The document discusses an experimental study on shear strengthening of reinforced concrete beams using carbon fiber reinforced polymer (CFRP) sheets. Five simply supported RC beams were cast, with one control beam and four beams strengthened with different CFRP wrap configurations: full side wrap, one side U-wrap at shear, vertical wrap stirrups, and inclined wrap stirrups. Tests were conducted to determine the structural behavior, shear strength, shear failure mode, and effectiveness of CFRP strengthening. Results showed that beams with side U-wrap stirrups exhibited delayed initial cracking and higher ductility, which is desirable in earthquake-prone areas. Strain gauges were used to study stress distribution and crack propagation. CFRP wrapping
Scholars World- International Refereed Multidisciplinary Journal Of Contemporary Research is a Quarterly research journal. It is an open access peer review journal. It publishes the articles comprising the Arts, Science & Commerce area.
The journal is very especially intended for professors, Scholars, Academicians, Professional & research scholars those who want to seek genuine authentic research material. It is an internationally approved journal.
Started to create milestones, we, Creative Circle marked our presence in the year 1962 and operate in the manufacturing / servicing of Architectural Consultancy,Town Planning Services,City Planning Services,Landscape Consultancy,Road Development & Street Furniture Design since 50. Our quality services / products have been always appreciated by our clients. Our spontaneous attitude and confident approach in offering an excellent range of Architectural Consultancy,Town Planning Services,City Planning Services,Landscape Consultancy,Road Development & Street Furniture Design, Public Service has deepened our roots in the market. We, Creative Circle breathe with the aim of fully satisfying our clients with our high-quality products / services. We are a unit of highly experienced professionals, all of them contributing at the best of their potentials to offer the highest degree of efficiency and client satisfaction.
Providing out services like Infrastructure Planning, Architectural Services, Town Planning Services, Architectural Consultancy, Landscape Consultancy, Hydraulic Design And Engineering Consultancy, Water Supply, Sewerage And Storm Water Planning, Road Development & Street Furniture Design, City Planning Services, Town Planning Services. we also render Storm Water Draining Services, Slum Development Services, Landscape Consultant, City Development Plan Services and Architectural Services.
Scholars World- International Refereed Multidisciplinary Journal Of Contemporary Research is a Quarterly research journal. It is an open access peer review journal. It publishes the articles comprising the Arts, Science & Commerce area.
The journal is very especially intended for professors, Scholars, Academicians, Professional & research scholars those who want to seek genuine authentic research material. It is an internationally approved journal.
Started to create milestones, we, Creative Circle marked our presence in the year 1962 and operate in the manufacturing / servicing of Architectural Consultancy,Town Planning Services,City Planning Services,Landscape Consultancy,Road Development & Street Furniture Design since 50. Our quality services / products have been always appreciated by our clients. Our spontaneous attitude and confident approach in offering an excellent range of Architectural Consultancy,Town Planning Services,City Planning Services,Landscape Consultancy,Road Development & Street Furniture Design, Public Service has deepened our roots in the market. We, Creative Circle breathe with the aim of fully satisfying our clients with our high-quality products / services. We are a unit of highly experienced professionals, all of them contributing at the best of their potentials to offer the highest degree of efficiency and client satisfaction.
Providing out services like Infrastructure Planning, Architectural Services, Town Planning Services, Architectural Consultancy, Landscape Consultancy, Hydraulic Design And Engineering Consultancy, Water Supply, Sewerage And Storm Water Planning, Road Development & Street Furniture Design, City Planning Services, Town Planning Services. we also render Storm Water Draining Services, Slum Development Services, Landscape Consultant, City Development Plan Services and Architectural Services.
National science day in India is celebrated on 28th February every year in honour of Indian physicist Sri Chandrashekar Venkata Raman, the discoverer of Raman Effect or Raman scattering effect in year 1928. It is believed that C.V Raman along with another physicist K.S Krishnan passed light through different transparent liquids and found that Raman Effect is feeble for liquid in compared to solid compounds.
National science day in India is celebrated on 28th February every year in honour of Indian physicist Sri Chandrashekar Venkata Raman, the discoverer of Raman Effect or Raman scattering effect in year 1928. It is believed that C.V Raman along with another physicist K.S Krishnan passed light through different transparent liquids and found that Raman Effect is feeble for liquid in compared to solid compounds.
5. PANEL OF ADVISORS
Dr. BVSSS PRASAD
Professor of Mechanical Engineering,
lIT, Madras
Dr. S. SHANMUGAVEL
Professor, Department of Electronics and
Communication Engineering,
Anna University. Chennai
Dr. A. ALPHONES
Associate Professor, Division of Communication
Engineering
School of Electrical and Electronics Engineering,
Nanyang Technological University, Singapore
Dr. P. RAMESHAN
Director & Professor (Strategic Management)
lIM, Rohtak
Dr. G.L. DUTTA
Chancellor,
K.L. University, Vijayawada
Dr. HARSHA SIRISENA
Emeritus Professor,
Electrical & Computer Engineering,
University of Canterbury, Chirstchurch,
New Zealand.
Dr. LAKMI JAIN
Professor of Knowledge Based Engineering,
Founding Director of the KES Centre,
Electrical and Information Engineering,
University of South Australia, Adelaide.
Dr. PAULAPPASAMY
Honorary Professor,
Madras School of Economics, Chennai.
Dr. N. GANAPATHI SUBRAMANIAM
Professor , Quantum - Functional Semiconductor
Research Center,
Dongguk University,
Republic of Korea
PANEL OF REVIEWERS
APPLIED SCIENCES
Dr. C.Indira
Dr. K.Nithyanandam
Dr. I.Sasirekha
BUILDING SCIENCES
Dr. V.Subbiah
Dr. R.Angeline Prabhavathy
Dr. Ravikumar Bhargava
Dr. Jessy Rooby
Dr. P.S.Joanna
Dr. Sheeba Chander
COMPUTING SCIENCES
Dr. Anitha S. Pillai
Dr. Rajeswari Mukesh
Dr. E.R.Naganathan
Dr. S.Nagarajan
Ms. P.Ranjana
Ms. S.Lakshmi Sridevi
Ms. S.Vijayalakshmi
ELECTRICAL SCIENCES
Dr. R.Devanathan
Dr. M.J.S.Rangachar
Dr. A.K.Parvathy
Dr. P.M.Rubesh Anand
Ms. Manjula Pramod
MECHANICAL SCIENCES
Dr. D.G.Roy Chowdhury
Dr. B.Venkataraman
Dr. G.Ravikumar Solomon
Dr. T.Jeyapovan
Dr D.Dinakaran
Dr. Hyacinth J. Kennady
Dr. A.Anitha
iii
6. Scanning the Issue
The current issue of Hindustan Journal
provides articles of varied interest to readers.
In the area of Building Sciences, the paper
by Karuppiah and Angeline Prabhavathy
discusses the prospect of shear strengthening
of reinforced concrete beams using carbon
fiber reinforced polymer. Nagarajan and
Ravi K. Bhargava analyse the role of trees
and plants in the hospital premises in order
to improve the well- being of recuperating
patients. Thulasi Gopal provides an analysis
of the design of an Integrated Silk Park at
Kanchipuram to bring back its lost glory.
Karthigeyan argues the case for the speedy
implementation of high speed rail links in
India citing the successful story of high speed
trains in China.
Under the section on Computing Sciences,
Kodhai, Bharathi and Balathiripurasundari
propose a filtering scheme for wireless
sensor networks to address bogus reports,
false report injection attacks and denial of
services. Thiyagarajan, Rasika, Sivasankari
and Sophana Jennifer propose an artificial
neural network based anomaly detection
techniquetodetectchangesinmedicalreading
in a patient monitoring system. SreeVidhya
proposes a new fuzzy clustering algorithm
which can handle efficiently outlier as well
as natural data. Deeptha and Rajeswari
Mukesh propose a genetic algorithm based
selection model to improve the quality of
service performance in the context of web
services development.
Under the section on Electrical Sciences,
the paper by Priya and Seshasayanan
proposes a method to improve the efficiency
of impulse noise detection techniques in
images. Prakash and Kumaraguru Diderot
explain and review the commonly used cyclic
redundancy checking algorithm for verifying
data integrity. Helen and Arivazhagan
propose the use of temporally ordered routing
algorithm along with medium access control
to overcome bandwidth limitation.
UnderthesectiononMechanicalSciences,
Jeya Pradha and Mahendran evaluate the
evaporative heat transfer characteristics of a
refrigerant mixture using computational fluid
dynamics.RavikumarandSaravanandescribe
the design and fabrication of a chilling system
to reach a very low temperature to meet
the requirements of specific applications.
Viswanathan, Sengottuvel and Arun review
the application of electrical discharge
machine for the machining of hard materials.
Under Education and Library Sciences,
Aby Sam and Akkara Sherine eloquently
discuss the role of community colleges in
nation building and describe a success story
to drive home their point. Bhaskaran Nair
argues passionately the case for an integrated
professional programme on teaching
English as a second language. Boopalan,
Nithyanandam and Sasirekha gaze at the
crystal ball and wonder about the future role
of the librarian in an information era.
Finally, we conclude the issue with a list
of forthcoming conferences for the benefit of
our readers.
Dr. R.DEVANATHAN
Chief Editor
iv
7. Contents
BUILDING SCIENCES
Shear Strengthening of RC Beam Using Carbon
Fiber Reinforced Polymer Sheet 1
Pl. Karuppiah and R. Angeline Prabhavathy.
A Qualitative Research on the Role of Landscape
Architecture in and around Hospital Premises as an
Aid to Medical Treatment in Chennai 7
R. V. Nagarajan and Ravi K. Bhargava
A Research on Nuances of Silk Weaving and Designing a
Handloom Hub at Kanchipuram 15
Ar . Thulasi Gopal
A Case for the Development of High Speed Rail Link in India 21
D. Karthigeyan
COMPUTING SCIENCES
HMAC Filtering Scheme for Data Reporting in Wireless Sensor
Network26
E.Kodhai, P.Bharathi and D.Balathiripurasundari
An Efficient Neural Network Technique to Detect Collective
Anomalies in E-Medicine 36
G.Thiyagarajan, C.M.Rasika, B.Sivasankari and S.Sophana Jennifer
Deriving Intelligence from Data through Text Mining 42
C.T.Sree Vidhya
Web Service Assortment through Genetic Algorithm and XML 50
Deeptha R and Rajeswari Mukesh
v
8. HINDUSTAN JOURNAL, VOL. 6, 2013
ELECTRICAL SCIENCES
Improving the Efficiency of Impulse Noise Estimation 55
S.V.Priya and R.Seshasayanan
Review of Cyclic Redundancy Checking Algorithm 61
Prakash V R and Kumaraguru Diderot P.
Optimization of Temporally Ordered Routing Algorithm
(TORA) in Ad-Hoc Network 67
D.Helen and D.Arivazhagan
MECHANICAL SCIENCES
Evaluation of Evaporative Heat Transfer Characteristics
of CO2
/Propane Refrigerant Mixtures in a Smooth
Horizontal Tube using CFD 71
S.Jeya Pratha and S.Mahendran
Design and Fabrication of Ultimate Chilling System 78
T.S.Ravikumar and S.Saravanan
Review of Electrical Discharge Machining Process 83
K.Viswanathan, P.Sengottuvel and J.Arun
EDUCATION AND LIBRARY SCIENCES
Community Colleges to SEmpower the Youth to
Transcend Social Barriers 88
Aby Sam and Akkara Sherine
Continuous Professional Development (CPD):
A Proposal for an Integrated Programme in
Teaching English as a Second Language (TESL) 97
P Bhaskaran Nair
Librarianship in Digital Era 101
E. Boopalan, K. Nithyanandam and I. Sasirekha
FORTHCOMING CONFERENCES 106
vi
9. HINDUSTAN JOURNAL, VOL. 6, 2013
Shear Strengthening of RC Beam Using Carbon Fiber
Reinforced Polymer Sheet
PL. Karuppiah and R. Angeline Prabhavathy
Abstract — The technique of strengthening of
reinforced concrete beam with externally bonded
Carbon Fiber Reinforced Polymer (CFRP) has
been successfully applied in Civil Engineering. This
paper discusses the effect of shear strengthening of
RC beams on the stress distribution, initial crack,
crack propagation and ultimate strength. The
experimental programme includes testing of five
simply supported reinforced concrete beams of
which four beam specimens are cast with bonding
CFRP and the remaining one beam without CFRP
which is considered as the control beam. The CFRP
epoxy bonded specimens are specimens, with full
side wrap (FSW), one side u wrap at shear (SUWS),
vertical wrap stirrups (VWS) and inclined wrap
stirrups (IWS). Mix design of M30 concrete is
adopted and the mix proportion is arrived at. Based
on the mix proportion, the specimens are cast. The
deflection, shear failure, cracking and ultimate
load for rectangular beams bonded with CFRP
are investigated. The experiments are conducted
to predict the critical load, cracks and increase in
strength. It is concluded that in beams bonded
with side u wrap stirrups (SUWS), there is a delay
in the formation of initial crack and the ductility
ratio is higher, which is desirable in earthquake
prone areas. The general and regional behaviour of
concrete beams with bonded CFRP are studied with
the help of strain gauges. The appearance of the first
crack and the crack propagation in the structure up
to failure is monitored and discussed for the control
and the strengthened beams.1
Intex terms — CFRP wrap, U-wrap, Carbon fiber.
PL. Karuppiah and R. Angeline Prabhavathy are
in School of Building Sciences, Hindustan University,
Chennai, India, (e-mail: plkaruppiah@hindustanuniv.
ac.in, deanbs@hindustanuniv.ac.in).
I. Introduction
Carbon Fiber composites and reinforced polymer
offer unique advantages in many applications where
conventional materials cannot provide satisfactory
service life. Carbon fiber reinforced polymer (CFRP) is
a very strong and light fiber reinforced polymer which
contains carbon fiber. The polymer which is most often
used is epoxy, but other polymers such as polyester,
vinyl ester or nylon are sometimes used. The composite
may contain other fibers such as Kevlar, aluminum,
glass fibers as well as carbon fibers. The use of CFRP
is advantageous, because it is easier to maintain a
relatively uniform epoxy thickness throughout the
bonding length. By using CFRP wrap, the shear
strength and stiffness increase substantially reducing
shear cracking.
This paper provides the results of an experimental
investigation on using CFRP sheets to prevent local
cracks around shear region in reinforced concrete
beams.
II. Literature Review
Norris et al. (1997) investigated the shear and
flexural strengthening of RC beam with carbon fiber
sheets. The CFRP sheets were epoxy bonded to the
tension face and web of concrete beams to enhance
their flexural and shear strengths. When the CFRP
sheets were placed perpendicular to cracks in the beam,
a large increase in stiffness and strength was observed
and there was no difference in the behavior between
the pre-cracked beams and the un-cracked ones at the
ultimate level. It was concluded that CFRP (carbon
fiber reinforced plastic) sheets increased the strength
and stiffness of existing concrete beams when bonded
to the web and tension face.
10. 2 HINDUSTAN JOURNAL, VOL. 6, 2013
Chaallaletal.(1998)studiedtheshearstrengthening
of RC beams using externally bonded side CFRPsheets.
It is concluded that diagonal side CFRP (Carbon fiber
reinforcement plastic) strips outperformed vertical
side strips for shear strengthening in terms of crack
propagation, stiffness and shear strength.
Alex Li et al. (2001) investigated the shear
strengthening of RC beam with externally bonded
CFRP sheets. The results of tests performed in the
study indicated that stiffness increased while increasing
the area of the CFRP sheet at the flanks and the strain
gauge measurements showed that strengthening the
entire lateral faces of the beam was not necessary.
For the strengthened beam, the ultimate strength had
a significant increase when compared with the normal
beam. Spadea et al. (2001) studied the strength and
ductility of RC beams repaired with bonded CFRP
laminates. The results showed that significant increase
in strength was obtained by strengthening with bonded
CFRP laminates.
Charlo Pellegrino et al. (2002) investigated the
shear strengthening of reinforced concrete beams using
fiber reinforced polymer. Except for the control tests, all
the tests were done on beams with side-bonded CFRP
sheets. The comparison between the experimental and
the theoretical values were made and it was found
that the shear capacity increment is due to Carbon
Fiber Reinforced Polymer. Tavakkolizadeh et al.
(2003) investigated the strengthening of steel-concrete
composite girders using carbon fiber reinforced
polymer sheets. The result indicated that the load-
carrying capacity of a steel-concrete composite girder
improved significantly and the ultimate load-carrying
capacities of the girders significantly increased by 44,
51, and 76% for 1, 3 and 5 layers respectively.
Kesse et al. (2007) investigated the experimental
behaviour of reinforced concrete beams strengthened
with pre-stressed CFRP shear straps. He concluded
that the pre-stressed CFRP strap strengthening system
showed good results and it is an effective means of
significantly increasing the shear capacity of existing
concrete structures.
From the review of literature, it has been found
out that much work has not been done on shear
strengthening of RC beams with different types of
CFRP wraps. Therefore the shear strengthening of RC
beams with CFRP wrap is discussed in this paper.
III. Experimental Program
In the experiment program of this research, tests are
conducted on reinforced concrete beams with external
bonding of CFRP sheets in the shear zone. The beams
are tested under two-point loading to investigate their
structural behaviour. The objective of this experimental
investigation is to determine the
●● Structural behaviour of RC beam;
●● Shear strength of RC beam;
●● Shear failure of RC beam and
●● Shear strengthening of RC beam using CFRP
sheets.
Experimental investigations always show
the real behaviour of the structure, an element or a
joint. Five rectangular RC beams are cast and tested
under two point loading. Out of five beams, one is a
control beam. The CFRP epoxy bonded specimens are
specimens with full side wrap, one side u wrap at shear,
vertical wrap stirrups and inclined wrap stirrups. The
following are the dimensions of the beam.
A. 3.1 Beam Dimension Details
Size: 2000 x150 x 250 mm
Effective cover: 20 mm
Grade of concrete: M30
B. 3.2 Type of material
Sheet: Carbon fibre reinforced polymer
Glue for bonding: Nitowrap 30 (Base),
Nitowrap 410 Harder, Nitowrap 410 Base.
IV. Specimen Details
Tests are carried out on five reinforced
concrete beam specimens and all are strengthened for
shear capacity using external bonded CFRP wraps.
The beam with 150 x 250 mm cross section and 2000
mm clear span are simply supported and subjected to
two concentrated static loads. Steel stirrups of 8mm
diameter are placed at 160 mm spacing along the beam
length for all beams. Fig. 1 shows the Test setup and
Fig. 2 shows the setup of vertical wrap stirrups. Table 1
shows the details of specimens and reinforcement.
11. KARUPPIAH AND ANGELINE PRABHAVATHY: SHEAR STRENGTHENING OF RC BEAM 3
Fig. 1. Test setup
Fig. 2. Setup of Vertical wrap stirrups
Table 1. Details of specimen and reinforcement
Details of
beam
Types
of beam
Testing
of beam
(days)
Reinforcement in beam
Longitudinal Stirrups
Control
beam
C B
28
2-10# @ top
and 2-12# @
bottom
8mm #
stirrups @
160mm
C/C
Full side
wrap
FSW
Side U
wrap at
shear
SUWS
Vertical
wrap
stirrups
IWS
Inclined
wrap
stirrups
VWS
V. Material Properties
The concrete used in the experimental program is M20
and steel with nominal yield strength of 415 N/mm2
is
used as the longitudinal reinforcement.
A. Properties of Nitowrap
Tables 2 to 4 show the properties of Nitowrap CF,
Nitrowrap 30(primer), and Nitrowrap 410 (Saturant)
respectively.
Table 2. Nitowrap CF
Fibre orientation Unidirectional
Weight of fibre 200 g/m2
Density of fibre 1.80g/cc
Fibre thickness 0.30mm
Ultimate elongation (%) 1.5
Tensile strength 3500 N/mm2
Tensile modulus 285 x103
N/mm2
Table 3. Nitowrap 30, Primer
Colour Pale yellow to amber
Application
temperature
150
C - 400
C
Viscosity Thixotropic
Density 1.25 - 1.26 g/cc
Pot Life 2 hours at 300
C
Cure time 5 days at 300
C
Table 4. Nitowrap 410, saturant
Density 1.14 g/cc
Pot life 25 min. @ 270
C
Full cure 7 days
B. Surface preparation
It is ensured that concrete surfaces are free from oil
residues, demoulding agents, curing compounds, grout
holes and protrusions. Structural damages are repaired
by using epoxy grouting/ appropriate mortar from the
Renderoc range. All depressions, imperfections etc. are
repaired by using Nitocote VF/ Nitomortar FC, epoxy
putty.
The base and hardener are thoroughly mixed in a
container for 3 minutes. Mechanical mixing using a
heavy-duty slow speed (300-500 rpm) drill, fitted with
a mixing paddle is done.
The mixed material of Nitowrap 30 epoxy primer
is applied over the prepared and cleaned surface. It
is applied with a brush and allowed to dry for about
24 hours before application of saturant. The mixed
material of Nitowrap 410 saturant is applied over the
tack free primer.
12. 4 HINDUSTAN JOURNAL, VOL. 6, 2013
VI. Results And Discussions
Five simply supported reinforced concrete beam
specimens are tested which include one control beam,
and four CFRP epoxy bonded specimens with full side
wrap (FSW), one side u wrap at shear (SUWS), vertical
wrap stirrups (VWS) and inclined wrap stirrups (IWS).
The load deflection behaviour, first crack load, finial
crack load and maximum deflection are studied.
A. Load – Deflection behaviour
Table 5 shows the Comparison of Ultimate Load and
Maximum Deflection.
Table 5. Comparison of Ultimate Load and Maximum
Deflection
Si.No.
Specimen
First
Crack
Load(kN)
Ultimate
Load(kN)
Maximum
Deflection
(mm)
1 C B 33.5 123.9 32.6
2 FSW 51.8 158.8 14.3
3 SUWS 41.9 122.5 32.4
4 IWS 22.6 122.4 22.4
5 VWS 54 134.8 26.8
The comparison of initial crack, final crack and
deflection of various specimens are shown in Fig 3 to 5.
Fig. 3. Bar chart of first crack load
Fig. 4. Bar chart of final crack
Fig. 5. Bar chart of maximum deflection
From Fig. 3, it can be seen that the first crack is
delayed in the case of FSW and VWS beams. Fig. 4
shows that the final crack is delayed only in the case of
FSW beam.
Fig. 5 shows that the deflection is minimum in the
case of FSW beam. Fig. 6 shows the Load Vs deflection
behaviour of the various beam specimens.
Fig. 6. Load Vs Deflection Behaviour of All Beam speci-
mens.
From the load – deflection behaviour, it can be seen
that the load carrying capacity is maximum for FSW
beam but brittle failure occurs.
In SUWS beam, the initial crack occurs at 41.9 kN
which is 25% higher than that of the control beam. The
ductility ratioes also higher in SUWS beam which is
desirable in earthquake prone areas.
B. Failure Pattern
Fig. 7 shows the cracking pattern of a control beam.
The initial crack occurs at 33.5 kN and final crack at
123.9 kN. The ultimate load is 123.9 kN.
13. KARUPPIAH AND ANGELINE PRABHAVATHY: SHEAR STRENGTHENING OF RC BEAM 5
Fig. 7. Cracking pattern of Control beam
Fig. 8 shows the cracking pattern of FSW
specimen. The initial crack occurs at 51.1 kN and final
crack at 157.5 kN. The ultimate load is 158.8 kN. Total
CFRP covered area is 1400 mm (Length), and 170 mm
(Height).
Fig. 8. Cracking pattern of FSW specimen
Fig. 9 shows the cracking pattern of SUWS
specimen. The initial crack occurs at 41.9 kN and final
crack at 122.6 kN. The ultimate load is 122.6 kN. CFRP
is wrapped in the shear area as U section, with a width
of 250 mm.
Fig. 9. Cracking pattern of SUWS specimen
Fig. 10 shows the cracking pattern of IWS
specimen. The initial crack occurs at 22.6 kN and
final crack at 123.8 kN. The ultimate load is 123.8 kN.
Inclined CFRP stirrups are wrapped at an angle of 60o
with a width of 60 mm.
Fig. 10. Cracking pattern of IWS specimen
Fig. 11 shows the cracking pattern of VWS
specimen. The initial crack occurs at 54 kN and final
crack at 129 kN. The ultimate load is 129 kN. Vertical
CFRP stirrups 100mm wide are wrapped at 90o
.
Fig. 11. Crack pattern of VWS specimen
Debonding of CFRP wraps occurred after the initial
crack appeared. Fig. 12 to Fig. 15 show the debonding
of CFRP.
Fig. 12. Debonding of FSW specimen
14. 6 HINDUSTAN JOURNAL, VOL. 6, 2013
Sudden failure of FSW beam occurred at the
ultimate load.
Fig. 13. Debonding of SUWS specimen
Fig. 14. Debonding of IWS specimen
Fig. 15. Debonding of VWS specimen
VII. Conclusion
Tests were performed in externally applied epoxy-
bonded CFRP. Based on the test results the following
conclusions are drawn.
●● Compared to all other specimens deflection of FSW
specimen is less and load bearing capacity is more.
However brittle failure occurs.
●● In SUWS beam, the initial crack occurs at 41.9 kN
which is 25% higher than that of the control beam.
The ductility ratio is also higher in SUWS beam
which is desirable in earthquake prone areas.
References
[1] Tom Norris et al. (1997), Shear And Flexural
Strengthening Of RC Beams With Carbon Fiber
Sheets. Journal of Structural Engineering 123,
903-911.
[2] O. Chaalla. et al. (1998), Shear Strengthening
Of RC Beams by Externally Bonded Side CFRP
Strips. Journal of Composites for Construction,
2, 111-113.
[3] Alex Li, et al. (2001), Shear Strengthening Of RC
Beams With Externally Bonded CFRP Sheets.
Journal of Structural Engineering,127, 374-380.
[4] G. Spadea et al. (2001), Strength And Ductility
Of RC Beams Repaired With Bonded CFRP
Laminates, Journal of Bridge Engineering, 6,
349-355.
[5] Carlo Pellegrino et al. (2002), Fiber Reinforced
Polymer Shear Strengthening of Reinforced
Concrete Beams with Transverse Steel
Reinforcement. Journal of Composites for
Construction, 6, 104-111.
[6] M. Tavakkolizadeh, et al.(2003), Strengthening of
Steel-Concrete Composite Girders Using Carbon
Fiber Reinforced Polymers Sheets. Journal of
Structural Engineering, 129, 30-40.
[7] Gyamera Kesse et al., (2007), Experimental
Behavior of Reinforced Concrete Beams
Strengthened with Prestressed CFRP Shear
Straps. Journal of Composites for Construction,
11, 375-383.
15. HINDUSTAN JOURNAL, VOL. 6, 2013
A Qualitative Research on the Role of Landscape
Architecture in and around Hospital Premises as an Aid to
Medical Treatment in Chennai.
R. V. Nagarajan and Ravi K. Bhargava
Abstract — The milieu of the hospitals ought to be
healthy and hygienic for the patients to recuperate
from their illness. The role of trees and plants
in a hospital premises is considered a dynamic
parameter in the creation of the hospital quality.
This paper attempts to discern the ratio of minimum
land / area required for the medicinal landscape
to the area of hospital units. The very question of
how to border out the minimum quantity of trees
required for a hospital landscape is the prime aim
of this research. Secondly, what are the aspects (air
purification, killing bacteria, noise reduction, etc.)
to be considered in the selection of trees, is the next
level of research. Finally, aided by statistical results
of a survey conducted in hospitals, this research
narrows down to the ratio (x:y) for a typical hospital
premises, where ‘x’ is the minimum area required
for ‘n’ number of occupants (patients, non-patients,
hospital-staff, etc.) and ‘y’ is the minimum open
space required for the medicinal landscape to be
executed for a Healthy Hospital.1
Index terms — Landscape, Hospital, Treatment.
I. Introduction
“Research gathered over recent years has highlighted
the countless benefits to people, wildlife and the
environment that come from planting trees and creating
new woodland habitat. It is obvious trees are good
things,” says Clive Anderson.
R.V. Nagarajan and Ravi K. Bhargava are in School
of Architecture, Hindustan University, Chennai, India,
(e-mail: rvnagarajan@hindustanuniv.ac.in)
The belief that plants and gardens are beneficial for
patients in healthcare environments is more than one
thousand years old, and appears prominently in Asian
and Western cultures [1].
The awareness of the positive influence of the
outdoor environment on patients’ healing process
has long been present in hospital architecture. The
term healing garden applies to the gardens that
promote recuperation from illness. In this context,
‘healing’ does not necessarily refer to curing, but to
the overall improvement of well-being.Integration
and unity of hospital buildings and their surrounding
outdoor spaces contribute to the creation of hospital
as a ‘small city within a city’, with its own specific
patterns of use [2].
II. Characteristics of Plants
Plants possess the ability of escalating the pain tolerance
effects in the patients so as to enable them to recuperate
from their illness or surgery. This ability of the plants
is found nil in the first case and comparatively higher
in the third case than the second one in the following
category [3]:
1. No plants
2. Foliage plants
3. Foliage + Flowering plants
Patients in hospital rooms with plants and flowers
have significantly showed more positive physiological
responses, lower ratings of pain, anxiety and fatigue,
and more positive feelings and higher satisfaction
about their rooms than the patients who are kept in
16. 8 HINDUSTAN JOURNAL, VOL. 6, 2013
rooms without plants [4]. Findings of such researches
suggested that plants in a hospital environment
could be noninvasive, inexpensive, and an effective
complementary medicine for patients recovering from
abdominal surgery.
Researchers who have assessed the impact of
nature/plants on human health have suggested that
nature and plant experiences are positively associated
with human physical [5], psychological [6], emotional
[7], and cognitive health [8]. In addition, viewing
nature/plants is linked to pain reduction, less need for
analgesics, and fast recovery from surgery [9].
For many years, the importance of aesthetics in
relevance to the health was not experimentally proven
as the additional quality of plants. Apart from the
recuperation of illness, aesthetic of plants is another
important philosophical discipline which must be added
to the ambience of hospital for the further betterment to
both the patients and the doctors. High quality nursing
care includes the aesthetic dimension [10].
Aesthetics influences a person’s feelings, both
physical and psychological. Both aesthetic and non-
aesthetic surroundings create an impression and affects
a person consciously or unconsciously [11].
III. Method to Calculate Green Areas
for Any Site
According to the Green Guide for Health Care, the
following formula is for the calculation of the required
green area: Natural Habitat Area = (Site Area x Site Size
Factor) / Floor Space Ratio, where Floor Space Ratio =
Gross Constructed Area including all service spaces and
excluding parking areas / Site Area and Site Size Factor
= (1/√Site Area) x 10 (usually around 0.15) [12].
The main difference between the calculation of
green areas for any site and with hospital site is the
nature of the people occupying it. The prime aim of
this research is to find out the variation in the level of
the ratio in the above formula framed by the GGHC
(Green guide for Health Care), with the level of the
ratio in hospital site, particularly concentrating on the
landscape features.
IV. Design Considerations for Hospital
Landscaping
In an ideal case, optimal distribution of the total site area
of a hospital complex should be the following: 30% for
the buildings, 15% for internal communication routes
and parking, 50% for vacant area (25-30% in case of
hospitals with a limited capacity for future growth) out
of which 10% is reserved for recreational areas.
In brief, they should be planned according to
following requirements: (1) to create opportunities for
movement and exercise; (2) to offer a choice between
social interaction and solitude; (3) to provide both direct
and indirect contacts with nature and other positive
distractions [13].
Several studies of non-patient groups (such as
university students) as well as patients have consistently
shown that simply looking at environments dominated
by greenery, flowers, or water -- as compared to built
-scenes lacking nature (rooms, buildings, towns) -- is
significantly more effective in promoting recovery or
restoration from stress.
To promote the speed of postoperative recovery and
to improve the quality of life during hospitalizations, it
is important to provide patients with not only the best
treatment possible, but also to remove such sources of
stress and to counter them with positive distractions.
V. Interior Plants
When plants were added to the interior space, the
participants were more productive (12% quicker
reaction time on the computer task) and less stressed
(systolic blood pressure readings lowered by one to
four units). Immediately after completing the task,
participants in the room with plants present reported
feeling more attentive (an increase of 0.5 on a self-
reported scale from one to five) than people in the room
with no plants [14].
Regardless of the physical air quality benefits, people
generally have an affinity to being around plants. Many
studies have proven a link to plants and their beneficial
psychological effects on people, including increases in
productivity and decreases in stress levels [15].
In 2006, many studies were published that indicated
that simply having three small potted plants can
significantly reduce (50-75%) the total VOC (Volatile
Organic Compound) levels in a real office of 30-50m3
size [16]. The only consideration was that the level of
total VOC needed to be above 100ppb - a concentration
level that is much lower than acceptable limits.
TheNationalAeronauticsandSpaceAdministration
studies on indoor landscape plants and their role in
17. NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE 9
improving indoor air quality included reports on toxins
common to the interior environment, specifically
benzene, formaldehyde, and trichloroethylene [17].
The following list of plants typically used in the
interior environment outlines the plants found to be
more effective in air purification, based on the NASA
studies [18].
1. Aechmeafasciata (Excellent for formaldehyde and
xylene)
2. Aglaonemamodestum (Excellent for benzene and
toluene)
3. Aloe vera (Excellent for formaldehyde)
4. Chamaedorea Bamboo (Excellent for benzene and
formaldehyde)
5. Chlorophytumelatum (Excellent for carbon
monoxide and formaldehyde)
6. Chrysanthemum morifolium (Excellent for
trichloroethylene, good for benzene and
formaldehyde)
7. Dendrobium Orchid (Excellent for acetone,
ammonia, chloroform, ethyl acetate, methyl
alcohol, formaldehyde and xylene)
8. Dieffenbachia maculate (Good for formaldehyde)
9. Dracaena deremensis (Excellent for benzene and
trichloroethylene, good for formaldehyde)
10. Dracaena marginata (Excellent for benzene, good
for formaldehyde and trichloroethylene)
11. Dracaena Massangeana (Excellent for
formaldehyde)
VI. Surveillance in Hospitals in Chennai
As the aim of this research was conceptualized to
calculate the ratio of the minimum open space required
for landscape in a hospital to the built up space of the
site, the research was further proceeded to organize
a survey with the people who inhabit the hospital
premises.
Surveys were carried out in three major hospitals
in Chennai in the following categories: 1. a hospital
in the populated / noisy zone of the city. 2. A hospital
specialized for a single disease. 3. A hospital located in
the outskirts.
Following hospitals in Chennai were selected for
the survey: 1. Rajiv Gandhi Government Hospital,
Central, Chennai. 2. Cancer Institute, Adyar, Chennai
and 3. Kamakshi Memorial Hospital, Velachery Road,
Chennai.
VII. Selection of People for Survey
It was already planned that the selection of the people
for survey was as per the requirement of the research.
So, the people for survey were categorized into four
following types: 1. with respect to occupation, 2. with
respect to their age, 3. with respect to the time of survey
and 4. with respect to their gender.
Fig. 1. Occupation
Fig. 2. Age
18. 10 HINDUSTAN JOURNAL, VOL. 6, 2013
Fig. 3. Time
Fig. 4. Gender
VIII. Report on The Surveillance
The following are the statistical ripostes for the
questionnaire prepared for the survey:
Fig. 5. Liking of parts of Hospital
(a)
(b)
(c)
(d)
(e)
Fig. 6. Sub categories of fig. 5.
Fig. 7. Duration in Hospital
19. NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE 11
Fig. 8. Noise Level
Fig. 9. Smoke / Dust in premises
Fig. 10. Preferred surroundings
Fig. 11. Elements missing in Hospital
Fig. 12. Inside the building-1
Fig. 13. Inside the building-2
20. 12 HINDUSTAN JOURNAL, VOL. 6, 2013
Fig. 14. Trees liked
Fig. 15. Trees recommended
Fig. 16. Trees disliked
IX. Synthesis of The Survey
From the above report of the survey conducted in three
hospitals in Chennai, the following are the syntheses
observed:
1. 57.5% People feel comfort in the place where the
following trees are planted: Azardirastraindica,
Ficusreligiousa, Ficusbengalinensis, Flowering
trees and Pongameapinnata.
2. 63.7% of people desperately want some mode of
system to enhance their breathing comfort, and
50% among them recommended plants inside the
building.
3. As most of the previous researches proved, 45%
of the people surveyed preferred flowering plants
in their vicinity and they expressed that they felt
relaxed compared to the people who were not
having flowering plants in their rooms.
4. Equally, 40% of people preferred earth walkway
and also lawn in the open space of the premises.
5. 65% of people complained that the process of
shedding leaves of trees is irritable than the
problems of insects over it (32% complained of
insects).
6. Among the people surveyed, 75% of patients, 65%
of non - patients and 78% of staff members of
hospital prefer to rest under the tree during mid-
day.
7. Age wise, 82% of above 55 age people preferred
noiseless area than the active / noisy area.
8. Almost 95% of the women prefer to rest inside the
building than resting under trees, street-benches or
anywhere in open spaces.
9. Almost 88% of the men patients whose rooms were
not having plants felt boredom and wanted to move
around, when the same feeling was felt by only
15% of the men patients whose rooms had plants.
10. Almost 90%of all age group men and women who
are patients prefer to have a walk in either in the
morning or in the evening in the road which has
trees, than the road which does not have them.
11. Area Calculation of the First hospital: Total Area
- 61,336.0716 sq.m and the total open space is
22,114.0452 sq.m.
12. Area Calculation of the Second hospital: Total
area - 31,567.9558 sq.m and the total open space is
16,423.8566 sq.m
13. Area Calculation of the Third hospital: Total Area:
- 12,437.2557 sq.m and the total open space is
3,211.7854 sq.m
21. NAGARAJAN AND BHARGAVA:A QUALITATIVE RESEARCH ON THE ROLE OF LANDSCAPE 13
14. The satisfaction level of the people staying in the
premises in terms of overall aspects, synthesized
from all the three hospitals is as follows: 71.35%,
83.75% and 56.21% are the percentage of the
satisfaction level measured from the first, second
and third hospitals respectively.
15. With the above satisfaction levels measured, the
total built up area, total open space area and the site
area of all the three premises are multiplied with
the percentages of the satisfaction level.
16. 71.35% of 22,114.0452sq.m. =x
17. 83.75% of 16,423.8566 sq.m= y
18. 56.21% of 3,211.7854 sq.m= z
19. Built up spaces of all the three premises are
considered as a, b and c respectively.
X. Calculation of Ratio of Minimum Open
Space for A Hospital
(x+y+z) / 3 = Xos
where x, y, z are the satisfied open area for a hospital
and Xos
is the factor for open space.
(a+b+c) / 3 = Ybs
where a, b, c are the built up area of the hospital
buildings and Ybs
is the factor for built up space.
XI. Conclusion
The research concludes that Xos
:Ybs
is the ratio of
minimum open spaces to the built up space of a hospital
premises.
References
[1] Ulrich, R. S. and R. Parsons (1992), “Influences
of passive experiences with plants on individual
well-being and health. In D. Relf (Ed.)”, The
role of horticulture in humanwell-being and
social development, Portland, Timber Press, pp.
93-105.
[2] DejanaNedučin, “Milena Krklješ,
NađaKurtović-Folić”, “Hospital Outdoor
Spaces - Therapeutic Benefits And Design
Considerations”, Architecture and Civil
Engineering Vol. 8, No 3, 2010, pp. 293 - 305
[3] S.-H. Park, R.H. Mattson, E. Kim (2011), “Pain
Tolerance Effects of Ornamental Plants in a
Simulated Hospital Patient Room”, Department
of Horticulture, Forestry and Recreation
Resources, Kansas State University.
[4] Seong-Hyun Park and Richard H. Mattson,
(2009) “Effects of Flowering and Foliage Plants
in Hospital Rooms on Patients Recovering from
AbdominalSurgery”,DepartmentofHorticulture,
Forestry and Recreation Resources, Kansas State
University.
[5] Chang, C. and P. Chen. (2005). “Human response
to window views and indoor plants in the
workplace”, Hort Science 40:pp.1354–1359.
[6] Kaplan,R.andS.Kaplan.(1995),“Theexperience
of nature: A psychological perspective”, Ulrich’s,
Ann Arbor, MI.
[7] Adachi, M., C.L.E. Rode, and A.D. Kendle.
(2000), “Effects of floral and foliage displays on
human emotions”, HortTechnology 10:pp.59–63.
[8] Cimprich, B. (1993), “Development of an
intervention to restore attention in cancer
patients”, Cancer Nurs. 16:pp.83–92.
[9] Diette, G., E. Haponik, and H. Rubin. (2003),
“Distractiontherapywithnaturesightsandsounds
reduces pain during flexible bronchoscopy”,
Chest 12:pp.941–948.
[10] SynnøveCaspari, (2006), “The aesthetic
dimension in hospitals - an investigation into
strategic plans”, International Journal of Nursing
Studies 43 pp.851–859.
[11] Ulrich, R., (1991), “Effects of interior design on
wellness. Theory on recent scientific research”,
Journal of Health Care and Interior Design, 3.
[12] Green Guide for Health Care, Version 2.2, SS
Credit 5.1., Site Development: Protect or Restore
Open Space or Habitat, 2007, www.gghc.com,
p.6 23.
[13] Ulrich, R.S., Cooper-Marcus, C., Barnes, M.
(Eds.), (1999), “Effects of Gardens on Health
Outcomes: Theory and Research, in Healing
Gardens: Therapeutic Benefits and Design
22. 14 HINDUSTAN JOURNAL, VOL. 6, 2013
Recommendations”, John Wiley Sons, New
York, pp. 27-86.
[14] Virginia I. Lohr, Caroline H. Pearson-Mims,
and Georgia K. Goodwin, “Interior Plants
May Improve Worker Productivity and Reduce
Stress In A Windowless Environment”,
Department of Horticulture and Landscape
Architecture Washington State University,
Pullman, WA 99164-6414
[15] Ryan Hum and Pearl Lai (2007), “Assessment of
Biowalls: An Overview of Plant- and Microbial-
based Indoor Air Purification System”.
[16] Wood, R.A., Burchett, M.D., Alquezar, R.,
Orwell, R.L., Tarran, J. and F. Torpy. (2006). “The
potted-plant microcosm substantially reduces
indoor air VOC pollution: I. office field-study”,
Water, Air, and Soil Pollution, 175, pp.163-180.
[17] Prescod, A.W. (1992). “More indoor plants as air
purifiers”, Pappus, 11:4.
[18] United States Environmental Protection Agency
(1991), “Sick building syndrome”, Air and
Radiation, Indoor Air Facts, 4.
23. HINDUSTAN JOURNAL, VOL. 6, 2013
A Research on Nuances of Silk Weaving and Designing a
Handloom Hub at Kanchipuram
Ar. Thulasi Gopal.
Abstract—Thelostplatformofsilkweavingindustry
in Kanchipuram has been identified in order to
bring back the lost glory of original silk weaving
techniques, process and products through down to
earth planning and designing patterns. A particular
communityhasbeenconfinedtotheseindustries.The
idea of the silk parks with appropriate infrastructure
is to create awareness among others to take up
this profession. Deliberate research and extensive
interaction with the weaving community has gone
into evolving this design concept. The weaving
community was widely studied on their everyday
lifestyle, weaving activity, duration to complete each
activity, spacial organization, proximity of spaces
etc., in order to meet the requirements in the Silk
Park. Apart from these, the supporting activities
like cocoon reeling and dyeing activities and their
spaces were studied. Weaver’s psychology which
results in the sari designs, creativity etc., was taken
into account for giving a suitable design solution.
Emotions related to the occupational spaces resulted
in interior-exterior connectivity, to avoid solitude.
Traditional Kanchipuram weavers’ house and their
elements were studied to incorporate those features
into the design. The challenge in the output was
how all the versatile activities of silk weaving can be
designed under one roof, bringing in wholesomeness
through form, tone, style, texture, hue, and bringing
unity, balance and continuity. The design created
would provide people involved with a comfortable
living environment that they are longing for and
contribute to India’s gross domestic product.1
Index Terms — Silk Weaving, Handloom, Spatial
Organization, Design, Interior-exteriorconnectivity.
Ar. Thulasi Gopal is in School of Architecture,
Hindustan, Chennai, India, (e-mail: gopal.aarthi@
gmail.com)
I. Introduction
Tamil Nadu has a rich cultural history and legacy that
spans several areas. All of these need to be preserved
for posterity as they remind the people of its enormity
and feat. It has a world class brilliances to showcase,
which needs to be nurtured and suitably promoted to
support the branding and economic outcomes.
One such craft that needs to be reinstated from a
declining trend is Silk weaving. India is the second-
largest Silk producer in the world, next to China and
major sourcing base for international retail players.
According to Tamil epic ‘Silapadikaram’ the Silk
handloom weaving activity is said to have existed
since second Century AD at Kanchipuram. It is one of
the traditional centers of Silk weaving and handloom
industries that is losing its identity.
The Scheme for Integrated Textile Park was
approved by Central Government of India to facilitate
settingupofTextileparkswithworldclassinfrastructure
and amenities. The Government of Tamilnadu has
proposed to bring a Silk park at Kanchipuram. Seventy
five acres of land allotted by the Government of Tamil
Nadu for the purpose is located at Kilkathirpur village,
Kanchipuram Taluk and District.
II. Constraints
The Silk and other textile industries are still community
driven i.e. a particular community is confined to these
industries. The idea of the Silk parks with appropriate
infrastructure is to create awareness among a lot of
others to take up this profession. This in turn keeps
the industry in the head front of Indian economic
development and increases the demand for Indian
textiles in International markets.
24. 16 HINDUSTAN JOURNAL, VOL. 6, 2013
Sriperumbudhur industrial area is situated 35 kms
away from Kanchipuram which attracts people to work
there due to time flexibility, better income and less hard
work (when compared to weaving), suitable transport
facilities, allowances etc., provided by the companies
such as Hyundai, Nokia etc.
III. Objectives
The objectives of the project are
●● To design a prime handloom hub
●● To re-establish the traditional and cultural value of
ancient silk weaving which is the prime occupation
of the temple city and its surrounding villages and
village hamlets of Kanchipuram.
●● To encourage the occupation, by providing the
workers with better functioning environment and
resources that would take the economy of the rural
sector to a superior stature.
●● To bring back the lost platform for the weavers
to market their products, avoid duplicate market
players and also to showcase the culture.
IV. Methodology
The methodology proposed to be adopted are
●● Understanding the site surroundings and services.
●● Understanding the occupation and workplace.
●● Weavers’ needs/opinions through questionnaires.
●● Comparison of history against recent happenings.
●● Techniques in the field to choose the best for
today’s scenario.
●● Requirement framing in detail.
●● Case study- comparative study of Ayangarkulam
(weaving village and Pillayarpalayam weaving
town).Analysis of the common and the contrasting
features and characteristics.
●● Formulating conceptual ideas.
●● Development of concepts into schemes and into
final design output.
V. Scope and Nature of Activities in The
Complex
The spaces planned on site are: Administration and
expo hall, Research center and training, Marketing area,
Warehouse, Cocoon reeling, Garment unit, Canteen
and hostel , Dyeing unit –CETP, Weaving cluster,
Residential cluster, Central hub – OAT, health care,
child care., Restaurant, Guest house, Multipurpose
area, Temple along with the pond, and other Services.
The main focus in the design was given to the Dyeing
cluster, Weaving cluster and the Residential Cluster.
VI. Challenges Faced
The challenges faced include
●● Bringing in different activities in one complex.
●● Bringing wholesomeness in the design.
●● Creating buffer spaces between each block.
●● Proximity between all the spaces.
●● Connectivity and flow of functions.
●● Segregating the different residential, floating,
working and shopping population.
●● Meeting the workplace requirements.
●● Innovations for enhanced productivity of silk
products.
VII. Analysis Along With Evolution
of Design
Deliberate research and extensive interaction with the
weaving community has gone into evolving this design
concept. Their needs have been understood and have
been approached accordingly.
The site, on entry, will have the administrative
blocks, followed by the marketing blocks with a
research and testing center. This is to facilitate effective
marketing of the products as well as to ensure the
quality of the products. There is an industry, behind
the marketing area, which is to produce woven Silk
garments. The need for original silk sarees is decreasing
day by day and hence the requirement of the weavers
too is receding. To change this situation, silk can be
used to produce various other useful garments, apart
from sarees. They can be in accordance with the current
trends in fashion. This will escalate the demand for
woven silk garments which will in turn increase the
demand for the weavers.
25. THULASI GOPAL:A RESEARCH ON NUANCES OF SILK WEAVING 17
After a detailed discussion with the village weavers,
it was found that they are not very keen with the idea
of shifting to a new alien location. Hence the design is
done in such a way so as to provide them with the most
homely environment possible.
The weaving looms customized is specific to match
the needs of the Kanchipuram weavers. The houses
planned in the Silk Park are categorized into two main
styles, as per the requirements of the weavers. After
documentation, observation and analysis with the
weaving community of Kanchipuram, it was understood
thattheyarebroadlysegregatedintotwogroups,basedon
their economic needs. The houses have been constructed
in such a way so as to cater to their needs.
One of the concepts adopted by the earth institute
at Auroville is CSEB – Compressed Stabilized Earth
Blocks. The soil at the site was observed to be sandy
clayey soil, one such type of soil which is used for
making CSEB blocks which can be used for construction.
This does not require any skilled labours at work, and
hence can be a source of income to the local dwellers,
who necessarily are not weavers, surrounding the site.
As mentioned, the site is located 7 km away from the
original weaving society; hence the locales here too
will have an opportunity to gain through employing the
concept. A large water body, for example, a typical pond
is created that facilitates water distribution to different
areas on site through the tank which is a focal feature on
site. The mud evacuated to create these water bodies will
be used for CSEB block making. Burnt bricks replaced
by CSEB blocks provide a sustainable concept.
There are farming areas around each housing
sectors, which will enable food production. This
offers them an additional source of income, as well
as an alternate food source. There are green areas
designed all around the site which acts as a buffer
space, segregating the diversified functions involved
in weaving a saree.
The central focus of this site is a multipurpose area
with a temple, a water body, commercial spaces, which
will provide the platform necessary for the weavers
to hold fares. It is to break the monotonous weaving
routine and to provide them with some relaxation. The
fares are also a means of interaction and communication
with weaving communities from other districts and
states. Thus holding fares and exposition summons
collaborative work from other communities, along with
exchange of various important ideas and tools, which
will not only improvise the silk weaving techniques but
also make them aware of the current trends in the market.
All the silk saree shops can be shifted under the silk
society’s supervision so that adulteration is minimized
and originality is maintained. Training centers can be
proposed with Government certified courses on silk
weaving to attract younger generation into this activity,
Fig.1, 2 and 3 describe the process, design features
and the concepts adopted respectively in regard to the
proposal of the handloom hub at Kanchipuram.
VIII. CONCLUSION
Combination of traditional and contemporary
architecture is done which targets site planning level to
weaving machine design customized for the weavers.
Macro level to micro level planning is undertaken.
Material from site is used for construction which can
involve local dwellers who can be benefited apart from
the main target - the weavers. Dyeing areas which were
earlier inside the Kanchipuram towns causing pollution,
will be shifted here where the CETPis set up to solve the
issue of pollution. Considering the hot humid climate,
features like courtyard have been adopted to give a
natural day lighting and stack effect thus maintaining
a suitable indoor environment. Better workspace is
created which will result in better productivity. Efficient
usage of energy, water, and other resources is seen.
Measures are taken to protect occupants health and
improve employee productivity. Maximum reduction
in waste, pollution and environmental degradation is
seen into. CSEB blocks, which are green materials are
extensively used in the construction.
BIBILIOGRAPHY
http://www.silkclick.com
http://www.csapl.co.in/industrial.asp
http://www.thehindu.com/todays-paper/tp-national/
tp-tamilnadu/site-identified-for-silk-park-in-
kancheepuram/article168017.ece
http://www.kanchipuramdistrict.com/
http://smehorizon.sulekha.com/advancement-
made-panipat-weaving-industry-sustain_textiles-
viewsitem_8253
http://www.oldandsold.com/articles04/textiles16.shtml
http://environmental_impact_assessment
29. HINDUSTAN JOURNAL, VOL. 6, 2013
A Case for the Development of High Speed Rail Link in India
D. Karthigeyan
Abstract — Indian Railways is an Indian state-
owned enterprise, owned and operated by
the Government of India through the Ministry of
Railways. It is one of the world’s largest railway
networks comprising 115,000 km (71,000 mi) of
track over a route of 65,000 km (40,000 mi) and
7,500 stations. India is a country with more than
1.2 billion population, which includes 35 cities with
more than 1 million people each as per Census 2011.
Its urban population is increasing day by day, and
the rail network forms the lifeline of the country,
where majority of the people are poor and cannot
afford to travel by air. Under these circumstances,
India which is aiming to become a global super
power by 2050 requires high speed rail network
similar to China, which has the world’s largest
high speed railway network of more than 10,000
km. In this context, India needs to have a quality
and affordable high speed rail network for its poor
people to connect its major metropolitan areas
and to decongest the which are transforming to
megalopolition areas.1
Index terms — High speed rail network, Bullet train,
Transportations.
I. Introduction
High-speed rail is a type of rail transport that operates
significantly faster than traditional rail traffic, using
an integrated system of specialized rolling stock and
dedicated tracks. The first such system began operation
in Japan in 1964 and was widely known as the bullet
train. Even though India has one of the world’s largest
railway networks, it is yet to find itself a place in the
D. Karthigeyan is in School ofArchitecture, Hindustan
University, Chennai, India, (e-mail: dkarthikeyan@
hindustanuniv.ac.in)
list of countries which currently have a commercial
high speed rail network. The average speed of trains in
developed nations is around 200 kmph whereas in India,
the maximum speed of any train hardly exceeds 150
kmph. Rajdhani and Shatabdi are among the fastest trains
which run nearly at a speed of 120 kmph. On the other
hand, India’s neighbour China has built world’s largest
high speed railway network of about 10,463 Km long
[2]. China also has the largest single track length between
Beijing and Guangzhou which is 2,298 km. China has
world’s fastest trains running at the speed of 380 kmph.
It is surprising to see that the high-speed railway network
in China was developed in a short span of five years. The
proposal for high speed trains had come to fore in 1990 in
that country and work had started in 2007.
Fig. 1. High speed rail in China
In 2015 China will have 18,000km of high speed
rail. Just five years after China’s high-speed rail system
opened. It is carrying nearly twice as many passengers
each month as the country’s domestic airline industry.
With traffic growing at 28 percent a year for the last
several years, China’s high-speed rail network will
handle more passengers by early next year than the 54
million people a month who board domestic flights in
the United States.
30. 22 HINDUSTAN JOURNAL, VOL. 6, 2013
China’s high-speed rail system has emerged
as an unexpected success story. Economists and
transportation experts cite it as one reason for China’s
continued economic growth when other emerging
economies like India are faltering due to the global
economic slowdown.
Chinese workers are now more productive.
The productivity gains occur when companies find
themselves within a couple of hours’ of train ride of
tens of millions of potential customers, employees
and rivals. Companies are opening research and
development centers in more glamorous cities like
Beijing and Shenzhen with abundant supplies of
young, highly educated workers, and having them take
frequent day trips to factories in cities with lower wages
and land costs, like Tianjin and Changsha. Businesses
are also customizing their products more through
frequent meetings with clients in other cities, part of a
broader move up the ladder toward higher value-added
products.
Airlines in China have largely halted service on
routes of less than 300 miles when high-speed rail links
open. They have reduced service on routes of 300 to
470 miles. The double-digit annual wage increases give
the Chinese enough disposable income that domestic
airline traffic has still been growing 10 percent a year.
Currently, China’s high-speed rail service costs
significantly less than similar systems in developed
countries, but is considerably more expensive than
conventional rail service. For the 419 km trip from
Beijing to Jinan, High Speed Rail costs US$30 and
takes 1 hour 32 minutes, while a conventional train
costs US$12 and takes about 6 hours. By comparison,
the Acela train from Washington DC to New York City
covering a slightly shorter distance of 370 km costs
US$152–180 and takes 2 hour 50 minutes [3].
Fig. 2. China’s Pan-Asian high-speed rail link
Chinese government have a major plan with
respect to high speed rail network, by connecting
it to the whole of Asia and European Continent, so
that all its freight travel will happen through this
network, which in turn will make the Chinese a
global leader in the trade and commerce. In this
connection, Chinese government even plans to build
a high-speed rail line connecting its south-western
city of Kunming to New Delhi and Lahore, part of a
17-country transcontinental rail project which is part
of its pan-Asian high-speed rail link. After many
years of negotiations with other Asian countries,
China has finally reached agreements with several
Central Asian countries and got the green signal to
its ambitious pan-Asian high-speed rail link, which
envisages connecting cities in China to Central Asia,
Iran, Europe, Russia and Singapore.
II. High Speed Rail Network
There is no standard or a global definition for it;
however, there are certain parameters that are unique to
high-speed rail, which are
●● UIC (International Union of Railways) and EC
Directive 96/58 define high-speed rail as systems
of rolling stock and infrastructure which regularly
operate at or above 250 km/h (155 mph) on new
tracks, or 200 km/h (124 mph) on existing tracks.
However lower speeds can be required by local
constraints.
●● A definitive aspect of high speed rail is the use
of continuous welded rail which reduces track
vibrations and discrepancies between rail segments
enough to allow trains to pass at speeds in excess of
200 km/h (124 mph).
●● Depending on design speed, banking and the forces
deemed acceptable to the passengers, curve radius
is above 4.5 kilometres (2.8 mi) and for lines
capable of 350 km/h (217 mph) running, typically
at 7 to 9 kilometres (4.3 to 5.6 mi).
A. Parameters of A High Speed Travel:
●● The frequency of service,
●● Regular-interval timetables,
●● A high level of comfort,
31. KARTHIGEYAN:A CASE FOR THE DEVELOPMENT OF HIGH SPEED RAIL 23
●● A pricing structure adapted to the needs of
customers,
●● Complement with other forms of transport,
●● More on-board and station services.
Fig. 3. Inside first class cabin of high speed train in France
B. On The Eco-Friendly Atmosphere:
●● Transport is responsible for 25% of the world’s
carbon dioxide (Co2) emissions, with 80 – 90%
coming from cars and highway trucks, and only 2
% from rail.
●● On high-speed railways the energy consumption
per passenger-kilometer is three and half times less
than for a bus, five times less than for air and ten
times less than for a private car.
●● The social cost of noise, dust, carbon dioxide, nitric
oxide and sulfur oxide emission for high-speed rail
is one fourth of road transport and one-sixth for air.
●● It requires the construction of an eight-lane
highway to provide the same capacity as a double
track high-speed railway line [1].
Worldwide concerns over depleting fossil fuel
reserves, climate change, overcrowded airports, delayed
flights and congested roads have conspired with the
high speed rail technology as the only alternative.
High speed rail entails much less land usage than
motorways: a double track rail line has more than thrice
the passenger carrying capacity of a six-lane highway
while requiring less than half the land.
India is a relatively small country with a huge
population and it will be too costly to build highways
so high-speed rail network will be a better option to
improve transportation efficiency and to conserve the
depleting resources.
High speed rail network is the best choice for
distances of 500-700 km, where airlines cannot match;
below 200 km, road transport has an edge; beyond
1,000 km, air option may be better.
III. Indian Government Context
In India, high speed trains are often referred to as “bullet-
trains”. One of the first proposals by the Government of
India to introduce high-speed trains was mooted in the
mid-1980s by then Railway Minister. A high speed rail
line between Delhi and Kanpur via Agra was proposed.
An internal study found the proposal unviable at that
time due to the high cost of construction and inability of
travelling passengers to bear much higher fares than what
was changed for normal trains. The Railways instead
introduced Shatabdi trains which ran at 130 km/h.
Fig. 4. Potential high speed rail corridors in India
The Indian Ministry of Railways’ in its white-
paper Vision 2020 submitted to the Parliament on
December 2009 envisages the implementation of
regional high-speed rail projects to provide services at
250-350 km/h, and planning for corridors connecting
commercial, tourist and pilgrimage hubs. Six corridors
have already been identified and feasibility studies
have been started,
1. Delhi-Chandigarh-Amritsar,
2. Pune-Mumbai-Ahmadabad,
32. 24 HINDUSTAN JOURNAL, VOL. 6, 2013
3. Hyderabad-Dornakal-Vijayawada-Chennai,
4. Howrah-Haldia,
5. Chennai-Bangalore-Coimbatore-Ernakulam,
6. Delhi-Agra-Lucknow-Varanasi-Patna.
These high-speed rail corridors will be built as
elevated corridors in keeping with the pattern of
habitation and the constraint of land.
Two new routes were later proposed by Indian
Railways, namely
●● Ahmadabad - Dwarka, via Rajkot, Jamnagar and
the other from Rajkot to Veraval via Junagadh [4]
A. Approach to High-Speed
Indian Railways’ approach to high-speed is on
incremental improvement on the existing conventional
lines for up to 200 km/h, with a forward vision of speed
above 250 km/h on new tracks with state-of-the-art
technology.
B. Upgrade Tracks for 160-200 Km/H
The approach is to upgrade the dedicated passenger
tracks with heavier rails, and build the tracks to a close
tolerance geometry fit for 160-200 km/h. High-speed
tracks to be maintained and inspected using automation
to ensure required track geometry. There is a need
to perform more frequent inspection to ensure high
confidence of safety at high-speed.
C. Likely Initial Lines
In India, trains in the future with speed of 250-350 km/h,
are envisaged to run on elevated corridors, to prevent
trespassing by animals and people. This is an excellent
way to isolate high-speed train tracks.
D. Project Execution
The cost of building high speed rail tracks is about Rs
70 crore/km (U$15.6m/km), compared with Rs 6 crore/
km of normal rail tracks.
E. High Speed Rail Corporation of India Ltd
Indian Railways set up a corporation called High Speed
Rail Corporation of India Ltd (HSRC) in July 2012 that
will exclusively deal with the proposed ambitious high
speed rail corridor projects. It will handle tendering,
pre-feasibility studies, awarding of contracts and
execution of the projects. All high-speed rail lines will
be implemented through public private partnership
(PPP) mode on a Design, Build, Finance, Operate and
Transfer (DBFOT) basis.
IV. Prospect of High Speed Train Operation
in India
Mumbai – Ahmadabad rail line is likely to be the
first high speed rail network project in India which
the central government plans to take in the next five
year plan. Central Government is likely to make
some important announcements on this project in
the upcoming Budget session of the Parliament,
and the state government of Maharashtra is keeping
its fingers crossed as till now the share between
the centre and the state government is yet to be
announced.
Both France and Japan Governments have shown
interest in this line which covers a distance of 500
kilometers (312 miles) and expected to cost around
Rs.65,000 crores. Both the governments have taken a
feasibility study and are likely to submit the report by
March 2014. Both the governments are hopeful, that
their technology will be utilized in building this high
speed rail network. Their feasibility study includes
defining “high speed” for India (which could be 300-
350 km per hour), the fares and the finance practices,
including public-private partnerships.
On the technology front, what separates the French
high-speed train technology from the Japanese, who
pioneered the system, is that TGV trains of France
could be operated at a normal speed (160 kmph), and
on special sections, shifted to peak speeds. This made
it possible to integrate them easily with the existing
railways. Costs are high for such systems but when
supplied with cheap Indian labor the total cost will
come down drastically.
Fig. 5. Rail link from Mumbai to Ahmadabad
33. KARTHIGEYAN:A CASE FOR THE DEVELOPMENT OF HIGH SPEED RAIL 25
The quickening pace of commercial co-operation
comes with India and Japan -- both democracies
-- eyeing the rise of China with increasing unease,
as Beijing presses territorial claims with growing
insistence [5]
With this regard, Japan has already submitted its
final report of the feasibility study on upgrading the
speed of the existing Mumbai-Ahmadabad route to
160-200 km per hour and further consultations on the
report between the two countries are on.
V. Benefits in The Indian Context
In India, out of all the benefits, discussed earlier,
the reduced journey time has been the overriding
consideration in the adoption of high-speed rail work.
On the basis of the current experiences in the world, it
has been observed that when the distances are between
300 to 600 Km, and the travel time by the high-speed
train is less than 2 – 2.5 hours, the market share of
passengers for the high-speed rail is at least 75-80%.
This percentage decreases dramatically when the travel
time of train increases to 4 to 5 hours and a round trip
during the day is not possible.
High speed train operation will play a significant
role in the de-congestion of megalopolis towns of
Delhi, Kolkata, Mumbai, Chennai, etc. Operationally,
high-speed trains can optimally connect cities 500 to
1,000 km apart, and in one of the best-known sectors,
Paris-Lyon, the peak capacity is 12,000 passengers per
hour at 1,000 people per train, providing service once
in four minutes.
VI. Conclusion
Once the Indian government decides, it should not take
more than 4-5 years to have high-speed trains running
on Indian soil. The benefits for a common man will be
like,
●● With less than one hour of journey time, it will
then be possible to live in the salubrious climate of
Chandigarh and commute to Delhi for work.
●● A bullet train between Bangalore and Mysore
(about 88 miles) will decongest Bangalore and
one can reach Mysore in 30 minutes. This train
will bridge the travel time between Bangalore and
Mysore and pave way for their development as
twin cities.
●● High-speed rail lines from Bangalore to Chennai
(180 miles) are also under discussion by the
Government of India. Then we might reach
Chennai within an hour from Bangalore by the
surface transport. [6]
References
[1] Mundrey, “Tracking for High speed trains in
India”, January, 2010, RITES Journal.
[2] http://zeenews.india.com/news/world/china-s-
high-speed-bullet-train-network-exceed-10-000-
km_879426.html
[3] http://www.globalresearch.ca/eurasian-economic-
boom-and-geopolitics-china-s-land-bridge-to-
europe-the-china-turkey-high-speed-railway
[4] http://www.mapsofindia.com/railways/high-
speed-rail-corridors.html
[5] http://www.ibtimes.com/next-stop-bangalore-
japan-may-help-south-india-build-high-speed-
rail-system-1408542
[6] http://www.indianexpress.com/news/india-japan-
to-study-highspeed-rail-feasibility/1134280/
34. HINDUSTAN JOURNAL, VOL. 6, 2013
HMAC Filtering Scheme for Data Reporting in
Wireless Sensor Network
E. Kodhai, P. Bharathi and D. Balathiripurasundari
Abstract —Wireless SensorNetworks consist of a large
number of small sensor nodes, high processing power,
limited in usage of efficient security mechanisms and
susceptible to possible node compromise, passive
and active attacks. These restrictions make them
extremely vulnerable to a variety of attacks. Mostly
public key cryptographic techniques are found to be
more work prone with the secure exchange of keys,
mainly lengthy hash operations with high processing
rounds etc. Even though these techniques do not
provide adequate verification process of reports from
source to sink, they do not completely mitigate false
report injection attacks and Denial of Service attacks.
In this work we propose a HMAC’ed filtering scheme
for secure transmission of data and we propose a
technique called encryption of combined hashes which
filters bogus reports and then specifically addresses
false report injection attacks and Denial of Services.
It has three phases which are Key Pre-distribution,
Key Dissemination and Report Forwarding Phase.
The legitimacy of the report being forwarded by the
cluster head is collectively endorsed by a preset value
and achieved by Message Authentication codes. In
our proposed scheme the increase in performance is
achieved through control messages, increasing secure
datatransmissionandaddressingfalsedatareports.1,2
Index Terms — Wireless Sensor Network, mobile
relay nodes, wireless routing, bandwidth, energy
consumption.
E. Kodhai and P. Bharathi are in Department of
Information Technology, Sri Manakula Vinayagar
Engineering College, Pudhucherry, India. (e-mail:
kodhaiej@yahoo.co.in, bharathyit3@gmail.com)
D. Balathiripurasundari is in DotNet TCS Corporate,
Chennai. (e-mail: bala10.12.1990@gmail.com.)
I. Introduction
Sensor networks are dense wireless networks which
are small in size, very low-cost and which collect and
disseminate environmental data. Wireless Sensor
Networks (WSNs) facilitates monitoring and controlling
of physical environments from remote locations with
better accuracy. They have applications in a various
fields such as environmental usage, military requirement
and gathering sensing information in inhospitable places.
Sensor nodes have various energy and calculating
constraints because of their inexpensive nature and ad
hoc method of deployment.
The number of nodes in a WSN is usually much
larger than that in an ad hoc network. Sensor nodes
are more resource constrained in terms of power,
computational capabilities, and memory. Sensor nodes
are typically randomly and densely deployed (e. g., by
aerial scattering) within the target sensing area. The post-
deployment topology is not predetermined. Although in
many cases the nodes are static in nature, the shape and
size might change frequently because the sensor nodes
and the wireless channels are prone to failure.
II. System Model
Some of the existing schemes for Filtering False
Reports in WSN are Statistical En-route Filtering
(SEF), Interleaved hop-by-hop authentication (IHA)
and Providing Location aware End- to-End Data
Security (LEDS). The details of these techniques are
discussed briefly in the following sub-sections.
A. Statistical En-route Filtering (SEF)
Ye et al. [12] proposed a statistical En-route filtering
(SEF) scheme based on probabilistic key distribution.
35. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING 27
In SEF, a global key pool is divided into n partitions,
each containing m keys. Every node randomly picks k
keys from one partition. When some event occurs, each
sensing node (that detects this event) creates a Message
Authentication Code (MAC) for its report using one
of its random keys. The cluster-head aggregates the
reports from the sensing nodes and guarantees each
aggregated report contains T MACs that are generated
using the keys from T different partitions, where T is a
predefined security parameter. Given that no more than
T-1 nodes can be compromised, each forwarding node
can detect a false report with a probability proportional
to 1/n. The filtering capacity of SEF is independent
of the network topology, but constrained by the value
of n. To increase the filtering capacity, we can reduce
the value of n , however, this allows the adversaries to
break all partitions more easily. In addition, since the
keys are shared by multiple nodes, the compromised
nodes can impersonate other nodes and report some
forged events that “occur” in other clusters.
B. Interleaved Hop-By-Hop Authentication (IHA)
Zhu et al. [13] proposed an interleaved hop by hop
authentication (IHA) scheme. In this scheme, the
base station periodically initiates an association
process enabling each node to establish pair wise
keys with other nodes that are t+1 hops away, where
t is called the security threshold value. In IHA, each
sensing node creates a MAC using one of its multihop
pairwise keys, and a legitimate report should contain
t+1 distinct MACs. Since every multihop pairwise
key is distinguishable, IHA can tolerate up to t level
compromised nodes in each cluster instead of in the
whole network as SEF does. However, IHA requires
a fixed path for transmitting control messages between
the base station and each cluster-head, which cannot
be assured by some routing protocols such as GPSR
and GEAR. Moreover, the high communication
overhead incurred by the association process makes
IHA unsuitable for networks whose topologies change
frequently.
C. Providing Location Aware End- To-End
Data Security
Providing Location aware End-to-End Data Security
(LEDS) design overcomes the limitations of the existing
hop-by-hop security paradigm and achieves an efficient
and effective end-to-end security paradigm in WSN. It
exploits the static and location-aware nature of WSNs,
and proposes a novel location-aware security approach
through two seamlessly integrated building blocks: a
location-aware key management framework and an
end-to-end data security mechanism. In this method,
each sensor node is implemented with several types of
balanced secret keys, some of which are intended to
provide end-to-end data confidentiality, and others are
to provide both end-to-end data authenticity and hop-
by-hop authentication. All the keys are measured at
each sensor node independently from keying materials
pre-loaded before network deployment and the location
information is obtained after network disposal, without
inducing new communication overhead, for shared key
establishment.
III. Problem Definition
Each of the existing schemes for Fig. 1. Statistical
En-route Filtering (SEF), interleaved hop-by-hop
authentication (IHA) and Providing Location aware
End- to-End Data Security address false report
injection attacks and or DoS attacks. However they all
have some constraints. SEF is independent of network
shape and size, but it has a limited number of filtering
capacity and cannot prevent impersonating attacks on
legitimate nodes. IHA has a drawback, that is, it must
periodically establish multihop pair wise keys between
nodes. Further, it refers to a located path between the
base station and each cluster-head to transmit messages
in both directions, which cannot be assured due to the
dynamic topology of sensor networks or due to the use
of some underlying routing protocol.
LEDS utilizes location-based keys to filter false
report. It assumes that sensor nodes can determine
their locations in a short period of time. However, this
is note practical approach, because many localization
approaches take quite long and are also vulnerable
to malicious attacks. It also tries to address selective
forwarding attacks by allowing a whole cell of nodes
to forward one report; however, this incurs high
communication overhead.
Later, we have discussed the routing protocol
AODV on which the proposed scheme is to be
executed. AODV takes care of the route discovery
and maintenance process thereby easing the proposed
scheme to concentrate on the En-route filtration
36. 28 HINDUSTAN JOURNAL, VOL. 6, 2013
capacity and the mitigation of false report injection
attacks and DoS attacks.
IV. Design
A. Introduction
In this chapter we describe our proposed security scheme
calledHMAC’edFilteringSchemeforDataDissemination
in WSN. This scheme addresses false report injection
attacks and DoS attacks such as Selective forwarding
and Report disruption in WSN. The multifunctional key
management framework is used in this scheme which
involves authentication keys. Similar to SEF and IHF
discussed in section 3 our proposed En-route filtering
scheme also uses the key distribution mechanism
employed in WSN. Unlike other schemes which either
lack strong filtering capacity or cannot support highly
dynamic sensor networks, our scheme uses a hash chain
of authentication keys which are used to endorse reports.
Meanwhile, a legitimate report should be authenticated by
a certain number of nodes. First each node disseminates its
key to forwarding nodes. Then, after sending reports, the
sending nodes disclose their keys, allowing the forwarding
nodes to verify their reports. It can be explained with the
help of the following figure 1.
Fig. 1. Key Derivation
Under this scheme control messages are used
to disseminate and disclose the keys to forwarding
sensor nodes and later allow nodes to verify the keys
by decrypting them and finding a shared secret key. To
accomplish this every sensor node maintains 2 secret
key pools and a seed key. A series of authentication
keys can be derived from this seed key when there is
a need. Hence when a shared secret key is found its
corresponding authentication keys are derived and
stored in the memory of sensor nodes. Thus the keys
selected randomly from the key pools are used to
encrypt the authentication keys which are collectively
used for producing MAC of the report and later used
for the report’s collective endorsement.
B. Problem Formulation
The vast targeted terrain where the sensor nodes are
deployed is divided into multiple cells after network
deployment. We assume that sensor nodes within a cell
form a cluster which contains n nodes. In each cluster
of a cell a node is randomly selected as a cluster head
as in figure 2. When an event of interest happens in any
of these cells, the sensing nodes of that particular cell
detects the event and broadcasts it to the cluster head.
The cluster head aggregates the reports and forwards
the aggregated report through the report authentication
area down to the sink. The topologies of WSNs change
frequently either because nodes are prone to failure or
because they need to switch their states between Active
and Sleeping for saving energy. As sensor networks
are not tamper-resistant, it can be compromised
by adversaries. Each cluster may contain some
compromised nodes, which may in turn collaborate
with each other to generate false reports by sharing the
secret key information. In this project work we intend
to provide solutions for attacks like bogus data injection
and denial of services (selective forwarding attack
report disruption) that can be launched by adversaries
to degrade node’s life time and the critical information
carried by them.
Fig. 2. Cluster Formation and report forwarding
Route to Sink
We consider
N- Total no. of nodes present in the targeted terrain
n- Average no. of nodes in each cell
37. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING 29
l- Size of the cell
t- no. of correct endorsements to validate a report
x- no. of compromised nodes in a cell
Cluster head intimates events to sink periodically
and finds a routing path called Report Forward Route.
We consider that x nodes inject malicious data to
reports periodically to drain out battery life. These x
nodes inject bogus data by simply offering a wrong
MAC to the collective endorsement. Due to the wrong
MAC in t endorsements the legitimate event report has
the possibility of being dropped by a legitimate node
or even a legitimate report share can be dropped by
an adversary near to the sink which is called Report
Disruption attack. When multiple clusters disseminate
keys at the same time, some forwarding nodes need to
store the authentication keys of different clusters. Hence
the nodes closer to the base station need to store more
authentication keys than others do because they are
usually the hot spots and have to serve more clusters.
Our aim is thus to mitigate the false data injection at
early route with minimal overhead, improved network
life time, confidentiality and authentication.
C. Design of the Project
There are 3 phases involved in the project and the
relationships between them are shown in figure 3.
Fig. 3. Relationship between phases
When an event occurs within some cluster, the
cluster-head collects the sensing reports from sensing
nodes and aggregates them into the aggregated reports.
Then, it forwards the aggregated reports to the base
station through a set of forwarding nodes. In our
scheme, each sensing report contains one MAC that
is produced by a sensing node using its authentication
key (called auth-key for short), while each aggregated
report contains distinct MACs depending upon the
number of the cluster members.
In our scheme, each node possesses a sequence
of auth-keys that form a hash chain. Before sending
the reports, the cluster-head disseminates the first
auth-keys of all nodes to the forwarding nodes that are
located on multiple paths from the cluster-head to the
base station. The reports are organized into rounds,
each containing a fixed number of reports. In every
round, each sensing node chooses a new auth-key to
authenticate its reports.
To facilitate verification of the forwarding nodes,
the sensing nodes disclose their auth-keys at the end of
eachround.Meanwhile,topreventtheforwardingnodes
from abusing the disclosed keys, a forwarding node can
receive the disclosed auth-keys, only after its upstream
node overhears that it has already broadcast the reports.
Receiving the disclosed keys, each forwarding node
verifies the reports, and informs its next-hop node to
forward or drop the reports based on the verification
result. If the reports are valid, it discloses the keys to its
next-hop node after overhearing.
Fig. 4. Overall process of key distribution and Report For-
warding
The processes of verification, overhearing, and
key disclosure are repeated by the forwarding nodes
as shown in figure 4 at every hop until the reports are
dropped or delivered to the base station. Specifically,
our scheme can be divided into three phases: (i) key
pre-distribution phase, (ii) key dissemination phase,
and (iii) report forwarding phase. In the key pre-
38. 30 HINDUSTAN JOURNAL, VOL. 6, 2013
distribution phase, each node is preloaded with a
distinct seed key from which it can generate a hash
chain of its auth-keys. In the key dissemination phase,
the cluster-head disseminates each node’s first auth-
key to the forwarding nodes, which will be able to filter
false reports later. In the report forwarding phase, each
forwarding node verifies the reports using the disclosed
auth-keys and disseminated ones. If the reports are
valid, the forwarding node discloses the auth-keys
to its next-hop node after overhearing that node’s
broadcast. Otherwise, it informs the next-hop node to
drop the invalid reports. This process is repeated by
every forwarding node until the reports are dropped or
delivered to the base station.
D. Algorithm
STEP 1: Cluster Head (CH) collects sensing reports as
in figure 4, from sensor nodes and generates a
number of aggregated reports.
R1, R2, R3
CH sends these aggregated reports plus an OK
message to next hop υj.
Aggregated report must contain t Message
Authentication Codes (MACs) from each sensing node
with a distinct Z key. Aggregated report R looks as
follows.
R={r(υi1
),...,r(υit
)}.
where υi1
,...,υit
denote t sensing nodes.
Since every sensing node reports the same event
information E, only one copy of E is kept in the
aggregated report R.
STEP 2: Receiving the aggregated reports and OK,
υj forwards them to next hop, υj +1. CH
overhears the broadcast of aggregated reports
from υj.
STEP 3: Overhearing the broadcast from υj, the CH
discloses the authentication keys to υj by
message K (t)
K(t) = {Auth(υi1
),..., Auth(υit
)}
where K (t) contains authentication keys of υi1
,...,υit
.
It has the same format as K (n), but contains only t
authentication keys.
where K (n) is the authentication message collected by
CH from the sensing nodes and aggregated to K (n).
STEP 4: Receiving K (t), υj first checks the authenticity
of disclosed keys using the disseminated ones
that it decrypted from K (n) earlier. Then,
it verifies the integrity and validity of the
reports by checking the MACs of the reports
using the disclosed keys.
V. Verification Process
1. To verify the validity of K (t), υj checks if K (t) is
in correct format and contains t distinct indexes of
z- keys (secret keys picked randomly from global
key pool Z). If not, it drops K (t).
2. To verify the authenticity of the authentication
keys in K (t), υj checks if each authentication
key it stored can be generated by hashing a
corresponding key in K (t) in a certain number of
times. If not, it is either replayed or forged and K
(t) should be dropped.
3. To verify the integrity and validity of reports R1,
R2… υj checks the MACs in these reports using
the disclosed authentication key that it decrypts
from K (t).
STEP 5: If the reports are valid, υj sends an OK
message to υj +1. Otherwise it informs υj +1
to drop invalid reports.
STEP 6: Similar to step 2, υj +1 forwards the reports
to next hop.
STEP 7: Similar to step 3, after overhearing the
broadcast from υj +1, υj discloses K (t) to υj
+1.
STEP 8: Every forwarding node repeats step 4 to step
7 until the reports are dropped or delivered to
the base station.
VI. Simulation Results
A. Introduction
In this section, we will start with an introduction to the
simulation tool called NS-2, the ways of configuring it
39. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING 31
to run sensor networks, and implementation details of
the Enroute filtering scheme.
B. Simulation Tool
NS-2 is an event driven network simulator developed at
University of California at Berkeley, USA, as a REAL
network simulator projects in 1989 and was developed
with the cooperation of several organizations. NS is not
a finished tool that can manage all kinds of network
model. It is actually still an on-going effort of research
and development.
NS is a discrete event network simulator where the
timing of events is maintained by a scheduler and able
to simulate various types of network such as LAN and
WPAN according to the programming scripts written
by the user. Besides that, it also implements a variety of
applications, protocols such as TCP and UDP, network
elements such as signal strength, traffic models such as
FTP and CBR, router queue management mechanisms
such as Drop Tail and many more.
There are two languages used in NS-2; C++
and OTcl (an object oriented extension of Tcl). The
compiled C++ programming hierarchy makes the
simulation efficient and execution times faster. The
OTcl script which is written by the users models the
network with its own specific topology, protocols and
all requirements needed. The form of output produced
by the simulator also can be set using OTcl. The OTcl
script is written creating an event scheduler object and
network component object together with network setup
helping modules. The simulation results produced after
running the scripts can be used either for simulation
analysis or as an input to graphical software called
Network Animation (NAM).
Configuration of sensor network simulations:
Setting up a sensor network in NS-2 follows the same
format as mobile node simulations. Places where
sensor network simulations differ from a mobile node
simulation are listed below.
1. Configuration of Phenomenon channel and Data
channel.
2. Configuration of Phenomenon nodes with the
PHENOM “routing” protocol.
3. Configuration of Phenomenon node’s pulse rate
and phenomenon type.
4. Configuration of Sensor nodes.
5. Attaching sensor agents.
6. Attaching UDP agent and sensor application to
each node.
7. Starting the Phenomenon node.
8. Starting the Sensor Application.
Implementation Details Of HMAC’ed Filtering
Scheme
Implementation Of Md5 Hashing Technique
MD5 Hashing technique is used to produce hash of the
sensor report. To accomplish this task MD5 algorithm
is implemented in tcl script for NS-2 simulation. The
steps describing its process are listed below
1. Append the padding bits
2. Append length
3. Initialize the Message Digest buffer
4. Process the message in 512 bit blocks
5. Resultant 128 bit Message Digest.
Implementation of Key Comparison Process and
Report Delivery
As the reports are sent in rounds containing distinct n
number of reports, it is not needed to send the whole
K (t) which contains all the first authentication keys
of the sensor nodes. Instead we can send alone the n
number of t authentication keys which will now enable
faster deciphering of the MAC-ed reports. In order to
filter the false packets at the earlier route, this K (n) is
discarded in the nodes nearer to the sink. The above
said process is accomplished in the following ways.
Keys are randomly picked up from a matrix and they
are used for producing HMAC of the report. The cluster
head now receives all the first authentication keys from
the cluster members packs them in K (n) and sends to
the Report forwarding nodes.
The Cluster members sense the events and produce
HMAC of the report and then send them collectively
40. 32 HINDUSTAN JOURNAL, VOL. 6, 2013
to Cluster Heads. The Cluster head now collectively
endorses the received HMAC’s with the preset value.
The comparison of keys in K(n) and the key obtained
from HMAC ’ed report are verified and forwarded by
the cluster heads to their one hop report forwarding
nodes. When the HMAC offered by a sensor node is
found to be illegitimate, i. e. , if the key found in the
HMAC is different from the collectively endorsed
report, cluster head marks node as attacker which is
shown in Figure 5.
Fig. 5. Identification of Attacker through collective
endorsement
Implementation of Collective Endorsement of Sensor
reports.
Sensor reports are HMACed as the result of HMAC
algorithm implemented in TCL script with the keys
randomlypickedupfromtheassignedkeymatrix.Those
reports are further divided into small authenticated
shares in the range of 16 bytes each and are sent in
rounds from the cluster members to the cluster head in
order to prevent Report disruption attack.
A report disruption attack when launched by an
attacker will make the complete legitimate share of
sensor report abruptly dropped by a legitimate cluster
head by simply offering an illegitimate MAC to the
collective share. Hence through collective endorsement,
the whole sensor reports are further divided into small
authenticated shares such that even when an attacker
offers illegitimate HMAC, the cluster head will be able
to recover the complete collective share with the help
of legitimate shares received from its members.
Simulation Environment
The proposed secure scheme of Dynamic enroute
filtering is implemented in NS-2.27 simulator. The
simulation consists of 24 sensor nodes out of which
4 nodes in green color are cluster heads; some nodes
are configured to be attackers and a base station. The
network is randomly deployed in a terrain dimension
of 600m X 600m with the following simulation
environment shown in Table 1.
Table 1. Simulation Environment
PARAMETER VALUE DESCRIPTION
Channel
Channel/Wireless
channel
Channel Type
Propagation
Propagation/Two
Ray Ground
Radio Propagation
Model
Network Interface Phy/WirelessPhy
Network Interface
Type
MAC Mac/802_11
Medium Access
Control Type
Interface Queue Queue/Drop Tail
Interface Queue
Type
Link Layer LL Link Layer
Antenna
Antenna/Omni
Antenna
Antenna Model
Interface Queue
Size
5000(in packets)
Maximum packet
in interface Queue
Routing Protocol AODV Routing Protocol
Data Rate 11Mbps Data Transfer Rate
Interface Queue
Size
50
Maximum packets
in Interface Queue.
Terrain Dimension 600m X 600m
Terrain Dimension
of the network
Simulation Time 100 Seconds
Total duration of
the simulation
Packet Size 1026Bytes
Size of the CBR
traffic packet
Number of Nodes 25
Number of nodes
in the Scenario
Energy Model
Reception- rx
Power 0. 3(J/bits)
Transmission- tx
Power 0. 5(J/bits)
Power
Consumption
Model
41. KODHAI ET AL.: HMAC FILTERING SCHEME FOR DATA REPORTING 33
Performance Metrics Evaluation
The performance metrics are used to measure the
performance of the proposed system.
Filtering capacity
Filtering capacity of the proposed scheme is defined
as the average number of hops that a false report can
be detected by the forwarding node at every hop or
the fraction of number of false reports filtered to the
number of hops travelled.
Energy savings
Energy savings of the proposed scheme is defined as the
energy consumption in transmission, reception and the
computations due to the extra fields which incur extra
overhead. We evaluate the length of a normal report
without using any filtering scheme and then compare
the length of an authenticated report in the next phases
of the review.
Performance metrics determine the performance
of a particular scheme in the presence of constraints
related to domain oriented advantages and drawbacks.
We have evaluated our Enroute mechanism in terms of
throughput and packet loss.
Packet loss
Mobility-related packet loss may occur at both the
network layer and the MAC layer. When a packet
arrives at the network layer, the routing protocol
forwards the packet if a valid route to the destination
is known. Otherwise, the packet is buffered until a
route is available. A packet is dropped in two cases: the
buffer is full when the packet needs to be buffered and
the time that the packet has been buffered exceeds the
limit. It can be evaluated with the formula given below.
Packet Loss (in packets) = DataAgtSent − DataAgt
Rec
where AGT– agent trace (used in new trace file
format)
Scenario: Packet Loss Vs Number of Attacker nodes:
Same scenario is maintained in which Packet loss
is computed by varying the number of attackers. As
shown in Figure 6, packet loss seems to be very high
when there is increase in the attacker’s count. Attackers
try to launch selective forwarding attack, report
disruption attack and false report injection attack in
which the total availability requirement of the critical
information is lost leading to total energy drain of the
resource constrained sensor nodes or false positives or
false negatives intimation at the base station. Under this
state the malicious node drops all the packets from a
selective node or selective packets from a node leading
to a huge packet loss in the network as discussed in
the Threat and Trust model of section 2. With Enroute
Filtering mechanism packet loss is reduced to 40%
which is achieved by the identification of attacker
nodes through collective endorsement implemented in
the cluster heads.
Fig. 6. Packet Loss Vs Number of Attacker node
VII. Conclusion
A major challenge for a Wireless Sensor Network lies
in the energy constraint at each node, which poses
a fundamental limit on the network life time. Even
though there are many enroute filtering schemes
available in the literature they either fail to support the
dynamic nature of the sensor networks or they cannot
efficiently mitigate the adversary’s activities. Hence
this enroute filtering scheme is currently an area of
much research among the security professionals.
Generally AODV performs better than many other on-
demand protocols under high mobility, large network
scenarios. When the size of the network is large and
highly mobile the frequency of the link failure is
also high. Due to this, latency and control load of the
network is also increased. Also due to the attacker’s
42. 34 HINDUSTAN JOURNAL, VOL. 6, 2013
single illegitimate MAC there is a threat of dropping
the complete legitimate share.
In this work, we propose a HMAC’ed filtering
scheme for WSN that utilizes the dissemination of
authentication keys for filtering false data injection
attacks and DoS attacks. In our scheme, each node
uses its own authentication keys to authenticate the
reports and a legitimate report should be endorsed by
t nodes. The authentication keys of each node form a
hash chain and are updated in each round. The Enroute
scheme also yielded a better attacker detection and
mitigation framework together with disseminated
key structure. We thus analyzed the performance
metrics of the Enroute Filtering scheme with AODV
protocol in terms of Throughput and Packet Loss and
the results are also discussed. In future we intend
to compare the performance of Enroute Filtering
Scheme implemented with the security protocols such
as SPINS etc.
References
[1] Yun Zhou, Yuguang Fang, and Yanchao Zhang,
“Securing wireless sensor networks: a survey”,
IEEE Communications Surveys Tutorials, Vol.
10, No. 3, pp. 6-28, 2008.
[2] Al-Sakib Khan, Pathan,Hyung-Woo Lee, and
Choong Seon Hong, “Security in Wireless Sensor
Networks: Issues and Challenges”, International
Conference on Advanced Computing
Technologies, Vol. 4, No. 1, pp. 1043-1045,
2006.
[3] Zoron S. Bojkovic, Bojan M. Bakmaz, Miodrag,
and R. Bakmaz, “Security Issues in Wireless
Sensor Networks”, International journal of
Communications, Vol. 2, no. 1, pp. 106-114,
2008.
[4] Karlof and D. Wagner, “Secure Routing
in Wireless Sensor Networks: Attacks and
Countermeasures,” Proceedings of First IEEE
International Workshop of Sensor Network
Protocols and Applications, Vol. 1, pp. 113-127
2003.
[5] H. Fang, F. Ye, Y. Yuan, s. Lu, and W. Arbaugh,
“Toward resilient security in wireless sensor
networks”, proceeding of ACM international
symposium on Mobile ad hoc networking and
computing, Vol. 3, pp. 14-27, 2003.
[6] F. L. Lewis “Wireless Sensor networks”
Available: http://arri. uta. edu/acs
[7] G. Padmavathi and Mrs. D. Shanmugapriya,
“A Survey of Attacks, security mechanisms
and challenges in wireless sensor networks”,
International Journal of Computer science and
Information Security, Vol. 4, No. 1, pp. 1-9,
2009.
[8] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam,
and E. Cayirci, “A survey on sensor networks,”
IEEE Communication Magazine, Vol. 40, No. 8,
pp. 102–114, 2002.
[9] Hemanta Kumar Kalita, and Avijit Kar, “Wireless
Sensor Network Security Analysis” International
journal of Next-Generation Networks, Vol. 1, no.
1, pp. 1-10, 2009.
[10] Elaine shi and Adrian perrig, “Designing
secure sensor networks”, IEEE wireless
communications, Vol. 2 pp. 38-43, 2004.
[11] Haowen Chan, Adrian Perrig, and Dawn
Song, “Random Key Pre distribution Schemes
for Sensor Networks”, Proceedings of IEEE
Symposium on Security and Privacy, Vol. 3, pp.
1-17, 2003.
[12] F. Ye, H. Luo, S. Lu, and L. Zhang “Statistical
En-route detection and filtering of injected false
data in sensor networks,” Proceedings of IEEE
INFOCOM, Vol. 4, pp. 2446–2457, 2004.
[13] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An
interleaved hop-by-Hop authentication scheme
for filtering of injected false data in sensor
networks,” Proceedings of IEEE Symposium on
Security and Privacy, Vol. 4, pp. 259–271, 2004.
[14] Kui Ren, Wenjing Lou, and Yanchao Zhang,
“LEDS: Providing Location-aware End-to-end
Data Security in Wireless Sensor Networks”,
Proceedings of the 25th
IEEE International
Conference on Computer Communications pp.
1-12, 2006.
[15] Fasee Ullah, Muhammad Amin, and Hamid
ul Ghaffar, “Simulating AODV and DSDV