilized or unused spectrum bands. Cognitive radio combines sensing, learning, and optimization algorithms to manage and adapt the radio sys-tem from the physical layer and up the communication stack. Spectrum Sensing, Spectrum Decision, Spectrum Mobility and Spectrum Sharing, are the four functionalities involved in Cognitive Radio Networks. This paper proposes a framework for data traffic man-agement by considering the QoS requirement of the secondary user and also the primary user activity. The Location information of the primary user in cognitive radio networks can be used to assist the communication among secondary users outside the transmission coverage area of primary users and also for tracking the primary user activities. The objective of the paper is to design a framework which will support the secondary user data transmission while considering the primary user activity and QoS requirement. Keywords- Cognitive Radio Networks, Primary User Activity, QoS management, Trusted Token Analyzer
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
A Mathematical Approach for Hidden Node Problem in Cognitive Radio NetworksTELKOMNIKA JOURNAL
Cognitive radio (CR) technology has emerged as a realistic solution to the spectrum scarcity
problem in present day wireless networks. A major challenge in CR radio networks is the hidden node
problem, which is the inability of the CR nodes to detect the primary user. This paper proposes energy
detector-based distributed sequential cooperative spectrum sensing over Nakagami-m fading, as a tool to
solve the hidden node problem. The derivation of energy detection performance over Nakagami-m fading
channel is presented. Since the observation represents a random variable, likelihood ratio test (LRT) is
known to be optimal in this type of detection problem. The LRT is implemented using the Neyman-Pearson
Criterion (maximizing the probability of detection but at a constraint of false alarm probability). The
performance of the proposed method has been evaluated both by numerical analysis and simulations. The
effect of cooperation among a group of CR nodes and system parameters such as SNR, detection
threshold and number of samples per CR nodes is investigated. Results show improved detection
performance by implementing the proposed model.
With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications. Data outsourcing: users are relieved from the burden of data storage and maintenance When users put their data (of large size) on the cloud, the data integrity protection is challenging enabling public audit for cloud data storage security is important Users can ask an external audit party to check the integrity of their outsourced data. Purpose of developing data security for data possession at un-trusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in input output costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the input output to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose. The Third Party Auditor is a respective person to manage the remote data in a global manner.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABILITY VERIFICATION (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 60 editor@iaeme.com
1. INTRODUCTION
Till date, predetermined spectrum bands are being allotted to service providers. This
approach resulted in unproductive spectrum consumption and as an alternative
cognitive radio networks was introduced. The network will allow cognitive radios,
labeled secondary unlicensed users (SUs) to choose the foremost licensed users or
primary users (PUs) bands when these bands are unoccupied by PUs. However the
SUs should vacate the band promptly following a Licensed User begins transmission
in the affiliated band [1]. Thus the main function of a cognitive radio is spectrum
sensing.
Spectrum sensing methods are mainly energy detection, cyclostationary feature
detection, and matched filter detection [2-4]. The functioning of spectrum sensing is
evaluated using probability of detection and probability of false alarm. Probability of
detection is the probability of confirming the occupancy of spectrum while the
licensed user is found. Probability of false alarm is the probability of confirming the
occupancy of spectrum while the licensed user has no broadcast. Among various
spectrum sensing strategies for easily determining the licensed spectrum reputation,
the energy detector method incurs quite a lower execution cost and as such is broadly
utilized. It serves as the optimum strategy to identify the signal carried by a primary
user whose place is obscure and also to realize the power of the obtained transmission
[6]. The trouble with this technique is that the obtained transmission power may be
significantly diminished at a specific geographic area because of multipath fading as
well as shadowing consequences [7]. In these conditions, it is complicated for a
secluded sensing device to differentiate around an idle band and faded one. To
conquer this issue, cooperative spectrum sensing techniques have been projected [5, 8,
9]. Anyhow, in cooperative sensing, because of imperfect network between a licensed
user and a secondary user (SU) or dishonest tendencies of a SU, a customer could
transmit false sensing outcome to the fusion hub. Thus, the efficiency of the method
degrades significantly. To conquer this concern, protected spectrum sensing become
suggested.
2. RELATED WORK
The concept of utilizing Beta Reputation System as reputation assessment system
projected in [10] is that a node’s capability in its spectrum sensing reputation is
exploited as a primary factor for computation of spectrum reports. The assumption
being made is that the Licensed User’s transmission range is sufficient to be obtained
by every node in the cognitive radio network (CRN) and the Secondary User base
station (SUBS), the controlling station of the CRN. It further assumes that the
Licensed User could interact with SUBS subjective to error reporting to the secondary
user base station about any impedance resulting from CRN procedure. As this
services considers that the Licensed User can't sell its unallocated spectrum bands,
hence generally there is no compensation for it to interact with the CRN. This
conversation could cost a Licensed User, extra hardware and/or system complexity,
merely just to notify the CRN about its communication interferences.
Spectrum sensing reports only in Licensed User’s coverage area should be
considered for spectrum decisions, and only those SUs prominence scores will be
updated. Moreover, the FCC stipulates, the CRN might use empty spectrum bands in
a non-interfering perspective eliminating the requirement of changes in Licensed
User. The work also does away with any mobility by SUs or PUs and proposes a
collaborative spectrum sensing strategy [11] taking into consideration Location
3. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 61 editor@iaeme.com
Reliability and Malicious Intent as reliability criteria. The Dempster-Shafer concept
of validation to analyze reliability of revealing secondary user nodes is used in this
work. The projected strategy assigns reliability values to various cells in each network
that can acquire exceptional stages of Licensed User’s signal because of the
consequence of multi-path, signal diminishing and additional considerations in the
radio environment. Spectrum sensing reports from SUs using Equal Gain Combining
and trust values assigned to their cells are both given equal importance for data
aggregation.
Figure 1 Adhoc CRN with Malicious Nodes
This strategy is based upon the factor that Licensed User’s interaction range is
hugely adequate to be obtained by the whole CRN and utilizes the spectrum sensing
assessments of every CRN nodes to achieve the ultimate spectrum decision. Authors
in [12] and [13] base their strategy on the factor that the transmitting range of
Licensed User is significant adequately to be obtained in the whole CRN [12] and
offer pre-filtering all reports to eliminate drastic spectrum sensing reports and a
simple strategy to compute spectrum sensing decisions. [13] presents the spectrum
sensing issue as an M-ary hypotheses screening difficulty and proposes a cluster-
based CRN where cluster heads acquire, process raw spectrum sensing information
and send it to the fusion center.
Concluding the basis of both the approaches is on the fact that PUs transmission
range is large enough for every node in the network to access; both approaches have
no practical application for a CRN having a Licensed User with smaller transmission
range than the size of the CRN.
3. DATA FALSIFICATION LENIENT SECURE SPECTRUM
SENSING BY NODE RELIABILITY VERIFICATION
The reliability of spectrum sensing (CSS) can be severely degraded by the falsified
spectrum sensing reports provided by malicious secondary users (SUs). In regard to
this a novel prominence state verification strategy (PSV) was introduced in our earlier
work. It is proven to be significant to identify the reliable neighbor nodes towards
spectrum sensing. The constraint of that model is that it verifies only the reliability of
the responders (neighbor nodes involved in spectrum sensing) by assuming that the
supplicant (secondary user that is initiating spectrum sensing) nodes are not
malicious, but in reality this is not true. A node can attempt to seek the spectrum
4. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 62 editor@iaeme.com
under malicious intention that it can infer the utilization of the spectrum by primary
user. This practice of attack on supplicant side would lead to severe interference
towards spectrum usage. The model devised here is intended to avoid the malicious
and selfish nodes from the act of spectrum sensing. A secondary user of CRN can
seek the response from its neighbor nodes under a malicious or selfish intention.
The possible attacks would be
By knowing the busy state of the spectrum, can attempt for an interference attack
(malicious intention).
By knowing the idle state of the spectrum, can engage that spectrum for future usage
(selfish intention)
The model devised in our earlier work verifies the reputation of the respondents
only. This verification is being enhanced such that any neighbor node verifies the
reputation state of the supplicant.
Reliability check technique is devoted to obtain the reliability through neighbors.
It executes a particular divergence test to offer the position with almost all the
processing neighbor secondary user position. Usual Deviance Test requires each and
every neighbor secondary user to authenticate accumulated reliability as well as its
solid reliability to attain a neighbor and avoid any oblique reliability that is isolated by
a specific quality A (the divergence roof). In Exclusive Divergence Test the outcome
is to obtain neighbor secondary user by focusing on the reliability of its neighbor
secondary user. The reliability of the neighbor nodes is checked and is concluded as
reliable if the value is greater than the threshold. This enables quick reliability
checking that is essential in our evaluated circumstances during which neighbor
secondary users don't get adequate time to notice the reliability of various neighbor
secondary users.
3.1. Assessing the Reliability of the Neighbor Secondary Users
A cognitive secondary user ssu, is a spectrum supplicant and nsu is the number of
neighbor secondary users to spectrum supplicant users ssu. The spectrum supplicant
measures the reliability of all its neighbor secondary users as shown in figure 2
Figure 2 Assessing Reliability of nodes
5. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 63 editor@iaeme.com
The reliability score ratio of neighbor node is given by
rc
nni
rs
nni
nni
rsr
(1)
The reliability state revision divergence ratio, which gives the discrepancy count
of secondary spectrum supplicants involved to generate reliability score rs is given by
rc
nni
rsudt
nni
nni
rsuds (2)
The reliability score update frequency of the neighbor node inn is given by
rc
nni
rsu
nni
nni
rsuf (3)
Where rc is the request count, rsu is the reliability update occurrence and rsudt is
reliability update discrepancy threshold.
The secondary spectrum supplicant ssu measures reliability score rss of each
neighbor node. Then supplicant node ssu considers the response from optimal
neighbor node towards spectrum sensing as secondary user. The optimal neighbor will
be selected based on their reliability score rs given by
nni
rsuf
nni
rsuds
nni
rsr
nni
rs (4)
3.2. Updating Reliability score
Upon completion of the spectrum sensing process, the spectrum supplicant ssu revises
the reliability score of the neighbor secondary user i
nsu that involved in spectrum
sensing act of ssu. The spectrum supplicant ssu fixes the reliability of the neighbor
secondary user nsui
as -1, 0 or 1.
If neighbor secondary user’s spectrum sensing act is efficient then reliability of the
nsui
will be revised as 1
insu
rs
insu
rs
If neighbor secondary user’s spectrum sensing act is suspicious but not generated any
obstacles during the process of spectrum sensing then reliability of the nsui
will be
revised as 0
insu
rs
insu
rs
If neighbor secondary user’s spectrum sensing act is malicious and generated
obstacles during the process of spectrum sensing then reliability of the nsui
will be
revised as 1
insu
rs
insu
rs
Further the spectrum supplicant ssu sends the message to neighbor secondary user
nsui
, which is regarding reliability update and is acknowledged by a blindfold
approach. In the attack prevention model the verification is being enhanced by
checking the reliability of the supplicant.
The supplicant node that requires spectrum sensing information selects respondent
node with utmost reputation then the cognitive radio nodes estimates mutual trust by
6. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 64 editor@iaeme.com
exchanging their reliability. The reliability of the supplicant nodes is determined by
the neighbor nodes. The most recent reliability score is given by the primary user
node that owns the spectrum used by the supplicant node as secondary user. Upon
finding the reliability is satisfactory the cognitive radio node sends the status of the
spectrum available. The score is updated by the primary nodes involved.
The reliability of the supplicant node ssu is measured as
rc
ssu
ruf
ssu
rc
ssu
rsudt
ssu
rc
ssu
rs
ssu
ssu
rs (5)
Where ssurc represent the request count, ssursudt represent the reliability score
update divergence threshold and ssuruf represents the reliability update frequency.
4. EMPIRICAL STUDY BY SIMULATION
The aim of the simulations is to analyze the relevance of prominence state verification
towards handling the Spectrum Sensing Data Falsification attacks in Spectrum state
verification process. The network is considered with 200 numbers of nodes with
divergent number of malicious and selfish nodes that ranges from 2% to 20%. The
characteristics and attributes are illustrated in table1. The constraint that we didn’t
consider is the impact of location consistency of secondary user, which is assumed to
be stable and consistent. The explored results are significantly confirming the
advantage of the proposal. The impact of the proposal was verified by comparing with
our earlier model devised.
Table1 Parameters and their values range used in simulations
Number of secondary users Range 18 to 180
scope of network region 1720 m × 540 m
Radio spectrum’s least cope 258 m
Channel count 43
Radio Frequency Model(each) 7 rps
Maximal load per each transmission 0.9 KB
Load assortment range 256 to 512 kb per second
raw data transfer under physical link 2.5 Mb per second
The main purpose of this model is to analyze the relevance of Data Falsification
Lenient Secure Spectrum Sensing (DFL) over the previous model which verifies the
reliability of the neighbor nodes only. Parameters used are inference lenient ratio and
spectrum utilization ratio.
Figure (3) shows the interference free spectrum utilization vs percentage of
malicious secondary users. The results in table 2 indicate that the reliability
verification of the supplicant secondary users increases the avoidance of inference
during spectrum utilization by secondary users. The average covariance of the
inference free spectrum utilization ratio observed is 0.12, which can conclude as the
advantage of proposal towards inference lenient spectrum sensing.
Figure (4) maps DFL against our previous model in spectrum utilization ratio. The
results indicate the maximal utilization of the spectrum by secondary users. The
proposed intent inference lenient model maximized the spectrum utilization, which is
7. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 65 editor@iaeme.com
due to significant avoidance of the selfish nodes as secondary users. The average
improved spectrum utilization ratio observed under proposed model is 0.341.
Figure 3 Interference Avoidance during Spectrum Sensing
The numerical values are tabulated in table 2.
Table 2 Comparison of PSASS and DFL with respect to Interference free spectrum utilization
Malicious
Nodes %
2 4 6 8 10 14 16 20
PSASSS 0.88 0.87 0.86 0.81 0.8 0.78 0.67 0.61
DFL 0.97 0.97 0.96 0.96 0.95 0.92 0.9 0.9
Figure 2 Spectrum Utilization Ratio
The numerical values are tabulated in table 3.
8. N. Shribala Dr.P.Srihari and Dr.B.C.Jinaga
http://www.iaeme.com/IJECET/index.asp 66 editor@iaeme.com
Table 3 Comparison of PSASS and DFL with respect to Spectrum utilization ratio
Selfish
Nodes %
2 4 6 8 10 14 16 20
PSASSS 0.89 0.89 0.88 0.78 0.75 0.73 0.73 0.71
DFL 0.95 0.95 0.93 0.92 0.92 0.91 0.9 0.84
5. CONCLUSION
The proposed Data Falsification Intended Inference Lenient Secure Spectrum Sensing
strategy depends on decentralized reliability state verification of the neighbor nodes
which require information regarding spectrum available and also the nodes which
supply the information in cognitive radio networks. The cooperative or combined
CRN spectrum sensing perspective spreads a technique to the attackers who might
contradict the sensing outcomes. The determination of an attacker might be moreover
selfish or malicious. Simply being selfish, an attacker may update the occurrence of
the primary user if there is essentially none and abstain the cognitive users from using
the spectrum. Although being malicious, an assailant may report the absence of the
licensed user while there is one, hence making chaos and obstruction for primary and
secondary users. In this model the Reliability based secondary user concerned
Spectrum sensing technique is examined. The devised version is appreciable and
exceptional to assure spectrum sensing. The quantitative analysis done through
simulations indicates the devised model is scalable and robust towards handling the
malicious or selfish nodes in spectrum state verification strategy. The model devised
here in this paper is not considering factors such as signal fading due to urbanization,
contention in spectrum sensing, which can be playing significant role to influence the
nodes to send falsified spectrum sensing information. Hence in our further work these
factors will be considered in respondent selection and reliability state updating
strategy.
REFERENCES
[1] S. Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications,”
IEEE Journal on Selected Areas in Communications, Vol. 23, No. 2, 2005,
pp. 201-220.doi:10.1109/ JSAC.2004.839380.
[2] S. M. Kay, “Fundamentals of Statistical Signal Processing: Detection Theory,
“Prentice Hall, Upper Saddle River, 1998.
[3] H. V. Poor, “An Introduction to Signal Detection and Estimation,” Springer-
Verlag, New York, 1994.
[4] S.Enserink and D.Cochran, “A Cyclostationary Feature Detector,” Proceedings of
the 28th Asilomar Conference on Signals,Systems,and Computers, Pacific Grove,
31 October-2 November 1994, pp. 806-810. doi:10.1109/ACSSC.1994.471573.
[5] P. Kaligineedi, M. Khabbazian and V. K. Bhargava, “Secure Cooperative Sensing
Techniques for Cognitive Radio System,” IEEE International Conference on
Communications, Beijing, 19-23 May 2008, pp. 3406-3410.
9. Data Falsification Lenient Secure Spectrum Sensing by Cognitive user Reliability
Verification
http://www.iaeme.com/IJECET/index.asp 67 editor@iaeme.com
[6] B. Shen and K. S. Kwak, “Soft Combination Schemes for Cooperative Spectrum
Sensing in Cognitive Radio Networks,” ETRI Journal, Vol. 31, No. 3, 2009, pp.
263-270. doi:10.4218/ etrij.09.0108.0501.
[7] D. Cabric, S. M. Mishra and R. W. Brodersen, “Implementation Issues in
Spectrum Sensing for Cognitive Radios,” Proceedings of 38th Asilomar
Conference on Signals, Systems, Computers, Pacific Grove, 7-10 November
2004, pp. 772-776.
[8] R. L. Chen, J.-M. Park and K. G. Bian, “Robust Distributed Spectrum Sensing in
Cognitive Radio Networks,” Proceedings of the 27th Annual IEEE Conference
on Computer Communications, Phoenix, 13-18 April 2008, pp. 1876-1884.
[9] K. J. Peng and Z. H. Tsai, “A Distributed Spectrum Sensing Scheme Based on
Credibility and Evidence Theory in Cognitive Radio,” Proceedings of the 17th
IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications, Helsinki, 11-14 September 2006, pp. 1-5.
doi:10.1109/PIMRC.2006.254089.
[10] Qin, T., et al., “Towards a trust aware cognitive radio architecture,” SIGMOBILE
Mobile Computational Communication Reviews 2009, pp. 86–95.
[11] Jana, S., et al., “Trusted collaborative spectrum sensing for mobile cognitive
radio networks,” 32nd IEEE International Conference on Computer
Communications, INFOCOM 2012.
[12] P. Kaligineedi., et al., “Secure Cooperative Sensing Techniques for Cognitive
Radio Systems”, International Conference on Communications, ICC 2008.
[13] Jin Wei., et al., "Two-Tier Optimal-Cooperation Based Secure Distributed
[14] Spectrum Sensing for Wireless Cognitive Radio Networks," IEEE INFOCOM
2010.
[15] Qin, T., et al., “Towards a trust aware cognitive radio architecture,” SIGMOBILE
Mobile Computational Communication Reviews 2009, pp. 86–95.
[16] http://www.ijcsit.com/docs/Volume%205/vol5issue03/ijcsit20140503453.pdf