SlideShare a Scribd company logo
Hindustan Journal
A JOURNAL OF HINDUSTAN INSTITUTE OF TECHNOLOGY & SCIENCE
CHENNAI, INDIA
Vol. 6, 2013
PUBLISHED BY
Hindustan Group of Institutions
40, GST Road, St. Thomas Mount, Chennai – 600 016, Tamil Nadu, India.
PATRONS:
Dr. ANAND JACOB VERGHESE
Mr. ASHOK VERGHESE
EDITORIAL TEAM
Chief Editor: Dr. R. DEVANATHAN
Associate Editors: Ms. P. RANJANA & Ms. AL. VALLIKANNU
English Editor: Dr. C. INDIRA
PRINTED BY
ARVIND ASSOCIATES, Chennai.
© 2013. All rights reserved. No part of this publication may be produced, stored
in retrieval system or transmitted in any form or by any means, electronic and
mechanical, photocopying or otherwise without the prior permission of the publishers.
The responsibility for information, opinions, and facts reported in these papers rests
exclusively with the authors.
REVIEW PROCEDURE
Each manuscript is blind reviewed by subject specialists and by an English Editor.
ii
PANEL OF ADVISORS
Dr. BVSSS PRASAD
Professor of Mechanical Engineering,
lIT, Madras
Dr. S. SHANMUGAVEL
Professor, Department of Electronics and
Communication Engineering,
Anna University. Chennai
Dr. A. ALPHONES
Associate Professor, Division of Communication
Engineering
School of Electrical and Electronics Engineering,
Nanyang Technological University, Singapore
Dr. P. RAMESHAN
Director & Professor (Strategic Management)
lIM, Rohtak
Dr. G.L. DUTTA
Chancellor,
K.L. University, Vijayawada
Dr. HARSHA SIRISENA
Emeritus Professor,
Electrical & Computer Engineering,
University of Canterbury, Chirstchurch,
New Zealand.
Dr. LAKMI JAIN
Professor of Knowledge Based Engineering,
Founding Director of the KES Centre,
Electrical and Information Engineering,
University of South Australia, Adelaide.
Dr. PAULAPPASAMY
Honorary Professor,
Madras School of Economics, Chennai.
Dr. N. GANAPATHI SUBRAMANIAM
Professor , Quantum - Functional Semiconductor
Research Center,
Dongguk University,
Republic of Korea
PANEL OF REVIEWERS
APPLIED SCIENCES
Dr. C.Indira
Dr. K.Nithyanandam
Dr. I.Sasirekha
BUILDING SCIENCES
Dr. V.Subbiah
Dr. R.Angeline Prabhavathy
Dr. Ravikumar Bhargava
Dr. Jessy Rooby
Dr. P.S.Joanna
Dr. Sheeba Chander
COMPUTING SCIENCES
Dr. Anitha S. Pillai
Dr. Rajeswari Mukesh
Dr. E.R.Naganathan
Dr. S.Nagarajan
Ms. P.Ranjana
Ms. S.Lakshmi Sridevi
Ms. S.Vijayalakshmi
ELECTRICAL SCIENCES
Dr. R.Devanathan
Dr. M.J.S.Rangachar
Dr. A.K.Parvathy
Dr. P.M.Rubesh Anand
Ms. Manjula Pramod
MECHANICAL SCIENCES
Dr. D.G.Roy Chowdhury
Dr. B.Venkataraman
Dr. G.Ravikumar Solomon
Dr. T.Jeyapovan
Dr D.Dinakaran
Dr. Hyacinth J. Kennady
Dr. A.Anitha
iii
Scanning the Issue
The current issue of Hindustan Journal
provides articles of varied interest to readers.
In the area of Building Sciences, the paper
by Karuppiah and Angeline Prabhavathy
discusses the prospect of shear strengthening
of reinforced concrete beams using carbon
fiber reinforced polymer. Nagarajan and
Ravi K. Bhargava analyse the role of trees
and plants in the hospital premises in order
to improve the well- being of recuperating
patients. Thulasi Gopal provides an analysis
of the design of an Integrated Silk Park at
Kanchipuram to bring back its lost glory.
Karthigeyan argues the case for the speedy
implementation of high speed rail links in
India citing the successful story of high speed
trains in China.
Under the section on Computing Sciences,
Kodhai, Bharathi and Balathiripurasundari
propose a filtering scheme for wireless
sensor networks to address bogus reports,
false report injection attacks and denial of
services. Thiyagarajan, Rasika, Sivasankari
and Sophana Jennifer propose an artificial
neural network based anomaly detection
techniquetodetectchangesinmedicalreading
in a patient monitoring system. SreeVidhya
proposes a new fuzzy clustering algorithm
which can handle efficiently outlier as well
as natural data. Deeptha and Rajeswari
Mukesh propose a genetic algorithm based
selection model to improve the quality of
service performance in the context of web
services development.
Under the section on Electrical Sciences,
the paper by Priya and Seshasayanan
proposes a method to improve the efficiency
of impulse noise detection techniques in
images. Prakash and Kumaraguru Diderot
explain and review the commonly used cyclic
redundancy checking algorithm for verifying
data integrity. Helen and Arivazhagan
propose the use of temporally ordered routing
algorithm along with medium access control
to overcome bandwidth limitation.
UnderthesectiononMechanicalSciences,
Jeya Pradha and Mahendran evaluate the
evaporative heat transfer characteristics of a
refrigerant mixture using computational fluid
dynamics.RavikumarandSaravanandescribe
the design and fabrication of a chilling system
to reach a very low temperature to meet
the requirements of specific applications.
Viswanathan, Sengottuvel and Arun review
the application of electrical discharge
machine for the machining of hard materials.
Under Education and Library Sciences,
Aby Sam and Akkara Sherine eloquently
discuss the role of community colleges in
nation building and describe a success story
to drive home their point. Bhaskaran Nair
argues passionately the case for an integrated
professional programme on teaching
English as a second language. Boopalan,
Nithyanandam and Sasirekha gaze at the
crystal ball and wonder about the future role
of the librarian in an information era.
Finally, we conclude the issue with a list
of forthcoming conferences for the benefit of
our readers.
Dr. R.DEVANATHAN
Chief Editor
iv
Contents
BUILDING SCIENCES
Shear Strengthening of RC Beam Using Carbon
Fiber Reinforced Polymer Sheet 1
Pl. Karuppiah and R. Angeline Prabhavathy.
A Qualitative Research on the Role of Landscape
Architecture in and around Hospital Premises as an
Aid to Medical Treatment in Chennai 7
R. V. Nagarajan and Ravi K. Bhargava
A Research on Nuances of Silk Weaving and Designing a
Handloom Hub at Kanchipuram 15
Ar . Thulasi Gopal
A Case for the Development of High Speed Rail Link in India 21
D. Karthigeyan
COMPUTING SCIENCES
HMAC Filtering Scheme for Data Reporting in Wireless Sensor
Network26
E.Kodhai, P.Bharathi and D.Balathiripurasundari
An Efficient Neural Network Technique to Detect Collective
Anomalies in E-Medicine 36
G.Thiyagarajan, C.M.Rasika, B.Sivasankari and S.Sophana Jennifer
Deriving Intelligence from Data through Text Mining  42
C.T.Sree Vidhya
Web Service Assortment through Genetic Algorithm and XML 50
Deeptha R and Rajeswari Mukesh
v
HINDUSTAN JOURNAL, VOL. 6, 2013
ELECTRICAL SCIENCES
Improving the Efficiency of Impulse Noise Estimation 55
S.V.Priya and R.Seshasayanan
Review of Cyclic Redundancy Checking Algorithm 61
Prakash V R and Kumaraguru Diderot P.
Optimization of Temporally Ordered Routing Algorithm
(TORA)  in Ad-Hoc Network 67
D.Helen and D.Arivazhagan
MECHANICAL SCIENCES
Evaluation of Evaporative Heat Transfer Characteristics
of CO2
/Propane Refrigerant Mixtures in a Smooth
Horizontal Tube using CFD 71
S.Jeya Pratha and S.Mahendran
Design and Fabrication of Ultimate Chilling System 78
T.S.Ravikumar and S.Saravanan
Review of Electrical Discharge Machining Process 83
K.Viswanathan, P.Sengottuvel and J.Arun
EDUCATION AND LIBRARY SCIENCES
Community Colleges to SEmpower the Youth to
Transcend Social Barriers 88
Aby Sam and Akkara Sherine
Continuous Professional Development (CPD):
A Proposal for an Integrated Programme in
Teaching English as a Second Language (TESL) 97
P Bhaskaran Nair
Librarianship in Digital Era 101
E. Boopalan, K. Nithyanandam and I. Sasirekha
FORTHCOMING CONFERENCES 106
vi
HINDUSTAN JOURNAL, VOL. 6, 2013
Shear Strengthening of RC Beam Using Carbon Fiber
Reinforced Polymer Sheet
PL. Karuppiah and R. Angeline Prabhavathy
Abstract — The technique of strengthening of
reinforced concrete beam with externally bonded
Carbon Fiber Reinforced Polymer (CFRP) has
been successfully applied in Civil Engineering. This
paper discusses the effect of shear strengthening of
RC beams on the stress distribution, initial crack,
crack propagation and ultimate strength. The
experimental programme includes testing of five
simply supported reinforced concrete beams of
which four beam specimens are cast with bonding
CFRP and the remaining one beam without CFRP
which is considered as the control beam. The CFRP
epoxy bonded specimens are specimens, with full
side wrap (FSW), one side u wrap at shear (SUWS),
vertical wrap stirrups (VWS) and inclined wrap
stirrups (IWS). Mix design of M30 concrete is
adopted and the mix proportion is arrived at. Based
on the mix proportion, the specimens are cast. The
deflection, shear failure, cracking and ultimate
load for rectangular beams bonded with CFRP
are investigated. The experiments are conducted
to predict the critical load, cracks and increase in
strength. It is concluded that in beams bonded
with side u wrap stirrups (SUWS), there is a delay
in the formation of initial crack and the ductility
ratio is higher, which is desirable in earthquake
prone areas. The general and regional behaviour of
concrete beams with bonded CFRP are studied with
the help of strain gauges. The appearance of the first
crack and the crack propagation in the structure up
to failure is monitored and discussed for the control
and the strengthened beams.1
Intex terms — CFRP wrap, U-wrap, Carbon fiber.
PL. Karuppiah and R. Angeline Prabhavathy are
in School of Building Sciences, Hindustan University,
Chennai, India, (e-mail: plkaruppiah@hindustanuniv.
ac.in, deanbs@hindustanuniv.ac.in).
I.  Introduction
Carbon Fiber composites and reinforced polymer
offer unique advantages in many applications where
conventional materials cannot provide satisfactory
service life. Carbon fiber reinforced polymer (CFRP) is
a very strong and light fiber reinforced polymer which
contains carbon fiber. The polymer which is most often
used is epoxy, but other polymers such as polyester,
vinyl ester or nylon are sometimes used. The composite
may contain other fibers such as Kevlar, aluminum,
glass fibers as well as carbon fibers. The use of CFRP
is advantageous, because it is easier to maintain a
relatively uniform epoxy thickness throughout the
bonding length. By using CFRP wrap, the shear
strength and stiffness increase substantially reducing
shear cracking.
This paper provides the results of an experimental
investigation on using CFRP sheets to prevent local
cracks around shear region in reinforced concrete
beams.
II.  Literature Review
	 Norris et al. (1997) investigated the shear and
flexural strengthening of RC beam with carbon fiber
sheets. The CFRP sheets were epoxy bonded to the
tension face and web of concrete beams to enhance
their flexural and shear strengths. When the CFRP
sheets were placed perpendicular to cracks in the beam,
a large increase in stiffness and strength was observed
and there was no difference in the behavior between
the pre-cracked beams and the un-cracked ones at the
ultimate level. It was concluded that CFRP (carbon
fiber reinforced plastic) sheets increased the strength
and stiffness of existing concrete beams when bonded
to the web and tension face.
2  HINDUSTAN JOURNAL, VOL. 6, 2013
Chaallaletal.(1998)studiedtheshearstrengthening
of RC beams using externally bonded side CFRPsheets.
It is concluded that diagonal side CFRP (Carbon fiber
reinforcement plastic) strips outperformed vertical
side strips for shear strengthening in terms of crack
propagation, stiffness and shear strength.
Alex Li et al. (2001) investigated the shear
strengthening of RC beam with externally bonded
CFRP sheets. The results of tests performed in the
study indicated that stiffness increased while increasing
the area of the CFRP sheet at the flanks and the strain
gauge measurements showed that strengthening the
entire lateral faces of the beam was not necessary.
For the strengthened beam, the ultimate strength had
a significant increase when compared with the normal
beam. Spadea et al. (2001) studied the strength and
ductility of RC beams repaired with bonded CFRP
laminates. The results showed that significant increase
in strength was obtained by strengthening with bonded
CFRP laminates.
Charlo Pellegrino et al. (2002) investigated the
shear strengthening of reinforced concrete beams using
fiber reinforced polymer. Except for the control tests, all
the tests were done on beams with side-bonded CFRP
sheets. The comparison between the experimental and
the theoretical values were made and it was found
that the shear capacity increment is due to Carbon
Fiber Reinforced Polymer. Tavakkolizadeh et al.
(2003) investigated the strengthening of steel-concrete
composite girders using carbon fiber reinforced
polymer sheets. The result indicated that the load-
carrying capacity of a steel-concrete composite girder
improved significantly and the ultimate load-carrying
capacities of the girders significantly increased by 44,
51, and 76% for 1, 3 and 5 layers respectively.
Kesse et al. (2007) investigated the experimental
behaviour of reinforced concrete beams strengthened
with pre-stressed CFRP shear straps. He concluded
that the pre-stressed CFRP strap strengthening system
showed good results and it is an effective means of
significantly increasing the shear capacity of existing
concrete structures.
From the review of literature, it has been found
out that much work has not been done on shear
strengthening of RC beams with different types of
CFRP wraps. Therefore the shear strengthening of RC
beams with CFRP wrap is discussed in this paper.
III.  Experimental Program
In the experiment program of this research, tests are
conducted on reinforced concrete beams with external
bonding of CFRP sheets in the shear zone. The beams
are tested under two-point loading to investigate their
structural behaviour. The objective of this experimental
investigation is to determine the
●● Structural behaviour of RC beam;
●● Shear strength of RC beam;
●● Shear failure of RC beam and
●● Shear strengthening of RC beam using CFRP
sheets.
	 Experimental investigations always show
the real behaviour of the structure, an element or a
joint. Five rectangular RC beams are cast and tested
under two point loading. Out of five beams, one is a
control beam. The CFRP epoxy bonded specimens are
specimens with full side wrap, one side u wrap at shear,
vertical wrap stirrups and inclined wrap stirrups. The
following are the dimensions of the beam.
A.  3.1 Beam Dimension Details
Size: 2000 x150 x 250 mm
Effective cover: 20 mm
Grade of concrete: M30
B.  3.2 Type of material
Sheet: Carbon fibre reinforced polymer
Glue for bonding: Nitowrap 30 (Base),
Nitowrap 410 Harder, Nitowrap 410 Base.
IV.  Specimen Details
	 Tests are carried out on five reinforced
concrete beam specimens and all are strengthened for
shear capacity using external bonded CFRP wraps.
The beam with 150 x 250 mm cross section and 2000
mm clear span are simply supported and subjected to
two concentrated static loads. Steel stirrups of 8mm
diameter are placed at 160 mm spacing along the beam
length for all beams. Fig. 1 shows the Test setup and
Fig. 2 shows the setup of vertical wrap stirrups. Table 1
shows the details of specimens and reinforcement.
KARUPPIAH AND ANGELINE PRABHAVATHY: SHEAR STRENGTHENING OF RC BEAM    3
Fig. 1. Test setup
Fig. 2. Setup of Vertical wrap stirrups
Table 1. Details of specimen and reinforcement
Details of
beam
Types
of beam
Testing
of beam
(days)
Reinforcement in beam
Longitudinal Stirrups
Control
beam
C B
28
2-10# @ top
and 2-12# @
bottom
8mm #
stirrups @
160mm
C/C
Full side
wrap
FSW
Side U
wrap at
shear
SUWS
Vertical
wrap
stirrups
IWS
Inclined
wrap
stirrups
VWS
V.  Material Properties
The concrete used in the experimental program is M20
and steel with nominal yield strength of 415 N/mm2
is
used as the longitudinal reinforcement.
A.  Properties of Nitowrap
Tables 2 to 4 show the properties of Nitowrap CF,
Nitrowrap 30(primer), and Nitrowrap 410 (Saturant)
respectively.
Table 2. Nitowrap CF
Fibre orientation Unidirectional
Weight of fibre 200 g/m2
Density of fibre 1.80g/cc
Fibre thickness 0.30mm
Ultimate elongation (%) 1.5
Tensile strength 3500 N/mm2
Tensile modulus 285 x103
N/mm2
Table 3. Nitowrap 30, Primer
Colour Pale yellow to amber
Application
temperature
150
C - 400
C
Viscosity Thixotropic
Density 1.25 - 1.26 g/cc
Pot Life 2 hours at 300
C
Cure time 5 days at 300
C
Table 4. Nitowrap 410, saturant
Density 1.14 g/cc
Pot life 25 min. @ 270
C
Full cure 7 days
B.  Surface preparation
It is ensured that concrete surfaces are free from oil
residues, demoulding agents, curing compounds, grout
holes and protrusions. Structural damages are repaired
by using epoxy grouting/ appropriate mortar from the
Renderoc range. All depressions, imperfections etc. are
repaired by using Nitocote VF/ Nitomortar FC, epoxy
putty.
The base and hardener are thoroughly mixed in a
container for 3 minutes. Mechanical mixing using a
heavy-duty slow speed (300-500 rpm) drill, fitted with
a mixing paddle is done.
The mixed material of Nitowrap 30 epoxy primer
is applied over the prepared and cleaned surface. It
is applied with a brush and allowed to dry for about
24 hours before application of saturant. The mixed
material of Nitowrap 410 saturant is applied over the
tack free primer.
4  HINDUSTAN JOURNAL, VOL. 6, 2013
VI.  Results And Discussions
Five simply supported reinforced concrete beam
specimens are tested which include one control beam,
and four CFRP epoxy bonded specimens with full side
wrap (FSW), one side u wrap at shear (SUWS), vertical
wrap stirrups (VWS) and inclined wrap stirrups (IWS).
The load deflection behaviour, first crack load, finial
crack load and maximum deflection are studied.
A.  Load – Deflection behaviour
Table 5 shows the Comparison of Ultimate Load and
Maximum Deflection.
Table 5. Comparison of Ultimate Load and Maximum
Deflection
Si.No.
Specimen
First
Crack
Load(kN)
Ultimate
Load(kN)
Maximum
Deflection
(mm)
1 C B 33.5 123.9 32.6
2 FSW 51.8 158.8 14.3
3 SUWS 41.9 122.5 32.4
4 IWS 22.6 122.4 22.4
5 VWS 54 134.8 26.8
The comparison of initial crack, final crack and
deflection of various specimens are shown in Fig 3 to 5.
Fig. 3. Bar chart of first crack load
Fig. 4. Bar chart of final crack
Fig. 5. Bar chart of maximum deflection
From Fig. 3, it can be seen that the first crack is
delayed in the case of FSW and VWS beams. Fig. 4
shows that the final crack is delayed only in the case of
FSW beam.
Fig. 5 shows that the deflection is minimum in the
case of FSW beam. Fig. 6 shows the Load Vs deflection
behaviour of the various beam specimens.
Fig. 6. Load Vs Deflection Behaviour of All Beam speci-
mens.
From the load – deflection behaviour, it can be seen
that the load carrying capacity is maximum for FSW
beam but brittle failure occurs.
In SUWS beam, the initial crack occurs at 41.9 kN
which is 25% higher than that of the control beam. The
ductility ratioes also higher in SUWS beam which is
desirable in earthquake prone areas.
B.  Failure Pattern
Fig. 7 shows the cracking pattern of a control beam.
The initial crack occurs at 33.5 kN and final crack at
123.9 kN. The ultimate load is 123.9 kN.
KARUPPIAH AND ANGELINE PRABHAVATHY: SHEAR STRENGTHENING OF RC BEAM    5
Fig. 7. Cracking pattern of Control beam
Fig. 8 shows the cracking pattern of FSW
specimen. The initial crack occurs at 51.1 kN and final
crack at 157.5 kN. The ultimate load is 158.8 kN. Total
CFRP covered area is 1400 mm (Length), and 170 mm
(Height).
Fig. 8. Cracking pattern of FSW specimen
Fig. 9 shows the cracking pattern of SUWS
specimen. The initial crack occurs at 41.9 kN and final
crack at 122.6 kN. The ultimate load is 122.6 kN. CFRP
is wrapped in the shear area as U section, with a width
of 250 mm.
Fig. 9. Cracking pattern of SUWS specimen
	 Fig. 10 shows the cracking pattern of IWS
specimen. The initial crack occurs at 22.6 kN and
final crack at 123.8 kN. The ultimate load is 123.8 kN.
Inclined CFRP stirrups are wrapped at an angle of 60o
with a width of 60 mm.
Fig. 10. Cracking pattern of IWS specimen
Fig. 11 shows the cracking pattern of VWS
specimen. The initial crack occurs at 54 kN and final
crack at 129 kN. The ultimate load is 129 kN. Vertical
CFRP stirrups 100mm wide are wrapped at 90o
.
Fig. 11. Crack pattern of VWS specimen
Debonding of CFRP wraps occurred after the initial
crack appeared. Fig. 12 to Fig. 15 show the debonding
of CFRP.
Fig. 12. Debonding of FSW specimen
6  HINDUSTAN JOURNAL, VOL. 6, 2013
Sudden failure of FSW beam occurred at the
ultimate load.
Fig. 13. Debonding of SUWS specimen
Fig. 14. Debonding of IWS specimen
Fig. 15. Debonding of VWS specimen
VII.  Conclusion
Tests were performed in externally applied epoxy-
bonded CFRP. Based on the test results the following
conclusions are drawn.
●● Compared to all other specimens deflection of FSW
specimen is less and load bearing capacity is more.
However brittle failure occurs.
●● In SUWS beam, the initial crack occurs at 41.9 kN
which is 25% higher than that of the control beam.
The ductility ratio is also higher in SUWS beam
which is desirable in earthquake prone areas.
References
[1]	 Tom Norris et al. (1997), Shear And Flexural
Strengthening Of RC Beams With Carbon Fiber
Sheets. Journal of Structural Engineering 123,
903-911.
[2]	 O. Chaalla. et al. (1998), Shear Strengthening
Of RC Beams by Externally Bonded Side CFRP
Strips. Journal of Composites for Construction,
2, 111-113.
[3]	 Alex Li, et al. (2001), Shear Strengthening Of RC
Beams With Externally Bonded CFRP Sheets.
Journal of Structural Engineering,127, 374-380.
[4]	 G. Spadea et al. (2001), Strength And Ductility
Of RC Beams Repaired With Bonded CFRP
Laminates, Journal of Bridge Engineering, 6,
349-355.
[5]	 Carlo Pellegrino et al. (2002), Fiber Reinforced
Polymer Shear Strengthening of Reinforced
Concrete Beams with Transverse Steel
Reinforcement. Journal of Composites for
Construction, 6, 104-111.
[6]	 M. Tavakkolizadeh, et al.(2003), Strengthening of
Steel-Concrete Composite Girders Using Carbon
Fiber Reinforced Polymers Sheets. Journal of
Structural Engineering, 129, 30-40.
[7]	 Gyamera Kesse et al., (2007), Experimental
Behavior of Reinforced Concrete Beams
Strengthened with Prestressed CFRP Shear
Straps. Journal of Composites for Construction,
11, 375-383.
HINDUSTAN JOURNAL, VOL. 6, 2013
A Qualitative Research on the Role of Landscape
Architecture in and around Hospital Premises as an Aid to
Medical Treatment in Chennai.
R. V. Nagarajan and Ravi K. Bhargava
Abstract — The milieu of the hospitals ought to be
healthy and hygienic for the patients to recuperate
from their illness. The role of trees and plants
in a hospital premises is considered a dynamic
parameter in the creation of the hospital quality.
This paper attempts to discern the ratio of minimum
land / area required for the medicinal landscape
to the area of hospital units. The very question of
how to border out the minimum quantity of trees
required for a hospital landscape is the prime aim
of this research. Secondly, what are the aspects (air
purification, killing bacteria, noise reduction, etc.)
to be considered in the selection of trees, is the next
level of research. Finally, aided by statistical results
of a survey conducted in hospitals, this research
narrows down to the ratio (x:y) for a typical hospital
premises, where ‘x’ is the minimum area required
for ‘n’ number of occupants (patients, non-patients,
hospital-staff, etc.) and ‘y’ is the minimum open
space required for the medicinal landscape to be
executed for a Healthy Hospital.1
Index terms — Landscape, Hospital, Treatment.
I.  Introduction
“Research gathered over recent years has highlighted
the countless benefits to people, wildlife and the
environment that come from planting trees and creating
new woodland habitat. It is obvious trees are good
things,” says Clive Anderson.
R.V. Nagarajan and Ravi K. Bhargava are in School
of Architecture, Hindustan University, Chennai, India,
(e-mail: rvnagarajan@hindustanuniv.ac.in)
The belief that plants and gardens are beneficial for
patients in healthcare environments is more than one
thousand years old, and appears prominently in Asian
and Western cultures [1].
The awareness of the positive influence of the
outdoor environment on patients’ healing process
has long been present in hospital architecture. The
term healing garden applies to the gardens that
promote recuperation from illness. In this context,
‘healing’ does not necessarily refer to curing, but to
the overall improvement of well-being.Integration
and unity of hospital buildings and their surrounding
outdoor spaces contribute to the creation of hospital
as a ‘small city within a city’, with its own specific
patterns of use [2].
II.  Characteristics of Plants
Plants possess the ability of escalating the pain tolerance
effects in the patients so as to enable them to recuperate
from their illness or surgery. This ability of the plants
is found nil in the first case and comparatively higher
in the third case than the second one in the following
category [3]:
1.	 No plants
2.	 Foliage plants
3.	 Foliage + Flowering plants
Patients in hospital rooms with plants and flowers
have significantly showed more positive physiological
responses, lower ratings of pain, anxiety and fatigue,
and more positive feelings and higher satisfaction
about their rooms than the patients who are kept in
8  HINDUSTAN JOURNAL, VOL. 6, 2013
rooms without plants [4]. Findings of such researches
suggested that plants in a hospital environment
could be noninvasive, inexpensive, and an effective
complementary medicine for patients recovering from
abdominal surgery.
Researchers who have assessed the impact of
nature/plants on human health have suggested that
nature and plant experiences are positively associated
with human physical [5], psychological [6], emotional
[7], and cognitive health [8]. In addition, viewing
nature/plants is linked to pain reduction, less need for
analgesics, and fast recovery from surgery [9].
For many years, the importance of aesthetics in
relevance to the health was not experimentally proven
as the additional quality of plants. Apart from the
recuperation of illness, aesthetic of plants is another
important philosophical discipline which must be added
to the ambience of hospital for the further betterment to
both the patients and the doctors. High quality nursing
care includes the aesthetic dimension [10].
Aesthetics influences a person’s feelings, both
physical and psychological. Both aesthetic and non-
aesthetic surroundings create an impression and affects
a person consciously or unconsciously [11].
III.  Method to Calculate Green Areas
for Any Site
According to the Green Guide for Health Care, the
following formula is for the calculation of the required
green area: Natural Habitat Area = (Site Area x Site Size
Factor) / Floor Space Ratio, where Floor Space Ratio =
Gross Constructed Area including all service spaces and
excluding parking areas / Site Area and Site Size Factor
= (1/√Site Area) x 10 (usually around 0.15) [12].
The main difference between the calculation of
green areas for any site and with hospital site is the
nature of the people occupying it. The prime aim of
this research is to find out the variation in the level of
the ratio in the above formula framed by the GGHC
(Green guide for Health Care), with the level of the
ratio in hospital site, particularly concentrating on the
landscape features.
IV.  Design Considerations for Hospital
Landscaping
In an ideal case, optimal distribution of the total site area
of a hospital complex should be the following: 30% for
the buildings, 15% for internal communication routes
and parking, 50% for vacant area (25-30% in case of
hospitals with a limited capacity for future growth) out
of which 10% is reserved for recreational areas.
In brief, they should be planned according to
following requirements: (1) to create opportunities for
movement and exercise; (2) to offer a choice between
social interaction and solitude; (3) to provide both direct
and indirect contacts with nature and other positive
distractions [13].
Several studies of non-patient groups (such as
university students) as well as patients have consistently
shown that simply looking at environments dominated
by greenery, flowers, or water -- as compared to built
-scenes lacking nature (rooms, buildings, towns) -- is
significantly more effective in promoting recovery or
restoration from stress.
To promote the speed of postoperative recovery and
to improve the quality of life during hospitalizations, it
is important to provide patients with not only the best
treatment possible, but also to remove such sources of
stress and to counter them with positive distractions.
V.  Interior Plants
When plants were added to the interior space, the
participants were more productive (12% quicker
reaction time on the computer task) and less stressed
(systolic blood pressure readings lowered by one to
four units). Immediately after completing the task,
participants in the room with plants present reported
feeling more attentive (an increase of 0.5 on a self-
reported scale from one to five) than people in the room
with no plants [14].
Regardless of the physical air quality benefits, people
generally have an affinity to being around plants. Many
studies have proven a link to plants and their beneficial
psychological effects on people, including increases in
productivity and decreases in stress levels [15].
In 2006, many studies were published that indicated
that simply having three small potted plants can
significantly reduce (50-75%) the total VOC (Volatile
Organic Compound) levels in a real office of 30-50m3
size [16]. The only consideration was that the level of
total VOC needed to be above 100ppb - a concentration
level that is much lower than acceptable limits.
TheNationalAeronauticsandSpaceAdministration
studies on indoor landscape plants and their role in
NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE  9
improving indoor air quality included reports on toxins
common to the interior environment, specifically
benzene, formaldehyde, and trichloroethylene [17].
The following list of plants typically used in the
interior environment outlines the plants found to be
more effective in air purification, based on the NASA
studies [18].
1.	 Aechmeafasciata (Excellent for formaldehyde and
xylene)
2.	 Aglaonemamodestum (Excellent for benzene and
toluene)
3.	 Aloe vera (Excellent for formaldehyde)
4.	 Chamaedorea Bamboo (Excellent for benzene and
formaldehyde)
5.	 Chlorophytumelatum (Excellent for carbon
monoxide and formaldehyde)
6.	 Chrysanthemum morifolium (Excellent for
trichloroethylene, good for benzene and
formaldehyde)
7.	 Dendrobium Orchid (Excellent for acetone,
ammonia, chloroform, ethyl acetate, methyl
alcohol, formaldehyde and xylene)
8.	 Dieffenbachia maculate (Good for formaldehyde)
9.	 Dracaena deremensis (Excellent for benzene and
trichloroethylene, good for formaldehyde)
10.	Dracaena marginata (Excellent for benzene, good
for formaldehyde and trichloroethylene)
11.	 Dracaena Massangeana (Excellent for
formaldehyde)
VI. Surveillance in Hospitals in Chennai
As the aim of this research was conceptualized to
calculate the ratio of the minimum open space required
for landscape in a hospital to the built up space of the
site, the research was further proceeded to organize
a survey with the people who inhabit the hospital
premises.
Surveys were carried out in three major hospitals
in Chennai in the following categories: 1. a hospital
in the populated / noisy zone of the city. 2. A hospital
specialized for a single disease. 3. A hospital located in
the outskirts.
Following hospitals in Chennai were selected for
the survey: 1. Rajiv Gandhi Government Hospital,
Central, Chennai. 2. Cancer Institute, Adyar, Chennai
and 3. Kamakshi Memorial Hospital, Velachery Road,
Chennai.
VII.  Selection of People for Survey
It was already planned that the selection of the people
for survey was as per the requirement of the research.
So, the people for survey were categorized into four
following types: 1. with respect to occupation, 2. with
respect to their age, 3. with respect to the time of survey
and 4. with respect to their gender.
Fig. 1. Occupation
Fig. 2. Age
10  HINDUSTAN JOURNAL, VOL. 6, 2013
Fig. 3. Time
Fig. 4. Gender
VIII. Report on The Surveillance
The following are the statistical ripostes for the
questionnaire prepared for the survey:
Fig. 5. Liking of parts of Hospital
(a)
(b)
(c)
(d)
(e)
Fig. 6. Sub categories of fig. 5.
Fig. 7. Duration in Hospital
NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE  11
Fig. 8. Noise Level
Fig. 9. Smoke / Dust in premises
Fig. 10. Preferred surroundings
Fig. 11. Elements missing in Hospital
Fig. 12. Inside the building-1
Fig. 13. Inside the building-2
12  HINDUSTAN JOURNAL, VOL. 6, 2013
Fig. 14. Trees liked
Fig. 15. Trees recommended
Fig. 16. Trees disliked
IX.  Synthesis of The Survey
From the above report of the survey conducted in three
hospitals in Chennai, the following are the syntheses
observed:
1.	 57.5% People feel comfort in the place where the
following trees are planted: Azardirastraindica,
Ficusreligiousa, Ficusbengalinensis, Flowering
trees and Pongameapinnata.
2.	 63.7% of people desperately want some mode of
system to enhance their breathing comfort, and
50% among them recommended plants inside the
building.
3.	 As most of the previous researches proved, 45%
of the people surveyed preferred flowering plants
in their vicinity and they expressed that they felt
relaxed compared to the people who were not
having flowering plants in their rooms.
4.	 Equally, 40% of people preferred earth walkway
and also lawn in the open space of the premises.
5.	 65% of people complained that the process of
shedding leaves of trees is irritable than the
problems of insects over it (32% complained of
insects).
6.	 Among the people surveyed, 75% of patients, 65%
of non - patients and 78% of staff members of
hospital prefer to rest under the tree during mid-
day.
7.	 Age wise, 82% of above 55 age people preferred
noiseless area than the active / noisy area.
8.	 Almost 95% of the women prefer to rest inside the
building than resting under trees, street-benches or
anywhere in open spaces.
9.	 Almost 88% of the men patients whose rooms were
not having plants felt boredom and wanted to move
around, when the same feeling was felt by only
15% of the men patients whose rooms had plants.
10.	Almost 90%of all age group men and women who
are patients prefer to have a walk in either in the
morning or in the evening in the road which has
trees, than the road which does not have them.
11.	 Area Calculation of the First hospital: Total Area
- 61,336.0716 sq.m and the total open space is
22,114.0452 sq.m.
12.	Area Calculation of the Second hospital: Total
area - 31,567.9558 sq.m and the total open space is
16,423.8566 sq.m
13.	Area Calculation of the Third hospital: Total Area:
- 12,437.2557 sq.m and the total open space is
3,211.7854 sq.m
NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE  13
14.	The satisfaction level of the people staying in the
premises in terms of overall aspects, synthesized
from all the three hospitals is as follows: 71.35%,
83.75% and 56.21% are the percentage of the
satisfaction level measured from the first, second
and third hospitals respectively.
15.	With the above satisfaction levels measured, the
total built up area, total open space area and the site
area of all the three premises are multiplied with
the percentages of the satisfaction level.
16.	71.35% of 22,114.0452sq.m. =x
17.	83.75% of 16,423.8566 sq.m= y
18.	56.21% of 3,211.7854 sq.m= z
19.	Built up spaces of all the three premises are
considered as a, b and c respectively.
X. Calculation of Ratio of Minimum Open
Space for A Hospital
(x+y+z) / 3 = Xos
where x, y, z are the satisfied open area for a hospital
and Xos
is the factor for open space.
(a+b+c) / 3 = Ybs
where a, b, c are the built up area of the hospital
buildings and Ybs
is the factor for built up space.
XI.  Conclusion
The research concludes that Xos
:Ybs
is the ratio of
minimum open spaces to the built up space of a hospital
premises.
References
[1]	 Ulrich, R. S. and R. Parsons (1992), “Influences
of passive experiences with plants on individual
well-being and health. In D. Relf (Ed.)”, The
role of horticulture in humanwell-being and
social development, Portland, Timber Press, pp.
93-105.
[2]	 DejanaNedučin, “Milena Krklješ,
NađaKurtović-Folić”, “Hospital Outdoor
Spaces - Therapeutic Benefits And Design
Considerations”, Architecture and Civil
Engineering Vol. 8, No 3, 2010, pp. 293 - 305
[3]	 S.-H. Park, R.H. Mattson, E. Kim (2011), “Pain
Tolerance Effects of Ornamental Plants in a
Simulated Hospital Patient Room”, Department
of Horticulture, Forestry and Recreation
Resources, Kansas State University.
[4]	 Seong-Hyun Park and Richard H. Mattson,
(2009) “Effects of Flowering and Foliage Plants
in Hospital Rooms on Patients Recovering from
AbdominalSurgery”,DepartmentofHorticulture,
Forestry and Recreation Resources, Kansas State
University.
[5]	 Chang, C. and P. Chen. (2005). “Human response
to window views and indoor plants in the
workplace”, Hort Science 40:pp.1354–1359.
[6]	 Kaplan,R.andS.Kaplan.(1995),“Theexperience
of nature: A psychological perspective”, Ulrich’s,
Ann Arbor, MI.
[7]	 Adachi, M., C.L.E. Rode, and A.D. Kendle.
(2000), “Effects of floral and foliage displays on
human emotions”, HortTechnology 10:pp.59–63.
[8]	 Cimprich, B. (1993), “Development of an
intervention to restore attention in cancer
patients”, Cancer Nurs. 16:pp.83–92.
[9]	 Diette, G., E. Haponik, and H. Rubin. (2003),
“Distractiontherapywithnaturesightsandsounds
reduces pain during flexible bronchoscopy”,
Chest 12:pp.941–948.
[10]	 SynnøveCaspari, (2006), “The aesthetic
dimension in hospitals - an investigation into
strategic plans”, International Journal of Nursing
Studies 43 pp.851–859.
[11]	 Ulrich, R., (1991), “Effects of interior design on
wellness. Theory on recent scientific research”,
Journal of Health Care and Interior Design, 3.
[12]	 Green Guide for Health Care, Version 2.2, SS
Credit 5.1., Site Development: Protect or Restore
Open Space or Habitat, 2007, www.gghc.com,
p.6 23.
[13]	 Ulrich, R.S., Cooper-Marcus, C., Barnes, M.
(Eds.), (1999), “Effects of Gardens on Health
Outcomes: Theory and Research, in Healing
Gardens: Therapeutic Benefits and Design
14  HINDUSTAN JOURNAL, VOL. 6, 2013
Recommendations”, John Wiley  Sons, New
York, pp. 27-86.
[14]	 Virginia I. Lohr, Caroline H. Pearson-Mims,
and Georgia K. Goodwin, “Interior Plants
May Improve Worker Productivity and Reduce
Stress In A Windowless Environment”,
Department of Horticulture and Landscape
Architecture Washington State University,
Pullman, WA 99164-6414
[15]	 Ryan Hum and Pearl Lai (2007), “Assessment of
Biowalls: An Overview of Plant- and Microbial-
based Indoor Air Purification System”.
[16]	 Wood, R.A., Burchett, M.D., Alquezar, R.,
Orwell, R.L., Tarran, J. and F. Torpy. (2006). “The
potted-plant microcosm substantially reduces
indoor air VOC pollution: I. office field-study”,
Water, Air, and Soil Pollution, 175, pp.163-180.
[17]	 Prescod, A.W. (1992). “More indoor plants as air
purifiers”, Pappus, 11:4.
[18]	 United States Environmental Protection Agency
(1991), “Sick building syndrome”, Air and
Radiation, Indoor Air Facts, 4.
HINDUSTAN JOURNAL, VOL. 6, 2013
A Research on Nuances of Silk Weaving and Designing a
Handloom Hub at Kanchipuram
Ar. Thulasi Gopal.
Abstract—Thelostplatformofsilkweavingindustry
in Kanchipuram has been identified in order to
bring back the lost glory of original silk weaving
techniques, process and products through down to
earth planning and designing patterns. A particular
communityhasbeenconfinedtotheseindustries.The
idea of the silk parks with appropriate infrastructure
is to create awareness among others to take up
this profession. Deliberate research and extensive
interaction with the weaving community has gone
into evolving this design concept. The weaving
community was widely studied on their everyday
lifestyle, weaving activity, duration to complete each
activity, spacial organization, proximity of spaces
etc., in order to meet the requirements in the Silk
Park. Apart from these, the supporting activities
like cocoon reeling and dyeing activities and their
spaces were studied. Weaver’s psychology which
results in the sari designs, creativity etc., was taken
into account for giving a suitable design solution.
Emotions related to the occupational spaces resulted
in interior-exterior connectivity, to avoid solitude.
Traditional Kanchipuram weavers’ house and their
elements were studied to incorporate those features
into the design. The challenge in the output was
how all the versatile activities of silk weaving can be
designed under one roof, bringing in wholesomeness
through form, tone, style, texture, hue, and bringing
unity, balance and continuity. The design created
would provide people involved with a comfortable
living environment that they are longing for and
contribute to India’s gross domestic product.1
Index Terms — Silk Weaving, Handloom, Spatial
Organization, Design, Interior-exteriorconnectivity.
Ar. Thulasi Gopal is in School of Architecture,
Hindustan, Chennai, India, (e-mail: gopal.aarthi@
gmail.com)
I.	 Introduction
Tamil Nadu has a rich cultural history and legacy that
spans several areas. All of these need to be preserved
for posterity as they remind the people of its enormity
and feat. It has a world class brilliances to showcase,
which needs to be nurtured and suitably promoted to
support the branding and economic outcomes.
One such craft that needs to be reinstated from a
declining trend is Silk weaving. India is the second-
largest Silk producer in the world, next to China and
major sourcing base for international retail players.
According to Tamil epic ‘Silapadikaram’ the Silk
handloom weaving activity is said to have existed
since second Century AD at Kanchipuram. It is one of
the traditional centers of Silk weaving and handloom
industries that is losing its identity.
The Scheme for Integrated Textile Park was
approved by Central Government of India to facilitate
settingupofTextileparkswithworldclassinfrastructure
and amenities. The Government of Tamilnadu has
proposed to bring a Silk park at Kanchipuram. Seventy
five acres of land allotted by the Government of Tamil
Nadu for the purpose is located at Kilkathirpur village,
Kanchipuram Taluk and District.
II.	 Constraints
The Silk and other textile industries are still community
driven i.e. a particular community is confined to these
industries. The idea of the Silk parks with appropriate
infrastructure is to create awareness among a lot of
others to take up this profession. This in turn keeps
the industry in the head front of Indian economic
development and increases the demand for Indian
textiles in International markets.
16  HINDUSTAN JOURNAL, VOL. 6, 2013
Sriperumbudhur industrial area is situated 35 kms
away from Kanchipuram which attracts people to work
there due to time flexibility, better income and less hard
work (when compared to weaving), suitable transport
facilities, allowances etc., provided by the companies
such as Hyundai, Nokia etc.
III.	 Objectives
The objectives of the project are
●● To design a prime handloom hub
●● To re-establish the traditional and cultural value of
ancient silk weaving which is the prime occupation
of the temple city and its surrounding villages and
village hamlets of Kanchipuram.
●● To encourage the occupation, by providing the
workers with better functioning environment and
resources that would take the economy of the rural
sector to a superior stature.
●● To bring back the lost platform for the weavers
to market their products, avoid duplicate market
players and also to showcase the culture.
IV.	 Methodology
The methodology proposed to be adopted are
●● Understanding the site surroundings and services.
●● Understanding the occupation and workplace.
●● Weavers’ needs/opinions through questionnaires.
●● Comparison of history against recent happenings.
●● Techniques in the field to choose the best for
today’s scenario.
●● Requirement framing in detail.
●● Case study- comparative study of Ayangarkulam
(weaving village and Pillayarpalayam weaving
town).Analysis of the common and the contrasting
features and characteristics.
●● Formulating conceptual ideas.
●● Development of concepts into schemes and into
final design output.
V.	 Scope and Nature of Activities in The
Complex
The spaces planned on site are: Administration and
expo hall, Research center and training, Marketing area,
Warehouse, Cocoon reeling, Garment unit, Canteen
and hostel , Dyeing unit –CETP, Weaving cluster,
Residential cluster, Central hub – OAT, health care,
child care., Restaurant, Guest house, Multipurpose
area, Temple along with the pond, and other Services.
The main focus in the design was given to the Dyeing
cluster, Weaving cluster and the Residential Cluster.
VI.	 Challenges Faced
The challenges faced include
●● Bringing in different activities in one complex.
●● Bringing wholesomeness in the design.
●● Creating buffer spaces between each block.
●● Proximity between all the spaces.
●● Connectivity and flow of functions.
●● Segregating the different residential, floating,
working and shopping population.
●● Meeting the workplace requirements.
●● Innovations for enhanced productivity of silk
products.
VII.	 Analysis Along With Evolution
of Design
Deliberate research and extensive interaction with the
weaving community has gone into evolving this design
concept. Their needs have been understood and have
been approached accordingly.
The site, on entry, will have the administrative
blocks, followed by the marketing blocks with a
research and testing center. This is to facilitate effective
marketing of the products as well as to ensure the
quality of the products. There is an industry, behind
the marketing area, which is to produce woven Silk
garments. The need for original silk sarees is decreasing
day by day and hence the requirement of the weavers
too is receding. To change this situation, silk can be
used to produce various other useful garments, apart
from sarees. They can be in accordance with the current
trends in fashion. This will escalate the demand for
woven silk garments which will in turn increase the
demand for the weavers.
THULASI GOPAL:A RESEARCH ON NUANCES OF SILK WEAVING    17
After a detailed discussion with the village weavers,
it was found that they are not very keen with the idea
of shifting to a new alien location. Hence the design is
done in such a way so as to provide them with the most
homely environment possible.
The weaving looms customized is specific to match
the needs of the Kanchipuram weavers. The houses
planned in the Silk Park are categorized into two main
styles, as per the requirements of the weavers. After
documentation, observation and analysis with the
weaving community of Kanchipuram, it was understood
thattheyarebroadlysegregatedintotwogroups,basedon
their economic needs. The houses have been constructed
in such a way so as to cater to their needs.
One of the concepts adopted by the earth institute
at Auroville is CSEB – Compressed Stabilized Earth
Blocks. The soil at the site was observed to be sandy
clayey soil, one such type of soil which is used for
making CSEB blocks which can be used for construction.
This does not require any skilled labours at work, and
hence can be a source of income to the local dwellers,
who necessarily are not weavers, surrounding the site.
As mentioned, the site is located 7 km away from the
original weaving society; hence the locales here too
will have an opportunity to gain through employing the
concept. A large water body, for example, a typical pond
is created that facilitates water distribution to different
areas on site through the tank which is a focal feature on
site. The mud evacuated to create these water bodies will
be used for CSEB block making. Burnt bricks replaced
by CSEB blocks provide a sustainable concept.
There are farming areas around each housing
sectors, which will enable food production. This
offers them an additional source of income, as well
as an alternate food source. There are green areas
designed all around the site which acts as a buffer
space, segregating the diversified functions involved
in weaving a saree.
The central focus of this site is a multipurpose area
with a temple, a water body, commercial spaces, which
will provide the platform necessary for the weavers
to hold fares. It is to break the monotonous weaving
routine and to provide them with some relaxation. The
fares are also a means of interaction and communication
with weaving communities from other districts and
states. Thus holding fares and exposition summons
collaborative work from other communities, along with
exchange of various important ideas and tools, which
will not only improvise the silk weaving techniques but
also make them aware of the current trends in the market.
All the silk saree shops can be shifted under the silk
society’s supervision so that adulteration is minimized
and originality is maintained. Training centers can be
proposed with Government certified courses on silk
weaving to attract younger generation into this activity,
Fig.1, 2 and 3 describe the process, design features
and the concepts adopted respectively in regard to the
proposal of the handloom hub at Kanchipuram.
VIII.	 CONCLUSION
Combination of traditional and contemporary
architecture is done which targets site planning level to
weaving machine design customized for the weavers.
Macro level to micro level planning is undertaken.
Material from site is used for construction which can
involve local dwellers who can be benefited apart from
the main target - the weavers. Dyeing areas which were
earlier inside the Kanchipuram towns causing pollution,
will be shifted here where the CETPis set up to solve the
issue of pollution. Considering the hot humid climate,
features like courtyard have been adopted to give a
natural day lighting and stack effect thus maintaining
a suitable indoor environment. Better workspace is
created which will result in better productivity. Efficient
usage of energy, water, and other resources is seen.
Measures are taken to protect occupants health and
improve employee productivity. Maximum reduction
in waste, pollution and environmental degradation is
seen into. CSEB blocks, which are green materials are
extensively used in the construction.
BIBILIOGRAPHY
http://www.silkclick.com
http://www.csapl.co.in/industrial.asp
http://www.thehindu.com/todays-paper/tp-national/
tp-tamilnadu/site-identified-for-silk-park-in-
kancheepuram/article168017.ece
http://www.kanchipuramdistrict.com/
http://smehorizon.sulekha.com/advancement-
made-panipat-weaving-industry-sustain_textiles-
viewsitem_8253
http://www.oldandsold.com/articles04/textiles16.shtml
http://environmental_impact_assessment
18  HINDUSTAN JOURNAL, VOL. 6, 2013
Fig.1.SilkenArchinomy-Theprocess
THULASI GOPAL:A RESEARCH ON NUANCES OF SILK WEAVING    19
Fig.2.SlikenArchinomy-DesignFeatures
20  HINDUSTAN JOURNAL, VOL. 6, 2013
Fig.3.SilkenArchinomy-ConceptsAdopted
HINDUSTAN JOURNAL, VOL. 6, 2013
A Case for the Development of High Speed Rail Link in India
D. Karthigeyan
Abstract — Indian Railways is an Indian state-
owned enterprise, owned and operated by
the Government of India through the Ministry of
Railways. It is one of the world’s largest railway
networks comprising 115,000 km (71,000 mi) of
track over a route of 65,000 km (40,000 mi) and
7,500 stations. India is a country with more than
1.2 billion population, which includes 35 cities with
more than 1 million people each as per Census 2011.
Its urban population is increasing day by day, and
the rail network forms the lifeline of the country,
where majority of the people are poor and cannot
afford to travel by air. Under these circumstances,
India which is aiming to become a global super
power by 2050 requires high speed rail network
similar to China, which has the world’s largest
high speed railway network of more than 10,000
km. In this context, India needs to have a quality
and affordable high speed rail network for its poor
people to connect its major metropolitan areas
and to decongest the which are transforming to
megalopolition areas.1
Index terms — High speed rail network, Bullet train,
Transportations.
I.	 Introduction
High-speed rail is a type of rail transport that operates
significantly faster than traditional rail traffic, using
an integrated system of specialized  rolling stock  and
dedicated tracks. The first such system began operation
in Japan in 1964 and was widely known as the bullet
train. Even though India has one of the world’s largest
railway networks, it is yet to find itself a place in the
D. Karthigeyan is in School ofArchitecture, Hindustan
University, Chennai, India, (e-mail: dkarthikeyan@
hindustanuniv.ac.in)
list of countries which currently have a commercial
high speed rail network. The average speed of trains in
developed nations is around 200 kmph whereas in India,
the maximum speed of any train hardly exceeds 150
kmph. Rajdhani and Shatabdi are among the fastest trains
which run nearly at a speed of 120 kmph. On the other
hand, India’s neighbour China has built world’s largest
high speed railway network of about 10,463 Km long
[2]. China also has the largest single track length between
Beijing and Guangzhou which is 2,298 km. China has
world’s fastest trains running at the speed of 380 kmph.
It is surprising to see that the high-speed railway network
in China was developed in a short span of five years. The
proposal for high speed trains had come to fore in 1990 in
that country and work had started in 2007.
Fig. 1. High speed rail in China
In 2015 China will have 18,000km of high speed
rail. Just five years after China’s high-speed rail system
opened. It is carrying nearly twice as many passengers
each month as the country’s domestic airline industry.
With traffic growing at 28 percent a year for the last
several years, China’s high-speed rail network will
handle more passengers by early next year than the 54
million people a month who board domestic flights in
the United States.
22  HINDUSTAN JOURNAL, VOL. 6, 2013
China’s high-speed rail system has emerged
as an unexpected success story. Economists and
transportation experts cite it as one reason for China’s
continued economic growth when other emerging
economies like India are faltering due to the global
economic slowdown.
Chinese workers are now more productive.
The productivity gains occur when companies find
themselves within a couple of hours’ of train ride of
tens of millions of potential customers, employees
and rivals. Companies are opening research and
development centers in more glamorous cities like
Beijing and Shenzhen with abundant supplies of
young, highly educated workers, and having them take
frequent day trips to factories in cities with lower wages
and land costs, like Tianjin and Changsha. Businesses
are also customizing their products more through
frequent meetings with clients in other cities, part of a
broader move up the ladder toward higher value-added
products.
Airlines in China have largely halted service on
routes of less than 300 miles when high-speed rail links
open. They have reduced service on routes of 300 to
470 miles. The double-digit annual wage increases give
the Chinese enough disposable income that domestic
airline traffic has still been growing 10 percent a year.
Currently, China’s high-speed rail service costs
significantly less than similar systems in developed
countries, but is considerably more expensive than
conventional rail service. For the 419 km trip from
Beijing to Jinan, High Speed Rail costs US$30 and
takes 1 hour 32 minutes, while a conventional train
costs US$12 and takes about 6 hours. By comparison,
the Acela train from Washington DC to New York City
covering a slightly shorter distance of 370 km costs
US$152–180 and takes 2 hour 50 minutes [3].
Fig. 2. China’s Pan-Asian high-speed rail link
Chinese government have a major plan with
respect to high speed rail network, by connecting
it to the whole of Asia and European Continent, so
that all its freight travel will happen through this
network, which in turn will make the Chinese a
global leader in the trade and commerce. In this
connection, Chinese government even plans to build
a high-speed rail line connecting its south-western
city of Kunming to New Delhi and Lahore, part of a
17-country transcontinental rail project which is part
of its pan-Asian high-speed rail link. After many
years of negotiations with other Asian countries,
China has finally reached agreements with several
Central Asian countries and got the green signal to
its ambitious pan-Asian high-speed rail link, which
envisages connecting cities in China to Central Asia,
Iran, Europe, Russia and Singapore.
II.	 High Speed Rail Network
There is no standard or a global definition for it;
however, there are certain parameters that are unique to
high-speed rail, which are
●● UIC (International Union of Railways) and  EC
Directive 96/58 define high-speed rail as systems
of rolling stock and infrastructure which regularly
operate at or above 250 km/h (155 mph) on new
tracks, or 200 km/h (124 mph) on existing tracks.
However lower speeds can be required by local
constraints.
●● A definitive aspect of high speed rail is the use
of  continuous welded rail  which reduces track
vibrations and discrepancies between rail segments
enough to allow trains to pass at speeds in excess of
200 km/h (124 mph).
●● Depending on design speed, banking and the forces
deemed acceptable to the passengers, curve radius
is above 4.5  kilometres (2.8  mi) and for lines
capable of 350 km/h (217 mph) running, typically
at 7 to 9 kilometres (4.3 to 5.6 mi).
A.	 Parameters of A High Speed Travel:
●● The frequency of service,
●● Regular-interval timetables,
●● A high level of comfort,
KARTHIGEYAN:A CASE FOR THE DEVELOPMENT OF HIGH SPEED RAIL  23
●● A pricing structure adapted to the needs of
customers,
●● Complement with other forms of transport,
●● More on-board and station services.
Fig. 3. Inside first class cabin of high speed train in France
B.	 On The Eco-Friendly Atmosphere:
●● Transport is responsible for 25% of the world’s
carbon dioxide (Co2) emissions, with 80 – 90%
coming from cars and highway trucks, and only 2
% from rail.
●● On high-speed railways the energy consumption
per passenger-kilometer is three and half times less
than for a bus, five times less than for air and ten
times less than for a private car.
●● The social cost of noise, dust, carbon dioxide, nitric
oxide and sulfur oxide emission for high-speed rail
is one fourth of road transport and one-sixth for air.
●● It requires the construction of an eight-lane
highway to provide the same capacity as a double
track high-speed railway line [1].
Worldwide concerns over depleting fossil fuel
reserves, climate change, overcrowded airports, delayed
flights and congested roads have conspired with the
high speed rail technology as the only alternative.
High speed rail entails much less land usage than
motorways: a double track rail line has more than thrice
the passenger carrying capacity of a six-lane highway
while requiring less than half the land.
India is a relatively small country with a huge
population and it will be too costly to build highways
so high-speed rail network will be a better option to
improve transportation efficiency and to conserve the
depleting resources.
High speed rail network is the best choice for
distances of 500-700 km, where airlines cannot match;
below 200 km, road transport has an edge; beyond
1,000 km, air option may be better.
III.	Indian Government Context
In India, high speed trains are often referred to as “bullet-
trains”. One of the first proposals by the Government of
India to introduce high-speed trains was mooted in the
mid-1980s by then Railway Minister. A high speed rail
line between Delhi and Kanpur via Agra was proposed.
An internal study found the proposal unviable at that
time due to the high cost of construction and inability of
travelling passengers to bear much higher fares than what
was changed for normal trains. The Railways instead
introduced Shatabdi trains which ran at 130 km/h.
Fig. 4. Potential high speed rail corridors in India
The  Indian Ministry of Railways’ in its white-
paper Vision 2020  submitted to  the Parliament  on
December 2009 envisages the implementation of
regional high-speed rail projects to provide services at
250-350 km/h, and planning for corridors connecting
commercial, tourist and pilgrimage hubs. Six corridors
have already been identified and feasibility studies
have been started,
1.	 Delhi-Chandigarh-Amritsar, 
2.	 Pune-Mumbai-Ahmadabad,
24  HINDUSTAN JOURNAL, VOL. 6, 2013
3.	 Hyderabad-Dornakal-Vijayawada-Chennai, 
4.	 Howrah-Haldia, 
5.	 Chennai-Bangalore-Coimbatore-Ernakulam, 
6.	 Delhi-Agra-Lucknow-Varanasi-Patna.
These high-speed rail corridors will be built as
elevated corridors in keeping with the pattern of
habitation and the constraint of land.
Two new routes were later proposed by  Indian
Railways, namely 
●● Ahmadabad - Dwarka, via Rajkot, Jamnagar and
the other from  Rajkot to Veraval via Junagadh [4]
A.	 Approach to High-Speed
Indian Railways’ approach to high-speed is on
incremental improvement on the existing conventional
lines for up to 200 km/h, with a forward vision of speed
above 250  km/h on new tracks with state-of-the-art
technology.
B.	 Upgrade Tracks for 160-200 Km/H
The approach is to upgrade the dedicated passenger
tracks with heavier rails, and build the tracks to a close
tolerance geometry fit for 160-200 km/h. High-speed
tracks to be maintained and inspected using automation
to ensure required track geometry. There is a need
to perform more frequent inspection to ensure high
confidence of safety at high-speed.
C.	 Likely Initial Lines
In India, trains in the future with speed of 250-350 km/h,
are envisaged to run on elevated corridors, to prevent
trespassing by animals and people. This is an excellent
way to isolate high-speed train tracks.
D.	 Project Execution
The cost of building high speed rail tracks is about Rs
70 crore/km (U$15.6m/km), compared with Rs 6 crore/
km of normal rail tracks.
E.	 High Speed Rail Corporation of India Ltd
Indian Railways set up a corporation called High Speed
Rail Corporation of India Ltd (HSRC) in July 2012 that
will exclusively deal with the proposed ambitious high
speed rail corridor projects. It will handle tendering,
pre-feasibility studies, awarding of contracts and
execution of the projects. All high-speed rail lines will
be implemented through public private partnership
(PPP) mode on a Design, Build, Finance, Operate and
Transfer (DBFOT) basis.
IV. Prospect of High Speed Train Operation
in India
Mumbai – Ahmadabad rail line is likely to be the
first high speed rail network project in India which
the central government plans to take in the next five
year plan. Central Government is likely to make
some important announcements on this project in
the upcoming Budget session of the Parliament,
and the state government of Maharashtra is keeping
its fingers crossed as till now the share between
the centre and the state government is yet to be
announced.
Both France and Japan Governments have shown
interest in this line which covers a distance of 500
kilometers (312 miles) and expected to cost around
Rs.65,000 crores. Both the governments have taken a
feasibility study and are likely to submit the report by
March 2014. Both the governments are hopeful, that
their technology will be utilized in building this high
speed rail network. Their feasibility study includes
defining “high speed” for India (which could be 300-
350 km per hour), the fares and the finance practices,
including public-private partnerships.
On the technology front, what separates the French
high-speed train technology from the Japanese, who
pioneered the system, is that TGV trains of France
could be operated at a normal speed (160 kmph), and
on special sections, shifted to peak speeds. This made
it possible to integrate them easily with the existing
railways. Costs are high for such systems but when
supplied with cheap Indian labor the total cost will
come down drastically.
Fig. 5. Rail link from Mumbai to Ahmadabad
KARTHIGEYAN:A CASE FOR THE DEVELOPMENT OF HIGH SPEED RAIL  25
The quickening pace of commercial co-operation
comes with India and Japan -- both democracies
-- eyeing the rise of China with increasing unease,
as Beijing presses territorial claims with growing
insistence [5]
With this regard, Japan has already submitted its
final report of the feasibility study on upgrading the
speed of the existing Mumbai-Ahmadabad route to
160-200 km per hour and further consultations on the
report between the two countries are on.
V.  Benefits in The Indian Context
In India, out of all the benefits, discussed earlier,
the reduced journey time has been the overriding
consideration in the adoption of high-speed rail work.
On the basis of the current experiences in the world, it
has been observed that when the distances are between
300 to 600 Km, and the travel time by the high-speed
train is less than 2 – 2.5 hours, the market share of
passengers for the high-speed rail is at least 75-80%.
This percentage decreases dramatically when the travel
time of train increases to 4 to 5 hours and a round trip
during the day is not possible.
High speed train operation will play a significant
role in the de-congestion of megalopolis towns of
Delhi, Kolkata, Mumbai, Chennai, etc. Operationally,
high-speed trains can optimally connect cities 500 to
1,000 km apart, and in one of the best-known sectors,
Paris-Lyon, the peak capacity is 12,000 passengers per
hour at 1,000 people per train, providing service once
in four minutes.
VI. Conclusion
Once the Indian government decides, it should not take
more than 4-5 years to have high-speed trains running
on Indian soil. The benefits for a common man will be
like,
●● With less than one hour of journey time, it will
then be possible to live in the salubrious climate of
Chandigarh and commute to Delhi for work.
●● A bullet train between Bangalore and Mysore
(about 88 miles) will decongest Bangalore and
one can reach Mysore in 30 minutes. This train
will bridge the travel time between Bangalore and
Mysore and pave way for their development as
twin cities.
●● High-speed rail lines from Bangalore to Chennai
(180 miles) are also under discussion by the
Government of India.  Then we might reach
Chennai within an hour from Bangalore by the
surface transport. [6]
References
[1]	 Mundrey, “Tracking for High speed trains in
India”, January, 2010, RITES Journal.
[2]	 http://zeenews.india.com/news/world/china-s-
high-speed-bullet-train-network-exceed-10-000-
km_879426.html
[3]	 http://www.globalresearch.ca/eurasian-economic-
boom-and-geopolitics-china-s-land-bridge-to-
europe-the-china-turkey-high-speed-railway
[4]	 http://www.mapsofindia.com/railways/high-
speed-rail-corridors.html
[5]	 http://www.ibtimes.com/next-stop-bangalore-
japan-may-help-south-india-build-high-speed-
rail-system-1408542
[6]	 http://www.indianexpress.com/news/india-japan-
to-study-highspeed-rail-feasibility/1134280/
HINDUSTAN JOURNAL, VOL. 6, 2013
HMAC Filtering Scheme for Data Reporting in
Wireless Sensor Network
E. Kodhai, P. Bharathi and D. Balathiripurasundari
Abstract —Wireless SensorNetworks consist of a large
number of small sensor nodes, high processing power,
limited in usage of efficient security mechanisms and
susceptible to possible node compromise, passive
and active attacks. These restrictions make them
extremely vulnerable to a variety of attacks. Mostly
public key cryptographic techniques are found to be
more work prone with the secure exchange of keys,
mainly lengthy hash operations with high processing
rounds etc. Even though these techniques do not
provide adequate verification process of reports from
source to sink, they do not completely mitigate false
report injection attacks and Denial of Service attacks.
In this work we propose a HMAC’ed filtering scheme
for secure transmission of data and we propose a
technique called encryption of combined hashes which
filters bogus reports and then specifically addresses
false report injection attacks and Denial of Services.
It has three phases which are Key Pre-distribution,
Key Dissemination and Report Forwarding Phase.
The legitimacy of the report being forwarded by the
cluster head is collectively endorsed by a preset value
and achieved by Message Authentication codes. In
our proposed scheme the increase in performance is
achieved through control messages, increasing secure
datatransmissionandaddressingfalsedatareports.1,2
Index Terms — Wireless Sensor Network, mobile
relay nodes, wireless routing, bandwidth, energy
consumption.
E. Kodhai and P. Bharathi are in Department of
Information Technology, Sri Manakula Vinayagar
Engineering College, Pudhucherry, India. (e-mail:
kodhaiej@yahoo.co.in, bharathyit3@gmail.com)
D. Balathiripurasundari is in DotNet TCS Corporate,
Chennai. (e-mail: bala10.12.1990@gmail.com.)
I.  Introduction
Sensor networks are dense wireless networks which
are small in size, very low-cost and which collect and
disseminate environmental data. Wireless Sensor
Networks (WSNs) facilitates monitoring and controlling
of physical environments from remote locations with
better accuracy. They have applications in a various
fields such as environmental usage, military requirement
and gathering sensing information in inhospitable places.
Sensor nodes have various energy and calculating
constraints because of their inexpensive nature and ad
hoc method of deployment.
The number of nodes in a WSN is usually much
larger than that in an ad hoc network. Sensor nodes
are more resource constrained in terms of power,
computational capabilities, and memory. Sensor nodes
are typically randomly and densely deployed (e. g., by
aerial scattering) within the target sensing area. The post-
deployment topology is not predetermined. Although in
many cases the nodes are static in nature, the shape and
size might change frequently because the sensor nodes
and the wireless channels are prone to failure.
II.  System Model
Some of the existing schemes for Filtering False
Reports in WSN are Statistical En-route Filtering
(SEF), Interleaved hop-by-hop authentication (IHA)
and Providing Location aware End- to-End Data
Security (LEDS). The details of these techniques are
discussed briefly in the following sub-sections.
A.  Statistical En-route Filtering (SEF)
Ye et al. [12] proposed a statistical En-route filtering
(SEF) scheme based on probabilistic key distribution.
KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  27
In SEF, a global key pool is divided into n partitions,
each containing m keys. Every node randomly picks k
keys from one partition. When some event occurs, each
sensing node (that detects this event) creates a Message
Authentication Code (MAC) for its report using one
of its random keys. The cluster-head aggregates the
reports from the sensing nodes and guarantees each
aggregated report contains T MACs that are generated
using the keys from T different partitions, where T is a
predefined security parameter. Given that no more than
T-1 nodes can be compromised, each forwarding node
can detect a false report with a probability proportional
to 1/n. The filtering capacity of SEF is independent
of the network topology, but constrained by the value
of n. To increase the filtering capacity, we can reduce
the value of n , however, this allows the adversaries to
break all partitions more easily. In addition, since the
keys are shared by multiple nodes, the compromised
nodes can impersonate other nodes and report some
forged events that “occur” in other clusters.
B.  Interleaved Hop-By-Hop Authentication (IHA)
Zhu et al. [13] proposed an interleaved hop by hop
authentication (IHA) scheme. In this scheme, the
base station periodically initiates an association
process enabling each node to establish pair wise
keys with other nodes that are t+1 hops away, where
t is called the security threshold value. In IHA, each
sensing node creates a MAC using one of its multihop
pairwise keys, and a legitimate report should contain
t+1 distinct MACs. Since every multihop pairwise
key is distinguishable, IHA can tolerate up to t level
compromised nodes in each cluster instead of in the
whole network as SEF does. However, IHA requires
a fixed path for transmitting control messages between
the base station and each cluster-head, which cannot
be assured by some routing protocols such as GPSR
and GEAR. Moreover, the high communication
overhead incurred by the association process makes
IHA unsuitable for networks whose topologies change
frequently.
C.  Providing Location Aware End- To-End
Data Security
Providing Location aware End-to-End Data Security
(LEDS) design overcomes the limitations of the existing
hop-by-hop security paradigm and achieves an efficient
and effective end-to-end security paradigm in WSN. It
exploits the static and location-aware nature of WSNs,
and proposes a novel location-aware security approach
through two seamlessly integrated building blocks: a
location-aware key management framework and an
end-to-end data security mechanism. In this method,
each sensor node is implemented with several types of
balanced secret keys, some of which are intended to
provide end-to-end data confidentiality, and others are
to provide both end-to-end data authenticity and hop-
by-hop authentication. All the keys are measured at
each sensor node independently from keying materials
pre-loaded before network deployment and the location
information is obtained after network disposal, without
inducing new communication overhead, for shared key
establishment.
III.  Problem Definition
Each of the existing schemes for Fig. 1. Statistical
En-route Filtering (SEF), interleaved hop-by-hop
authentication (IHA) and Providing Location aware
End- to-End Data Security address false report
injection attacks and or DoS attacks. However they all
have some constraints. SEF is independent of network
shape and size, but it has a limited number of filtering
capacity and cannot prevent impersonating attacks on
legitimate nodes. IHA has a drawback, that is, it must
periodically establish multihop pair wise keys between
nodes. Further, it refers to a located path between the
base station and each cluster-head to transmit messages
in both directions, which cannot be assured due to the
dynamic topology of sensor networks or due to the use
of some underlying routing protocol.
LEDS utilizes location-based keys to filter false
report. It assumes that sensor nodes can determine
their locations in a short period of time. However, this
is note practical approach, because many localization
approaches take quite long and are also vulnerable
to malicious attacks. It also tries to address selective
forwarding attacks by allowing a whole cell of nodes
to forward one report; however, this incurs high
communication overhead.
Later, we have discussed the routing protocol
AODV on which the proposed scheme is to be
executed. AODV takes care of the route discovery
and maintenance process thereby easing the proposed
scheme to concentrate on the En-route filtration
28  HINDUSTAN JOURNAL, VOL. 6, 2013
capacity and the mitigation of false report injection
attacks and DoS attacks.
IV.  Design
A.  Introduction
In this chapter we describe our proposed security scheme
calledHMAC’edFilteringSchemeforDataDissemination
in WSN. This scheme addresses false report injection
attacks and DoS attacks such as Selective forwarding
and Report disruption in WSN. The multifunctional key
management framework is used in this scheme which
involves authentication keys. Similar to SEF and IHF
discussed in section 3 our proposed En-route filtering
scheme also uses the key distribution mechanism
employed in WSN. Unlike other schemes which either
lack strong filtering capacity or cannot support highly
dynamic sensor networks, our scheme uses a hash chain
of authentication keys which are used to endorse reports.
Meanwhile, a legitimate report should be authenticated by
a certain number of nodes. First each node disseminates its
key to forwarding nodes. Then, after sending reports, the
sending nodes disclose their keys, allowing the forwarding
nodes to verify their reports. It can be explained with the
help of the following figure 1.
Fig. 1. Key Derivation
Under this scheme control messages are used
to disseminate and disclose the keys to forwarding
sensor nodes and later allow nodes to verify the keys
by decrypting them and finding a shared secret key. To
accomplish this every sensor node maintains 2 secret
key pools and a seed key. A series of authentication
keys can be derived from this seed key when there is
a need. Hence when a shared secret key is found its
corresponding authentication keys are derived and
stored in the memory of sensor nodes. Thus the keys
selected randomly from the key pools are used to
encrypt the authentication keys which are collectively
used for producing MAC of the report and later used
for the report’s collective endorsement.
B.  Problem Formulation
The vast targeted terrain where the sensor nodes are
deployed is divided into multiple cells after network
deployment. We assume that sensor nodes within a cell
form a cluster which contains n nodes. In each cluster
of a cell a node is randomly selected as a cluster head
as in figure 2. When an event of interest happens in any
of these cells, the sensing nodes of that particular cell
detects the event and broadcasts it to the cluster head.
The cluster head aggregates the reports and forwards
the aggregated report through the report authentication
area down to the sink. The topologies of WSNs change
frequently either because nodes are prone to failure or
because they need to switch their states between Active
and Sleeping for saving energy. As sensor networks
are not tamper-resistant, it can be compromised
by adversaries. Each cluster may contain some
compromised nodes, which may in turn collaborate
with each other to generate false reports by sharing the
secret key information. In this project work we intend
to provide solutions for attacks like bogus data injection
and denial of services (selective forwarding attack 
report disruption) that can be launched by adversaries
to degrade node’s life time and the critical information
carried by them.
Fig. 2. Cluster Formation and report forwarding
Route to Sink
We consider
N- Total no. of nodes present in the targeted terrain
n- Average no. of nodes in each cell
KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  29
l- Size of the cell
t- no. of correct endorsements to validate a report
x- no. of compromised nodes in a cell
Cluster head intimates events to sink periodically
and finds a routing path called Report Forward Route.
We consider that x nodes inject malicious data to
reports periodically to drain out battery life. These x
nodes inject bogus data by simply offering a wrong
MAC to the collective endorsement. Due to the wrong
MAC in t endorsements the legitimate event report has
the possibility of being dropped by a legitimate node
or even a legitimate report share can be dropped by
an adversary near to the sink which is called Report
Disruption attack. When multiple clusters disseminate
keys at the same time, some forwarding nodes need to
store the authentication keys of different clusters. Hence
the nodes closer to the base station need to store more
authentication keys than others do because they are
usually the hot spots and have to serve more clusters.
Our aim is thus to mitigate the false data injection at
early route with minimal overhead, improved network
life time, confidentiality and authentication.
C.  Design of the Project
There are 3 phases involved in the project and the
relationships between them are shown in figure 3.
Fig. 3. Relationship between phases
When an event occurs within some cluster, the
cluster-head collects the sensing reports from sensing
nodes and aggregates them into the aggregated reports.
Then, it forwards the aggregated reports to the base
station through a set of forwarding nodes. In our
scheme, each sensing report contains one MAC that
is produced by a sensing node using its authentication
key (called auth-key for short), while each aggregated
report contains distinct MACs depending upon the
number of the cluster members.
In our scheme, each node possesses a sequence
of auth-keys that form a hash chain. Before sending
the reports, the cluster-head disseminates the first
auth-keys of all nodes to the forwarding nodes that are
located on multiple paths from the cluster-head to the
base station. The reports are organized into rounds,
each containing a fixed number of reports. In every
round, each sensing node chooses a new auth-key to
authenticate its reports.
To facilitate verification of the forwarding nodes,
the sensing nodes disclose their auth-keys at the end of
eachround.Meanwhile,topreventtheforwardingnodes
from abusing the disclosed keys, a forwarding node can
receive the disclosed auth-keys, only after its upstream
node overhears that it has already broadcast the reports.
Receiving the disclosed keys, each forwarding node
verifies the reports, and informs its next-hop node to
forward or drop the reports based on the verification
result. If the reports are valid, it discloses the keys to its
next-hop node after overhearing.
Fig. 4. Overall process of key distribution and Report For-
warding
The processes of verification, overhearing, and
key disclosure are repeated by the forwarding nodes
as shown in figure 4 at every hop until the reports are
dropped or delivered to the base station. Specifically,
our scheme can be divided into three phases: (i) key
pre-distribution phase, (ii) key dissemination phase,
and (iii) report forwarding phase. In the key pre-
30  HINDUSTAN JOURNAL, VOL. 6, 2013
distribution phase, each node is preloaded with a
distinct seed key from which it can generate a hash
chain of its auth-keys. In the key dissemination phase,
the cluster-head disseminates each node’s first auth-
key to the forwarding nodes, which will be able to filter
false reports later. In the report forwarding phase, each
forwarding node verifies the reports using the disclosed
auth-keys and disseminated ones. If the reports are
valid, the forwarding node discloses the auth-keys
to its next-hop node after overhearing that node’s
broadcast. Otherwise, it informs the next-hop node to
drop the invalid reports. This process is repeated by
every forwarding node until the reports are dropped or
delivered to the base station.
D.  Algorithm
STEP 1: Cluster Head (CH) collects sensing reports as
in figure 4, from sensor nodes and generates a
number of aggregated reports.
R1, R2, R3
CH sends these aggregated reports plus an OK
message to next hop υj.
Aggregated report must contain t Message
Authentication Codes (MACs) from each sensing node
with a distinct Z key. Aggregated report R looks as
follows.
R={r(υi1
),...,r(υit
)}.
where υi1
,...,υit
denote t sensing nodes.
Since every sensing node reports the same event
information E, only one copy of E is kept in the
aggregated report R.
STEP 2: Receiving the aggregated reports and OK,
υj forwards them to next hop, υj +1. CH
overhears the broadcast of aggregated reports
from υj.
STEP 3: Overhearing the broadcast from υj, the CH
discloses the authentication keys to υj by
message K (t)
K(t) = {Auth(υi1
),..., Auth(υit
)}
where K (t) contains authentication keys of υi1
,...,υit
.
It has the same format as K (n), but contains only t
authentication keys.
where K (n) is the authentication message collected by
CH from the sensing nodes and aggregated to K (n).
STEP 4: Receiving K (t), υj first checks the authenticity
of disclosed keys using the disseminated ones
that it decrypted from K (n) earlier. Then,
it verifies the integrity and validity of the
reports by checking the MACs of the reports
using the disclosed keys.
V.  Verification Process
1.	 To verify the validity of K (t), υj checks if K (t) is
in correct format and contains t distinct indexes of
z- keys (secret keys picked randomly from global
key pool Z). If not, it drops K (t).
2.	 To verify the authenticity of the authentication
keys in K (t), υj checks if each authentication
key it stored can be generated by hashing a
corresponding key in K (t) in a certain number of
times. If not, it is either replayed or forged and K
(t) should be dropped.
3.	 To verify the integrity and validity of reports R1,
R2… υj checks the MACs in these reports using
the disclosed authentication key that it decrypts
from K (t).
STEP 5: If the reports are valid, υj sends an OK
message to υj +1. Otherwise it informs υj +1
to drop invalid reports.
STEP 6: Similar to step 2, υj +1 forwards the reports
to next hop.
STEP 7: Similar to step 3, after overhearing the
broadcast from υj +1, υj discloses K (t) to υj
+1.
STEP 8: Every forwarding node repeats step 4 to step
7 until the reports are dropped or delivered to
the base station.
VI.  Simulation Results
A.  Introduction
In this section, we will start with an introduction to the
simulation tool called NS-2, the ways of configuring it
KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  31
to run sensor networks, and implementation details of
the Enroute filtering scheme.
B.  Simulation Tool
NS-2 is an event driven network simulator developed at
University of California at Berkeley, USA, as a REAL
network simulator projects in 1989 and was developed
with the cooperation of several organizations. NS is not
a finished tool that can manage all kinds of network
model. It is actually still an on-going effort of research
and development.
NS is a discrete event network simulator where the
timing of events is maintained by a scheduler and able
to simulate various types of network such as LAN and
WPAN according to the programming scripts written
by the user. Besides that, it also implements a variety of
applications, protocols such as TCP and UDP, network
elements such as signal strength, traffic models such as
FTP and CBR, router queue management mechanisms
such as Drop Tail and many more.
There are two languages used in NS-2; C++
and OTcl (an object oriented extension of Tcl). The
compiled C++ programming hierarchy makes the
simulation efficient and execution times faster. The
OTcl script which is written by the users models the
network with its own specific topology, protocols and
all requirements needed. The form of output produced
by the simulator also can be set using OTcl. The OTcl
script is written creating an event scheduler object and
network component object together with network setup
helping modules. The simulation results produced after
running the scripts can be used either for simulation
analysis or as an input to graphical software called
Network Animation (NAM).
Configuration of sensor network simulations:
Setting up a sensor network in NS-2 follows the same
format as mobile node simulations. Places where
sensor network simulations differ from a mobile node
simulation are listed below.
1.	 Configuration of Phenomenon channel and Data
channel.
2.	 Configuration of Phenomenon nodes with the
PHENOM “routing” protocol.
3.	 Configuration of Phenomenon node’s pulse rate
and phenomenon type.
4.	 Configuration of Sensor nodes.
5.	 Attaching sensor agents.
6.	 Attaching UDP agent and sensor application to
each node.
7.	 Starting the Phenomenon node.
8.	 Starting the Sensor Application.
Implementation Details Of HMAC’ed Filtering
Scheme
Implementation Of Md5 Hashing Technique
MD5 Hashing technique is used to produce hash of the
sensor report. To accomplish this task MD5 algorithm
is implemented in tcl script for NS-2 simulation. The
steps describing its process are listed below
1.	 Append the padding bits
2.	 Append length
3.	 Initialize the Message Digest buffer
4.	 Process the message in 512 bit blocks
5.	 Resultant 128 bit Message Digest.
Implementation of Key Comparison Process and
Report Delivery
As the reports are sent in rounds containing distinct n
number of reports, it is not needed to send the whole
K (t) which contains all the first authentication keys
of the sensor nodes. Instead we can send alone the n
number of t authentication keys which will now enable
faster deciphering of the MAC-ed reports. In order to
filter the false packets at the earlier route, this K (n) is
discarded in the nodes nearer to the sink. The above
said process is accomplished in the following ways.
Keys are randomly picked up from a matrix and they
are used for producing HMAC of the report. The cluster
head now receives all the first authentication keys from
the cluster members packs them in K (n) and sends to
the Report forwarding nodes.
The Cluster members sense the events and produce
HMAC of the report and then send them collectively
32  HINDUSTAN JOURNAL, VOL. 6, 2013
to Cluster Heads. The Cluster head now collectively
endorses the received HMAC’s with the preset value.
The comparison of keys in K(n) and the key obtained
from HMAC ’ed report are verified and forwarded by
the cluster heads to their one hop report forwarding
nodes. When the HMAC offered by a sensor node is
found to be illegitimate, i. e. , if the key found in the
HMAC is different from the collectively endorsed
report, cluster head marks node as attacker which is
shown in Figure 5.
Fig. 5. Identification of Attacker through collective
endorsement
Implementation of Collective Endorsement of Sensor
reports.
Sensor reports are HMACed as the result of HMAC
algorithm implemented in TCL script with the keys
randomlypickedupfromtheassignedkeymatrix.Those
reports are further divided into small authenticated
shares in the range of 16 bytes each and are sent in
rounds from the cluster members to the cluster head in
order to prevent Report disruption attack.
A report disruption attack when launched by an
attacker will make the complete legitimate share of
sensor report abruptly dropped by a legitimate cluster
head by simply offering an illegitimate MAC to the
collective share. Hence through collective endorsement,
the whole sensor reports are further divided into small
authenticated shares such that even when an attacker
offers illegitimate HMAC, the cluster head will be able
to recover the complete collective share with the help
of legitimate shares received from its members.
Simulation Environment
The proposed secure scheme of Dynamic enroute
filtering is implemented in NS-2.27 simulator. The
simulation consists of 24 sensor nodes out of which
4 nodes in green color are cluster heads; some nodes
are configured to be attackers and a base station. The
network is randomly deployed in a terrain dimension
of 600m X 600m with the following simulation
environment shown in Table 1.
Table 1. Simulation Environment
PARAMETER VALUE DESCRIPTION
Channel
Channel/Wireless
channel
Channel Type
Propagation
Propagation/Two
Ray Ground
Radio Propagation
Model
Network Interface Phy/WirelessPhy
Network Interface
Type
MAC Mac/802_11
Medium Access
Control Type
Interface Queue Queue/Drop Tail
Interface Queue
Type
Link Layer LL Link Layer
Antenna
Antenna/Omni
Antenna
Antenna Model
Interface Queue
Size
5000(in packets)
Maximum packet
in interface Queue
Routing Protocol AODV Routing Protocol
Data Rate 11Mbps Data Transfer Rate
Interface Queue
Size
50
Maximum packets
in Interface Queue.
Terrain Dimension 600m X 600m
Terrain Dimension
of the network
Simulation Time 100 Seconds
Total duration of
the simulation
Packet Size 1026Bytes
Size of the CBR
traffic packet
Number of Nodes 25
Number of nodes
in the Scenario
Energy Model
Reception- rx
Power 0. 3(J/bits)
Transmission- tx
Power 0. 5(J/bits)
Power
Consumption
Model
KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  33
Performance Metrics  Evaluation
The performance metrics are used to measure the
performance of the proposed system.
Filtering capacity
Filtering capacity of the proposed scheme is defined
as the average number of hops that a false report can
be detected by the forwarding node at every hop or
the fraction of number of false reports filtered to the
number of hops travelled.
Energy savings
Energy savings of the proposed scheme is defined as the
energy consumption in transmission, reception and the
computations due to the extra fields which incur extra
overhead. We evaluate the length of a normal report
without using any filtering scheme and then compare
the length of an authenticated report in the next phases
of the review.
Performance metrics determine the performance
of a particular scheme in the presence of constraints
related to domain oriented advantages and drawbacks.
We have evaluated our Enroute mechanism in terms of
throughput and packet loss.
Packet loss
Mobility-related packet loss may occur at both the
network layer and the MAC layer. When a packet
arrives at the network layer, the routing protocol
forwards the packet if a valid route to the destination
is known. Otherwise, the packet is buffered until a
route is available. A packet is dropped in two cases: the
buffer is full when the packet needs to be buffered and
the time that the packet has been buffered exceeds the
limit. It can be evaluated with the formula given below.
Packet Loss (in packets) = DataAgtSent − DataAgt
Rec
where AGT– agent trace (used in new trace file
format)
Scenario: Packet Loss Vs Number of Attacker nodes:
Same scenario is maintained in which Packet loss
is computed by varying the number of attackers. As
shown in Figure 6, packet loss seems to be very high
when there is increase in the attacker’s count. Attackers
try to launch selective forwarding attack, report
disruption attack and false report injection attack in
which the total availability requirement of the critical
information is lost leading to total energy drain of the
resource constrained sensor nodes or false positives or
false negatives intimation at the base station. Under this
state the malicious node drops all the packets from a
selective node or selective packets from a node leading
to a huge packet loss in the network as discussed in
the Threat and Trust model of section 2. With Enroute
Filtering mechanism packet loss is reduced to 40%
which is achieved by the identification of attacker
nodes through collective endorsement implemented in
the cluster heads.
Fig. 6. Packet Loss Vs Number of Attacker node
VII. Conclusion
A major challenge for a Wireless Sensor Network lies
in the energy constraint at each node, which poses
a fundamental limit on the network life time. Even
though there are many enroute filtering schemes
available in the literature they either fail to support the
dynamic nature of the sensor networks or they cannot
efficiently mitigate the adversary’s activities. Hence
this enroute filtering scheme is currently an area of
much research among the security professionals.
Generally AODV performs better than many other on-
demand protocols under high mobility, large network
scenarios. When the size of the network is large and
highly mobile the frequency of the link failure is
also high. Due to this, latency and control load of the
network is also increased. Also due to the attacker’s
34  HINDUSTAN JOURNAL, VOL. 6, 2013
single illegitimate MAC there is a threat of dropping
the complete legitimate share.
In this work, we propose a HMAC’ed filtering
scheme for WSN that utilizes the dissemination of
authentication keys for filtering false data injection
attacks and DoS attacks. In our scheme, each node
uses its own authentication keys to authenticate the
reports and a legitimate report should be endorsed by
t nodes. The authentication keys of each node form a
hash chain and are updated in each round. The Enroute
scheme also yielded a better attacker detection and
mitigation framework together with disseminated
key structure. We thus analyzed the performance
metrics of the Enroute Filtering scheme with AODV
protocol in terms of Throughput and Packet Loss and
the results are also discussed. In future we intend
to compare the performance of Enroute Filtering
Scheme implemented with the security protocols such
as SPINS etc.
References
[1]	 Yun Zhou, Yuguang Fang, and Yanchao Zhang,
“Securing wireless sensor networks: a survey”,
IEEE Communications Surveys  Tutorials, Vol.
10, No. 3, pp. 6-28, 2008.
[2]	 Al-Sakib Khan, Pathan,Hyung-Woo Lee, and
Choong Seon Hong, “Security in Wireless Sensor
Networks: Issues and Challenges”, International
Conference on Advanced Computing
Technologies, Vol. 4, No. 1, pp. 1043-1045,
2006.
[3]	 Zoron S. Bojkovic, Bojan M. Bakmaz, Miodrag,
and R. Bakmaz, “Security Issues in Wireless
Sensor Networks”, International journal of
Communications, Vol. 2, no. 1, pp. 106-114,
2008.
[4]	 Karlof and D. Wagner, “Secure Routing
in Wireless Sensor Networks: Attacks and
Countermeasures,” Proceedings of First IEEE
International Workshop of Sensor Network
Protocols and Applications, Vol. 1, pp. 113-127
2003.
[5]	 H. Fang, F. Ye, Y. Yuan, s. Lu, and W. Arbaugh,
“Toward resilient security in wireless sensor
networks”, proceeding of ACM international
symposium on Mobile ad hoc networking and
computing, Vol. 3, pp. 14-27, 2003.
[6]	 F. L. Lewis “Wireless Sensor networks”
Available: http://arri. uta. edu/acs
[7]	 G. Padmavathi and Mrs. D. Shanmugapriya,
“A Survey of Attacks, security mechanisms
and challenges in wireless sensor networks”,
International Journal of Computer science and
Information Security, Vol. 4, No. 1, pp. 1-9,
2009.
[8]	 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam,
and E. Cayirci, “A survey on sensor networks,”
IEEE Communication Magazine, Vol. 40, No. 8,
pp. 102–114, 2002.
[9]	 Hemanta Kumar Kalita, and Avijit Kar, “Wireless
Sensor Network Security Analysis” International
journal of Next-Generation Networks, Vol. 1, no.
1, pp. 1-10, 2009.
[10]	 Elaine shi and Adrian perrig, “Designing
secure sensor networks”, IEEE wireless
communications, Vol. 2 pp. 38-43, 2004.
[11]	 Haowen Chan, Adrian Perrig, and Dawn
Song, “Random Key Pre distribution Schemes
for Sensor Networks”, Proceedings of IEEE
Symposium on Security and Privacy, Vol. 3, pp.
1-17, 2003.
[12]	 F. Ye, H. Luo, S. Lu, and L. Zhang “Statistical
En-route detection and filtering of injected false
data in sensor networks,” Proceedings of IEEE
INFOCOM, Vol. 4, pp. 2446–2457, 2004.
[13]	 S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An
interleaved hop-by-Hop authentication scheme
for filtering of injected false data in sensor
networks,” Proceedings of IEEE Symposium on
Security and Privacy, Vol. 4, pp. 259–271, 2004.
[14]	 Kui Ren, Wenjing Lou, and Yanchao Zhang,
“LEDS: Providing Location-aware End-to-end
Data Security in Wireless Sensor Networks”,
Proceedings of the 25th
IEEE International
Conference on Computer Communications pp.
1-12, 2006.
[15]	 Fasee Ullah, Muhammad Amin, and Hamid
ul Ghaffar, “Simulating AODV and DSDV
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6
Hindustan_Journal_Vol-6

More Related Content

Similar to Hindustan_Journal_Vol-6

Isolation and Expression Analysis of Gene TAMYB1R40 during
Isolation and Expression Analysis of Gene TAMYB1R40 duringIsolation and Expression Analysis of Gene TAMYB1R40 during
Isolation and Expression Analysis of Gene TAMYB1R40 duringamir rahmani
 
RecentTrendsinCivilEngineering.pdf
RecentTrendsinCivilEngineering.pdfRecentTrendsinCivilEngineering.pdf
RecentTrendsinCivilEngineering.pdf
akhileshakm
 
International Journal of Engineering (IJE) Volume (4) Issue (1)
International Journal of Engineering (IJE) Volume (4) Issue (1)International Journal of Engineering (IJE) Volume (4) Issue (1)
International Journal of Engineering (IJE) Volume (4) Issue (1)CSCJournals
 
Chemical and Bioprocess Engineering
Chemical and Bioprocess EngineeringChemical and Bioprocess Engineering
Chemical and Bioprocess EngineeringShrikaant Kulkarni
 
NCCE Upcoming Event
NCCE Upcoming EventNCCE Upcoming Event
NCCE Upcoming Event
nehaseo
 
4th_International_Conference_on_Multidis.pdf
4th_International_Conference_on_Multidis.pdf4th_International_Conference_on_Multidis.pdf
4th_International_Conference_on_Multidis.pdf
oanh195679
 
4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...
RSIS International
 
icaset brochure_simple.pdf
icaset brochure_simple.pdficaset brochure_simple.pdf
icaset brochure_simple.pdf
ssuser7acfb8
 
Newsletter of October 2016 Final
Newsletter of October 2016 FinalNewsletter of October 2016 Final
Newsletter of October 2016 FinalShefali Sharma
 
Polytechnic Physics first semester 1.pdf
Polytechnic Physics first semester 1.pdfPolytechnic Physics first semester 1.pdf
Polytechnic Physics first semester 1.pdf
mohitchoudhary537020
 
enewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdfenewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdf
KaziTourDpense
 
enewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdfenewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdf
KaziTourDpense
 
Vol3 issue2 aug14 international journal of nanoscience and technology
Vol3 issue2  aug14  international journal of nanoscience and technologyVol3 issue2  aug14  international journal of nanoscience and technology
Vol3 issue2 aug14 international journal of nanoscience and technology
J.P.M. Institute
 
Raman's Effect.pptx
Raman's Effect.pptxRaman's Effect.pptx
Raman's Effect.pptx
KUNTAMALLASUJATHA
 
P1111350310
P1111350310P1111350310
P1111350310
Ashraf Aboshosha
 
Cv 2012 sm
Cv 2012 smCv 2012 sm
Jose R. Sanchez Perez May2015 v2
Jose R. Sanchez Perez  May2015 v2Jose R. Sanchez Perez  May2015 v2
Jose R. Sanchez Perez May2015 v2José R. Sánchez
 

Similar to Hindustan_Journal_Vol-6 (20)

Isolation and Expression Analysis of Gene TAMYB1R40 during
Isolation and Expression Analysis of Gene TAMYB1R40 duringIsolation and Expression Analysis of Gene TAMYB1R40 during
Isolation and Expression Analysis of Gene TAMYB1R40 during
 
RecentTrendsinCivilEngineering.pdf
RecentTrendsinCivilEngineering.pdfRecentTrendsinCivilEngineering.pdf
RecentTrendsinCivilEngineering.pdf
 
International Journal of Engineering (IJE) Volume (4) Issue (1)
International Journal of Engineering (IJE) Volume (4) Issue (1)International Journal of Engineering (IJE) Volume (4) Issue (1)
International Journal of Engineering (IJE) Volume (4) Issue (1)
 
Chemical and Bioprocess Engineering
Chemical and Bioprocess EngineeringChemical and Bioprocess Engineering
Chemical and Bioprocess Engineering
 
NCCE Upcoming Event
NCCE Upcoming EventNCCE Upcoming Event
NCCE Upcoming Event
 
4th_International_Conference_on_Multidis.pdf
4th_International_Conference_on_Multidis.pdf4th_International_Conference_on_Multidis.pdf
4th_International_Conference_on_Multidis.pdf
 
4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...4th international conference on multidisciplinary research & practice (4ICMRP...
4th international conference on multidisciplinary research & practice (4ICMRP...
 
icaset brochure_simple.pdf
icaset brochure_simple.pdficaset brochure_simple.pdf
icaset brochure_simple.pdf
 
Newsletter of October 2016 Final
Newsletter of October 2016 FinalNewsletter of October 2016 Final
Newsletter of October 2016 Final
 
Polytechnic Physics first semester 1.pdf
Polytechnic Physics first semester 1.pdfPolytechnic Physics first semester 1.pdf
Polytechnic Physics first semester 1.pdf
 
Resume Jiun-Ruey Chen
Resume Jiun-Ruey ChenResume Jiun-Ruey Chen
Resume Jiun-Ruey Chen
 
MS resume
MS resumeMS resume
MS resume
 
enewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdfenewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdf
 
enewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdfenewsletter_composite and smart-Mar 2023.pdf
enewsletter_composite and smart-Mar 2023.pdf
 
Vol3 issue2 aug14 international journal of nanoscience and technology
Vol3 issue2  aug14  international journal of nanoscience and technologyVol3 issue2  aug14  international journal of nanoscience and technology
Vol3 issue2 aug14 international journal of nanoscience and technology
 
Raman's Effect.pptx
Raman's Effect.pptxRaman's Effect.pptx
Raman's Effect.pptx
 
ICET 2016
ICET 2016ICET 2016
ICET 2016
 
P1111350310
P1111350310P1111350310
P1111350310
 
Cv 2012 sm
Cv 2012 smCv 2012 sm
Cv 2012 sm
 
Jose R. Sanchez Perez May2015 v2
Jose R. Sanchez Perez  May2015 v2Jose R. Sanchez Perez  May2015 v2
Jose R. Sanchez Perez May2015 v2
 

Hindustan_Journal_Vol-6

  • 1.
  • 2.
  • 3. Hindustan Journal A JOURNAL OF HINDUSTAN INSTITUTE OF TECHNOLOGY & SCIENCE CHENNAI, INDIA Vol. 6, 2013
  • 4. PUBLISHED BY Hindustan Group of Institutions 40, GST Road, St. Thomas Mount, Chennai – 600 016, Tamil Nadu, India. PATRONS: Dr. ANAND JACOB VERGHESE Mr. ASHOK VERGHESE EDITORIAL TEAM Chief Editor: Dr. R. DEVANATHAN Associate Editors: Ms. P. RANJANA & Ms. AL. VALLIKANNU English Editor: Dr. C. INDIRA PRINTED BY ARVIND ASSOCIATES, Chennai. © 2013. All rights reserved. No part of this publication may be produced, stored in retrieval system or transmitted in any form or by any means, electronic and mechanical, photocopying or otherwise without the prior permission of the publishers. The responsibility for information, opinions, and facts reported in these papers rests exclusively with the authors. REVIEW PROCEDURE Each manuscript is blind reviewed by subject specialists and by an English Editor. ii
  • 5. PANEL OF ADVISORS Dr. BVSSS PRASAD Professor of Mechanical Engineering, lIT, Madras Dr. S. SHANMUGAVEL Professor, Department of Electronics and Communication Engineering, Anna University. Chennai Dr. A. ALPHONES Associate Professor, Division of Communication Engineering School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore Dr. P. RAMESHAN Director & Professor (Strategic Management) lIM, Rohtak Dr. G.L. DUTTA Chancellor, K.L. University, Vijayawada Dr. HARSHA SIRISENA Emeritus Professor, Electrical & Computer Engineering, University of Canterbury, Chirstchurch, New Zealand. Dr. LAKMI JAIN Professor of Knowledge Based Engineering, Founding Director of the KES Centre, Electrical and Information Engineering, University of South Australia, Adelaide. Dr. PAULAPPASAMY Honorary Professor, Madras School of Economics, Chennai. Dr. N. GANAPATHI SUBRAMANIAM Professor , Quantum - Functional Semiconductor Research Center, Dongguk University, Republic of Korea PANEL OF REVIEWERS APPLIED SCIENCES Dr. C.Indira Dr. K.Nithyanandam Dr. I.Sasirekha BUILDING SCIENCES Dr. V.Subbiah Dr. R.Angeline Prabhavathy Dr. Ravikumar Bhargava Dr. Jessy Rooby Dr. P.S.Joanna Dr. Sheeba Chander COMPUTING SCIENCES Dr. Anitha S. Pillai Dr. Rajeswari Mukesh Dr. E.R.Naganathan Dr. S.Nagarajan Ms. P.Ranjana Ms. S.Lakshmi Sridevi Ms. S.Vijayalakshmi ELECTRICAL SCIENCES Dr. R.Devanathan Dr. M.J.S.Rangachar Dr. A.K.Parvathy Dr. P.M.Rubesh Anand Ms. Manjula Pramod MECHANICAL SCIENCES Dr. D.G.Roy Chowdhury Dr. B.Venkataraman Dr. G.Ravikumar Solomon Dr. T.Jeyapovan Dr D.Dinakaran Dr. Hyacinth J. Kennady Dr. A.Anitha iii
  • 6. Scanning the Issue The current issue of Hindustan Journal provides articles of varied interest to readers. In the area of Building Sciences, the paper by Karuppiah and Angeline Prabhavathy discusses the prospect of shear strengthening of reinforced concrete beams using carbon fiber reinforced polymer. Nagarajan and Ravi K. Bhargava analyse the role of trees and plants in the hospital premises in order to improve the well- being of recuperating patients. Thulasi Gopal provides an analysis of the design of an Integrated Silk Park at Kanchipuram to bring back its lost glory. Karthigeyan argues the case for the speedy implementation of high speed rail links in India citing the successful story of high speed trains in China. Under the section on Computing Sciences, Kodhai, Bharathi and Balathiripurasundari propose a filtering scheme for wireless sensor networks to address bogus reports, false report injection attacks and denial of services. Thiyagarajan, Rasika, Sivasankari and Sophana Jennifer propose an artificial neural network based anomaly detection techniquetodetectchangesinmedicalreading in a patient monitoring system. SreeVidhya proposes a new fuzzy clustering algorithm which can handle efficiently outlier as well as natural data. Deeptha and Rajeswari Mukesh propose a genetic algorithm based selection model to improve the quality of service performance in the context of web services development. Under the section on Electrical Sciences, the paper by Priya and Seshasayanan proposes a method to improve the efficiency of impulse noise detection techniques in images. Prakash and Kumaraguru Diderot explain and review the commonly used cyclic redundancy checking algorithm for verifying data integrity. Helen and Arivazhagan propose the use of temporally ordered routing algorithm along with medium access control to overcome bandwidth limitation. UnderthesectiononMechanicalSciences, Jeya Pradha and Mahendran evaluate the evaporative heat transfer characteristics of a refrigerant mixture using computational fluid dynamics.RavikumarandSaravanandescribe the design and fabrication of a chilling system to reach a very low temperature to meet the requirements of specific applications. Viswanathan, Sengottuvel and Arun review the application of electrical discharge machine for the machining of hard materials. Under Education and Library Sciences, Aby Sam and Akkara Sherine eloquently discuss the role of community colleges in nation building and describe a success story to drive home their point. Bhaskaran Nair argues passionately the case for an integrated professional programme on teaching English as a second language. Boopalan, Nithyanandam and Sasirekha gaze at the crystal ball and wonder about the future role of the librarian in an information era. Finally, we conclude the issue with a list of forthcoming conferences for the benefit of our readers. Dr. R.DEVANATHAN Chief Editor iv
  • 7. Contents BUILDING SCIENCES Shear Strengthening of RC Beam Using Carbon Fiber Reinforced Polymer Sheet 1 Pl. Karuppiah and R. Angeline Prabhavathy. A Qualitative Research on the Role of Landscape Architecture in and around Hospital Premises as an Aid to Medical Treatment in Chennai 7 R. V. Nagarajan and Ravi K. Bhargava A Research on Nuances of Silk Weaving and Designing a Handloom Hub at Kanchipuram 15 Ar . Thulasi Gopal A Case for the Development of High Speed Rail Link in India 21 D. Karthigeyan COMPUTING SCIENCES HMAC Filtering Scheme for Data Reporting in Wireless Sensor Network26 E.Kodhai, P.Bharathi and D.Balathiripurasundari An Efficient Neural Network Technique to Detect Collective Anomalies in E-Medicine 36 G.Thiyagarajan, C.M.Rasika, B.Sivasankari and S.Sophana Jennifer Deriving Intelligence from Data through Text Mining 42 C.T.Sree Vidhya Web Service Assortment through Genetic Algorithm and XML 50 Deeptha R and Rajeswari Mukesh v
  • 8. HINDUSTAN JOURNAL, VOL. 6, 2013 ELECTRICAL SCIENCES Improving the Efficiency of Impulse Noise Estimation 55 S.V.Priya and R.Seshasayanan Review of Cyclic Redundancy Checking Algorithm 61 Prakash V R and Kumaraguru Diderot P. Optimization of Temporally Ordered Routing Algorithm (TORA)  in Ad-Hoc Network 67 D.Helen and D.Arivazhagan MECHANICAL SCIENCES Evaluation of Evaporative Heat Transfer Characteristics of CO2 /Propane Refrigerant Mixtures in a Smooth Horizontal Tube using CFD 71 S.Jeya Pratha and S.Mahendran Design and Fabrication of Ultimate Chilling System 78 T.S.Ravikumar and S.Saravanan Review of Electrical Discharge Machining Process 83 K.Viswanathan, P.Sengottuvel and J.Arun EDUCATION AND LIBRARY SCIENCES Community Colleges to SEmpower the Youth to Transcend Social Barriers 88 Aby Sam and Akkara Sherine Continuous Professional Development (CPD): A Proposal for an Integrated Programme in Teaching English as a Second Language (TESL) 97 P Bhaskaran Nair Librarianship in Digital Era 101 E. Boopalan, K. Nithyanandam and I. Sasirekha FORTHCOMING CONFERENCES 106 vi
  • 9. HINDUSTAN JOURNAL, VOL. 6, 2013 Shear Strengthening of RC Beam Using Carbon Fiber Reinforced Polymer Sheet PL. Karuppiah and R. Angeline Prabhavathy Abstract — The technique of strengthening of reinforced concrete beam with externally bonded Carbon Fiber Reinforced Polymer (CFRP) has been successfully applied in Civil Engineering. This paper discusses the effect of shear strengthening of RC beams on the stress distribution, initial crack, crack propagation and ultimate strength. The experimental programme includes testing of five simply supported reinforced concrete beams of which four beam specimens are cast with bonding CFRP and the remaining one beam without CFRP which is considered as the control beam. The CFRP epoxy bonded specimens are specimens, with full side wrap (FSW), one side u wrap at shear (SUWS), vertical wrap stirrups (VWS) and inclined wrap stirrups (IWS). Mix design of M30 concrete is adopted and the mix proportion is arrived at. Based on the mix proportion, the specimens are cast. The deflection, shear failure, cracking and ultimate load for rectangular beams bonded with CFRP are investigated. The experiments are conducted to predict the critical load, cracks and increase in strength. It is concluded that in beams bonded with side u wrap stirrups (SUWS), there is a delay in the formation of initial crack and the ductility ratio is higher, which is desirable in earthquake prone areas. The general and regional behaviour of concrete beams with bonded CFRP are studied with the help of strain gauges. The appearance of the first crack and the crack propagation in the structure up to failure is monitored and discussed for the control and the strengthened beams.1 Intex terms — CFRP wrap, U-wrap, Carbon fiber. PL. Karuppiah and R. Angeline Prabhavathy are in School of Building Sciences, Hindustan University, Chennai, India, (e-mail: plkaruppiah@hindustanuniv. ac.in, deanbs@hindustanuniv.ac.in). I.  Introduction Carbon Fiber composites and reinforced polymer offer unique advantages in many applications where conventional materials cannot provide satisfactory service life. Carbon fiber reinforced polymer (CFRP) is a very strong and light fiber reinforced polymer which contains carbon fiber. The polymer which is most often used is epoxy, but other polymers such as polyester, vinyl ester or nylon are sometimes used. The composite may contain other fibers such as Kevlar, aluminum, glass fibers as well as carbon fibers. The use of CFRP is advantageous, because it is easier to maintain a relatively uniform epoxy thickness throughout the bonding length. By using CFRP wrap, the shear strength and stiffness increase substantially reducing shear cracking. This paper provides the results of an experimental investigation on using CFRP sheets to prevent local cracks around shear region in reinforced concrete beams. II.  Literature Review Norris et al. (1997) investigated the shear and flexural strengthening of RC beam with carbon fiber sheets. The CFRP sheets were epoxy bonded to the tension face and web of concrete beams to enhance their flexural and shear strengths. When the CFRP sheets were placed perpendicular to cracks in the beam, a large increase in stiffness and strength was observed and there was no difference in the behavior between the pre-cracked beams and the un-cracked ones at the ultimate level. It was concluded that CFRP (carbon fiber reinforced plastic) sheets increased the strength and stiffness of existing concrete beams when bonded to the web and tension face.
  • 10. 2  HINDUSTAN JOURNAL, VOL. 6, 2013 Chaallaletal.(1998)studiedtheshearstrengthening of RC beams using externally bonded side CFRPsheets. It is concluded that diagonal side CFRP (Carbon fiber reinforcement plastic) strips outperformed vertical side strips for shear strengthening in terms of crack propagation, stiffness and shear strength. Alex Li et al. (2001) investigated the shear strengthening of RC beam with externally bonded CFRP sheets. The results of tests performed in the study indicated that stiffness increased while increasing the area of the CFRP sheet at the flanks and the strain gauge measurements showed that strengthening the entire lateral faces of the beam was not necessary. For the strengthened beam, the ultimate strength had a significant increase when compared with the normal beam. Spadea et al. (2001) studied the strength and ductility of RC beams repaired with bonded CFRP laminates. The results showed that significant increase in strength was obtained by strengthening with bonded CFRP laminates. Charlo Pellegrino et al. (2002) investigated the shear strengthening of reinforced concrete beams using fiber reinforced polymer. Except for the control tests, all the tests were done on beams with side-bonded CFRP sheets. The comparison between the experimental and the theoretical values were made and it was found that the shear capacity increment is due to Carbon Fiber Reinforced Polymer. Tavakkolizadeh et al. (2003) investigated the strengthening of steel-concrete composite girders using carbon fiber reinforced polymer sheets. The result indicated that the load- carrying capacity of a steel-concrete composite girder improved significantly and the ultimate load-carrying capacities of the girders significantly increased by 44, 51, and 76% for 1, 3 and 5 layers respectively. Kesse et al. (2007) investigated the experimental behaviour of reinforced concrete beams strengthened with pre-stressed CFRP shear straps. He concluded that the pre-stressed CFRP strap strengthening system showed good results and it is an effective means of significantly increasing the shear capacity of existing concrete structures. From the review of literature, it has been found out that much work has not been done on shear strengthening of RC beams with different types of CFRP wraps. Therefore the shear strengthening of RC beams with CFRP wrap is discussed in this paper. III.  Experimental Program In the experiment program of this research, tests are conducted on reinforced concrete beams with external bonding of CFRP sheets in the shear zone. The beams are tested under two-point loading to investigate their structural behaviour. The objective of this experimental investigation is to determine the ●● Structural behaviour of RC beam; ●● Shear strength of RC beam; ●● Shear failure of RC beam and ●● Shear strengthening of RC beam using CFRP sheets. Experimental investigations always show the real behaviour of the structure, an element or a joint. Five rectangular RC beams are cast and tested under two point loading. Out of five beams, one is a control beam. The CFRP epoxy bonded specimens are specimens with full side wrap, one side u wrap at shear, vertical wrap stirrups and inclined wrap stirrups. The following are the dimensions of the beam. A.  3.1 Beam Dimension Details Size: 2000 x150 x 250 mm Effective cover: 20 mm Grade of concrete: M30 B.  3.2 Type of material Sheet: Carbon fibre reinforced polymer Glue for bonding: Nitowrap 30 (Base), Nitowrap 410 Harder, Nitowrap 410 Base. IV.  Specimen Details Tests are carried out on five reinforced concrete beam specimens and all are strengthened for shear capacity using external bonded CFRP wraps. The beam with 150 x 250 mm cross section and 2000 mm clear span are simply supported and subjected to two concentrated static loads. Steel stirrups of 8mm diameter are placed at 160 mm spacing along the beam length for all beams. Fig. 1 shows the Test setup and Fig. 2 shows the setup of vertical wrap stirrups. Table 1 shows the details of specimens and reinforcement.
  • 11. KARUPPIAH AND ANGELINE PRABHAVATHY: SHEAR STRENGTHENING OF RC BEAM    3 Fig. 1. Test setup Fig. 2. Setup of Vertical wrap stirrups Table 1. Details of specimen and reinforcement Details of beam Types of beam Testing of beam (days) Reinforcement in beam Longitudinal Stirrups Control beam C B 28 2-10# @ top and 2-12# @ bottom 8mm # stirrups @ 160mm C/C Full side wrap FSW Side U wrap at shear SUWS Vertical wrap stirrups IWS Inclined wrap stirrups VWS V.  Material Properties The concrete used in the experimental program is M20 and steel with nominal yield strength of 415 N/mm2 is used as the longitudinal reinforcement. A.  Properties of Nitowrap Tables 2 to 4 show the properties of Nitowrap CF, Nitrowrap 30(primer), and Nitrowrap 410 (Saturant) respectively. Table 2. Nitowrap CF Fibre orientation Unidirectional Weight of fibre 200 g/m2 Density of fibre 1.80g/cc Fibre thickness 0.30mm Ultimate elongation (%) 1.5 Tensile strength 3500 N/mm2 Tensile modulus 285 x103 N/mm2 Table 3. Nitowrap 30, Primer Colour Pale yellow to amber Application temperature 150 C - 400 C Viscosity Thixotropic Density 1.25 - 1.26 g/cc Pot Life 2 hours at 300 C Cure time 5 days at 300 C Table 4. Nitowrap 410, saturant Density 1.14 g/cc Pot life 25 min. @ 270 C Full cure 7 days B.  Surface preparation It is ensured that concrete surfaces are free from oil residues, demoulding agents, curing compounds, grout holes and protrusions. Structural damages are repaired by using epoxy grouting/ appropriate mortar from the Renderoc range. All depressions, imperfections etc. are repaired by using Nitocote VF/ Nitomortar FC, epoxy putty. The base and hardener are thoroughly mixed in a container for 3 minutes. Mechanical mixing using a heavy-duty slow speed (300-500 rpm) drill, fitted with a mixing paddle is done. The mixed material of Nitowrap 30 epoxy primer is applied over the prepared and cleaned surface. It is applied with a brush and allowed to dry for about 24 hours before application of saturant. The mixed material of Nitowrap 410 saturant is applied over the tack free primer.
  • 12. 4  HINDUSTAN JOURNAL, VOL. 6, 2013 VI.  Results And Discussions Five simply supported reinforced concrete beam specimens are tested which include one control beam, and four CFRP epoxy bonded specimens with full side wrap (FSW), one side u wrap at shear (SUWS), vertical wrap stirrups (VWS) and inclined wrap stirrups (IWS). The load deflection behaviour, first crack load, finial crack load and maximum deflection are studied. A.  Load – Deflection behaviour Table 5 shows the Comparison of Ultimate Load and Maximum Deflection. Table 5. Comparison of Ultimate Load and Maximum Deflection Si.No. Specimen First Crack Load(kN) Ultimate Load(kN) Maximum Deflection (mm) 1 C B 33.5 123.9 32.6 2 FSW 51.8 158.8 14.3 3 SUWS 41.9 122.5 32.4 4 IWS 22.6 122.4 22.4 5 VWS 54 134.8 26.8 The comparison of initial crack, final crack and deflection of various specimens are shown in Fig 3 to 5. Fig. 3. Bar chart of first crack load Fig. 4. Bar chart of final crack Fig. 5. Bar chart of maximum deflection From Fig. 3, it can be seen that the first crack is delayed in the case of FSW and VWS beams. Fig. 4 shows that the final crack is delayed only in the case of FSW beam. Fig. 5 shows that the deflection is minimum in the case of FSW beam. Fig. 6 shows the Load Vs deflection behaviour of the various beam specimens. Fig. 6. Load Vs Deflection Behaviour of All Beam speci- mens. From the load – deflection behaviour, it can be seen that the load carrying capacity is maximum for FSW beam but brittle failure occurs. In SUWS beam, the initial crack occurs at 41.9 kN which is 25% higher than that of the control beam. The ductility ratioes also higher in SUWS beam which is desirable in earthquake prone areas. B.  Failure Pattern Fig. 7 shows the cracking pattern of a control beam. The initial crack occurs at 33.5 kN and final crack at 123.9 kN. The ultimate load is 123.9 kN.
  • 13. KARUPPIAH AND ANGELINE PRABHAVATHY: SHEAR STRENGTHENING OF RC BEAM    5 Fig. 7. Cracking pattern of Control beam Fig. 8 shows the cracking pattern of FSW specimen. The initial crack occurs at 51.1 kN and final crack at 157.5 kN. The ultimate load is 158.8 kN. Total CFRP covered area is 1400 mm (Length), and 170 mm (Height). Fig. 8. Cracking pattern of FSW specimen Fig. 9 shows the cracking pattern of SUWS specimen. The initial crack occurs at 41.9 kN and final crack at 122.6 kN. The ultimate load is 122.6 kN. CFRP is wrapped in the shear area as U section, with a width of 250 mm. Fig. 9. Cracking pattern of SUWS specimen Fig. 10 shows the cracking pattern of IWS specimen. The initial crack occurs at 22.6 kN and final crack at 123.8 kN. The ultimate load is 123.8 kN. Inclined CFRP stirrups are wrapped at an angle of 60o with a width of 60 mm. Fig. 10. Cracking pattern of IWS specimen Fig. 11 shows the cracking pattern of VWS specimen. The initial crack occurs at 54 kN and final crack at 129 kN. The ultimate load is 129 kN. Vertical CFRP stirrups 100mm wide are wrapped at 90o . Fig. 11. Crack pattern of VWS specimen Debonding of CFRP wraps occurred after the initial crack appeared. Fig. 12 to Fig. 15 show the debonding of CFRP. Fig. 12. Debonding of FSW specimen
  • 14. 6  HINDUSTAN JOURNAL, VOL. 6, 2013 Sudden failure of FSW beam occurred at the ultimate load. Fig. 13. Debonding of SUWS specimen Fig. 14. Debonding of IWS specimen Fig. 15. Debonding of VWS specimen VII.  Conclusion Tests were performed in externally applied epoxy- bonded CFRP. Based on the test results the following conclusions are drawn. ●● Compared to all other specimens deflection of FSW specimen is less and load bearing capacity is more. However brittle failure occurs. ●● In SUWS beam, the initial crack occurs at 41.9 kN which is 25% higher than that of the control beam. The ductility ratio is also higher in SUWS beam which is desirable in earthquake prone areas. References [1] Tom Norris et al. (1997), Shear And Flexural Strengthening Of RC Beams With Carbon Fiber Sheets. Journal of Structural Engineering 123, 903-911. [2] O. Chaalla. et al. (1998), Shear Strengthening Of RC Beams by Externally Bonded Side CFRP Strips. Journal of Composites for Construction, 2, 111-113. [3] Alex Li, et al. (2001), Shear Strengthening Of RC Beams With Externally Bonded CFRP Sheets. Journal of Structural Engineering,127, 374-380. [4] G. Spadea et al. (2001), Strength And Ductility Of RC Beams Repaired With Bonded CFRP Laminates, Journal of Bridge Engineering, 6, 349-355. [5] Carlo Pellegrino et al. (2002), Fiber Reinforced Polymer Shear Strengthening of Reinforced Concrete Beams with Transverse Steel Reinforcement. Journal of Composites for Construction, 6, 104-111. [6] M. Tavakkolizadeh, et al.(2003), Strengthening of Steel-Concrete Composite Girders Using Carbon Fiber Reinforced Polymers Sheets. Journal of Structural Engineering, 129, 30-40. [7] Gyamera Kesse et al., (2007), Experimental Behavior of Reinforced Concrete Beams Strengthened with Prestressed CFRP Shear Straps. Journal of Composites for Construction, 11, 375-383.
  • 15. HINDUSTAN JOURNAL, VOL. 6, 2013 A Qualitative Research on the Role of Landscape Architecture in and around Hospital Premises as an Aid to Medical Treatment in Chennai. R. V. Nagarajan and Ravi K. Bhargava Abstract — The milieu of the hospitals ought to be healthy and hygienic for the patients to recuperate from their illness. The role of trees and plants in a hospital premises is considered a dynamic parameter in the creation of the hospital quality. This paper attempts to discern the ratio of minimum land / area required for the medicinal landscape to the area of hospital units. The very question of how to border out the minimum quantity of trees required for a hospital landscape is the prime aim of this research. Secondly, what are the aspects (air purification, killing bacteria, noise reduction, etc.) to be considered in the selection of trees, is the next level of research. Finally, aided by statistical results of a survey conducted in hospitals, this research narrows down to the ratio (x:y) for a typical hospital premises, where ‘x’ is the minimum area required for ‘n’ number of occupants (patients, non-patients, hospital-staff, etc.) and ‘y’ is the minimum open space required for the medicinal landscape to be executed for a Healthy Hospital.1 Index terms — Landscape, Hospital, Treatment. I.  Introduction “Research gathered over recent years has highlighted the countless benefits to people, wildlife and the environment that come from planting trees and creating new woodland habitat. It is obvious trees are good things,” says Clive Anderson. R.V. Nagarajan and Ravi K. Bhargava are in School of Architecture, Hindustan University, Chennai, India, (e-mail: rvnagarajan@hindustanuniv.ac.in) The belief that plants and gardens are beneficial for patients in healthcare environments is more than one thousand years old, and appears prominently in Asian and Western cultures [1]. The awareness of the positive influence of the outdoor environment on patients’ healing process has long been present in hospital architecture. The term healing garden applies to the gardens that promote recuperation from illness. In this context, ‘healing’ does not necessarily refer to curing, but to the overall improvement of well-being.Integration and unity of hospital buildings and their surrounding outdoor spaces contribute to the creation of hospital as a ‘small city within a city’, with its own specific patterns of use [2]. II.  Characteristics of Plants Plants possess the ability of escalating the pain tolerance effects in the patients so as to enable them to recuperate from their illness or surgery. This ability of the plants is found nil in the first case and comparatively higher in the third case than the second one in the following category [3]: 1. No plants 2. Foliage plants 3. Foliage + Flowering plants Patients in hospital rooms with plants and flowers have significantly showed more positive physiological responses, lower ratings of pain, anxiety and fatigue, and more positive feelings and higher satisfaction about their rooms than the patients who are kept in
  • 16. 8  HINDUSTAN JOURNAL, VOL. 6, 2013 rooms without plants [4]. Findings of such researches suggested that plants in a hospital environment could be noninvasive, inexpensive, and an effective complementary medicine for patients recovering from abdominal surgery. Researchers who have assessed the impact of nature/plants on human health have suggested that nature and plant experiences are positively associated with human physical [5], psychological [6], emotional [7], and cognitive health [8]. In addition, viewing nature/plants is linked to pain reduction, less need for analgesics, and fast recovery from surgery [9]. For many years, the importance of aesthetics in relevance to the health was not experimentally proven as the additional quality of plants. Apart from the recuperation of illness, aesthetic of plants is another important philosophical discipline which must be added to the ambience of hospital for the further betterment to both the patients and the doctors. High quality nursing care includes the aesthetic dimension [10]. Aesthetics influences a person’s feelings, both physical and psychological. Both aesthetic and non- aesthetic surroundings create an impression and affects a person consciously or unconsciously [11]. III.  Method to Calculate Green Areas for Any Site According to the Green Guide for Health Care, the following formula is for the calculation of the required green area: Natural Habitat Area = (Site Area x Site Size Factor) / Floor Space Ratio, where Floor Space Ratio = Gross Constructed Area including all service spaces and excluding parking areas / Site Area and Site Size Factor = (1/√Site Area) x 10 (usually around 0.15) [12]. The main difference between the calculation of green areas for any site and with hospital site is the nature of the people occupying it. The prime aim of this research is to find out the variation in the level of the ratio in the above formula framed by the GGHC (Green guide for Health Care), with the level of the ratio in hospital site, particularly concentrating on the landscape features. IV.  Design Considerations for Hospital Landscaping In an ideal case, optimal distribution of the total site area of a hospital complex should be the following: 30% for the buildings, 15% for internal communication routes and parking, 50% for vacant area (25-30% in case of hospitals with a limited capacity for future growth) out of which 10% is reserved for recreational areas. In brief, they should be planned according to following requirements: (1) to create opportunities for movement and exercise; (2) to offer a choice between social interaction and solitude; (3) to provide both direct and indirect contacts with nature and other positive distractions [13]. Several studies of non-patient groups (such as university students) as well as patients have consistently shown that simply looking at environments dominated by greenery, flowers, or water -- as compared to built -scenes lacking nature (rooms, buildings, towns) -- is significantly more effective in promoting recovery or restoration from stress. To promote the speed of postoperative recovery and to improve the quality of life during hospitalizations, it is important to provide patients with not only the best treatment possible, but also to remove such sources of stress and to counter them with positive distractions. V.  Interior Plants When plants were added to the interior space, the participants were more productive (12% quicker reaction time on the computer task) and less stressed (systolic blood pressure readings lowered by one to four units). Immediately after completing the task, participants in the room with plants present reported feeling more attentive (an increase of 0.5 on a self- reported scale from one to five) than people in the room with no plants [14]. Regardless of the physical air quality benefits, people generally have an affinity to being around plants. Many studies have proven a link to plants and their beneficial psychological effects on people, including increases in productivity and decreases in stress levels [15]. In 2006, many studies were published that indicated that simply having three small potted plants can significantly reduce (50-75%) the total VOC (Volatile Organic Compound) levels in a real office of 30-50m3 size [16]. The only consideration was that the level of total VOC needed to be above 100ppb - a concentration level that is much lower than acceptable limits. TheNationalAeronauticsandSpaceAdministration studies on indoor landscape plants and their role in
  • 17. NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE  9 improving indoor air quality included reports on toxins common to the interior environment, specifically benzene, formaldehyde, and trichloroethylene [17]. The following list of plants typically used in the interior environment outlines the plants found to be more effective in air purification, based on the NASA studies [18]. 1. Aechmeafasciata (Excellent for formaldehyde and xylene) 2. Aglaonemamodestum (Excellent for benzene and toluene) 3. Aloe vera (Excellent for formaldehyde) 4. Chamaedorea Bamboo (Excellent for benzene and formaldehyde) 5. Chlorophytumelatum (Excellent for carbon monoxide and formaldehyde) 6. Chrysanthemum morifolium (Excellent for trichloroethylene, good for benzene and formaldehyde) 7. Dendrobium Orchid (Excellent for acetone, ammonia, chloroform, ethyl acetate, methyl alcohol, formaldehyde and xylene) 8. Dieffenbachia maculate (Good for formaldehyde) 9. Dracaena deremensis (Excellent for benzene and trichloroethylene, good for formaldehyde) 10. Dracaena marginata (Excellent for benzene, good for formaldehyde and trichloroethylene) 11. Dracaena Massangeana (Excellent for formaldehyde) VI. Surveillance in Hospitals in Chennai As the aim of this research was conceptualized to calculate the ratio of the minimum open space required for landscape in a hospital to the built up space of the site, the research was further proceeded to organize a survey with the people who inhabit the hospital premises. Surveys were carried out in three major hospitals in Chennai in the following categories: 1. a hospital in the populated / noisy zone of the city. 2. A hospital specialized for a single disease. 3. A hospital located in the outskirts. Following hospitals in Chennai were selected for the survey: 1. Rajiv Gandhi Government Hospital, Central, Chennai. 2. Cancer Institute, Adyar, Chennai and 3. Kamakshi Memorial Hospital, Velachery Road, Chennai. VII.  Selection of People for Survey It was already planned that the selection of the people for survey was as per the requirement of the research. So, the people for survey were categorized into four following types: 1. with respect to occupation, 2. with respect to their age, 3. with respect to the time of survey and 4. with respect to their gender. Fig. 1. Occupation Fig. 2. Age
  • 18. 10  HINDUSTAN JOURNAL, VOL. 6, 2013 Fig. 3. Time Fig. 4. Gender VIII. Report on The Surveillance The following are the statistical ripostes for the questionnaire prepared for the survey: Fig. 5. Liking of parts of Hospital (a) (b) (c) (d) (e) Fig. 6. Sub categories of fig. 5. Fig. 7. Duration in Hospital
  • 19. NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE  11 Fig. 8. Noise Level Fig. 9. Smoke / Dust in premises Fig. 10. Preferred surroundings Fig. 11. Elements missing in Hospital Fig. 12. Inside the building-1 Fig. 13. Inside the building-2
  • 20. 12  HINDUSTAN JOURNAL, VOL. 6, 2013 Fig. 14. Trees liked Fig. 15. Trees recommended Fig. 16. Trees disliked IX.  Synthesis of The Survey From the above report of the survey conducted in three hospitals in Chennai, the following are the syntheses observed: 1. 57.5% People feel comfort in the place where the following trees are planted: Azardirastraindica, Ficusreligiousa, Ficusbengalinensis, Flowering trees and Pongameapinnata. 2. 63.7% of people desperately want some mode of system to enhance their breathing comfort, and 50% among them recommended plants inside the building. 3. As most of the previous researches proved, 45% of the people surveyed preferred flowering plants in their vicinity and they expressed that they felt relaxed compared to the people who were not having flowering plants in their rooms. 4. Equally, 40% of people preferred earth walkway and also lawn in the open space of the premises. 5. 65% of people complained that the process of shedding leaves of trees is irritable than the problems of insects over it (32% complained of insects). 6. Among the people surveyed, 75% of patients, 65% of non - patients and 78% of staff members of hospital prefer to rest under the tree during mid- day. 7. Age wise, 82% of above 55 age people preferred noiseless area than the active / noisy area. 8. Almost 95% of the women prefer to rest inside the building than resting under trees, street-benches or anywhere in open spaces. 9. Almost 88% of the men patients whose rooms were not having plants felt boredom and wanted to move around, when the same feeling was felt by only 15% of the men patients whose rooms had plants. 10. Almost 90%of all age group men and women who are patients prefer to have a walk in either in the morning or in the evening in the road which has trees, than the road which does not have them. 11. Area Calculation of the First hospital: Total Area - 61,336.0716 sq.m and the total open space is 22,114.0452 sq.m. 12. Area Calculation of the Second hospital: Total area - 31,567.9558 sq.m and the total open space is 16,423.8566 sq.m 13. Area Calculation of the Third hospital: Total Area: - 12,437.2557 sq.m and the total open space is 3,211.7854 sq.m
  • 21. NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE  13 14. The satisfaction level of the people staying in the premises in terms of overall aspects, synthesized from all the three hospitals is as follows: 71.35%, 83.75% and 56.21% are the percentage of the satisfaction level measured from the first, second and third hospitals respectively. 15. With the above satisfaction levels measured, the total built up area, total open space area and the site area of all the three premises are multiplied with the percentages of the satisfaction level. 16. 71.35% of 22,114.0452sq.m. =x 17. 83.75% of 16,423.8566 sq.m= y 18. 56.21% of 3,211.7854 sq.m= z 19. Built up spaces of all the three premises are considered as a, b and c respectively. X. Calculation of Ratio of Minimum Open Space for A Hospital (x+y+z) / 3 = Xos where x, y, z are the satisfied open area for a hospital and Xos is the factor for open space. (a+b+c) / 3 = Ybs where a, b, c are the built up area of the hospital buildings and Ybs is the factor for built up space. XI.  Conclusion The research concludes that Xos :Ybs is the ratio of minimum open spaces to the built up space of a hospital premises. References [1] Ulrich, R. S. and R. Parsons (1992), “Influences of passive experiences with plants on individual well-being and health. In D. Relf (Ed.)”, The role of horticulture in humanwell-being and social development, Portland, Timber Press, pp. 93-105. [2] DejanaNedučin, “Milena Krklješ, NađaKurtović-Folić”, “Hospital Outdoor Spaces - Therapeutic Benefits And Design Considerations”, Architecture and Civil Engineering Vol. 8, No 3, 2010, pp. 293 - 305 [3] S.-H. Park, R.H. Mattson, E. Kim (2011), “Pain Tolerance Effects of Ornamental Plants in a Simulated Hospital Patient Room”, Department of Horticulture, Forestry and Recreation Resources, Kansas State University. [4] Seong-Hyun Park and Richard H. Mattson, (2009) “Effects of Flowering and Foliage Plants in Hospital Rooms on Patients Recovering from AbdominalSurgery”,DepartmentofHorticulture, Forestry and Recreation Resources, Kansas State University. [5] Chang, C. and P. Chen. (2005). “Human response to window views and indoor plants in the workplace”, Hort Science 40:pp.1354–1359. [6] Kaplan,R.andS.Kaplan.(1995),“Theexperience of nature: A psychological perspective”, Ulrich’s, Ann Arbor, MI. [7] Adachi, M., C.L.E. Rode, and A.D. Kendle. (2000), “Effects of floral and foliage displays on human emotions”, HortTechnology 10:pp.59–63. [8] Cimprich, B. (1993), “Development of an intervention to restore attention in cancer patients”, Cancer Nurs. 16:pp.83–92. [9] Diette, G., E. Haponik, and H. Rubin. (2003), “Distractiontherapywithnaturesightsandsounds reduces pain during flexible bronchoscopy”, Chest 12:pp.941–948. [10] SynnøveCaspari, (2006), “The aesthetic dimension in hospitals - an investigation into strategic plans”, International Journal of Nursing Studies 43 pp.851–859. [11] Ulrich, R., (1991), “Effects of interior design on wellness. Theory on recent scientific research”, Journal of Health Care and Interior Design, 3. [12] Green Guide for Health Care, Version 2.2, SS Credit 5.1., Site Development: Protect or Restore Open Space or Habitat, 2007, www.gghc.com, p.6 23. [13] Ulrich, R.S., Cooper-Marcus, C., Barnes, M. (Eds.), (1999), “Effects of Gardens on Health Outcomes: Theory and Research, in Healing Gardens: Therapeutic Benefits and Design
  • 22. 14  HINDUSTAN JOURNAL, VOL. 6, 2013 Recommendations”, John Wiley Sons, New York, pp. 27-86. [14] Virginia I. Lohr, Caroline H. Pearson-Mims, and Georgia K. Goodwin, “Interior Plants May Improve Worker Productivity and Reduce Stress In A Windowless Environment”, Department of Horticulture and Landscape Architecture Washington State University, Pullman, WA 99164-6414 [15] Ryan Hum and Pearl Lai (2007), “Assessment of Biowalls: An Overview of Plant- and Microbial- based Indoor Air Purification System”. [16] Wood, R.A., Burchett, M.D., Alquezar, R., Orwell, R.L., Tarran, J. and F. Torpy. (2006). “The potted-plant microcosm substantially reduces indoor air VOC pollution: I. office field-study”, Water, Air, and Soil Pollution, 175, pp.163-180. [17] Prescod, A.W. (1992). “More indoor plants as air purifiers”, Pappus, 11:4. [18] United States Environmental Protection Agency (1991), “Sick building syndrome”, Air and Radiation, Indoor Air Facts, 4.
  • 23. HINDUSTAN JOURNAL, VOL. 6, 2013 A Research on Nuances of Silk Weaving and Designing a Handloom Hub at Kanchipuram Ar. Thulasi Gopal. Abstract—Thelostplatformofsilkweavingindustry in Kanchipuram has been identified in order to bring back the lost glory of original silk weaving techniques, process and products through down to earth planning and designing patterns. A particular communityhasbeenconfinedtotheseindustries.The idea of the silk parks with appropriate infrastructure is to create awareness among others to take up this profession. Deliberate research and extensive interaction with the weaving community has gone into evolving this design concept. The weaving community was widely studied on their everyday lifestyle, weaving activity, duration to complete each activity, spacial organization, proximity of spaces etc., in order to meet the requirements in the Silk Park. Apart from these, the supporting activities like cocoon reeling and dyeing activities and their spaces were studied. Weaver’s psychology which results in the sari designs, creativity etc., was taken into account for giving a suitable design solution. Emotions related to the occupational spaces resulted in interior-exterior connectivity, to avoid solitude. Traditional Kanchipuram weavers’ house and their elements were studied to incorporate those features into the design. The challenge in the output was how all the versatile activities of silk weaving can be designed under one roof, bringing in wholesomeness through form, tone, style, texture, hue, and bringing unity, balance and continuity. The design created would provide people involved with a comfortable living environment that they are longing for and contribute to India’s gross domestic product.1 Index Terms — Silk Weaving, Handloom, Spatial Organization, Design, Interior-exteriorconnectivity. Ar. Thulasi Gopal is in School of Architecture, Hindustan, Chennai, India, (e-mail: gopal.aarthi@ gmail.com) I. Introduction Tamil Nadu has a rich cultural history and legacy that spans several areas. All of these need to be preserved for posterity as they remind the people of its enormity and feat. It has a world class brilliances to showcase, which needs to be nurtured and suitably promoted to support the branding and economic outcomes. One such craft that needs to be reinstated from a declining trend is Silk weaving. India is the second- largest Silk producer in the world, next to China and major sourcing base for international retail players. According to Tamil epic ‘Silapadikaram’ the Silk handloom weaving activity is said to have existed since second Century AD at Kanchipuram. It is one of the traditional centers of Silk weaving and handloom industries that is losing its identity. The Scheme for Integrated Textile Park was approved by Central Government of India to facilitate settingupofTextileparkswithworldclassinfrastructure and amenities. The Government of Tamilnadu has proposed to bring a Silk park at Kanchipuram. Seventy five acres of land allotted by the Government of Tamil Nadu for the purpose is located at Kilkathirpur village, Kanchipuram Taluk and District. II. Constraints The Silk and other textile industries are still community driven i.e. a particular community is confined to these industries. The idea of the Silk parks with appropriate infrastructure is to create awareness among a lot of others to take up this profession. This in turn keeps the industry in the head front of Indian economic development and increases the demand for Indian textiles in International markets.
  • 24. 16  HINDUSTAN JOURNAL, VOL. 6, 2013 Sriperumbudhur industrial area is situated 35 kms away from Kanchipuram which attracts people to work there due to time flexibility, better income and less hard work (when compared to weaving), suitable transport facilities, allowances etc., provided by the companies such as Hyundai, Nokia etc. III. Objectives The objectives of the project are ●● To design a prime handloom hub ●● To re-establish the traditional and cultural value of ancient silk weaving which is the prime occupation of the temple city and its surrounding villages and village hamlets of Kanchipuram. ●● To encourage the occupation, by providing the workers with better functioning environment and resources that would take the economy of the rural sector to a superior stature. ●● To bring back the lost platform for the weavers to market their products, avoid duplicate market players and also to showcase the culture. IV. Methodology The methodology proposed to be adopted are ●● Understanding the site surroundings and services. ●● Understanding the occupation and workplace. ●● Weavers’ needs/opinions through questionnaires. ●● Comparison of history against recent happenings. ●● Techniques in the field to choose the best for today’s scenario. ●● Requirement framing in detail. ●● Case study- comparative study of Ayangarkulam (weaving village and Pillayarpalayam weaving town).Analysis of the common and the contrasting features and characteristics. ●● Formulating conceptual ideas. ●● Development of concepts into schemes and into final design output. V. Scope and Nature of Activities in The Complex The spaces planned on site are: Administration and expo hall, Research center and training, Marketing area, Warehouse, Cocoon reeling, Garment unit, Canteen and hostel , Dyeing unit –CETP, Weaving cluster, Residential cluster, Central hub – OAT, health care, child care., Restaurant, Guest house, Multipurpose area, Temple along with the pond, and other Services. The main focus in the design was given to the Dyeing cluster, Weaving cluster and the Residential Cluster. VI. Challenges Faced The challenges faced include ●● Bringing in different activities in one complex. ●● Bringing wholesomeness in the design. ●● Creating buffer spaces between each block. ●● Proximity between all the spaces. ●● Connectivity and flow of functions. ●● Segregating the different residential, floating, working and shopping population. ●● Meeting the workplace requirements. ●● Innovations for enhanced productivity of silk products. VII. Analysis Along With Evolution of Design Deliberate research and extensive interaction with the weaving community has gone into evolving this design concept. Their needs have been understood and have been approached accordingly. The site, on entry, will have the administrative blocks, followed by the marketing blocks with a research and testing center. This is to facilitate effective marketing of the products as well as to ensure the quality of the products. There is an industry, behind the marketing area, which is to produce woven Silk garments. The need for original silk sarees is decreasing day by day and hence the requirement of the weavers too is receding. To change this situation, silk can be used to produce various other useful garments, apart from sarees. They can be in accordance with the current trends in fashion. This will escalate the demand for woven silk garments which will in turn increase the demand for the weavers.
  • 25. THULASI GOPAL:A RESEARCH ON NUANCES OF SILK WEAVING    17 After a detailed discussion with the village weavers, it was found that they are not very keen with the idea of shifting to a new alien location. Hence the design is done in such a way so as to provide them with the most homely environment possible. The weaving looms customized is specific to match the needs of the Kanchipuram weavers. The houses planned in the Silk Park are categorized into two main styles, as per the requirements of the weavers. After documentation, observation and analysis with the weaving community of Kanchipuram, it was understood thattheyarebroadlysegregatedintotwogroups,basedon their economic needs. The houses have been constructed in such a way so as to cater to their needs. One of the concepts adopted by the earth institute at Auroville is CSEB – Compressed Stabilized Earth Blocks. The soil at the site was observed to be sandy clayey soil, one such type of soil which is used for making CSEB blocks which can be used for construction. This does not require any skilled labours at work, and hence can be a source of income to the local dwellers, who necessarily are not weavers, surrounding the site. As mentioned, the site is located 7 km away from the original weaving society; hence the locales here too will have an opportunity to gain through employing the concept. A large water body, for example, a typical pond is created that facilitates water distribution to different areas on site through the tank which is a focal feature on site. The mud evacuated to create these water bodies will be used for CSEB block making. Burnt bricks replaced by CSEB blocks provide a sustainable concept. There are farming areas around each housing sectors, which will enable food production. This offers them an additional source of income, as well as an alternate food source. There are green areas designed all around the site which acts as a buffer space, segregating the diversified functions involved in weaving a saree. The central focus of this site is a multipurpose area with a temple, a water body, commercial spaces, which will provide the platform necessary for the weavers to hold fares. It is to break the monotonous weaving routine and to provide them with some relaxation. The fares are also a means of interaction and communication with weaving communities from other districts and states. Thus holding fares and exposition summons collaborative work from other communities, along with exchange of various important ideas and tools, which will not only improvise the silk weaving techniques but also make them aware of the current trends in the market. All the silk saree shops can be shifted under the silk society’s supervision so that adulteration is minimized and originality is maintained. Training centers can be proposed with Government certified courses on silk weaving to attract younger generation into this activity, Fig.1, 2 and 3 describe the process, design features and the concepts adopted respectively in regard to the proposal of the handloom hub at Kanchipuram. VIII.  CONCLUSION Combination of traditional and contemporary architecture is done which targets site planning level to weaving machine design customized for the weavers. Macro level to micro level planning is undertaken. Material from site is used for construction which can involve local dwellers who can be benefited apart from the main target - the weavers. Dyeing areas which were earlier inside the Kanchipuram towns causing pollution, will be shifted here where the CETPis set up to solve the issue of pollution. Considering the hot humid climate, features like courtyard have been adopted to give a natural day lighting and stack effect thus maintaining a suitable indoor environment. Better workspace is created which will result in better productivity. Efficient usage of energy, water, and other resources is seen. Measures are taken to protect occupants health and improve employee productivity. Maximum reduction in waste, pollution and environmental degradation is seen into. CSEB blocks, which are green materials are extensively used in the construction. BIBILIOGRAPHY http://www.silkclick.com http://www.csapl.co.in/industrial.asp http://www.thehindu.com/todays-paper/tp-national/ tp-tamilnadu/site-identified-for-silk-park-in- kancheepuram/article168017.ece http://www.kanchipuramdistrict.com/ http://smehorizon.sulekha.com/advancement- made-panipat-weaving-industry-sustain_textiles- viewsitem_8253 http://www.oldandsold.com/articles04/textiles16.shtml http://environmental_impact_assessment
  • 26. 18  HINDUSTAN JOURNAL, VOL. 6, 2013 Fig.1.SilkenArchinomy-Theprocess
  • 27. THULASI GOPAL:A RESEARCH ON NUANCES OF SILK WEAVING    19 Fig.2.SlikenArchinomy-DesignFeatures
  • 28. 20  HINDUSTAN JOURNAL, VOL. 6, 2013 Fig.3.SilkenArchinomy-ConceptsAdopted
  • 29. HINDUSTAN JOURNAL, VOL. 6, 2013 A Case for the Development of High Speed Rail Link in India D. Karthigeyan Abstract — Indian Railways is an Indian state- owned enterprise, owned and operated by the Government of India through the Ministry of Railways. It is one of the world’s largest railway networks comprising 115,000 km (71,000 mi) of track over a route of 65,000 km (40,000 mi) and 7,500 stations. India is a country with more than 1.2 billion population, which includes 35 cities with more than 1 million people each as per Census 2011. Its urban population is increasing day by day, and the rail network forms the lifeline of the country, where majority of the people are poor and cannot afford to travel by air. Under these circumstances, India which is aiming to become a global super power by 2050 requires high speed rail network similar to China, which has the world’s largest high speed railway network of more than 10,000 km. In this context, India needs to have a quality and affordable high speed rail network for its poor people to connect its major metropolitan areas and to decongest the which are transforming to megalopolition areas.1 Index terms — High speed rail network, Bullet train, Transportations. I. Introduction High-speed rail is a type of rail transport that operates significantly faster than traditional rail traffic, using an integrated system of specialized  rolling stock  and dedicated tracks. The first such system began operation in Japan in 1964 and was widely known as the bullet train. Even though India has one of the world’s largest railway networks, it is yet to find itself a place in the D. Karthigeyan is in School ofArchitecture, Hindustan University, Chennai, India, (e-mail: dkarthikeyan@ hindustanuniv.ac.in) list of countries which currently have a commercial high speed rail network. The average speed of trains in developed nations is around 200 kmph whereas in India, the maximum speed of any train hardly exceeds 150 kmph. Rajdhani and Shatabdi are among the fastest trains which run nearly at a speed of 120 kmph. On the other hand, India’s neighbour China has built world’s largest high speed railway network of about 10,463 Km long [2]. China also has the largest single track length between Beijing and Guangzhou which is 2,298 km. China has world’s fastest trains running at the speed of 380 kmph. It is surprising to see that the high-speed railway network in China was developed in a short span of five years. The proposal for high speed trains had come to fore in 1990 in that country and work had started in 2007. Fig. 1. High speed rail in China In 2015 China will have 18,000km of high speed rail. Just five years after China’s high-speed rail system opened. It is carrying nearly twice as many passengers each month as the country’s domestic airline industry. With traffic growing at 28 percent a year for the last several years, China’s high-speed rail network will handle more passengers by early next year than the 54 million people a month who board domestic flights in the United States.
  • 30. 22  HINDUSTAN JOURNAL, VOL. 6, 2013 China’s high-speed rail system has emerged as an unexpected success story. Economists and transportation experts cite it as one reason for China’s continued economic growth when other emerging economies like India are faltering due to the global economic slowdown. Chinese workers are now more productive. The productivity gains occur when companies find themselves within a couple of hours’ of train ride of tens of millions of potential customers, employees and rivals. Companies are opening research and development centers in more glamorous cities like Beijing and Shenzhen with abundant supplies of young, highly educated workers, and having them take frequent day trips to factories in cities with lower wages and land costs, like Tianjin and Changsha. Businesses are also customizing their products more through frequent meetings with clients in other cities, part of a broader move up the ladder toward higher value-added products. Airlines in China have largely halted service on routes of less than 300 miles when high-speed rail links open. They have reduced service on routes of 300 to 470 miles. The double-digit annual wage increases give the Chinese enough disposable income that domestic airline traffic has still been growing 10 percent a year. Currently, China’s high-speed rail service costs significantly less than similar systems in developed countries, but is considerably more expensive than conventional rail service. For the 419 km trip from Beijing to Jinan, High Speed Rail costs US$30 and takes 1 hour 32 minutes, while a conventional train costs US$12 and takes about 6 hours. By comparison, the Acela train from Washington DC to New York City covering a slightly shorter distance of 370 km costs US$152–180 and takes 2 hour 50 minutes [3]. Fig. 2. China’s Pan-Asian high-speed rail link Chinese government have a major plan with respect to high speed rail network, by connecting it to the whole of Asia and European Continent, so that all its freight travel will happen through this network, which in turn will make the Chinese a global leader in the trade and commerce. In this connection, Chinese government even plans to build a high-speed rail line connecting its south-western city of Kunming to New Delhi and Lahore, part of a 17-country transcontinental rail project which is part of its pan-Asian high-speed rail link. After many years of negotiations with other Asian countries, China has finally reached agreements with several Central Asian countries and got the green signal to its ambitious pan-Asian high-speed rail link, which envisages connecting cities in China to Central Asia, Iran, Europe, Russia and Singapore. II. High Speed Rail Network There is no standard or a global definition for it; however, there are certain parameters that are unique to high-speed rail, which are ●● UIC (International Union of Railways) and  EC Directive 96/58 define high-speed rail as systems of rolling stock and infrastructure which regularly operate at or above 250 km/h (155 mph) on new tracks, or 200 km/h (124 mph) on existing tracks. However lower speeds can be required by local constraints. ●● A definitive aspect of high speed rail is the use of  continuous welded rail  which reduces track vibrations and discrepancies between rail segments enough to allow trains to pass at speeds in excess of 200 km/h (124 mph). ●● Depending on design speed, banking and the forces deemed acceptable to the passengers, curve radius is above 4.5  kilometres (2.8  mi) and for lines capable of 350 km/h (217 mph) running, typically at 7 to 9 kilometres (4.3 to 5.6 mi). A. Parameters of A High Speed Travel: ●● The frequency of service, ●● Regular-interval timetables, ●● A high level of comfort,
  • 31. KARTHIGEYAN:A CASE FOR THE DEVELOPMENT OF HIGH SPEED RAIL  23 ●● A pricing structure adapted to the needs of customers, ●● Complement with other forms of transport, ●● More on-board and station services. Fig. 3. Inside first class cabin of high speed train in France B. On The Eco-Friendly Atmosphere: ●● Transport is responsible for 25% of the world’s carbon dioxide (Co2) emissions, with 80 – 90% coming from cars and highway trucks, and only 2 % from rail. ●● On high-speed railways the energy consumption per passenger-kilometer is three and half times less than for a bus, five times less than for air and ten times less than for a private car. ●● The social cost of noise, dust, carbon dioxide, nitric oxide and sulfur oxide emission for high-speed rail is one fourth of road transport and one-sixth for air. ●● It requires the construction of an eight-lane highway to provide the same capacity as a double track high-speed railway line [1]. Worldwide concerns over depleting fossil fuel reserves, climate change, overcrowded airports, delayed flights and congested roads have conspired with the high speed rail technology as the only alternative. High speed rail entails much less land usage than motorways: a double track rail line has more than thrice the passenger carrying capacity of a six-lane highway while requiring less than half the land. India is a relatively small country with a huge population and it will be too costly to build highways so high-speed rail network will be a better option to improve transportation efficiency and to conserve the depleting resources. High speed rail network is the best choice for distances of 500-700 km, where airlines cannot match; below 200 km, road transport has an edge; beyond 1,000 km, air option may be better. III. Indian Government Context In India, high speed trains are often referred to as “bullet- trains”. One of the first proposals by the Government of India to introduce high-speed trains was mooted in the mid-1980s by then Railway Minister. A high speed rail line between Delhi and Kanpur via Agra was proposed. An internal study found the proposal unviable at that time due to the high cost of construction and inability of travelling passengers to bear much higher fares than what was changed for normal trains. The Railways instead introduced Shatabdi trains which ran at 130 km/h. Fig. 4. Potential high speed rail corridors in India The  Indian Ministry of Railways’ in its white- paper Vision 2020  submitted to  the Parliament  on December 2009 envisages the implementation of regional high-speed rail projects to provide services at 250-350 km/h, and planning for corridors connecting commercial, tourist and pilgrimage hubs. Six corridors have already been identified and feasibility studies have been started, 1. Delhi-Chandigarh-Amritsar,  2. Pune-Mumbai-Ahmadabad,
  • 32. 24  HINDUSTAN JOURNAL, VOL. 6, 2013 3. Hyderabad-Dornakal-Vijayawada-Chennai,  4. Howrah-Haldia,  5. Chennai-Bangalore-Coimbatore-Ernakulam,  6. Delhi-Agra-Lucknow-Varanasi-Patna. These high-speed rail corridors will be built as elevated corridors in keeping with the pattern of habitation and the constraint of land. Two new routes were later proposed by  Indian Railways, namely  ●● Ahmadabad - Dwarka, via Rajkot, Jamnagar and the other from  Rajkot to Veraval via Junagadh [4] A. Approach to High-Speed Indian Railways’ approach to high-speed is on incremental improvement on the existing conventional lines for up to 200 km/h, with a forward vision of speed above 250  km/h on new tracks with state-of-the-art technology. B. Upgrade Tracks for 160-200 Km/H The approach is to upgrade the dedicated passenger tracks with heavier rails, and build the tracks to a close tolerance geometry fit for 160-200 km/h. High-speed tracks to be maintained and inspected using automation to ensure required track geometry. There is a need to perform more frequent inspection to ensure high confidence of safety at high-speed. C. Likely Initial Lines In India, trains in the future with speed of 250-350 km/h, are envisaged to run on elevated corridors, to prevent trespassing by animals and people. This is an excellent way to isolate high-speed train tracks. D. Project Execution The cost of building high speed rail tracks is about Rs 70 crore/km (U$15.6m/km), compared with Rs 6 crore/ km of normal rail tracks. E. High Speed Rail Corporation of India Ltd Indian Railways set up a corporation called High Speed Rail Corporation of India Ltd (HSRC) in July 2012 that will exclusively deal with the proposed ambitious high speed rail corridor projects. It will handle tendering, pre-feasibility studies, awarding of contracts and execution of the projects. All high-speed rail lines will be implemented through public private partnership (PPP) mode on a Design, Build, Finance, Operate and Transfer (DBFOT) basis. IV. Prospect of High Speed Train Operation in India Mumbai – Ahmadabad rail line is likely to be the first high speed rail network project in India which the central government plans to take in the next five year plan. Central Government is likely to make some important announcements on this project in the upcoming Budget session of the Parliament, and the state government of Maharashtra is keeping its fingers crossed as till now the share between the centre and the state government is yet to be announced. Both France and Japan Governments have shown interest in this line which covers a distance of 500 kilometers (312 miles) and expected to cost around Rs.65,000 crores. Both the governments have taken a feasibility study and are likely to submit the report by March 2014. Both the governments are hopeful, that their technology will be utilized in building this high speed rail network. Their feasibility study includes defining “high speed” for India (which could be 300- 350 km per hour), the fares and the finance practices, including public-private partnerships. On the technology front, what separates the French high-speed train technology from the Japanese, who pioneered the system, is that TGV trains of France could be operated at a normal speed (160 kmph), and on special sections, shifted to peak speeds. This made it possible to integrate them easily with the existing railways. Costs are high for such systems but when supplied with cheap Indian labor the total cost will come down drastically. Fig. 5. Rail link from Mumbai to Ahmadabad
  • 33. KARTHIGEYAN:A CASE FOR THE DEVELOPMENT OF HIGH SPEED RAIL  25 The quickening pace of commercial co-operation comes with India and Japan -- both democracies -- eyeing the rise of China with increasing unease, as Beijing presses territorial claims with growing insistence [5] With this regard, Japan has already submitted its final report of the feasibility study on upgrading the speed of the existing Mumbai-Ahmadabad route to 160-200 km per hour and further consultations on the report between the two countries are on. V.  Benefits in The Indian Context In India, out of all the benefits, discussed earlier, the reduced journey time has been the overriding consideration in the adoption of high-speed rail work. On the basis of the current experiences in the world, it has been observed that when the distances are between 300 to 600 Km, and the travel time by the high-speed train is less than 2 – 2.5 hours, the market share of passengers for the high-speed rail is at least 75-80%. This percentage decreases dramatically when the travel time of train increases to 4 to 5 hours and a round trip during the day is not possible. High speed train operation will play a significant role in the de-congestion of megalopolis towns of Delhi, Kolkata, Mumbai, Chennai, etc. Operationally, high-speed trains can optimally connect cities 500 to 1,000 km apart, and in one of the best-known sectors, Paris-Lyon, the peak capacity is 12,000 passengers per hour at 1,000 people per train, providing service once in four minutes. VI. Conclusion Once the Indian government decides, it should not take more than 4-5 years to have high-speed trains running on Indian soil. The benefits for a common man will be like, ●● With less than one hour of journey time, it will then be possible to live in the salubrious climate of Chandigarh and commute to Delhi for work. ●● A bullet train between Bangalore and Mysore (about 88 miles) will decongest Bangalore and one can reach Mysore in 30 minutes. This train will bridge the travel time between Bangalore and Mysore and pave way for their development as twin cities. ●● High-speed rail lines from Bangalore to Chennai (180 miles) are also under discussion by the Government of India.  Then we might reach Chennai within an hour from Bangalore by the surface transport. [6] References [1] Mundrey, “Tracking for High speed trains in India”, January, 2010, RITES Journal. [2] http://zeenews.india.com/news/world/china-s- high-speed-bullet-train-network-exceed-10-000- km_879426.html [3] http://www.globalresearch.ca/eurasian-economic- boom-and-geopolitics-china-s-land-bridge-to- europe-the-china-turkey-high-speed-railway [4] http://www.mapsofindia.com/railways/high- speed-rail-corridors.html [5] http://www.ibtimes.com/next-stop-bangalore- japan-may-help-south-india-build-high-speed- rail-system-1408542 [6] http://www.indianexpress.com/news/india-japan- to-study-highspeed-rail-feasibility/1134280/
  • 34. HINDUSTAN JOURNAL, VOL. 6, 2013 HMAC Filtering Scheme for Data Reporting in Wireless Sensor Network E. Kodhai, P. Bharathi and D. Balathiripurasundari Abstract —Wireless SensorNetworks consist of a large number of small sensor nodes, high processing power, limited in usage of efficient security mechanisms and susceptible to possible node compromise, passive and active attacks. These restrictions make them extremely vulnerable to a variety of attacks. Mostly public key cryptographic techniques are found to be more work prone with the secure exchange of keys, mainly lengthy hash operations with high processing rounds etc. Even though these techniques do not provide adequate verification process of reports from source to sink, they do not completely mitigate false report injection attacks and Denial of Service attacks. In this work we propose a HMAC’ed filtering scheme for secure transmission of data and we propose a technique called encryption of combined hashes which filters bogus reports and then specifically addresses false report injection attacks and Denial of Services. It has three phases which are Key Pre-distribution, Key Dissemination and Report Forwarding Phase. The legitimacy of the report being forwarded by the cluster head is collectively endorsed by a preset value and achieved by Message Authentication codes. In our proposed scheme the increase in performance is achieved through control messages, increasing secure datatransmissionandaddressingfalsedatareports.1,2 Index Terms — Wireless Sensor Network, mobile relay nodes, wireless routing, bandwidth, energy consumption. E. Kodhai and P. Bharathi are in Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pudhucherry, India. (e-mail: kodhaiej@yahoo.co.in, bharathyit3@gmail.com) D. Balathiripurasundari is in DotNet TCS Corporate, Chennai. (e-mail: bala10.12.1990@gmail.com.) I.  Introduction Sensor networks are dense wireless networks which are small in size, very low-cost and which collect and disseminate environmental data. Wireless Sensor Networks (WSNs) facilitates monitoring and controlling of physical environments from remote locations with better accuracy. They have applications in a various fields such as environmental usage, military requirement and gathering sensing information in inhospitable places. Sensor nodes have various energy and calculating constraints because of their inexpensive nature and ad hoc method of deployment. The number of nodes in a WSN is usually much larger than that in an ad hoc network. Sensor nodes are more resource constrained in terms of power, computational capabilities, and memory. Sensor nodes are typically randomly and densely deployed (e. g., by aerial scattering) within the target sensing area. The post- deployment topology is not predetermined. Although in many cases the nodes are static in nature, the shape and size might change frequently because the sensor nodes and the wireless channels are prone to failure. II.  System Model Some of the existing schemes for Filtering False Reports in WSN are Statistical En-route Filtering (SEF), Interleaved hop-by-hop authentication (IHA) and Providing Location aware End- to-End Data Security (LEDS). The details of these techniques are discussed briefly in the following sub-sections. A.  Statistical En-route Filtering (SEF) Ye et al. [12] proposed a statistical En-route filtering (SEF) scheme based on probabilistic key distribution.
  • 35. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  27 In SEF, a global key pool is divided into n partitions, each containing m keys. Every node randomly picks k keys from one partition. When some event occurs, each sensing node (that detects this event) creates a Message Authentication Code (MAC) for its report using one of its random keys. The cluster-head aggregates the reports from the sensing nodes and guarantees each aggregated report contains T MACs that are generated using the keys from T different partitions, where T is a predefined security parameter. Given that no more than T-1 nodes can be compromised, each forwarding node can detect a false report with a probability proportional to 1/n. The filtering capacity of SEF is independent of the network topology, but constrained by the value of n. To increase the filtering capacity, we can reduce the value of n , however, this allows the adversaries to break all partitions more easily. In addition, since the keys are shared by multiple nodes, the compromised nodes can impersonate other nodes and report some forged events that “occur” in other clusters. B.  Interleaved Hop-By-Hop Authentication (IHA) Zhu et al. [13] proposed an interleaved hop by hop authentication (IHA) scheme. In this scheme, the base station periodically initiates an association process enabling each node to establish pair wise keys with other nodes that are t+1 hops away, where t is called the security threshold value. In IHA, each sensing node creates a MAC using one of its multihop pairwise keys, and a legitimate report should contain t+1 distinct MACs. Since every multihop pairwise key is distinguishable, IHA can tolerate up to t level compromised nodes in each cluster instead of in the whole network as SEF does. However, IHA requires a fixed path for transmitting control messages between the base station and each cluster-head, which cannot be assured by some routing protocols such as GPSR and GEAR. Moreover, the high communication overhead incurred by the association process makes IHA unsuitable for networks whose topologies change frequently. C.  Providing Location Aware End- To-End Data Security Providing Location aware End-to-End Data Security (LEDS) design overcomes the limitations of the existing hop-by-hop security paradigm and achieves an efficient and effective end-to-end security paradigm in WSN. It exploits the static and location-aware nature of WSNs, and proposes a novel location-aware security approach through two seamlessly integrated building blocks: a location-aware key management framework and an end-to-end data security mechanism. In this method, each sensor node is implemented with several types of balanced secret keys, some of which are intended to provide end-to-end data confidentiality, and others are to provide both end-to-end data authenticity and hop- by-hop authentication. All the keys are measured at each sensor node independently from keying materials pre-loaded before network deployment and the location information is obtained after network disposal, without inducing new communication overhead, for shared key establishment. III.  Problem Definition Each of the existing schemes for Fig. 1. Statistical En-route Filtering (SEF), interleaved hop-by-hop authentication (IHA) and Providing Location aware End- to-End Data Security address false report injection attacks and or DoS attacks. However they all have some constraints. SEF is independent of network shape and size, but it has a limited number of filtering capacity and cannot prevent impersonating attacks on legitimate nodes. IHA has a drawback, that is, it must periodically establish multihop pair wise keys between nodes. Further, it refers to a located path between the base station and each cluster-head to transmit messages in both directions, which cannot be assured due to the dynamic topology of sensor networks or due to the use of some underlying routing protocol. LEDS utilizes location-based keys to filter false report. It assumes that sensor nodes can determine their locations in a short period of time. However, this is note practical approach, because many localization approaches take quite long and are also vulnerable to malicious attacks. It also tries to address selective forwarding attacks by allowing a whole cell of nodes to forward one report; however, this incurs high communication overhead. Later, we have discussed the routing protocol AODV on which the proposed scheme is to be executed. AODV takes care of the route discovery and maintenance process thereby easing the proposed scheme to concentrate on the En-route filtration
  • 36. 28  HINDUSTAN JOURNAL, VOL. 6, 2013 capacity and the mitigation of false report injection attacks and DoS attacks. IV.  Design A.  Introduction In this chapter we describe our proposed security scheme calledHMAC’edFilteringSchemeforDataDissemination in WSN. This scheme addresses false report injection attacks and DoS attacks such as Selective forwarding and Report disruption in WSN. The multifunctional key management framework is used in this scheme which involves authentication keys. Similar to SEF and IHF discussed in section 3 our proposed En-route filtering scheme also uses the key distribution mechanism employed in WSN. Unlike other schemes which either lack strong filtering capacity or cannot support highly dynamic sensor networks, our scheme uses a hash chain of authentication keys which are used to endorse reports. Meanwhile, a legitimate report should be authenticated by a certain number of nodes. First each node disseminates its key to forwarding nodes. Then, after sending reports, the sending nodes disclose their keys, allowing the forwarding nodes to verify their reports. It can be explained with the help of the following figure 1. Fig. 1. Key Derivation Under this scheme control messages are used to disseminate and disclose the keys to forwarding sensor nodes and later allow nodes to verify the keys by decrypting them and finding a shared secret key. To accomplish this every sensor node maintains 2 secret key pools and a seed key. A series of authentication keys can be derived from this seed key when there is a need. Hence when a shared secret key is found its corresponding authentication keys are derived and stored in the memory of sensor nodes. Thus the keys selected randomly from the key pools are used to encrypt the authentication keys which are collectively used for producing MAC of the report and later used for the report’s collective endorsement. B.  Problem Formulation The vast targeted terrain where the sensor nodes are deployed is divided into multiple cells after network deployment. We assume that sensor nodes within a cell form a cluster which contains n nodes. In each cluster of a cell a node is randomly selected as a cluster head as in figure 2. When an event of interest happens in any of these cells, the sensing nodes of that particular cell detects the event and broadcasts it to the cluster head. The cluster head aggregates the reports and forwards the aggregated report through the report authentication area down to the sink. The topologies of WSNs change frequently either because nodes are prone to failure or because they need to switch their states between Active and Sleeping for saving energy. As sensor networks are not tamper-resistant, it can be compromised by adversaries. Each cluster may contain some compromised nodes, which may in turn collaborate with each other to generate false reports by sharing the secret key information. In this project work we intend to provide solutions for attacks like bogus data injection and denial of services (selective forwarding attack report disruption) that can be launched by adversaries to degrade node’s life time and the critical information carried by them. Fig. 2. Cluster Formation and report forwarding Route to Sink We consider N- Total no. of nodes present in the targeted terrain n- Average no. of nodes in each cell
  • 37. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  29 l- Size of the cell t- no. of correct endorsements to validate a report x- no. of compromised nodes in a cell Cluster head intimates events to sink periodically and finds a routing path called Report Forward Route. We consider that x nodes inject malicious data to reports periodically to drain out battery life. These x nodes inject bogus data by simply offering a wrong MAC to the collective endorsement. Due to the wrong MAC in t endorsements the legitimate event report has the possibility of being dropped by a legitimate node or even a legitimate report share can be dropped by an adversary near to the sink which is called Report Disruption attack. When multiple clusters disseminate keys at the same time, some forwarding nodes need to store the authentication keys of different clusters. Hence the nodes closer to the base station need to store more authentication keys than others do because they are usually the hot spots and have to serve more clusters. Our aim is thus to mitigate the false data injection at early route with minimal overhead, improved network life time, confidentiality and authentication. C.  Design of the Project There are 3 phases involved in the project and the relationships between them are shown in figure 3. Fig. 3. Relationship between phases When an event occurs within some cluster, the cluster-head collects the sensing reports from sensing nodes and aggregates them into the aggregated reports. Then, it forwards the aggregated reports to the base station through a set of forwarding nodes. In our scheme, each sensing report contains one MAC that is produced by a sensing node using its authentication key (called auth-key for short), while each aggregated report contains distinct MACs depending upon the number of the cluster members. In our scheme, each node possesses a sequence of auth-keys that form a hash chain. Before sending the reports, the cluster-head disseminates the first auth-keys of all nodes to the forwarding nodes that are located on multiple paths from the cluster-head to the base station. The reports are organized into rounds, each containing a fixed number of reports. In every round, each sensing node chooses a new auth-key to authenticate its reports. To facilitate verification of the forwarding nodes, the sensing nodes disclose their auth-keys at the end of eachround.Meanwhile,topreventtheforwardingnodes from abusing the disclosed keys, a forwarding node can receive the disclosed auth-keys, only after its upstream node overhears that it has already broadcast the reports. Receiving the disclosed keys, each forwarding node verifies the reports, and informs its next-hop node to forward or drop the reports based on the verification result. If the reports are valid, it discloses the keys to its next-hop node after overhearing. Fig. 4. Overall process of key distribution and Report For- warding The processes of verification, overhearing, and key disclosure are repeated by the forwarding nodes as shown in figure 4 at every hop until the reports are dropped or delivered to the base station. Specifically, our scheme can be divided into three phases: (i) key pre-distribution phase, (ii) key dissemination phase, and (iii) report forwarding phase. In the key pre-
  • 38. 30  HINDUSTAN JOURNAL, VOL. 6, 2013 distribution phase, each node is preloaded with a distinct seed key from which it can generate a hash chain of its auth-keys. In the key dissemination phase, the cluster-head disseminates each node’s first auth- key to the forwarding nodes, which will be able to filter false reports later. In the report forwarding phase, each forwarding node verifies the reports using the disclosed auth-keys and disseminated ones. If the reports are valid, the forwarding node discloses the auth-keys to its next-hop node after overhearing that node’s broadcast. Otherwise, it informs the next-hop node to drop the invalid reports. This process is repeated by every forwarding node until the reports are dropped or delivered to the base station. D.  Algorithm STEP 1: Cluster Head (CH) collects sensing reports as in figure 4, from sensor nodes and generates a number of aggregated reports. R1, R2, R3 CH sends these aggregated reports plus an OK message to next hop υj. Aggregated report must contain t Message Authentication Codes (MACs) from each sensing node with a distinct Z key. Aggregated report R looks as follows. R={r(υi1 ),...,r(υit )}. where υi1 ,...,υit denote t sensing nodes. Since every sensing node reports the same event information E, only one copy of E is kept in the aggregated report R. STEP 2: Receiving the aggregated reports and OK, υj forwards them to next hop, υj +1. CH overhears the broadcast of aggregated reports from υj. STEP 3: Overhearing the broadcast from υj, the CH discloses the authentication keys to υj by message K (t) K(t) = {Auth(υi1 ),..., Auth(υit )} where K (t) contains authentication keys of υi1 ,...,υit . It has the same format as K (n), but contains only t authentication keys. where K (n) is the authentication message collected by CH from the sensing nodes and aggregated to K (n). STEP 4: Receiving K (t), υj first checks the authenticity of disclosed keys using the disseminated ones that it decrypted from K (n) earlier. Then, it verifies the integrity and validity of the reports by checking the MACs of the reports using the disclosed keys. V.  Verification Process 1. To verify the validity of K (t), υj checks if K (t) is in correct format and contains t distinct indexes of z- keys (secret keys picked randomly from global key pool Z). If not, it drops K (t). 2. To verify the authenticity of the authentication keys in K (t), υj checks if each authentication key it stored can be generated by hashing a corresponding key in K (t) in a certain number of times. If not, it is either replayed or forged and K (t) should be dropped. 3. To verify the integrity and validity of reports R1, R2… υj checks the MACs in these reports using the disclosed authentication key that it decrypts from K (t). STEP 5: If the reports are valid, υj sends an OK message to υj +1. Otherwise it informs υj +1 to drop invalid reports. STEP 6: Similar to step 2, υj +1 forwards the reports to next hop. STEP 7: Similar to step 3, after overhearing the broadcast from υj +1, υj discloses K (t) to υj +1. STEP 8: Every forwarding node repeats step 4 to step 7 until the reports are dropped or delivered to the base station. VI.  Simulation Results A.  Introduction In this section, we will start with an introduction to the simulation tool called NS-2, the ways of configuring it
  • 39. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  31 to run sensor networks, and implementation details of the Enroute filtering scheme. B.  Simulation Tool NS-2 is an event driven network simulator developed at University of California at Berkeley, USA, as a REAL network simulator projects in 1989 and was developed with the cooperation of several organizations. NS is not a finished tool that can manage all kinds of network model. It is actually still an on-going effort of research and development. NS is a discrete event network simulator where the timing of events is maintained by a scheduler and able to simulate various types of network such as LAN and WPAN according to the programming scripts written by the user. Besides that, it also implements a variety of applications, protocols such as TCP and UDP, network elements such as signal strength, traffic models such as FTP and CBR, router queue management mechanisms such as Drop Tail and many more. There are two languages used in NS-2; C++ and OTcl (an object oriented extension of Tcl). The compiled C++ programming hierarchy makes the simulation efficient and execution times faster. The OTcl script which is written by the users models the network with its own specific topology, protocols and all requirements needed. The form of output produced by the simulator also can be set using OTcl. The OTcl script is written creating an event scheduler object and network component object together with network setup helping modules. The simulation results produced after running the scripts can be used either for simulation analysis or as an input to graphical software called Network Animation (NAM). Configuration of sensor network simulations: Setting up a sensor network in NS-2 follows the same format as mobile node simulations. Places where sensor network simulations differ from a mobile node simulation are listed below. 1. Configuration of Phenomenon channel and Data channel. 2. Configuration of Phenomenon nodes with the PHENOM “routing” protocol. 3. Configuration of Phenomenon node’s pulse rate and phenomenon type. 4. Configuration of Sensor nodes. 5. Attaching sensor agents. 6. Attaching UDP agent and sensor application to each node. 7. Starting the Phenomenon node. 8. Starting the Sensor Application. Implementation Details Of HMAC’ed Filtering Scheme Implementation Of Md5 Hashing Technique MD5 Hashing technique is used to produce hash of the sensor report. To accomplish this task MD5 algorithm is implemented in tcl script for NS-2 simulation. The steps describing its process are listed below 1. Append the padding bits 2. Append length 3. Initialize the Message Digest buffer 4. Process the message in 512 bit blocks 5. Resultant 128 bit Message Digest. Implementation of Key Comparison Process and Report Delivery As the reports are sent in rounds containing distinct n number of reports, it is not needed to send the whole K (t) which contains all the first authentication keys of the sensor nodes. Instead we can send alone the n number of t authentication keys which will now enable faster deciphering of the MAC-ed reports. In order to filter the false packets at the earlier route, this K (n) is discarded in the nodes nearer to the sink. The above said process is accomplished in the following ways. Keys are randomly picked up from a matrix and they are used for producing HMAC of the report. The cluster head now receives all the first authentication keys from the cluster members packs them in K (n) and sends to the Report forwarding nodes. The Cluster members sense the events and produce HMAC of the report and then send them collectively
  • 40. 32  HINDUSTAN JOURNAL, VOL. 6, 2013 to Cluster Heads. The Cluster head now collectively endorses the received HMAC’s with the preset value. The comparison of keys in K(n) and the key obtained from HMAC ’ed report are verified and forwarded by the cluster heads to their one hop report forwarding nodes. When the HMAC offered by a sensor node is found to be illegitimate, i. e. , if the key found in the HMAC is different from the collectively endorsed report, cluster head marks node as attacker which is shown in Figure 5. Fig. 5. Identification of Attacker through collective endorsement Implementation of Collective Endorsement of Sensor reports. Sensor reports are HMACed as the result of HMAC algorithm implemented in TCL script with the keys randomlypickedupfromtheassignedkeymatrix.Those reports are further divided into small authenticated shares in the range of 16 bytes each and are sent in rounds from the cluster members to the cluster head in order to prevent Report disruption attack. A report disruption attack when launched by an attacker will make the complete legitimate share of sensor report abruptly dropped by a legitimate cluster head by simply offering an illegitimate MAC to the collective share. Hence through collective endorsement, the whole sensor reports are further divided into small authenticated shares such that even when an attacker offers illegitimate HMAC, the cluster head will be able to recover the complete collective share with the help of legitimate shares received from its members. Simulation Environment The proposed secure scheme of Dynamic enroute filtering is implemented in NS-2.27 simulator. The simulation consists of 24 sensor nodes out of which 4 nodes in green color are cluster heads; some nodes are configured to be attackers and a base station. The network is randomly deployed in a terrain dimension of 600m X 600m with the following simulation environment shown in Table 1. Table 1. Simulation Environment PARAMETER VALUE DESCRIPTION Channel Channel/Wireless channel Channel Type Propagation Propagation/Two Ray Ground Radio Propagation Model Network Interface Phy/WirelessPhy Network Interface Type MAC Mac/802_11 Medium Access Control Type Interface Queue Queue/Drop Tail Interface Queue Type Link Layer LL Link Layer Antenna Antenna/Omni Antenna Antenna Model Interface Queue Size 5000(in packets) Maximum packet in interface Queue Routing Protocol AODV Routing Protocol Data Rate 11Mbps Data Transfer Rate Interface Queue Size 50 Maximum packets in Interface Queue. Terrain Dimension 600m X 600m Terrain Dimension of the network Simulation Time 100 Seconds Total duration of the simulation Packet Size 1026Bytes Size of the CBR traffic packet Number of Nodes 25 Number of nodes in the Scenario Energy Model Reception- rx Power 0. 3(J/bits) Transmission- tx Power 0. 5(J/bits) Power Consumption Model
  • 41. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING  33 Performance Metrics Evaluation The performance metrics are used to measure the performance of the proposed system. Filtering capacity Filtering capacity of the proposed scheme is defined as the average number of hops that a false report can be detected by the forwarding node at every hop or the fraction of number of false reports filtered to the number of hops travelled. Energy savings Energy savings of the proposed scheme is defined as the energy consumption in transmission, reception and the computations due to the extra fields which incur extra overhead. We evaluate the length of a normal report without using any filtering scheme and then compare the length of an authenticated report in the next phases of the review. Performance metrics determine the performance of a particular scheme in the presence of constraints related to domain oriented advantages and drawbacks. We have evaluated our Enroute mechanism in terms of throughput and packet loss. Packet loss Mobility-related packet loss may occur at both the network layer and the MAC layer. When a packet arrives at the network layer, the routing protocol forwards the packet if a valid route to the destination is known. Otherwise, the packet is buffered until a route is available. A packet is dropped in two cases: the buffer is full when the packet needs to be buffered and the time that the packet has been buffered exceeds the limit. It can be evaluated with the formula given below. Packet Loss (in packets) = DataAgtSent − DataAgt Rec where AGT– agent trace (used in new trace file format) Scenario: Packet Loss Vs Number of Attacker nodes: Same scenario is maintained in which Packet loss is computed by varying the number of attackers. As shown in Figure 6, packet loss seems to be very high when there is increase in the attacker’s count. Attackers try to launch selective forwarding attack, report disruption attack and false report injection attack in which the total availability requirement of the critical information is lost leading to total energy drain of the resource constrained sensor nodes or false positives or false negatives intimation at the base station. Under this state the malicious node drops all the packets from a selective node or selective packets from a node leading to a huge packet loss in the network as discussed in the Threat and Trust model of section 2. With Enroute Filtering mechanism packet loss is reduced to 40% which is achieved by the identification of attacker nodes through collective endorsement implemented in the cluster heads. Fig. 6. Packet Loss Vs Number of Attacker node VII. Conclusion A major challenge for a Wireless Sensor Network lies in the energy constraint at each node, which poses a fundamental limit on the network life time. Even though there are many enroute filtering schemes available in the literature they either fail to support the dynamic nature of the sensor networks or they cannot efficiently mitigate the adversary’s activities. Hence this enroute filtering scheme is currently an area of much research among the security professionals. Generally AODV performs better than many other on- demand protocols under high mobility, large network scenarios. When the size of the network is large and highly mobile the frequency of the link failure is also high. Due to this, latency and control load of the network is also increased. Also due to the attacker’s
  • 42. 34  HINDUSTAN JOURNAL, VOL. 6, 2013 single illegitimate MAC there is a threat of dropping the complete legitimate share. In this work, we propose a HMAC’ed filtering scheme for WSN that utilizes the dissemination of authentication keys for filtering false data injection attacks and DoS attacks. In our scheme, each node uses its own authentication keys to authenticate the reports and a legitimate report should be endorsed by t nodes. The authentication keys of each node form a hash chain and are updated in each round. The Enroute scheme also yielded a better attacker detection and mitigation framework together with disseminated key structure. We thus analyzed the performance metrics of the Enroute Filtering scheme with AODV protocol in terms of Throughput and Packet Loss and the results are also discussed. In future we intend to compare the performance of Enroute Filtering Scheme implemented with the security protocols such as SPINS etc. References [1] Yun Zhou, Yuguang Fang, and Yanchao Zhang, “Securing wireless sensor networks: a survey”, IEEE Communications Surveys Tutorials, Vol. 10, No. 3, pp. 6-28, 2008. [2] Al-Sakib Khan, Pathan,Hyung-Woo Lee, and Choong Seon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, International Conference on Advanced Computing Technologies, Vol. 4, No. 1, pp. 1043-1045, 2006. [3] Zoron S. Bojkovic, Bojan M. Bakmaz, Miodrag, and R. Bakmaz, “Security Issues in Wireless Sensor Networks”, International journal of Communications, Vol. 2, no. 1, pp. 106-114, 2008. [4] Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of First IEEE International Workshop of Sensor Network Protocols and Applications, Vol. 1, pp. 113-127 2003. [5] H. Fang, F. Ye, Y. Yuan, s. Lu, and W. Arbaugh, “Toward resilient security in wireless sensor networks”, proceeding of ACM international symposium on Mobile ad hoc networking and computing, Vol. 3, pp. 14-27, 2003. [6] F. L. Lewis “Wireless Sensor networks” Available: http://arri. uta. edu/acs [7] G. Padmavathi and Mrs. D. Shanmugapriya, “A Survey of Attacks, security mechanisms and challenges in wireless sensor networks”, International Journal of Computer science and Information Security, Vol. 4, No. 1, pp. 1-9, 2009. [8] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communication Magazine, Vol. 40, No. 8, pp. 102–114, 2002. [9] Hemanta Kumar Kalita, and Avijit Kar, “Wireless Sensor Network Security Analysis” International journal of Next-Generation Networks, Vol. 1, no. 1, pp. 1-10, 2009. [10] Elaine shi and Adrian perrig, “Designing secure sensor networks”, IEEE wireless communications, Vol. 2 pp. 38-43, 2004. [11] Haowen Chan, Adrian Perrig, and Dawn Song, “Random Key Pre distribution Schemes for Sensor Networks”, Proceedings of IEEE Symposium on Security and Privacy, Vol. 3, pp. 1-17, 2003. [12] F. Ye, H. Luo, S. Lu, and L. Zhang “Statistical En-route detection and filtering of injected false data in sensor networks,” Proceedings of IEEE INFOCOM, Vol. 4, pp. 2446–2457, 2004. [13] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-by-Hop authentication scheme for filtering of injected false data in sensor networks,” Proceedings of IEEE Symposium on Security and Privacy, Vol. 4, pp. 259–271, 2004. [14] Kui Ren, Wenjing Lou, and Yanchao Zhang, “LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks”, Proceedings of the 25th IEEE International Conference on Computer Communications pp. 1-12, 2006. [15] Fasee Ullah, Muhammad Amin, and Hamid ul Ghaffar, “Simulating AODV and DSDV