This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
This document summarizes a research paper that proposes an energy efficient certificate revocation scheme (EECCRVC) for secure communications in mobile ad hoc networks. The scheme aims to both revoke intruder certificates to exclude them from the network and utilize node energy effectively. It adopts a certificate revocation scheme (CCRVC) that deals with false accusations while outperforming other techniques in revoking intruder certificates. The scheme also enhances reliability and accuracy by promptly vindicating warned nodes based on a threshold mechanism. Experimental results using the NS-2 simulator show that the proposed EECCRVC scheme provides secure communications with effective energy utilization in mobile ad hoc networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Maximizing network interruption in wirelessIJCNCJournal
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
This document proposes a new scheme called Modified AODV to improve security in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. The scheme aims to detect and defend against wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling network packets between two colluding attackers, which can disrupt routing. The proposed Modified AODV algorithm detects wormhole nodes by having the source node send additional path messages and checking if alternate paths found by neighbors have unusually high hop counts. Simulation results show that Modified AODV improves metrics like packet delivery ratio and end-to-end delay compared to the original AODV protocol, though it increases routing overhead. The study aims to make AODV
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
International Journal of Computational Engineering Research(IJCER)ijceronline
1. The document discusses selective jamming attacks in wireless networks. Selective jamming attacks target important messages to degrade network performance.
2. The authors develop three schemes that combine cryptographic techniques with physical layer attributes to prevent real-time packet classification and mitigate selective jamming attacks.
3. The schemes are analyzed for their security and computational and communication overhead. The schemes aim to prevent adversaries from identifying important messages to selectively jam on the physical layer.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
This document summarizes a research paper that proposes an energy efficient certificate revocation scheme (EECCRVC) for secure communications in mobile ad hoc networks. The scheme aims to both revoke intruder certificates to exclude them from the network and utilize node energy effectively. It adopts a certificate revocation scheme (CCRVC) that deals with false accusations while outperforming other techniques in revoking intruder certificates. The scheme also enhances reliability and accuracy by promptly vindicating warned nodes based on a threshold mechanism. Experimental results using the NS-2 simulator show that the proposed EECCRVC scheme provides secure communications with effective energy utilization in mobile ad hoc networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Maximizing network interruption in wirelessIJCNCJournal
With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home
automation to military affairs, the pressure on ensuring security in such a network is paramount.
Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system.
Moreover, as the information technology is getting popular, the intruders are also planning new ideas to
break the system security, to harm the network and to make the system quality down with the target of
taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the
system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the
harm it can make to others. In this paper, the authors define the term “maximizing network interruption
problem” and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a
multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed
that the intruder has the complete picture of the entire network. The technique is designed from the
intruder’s point of view for completely jamming all the sensor nodes in the network through placing
jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to
minimum or near minimum. To the best of the authors’ knowledge, there is no work proposed so far of the
same kind. Experimental results with the changes of the different network parameters show that the
proposed algorithm is able to provide excellent performances to achieve the targets.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
This document proposes a new scheme called Modified AODV to improve security in the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. The scheme aims to detect and defend against wormhole attacks in mobile ad hoc networks. Wormhole attacks involve tunneling network packets between two colluding attackers, which can disrupt routing. The proposed Modified AODV algorithm detects wormhole nodes by having the source node send additional path messages and checking if alternate paths found by neighbors have unusually high hop counts. Simulation results show that Modified AODV improves metrics like packet delivery ratio and end-to-end delay compared to the original AODV protocol, though it increases routing overhead. The study aims to make AODV
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
This document summarizes a research paper about denial of service (DoS) attacks on wireless sensor networks. It begins by outlining some key security goals for wireless sensor networks, including data confidentiality, integrity, availability, and authentication. It then discusses DoS attacks specifically, noting they aim to degrade efficient use of network resources. The document proposes that DoS attacks can occur at different layers of the OSI model. It provides examples of physical layer attacks like jamming and describes how frequency hopping can help counter jamming. In closing, it notes DoS attacks threaten the availability security goal for wireless sensor networks.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Source based Security Issues in WDM Systems IJECEIAES
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
This document provides an overview of mobile ad hoc networks (MANets) and security attacks against them. It discusses the following key points:
1. MANets are self-configuring, dynamic wireless networks without centralized administration or fixed infrastructure that allow nodes to connect to each other.
2. Security in MANets is challenging due to the lack of infrastructure and centralized monitoring. Common attacks target the physical, data link, network, transport, and multi-layers of the network.
3. Attacks discussed include flooding, blackhole, link spoofing, wormhole, denial of service, and traffic monitoring aimed at different layers of the network. Countermeasures are needed to strengthen MANet security.
Index and engineering properties of spent wash blended soils a comparative s...eSAT Journals
Abstract In the present era of rapid industrialization and development of infrastructure projects, the natural resources are becoming scarce and hence their cost is increasing alarmingly. For an infrastructural project the soil consumption is very high and also specific soil is to be used for the requirements of its strength, durability etc. Locally available soil is the best option for these projects, if the suitable soil is not nearby it has a stringent effect on overall cost of project. Due to increase of demand for land in urban areas, soils which are weak and not suitable for foundations are to be effectively modified for construction of industries. Hence, there is a need to carryout research for an alternate material which is available in plenty and also gives desired strength upon modifications. There is a growing awareness allover the world about the extensive damage caused by the accumulated industrial wastes at various plants. This paper highlights various issues and scope for utilization of spent wash in engineering practice. This paper presents the results of index and engineering properties of blended soils. Studies are carried out by varying soil gradation, spent wash content under different curing time periods. For study two types of soils are taken and their properties are studied up on addition of 25% spent wash maintaining different curing periods of 2, 4 and 6 weeks. It was observed that spent wash is effective in reducing plasticity characteristics and increasing engineering properties namely, dry density and the unconfined strength of soil and reducing Optimum moisture content Index Terms: Effluent, Tropical, spentwash, blended
Influence of Hadoop in Big Data Analysis and Its Aspects IJMER
This paper is an effort to present the basic understanding of BIG DATA and
HADOOP and its usefulness to an organization from the performance perspective. Along-with the
introduction of BIG DATA, the important parameters and attributes that make this emerging concept
attractive to organizations has been highlighted. The paper also evaluates the difference in the
challenges faced by a small organization as compared to a medium or large scale operation and
therefore the differences in their approach and treatment of BIG DATA. As Hadoop is a Substantial
scale, open source programming system committed to adaptable, disseminated, information
concentrated processing. A number of application examples of implementation of BIG DATA across
industries varying in strategy, product and processes have been presented. This paper also deals
with the technology aspects of BIG DATA for its implementation in organizations. Since HADOOP has
emerged as a popular tool for BIG DATA implementation. Map reduce is a programming structure for
effectively composing requisitions which prepare boundless measures of information (multi-terabyte
information sets) in- parallel on extensive bunches of merchandise fittings in a dependable,
shortcoming tolerant way. A Map reduce skeleton comprises of two parts. They are “mapper" and
"reducer" which have been examined in this paper. The paper deals with the overall architecture of
HADOOP along with the details of its various components in Big Data.
A survey on discrimination deterrence in data miningeSAT Journals
Abstract
For extracting useful knowledge which is hidden in large set of data, Data mining is a very important technology. There are some negative perceptions about data mining. This perception may contain unfairly treating people who belongs to some specific group. Classification rule mining technique has covered the way for making automatic decisions like loan granting/denial and insurance premium computation etc. These are automated data collection and data mining techniques. According to discrimination attributes if training data sets are biases then discriminatory decisions may ensue. Thus in data mining antidiscrimination techniques with discrimination discovery and prevention are included. It can be direct or indirect. . When choices are created depending on delicate features that period the discrimination is oblique. The elegance is oblique when choices are created depending on nonsensitive features which are strongly correlated with one-sided delicate ones. The suggested system tries to deal with elegance protection in information exploration. It suggests new improved techniques applicable for immediate or oblique elegance protection independently or both simultaneously. Conversations about how to clean coaching information sets and contracted information places in such a way that immediate and/or oblique discriminatory decision guidelines are transformed to genuine classification guidelines are done. New analytics to evaluate the utility of the suggested methods are suggests and comparison of these methods is also done.
Keywords: Antidiscrimination, information exploration, oblique and immediate elegance protection, concept protection, concept generalization, privacy.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The document discusses the removal of phosphate from wastewater using low-cost adsorbents. It examines the use of alum sludge, coal ash, class C fly ash, and ground granulated blast furnace slag to remove phosphates through adsorption. Batch and column tests were conducted to determine optimum conditions and adsorption capacities. The batch studies analyzed the effect of pH, dosage, and contact time on phosphate removal. Optimum pH and dosages were identified for each adsorbent. Column tests measured breakthrough curves and saturation times. Results showed the adsorbents were effective at removing phosphates from synthetic wastewater, with performance varying based on initial phosphate concentration and adsorbent type.
SOIL-SHEET PILE INTERACTION - PART I: A REVIEW OF THEORIES AND DESIGN METHODS IAEME Publication
This document summarizes theories and modeling methods for studying the interaction between soil and sheet pile walls. It discusses the complex nonlinear behavior of soil-sheet pile interaction and reviews various modeling approaches used to analyze it, including the Mohr-Coulomb and cap models. It also reviews conventional design theories for sheet piles, such as the Coulomb and Rankine theories. The document emphasizes the importance of numerical analysis tools like the finite element method in accurately modeling the interaction between soil and sheet piles.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
This document summarizes a research paper about denial of service (DoS) attacks on wireless sensor networks. It begins by outlining some key security goals for wireless sensor networks, including data confidentiality, integrity, availability, and authentication. It then discusses DoS attacks specifically, noting they aim to degrade efficient use of network resources. The document proposes that DoS attacks can occur at different layers of the OSI model. It provides examples of physical layer attacks like jamming and describes how frequency hopping can help counter jamming. In closing, it notes DoS attacks threaten the availability security goal for wireless sensor networks.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
This document proposes an agent-based model for detecting abnormal event patterns in a distributed wireless sensor network. The model uses rule-based classification and naive Bayesian classification to identify abnormal sensor nodes. It is embedded between cluster heads and the base station in a two-tier hierarchical network architecture. In experiments, the model successfully detected various common attacks and calculated the percentage of abnormal events detected with low false positive rates.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Source based Security Issues in WDM Systems IJECEIAES
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
The document discusses defense mechanisms against flooding attacks in mobile ad hoc networks (MANETs). It begins with broad background on networks and network security. It then discusses specific areas including MANETs and flooding attacks. The document reviews several papers from 2008-2011 on related topics. It discusses methodologies, advantages and drawbacks of approaches for detecting and preventing flooding attacks in MANETs, including using period-based mechanisms, trust-based classification of nodes, and probabilistic broadcasting. The comparative study section provides brief summaries of several papers analyzing defenses against flooding attacks in MANETs.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
MWSNs are finding applicability in wide range of applications. Applications spread from day to day utilities to military and surveillance, where they may sense information about vehicular movements around border. Considering the importance of data being sent by these nodes, threat of compromising them has also increased. This paper aims to explore various types of attacks and tries to classify them based on some common parameter. Better understanding of various attacks, their style of functioning and point of penetration can help researchers devise better preventive measures.
This document provides an overview of mobile ad hoc networks (MANets) and security attacks against them. It discusses the following key points:
1. MANets are self-configuring, dynamic wireless networks without centralized administration or fixed infrastructure that allow nodes to connect to each other.
2. Security in MANets is challenging due to the lack of infrastructure and centralized monitoring. Common attacks target the physical, data link, network, transport, and multi-layers of the network.
3. Attacks discussed include flooding, blackhole, link spoofing, wormhole, denial of service, and traffic monitoring aimed at different layers of the network. Countermeasures are needed to strengthen MANet security.
Index and engineering properties of spent wash blended soils a comparative s...eSAT Journals
Abstract In the present era of rapid industrialization and development of infrastructure projects, the natural resources are becoming scarce and hence their cost is increasing alarmingly. For an infrastructural project the soil consumption is very high and also specific soil is to be used for the requirements of its strength, durability etc. Locally available soil is the best option for these projects, if the suitable soil is not nearby it has a stringent effect on overall cost of project. Due to increase of demand for land in urban areas, soils which are weak and not suitable for foundations are to be effectively modified for construction of industries. Hence, there is a need to carryout research for an alternate material which is available in plenty and also gives desired strength upon modifications. There is a growing awareness allover the world about the extensive damage caused by the accumulated industrial wastes at various plants. This paper highlights various issues and scope for utilization of spent wash in engineering practice. This paper presents the results of index and engineering properties of blended soils. Studies are carried out by varying soil gradation, spent wash content under different curing time periods. For study two types of soils are taken and their properties are studied up on addition of 25% spent wash maintaining different curing periods of 2, 4 and 6 weeks. It was observed that spent wash is effective in reducing plasticity characteristics and increasing engineering properties namely, dry density and the unconfined strength of soil and reducing Optimum moisture content Index Terms: Effluent, Tropical, spentwash, blended
Influence of Hadoop in Big Data Analysis and Its Aspects IJMER
This paper is an effort to present the basic understanding of BIG DATA and
HADOOP and its usefulness to an organization from the performance perspective. Along-with the
introduction of BIG DATA, the important parameters and attributes that make this emerging concept
attractive to organizations has been highlighted. The paper also evaluates the difference in the
challenges faced by a small organization as compared to a medium or large scale operation and
therefore the differences in their approach and treatment of BIG DATA. As Hadoop is a Substantial
scale, open source programming system committed to adaptable, disseminated, information
concentrated processing. A number of application examples of implementation of BIG DATA across
industries varying in strategy, product and processes have been presented. This paper also deals
with the technology aspects of BIG DATA for its implementation in organizations. Since HADOOP has
emerged as a popular tool for BIG DATA implementation. Map reduce is a programming structure for
effectively composing requisitions which prepare boundless measures of information (multi-terabyte
information sets) in- parallel on extensive bunches of merchandise fittings in a dependable,
shortcoming tolerant way. A Map reduce skeleton comprises of two parts. They are “mapper" and
"reducer" which have been examined in this paper. The paper deals with the overall architecture of
HADOOP along with the details of its various components in Big Data.
A survey on discrimination deterrence in data miningeSAT Journals
Abstract
For extracting useful knowledge which is hidden in large set of data, Data mining is a very important technology. There are some negative perceptions about data mining. This perception may contain unfairly treating people who belongs to some specific group. Classification rule mining technique has covered the way for making automatic decisions like loan granting/denial and insurance premium computation etc. These are automated data collection and data mining techniques. According to discrimination attributes if training data sets are biases then discriminatory decisions may ensue. Thus in data mining antidiscrimination techniques with discrimination discovery and prevention are included. It can be direct or indirect. . When choices are created depending on delicate features that period the discrimination is oblique. The elegance is oblique when choices are created depending on nonsensitive features which are strongly correlated with one-sided delicate ones. The suggested system tries to deal with elegance protection in information exploration. It suggests new improved techniques applicable for immediate or oblique elegance protection independently or both simultaneously. Conversations about how to clean coaching information sets and contracted information places in such a way that immediate and/or oblique discriminatory decision guidelines are transformed to genuine classification guidelines are done. New analytics to evaluate the utility of the suggested methods are suggests and comparison of these methods is also done.
Keywords: Antidiscrimination, information exploration, oblique and immediate elegance protection, concept protection, concept generalization, privacy.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The document discusses the removal of phosphate from wastewater using low-cost adsorbents. It examines the use of alum sludge, coal ash, class C fly ash, and ground granulated blast furnace slag to remove phosphates through adsorption. Batch and column tests were conducted to determine optimum conditions and adsorption capacities. The batch studies analyzed the effect of pH, dosage, and contact time on phosphate removal. Optimum pH and dosages were identified for each adsorbent. Column tests measured breakthrough curves and saturation times. Results showed the adsorbents were effective at removing phosphates from synthetic wastewater, with performance varying based on initial phosphate concentration and adsorbent type.
SOIL-SHEET PILE INTERACTION - PART I: A REVIEW OF THEORIES AND DESIGN METHODS IAEME Publication
This document summarizes theories and modeling methods for studying the interaction between soil and sheet pile walls. It discusses the complex nonlinear behavior of soil-sheet pile interaction and reviews various modeling approaches used to analyze it, including the Mohr-Coulomb and cap models. It also reviews conventional design theories for sheet piles, such as the Coulomb and Rankine theories. The document emphasizes the importance of numerical analysis tools like the finite element method in accurately modeling the interaction between soil and sheet piles.
1. The study analyzed physicochemical parameters of water and soil samples collected near a fertilizer industry in Pulgaon, Wardha district, Maharashtra, India to examine the effect of effluent discharge on soil and groundwater quality.
2. Water sample results showed pH, TDS, hardness, alkalinity, and chloride levels exceeded permissible limits. Soil sample results found specific gravity, bulk density, nitrogen, phosphorus, and potassium levels above permissible limits in all samples.
3. The high levels of nutrients and other parameters in both water and soil samples indicate contamination from fertilizer industry effluent, rendering the soil unsuitable for agriculture and the water undrinkable. Continued discharge poses health
Geotechnical research group - Aarhus University Denmarkkks_eng
An overview of the research activities of the geotechnical research group at Aarhus University, Department of Enginering, civil and Architectural eng. section.
We are looking for researchers who can strengthen our research group within experimental geotechnics - contact for further info about possibilities.
The document discusses the use of crumb rubber powder (CRP) as an additive to improve the properties of problem clay used in the local tile manufacturing industry in Mangalore, India. Experimental studies were conducted on problem clay stabilized with varying percentages of CRP (5-25%). Testing showed that blending problem clay with 5% CRP resulted in improved plasticity, compaction, and unconfined compressive strength properties compared to untreated problem clay and other CRP mixtures. Further testing determined that mixing the optimized 5% CRP-problem clay blend with cement or lime in amounts of 1-5% additionally increased the unconfined compressive strength. The study revealed that CRP addition can effectively alter problem clay properties and concluded
Effects on p h behaviour of expansive and non expansive soils contaminated wi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The document discusses using ground granulated blast furnace slag (GGBS) stabilized soil, with and without lime, as a cushioning material above an expansive clay subgrade to improve its properties. Laboratory tests were conducted to evaluate the efficacy of GGBS stabilized soil cushions in reducing clay heave and improving the soaked California bearing ratio and unconfined compressive strength of the soil. The results showed that GGBS stabilized soil cushions, with or without lime, can effectively reduce clay heave while also enhancing the strength and load bearing capacity of the subgrade.
Phonm penh changing urban fabric with demography – past and futureeSAT Journals
The urban fabric of Phnom Penh, Cambodia has transformed dramatically over time due to various historical influences. Originally a rural area, Phnom Penh grew into an urban center first under French colonial rule from 1863-1953, when the city was divided into quarters and a grid system was established. A unique blend of French and Khmer architectural styles emerged. After independence, a period of new Khmer architecture flourished led by architect Van Molyvann, integrating Angkorian and modern styles. However, the Khmer Rouge regime from 1975-1979 devastated the city, destroying buildings and displacing the population. Today, Phnom Penh is a rapidly developing city with a diverse urban landscape including traditional Khmer structures,
EFFECTS OF TEXTILE EFFLUENT ON THE GEO TECHNICAL PROPERTIES OF EXPANSIVE SOIL IAEME Publication
The rapid growth in population and industrialization cause generation of large quantities of effluents. The bulk effluents generated from industrial activities are discharged either treated or untreated over the soil leading to changes in soil properties causing improvement or degradation of
engineering behaviour of soil. If there is an improvement in engineering behaviour of soil, there is a value addition to the industrial wastes serving the three benefits of safe disposal of effluent, using as a stabilizer and return of income on it. If there is degradation of engineering behaviour of soil then
solution for decontamination is to be obtained.
Adsorption behaviour of dextrin onto activated oyster shelleSAT Journals
Abstract
The effect of initial dextrin concentration, contact time, pH, temperature and added calcium ion on the adsorption behaviour of dextrin onto oyster shell is investigated. The results obtained show that increase in concentration and temperature below the boiling point of dextrin enhances the adsorption process. It was found in this study that adsorption density varies with pH and is maximum within the range of 2 to 7. The plot of amount of dextrin adsorbed against the concentration of the adsorbate was hyperbolic which conforms to Legmir isotherm. The free energy of dextrin oyster shell adsorption system was found to be 13.23kg/mol and the specific area of the oyster shell for this work was 70.8m 2/g.
Keywords: Adsorption, dextrin, oyster shell, behaviour, crushing, drying
1. The document studied the effect of industrial effluents (textile, tannery, battery) on the compaction characteristics of expansive soil.
2. Standard Proctor tests were conducted on soil mixed with 0-100% of each effluent. For textile and battery effluents, optimum moisture content increased and maximum dry unit weight decreased with higher effluent content. For tannery effluent, optimum moisture content decreased and maximum dry unit weight increased.
3. The maximum changes observed were a 24% increase in optimum moisture content and 1.5% decrease in maximum dry unit weight for 100% textile effluent, an 11% decrease in optimum moisture
The document discusses expansive soils and the city's process for soils investigations. It notes that expansive soils expand when water is added and contract when drying. The international residential code requires soils testing where expansive soils may be present. The city's current process relies on USDA soil maps and allows contractors to obtain permits without additional testing. It presents options like requiring testing on some properties or engineered foundations on all projects to improve oversight of expansive soil risks.
Effect of Lime Stabilisation on the Strength and Microstructure of ClayIOSR Journals
Abstract:Lime stabilization is one of the techniques that can be used for improving the engineering properties,
particularly the strength, of soft clays. This paper aims to investigate the effect of hydrated lime on the strength
and microstructure of lime treated clays. In order to illustrate such effect, a series of laboratory tests were
conducted. Atterberg limits, compaction tests, unconfined compressive strength tests and scanning electron
microscope (SEM) were carried out on kaolin clay mixed with 5% hydrated lime. The results indicated that the
addition of lime resulted in a reduction in the plasticity of kaolin and an improvement in compaction properties.
The unconfined compressive strength (UCS) of stabilized clay experienced an increase with lime addition. Two
variables influencing the amount of strength developed were studied. These variables included curing time and
water content. Curing time contributed to an increase in the UCS, from 183 kPa to 390 kPa, that is
approximately twice of the strength of untreated kaolin. SEM analysis showed the presence of the cementious
products in the kaolin clay resulted from lime-clay reaction.
Key words:Lime, Stabilisation, Soft clay, Pozzolanic reaction, Mineralogy
Maturity period and curing as important quality control parametersIAEME Publication
This document discusses the importance of maturity period and curing as quality control parameters for lime-stabilized clay subgrades used in road construction. Laboratory experiments were conducted to determine the effect of delayed compaction and varying curing periods on the California Bearing Ratio (CBR) and unconfined compressive strength (UCC) of lime-stabilized clay mixes. The results showed that delayed compaction decreased the optimum moisture content, maximum dry density, and CBR values of the mixes. Curing the mixes for 7 and 28 days increased their CBR and UCC values compared to uncured mixes. The study highlights the need to control the maturity period and provide adequate curing time to achieve sufficient strength in lime-stabil
EXPERIMENTAL INVESTIGATION ON CALIFORNIA BEARING RATIO FOR MECHANICALLY STABI...IAEME Publication
The document describes an experimental investigation on the use of waste rubber tire chips and lime to stabilize expansive soil and improve its California Bearing Ratio (CBR). Laboratory tests were conducted on soil treated with various percentages of lime and rubber chips to determine optimum amounts. The CBR values increased with lime and rubber content up to a limit, after which they decreased. The optimum percentages found were 4% lime and 6% rubber chips.
The document provides an overview of smart grids and the technological advancements that convert normal power grids into smart grids. Some key points:
1. Traditional power grids are inefficient and not well-suited for renewable energy sources, but smart grids use information technology to actively monitor and respond to changes in power demand, supply, costs, and emissions across the entire electrical system.
2. Smart grids are achieved by designing green building energy systems that use locally generated electricity from renewable sources and implement a smart energy management network.
3. Key components of green building energy systems include thermal power networks, DC electric power networks linking different renewable energy sources, AC electric power networks to power existing equipment, and a smart energy management network
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It is observed that different protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs typically communicate directly with a centralized controller or satellite. In this paper we survey the different research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the development of a framework, which is radically simplifies the development of software for sensor network applications and characteristic Features of Sensor Networks.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
This document reviews various energy efficient techniques for wireless sensor networks. It discusses several routing protocols that have been proposed to reduce energy consumption and extend the lifetime of wireless sensor networks, including a 3D geographical routing protocol, a trust and energy aware routing protocol, and a directional transmission based energy aware routing protocol. It also reviews security attacks that can occur in mobile ad hoc networks, such as black hole attacks, wormhole attacks, and denial of service attacks. Finally, the document summarizes several papers that have studied and proposed improvements to energy efficient routing techniques.
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
Abstract A mobile ad hoc network is a self-configured wireless network in which any mobile node can freely access the network at any time without the need of any fixed infrastructures. Due to high dynamic characteristics, these types of networks are easily prone to various security attacks. There are various mechanisms which provide secure communication i.e., certificate revocation. In this paper, the main challenge of certificate revocation (i.e., to revoke the certificates of the intruders inorder to permanently exclude them from the network activities) is accomplished by adopting CCRVC scheme that also deals with false accusations apart from outperforming the other techniques in case of revoking the intruders certificates. Also this scheme enhances the reliability as well as accuracy as it can vindicate the warned nodes promptly based on the threshold based mechanism. Energy of the nodes must be utilized in an effective manner inorder to secure the network for longer durations as the mobile nodes operate on their batteries. Further, a new technique was proposed, to utilize the energy of the nodes effectively by switching the CHs in a timely manner (since the CHs are likely to lose more energy). Experimental results evaluated by using NS-2 show that the proposed scheme EECCRVC is efficient enough in providing secure communications along with effective energy utilization in mobile ad hoc networks. Keywords: Mobile ad hoc networks, Security, Network Simulator, Certificate Revocation, Energy Utilization
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
The document proposes a Portable and Data Security Tolerance-based Energy-Efficient Framework (PDST-EEF) for maintaining data security while lowering energy usage of sensor devices in smart grid environments. PDST is developed to ensure data privacy using an authentication method integrated with cryptographic signatures to detect various attacks like denial of service and replay attacks. EEF then presents an energy-efficient cybersecurity mechanism for sensor networks in smart grids. It identifies malicious nodes, forms groups, and allocates keys with less energy. Experimental results show that PDST-EEF improves authentication time by a second with 5.06% less energy usage. The framework aims to provide high-level security for sensor networks while minimizing their energy consumption.
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
Wireless Sensor Networks (WSNs) are effective devices used for remote surveillance, device failure prediction,
and housing energy control in numerous smart grid implementations. Several interaction structures and remedies,
such as broadband networks, cable networks, Wireless Sensor networks, have been suggested to assist
Smart Grid implementations. Owing to their cheap, dynamic nature, robustness, and low energy profile, WSNs
are attractive devices, and preserving a low energy pattern is an essential factor in WSN. Implementing quality
services and safety techniques in sensor networks is challenging in smart grid applications. Thus, in this article,
Portable and Data Security Tolerancebased Energy-Efficient Framework(PDST-EEF) has been proposed for
maintaining a high standard of data security by lowering the sensor device energy usage in smart grid surroundings.
PDST model is developed to ensure data privacy in sensor networks by utilizing an authentication
method integrated with the cryptographic signature model to detect the various attacks. PDST identifies and
separates attacks like denial of service and replay efficiently. EEF presents a low-power cyber safety mechanism
on sensor networks with smart grid tracking applications. EEF is modeled with different stages like identifying
anti-nodes, group development, and allocating keys less energy. EEF can operate with higher power efficiency
techniques while preserving sustained throughput and reliability ideals. The experimental result shows that the
PDST-EEF’s specific request and authentication period is often enhanced by just a second with less energy usage
of 5.06%.
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
This document discusses using mobile sensors to improve target coverage and network connectivity in wireless sensor networks. It first defines key concepts in mobile wireless sensor networks like coverage, connectivity, and network lifetime. It then reviews existing literature on algorithms for mobile sensor deployment to optimize target coverage and network connectivity with minimum movement. The proposed method aims to deploy mobile sensors with no movement needed to achieve both target coverage and network connectivity. The goal is to minimize energy consumption from sensor movement.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Similar to Improvement of quality of service parameters using reinvented fsmac protocol for wireless sensor networks (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Improvement of quality of service parameters using reinvented fsmac protocol for wireless sensor networks
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 579
IMPROVEMENT OF QUALITY OF SERVICE PARAMETERS USING
REINVENTED FSMAC PROTOCOL FOR WIRELESS SENSOR
NETWORKS
S. S. Agrawal1
, K. D. Kulat2
, M. B. Daigavane3
1
Assiatant Professor, Electronics and Telecommunication, SKNCOE, Pune, Maharashtra, India,
2
Professor, Electronics and computer science, VNIT, Nagpur, Maharashtra, India
3
Professor, Electronics and power Electronics, SD College of Engg., Wardha
sujata.agrawal@rediffmail.com, kdkulat@ece.vnit.ac.in, mdai@rediffmail.com
Abstract
Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring,
industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to
access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor
Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate
node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in
carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b)
the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network
performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy
Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters
are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms
of successful data transmission rate and throughput of the network.
Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Wireless Sensor Networks (WSN) are gaining lot of attention
Because of its over increasing usage. WSNs are large network
of Small, Battery-operated sensor nodes which are situated
randomly in a vast geo-graphical area[1]. Denial-of –Service
(DoS) Attack destroys the network resources so that sensor
nodes behave unpredictably. These attacks are becoming very
sensitive issue in WSNs. DoS Attack disturbs the balance
between efficiency and fairness of common channel access
[2]. The adoption of wireless sensor networks by applications
that require complex operations, ranging from health care to
industrial monitoring, has brought forward a new challenge of
fulfilling the quality of service (QoS) requirements of these
applications. QoS support is a challenging issue because of
highly resource constrained nature of sensor nodes, unreliable
wireless links and harsh operation environments. In this paper,
we focus on the QoS enhancement at the MAC layer against
DoS Attack. While the early research on WSNs has mainly
focused on monitoring applications, such as agriculture and
environmental monitoring, based on low-rate data collection,
current WSN applications can support more complex
operations ranging from health care to industrial monitoring
and automation. This emerging application domain is that
performance and quality of service (QoS) assurances are
becoming crucial as opposed to the best-effort performance in
traditional monitoring applications.
International Telecommunication Union (ITU)
Recommendation E.800 (09/08) has defined QoS as: „„Totality
of characteristics of a telecommunications service that bear on
its ability to satisfy stated and implied needs of the user of the
service‟‟.
QoS brings the ability of giving different priorities to various
users, applications, and data flows, frames or packets based on
their requirements by controlling the resource sharing. Hence
higher level of performance over others can be provided
through a set of measurable service parameters such as delay,
jitter, available bandwidth, and packet loss. Collisions and
consequently retransmissions due to Dos Attack have direct
impact the overall networking metrics such as throughput,
delay and energy efficiency. Since the MAC layer coordinates
the sharing of the wireless medium, it is responsible for
minimizing the number of collisions.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 580
Fuzzy Logic Secure Media Access Control (FSMAC) Protocol
[3] gives good solution against DoS Attacks. It reduces the
rate of false detection as well as increases the successful
packet transmission rate.
In proposed paper, FSMAC protocol is re-established using
new intrusion detecting parameters. These parameters are
number of time node sensed free channel and Variation in
channel sense period. FSMAC protocol first finds out the
intrusion using pre-defined intrusion detector indicators.
Fuzzy Logic (FL) is used innovatively for decision making.
Appropriate countermeasures are taken to reduce the
destruction of attacks basing on intrusion detection results.
Simulations are carried in Matlab with 20 nodes to verify the
effect.
The rest of the paper is arranged as following:
A survey of the research in security issues in sensor networks
and overview on DoS Attack are presented in section 2. The
Computational intelligence and Fuzzy Logic Theory is
outlined in section 3. The structure of proposed FSMAC
algorithm with new parameters is explained in section 4. The
network scenario implemented in order to validate the secure
MAC and results obtained are discussed in section 5. Finally
the concluding remarks are made.
2. PRELIMINARIES
In this section, present security issues in wireless sensor
network are discussed as well as DoS Attack is explained in
brief.
2.1. Current Security Issues
Wireless links are very sensitive to passive eavesdropping,
message replaying and message distortion. Weakly protected
nodes that move into hostile environments can be easily
compromised. Due to dynamic topology, authorization of
administration becomes difficult. The scale of deployment of a
WSN requires conscious decision about trade-offs among
various security measures. These issues are discussed and
mechanisms to achieve secure communication in WSNs are
presented in [6]. Various security challenges in wireless sensor
networks are analyzed and important issues that need to be
addressed for ensuring adequate security are summarized in
[7].
Secure routing is a major research area. Types of routing
attacks and their countermeasures are presented in [8].
Researchers have proposed several methods of securing the
MAC layer against the attacks by adversaries. DoS attacks and
their countermeasures at the CSMA/CA MAC layer are
discussed in [18] and [19].
2.2 Overview of DoS Attack
DoS attacks are classified into three groups: collision,
unfairness and exhaustion attacks based on their mechanism.
In a collision attack, the attacker sends data packets regardless
of the status of the broadcast medium. Such packets collide
with the data or control packets from the legitimate sensor
nodes. Using this mechanism, the collision only happens in the
exchanging period of RTS and CTS packets, which means the
data packet sending process is a non-collision process.
In an unfairness attack, for most RTS/CTS-based MAC
protocols, each node has the same priority to get the common
channel. The first tried node governs the channel. Besides, all
other nodes have to wait for a random length time before
trying to transmit packets. This rule could ensure that every
node accesses common channel fairly. Adversaries could
utilize these characteristics to attack the network. They send
out packets just waiting for a very short time or without
waiting. This causes the common channel used more by
adversaries than by normal nodes. This is what we called
unfairness attack. the adversary transmits an unusually large
number of packets when the medium is free. This prevents the
legitimate sensors from transmitting their packets.
In an exhaustion attack, the adversary transmits an abnormally
large number of RTS packets to the normal sensor nodes,
which exhausts them prematurely.
3. BACKGROUND TECHNIQUES
Under this Heading, techniques used against DoS Attack are
discussed.
3.1 Computational Intelligence
Computational Intelligence (CI) is proper tool used to solve
security problems of DOS Attack in wireless sensor networks.
CI parameters are encouraged by nature. [2][3]. Different
parameters of CI have been successfully used in past few
years to address various challenges. CI provides adaptive
mechanisms that exhibit intelligent behavior in complex and
dynamic environments like WSNs.
CI works very flexibly, autonomously and robustly against
dynamic topology changes, transmission failures and attacked
scenario. CI fuses elements of learning, adaptation, evolution
and fuzzy logic to create intelligent machines. In addition to
paradigms like neural networking, reinforcement learning,
evolutionary computing and fuzzy computing, swarm
intelligence, artificial immune systems. Parameters of CI have
found practical applications in areas such as product design,
robotics, intelligent control, and biometrics and sensor
networks. Researchers have successfully used CI techniques to
address many challenges in WSNs [2] [10].
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 581
The literature has a few articles that use CI approaches for
WSN security. The applications available in the literature have
handled the issue of Denial-of-Service (DoS) attacks at the
node level. Individual sensor node is resources- energy,
bandwidth, computation, memory constrained device.
Therefore, algorithms that involve high computational and
storage burdens are not attractive. So Fuzzy logic and compact
NNs are among solutions discussed.
3.2. Fuzzy Logic
Human reasoning includes measure of imprecision and
uncertainty where as Set theory allows elements to be either
included in a set or not. Human reasoning is marked by the
use of linguistic variables like most, many, frequently, seldom
etc. This approximate reasoning is modeled by fuzzy logic.
Fuzzy logic is a multivalued logic that allows intermediate
values to be defined between conventional threshold values
[15].
Fuzzy systems allow the use of fuzzy sets to draw conclusions
and to make decisions. Fuzzy sets differ from classical sets in
that they allow an object to be a partial member of a set. In
fuzzy systems, the dynamic behavior of a system is
characterized by a set of linguistic fuzzy rules based on the
knowledge of a human expert. Fuzzy rules are of the general
form:
IF antecedent(s) THEN consequent(s)
Where antecedents and consequents are propositions
containing linguistic variables. Antecedents of a fuzzy rule
form a combination of fuzzy sets through the use of logic
operations [3]. Thus, fuzzy sets and fuzzy rules together form
the knowledge base of a rule-based inference system as shown
in Fig 1 [3].
Fig. 1 shows the structure of a fuzzy logic system (FLS) [15].
When an input is applied to a FLS then the inference engine
computes the output set corresponding to each rule. The
defuzzifier then computes a crisp output from these rule output
sets [3] [11].
Fig-1: Fuzzy Inference Engine
4. PROPOSED FSMAC ALGORITHM
This section discusses design of FSMAC protocol algorithm
with new parameters.
4.1 Selection of Intrusion Detector
When collision attack intrudes the network, attackers send
massive packets into the common channel when detecting this
channel is busy. As a result, more RTS, CTS, ACK and even
data packets may be destroyed. Due to the collisions caused by
attackers. See Fig. 2. Moreover, the average latency of data
packet is prolonged because of more retransmitting control
packets and data packets [4] [9].
Under normal condition, without any attacks, it is fair for each
node to transmit data over the common channel from long-
term statistic view. Since nodes have to wait for a random
time before sending RTS to try to hold the common channel.
Only the first successful one can be allowed to transmit data
over the common channel. Data packets of normal sensor
nodes are supposed to wait longer time at MAC layer, when
unfairness attackers prevent other normal sensor nodes from
transmitting. This is done by holding the channel ahead of
time [3][8].
Differing from collision attack and unfairness attack,
exhaustion attackers work almost same as other normal sensor
nodes, except for sending RTS repeatedly to some normal
sensor nodes. As a result, the arrival rate of RTS at victim
nodes will increase dramatically. Besides this, data packets
should wait longer time, since the common channel is more
utilized for transmitting RTS by attackers [4].
As well as for unfairness attack as the channel is free, attacker
is ready to attack which causes an attack. There is specific
Non-fuzzy
Inputs
Rule Base
Fuzzy Sets
Non-fuzzy
Outputs
Fuzzification DefuzzificationInference
Engine
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 582
time for transmitting RTS to the receiver, but at the time of
exhaustion attack, because of large number of RTS are sent
over receiver, length of that period gets minimized.
From above analysis, it shows that the intrusions may be
detected by monitoring abnormal alterations of some sensitive
network parameters. They are:
• A great number of RTS packets are received by victim
nodes for exhaustion attacks.
• Average waiting time becomes very long for both
unfairness attacks and collision attacks.
• Collision takes place considerably often in collision
attacks.
• When more the times channel is sensed free by a certain
node, possibility of intruded DOS Attack is high and
vice-versa.
• If channel sense period is more possibility of attack will
be less.
By observing abnormal changes in No. of times node sensed
free channel and Variation in channel sense period.
In this paper, chosen parameters are as follows:
• Number of times node sensed free channel.
• Variation in channel sense period.
4.2 FSMAC Algorithm Description
Fig. 2 shows the mechanism of the proposed secure MAC
algorithm. There are addition of two modules-intrusion and
defense module into original CSMA/CA protocol.
Fig-2: Intrusion Detection System
Each sensor node is provided with it's own security system.In
FSMAC, intrusion module of each sensor node monitors the
intrusion detection parameters and periodically checks
whether intrusion happens or not. If intrusion is happened then
the defense module of the sensor node will be triggered by
Fuzzy Logic System (FLS) intrusion detection module.
Defense module will inform physical layer and Mac layer to
switch to different Radio Frequency (RF) band to start or stop
the transmission. This sensor node will get back to the original
RF band or restarts information exchanging over network after
this period, as well as intrusion detection will be resumed.
Each sensor node monitors, Free sensed channel and Channel
sense period, which are the inputs or antecedents of FLS
intrusion module. Then according to the output or consequent
possibility of intrusion found of FLS intrusion detection
module, security systems make a decision whether the
intrusion exists or not.
For proposed FLS, linguistic variables or antecedents are used
to represent, Number of times Channel sensed free and
variation in Channel sense period. These antecedents are
divided into three levels i.e. Low, Moderate, High. The output
i.e. Possibility of intrusion detection is divided into five i.e.
Very Low, Low, Moderate, High, Very High. As every
antecedent has three fuzzy subsets and there are two
antecedent, 6 possibilities of consequents.
From behavior of these inputs the paper may discuss the
behavior of consequents i.e. possibility of intrusion applying
Fuzzy Logic as follows:
Antecedent 1: Number of times Chanel is sensed free.
Antecedent 2: Variation in Channel Sense period.
Consequent: possibility of intrusion Detection.
Table-1: The rule base for intrusion detection.
Antecedent 1 Antecedent 2 Consequents
Low Low Very High
Low Moderate High
Moderate High Moderate
Moderate Low Moderate
High Moderate High
High High Very Low
A defense module is trigged, when intrusion is found. Defense
module takes countermeasures to reduce the effects of
attackers on the network.
During the intrusion period, it is an energy waste or unsafe
action for normal sensor nodes to transmit or receive. Because
the transmitting or receiving is almost unsuccessful or spied
by attackers when enemies attack the network Thus it is an
appropriate and effective choice for the normal nodes to
switch to a different RF band to make transmission or to stop
transmitting and receiving.
The paper focuses on intrusion detection and increasing the
lifespan of protocol. For example, if it choose stopping
transmitting and receiving mechanism to implement defense
function There is no information on attacks duration, it can't
make the node sleep until attacks stop. So, after a period of
sleep, this node should wake up to make data transmission and
detect the intrusion again. This node will stay at this state until
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 583
intrusion is found again. At sleep mode, there is no
transmitting and receiving, bModrut sensing still continues.
In order to make new secure algorithm, this has no centre
control available for general WSNs. This defense scheme, like
intrusion detection scheme, is also distributive i.e. each sensor
node's defense schedule has no any relationship with other
sensor node's [3]
5. RESULTS AND DISCUSSION
5.1. Simulation Setup
The paper runs simulations using MATLAB simulator. Thirty
sensor nodes are deployed randomly in an area of l km X l km,
and communication range (radius) is 500m. Nodes are set to
be initially with energy of 2 J. The destination for each sensor
node will be randomly chosen.
First it checks the behavior of CSMA/CA protocol and then it
separately tests the influences of each DoS attack i.e. collision
attack, Unfairness attack and Exhaustion attack on CSMA/CA
protocol. In each experiment, there is only one type of attack
introduced. The attacker is an abnormal sensor node, which
has been captured and reprogrammed by enemies successfully
before the system starts to work.
5.2 Simulation Results
Parameter metrics are defined to testify the effects of our
algorithm. It is,
• Possibility of successful detection (Pd): Pd is the
possibility of nodes making correct detection.
• Possibility of false detection (Pfd): Pfd is the possibility of
nodes making false detection.
• Data packet successful transmission rate (Rst ): Rst is the
rate of successfully transmitted data packets to all data
packets transmitted.
• Throughput: It represents the total number of packets
received successfully by a receiver per second. It can also
be defined as the total amount of data a receiver actually
receives from sender divided by the time taken by the
receiver to obtain the last packet. It also represents the
packet overhead within the route.
• Graph of Successful packet transmission are shown
below:
Fig-3: Graph of successful data transmission with FSMAC
protocol having 3 intrusion detection parameters.
Fig-4: Graph of successful data transmission for reinvented
FSMAC protocol having 2 intrusion detection parameters.
From above graph, it is observed that rate of successful data
transmission is more for reinvented FSMAC protocol and
combined protocol than Attacked CSMA/CA protocol and
existing FSMAC protocol.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 584
Fig-5: Graph of successful data transmission for FSMAC
protocol having 5 intrusion detection parameters.
Throughput for CSMA/CA without any Attack is 92.80%
Throughput for different DoS Attacks are calculated as
follows:
Table-2: Throughput for Collision Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
68.41% 81.68% 92.33% 90.29%
Table-3: Throughput for Exhaustion Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
76.64% 89.73% 88.90% 90.30%
Table-4: Throughput for Unfairness Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
75.61% 86.61% 94.86% 88.98%
CONCLUSIONS
From above study, it shows that, reinvented FSMAC protocol
gives good performance against Dos Attack and following
Conclusions are made:
1. FSMAC protocol with pre-defined new parameters gives
better detection than existing FSMAC protocol.
2. Rate of Successful data transmission is increased for
reinvented as well as for combined FSMAC protocol.
3. Throughput is remarkably increased for reinvented FSMAC
protocol in case of Collision and Unfairness Attack.
ACKNOWLEDGEMENTS
The authors can acknowledge any person/authorities in this
section. This is not mandatory.
REFERENCES
[1]. Xiuli Ren and Haibin Yu, "Security Mechanisms for
Wireless Sensor Networks", IJCSNS International Journal of
Computer Science and Network Security, VOL.6 No.3, March
2006.
[2]. Raghavendra V. Kulkarni, Anna Förster, and Ganesh
Kumar Venayagamoorthy “Computational Intelligence in
Wireless Sensor Networks: A Survey” IEEE Communication
Surveys & Tutorials, VOL. 13, NO. 1, First Quarter 2011.
[3]. Qingechun Ren and Qilian Liang ,“Fuzzy Logic-
optimized Secure Media Access Control (FSMAC) Protocol
for Wireless sensor Networks” CIHSPS-2005 IEEE
International Conference on Computational intelligence for
Home and Security and Personal Safety 2005.
[4]. Alberto Lopez Toledo and Xiaodong Wang, “Robust
Detection of MAC layer Denial-of-service attacks in
CSMA/CA Wireless Networks”, IEEE Transactions on
Information Forensics and Security,Vol.3 No.3 September
2008 .
[5]. Taimur Farooq,David lewellyn-Jones Madjid
Merabti,“MAC layer DOS Attack in IEEE802.11
Networks”,location:Liverpool Jon Moores University
K.ISBN:978-1-902560-24-3, April 2010.
[6]. E. Shi and A. Perrig, "Designing secure sensor networks,"
IEEE Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43,2004.
[7]. F. Hu and N. K. Sharma, "Security considerations in ad
hoc sensor networks," Ad Hoc Networks, vol. 3, no. 1, pp. 69-
89, 2005.
[8]. C. Karlof and D. Wagner, "Secure routing in wireless
sensor networks: Attacks and countermeasures," Elsevier's
AdHoc Networks Journal,Special Issue on Sensor Network
Applications and Protocols, vol. 1, no. 2-3, pp. 293-315,
September 2003.
[9]. A. R. M. Kamal, "Adaptive secure routing in ad hoc
mobile network," Master's thesis, Royal Institute of
Technology (KTH), Stockholm, Sweden, Nov 2004.
[10]. Jethro Shell, Simon Coupland, Eric Goodyer “Fuzzy
Data Fusion for Fault Detection in Wireless Sensor Networks”
ISBN 2010.
[11]. Vikram Gupta, “Denial of Service Attacks at the MAC
Layer in Wireless Ad Hoc Networks”, Proceedings of
MILCOM 2002, vol. 2, 7-10 Oct.2002.
[12]. Yihong Zhou, Dapeng Wu ,Scott M. Nettles, “Analyzing
and Preventing MAC-Layer Denial of Service Attacks for
Stock 802.11 Systems” ISBN 2004.
[13]. Hongfa Wang , “A Robust Mechanism for Wireless
Sensor Network Security” IEEE Conference on wireless
communication 2010.
[14]. John E. Dickerson, Jukka Juslin, Ourania Koukousoula,
Julie A. Dickerson “Fuzzy Intrusion Detection” Joint 9th IFSA
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 585
world congress and 20th NAFIPS International conference
VO.4 2001, PP 2165-2170.
[15]. H. Chan, A. Perrig, “Security and Privacy in Sensor
Networks ," Oct. 2003, pp. l 03 - IOS.
[16]. O. Kacllirski, R. Gulla, " Effective Intrusion Detection
Using Multiple Sensors in Wireless Ad Hoc Networks ,"
SFGCOMM '03, Aug. 2003.
[17]. Anthony D.Wood and Jon A. Stankovic,“Denial-of
Service attacks in sensor network”.
[18]. Adam Stubblefield. John Ioannidis, Aviel D. Rubin,
“Using the Fluhrer, Mantin, and Shamir Attack to Break
WEP”.
[19]. Adrian Perrig, Robert Szewczyk, Victor Wen, David
Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor
Networks”.
BIOGRAPHIES
Sujata S Agrawal completed her B.E(E&T.C)
Degreefrom Nagpur University in 1992 and
ME degree in 2005from Government college
of engineering, Aurangabad.She is persuing
her Ph.D. degree in Electronics Engineering
from RSTMNagpur University, India.Having a total
experience of 14 years, she is currently associated with
Smt.Kashibai Navale college of engineering, Pune as Assistant
Professor in the Electronics & telecommunication Department.
She is the Life Member of the Indian Society for technical
Education.
Kishore D. Kulat completed his degrees in
Electrical Engineering, BE in 1980, from VRCE
(at present VNIT) Nagpur and ME degree in
1984 from VJTI, Mumbai, India. He completed
his Ph.D. degree in Electronics Engineering, in
the year 2003 from VNIT, Nagpur. Having a total experience
of more than 25 years, he is currently associated with VNIT,
as Professor in the Electronics & Computer Science
Department. With his profound knowledge & experience in
his field he is guiding around 15 research scholars for their
doctoral degree. Two have been awarded the Ph. D. degree.
He has published around 15 Journal Papers, more than 25
papers in International Conferences & more than 40 have been
published in National Conferences. Has worked as Reviewer
for many National & International conferences.He is a
member of Board of Studies for Electronics Engineering,
Nagpur University for last 10years. He is member of
Professional societies like IETE, IEI and ISTE. With all his
faith in God, Dr. K. D. Kulat believes in achieving excellence
through the process of continuous upgradation.
Manoj B. Daigavane obtained the B.E. Degree
in Power Electronics Engineering from Nagpur
University, India in 1988.He received the M.S.
Degree in Electronics and Control Engineering
from Birla Institute of Technology and Science,
Pilani (Raj) India in 1994. He also obtained the M.E. Degree
in Power Electronics Engineering from Rajeev Gandhi
University of Technology, Bhopal (M.P), India in 2001. He
received Ph D Degree in Electrical Engineering from RSTM
Nagpur University, India in 2009. Since Sept.1988- June
2007, he had been with the Department of Electronics and
Power Electronics Engineering, B.D.College of Engineering,
Sewagram (Wardha), affiliated to the Nagpur University,
India. Since July 1, 2007 toApr 30, 2009, he was Professor &
Head of Electrical and Electronics Engineering, Disha
Institute of Mgmt. andTech., Raipur (C.G.) where he is
engaged in teaching & research. Presently, he is Principal of S.
D. College of Engineering, Wardha – Maharashtra (India),
since May 01, 2009. His main areas of interest are Design of
electronic circuit, resonant converters, Power quality issues,
DSP applications and Power electronics for motor drives. He
has been responsible for the development of Electrical
Machines and Power Electronics Laboratories He is a Member
of the Institution of Engineers (India) and a Life Member of
the Indian Society for technical education.