SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 579
IMPROVEMENT OF QUALITY OF SERVICE PARAMETERS USING
REINVENTED FSMAC PROTOCOL FOR WIRELESS SENSOR
NETWORKS
S. S. Agrawal1
, K. D. Kulat2
, M. B. Daigavane3
1
Assiatant Professor, Electronics and Telecommunication, SKNCOE, Pune, Maharashtra, India,
2
Professor, Electronics and computer science, VNIT, Nagpur, Maharashtra, India
3
Professor, Electronics and power Electronics, SD College of Engg., Wardha
sujata.agrawal@rediffmail.com, kdkulat@ece.vnit.ac.in, mdai@rediffmail.com
Abstract
Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring,
industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to
access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor
Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate
node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in
carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b)
the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network
performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy
Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters
are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms
of successful data transmission rate and throughput of the network.
Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Wireless Sensor Networks (WSN) are gaining lot of attention
Because of its over increasing usage. WSNs are large network
of Small, Battery-operated sensor nodes which are situated
randomly in a vast geo-graphical area[1]. Denial-of –Service
(DoS) Attack destroys the network resources so that sensor
nodes behave unpredictably. These attacks are becoming very
sensitive issue in WSNs. DoS Attack disturbs the balance
between efficiency and fairness of common channel access
[2]. The adoption of wireless sensor networks by applications
that require complex operations, ranging from health care to
industrial monitoring, has brought forward a new challenge of
fulfilling the quality of service (QoS) requirements of these
applications. QoS support is a challenging issue because of
highly resource constrained nature of sensor nodes, unreliable
wireless links and harsh operation environments. In this paper,
we focus on the QoS enhancement at the MAC layer against
DoS Attack. While the early research on WSNs has mainly
focused on monitoring applications, such as agriculture and
environmental monitoring, based on low-rate data collection,
current WSN applications can support more complex
operations ranging from health care to industrial monitoring
and automation. This emerging application domain is that
performance and quality of service (QoS) assurances are
becoming crucial as opposed to the best-effort performance in
traditional monitoring applications.
International Telecommunication Union (ITU)
Recommendation E.800 (09/08) has defined QoS as: ‘‘Totality
of characteristics of a telecommunications service that bear on
its ability to satisfy stated and implied needs of the user of the
service’’.
QoS brings the ability of giving different priorities to various
users, applications, and data flows, frames or packets based on
their requirements by controlling the resource sharing. Hence
higher level of performance over others can be provided
through a set of measurable service parameters such as delay,
jitter, available bandwidth, and packet loss. Collisions and
consequently retransmissions due to Dos Attack have direct
impact the overall networking metrics such as throughput,
delay and energy efficiency. Since the MAC layer coordinates
the sharing of the wireless medium, it is responsible for
minimizing the number of collisions.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 580
Fuzzy Logic Secure Media Access Control (FSMAC) Protocol
[3] gives good solution against DoS Attacks. It reduces the
rate of false detection as well as increases the successful
packet transmission rate.
In proposed paper, FSMAC protocol is re-established using
new intrusion detecting parameters. These parameters are
number of time node sensed free channel and Variation in
channel sense period. FSMAC protocol first finds out the
intrusion using pre-defined intrusion detector indicators.
Fuzzy Logic (FL) is used innovatively for decision making.
Appropriate countermeasures are taken to reduce the
destruction of attacks basing on intrusion detection results.
Simulations are carried in Matlab with 20 nodes to verify the
effect.
The rest of the paper is arranged as following:
A survey of the research in security issues in sensor networks
and overview on DoS Attack are presented in section 2. The
Computational intelligence and Fuzzy Logic Theory is
outlined in section 3. The structure of proposed FSMAC
algorithm with new parameters is explained in section 4. The
network scenario implemented in order to validate the secure
MAC and results obtained are discussed in section 5. Finally
the concluding remarks are made.
2. PRELIMINARIES
In this section, present security issues in wireless sensor
network are discussed as well as DoS Attack is explained in
brief.
2.1. Current Security Issues
Wireless links are very sensitive to passive eavesdropping,
message replaying and message distortion. Weakly protected
nodes that move into hostile environments can be easily
compromised. Due to dynamic topology, authorization of
administration becomes difficult. The scale of deployment of a
WSN requires conscious decision about trade-offs among
various security measures. These issues are discussed and
mechanisms to achieve secure communication in WSNs are
presented in [6]. Various security challenges in wireless sensor
networks are analyzed and important issues that need to be
addressed for ensuring adequate security are summarized in
[7].
Secure routing is a major research area. Types of routing
attacks and their countermeasures are presented in [8].
Researchers have proposed several methods of securing the
MAC layer against the attacks by adversaries. DoS attacks and
their countermeasures at the CSMA/CA MAC layer are
discussed in [18] and [19].
2.2 Overview of DoS Attack
DoS attacks are classified into three groups: collision,
unfairness and exhaustion attacks based on their mechanism.
In a collision attack, the attacker sends data packets regardless
of the status of the broadcast medium. Such packets collide
with the data or control packets from the legitimate sensor
nodes. Using this mechanism, the collision only happens in the
exchanging period of RTS and CTS packets, which means the
data packet sending process is a non-collision process.
In an unfairness attack, for most RTS/CTS-based MAC
protocols, each node has the same priority to get the common
channel. The first tried node governs the channel. Besides, all
other nodes have to wait for a random length time before
trying to transmit packets. This rule could ensure that every
node accesses common channel fairly. Adversaries could
utilize these characteristics to attack the network. They send
out packets just waiting for a very short time or without
waiting. This causes the common channel used more by
adversaries than by normal nodes. This is what we called
unfairness attack. the adversary transmits an unusually large
number of packets when the medium is free. This prevents the
legitimate sensors from transmitting their packets.
In an exhaustion attack, the adversary transmits an abnormally
large number of RTS packets to the normal sensor nodes,
which exhausts them prematurely.
3. BACKGROUND TECHNIQUES
Under this Heading, techniques used against DoS Attack are
discussed.
3.1 Computational Intelligence
Computational Intelligence (CI) is proper tool used to solve
security problems of DOS Attack in wireless sensor networks.
CI parameters are encouraged by nature. [2][3]. Different
parameters of CI have been successfully used in past few
years to address various challenges. CI provides adaptive
mechanisms that exhibit intelligent behavior in complex and
dynamic environments like WSNs.
CI works very flexibly, autonomously and robustly against
dynamic topology changes, transmission failures and attacked
scenario. CI fuses elements of learning, adaptation, evolution
and fuzzy logic to create intelligent machines. In addition to
paradigms like neural networking, reinforcement learning,
evolutionary computing and fuzzy computing, swarm
intelligence, artificial immune systems. Parameters of CI have
found practical applications in areas such as product design,
robotics, intelligent control, and biometrics and sensor
networks. Researchers have successfully used CI techniques to
address many challenges in WSNs [2] [10].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 581
The literature has a few articles that use CI approaches for
WSN security. The applications available in the literature have
handled the issue of Denial-of-Service (DoS) attacks at the
node level. Individual sensor node is resources- energy,
bandwidth, computation, memory constrained device.
Therefore, algorithms that involve high computational and
storage burdens are not attractive. So Fuzzy logic and compact
NNs are among solutions discussed.
3.2. Fuzzy Logic
Human reasoning includes measure of imprecision and
uncertainty where as Set theory allows elements to be either
included in a set or not. Human reasoning is marked by the
use of linguistic variables like most, many, frequently, seldom
etc. This approximate reasoning is modeled by fuzzy logic.
Fuzzy logic is a multivalued logic that allows intermediate
values to be defined between conventional threshold values
[15].
Fuzzy systems allow the use of fuzzy sets to draw conclusions
and to make decisions. Fuzzy sets differ from classical sets in
that they allow an object to be a partial member of a set. In
fuzzy systems, the dynamic behavior of a system is
characterized by a set of linguistic fuzzy rules based on the
knowledge of a human expert. Fuzzy rules are of the general
form:
IF antecedent(s) THEN consequent(s)
Where antecedents and consequents are propositions
containing linguistic variables. Antecedents of a fuzzy rule
form a combination of fuzzy sets through the use of logic
operations [3]. Thus, fuzzy sets and fuzzy rules together form
the knowledge base of a rule-based inference system as shown
in Fig 1 [3].
Fig. 1 shows the structure of a fuzzy logic system (FLS) [15].
When an input is applied to a FLS then the inference engine
computes the output set corresponding to each rule. The
defuzzifier then computes a crisp output from these rule output
sets [3] [11].
Fig-1: Fuzzy Inference Engine
4. PROPOSED FSMAC ALGORITHM
This section discusses design of FSMAC protocol algorithm
with new parameters.
4.1 Selection of Intrusion Detector
When collision attack intrudes the network, attackers send
massive packets into the common channel when detecting this
channel is busy. As a result, more RTS, CTS, ACK and even
data packets may be destroyed. Due to the collisions caused by
attackers. See Fig. 2. Moreover, the average latency of data
packet is prolonged because of more retransmitting control
packets and data packets [4] [9].
Under normal condition, without any attacks, it is fair for each
node to transmit data over the common channel from long-
term statistic view. Since nodes have to wait for a random
time before sending RTS to try to hold the common channel.
Only the first successful one can be allowed to transmit data
over the common channel. Data packets of normal sensor
nodes are supposed to wait longer time at MAC layer, when
unfairness attackers prevent other normal sensor nodes from
transmitting. This is done by holding the channel ahead of
time [3][8].
Differing from collision attack and unfairness attack,
exhaustion attackers work almost same as other normal sensor
nodes, except for sending RTS repeatedly to some normal
sensor nodes. As a result, the arrival rate of RTS at victim
nodes will increase dramatically. Besides this, data packets
should wait longer time, since the common channel is more
utilized for transmitting RTS by attackers [4].
As well as for unfairness attack as the channel is free, attacker
is ready to attack which causes an attack. There is specific
Non-fuzzy
Inputs
Rule Base
Fuzzy Sets
Non-fuzzy
Outputs
Fuzzification DefuzzificationInference
Engine
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 582
time for transmitting RTS to the receiver, but at the time of
exhaustion attack, because of large number of RTS are sent
over receiver, length of that period gets minimized.
From above analysis, it shows that the intrusions may be
detected by monitoring abnormal alterations of some sensitive
network parameters. They are:
• A great number of RTS packets are received by victim
nodes for exhaustion attacks.
• Average waiting time becomes very long for both
unfairness attacks and collision attacks.
• Collision takes place considerably often in collision
attacks.
• When more the times channel is sensed free by a certain
node, possibility of intruded DOS Attack is high and
vice-versa.
• If channel sense period is more possibility of attack will
be less.
By observing abnormal changes in No. of times node sensed
free channel and Variation in channel sense period.
In this paper, chosen parameters are as follows:
• Number of times node sensed free channel.
• Variation in channel sense period.
4.2 FSMAC Algorithm Description
Fig. 2 shows the mechanism of the proposed secure MAC
algorithm. There are addition of two modules-intrusion and
defense module into original CSMA/CA protocol.
Fig-2: Intrusion Detection System
Each sensor node is provided with it's own security system.In
FSMAC, intrusion module of each sensor node monitors the
intrusion detection parameters and periodically checks
whether intrusion happens or not. If intrusion is happened then
the defense module of the sensor node will be triggered by
Fuzzy Logic System (FLS) intrusion detection module.
Defense module will inform physical layer and Mac layer to
switch to different Radio Frequency (RF) band to start or stop
the transmission. This sensor node will get back to the original
RF band or restarts information exchanging over network after
this period, as well as intrusion detection will be resumed.
Each sensor node monitors, Free sensed channel and Channel
sense period, which are the inputs or antecedents of FLS
intrusion module. Then according to the output or consequent
possibility of intrusion found of FLS intrusion detection
module, security systems make a decision whether the
intrusion exists or not.
For proposed FLS, linguistic variables or antecedents are used
to represent, Number of times Channel sensed free and
variation in Channel sense period. These antecedents are
divided into three levels i.e. Low, Moderate, High. The output
i.e. Possibility of intrusion detection is divided into five i.e.
Very Low, Low, Moderate, High, Very High. As every
antecedent has three fuzzy subsets and there are two
antecedent, 6 possibilities of consequents.
From behavior of these inputs the paper may discuss the
behavior of consequents i.e. possibility of intrusion applying
Fuzzy Logic as follows:
Antecedent 1: Number of times Chanel is sensed free.
Antecedent 2: Variation in Channel Sense period.
Consequent: possibility of intrusion Detection.
Table-1: The rule base for intrusion detection.
Antecedent 1 Antecedent 2 Consequents
Low Low Very High
Low Moderate High
Moderate High Moderate
Moderate Low Moderate
High Moderate High
High High Very Low
A defense module is trigged, when intrusion is found. Defense
module takes countermeasures to reduce the effects of
attackers on the network.
During the intrusion period, it is an energy waste or unsafe
action for normal sensor nodes to transmit or receive. Because
the transmitting or receiving is almost unsuccessful or spied
by attackers when enemies attack the network Thus it is an
appropriate and effective choice for the normal nodes to
switch to a different RF band to make transmission or to stop
transmitting and receiving.
The paper focuses on intrusion detection and increasing the
lifespan of protocol. For example, if it choose stopping
transmitting and receiving mechanism to implement defense
function There is no information on attacks duration, it can't
make the node sleep until attacks stop. So, after a period of
sleep, this node should wake up to make data transmission and
detect the intrusion again. This node will stay at this state until
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 583
intrusion is found again. At sleep mode, there is no
transmitting and receiving, bModrut sensing still continues.
In order to make new secure algorithm, this has no centre
control available for general WSNs. This defense scheme, like
intrusion detection scheme, is also distributive i.e. each sensor
node's defense schedule has no any relationship with other
sensor node's [3]
5. RESULTS AND DISCUSSION
5.1. Simulation Setup
The paper runs simulations using MATLAB simulator. Thirty
sensor nodes are deployed randomly in an area of l km X l km,
and communication range (radius) is 500m. Nodes are set to
be initially with energy of 2 J. The destination for each sensor
node will be randomly chosen.
First it checks the behavior of CSMA/CA protocol and then it
separately tests the influences of each DoS attack i.e. collision
attack, Unfairness attack and Exhaustion attack on CSMA/CA
protocol. In each experiment, there is only one type of attack
introduced. The attacker is an abnormal sensor node, which
has been captured and reprogrammed by enemies successfully
before the system starts to work.
5.2 Simulation Results
Parameter metrics are defined to testify the effects of our
algorithm. It is,
• Possibility of successful detection (Pd): Pd is the
possibility of nodes making correct detection.
• Possibility of false detection (Pfd): Pfd is the possibility of
nodes making false detection.
• Data packet successful transmission rate (Rst ): Rst is the
rate of successfully transmitted data packets to all data
packets transmitted.
• Throughput: It represents the total number of packets
received successfully by a receiver per second. It can also
be defined as the total amount of data a receiver actually
receives from sender divided by the time taken by the
receiver to obtain the last packet. It also represents the
packet overhead within the route.
• Graph of Successful packet transmission are shown
below:
Fig-3: Graph of successful data transmission with FSMAC
protocol having 3 intrusion detection parameters.
Fig-4: Graph of successful data transmission for reinvented
FSMAC protocol having 2 intrusion detection parameters.
From above graph, it is observed that rate of successful data
transmission is more for reinvented FSMAC protocol and
combined protocol than Attacked CSMA/CA protocol and
existing FSMAC protocol.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 584
Fig-5: Graph of successful data transmission for FSMAC
protocol having 5 intrusion detection parameters.
Throughput for CSMA/CA without any Attack is 92.80%
Throughput for different DoS Attacks are calculated as
follows:
Table-2: Throughput for Collision Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
68.41% 81.68% 92.33% 90.29%
Table-3: Throughput for Exhaustion Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
76.64% 89.73% 88.90% 90.30%
Table-4: Throughput for Unfairness Attack
CSMA/CA FSMAC
(Existing)
FSMAC
(Reinvented)
FSMAC
(Combined)
75.61% 86.61% 94.86% 88.98%
CONCLUSIONS
From above study, it shows that, reinvented FSMAC protocol
gives good performance against Dos Attack and following
Conclusions are made:
1. FSMAC protocol with pre-defined new parameters gives
better detection than existing FSMAC protocol.
2. Rate of Successful data transmission is increased for
reinvented as well as for combined FSMAC protocol.
3. Throughput is remarkably increased for reinvented FSMAC
protocol in case of Collision and Unfairness Attack.
ACKNOWLEDGEMENTS
The authors can acknowledge any person/authorities in this
section. This is not mandatory.
REFERENCES
[1]. Xiuli Ren and Haibin Yu, "Security Mechanisms for
Wireless Sensor Networks", IJCSNS International Journal of
Computer Science and Network Security, VOL.6 No.3, March
2006.
[2]. Raghavendra V. Kulkarni, Anna Förster, and Ganesh
Kumar Venayagamoorthy “Computational Intelligence in
Wireless Sensor Networks: A Survey” IEEE Communication
Surveys & Tutorials, VOL. 13, NO. 1, First Quarter 2011.
[3]. Qingechun Ren and Qilian Liang ,“Fuzzy Logic-
optimized Secure Media Access Control (FSMAC) Protocol
for Wireless sensor Networks” CIHSPS-2005 IEEE
International Conference on Computational intelligence for
Home and Security and Personal Safety 2005.
[4]. Alberto Lopez Toledo and Xiaodong Wang, “Robust
Detection of MAC layer Denial-of-service attacks in
CSMA/CA Wireless Networks”, IEEE Transactions on
Information Forensics and Security,Vol.3 No.3 September
2008 .
[5]. Taimur Farooq,David lewellyn-Jones Madjid
Merabti,“MAC layer DOS Attack in IEEE802.11
Networks”,location:Liverpool Jon Moores University
K.ISBN:978-1-902560-24-3, April 2010.
[6]. E. Shi and A. Perrig, "Designing secure sensor networks,"
IEEE Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43,2004.
[7]. F. Hu and N. K. Sharma, "Security considerations in ad
hoc sensor networks," Ad Hoc Networks, vol. 3, no. 1, pp. 69-
89, 2005.
[8]. C. Karlof and D. Wagner, "Secure routing in wireless
sensor networks: Attacks and countermeasures," Elsevier's
AdHoc Networks Journal,Special Issue on Sensor Network
Applications and Protocols, vol. 1, no. 2-3, pp. 293-315,
September 2003.
[9]. A. R. M. Kamal, "Adaptive secure routing in ad hoc
mobile network," Master's thesis, Royal Institute of
Technology (KTH), Stockholm, Sweden, Nov 2004.
[10]. Jethro Shell, Simon Coupland, Eric Goodyer “Fuzzy
Data Fusion for Fault Detection in Wireless Sensor Networks”
ISBN 2010.
[11]. Vikram Gupta, “Denial of Service Attacks at the MAC
Layer in Wireless Ad Hoc Networks”, Proceedings of
MILCOM 2002, vol. 2, 7-10 Oct.2002.
[12]. Yihong Zhou, Dapeng Wu ,Scott M. Nettles, “Analyzing
and Preventing MAC-Layer Denial of Service Attacks for
Stock 802.11 Systems” ISBN 2004.
[13]. Hongfa Wang , “A Robust Mechanism for Wireless
Sensor Network Security” IEEE Conference on wireless
communication 2010.
[14]. John E. Dickerson, Jukka Juslin, Ourania Koukousoula,
Julie A. Dickerson “Fuzzy Intrusion Detection” Joint 9th IFSA
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 585
world congress and 20th NAFIPS International conference
VO.4 2001, PP 2165-2170.
[15]. H. Chan, A. Perrig, “Security and Privacy in Sensor
Networks ," Oct. 2003, pp. l 03 - IOS.
[16]. O. Kacllirski, R. Gulla, " Effective Intrusion Detection
Using Multiple Sensors in Wireless Ad Hoc Networks ,"
SFGCOMM '03, Aug. 2003.
[17]. Anthony D.Wood and Jon A. Stankovic,“Denial-of
Service attacks in sensor network”.
[18]. Adam Stubblefield. John Ioannidis, Aviel D. Rubin,
“Using the Fluhrer, Mantin, and Shamir Attack to Break
WEP”.
[19]. Adrian Perrig, Robert Szewczyk, Victor Wen, David
Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor
Networks”.
BIOGRAPHIES
Sujata S Agrawal completed her B.E(E&T.C)
Degreefrom Nagpur University in 1992 and
ME degree in 2005from Government college
of engineering, Aurangabad.She is persuing
her Ph.D. degree in Electronics Engineering
from RSTMNagpur University, India.Having a total
experience of 14 years, she is currently associated with
Smt.Kashibai Navale college of engineering, Pune as Assistant
Professor in the Electronics & telecommunication Department.
She is the Life Member of the Indian Society for technical
Education.
Kishore D. Kulat completed his degrees in
Electrical Engineering, BE in 1980, from VRCE
(at present VNIT) Nagpur and ME degree in
1984 from VJTI, Mumbai, India. He completed
his Ph.D. degree in Electronics Engineering, in
the year 2003 from VNIT, Nagpur. Having a total experience
of more than 25 years, he is currently associated with VNIT,
as Professor in the Electronics & Computer Science
Department. With his profound knowledge & experience in
his field he is guiding around 15 research scholars for their
doctoral degree. Two have been awarded the Ph. D. degree.
He has published around 15 Journal Papers, more than 25
papers in International Conferences & more than 40 have been
published in National Conferences. Has worked as Reviewer
for many National & International conferences.He is a
member of Board of Studies for Electronics Engineering,
Nagpur University for last 10years. He is member of
Professional societies like IETE, IEI and ISTE. With all his
faith in God, Dr. K. D. Kulat believes in achieving excellence
through the process of continuous upgradation.
Manoj B. Daigavane obtained the B.E. Degree
in Power Electronics Engineering from Nagpur
University, India in 1988.He received the M.S.
Degree in Electronics and Control Engineering
from Birla Institute of Technology and Science,
Pilani (Raj) India in 1994. He also obtained the M.E. Degree
in Power Electronics Engineering from Rajeev Gandhi
University of Technology, Bhopal (M.P), India in 2001. He
received Ph D Degree in Electrical Engineering from RSTM
Nagpur University, India in 2009. Since Sept.1988- June
2007, he had been with the Department of Electronics and
Power Electronics Engineering, B.D.College of Engineering,
Sewagram (Wardha), affiliated to the Nagpur University,
India. Since July 1, 2007 toApr 30, 2009, he was Professor &
Head of Electrical and Electronics Engineering, Disha
Institute of Mgmt. andTech., Raipur (C.G.) where he is
engaged in teaching & research. Presently, he is Principal of S.
D. College of Engineering, Wardha – Maharashtra (India),
since May 01, 2009. His main areas of interest are Design of
electronic circuit, resonant converters, Power quality issues,
DSP applications and Power electronics for motor drives. He
has been responsible for the development of Electrical
Machines and Power Electronics Laboratories He is a Member
of the Institution of Engineers (India) and a Life Member of
the Indian Society for technical education.

More Related Content

What's hot

Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksEswar Publications
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 

What's hot (16)

Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
50120140507012
5012014050701250120140507012
50120140507012
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 

Viewers also liked

A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyeSAT Publishing House
 
Motion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighborMotion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighboreSAT Publishing House
 
Hybrid optical switching in optical code division
Hybrid optical switching in optical code divisionHybrid optical switching in optical code division
Hybrid optical switching in optical code divisioneSAT Publishing House
 
Design of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblockDesign of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblockeSAT Publishing House
 
Ultimate strength analysis of box girder under hoggong bending moment, torque...
Ultimate strength analysis of box girder under hoggong bending moment, torque...Ultimate strength analysis of box girder under hoggong bending moment, torque...
Ultimate strength analysis of box girder under hoggong bending moment, torque...eSAT Publishing House
 
Efficient way of user search location in query processing
Efficient way of user search location in query processingEfficient way of user search location in query processing
Efficient way of user search location in query processingeSAT Publishing House
 
An adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alertAn adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alerteSAT Publishing House
 
Increasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layerIncreasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layereSAT Publishing House
 
A mobile based microscope for sample recognition
A mobile based microscope for sample recognitionA mobile based microscope for sample recognition
A mobile based microscope for sample recognitioneSAT Publishing House
 
Deceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredDeceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredeSAT Publishing House
 
Transmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patientTransmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patienteSAT Publishing House
 
A low complexity partial transmit sequence scheme for
A low complexity partial transmit sequence scheme forA low complexity partial transmit sequence scheme for
A low complexity partial transmit sequence scheme foreSAT Publishing House
 
Analytical solutions for square shape pressure
Analytical solutions for square shape pressureAnalytical solutions for square shape pressure
Analytical solutions for square shape pressureeSAT Publishing House
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 
Design and testing of automobile exhaust system
Design and testing of automobile exhaust systemDesign and testing of automobile exhaust system
Design and testing of automobile exhaust systemeSAT Publishing House
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingeSAT Publishing House
 
A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...eSAT Publishing House
 
Energy audit, conservation and power factor
Energy audit, conservation and power factorEnergy audit, conservation and power factor
Energy audit, conservation and power factoreSAT Publishing House
 

Viewers also liked (20)

A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
 
Motion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighborMotion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighbor
 
Hybrid optical switching in optical code division
Hybrid optical switching in optical code divisionHybrid optical switching in optical code division
Hybrid optical switching in optical code division
 
Design of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblockDesign of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblock
 
Ultimate strength analysis of box girder under hoggong bending moment, torque...
Ultimate strength analysis of box girder under hoggong bending moment, torque...Ultimate strength analysis of box girder under hoggong bending moment, torque...
Ultimate strength analysis of box girder under hoggong bending moment, torque...
 
Efficient way of user search location in query processing
Efficient way of user search location in query processingEfficient way of user search location in query processing
Efficient way of user search location in query processing
 
An adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alertAn adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alert
 
Increasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layerIncreasing network efficiency by preventing attacks at access layer
Increasing network efficiency by preventing attacks at access layer
 
A mobile based microscope for sample recognition
A mobile based microscope for sample recognitionA mobile based microscope for sample recognition
A mobile based microscope for sample recognition
 
Deceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteeredDeceitful and instigating a aerobics itinerary for twinsteered
Deceitful and instigating a aerobics itinerary for twinsteered
 
Transmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patientTransmission of arm based real time ecg for monitoring remotely located patient
Transmission of arm based real time ecg for monitoring remotely located patient
 
A low complexity partial transmit sequence scheme for
A low complexity partial transmit sequence scheme forA low complexity partial transmit sequence scheme for
A low complexity partial transmit sequence scheme for
 
Analytical solutions for square shape pressure
Analytical solutions for square shape pressureAnalytical solutions for square shape pressure
Analytical solutions for square shape pressure
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
Design and testing of automobile exhaust system
Design and testing of automobile exhaust systemDesign and testing of automobile exhaust system
Design and testing of automobile exhaust system
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasing
 
A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...
 
Energy audit, conservation and power factor
Energy audit, conservation and power factorEnergy audit, conservation and power factor
Energy audit, conservation and power factor
 

Similar to Reinvented FSMAC Protocol Improves QoS for Wireless Sensor Networks

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdfVenu Madhav
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 

Similar to Reinvented FSMAC Protocol Improves QoS for Wireless Sensor Networks (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf3 Elsevier Venu Mar 2022.pdf
3 Elsevier Venu Mar 2022.pdf
 
Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...Data security tolerance and portable based energy-efficient framework in sens...
Data security tolerance and portable based energy-efficient framework in sens...
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Reinvented FSMAC Protocol Improves QoS for Wireless Sensor Networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 579 IMPROVEMENT OF QUALITY OF SERVICE PARAMETERS USING REINVENTED FSMAC PROTOCOL FOR WIRELESS SENSOR NETWORKS S. S. Agrawal1 , K. D. Kulat2 , M. B. Daigavane3 1 Assiatant Professor, Electronics and Telecommunication, SKNCOE, Pune, Maharashtra, India, 2 Professor, Electronics and computer science, VNIT, Nagpur, Maharashtra, India 3 Professor, Electronics and power Electronics, SD College of Engg., Wardha sujata.agrawal@rediffmail.com, kdkulat@ece.vnit.ac.in, mdai@rediffmail.com Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Wireless Sensor Networks (WSN) are gaining lot of attention Because of its over increasing usage. WSNs are large network of Small, Battery-operated sensor nodes which are situated randomly in a vast geo-graphical area[1]. Denial-of –Service (DoS) Attack destroys the network resources so that sensor nodes behave unpredictably. These attacks are becoming very sensitive issue in WSNs. DoS Attack disturbs the balance between efficiency and fairness of common channel access [2]. The adoption of wireless sensor networks by applications that require complex operations, ranging from health care to industrial monitoring, has brought forward a new challenge of fulfilling the quality of service (QoS) requirements of these applications. QoS support is a challenging issue because of highly resource constrained nature of sensor nodes, unreliable wireless links and harsh operation environments. In this paper, we focus on the QoS enhancement at the MAC layer against DoS Attack. While the early research on WSNs has mainly focused on monitoring applications, such as agriculture and environmental monitoring, based on low-rate data collection, current WSN applications can support more complex operations ranging from health care to industrial monitoring and automation. This emerging application domain is that performance and quality of service (QoS) assurances are becoming crucial as opposed to the best-effort performance in traditional monitoring applications. International Telecommunication Union (ITU) Recommendation E.800 (09/08) has defined QoS as: ‘‘Totality of characteristics of a telecommunications service that bear on its ability to satisfy stated and implied needs of the user of the service’’. QoS brings the ability of giving different priorities to various users, applications, and data flows, frames or packets based on their requirements by controlling the resource sharing. Hence higher level of performance over others can be provided through a set of measurable service parameters such as delay, jitter, available bandwidth, and packet loss. Collisions and consequently retransmissions due to Dos Attack have direct impact the overall networking metrics such as throughput, delay and energy efficiency. Since the MAC layer coordinates the sharing of the wireless medium, it is responsible for minimizing the number of collisions.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 580 Fuzzy Logic Secure Media Access Control (FSMAC) Protocol [3] gives good solution against DoS Attacks. It reduces the rate of false detection as well as increases the successful packet transmission rate. In proposed paper, FSMAC protocol is re-established using new intrusion detecting parameters. These parameters are number of time node sensed free channel and Variation in channel sense period. FSMAC protocol first finds out the intrusion using pre-defined intrusion detector indicators. Fuzzy Logic (FL) is used innovatively for decision making. Appropriate countermeasures are taken to reduce the destruction of attacks basing on intrusion detection results. Simulations are carried in Matlab with 20 nodes to verify the effect. The rest of the paper is arranged as following: A survey of the research in security issues in sensor networks and overview on DoS Attack are presented in section 2. The Computational intelligence and Fuzzy Logic Theory is outlined in section 3. The structure of proposed FSMAC algorithm with new parameters is explained in section 4. The network scenario implemented in order to validate the secure MAC and results obtained are discussed in section 5. Finally the concluding remarks are made. 2. PRELIMINARIES In this section, present security issues in wireless sensor network are discussed as well as DoS Attack is explained in brief. 2.1. Current Security Issues Wireless links are very sensitive to passive eavesdropping, message replaying and message distortion. Weakly protected nodes that move into hostile environments can be easily compromised. Due to dynamic topology, authorization of administration becomes difficult. The scale of deployment of a WSN requires conscious decision about trade-offs among various security measures. These issues are discussed and mechanisms to achieve secure communication in WSNs are presented in [6]. Various security challenges in wireless sensor networks are analyzed and important issues that need to be addressed for ensuring adequate security are summarized in [7]. Secure routing is a major research area. Types of routing attacks and their countermeasures are presented in [8]. Researchers have proposed several methods of securing the MAC layer against the attacks by adversaries. DoS attacks and their countermeasures at the CSMA/CA MAC layer are discussed in [18] and [19]. 2.2 Overview of DoS Attack DoS attacks are classified into three groups: collision, unfairness and exhaustion attacks based on their mechanism. In a collision attack, the attacker sends data packets regardless of the status of the broadcast medium. Such packets collide with the data or control packets from the legitimate sensor nodes. Using this mechanism, the collision only happens in the exchanging period of RTS and CTS packets, which means the data packet sending process is a non-collision process. In an unfairness attack, for most RTS/CTS-based MAC protocols, each node has the same priority to get the common channel. The first tried node governs the channel. Besides, all other nodes have to wait for a random length time before trying to transmit packets. This rule could ensure that every node accesses common channel fairly. Adversaries could utilize these characteristics to attack the network. They send out packets just waiting for a very short time or without waiting. This causes the common channel used more by adversaries than by normal nodes. This is what we called unfairness attack. the adversary transmits an unusually large number of packets when the medium is free. This prevents the legitimate sensors from transmitting their packets. In an exhaustion attack, the adversary transmits an abnormally large number of RTS packets to the normal sensor nodes, which exhausts them prematurely. 3. BACKGROUND TECHNIQUES Under this Heading, techniques used against DoS Attack are discussed. 3.1 Computational Intelligence Computational Intelligence (CI) is proper tool used to solve security problems of DOS Attack in wireless sensor networks. CI parameters are encouraged by nature. [2][3]. Different parameters of CI have been successfully used in past few years to address various challenges. CI provides adaptive mechanisms that exhibit intelligent behavior in complex and dynamic environments like WSNs. CI works very flexibly, autonomously and robustly against dynamic topology changes, transmission failures and attacked scenario. CI fuses elements of learning, adaptation, evolution and fuzzy logic to create intelligent machines. In addition to paradigms like neural networking, reinforcement learning, evolutionary computing and fuzzy computing, swarm intelligence, artificial immune systems. Parameters of CI have found practical applications in areas such as product design, robotics, intelligent control, and biometrics and sensor networks. Researchers have successfully used CI techniques to address many challenges in WSNs [2] [10].
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 581 The literature has a few articles that use CI approaches for WSN security. The applications available in the literature have handled the issue of Denial-of-Service (DoS) attacks at the node level. Individual sensor node is resources- energy, bandwidth, computation, memory constrained device. Therefore, algorithms that involve high computational and storage burdens are not attractive. So Fuzzy logic and compact NNs are among solutions discussed. 3.2. Fuzzy Logic Human reasoning includes measure of imprecision and uncertainty where as Set theory allows elements to be either included in a set or not. Human reasoning is marked by the use of linguistic variables like most, many, frequently, seldom etc. This approximate reasoning is modeled by fuzzy logic. Fuzzy logic is a multivalued logic that allows intermediate values to be defined between conventional threshold values [15]. Fuzzy systems allow the use of fuzzy sets to draw conclusions and to make decisions. Fuzzy sets differ from classical sets in that they allow an object to be a partial member of a set. In fuzzy systems, the dynamic behavior of a system is characterized by a set of linguistic fuzzy rules based on the knowledge of a human expert. Fuzzy rules are of the general form: IF antecedent(s) THEN consequent(s) Where antecedents and consequents are propositions containing linguistic variables. Antecedents of a fuzzy rule form a combination of fuzzy sets through the use of logic operations [3]. Thus, fuzzy sets and fuzzy rules together form the knowledge base of a rule-based inference system as shown in Fig 1 [3]. Fig. 1 shows the structure of a fuzzy logic system (FLS) [15]. When an input is applied to a FLS then the inference engine computes the output set corresponding to each rule. The defuzzifier then computes a crisp output from these rule output sets [3] [11]. Fig-1: Fuzzy Inference Engine 4. PROPOSED FSMAC ALGORITHM This section discusses design of FSMAC protocol algorithm with new parameters. 4.1 Selection of Intrusion Detector When collision attack intrudes the network, attackers send massive packets into the common channel when detecting this channel is busy. As a result, more RTS, CTS, ACK and even data packets may be destroyed. Due to the collisions caused by attackers. See Fig. 2. Moreover, the average latency of data packet is prolonged because of more retransmitting control packets and data packets [4] [9]. Under normal condition, without any attacks, it is fair for each node to transmit data over the common channel from long- term statistic view. Since nodes have to wait for a random time before sending RTS to try to hold the common channel. Only the first successful one can be allowed to transmit data over the common channel. Data packets of normal sensor nodes are supposed to wait longer time at MAC layer, when unfairness attackers prevent other normal sensor nodes from transmitting. This is done by holding the channel ahead of time [3][8]. Differing from collision attack and unfairness attack, exhaustion attackers work almost same as other normal sensor nodes, except for sending RTS repeatedly to some normal sensor nodes. As a result, the arrival rate of RTS at victim nodes will increase dramatically. Besides this, data packets should wait longer time, since the common channel is more utilized for transmitting RTS by attackers [4]. As well as for unfairness attack as the channel is free, attacker is ready to attack which causes an attack. There is specific Non-fuzzy Inputs Rule Base Fuzzy Sets Non-fuzzy Outputs Fuzzification DefuzzificationInference Engine
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 582 time for transmitting RTS to the receiver, but at the time of exhaustion attack, because of large number of RTS are sent over receiver, length of that period gets minimized. From above analysis, it shows that the intrusions may be detected by monitoring abnormal alterations of some sensitive network parameters. They are: • A great number of RTS packets are received by victim nodes for exhaustion attacks. • Average waiting time becomes very long for both unfairness attacks and collision attacks. • Collision takes place considerably often in collision attacks. • When more the times channel is sensed free by a certain node, possibility of intruded DOS Attack is high and vice-versa. • If channel sense period is more possibility of attack will be less. By observing abnormal changes in No. of times node sensed free channel and Variation in channel sense period. In this paper, chosen parameters are as follows: • Number of times node sensed free channel. • Variation in channel sense period. 4.2 FSMAC Algorithm Description Fig. 2 shows the mechanism of the proposed secure MAC algorithm. There are addition of two modules-intrusion and defense module into original CSMA/CA protocol. Fig-2: Intrusion Detection System Each sensor node is provided with it's own security system.In FSMAC, intrusion module of each sensor node monitors the intrusion detection parameters and periodically checks whether intrusion happens or not. If intrusion is happened then the defense module of the sensor node will be triggered by Fuzzy Logic System (FLS) intrusion detection module. Defense module will inform physical layer and Mac layer to switch to different Radio Frequency (RF) band to start or stop the transmission. This sensor node will get back to the original RF band or restarts information exchanging over network after this period, as well as intrusion detection will be resumed. Each sensor node monitors, Free sensed channel and Channel sense period, which are the inputs or antecedents of FLS intrusion module. Then according to the output or consequent possibility of intrusion found of FLS intrusion detection module, security systems make a decision whether the intrusion exists or not. For proposed FLS, linguistic variables or antecedents are used to represent, Number of times Channel sensed free and variation in Channel sense period. These antecedents are divided into three levels i.e. Low, Moderate, High. The output i.e. Possibility of intrusion detection is divided into five i.e. Very Low, Low, Moderate, High, Very High. As every antecedent has three fuzzy subsets and there are two antecedent, 6 possibilities of consequents. From behavior of these inputs the paper may discuss the behavior of consequents i.e. possibility of intrusion applying Fuzzy Logic as follows: Antecedent 1: Number of times Chanel is sensed free. Antecedent 2: Variation in Channel Sense period. Consequent: possibility of intrusion Detection. Table-1: The rule base for intrusion detection. Antecedent 1 Antecedent 2 Consequents Low Low Very High Low Moderate High Moderate High Moderate Moderate Low Moderate High Moderate High High High Very Low A defense module is trigged, when intrusion is found. Defense module takes countermeasures to reduce the effects of attackers on the network. During the intrusion period, it is an energy waste or unsafe action for normal sensor nodes to transmit or receive. Because the transmitting or receiving is almost unsuccessful or spied by attackers when enemies attack the network Thus it is an appropriate and effective choice for the normal nodes to switch to a different RF band to make transmission or to stop transmitting and receiving. The paper focuses on intrusion detection and increasing the lifespan of protocol. For example, if it choose stopping transmitting and receiving mechanism to implement defense function There is no information on attacks duration, it can't make the node sleep until attacks stop. So, after a period of sleep, this node should wake up to make data transmission and detect the intrusion again. This node will stay at this state until
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 583 intrusion is found again. At sleep mode, there is no transmitting and receiving, bModrut sensing still continues. In order to make new secure algorithm, this has no centre control available for general WSNs. This defense scheme, like intrusion detection scheme, is also distributive i.e. each sensor node's defense schedule has no any relationship with other sensor node's [3] 5. RESULTS AND DISCUSSION 5.1. Simulation Setup The paper runs simulations using MATLAB simulator. Thirty sensor nodes are deployed randomly in an area of l km X l km, and communication range (radius) is 500m. Nodes are set to be initially with energy of 2 J. The destination for each sensor node will be randomly chosen. First it checks the behavior of CSMA/CA protocol and then it separately tests the influences of each DoS attack i.e. collision attack, Unfairness attack and Exhaustion attack on CSMA/CA protocol. In each experiment, there is only one type of attack introduced. The attacker is an abnormal sensor node, which has been captured and reprogrammed by enemies successfully before the system starts to work. 5.2 Simulation Results Parameter metrics are defined to testify the effects of our algorithm. It is, • Possibility of successful detection (Pd): Pd is the possibility of nodes making correct detection. • Possibility of false detection (Pfd): Pfd is the possibility of nodes making false detection. • Data packet successful transmission rate (Rst ): Rst is the rate of successfully transmitted data packets to all data packets transmitted. • Throughput: It represents the total number of packets received successfully by a receiver per second. It can also be defined as the total amount of data a receiver actually receives from sender divided by the time taken by the receiver to obtain the last packet. It also represents the packet overhead within the route. • Graph of Successful packet transmission are shown below: Fig-3: Graph of successful data transmission with FSMAC protocol having 3 intrusion detection parameters. Fig-4: Graph of successful data transmission for reinvented FSMAC protocol having 2 intrusion detection parameters. From above graph, it is observed that rate of successful data transmission is more for reinvented FSMAC protocol and combined protocol than Attacked CSMA/CA protocol and existing FSMAC protocol.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 584 Fig-5: Graph of successful data transmission for FSMAC protocol having 5 intrusion detection parameters. Throughput for CSMA/CA without any Attack is 92.80% Throughput for different DoS Attacks are calculated as follows: Table-2: Throughput for Collision Attack CSMA/CA FSMAC (Existing) FSMAC (Reinvented) FSMAC (Combined) 68.41% 81.68% 92.33% 90.29% Table-3: Throughput for Exhaustion Attack CSMA/CA FSMAC (Existing) FSMAC (Reinvented) FSMAC (Combined) 76.64% 89.73% 88.90% 90.30% Table-4: Throughput for Unfairness Attack CSMA/CA FSMAC (Existing) FSMAC (Reinvented) FSMAC (Combined) 75.61% 86.61% 94.86% 88.98% CONCLUSIONS From above study, it shows that, reinvented FSMAC protocol gives good performance against Dos Attack and following Conclusions are made: 1. FSMAC protocol with pre-defined new parameters gives better detection than existing FSMAC protocol. 2. Rate of Successful data transmission is increased for reinvented as well as for combined FSMAC protocol. 3. Throughput is remarkably increased for reinvented FSMAC protocol in case of Collision and Unfairness Attack. ACKNOWLEDGEMENTS The authors can acknowledge any person/authorities in this section. This is not mandatory. REFERENCES [1]. Xiuli Ren and Haibin Yu, "Security Mechanisms for Wireless Sensor Networks", IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3, March 2006. [2]. Raghavendra V. Kulkarni, Anna Förster, and Ganesh Kumar Venayagamoorthy “Computational Intelligence in Wireless Sensor Networks: A Survey” IEEE Communication Surveys & Tutorials, VOL. 13, NO. 1, First Quarter 2011. [3]. Qingechun Ren and Qilian Liang ,“Fuzzy Logic- optimized Secure Media Access Control (FSMAC) Protocol for Wireless sensor Networks” CIHSPS-2005 IEEE International Conference on Computational intelligence for Home and Security and Personal Safety 2005. [4]. Alberto Lopez Toledo and Xiaodong Wang, “Robust Detection of MAC layer Denial-of-service attacks in CSMA/CA Wireless Networks”, IEEE Transactions on Information Forensics and Security,Vol.3 No.3 September 2008 . [5]. Taimur Farooq,David lewellyn-Jones Madjid Merabti,“MAC layer DOS Attack in IEEE802.11 Networks”,location:Liverpool Jon Moores University K.ISBN:978-1-902560-24-3, April 2010. [6]. E. Shi and A. Perrig, "Designing secure sensor networks," IEEE Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43,2004. [7]. F. Hu and N. K. Sharma, "Security considerations in ad hoc sensor networks," Ad Hoc Networks, vol. 3, no. 1, pp. 69- 89, 2005. [8]. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Elsevier's AdHoc Networks Journal,Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2-3, pp. 293-315, September 2003. [9]. A. R. M. Kamal, "Adaptive secure routing in ad hoc mobile network," Master's thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, Nov 2004. [10]. Jethro Shell, Simon Coupland, Eric Goodyer “Fuzzy Data Fusion for Fault Detection in Wireless Sensor Networks” ISBN 2010. [11]. Vikram Gupta, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks”, Proceedings of MILCOM 2002, vol. 2, 7-10 Oct.2002. [12]. Yihong Zhou, Dapeng Wu ,Scott M. Nettles, “Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802.11 Systems” ISBN 2004. [13]. Hongfa Wang , “A Robust Mechanism for Wireless Sensor Network Security” IEEE Conference on wireless communication 2010. [14]. John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson “Fuzzy Intrusion Detection” Joint 9th IFSA
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 585 world congress and 20th NAFIPS International conference VO.4 2001, PP 2165-2170. [15]. H. Chan, A. Perrig, “Security and Privacy in Sensor Networks ," Oct. 2003, pp. l 03 - IOS. [16]. O. Kacllirski, R. Gulla, " Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks ," SFGCOMM '03, Aug. 2003. [17]. Anthony D.Wood and Jon A. Stankovic,“Denial-of Service attacks in sensor network”. [18]. Adam Stubblefield. John Ioannidis, Aviel D. Rubin, “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP”. [19]. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”. BIOGRAPHIES Sujata S Agrawal completed her B.E(E&T.C) Degreefrom Nagpur University in 1992 and ME degree in 2005from Government college of engineering, Aurangabad.She is persuing her Ph.D. degree in Electronics Engineering from RSTMNagpur University, India.Having a total experience of 14 years, she is currently associated with Smt.Kashibai Navale college of engineering, Pune as Assistant Professor in the Electronics & telecommunication Department. She is the Life Member of the Indian Society for technical Education. Kishore D. Kulat completed his degrees in Electrical Engineering, BE in 1980, from VRCE (at present VNIT) Nagpur and ME degree in 1984 from VJTI, Mumbai, India. He completed his Ph.D. degree in Electronics Engineering, in the year 2003 from VNIT, Nagpur. Having a total experience of more than 25 years, he is currently associated with VNIT, as Professor in the Electronics & Computer Science Department. With his profound knowledge & experience in his field he is guiding around 15 research scholars for their doctoral degree. Two have been awarded the Ph. D. degree. He has published around 15 Journal Papers, more than 25 papers in International Conferences & more than 40 have been published in National Conferences. Has worked as Reviewer for many National & International conferences.He is a member of Board of Studies for Electronics Engineering, Nagpur University for last 10years. He is member of Professional societies like IETE, IEI and ISTE. With all his faith in God, Dr. K. D. Kulat believes in achieving excellence through the process of continuous upgradation. Manoj B. Daigavane obtained the B.E. Degree in Power Electronics Engineering from Nagpur University, India in 1988.He received the M.S. Degree in Electronics and Control Engineering from Birla Institute of Technology and Science, Pilani (Raj) India in 1994. He also obtained the M.E. Degree in Power Electronics Engineering from Rajeev Gandhi University of Technology, Bhopal (M.P), India in 2001. He received Ph D Degree in Electrical Engineering from RSTM Nagpur University, India in 2009. Since Sept.1988- June 2007, he had been with the Department of Electronics and Power Electronics Engineering, B.D.College of Engineering, Sewagram (Wardha), affiliated to the Nagpur University, India. Since July 1, 2007 toApr 30, 2009, he was Professor & Head of Electrical and Electronics Engineering, Disha Institute of Mgmt. andTech., Raipur (C.G.) where he is engaged in teaching & research. Presently, he is Principal of S. D. College of Engineering, Wardha – Maharashtra (India), since May 01, 2009. His main areas of interest are Design of electronic circuit, resonant converters, Power quality issues, DSP applications and Power electronics for motor drives. He has been responsible for the development of Electrical Machines and Power Electronics Laboratories He is a Member of the Institution of Engineers (India) and a Life Member of the Indian Society for technical education.