In Wireless Sensor Network (WSN), fact from different sensor nodes is collected at assembling node, which is typically complete via modest procedures such as averaging as inadequate computational power and energy resources. Though such collections is identified to be extremely susceptible to node compromising attacks. These approaches are extremely prone to attacks as WSN are typically lacking interfere resilient hardware. Thus, purpose of veracity of facts and prestige of sensor nodes is critical for wireless sensor networks. Therefore, imminent gatherer nodes will be proficient of accomplishment additional cultivated data aggregation algorithms, so creating WSN little unresisting, as the performance of actual low power processors affectedly increases. Iterative filtering algorithms embrace inordinate capacity for such a resolution. The way of allocated the matching mass elements to information delivered by each source, such iterative algorithms concurrently assemble facts from several roots and deliver entrust valuation of these roots. Though suggestively extra substantial against collusion attacks beside the modest averaging techniques, are quiet vulnerable to a different cultivated attack familiarize. The existing literature is surveyed in this paper to have a study of iterative filtering techniques and a detailed comparison is provided. At the end of this paper new technique of improved iterative filtering is proposed with the help of literature survey and drawbacks found in the literature.
Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in ...IJECEIAES
Irrespective of inclusion of Wireless Sensor Network (WSN) in majority of the research proposition for smart city planning, it is still shrouded with some significant issues. A closer look into problems in WSN shows that energy parameter is the origination point of majority of the other problems in resource-constrained sensors as well as it significant minimizes the reliability in standard sensory operation in adverse environment. Therefore, this manuscript presents a novel analytical model that is meant for establishing a well balance between energy efficiency over multi-path data forwarding and reliable operation with improved network performance. The complete process is emphasized during data fusion stage to ensure data quality too. A simulation study has been carried out using benchmarked test-bed of MEMSIC nodes to find that proposed system offers good energy conservation process during data fusion operation as well as it also ensure good reliable operation in comparison to existing system.
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
This document presents a study that constructs a predictive model for network intrusion detection using data mining techniques. The study uses the KDD Cup 99 intrusion detection dataset to build classification models using J48 decision tree, JRip rule induction, Naive Bayes, and multilayer perceptron algorithms. The J48 decision tree algorithm achieved the highest accuracy of 99.91% and was selected to build the predictive model. This model was then integrated with a knowledge-based system to build an intelligent network intrusion detection system capable of automatically detecting network attacks, mapping detections to attack categories, and updating the training data over time. Experimental evaluation found the integrated system achieved 91.43% accuracy and 83% user acceptance in detecting network intrusions
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
Wireless Sensor Networks (WSNs) based on the IEEE 802.15.4 MAC and PHY layer standards is a recent trend in the market. It has gained tremendous attention due to its low energy consumption characteristics and low data rates. However, for larger networks minimizing energy consumption is still an issue because of the dissemination of large overheads throughout the network. This consumption of energy can be reduced by incorporating a novel cooperative caching scheme to minimize overheads and to serve data with minimal latency and thereby reduce the energy consumption. This paper explores the possibilities to enhance the energy efficiency by incorporating a cooperative caching strategy.
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
This document proposes a new technique for securely querying encrypted DNA databases stored in the cloud. The key points are:
- DNA databases are sensitive personal information but could enable medical research if securely shared. Existing anonymization techniques are insufficient to protect privacy.
- The proposed technique builds on previous work but supports a richer set of queries while being faster. It favors storage over computation to optimize costs, since storage is cheaper than computation in cloud environments.
- The technique encrypts DNA data before outsourcing to the cloud, allowing aggregate queries to be run on the encrypted data while preserving individuals' privacy. This addresses privacy concerns with securely enabling medical analysis of genomic data in cloud databases.
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
Abstract
Internet Technology is growing at exponential rate day by day, making data security of computer systems more complex and critical. There has been multiple methodology implemented for the same in recent time as detailed in [1], [3]. Availability of larger bandwidth has made the multiple large computer server network connected worldwide and thus increasing the load on the necessity to secure data and Intrusion detection system (IDS) is one of the most efficient technique to maintain security of computer system. The proposed system is designed in such a way that are helpful in identifying malicious behavior and improper use of computer system. In this report we proposed a hybrid technique for intrusion detection using data mining algorithms. Our main objective is to do complete analysis of intrusion detection Dataset to test the implemented system.In This report we will propose a new methodology in which Modified k-mean is used for clustering whereas Naïve Bayes for the classification. These two data mining techniques will be used for Intrusion detection in large horizontally distributed database.
Keywords: Intrusion Detection, Modified K-Mean, Naïve Bays
Abstract—Classical machine learning techniques have been employed severally in intrusion detection. But due to the rising cases and sophistication of attacks, more advanced machine learning techniques including ensemble-based methods, neural networks and deep learning techniques have been applied. However, there is still need for improved machine learning approach to detect attacks more effectively and efficiently. Stacked generalization approach has been shown to be capable of learning from features and meta-features but has been limited by the deficiencies of base classifiers and lack of optimization in the choice of meta-feature combination. This paper therefore proposes a stacked generalization ensemble approach based on two-tier meta-learner, in which the outputs of classical stacked ensemble are passed to multi-feature-based stacked ensemble, which is optimized. A Grid-search approach is used for the optimization. Nine data features and four meta-features derived from Logistic Regression, Support Vector Machine, Naïve Bayes, and Multilayer Perceptron neural network are used for the machine learning classification task. By applying neural networks as the meta-learner for the classification of NSL-KDD data, improved performances in terms of accuracy, precision, recall and F-measure of 0.97, 0.98, 0.98 and 0.98, respectively are achieved.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
1. The document proposes a genetic-fuzzy based method for automatic intrusion detection using network datasets. It combines fuzzy set theory with genetic algorithms to extract rules for both discrete and continuous attributes to detect normal and intrusion patterns.
2. The method was tested on KDD99 Cup and DARPA98 network intrusion detection datasets and showed high detection rates with low false alarm rates for both misuse detection and anomaly detection.
3. By extracting many rules to represent normal network behavior patterns, the proposed genetic-fuzzy approach can detect new or unknown intrusions based on anomalies without requiring prior domain expertise on intrusion patterns.
Analytical Modelling of Power Efficient Reliable Operation of Data Fusion in ...IJECEIAES
Irrespective of inclusion of Wireless Sensor Network (WSN) in majority of the research proposition for smart city planning, it is still shrouded with some significant issues. A closer look into problems in WSN shows that energy parameter is the origination point of majority of the other problems in resource-constrained sensors as well as it significant minimizes the reliability in standard sensory operation in adverse environment. Therefore, this manuscript presents a novel analytical model that is meant for establishing a well balance between energy efficiency over multi-path data forwarding and reliable operation with improved network performance. The complete process is emphasized during data fusion stage to ensure data quality too. A simulation study has been carried out using benchmarked test-bed of MEMSIC nodes to find that proposed system offers good energy conservation process during data fusion operation as well as it also ensure good reliable operation in comparison to existing system.
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
This document presents a study that constructs a predictive model for network intrusion detection using data mining techniques. The study uses the KDD Cup 99 intrusion detection dataset to build classification models using J48 decision tree, JRip rule induction, Naive Bayes, and multilayer perceptron algorithms. The J48 decision tree algorithm achieved the highest accuracy of 99.91% and was selected to build the predictive model. This model was then integrated with a knowledge-based system to build an intelligent network intrusion detection system capable of automatically detecting network attacks, mapping detections to attack categories, and updating the training data over time. Experimental evaluation found the integrated system achieved 91.43% accuracy and 83% user acceptance in detecting network intrusions
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
Wireless Sensor Networks (WSNs) based on the IEEE 802.15.4 MAC and PHY layer standards is a recent trend in the market. It has gained tremendous attention due to its low energy consumption characteristics and low data rates. However, for larger networks minimizing energy consumption is still an issue because of the dissemination of large overheads throughout the network. This consumption of energy can be reduced by incorporating a novel cooperative caching scheme to minimize overheads and to serve data with minimal latency and thereby reduce the energy consumption. This paper explores the possibilities to enhance the energy efficiency by incorporating a cooperative caching strategy.
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
This document proposes a new technique for securely querying encrypted DNA databases stored in the cloud. The key points are:
- DNA databases are sensitive personal information but could enable medical research if securely shared. Existing anonymization techniques are insufficient to protect privacy.
- The proposed technique builds on previous work but supports a richer set of queries while being faster. It favors storage over computation to optimize costs, since storage is cheaper than computation in cloud environments.
- The technique encrypts DNA data before outsourcing to the cloud, allowing aggregate queries to be run on the encrypted data while preserving individuals' privacy. This addresses privacy concerns with securely enabling medical analysis of genomic data in cloud databases.
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
Abstract
Internet Technology is growing at exponential rate day by day, making data security of computer systems more complex and critical. There has been multiple methodology implemented for the same in recent time as detailed in [1], [3]. Availability of larger bandwidth has made the multiple large computer server network connected worldwide and thus increasing the load on the necessity to secure data and Intrusion detection system (IDS) is one of the most efficient technique to maintain security of computer system. The proposed system is designed in such a way that are helpful in identifying malicious behavior and improper use of computer system. In this report we proposed a hybrid technique for intrusion detection using data mining algorithms. Our main objective is to do complete analysis of intrusion detection Dataset to test the implemented system.In This report we will propose a new methodology in which Modified k-mean is used for clustering whereas Naïve Bayes for the classification. These two data mining techniques will be used for Intrusion detection in large horizontally distributed database.
Keywords: Intrusion Detection, Modified K-Mean, Naïve Bays
Abstract—Classical machine learning techniques have been employed severally in intrusion detection. But due to the rising cases and sophistication of attacks, more advanced machine learning techniques including ensemble-based methods, neural networks and deep learning techniques have been applied. However, there is still need for improved machine learning approach to detect attacks more effectively and efficiently. Stacked generalization approach has been shown to be capable of learning from features and meta-features but has been limited by the deficiencies of base classifiers and lack of optimization in the choice of meta-feature combination. This paper therefore proposes a stacked generalization ensemble approach based on two-tier meta-learner, in which the outputs of classical stacked ensemble are passed to multi-feature-based stacked ensemble, which is optimized. A Grid-search approach is used for the optimization. Nine data features and four meta-features derived from Logistic Regression, Support Vector Machine, Naïve Bayes, and Multilayer Perceptron neural network are used for the machine learning classification task. By applying neural networks as the meta-learner for the classification of NSL-KDD data, improved performances in terms of accuracy, precision, recall and F-measure of 0.97, 0.98, 0.98 and 0.98, respectively are achieved.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
1. The document proposes a genetic-fuzzy based method for automatic intrusion detection using network datasets. It combines fuzzy set theory with genetic algorithms to extract rules for both discrete and continuous attributes to detect normal and intrusion patterns.
2. The method was tested on KDD99 Cup and DARPA98 network intrusion detection datasets and showed high detection rates with low false alarm rates for both misuse detection and anomaly detection.
3. By extracting many rules to represent normal network behavior patterns, the proposed genetic-fuzzy approach can detect new or unknown intrusions based on anomalies without requiring prior domain expertise on intrusion patterns.
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two Adaboost based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.
A new clutering approach for anomaly intrusion detectionIJDKP
Recent advances in technology have made our work easier compare to earlier times. Computer network is
growing day by day but while discussing about the security of computers and networks it has always been a
major concerns for organizations varying from smaller to larger enterprises. It is true that organizations
are aware of the possible threats and attacks so they always prepare for the safer side but due to some
loopholes attackers are able to make attacks.
Intrusion detection is one of the major fields of research and researchers are trying to find new algorithms
for detecting intrusions. Clustering techniques of data mining is an interested area of research for detecting
possible intrusions and attacks. This paper presents a new clustering approach for anomaly intrusion
detection by using the approach of K-medoids method of clustering and its certain modifications. The
proposed algorithm is able to achieve high detection rate and overcomes the disadvantages of K-means
algorithm.
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET Journal
This document summarizes a research paper that proposes a new method for securely sharing and querying genomic DNA sequences stored in the cloud without violating privacy. The method builds on existing frameworks by offering deterministic results with zero error probability, and a scheme that is twice as fast but uses twice the storage space, which is preferable given cloud storage pricing. The encoding of the data supports a richer set of query types beyond exact matching, including counting matches, logical OR matches, handling ambiguities, threshold queries, and concealing results from the decrypting server. Linear and logistic regression algorithms are used to analyze the data. The literature review discusses previous work on securely sharing genomic data and transforming protocols to ensure accountability without compromising privacy.
This document outlines a project that proposes a secure provenance transmission technique for sensor networks. The existing system transmits data and provenance over separate channels, but the proposed system requires only a single channel by encoding provenance in packet Bloom filters. This improves security by enabling detection of packet drop attacks, and provenance can be efficiently decoded and verified at the base station. The project describes the objectives, literature review on related work, advantages of the proposed system over existing approaches, and includes an architecture diagram.
This document proposes a novel Software Agent Based Forest Fire Detection (SAFFD) approach that uses software agents to disseminate data and make decisions about forest fire detection in a wireless sensor network. The SAFFD approach works in two phases: 1) a data collection phase where a mobile agent collects sensed data from sensor nodes and aggregates it, and 2) a risk analysis phase where an actor node analyzes the aggregated data to determine the fire risk level (green, yellow, or red) and take appropriate action. The implementation of SAFFD using Aglets mobile agents showed significant increases in the lifetime of the wireless sensor network by reducing the number of transmitted packets compared to a client-server approach.
Outlier Detection using Reverse Neares Neighbor for Unsupervised Dataijtsrd
Data mining has become one of the most popular and new technology that it has gained a lot of attention in the recent times and with the increase in the popularity and the usage there comes a lot of issues/problems with the usage one of it Outlier detection and maintaining the datasets without the expected patterns. To identify the difference between Outlier and normal behavior we use key assumption techniques. We Provide the reverse nearest neighbor technique. There is a connection between the hubs and antihubs, outliers and the present unsupervised detection methods. With the KNN method it will be possible to identify and influence the outlier and antihub methods on real life datasets and synthetic datasets. So, From this we provide the insight of the Reverse neighbor count on unsupervised outlier detection. V. V. R. Manoj | V. Aditya Rama Narayana | A. Bhargavi | A. Lakshmi Prasanna | Md. Aakhila Bhanu"Outlier Detection using Reverse Neares Neighbor for Unsupervised Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11406.pdf http://www.ijtsrd.com/computer-science/data-miining/11406/outlier-detection-using-reverse-neares-neighbor-for-unsupervised-data/v-v-r-manoj
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
Information Extraction (IE) is a key research area within the field of Wireless Sensor Networks (WSNs). It has been characterised in a variety of ways, ranging from the description of its purposes, to reasonably abstract models of its processes and components. There has been only a handful of papers addressing IE over mobile WSNs directly, these dealt with individual mobility related problems as the need arises. This paper is presented as a tutorial that takes the reader from the point of identifying data about a dynamic (mobile) real world problem, relating the data back to the world from which it was collected, and finally discovering what is in the data. It covers the entire process with special emphasis on how to exploit mobility in maximising information return from a mobile WSN. We present some challenges introduced by mobility on the IE process as well as its effects on the quality of the extracted information. Finally, we identify future research directions facing the development of efficient IE approaches for WSNs in the presence of mobility.
This document discusses improved K-means clustering techniques. It begins with an introduction to data mining and clustering. K-means clustering groups data objects into k clusters by minimizing distances between objects and cluster centers. However, K-means has limitations such as dependency on initialization. The document proposes a new clustering algorithm that uses an iterative relocation technique and distance determination approach to improve upon K-means clustering. It compares the computational complexity of K-means and K-medoids clustering algorithms.
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
This document summarizes a research paper on privacy-preserving data aggregation without a secure channel. It discusses two models for aggregating private data from multiple participants: one with an external aggregator and one where participants calculate the aggregation jointly. The paper proposes protocols for the aggregator or participants to calculate the sum and product of the private data in a way that preserves the privacy of each participant's data, without requiring secure pairwise channels between participants. The protocols are based on the computational hardness of solving certain cryptographic problems like the discrete logarithm problem.
Data mining is the knowledge discovery in databases and the gaol is to extract patterns and knowledge from
large amounts of data. The important term in data mining is text mining. Text mining extracts the quality
information highly from text. Statistical pattern learning is used to high quality information. High –quality in
text mining defines the combinations of relevance, novelty and interestingness. Tasks in text mining are text
categorization, text clustering, entity extraction and sentiment analysis. Applications of natural language
processing and analytical methods are highly preferred to turn
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
Wireless Sensor Network (WSN) consists of very large number of sensor nodes which are deployed close to the area which
is to be monitored so as to sense various environmental conditions. WSN is a data-driven network which produces large amount of data
and also sensor nodes are energy-limited devices and their energy consumption is mainly associated with data routing. Therefore it is
necessary to perform redundant data aggregation so as to save energy. In this work data aggregation is achieved with the help of two key
approaches namely Clustering approach and In-network data aggregation. These two approaches help to save energy and thereby
increasing the lifetime of the network. The proposed work has some key features like reliable cluster formation, high data aggregation
rate, priority of packets, minimized overhead, multiple routes, reduced energy consumption which enhance the network lifetime. The
performance evaluation of the proposed approach is carried out using Network Simulator- version 2
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
Knowledge discovery is carried out using the data mining techniques. Association rule mining,
classification and clustering operations are carried out under data mining. Clustering method is used to group up the
records based on the relevancy. Distance or similarity measures are used to estimate the transaction relationship.
Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for
analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy
preservation process.
Data values are allowed to authorized users using the access control models. Privacy Protection Mechanism
(PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. Accuracyconstrained privacy-preserving access control framework is used to manage access control in relational database. The
access control policies define selection predicates available to roles while the privacy requirement is to satisfy the kanonymity or l-diversity. Imprecision bound constraint is assigned for each selection predicate. k-anonymous
Partitioning with Imprecision Bounds (k-PIB) is used to estimate accuracy and privacy constraints. Role-based Access
Control (RBAC) allows defining permissions on objects based on roles in an organization. Top Down Selection
Mondrian (TDSM) algorithm is used for query workload-based anonymization. The Top Down Selection Mondrian
(TDSM) algorithm is constructed using greedy heuristics and kd-tree model. Query cuts are selected with minimum
bounds in Top-Down Heuristic 1 algorithm (TDH1). The query bounds are updated as the partitions are added to the
output in Top-Down Heuristic 2 algorithm (TDH2). The cost of reduced precision in the query results is used in TopDown Heuristic 3 algorithm (TDH3). Repartitioning algorithm is used to reduce the total imprecision for the queries.
The privacy preserved access privilege management scheme is enhanced to provide incremental mining
features. Data insert, delete and update operations are connected with the partition management mechanism. Cell level
access control is provided with differential privacy method. Dynamic role management model is integrated with the
access control policy mechanism for query predicates.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
This document proposes a lightweight scheme for securely transmitting provenance information in wireless sensor networks. It uses Bloom filters to encode provenance data within data packets in an efficient manner. The scheme allows a base station to extract and verify provenance upon receiving packets, and detect if packet drop attacks occurred. The proposed technique is evaluated analytically and experimentally, demonstrating its effectiveness and efficiency compared to traditional provenance security solutions.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes a research paper on applying wavelet transforms to differentially private data publishing. It discusses how traditional differentially private methods add noise proportional to query sensitivity, reducing accuracy. The proposed Privelet framework applies wavelet transforms before adding noise. This improves accuracy of range count queries by reducing noise variance to polylogarithmic in the number of tuples. It provides the theoretical underpinnings of Privelet and evaluates its empirical performance on real and synthetic datasets.
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Data aggregation in important issue in WSN’s. Because with the help of data aggregation; we are
reduce energy consumption in the network. In the Ad-hoc sensor network have the most challenging task
is to maintain a life time of the node. due to efficient data aggregation increase the life of the network. In
this paper, we are going to provide the information about the type of the network and which data
aggregation algorithm is best. In big scale sensor network, energy economical, data collection and query
distribution in most important.
Keywords — data aggregation; wireless sensor network
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
This document summarizes several data aggregation protocols for wireless sensor networks. It begins by introducing wireless sensor networks and describing the need for data aggregation to reduce energy consumption from transmission. It then categorizes data aggregation mechanisms as structure-free, structure-based (tree-based and cluster-based), and hybrid. Several tree-based protocols are summarized, including TAG, EADAT, AGIT, SRTSD, and PEDAP. Cluster-based protocols discussed include LEACH, PEGASIS, TEEN, APTEEN, and HEED. The document concludes by outlining routing challenges and design issues for data aggregation protocols.
This document reviews cluster-based data aggregation protocols in wireless sensor networks. It discusses how data aggregation helps increase energy efficiency and network lifetime by reducing redundancy. It categorizes data aggregation approaches into flat networks (event-driven or query-driven) and hierarchical networks (tree, chain, cluster, hybrid, multi-hop, grid based). It focuses on cluster-based protocols which form clusters of sensor nodes based on similarity and select cluster heads to collect and aggregate data locally before sending to the base station. Numerous cluster-based protocols are described, including LEACH, LEACH-C, PEGASIS, HEED, and TEEN.
Intrusion detection with Parameterized Methods for Wireless Sensor Networksrahulmonikasharma
Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two Adaboost based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.
A new clutering approach for anomaly intrusion detectionIJDKP
Recent advances in technology have made our work easier compare to earlier times. Computer network is
growing day by day but while discussing about the security of computers and networks it has always been a
major concerns for organizations varying from smaller to larger enterprises. It is true that organizations
are aware of the possible threats and attacks so they always prepare for the safer side but due to some
loopholes attackers are able to make attacks.
Intrusion detection is one of the major fields of research and researchers are trying to find new algorithms
for detecting intrusions. Clustering techniques of data mining is an interested area of research for detecting
possible intrusions and attacks. This paper presents a new clustering approach for anomaly intrusion
detection by using the approach of K-medoids method of clustering and its certain modifications. The
proposed algorithm is able to achieve high detection rate and overcomes the disadvantages of K-means
algorithm.
IRJET- Swift Retrieval of DNA Databases by Aggregating QueriesIRJET Journal
This document summarizes a research paper that proposes a new method for securely sharing and querying genomic DNA sequences stored in the cloud without violating privacy. The method builds on existing frameworks by offering deterministic results with zero error probability, and a scheme that is twice as fast but uses twice the storage space, which is preferable given cloud storage pricing. The encoding of the data supports a richer set of query types beyond exact matching, including counting matches, logical OR matches, handling ambiguities, threshold queries, and concealing results from the decrypting server. Linear and logistic regression algorithms are used to analyze the data. The literature review discusses previous work on securely sharing genomic data and transforming protocols to ensure accountability without compromising privacy.
This document outlines a project that proposes a secure provenance transmission technique for sensor networks. The existing system transmits data and provenance over separate channels, but the proposed system requires only a single channel by encoding provenance in packet Bloom filters. This improves security by enabling detection of packet drop attacks, and provenance can be efficiently decoded and verified at the base station. The project describes the objectives, literature review on related work, advantages of the proposed system over existing approaches, and includes an architecture diagram.
This document proposes a novel Software Agent Based Forest Fire Detection (SAFFD) approach that uses software agents to disseminate data and make decisions about forest fire detection in a wireless sensor network. The SAFFD approach works in two phases: 1) a data collection phase where a mobile agent collects sensed data from sensor nodes and aggregates it, and 2) a risk analysis phase where an actor node analyzes the aggregated data to determine the fire risk level (green, yellow, or red) and take appropriate action. The implementation of SAFFD using Aglets mobile agents showed significant increases in the lifetime of the wireless sensor network by reducing the number of transmitted packets compared to a client-server approach.
Outlier Detection using Reverse Neares Neighbor for Unsupervised Dataijtsrd
Data mining has become one of the most popular and new technology that it has gained a lot of attention in the recent times and with the increase in the popularity and the usage there comes a lot of issues/problems with the usage one of it Outlier detection and maintaining the datasets without the expected patterns. To identify the difference between Outlier and normal behavior we use key assumption techniques. We Provide the reverse nearest neighbor technique. There is a connection between the hubs and antihubs, outliers and the present unsupervised detection methods. With the KNN method it will be possible to identify and influence the outlier and antihub methods on real life datasets and synthetic datasets. So, From this we provide the insight of the Reverse neighbor count on unsupervised outlier detection. V. V. R. Manoj | V. Aditya Rama Narayana | A. Bhargavi | A. Lakshmi Prasanna | Md. Aakhila Bhanu"Outlier Detection using Reverse Neares Neighbor for Unsupervised Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11406.pdf http://www.ijtsrd.com/computer-science/data-miining/11406/outlier-detection-using-reverse-neares-neighbor-for-unsupervised-data/v-v-r-manoj
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
Information Extraction (IE) is a key research area within the field of Wireless Sensor Networks (WSNs). It has been characterised in a variety of ways, ranging from the description of its purposes, to reasonably abstract models of its processes and components. There has been only a handful of papers addressing IE over mobile WSNs directly, these dealt with individual mobility related problems as the need arises. This paper is presented as a tutorial that takes the reader from the point of identifying data about a dynamic (mobile) real world problem, relating the data back to the world from which it was collected, and finally discovering what is in the data. It covers the entire process with special emphasis on how to exploit mobility in maximising information return from a mobile WSN. We present some challenges introduced by mobility on the IE process as well as its effects on the quality of the extracted information. Finally, we identify future research directions facing the development of efficient IE approaches for WSNs in the presence of mobility.
This document discusses improved K-means clustering techniques. It begins with an introduction to data mining and clustering. K-means clustering groups data objects into k clusters by minimizing distances between objects and cluster centers. However, K-means has limitations such as dependency on initialization. The document proposes a new clustering algorithm that uses an iterative relocation technique and distance determination approach to improve upon K-means clustering. It compares the computational complexity of K-means and K-medoids clustering algorithms.
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
This document summarizes a research paper on privacy-preserving data aggregation without a secure channel. It discusses two models for aggregating private data from multiple participants: one with an external aggregator and one where participants calculate the aggregation jointly. The paper proposes protocols for the aggregator or participants to calculate the sum and product of the private data in a way that preserves the privacy of each participant's data, without requiring secure pairwise channels between participants. The protocols are based on the computational hardness of solving certain cryptographic problems like the discrete logarithm problem.
Data mining is the knowledge discovery in databases and the gaol is to extract patterns and knowledge from
large amounts of data. The important term in data mining is text mining. Text mining extracts the quality
information highly from text. Statistical pattern learning is used to high quality information. High –quality in
text mining defines the combinations of relevance, novelty and interestingness. Tasks in text mining are text
categorization, text clustering, entity extraction and sentiment analysis. Applications of natural language
processing and analytical methods are highly preferred to turn
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
Wireless Sensor Network (WSN) consists of very large number of sensor nodes which are deployed close to the area which
is to be monitored so as to sense various environmental conditions. WSN is a data-driven network which produces large amount of data
and also sensor nodes are energy-limited devices and their energy consumption is mainly associated with data routing. Therefore it is
necessary to perform redundant data aggregation so as to save energy. In this work data aggregation is achieved with the help of two key
approaches namely Clustering approach and In-network data aggregation. These two approaches help to save energy and thereby
increasing the lifetime of the network. The proposed work has some key features like reliable cluster formation, high data aggregation
rate, priority of packets, minimized overhead, multiple routes, reduced energy consumption which enhance the network lifetime. The
performance evaluation of the proposed approach is carried out using Network Simulator- version 2
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
Knowledge discovery is carried out using the data mining techniques. Association rule mining,
classification and clustering operations are carried out under data mining. Clustering method is used to group up the
records based on the relevancy. Distance or similarity measures are used to estimate the transaction relationship.
Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for
analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy
preservation process.
Data values are allowed to authorized users using the access control models. Privacy Protection Mechanism
(PPM) uses suppression and generalization of relational data to anonymize and satisfy privacy needs. Accuracyconstrained privacy-preserving access control framework is used to manage access control in relational database. The
access control policies define selection predicates available to roles while the privacy requirement is to satisfy the kanonymity or l-diversity. Imprecision bound constraint is assigned for each selection predicate. k-anonymous
Partitioning with Imprecision Bounds (k-PIB) is used to estimate accuracy and privacy constraints. Role-based Access
Control (RBAC) allows defining permissions on objects based on roles in an organization. Top Down Selection
Mondrian (TDSM) algorithm is used for query workload-based anonymization. The Top Down Selection Mondrian
(TDSM) algorithm is constructed using greedy heuristics and kd-tree model. Query cuts are selected with minimum
bounds in Top-Down Heuristic 1 algorithm (TDH1). The query bounds are updated as the partitions are added to the
output in Top-Down Heuristic 2 algorithm (TDH2). The cost of reduced precision in the query results is used in TopDown Heuristic 3 algorithm (TDH3). Repartitioning algorithm is used to reduce the total imprecision for the queries.
The privacy preserved access privilege management scheme is enhanced to provide incremental mining
features. Data insert, delete and update operations are connected with the partition management mechanism. Cell level
access control is provided with differential privacy method. Dynamic role management model is integrated with the
access control policy mechanism for query predicates.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
This document proposes a lightweight scheme for securely transmitting provenance information in wireless sensor networks. It uses Bloom filters to encode provenance data within data packets in an efficient manner. The scheme allows a base station to extract and verify provenance upon receiving packets, and detect if packet drop attacks occurred. The proposed technique is evaluated analytically and experimentally, demonstrating its effectiveness and efficiency compared to traditional provenance security solutions.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes a research paper on applying wavelet transforms to differentially private data publishing. It discusses how traditional differentially private methods add noise proportional to query sensitivity, reducing accuracy. The proposed Privelet framework applies wavelet transforms before adding noise. This improves accuracy of range count queries by reducing noise variance to polylogarithmic in the number of tuples. It provides the theoretical underpinnings of Privelet and evaluates its empirical performance on real and synthetic datasets.
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Data aggregation in important issue in WSN’s. Because with the help of data aggregation; we are
reduce energy consumption in the network. In the Ad-hoc sensor network have the most challenging task
is to maintain a life time of the node. due to efficient data aggregation increase the life of the network. In
this paper, we are going to provide the information about the type of the network and which data
aggregation algorithm is best. In big scale sensor network, energy economical, data collection and query
distribution in most important.
Keywords — data aggregation; wireless sensor network
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
With limited amount of energy, nodes are powered by
batteries in wireless networks. Increasing the lif
e
span of the network and reducing the usage of energ
y are two severe problems in Wireless Sensor
Networks. A small number of energy utilization path
algorithms like minimum spanning tree reduces tota
l
energy consumption of a Wireless Sensor Network, ho
wever very heavy load of sending data packets on
many key nodes is used with the intention that the
nodes quickly consumes battery energy, by raising t
he
life span of the network reduced. Our proposal work
aimed on presenting an Energy Conserved Fast and
Secure Data Aggregation Scheme for WSN in time and
security logic occurrence data collection
application. To begin with, initially the goal is m
ade on energy preservation of sensed data gathering
from
event identified sensor nodes to destination. Inven
tion is finished on Energy Efficient Utilization Pa
th
Algorithm (EEUPA), to extend the lifespan by proces
sing the collecting series with path mediators
depending on gene characteristics sequencing of nod
e energy drain rate, energy consumption rate, and
message overhead together with extended network lif
e span. Additionally, a mathematical programming
technique is designed to improve the lifespan of th
e network. Simulation experiments carried out among
different relating conditions of wireless sensor ne
twork by different path algorithms to analyze the
efficiency and effectiveness of planned Efficient E
nergy Utilization Path Algorithm in wireless sensor
network (EEUPA)
This document summarizes several data aggregation protocols for wireless sensor networks. It begins by introducing wireless sensor networks and describing the need for data aggregation to reduce energy consumption from transmission. It then categorizes data aggregation mechanisms as structure-free, structure-based (tree-based and cluster-based), and hybrid. Several tree-based protocols are summarized, including TAG, EADAT, AGIT, SRTSD, and PEDAP. Cluster-based protocols discussed include LEACH, PEGASIS, TEEN, APTEEN, and HEED. The document concludes by outlining routing challenges and design issues for data aggregation protocols.
This document reviews cluster-based data aggregation protocols in wireless sensor networks. It discusses how data aggregation helps increase energy efficiency and network lifetime by reducing redundancy. It categorizes data aggregation approaches into flat networks (event-driven or query-driven) and hierarchical networks (tree, chain, cluster, hybrid, multi-hop, grid based). It focuses on cluster-based protocols which form clusters of sensor nodes based on similarity and select cluster heads to collect and aggregate data locally before sending to the base station. Numerous cluster-based protocols are described, including LEACH, LEACH-C, PEGASIS, HEED, and TEEN.
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at intermediate nodes enrooted to the base station. Most existing aggregation algorithms and systems do not include any provisions for security, and consequently these systems are vulnerable to a wide variety of attacks. In particular, compromised nodes can be used to inject false data that leads to incorrect aggregates being computed at the base station. We discuss the security vulnerabilities of data aggregation systems, and present a survey of robust and secure aggregation protocols that are resilient to false data injection attacks. The Proposed SHIA Algorithm builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure but also efficient WSN data collection over a series of aggregations.
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...IJAEMSJORNAL
This document proposes a new routing algorithm called HCIFR for wireless sensor networks that combines hierarchical clustering and iterative filtering. It aims to improve energy efficiency, support dynamic routing during link failures, and provide secure data aggregation. The algorithm initially forms clusters using neighborhood information. Clusterheads, deputy clusterheads, and members are selected. Cluster members transmit data to clusterheads using TDMA. Clusterheads aggregate data using iterative filtering to identify malicious nodes. Deputy clusterheads route aggregated data to the base station. Simulation results show HCIFR performs better than M-LEACH in terms of average energy consumption, throughput, packet drops, and packet delivery.
This document proposes an energy efficient three-level model for query optimization in wireless sensor networks (WSNs). At the three levels are: base station, cluster heads, and sensor nodes. The base station maintains metadata about cluster heads and sensor nodes. When a query is received, it first checks if the result is cached. If not, it checks the status of cluster heads and selects a new cluster head if needed. The query is then disseminated to cluster heads using a modified Bellman-Ford algorithm. Cluster heads aggregate data from relevant sensor nodes and send the result to the base station. This model aims to minimize communication costs during query processing in WSNs.
Secure authentication and data aggregation scheme for routing packets in wire...IJECEIAES
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model.
Performance evaluation of data filtering approach in wireless sensor networks...ijmnct
Wireless Sensor Network is a field of research which is viable in every application area like security
services, patient care, traffic regulations, habitat monitoring and so on. The resource limitation of small
sized tiny nodes has always been an issue in wireless sensor networks. Various techniques for improving
network lifetime have been proposed in the past. Now the attention has been shifted towards heterogeneous
networks rather than having homogeneous sensor nodes in a network. The concept of partial mobility has
also been suggested for network longevity. In all the major proposals; clustering and data aggregation in
heterogeneous networks has played an integral role. This paper contributes towards a new concept of
clustering and data filtering in wireless sensor networks. In this paper we have compared voronoi based
ant systems with standard LEACH-C algorithm and MTWSW with TWSW algorithm. Both the techniques
have been applied in heterogeneous wireless sensor networks. This approach is applicable both for critical
as well as for non-critical applications in wireless sensor networks. Both the approaches presented in this
paper outperform LEACH-C and TWSW in terms of energy efficiency and shows promising results for
future work.
This document summarizes a research paper that proposes a methodology to improve source location privacy preservation in wireless sensor networks. The paper introduces the concept of "interval indistinguishability" to quantify anonymity. It maps the problem of breaching source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. The paper proposes modeling anonymity, describes the network and adversarial models, and reviews related work before introducing its methodology. The methodology aims to address issues with existing solutions and practically prove the efficiency of improving source location privacy through a modified statistical framework.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
Wireless sensor network is a set of tiny elements i.e. sensors. WSN is used in the field of Health Monitoring,
Civil Construction, Military Applications and Agricultural etc., for monitoring environmental parameters.
The WSN is having the challenges like less processing power, less memory, less bandwidth and battery
powered. The data monitored through the sensors would be sent to the sink for data processing. The data
sent from sensor node can be controlled for saving the energy, as maximum energy is consumed for
transmission of data and it is not possible to replace the batteries frequently. In this work threshold based
and adaptive threshold based data reduction techniques with energy efficient shortest path are used for
minimizing the energy of sensor node and the network. Adaptive approach saves energy and reduce data by
30% to 40% as compared to threshold based approach
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
ABSTRACT
Wireless sensor network is a set of tiny elements i.e. sensors. WSN is used in the field of Health Monitoring, Civil Construction, Military Applications and Agricultural etc., for monitoring environmental parameters.The WSN is having the challenges like less processing power, less memory, less bandwidth and battery
powered. The data monitored through the sensors would be sent to the sink for data processing. The data sent from sensor node can be controlled for saving the energy, as maximum energy is consumed for transmission of data and it is not possible to replace the batteries frequently. In this work threshold based and adaptive threshold based data reduction techniques with energy efficient shortest path are used for minimizing the energy of sensor node and the network. Adaptive approach saves energy and reduce data by 30% to 40% as compared to threshold based approach.
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
The compressive detecting based information accumulation accomplishes with high exactness in information recuperation from less inspection which is available in sensor nodes. In this manner, the existing methods available in the literature diminish the information gathering cost and delays the existence cycle of WSNs. In this paper, a strong achievable security model for sensor network applications was initially proposed. At that point, a secure data collection conspire was displayed based on compressive detecting, which improves the information protection by the asymmetric semi-homomorphic encryption scheme, and decreases the calculation cost by inadequate compressive grid. In this case, particularly the asymmetric mechanism decreases the trouble of mystery key circulation and administration. The proposed homomorphic encryption permits the in-arrange accumulation in cipher domain, and in this manner improves the security and accomplishes the adjustment in system stack. Further, this paper focuses on estimating various network performances such as the calculation cost and correspondence cost, which remunerates the expanding cost caused by the homomorphic encryption. A real time validation on the proposed encryption scheme using AVISPA was additionally performed and the results are satisfactory.
Novel framework of retaining maximum data quality and energy efficiency in re...IJECEIAES
There are various unseen and unpredictable networking states in Wireless Sensor Network (WSN) that adversely affect the aggregated data quality. After reviewing the existing approaches of data quality in WSN, it was found that the solutions are quite symptomatic and they are applicable only in a static environment; however their successful applicability on dynamic and upcoming reconfigurable network is still a big question. Moreover, data quality directly affects energy conservation among the nodes. Therefore, the proposed system introduces a simple and novel framework that jointly addresses the data quality and energy efficiency using probability-based design approach. Using a simplified analytical methodology, the proposed system offers solution in the form of selection transmission of an aggergated data on the basis of message priority in order to offer higher data utilization factor. The study outcome shows proposed system offers a good balance between data quality and energy efficiency in contrast to existing system.
This document provides a literature review of various methods proposed by researchers to improve energy efficiency and security in wireless sensor networks (WSNs). It summarizes several key energy efficient routing protocols like LEACH, PEGASIS and TEEN, as well as security threats like denial of service attacks, wormhole attacks, and Sybil attacks. The document reviews several studies that have developed algorithms and schemes to reduce energy consumption through techniques like dynamic clustering, mobile agent clustering, and randomized routing. It also discusses schemes to prevent security issues like false data injection and improve data authentication. The conclusion states that future work needs to focus on improving battery power and providing better fault tolerance and protection from severe security threats in WSNs.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Communication Cost Reduction by Data Aggregation: A SurveyIJMTST Journal
Wireless Sensor Networks have gained wide popularity in the recent years for its high-ranking applications such as remote environment monitoring, target tracking, safety-critical monitoring etc. However Wireless Sensor Networks face many constraints like low computational power, small storage, and limited energy resources. One of the important issues in wireless sensor network is to increase the network lifetime to keep the network operational as long as possible. In this survey paper, we provide a comprehensive review of the existing literature on techniques and protocols for data aggregation to reduce communication cost and increase network lifetime in wireless sensor networks.
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...ijtsrd
A Wireless Sensor Network WSN is an autonomous, self organizing, and self configuring network with the capability of speedy deployment anywhere. Internet of Things IoT nodes are use cloud storage to collect information from sensors and transfer it to other IoT nodes or networks via cloud services. Energy efficient communication is likely one of the main conversation factors in WSN, so efficient routing is critical to make use of full power consumption and enhance the network performance. This research proposes an Energy Aware Cluster based Wireless Sensor EACW routing protocol that optimizes route selection by clustering of nodes in a Wireless Sensor IoT network. However, one of the biggest problems to be handled is the energy wastage in transport. Limited energy is one of the prime concerns in WSN IoT and efficient routing is the primary focus to improve energy utilization, which increases the network performance. LEACH is an energy based protocol that works on a cluster based mechanism to make use of the energy efficiently. In this research, we compare the performance of the LEACH protocol with that of the reactive on demand protocol in order to make the most of the networks energy constraints. The proposed scheme shows that nodes have at most imprecise state information, mainly under strong link establishment. EACW routing selects optimizes routes higher energy base route resolution , generates clusters, and has power measurement of each cluster member and cluster head. LEACH chooses that specific node for data transmission so that work raises the reliability of communication. The efficiency of the proposed EACW protocol is compared with CBRW and the performance matrices like live nodes, throughput, overhead and CH and CB information. Apurva Anand | Dr. Sadhna K. Mishra "An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless Sensor-IoT Network (EACW)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52292.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/52292/an-energy-aware-routing-to-optimize-route-selection-in-cluster-based-wireless-sensoriot-network-eacw/apurva-anand
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
In wireless sensor network (WSN) there are two main problems in employing conventional compression
techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression
ratio, but also depends on the computational and communication overheads. In Compressive Data
Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying
compression technique without losing any information of complete data. In our previous work, we have
developed an adaptive traffic aware aggregation technique in which the aggregation technique can be
changed into structured and structure-free adaptively, depending on the load status of the traffic. In this
paper, as an extension to our previous work, we provide a cost effective compressive data gathering
technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive
data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network
lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay
Similar to Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Networks (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Networks (Madhav Ingle)
5163
cluster head or aggregator performs data aggregation and in case of tree based data aggregation protocol the
intermediate parent node near to the sink performs data aggregation. Sensor nodes have limited computation
power, battery, less storage capacity; because of all these limitations, there is a need of saving such resources
by reducing the amount of data transmission. This can be done by using the efficient technique called data
aggregation. Facts from numerous sensors are aggregated toward one node called as aggregator, hence
communicates aggregated data with base station.
Iterative filtering (IF) is used for data aggregation and trust assessment. The trustworthiness of each
sensor is estimated in accordance with the span of sensor readings from the correct estimate values got in the
antecedent turn of iteration as in the alacrity of aggregation of all sensors statistics.
Corresponding data aggregation is habitually a charged average. Sensor statistics are significantly
differing from such estimate. So the sensors are considered as less trustworthiness and also in the aggregation
process, their statistics are bestowed a minor weight in current turn of iteration.
The sensors knobs are partition into sever clusters, and every cluster possesses a cluster head that
comports an aggregator. Sporadically data is amassed and aggregated by the aggregator.
As per as the main motive of security services in WSNs is to precaution in the system and resources
from attacks and misbehavior. The security in the form of data confidentiality, data integrity, data
authentication, data freshness, robustness, data availability, access control, nonrepudiation, forward secrecy,
backward secrecy is important for WSN.
This paper surveys the literature to study various factors of wireless sensor network for iterative
filtering. Around twenty three papers are considered for survey. The parameters from each paper are
identified and drawback of each author’s work is highlighted in the survey. The details of the survey are
summarized in a table. With the help of the literature and drawback described from each paper a new
approach for trustworthiness of sensors and value of the reputation vector is proposed.
The remaining journal is orchestrated as here. The section II describes the detailed literature survey.
Section III tenders gap analysis. Section IV describes proposed work. At last, the journal is concluded in
section V.
2. RELATED WORK
This section of the paper gives detailed literature survey. The recent papers including the techniques
of data aggregation are surveyed and a detailed comparison of surveyed literature is given at the end of this
section.
Lathies Bhasker have considered the parameters including Fitness function, Cluster function,
distribution item (α), transmission cost item (β) and energy item (γ) [1]. The techniques used are Data
Aggregator (DAG), Genetic algorithm. The main problem with the author is improvement required in
Estimation of metrics, Energy, transmission and distribution.
Hevin, Rajesh Dhasian, Paramasivan Balasubramanian discussed Energy consumption, Cost
reduction, Security, Accuracy, Throughput and other parameters [2]. The algorithms considered are
simulated annealing calculus for data aggregation, Multi-path data transmission. The problem with the paper
is number of sleep nodes arenot considered so scope for energy improvement.
Parli B. Hari, Dr. Shailendra Narayan Singh discussed Data aggregation, scalability, power uses,
overhead, and quality of service [3]. The techniques used are secure routing protocols, data aggregation
protocols, intrusion detection, cryptography algorithms. The problem is that the algorithms to provide
security are not described in detail.
M. Rezvani, A. Ignjatovic, E. Bertino, S. Jha, author proposed an enhancement for iterative straining
methods by furnishing an leading estimation for analogous algorithms that develops themselves not just
collusion persistent, but furthermore precise and swifter approaching [4]. The problem with paper is data
aggregator node is not compromised.
S. Krithika, D.J. Preshiya discussed on enhanced info aggregation style in WSN toward
compromised node [5]. Also discussed challenge to data aggregation is yet to secure aggregative information
from conciliation node attacks and revealing all over aggregating technique to acquire precise aggregative
consequences. The problem with the paper is the cluster based network, network lifespan is less.
A Secure Data Aggregation scheme recommends by H.S.Annapurna, M.Siddappa which works with
Fault Tolerance for Wireless Sensor Networks that offers fault tolerance and mutually end to end privacy
throughout info aggregation [6]. In this paper, researcher suggests practice for secure information
communication by public cryptography in sensor network. The use of AND & OR operation for sharing
secure message & reconstructions is problematic.
V. Vaidehi, R. Kayalvizhi and N. C. Sekar proposes a new pattern to secure the process of data
aggregation by as long as a light-weight security system called Combinatorial Key Distribution (CKD)
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5162 - 5168
5164
mechanism that eats a reduced amount of power and its performance is enhanced using hashes of data that is
directed through the network [7]. The proposed system reduces the power consumption and maximizes
thesecureness of data in the wireless sensor network. The techniques used are location dependent.
P. B.Gaikwad, M. R. Dhage done the survey on data aggregation in secured way for wireless sensor
networks. Data aggregation methods can efficiently support to decrease consumption of energy by removing
redundant data travelling back to the sink [8]. There are numerous security concerns which contain data
integrity, data confidentiality, availability, and freshness in data aggregation that become serious when WSN
is installed in an unfriendly environment where sensors drop prone to node failures and compromised by
rival. Many algorithmsuse message authentications code & uses symmetric key encryption.
H. Hayouni and M. Hamdi present a survey of Homomorphic encryption properties which used by
some secure data aggregation approaches, and then they associated them grounded on certain principles [9].
Lastly, they present and deliberate certain vulnerable topics that want to be observed in upcoming studies
indirection to advance the safety of data aggregation in wireless sensor networks. The problem is no ultimate
strategy which may encounter the security demands toward data aggregation and settle entire dilemmas
evoked by the exceptional properties of WSNs.
A Secure Approximate Data Aggregation (SADA) schemes intends by authros S. Prakash T,
Venugopal, G Prathima E, L M Patnaik, K R, S SIyengar, in that outline are made using primitive
polynomial and Message Authentication Codes (MACs) are transferred alongside with the outline to
guarantee truthfulness [10]. SADA delivers data freshness and truthfulness at a communication cost of O
(1).The problemwith the paper is author not worked for aggregator node.
P. R. Vamsi and K. Kant tender a structure for Wireless Sensor Networks (WSNs) using TMS at
node point and IDS at Base Station (BS) side for secure data aggregation [11]. Using trust credits each node
in the network evaluates the behaviour of its neighbors and enforces the network operation to illustrate
cluster head selection, briefing to the BS and data aggregation. Then, BS examines the acknowledged
information using IDS and accounts knowledge about mischief you events back to nodes in the network.IDS
often produce false report of malicious activity is a problem.
S. k. Md. Rahman, M. A. Hossain, M. Mahmud, M. I. Chaudry, A. Almogren, M. Alnuem, A.
Alamri designed resolution grounded on a cryptographic mode [12]. Aggregator can scoop oblivious data at
the aggregation level makes key security challenge for data aggregation in WSN. Thus, this level of
aggregation is susceptible to attacks by intruders. So, the present proposals do not outfit the security grants
which emerge into dynamic node WSN. Hence in this paper authors proposed a system to tackle the security
issues in dynamic node of WSN called it lightweight secure data aggregation technique. Security analysis and
Energy consumption is not provided is the problem with the paper.
S. S. Ranjani, Dr. S. Radhakrishnan and Dr. C.Thangaraj authors modify their Energy efficient
Cluster Based Data Aggregation (ECBDA) system to deliver secure data transmission [13]. Subsequently,
sensors nodes are low powered immature; it is not feasible to put on typical cryptography techniques. Cluster
head achieves data aggregation and Bayesian fusion algorithm to allow security. Trust is guiding association
amongst two sensor nodes. Through inspection there liability of a node, they can allow secure
communication. Bayesian fusion algorithm analyzes the trust possibility of a sensor based on the
performance of the node.BFA discussed in the paper is Inflexible to sensor changes and the workload is
concentrated at a single point. It is not suitable for large-range network.
The trust of the nodes is premeditated by N. S. Renubala and K.S.Dhanalakshmi, they aimed scheme
utilizes the Bio-inspired Energy Efficient-Cluster (BEE-C) protocol and fuzzy logic [14]. The black hole and
flooding attack discovered by suggested practice and it also banishes this assault. The credit rates are
associated along with the limit. The credit rate beyond the limit is deliberated as trusted nodes and data
packets are perished over the node. The credit rate inferior than the limit value is labeled as accredited
untrusted node which is then eliminated. The projected manner delivers reduced delay pause, expensive
overhead, and packet waste with improved packet transfer ratio than the present game theory, Fuzzy with
trust (LEACH). Disadvantage of practicing fuzzy logic is rapidly budding extent of the rule-base and
mixture.
K. Shim, C. Park, authors propose a real-world SDA, Sen-SDA, founded on preservative
Homomorphic encryption scheme, an identity-based signature scheme, and a batch confirmation method with
an algorithm for filtering injected false data [15]. Packet drop attacks are not handled in this paper and it is
extra overhead.
M. Thangaraj, P. P. Ponmalar proposed Secured Hybrid (GA-ABC) Data Aggregation Tree (SHDT)
is being raising the vitality proficiency of a system. The exploitation of former intellectual strategies as an
alternative of ABC is trouble [16].
D Manjaiah, M. Bharathi and B.P. Vijaya Kumar precedes a line toward deliberates the handling of
multi-dimensional key distribution (MDKD) proposal for safeguarding the connection surrounded by nodes
4. Int J Elec & Comp Eng ISSN: 2088-8708
Improving IF Algorithm for Data Aggregation Techniques in Wireless Sensor Networks (Madhav Ingle)
5165
approachable in the WSN system [17]. The organization is concentrated extra safe through playing node-to-
node verification system by altering elliptical curve cryptography as well as Elgamal signature design. Lastly,
the advised design is assessed founded on manipulation period in secondhand packet data deliverance ratio to
catch the aimed protection system is extremely lucrative in nature. The problem is that ECC algorithm isomer
complex as well as more difficult for implement Elgamal Signature algorithm is rarely used in practice.
R. K. Kodali proposes a key management technique, among its reduced resource costs, which is
extremely suitable tobe used in hierarchical WSN applications [18]. Together Identity based key management
(IBK) and probabilistic key pre-distribution systems are formed employ toward altered hierarchical layers.
Designed key management approach is applied adopting IRIS WSN nodes. The main problem is insecurity
against Quantum Computer attack.
Karuna Babber and Rajneesh Randhva propose clustering algorithm with energy efficiency and
QOS in form of security and reliability [19]. Uniform cluster and centrally located node as a cluster head
considered. The author has not considered cluster head failure.
Bharath K. Samanthula considered secure data aggregation mode for MIN and MAX encryption
approaches of security aspects [20]. In this paper, reducing size of encoding matrix can be improved.
Ajay. K. Talele author surveyed in this paper about routing protocol and design issues in wireless
sensor network [21]. Also overviewed of shortest path tree data aggregation algorithm, DAG based in ss
NetworkAlgorithm and ANT Colony Algorithm. DRINA algorithm proposed with delay and latency
compare to above in various aspects. Main focus to increase Network Lifetime but due to delay may in
increase at the transmission time.
PVRD Prasad Rao, K.Raghava Rao author proposes impending sensor mechanism pleas are
explored [22]. Developed RLS Algorithm for localization for WSN in class of security. Main problem is that
more focus on localization dependency. Synchronization and still chance of recursive estimation can be
improved.
Deepak C. Mehetre, S. Emalda Roslin and Sanjeev J. Wagh author proposes node scheduling
control Algorithm in distributed manner; nodes functioned regionally over attentive different surroundings
[23]. It consumes less energy consumption and consistency in CA based node scheduling. Authors focused
on increasing Network Lifetime, energy consumption but in this case delay gets increased.
In this section a detailed survey is given by the authors. The various parameters including cost
reduction, power uses, overhead, fault tolerance, data confidentiality, hierarchical model, attack model,
network model, dynamic node topology, key management, trust probability, end to end delay, battery
residual capacity, routing tree cost etc.The summary of the surveyed papers is given in the Table 1.
Table 1. Summary of the surveyed papers
Sr. No. Author name Parameters Techniques/Algorithms Disadvantages
1 Lathies Bhasker[1] Fitness function, Cluster
function, distribution item(α),
transmission cost item (β),
energy item (γ)
Data Aggregator(DAG) Genetic
algorithm
Estimation of metrics
Energy, transmission
and distribution can be
improved
2 Paramasivan
Balasubramanian,He
vin RajeshDhasian,[
2]
Energy consumption,
Security, Accuracy, Cost
reduction, Throughput and
other parameter
Algorithm of Simulated
annealing for data aggregation in
WSN
Multi-path data transmission
Number of sleep node
not considered so scope
for energy improvement
3 Dr. Shailendra
Narayan Singh and
Parli B. Hari, [3]
Data aggregation, scalability,
power uses, overhead, quality
of service
Secure protocols of routing
division, data aggregation
protocols, cryptography
algorithms and intrusion
detection
The algorithms to
provide security are not
described in details
4 Ignjatovic
,M.Rezvani,A.,
E.Bertino and S.Jha
[4]
Network Model, Iterative
Filtering in Reputation
Systems, Adversary Model,
Collusion Attack Scenario
IF algorithm for Data
Aggregation.
Assumed data
aggregator node is not
compromised.
5 S. Krithika, D.J.
Preshiya [5]
Hybrid ,Tree ,Chain ,Grid and
Cluster Based
Iterative filtering algorithm
approach.
In cluster based
network, network
lifespan is less.
6 H.S. Annapurna,
M.Siddappa [6]
Fault tolerance, Data
confidentiality
Secret sharing algorithm and
mask designing technique
Used AND & OR
operation for sharing
secure message &
reconstructions
7 V. Vaidehi, R.
Kayalvizhi and N.
C.Sekar [7]
Exclusion Basis System
(EBS)
The hashing method
Location-aware Combinatorial
Key
Distribution (CKD)” algorithm
Location dependent
8 P. B. Gaikwad, M.
R.Dhage[8]
Single Aggregator Scheme
Multiple Aggregator Scheme
SIA, SDA, TAG, WDA Many algorithms use
message authentication
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5162 - 5168
5166
Table 1. Summary of the surveyed papers
Sr. No. Author name Parameters Techniques/Algorithms Disadvantages
code & uses symmetric
key encryption.
9 H. Hayouni and M.
Hamdi [9]
IHCA, EIRDA, RCDA, SA-
SPKC, FESA, SDA-HP,
SAHE, SKBH
Homomorphic encryption
protocols
no exemplary plot
which can suitable
security warnings as
data aggregation and
perseverance entire
dilemmas generated
though the certain
peculiarities of WSNs
10 Venugopal K R and
S. Prakash T, [10]
Network Model
Attack Model
Secure Approximate Data
Aggregation Algorithm, PCSA
supported algorithm for
procreating summary
Not worked for
aggregator node.
11 P. R.Vamsi and K.
Kant [11]
Hierarchical Model,
Confidentiality, Integrity,
Authentication
Secure DA, using TMS and IDS IDS often produce false
report of malicious
activity
12 S. k. Md. Rahman,
M. A. Hossain, M.
Mahmud [12]
Dynamic node topology, Key
management
Secure DA based on IBE Pairing
based cryptography, Chinese
Remainder theorem
Security analysis and
Energy consumption is
not provided
13 S. S.Ranjani, Dr. S.
Radhakrishnan and
Dr. C.Thangaraj [13]
Trust Probability, Energy
Dissipation, Communication
Overhead
Energy efficient, Cluster Based
DA (ECBDA), Bayesian fusion
algorithm
BFA is Inflexible to
sensor changes and the
workload is
concentrated at a single
point. It is not suitable
for large-range networks
14 Consistency, Lasting
Energy, Buffer
habitation, Packet
production Rate,
swiftness
Consistency, Lasting Energy,
Buffer habitation, Packet
production Rate, swiftness
A fuzzy logic legged credit
estimation plan Bio-divine
Energy competent-Cluster
(BEE-C) protocol
Shortcoming of
practicing fuzzy logic is
the rapidly flourishing
volume of rule-basis
and combination
15 K.Shimand, C. Park
[15]
Heterogeneous clustering,
Confidentiality,
Authentication
A realistic protected DA idea.
Sen-SDA Additive
Homomorphic
Encryption design, An identity-
based signature idea A batch
confirmation
Packet drop attacks are
not handled.Generate
extra overhead
16 M.Thangaraj, P.P.
Ponmalar [16]
Energy Consumption, End to
End Delay, Packet Delivery
Rate
Battery residual capacity
Geneticalgorithmic program
(GA)
Secured Hybrid (GA-ABC) Data
Aggregation Tree (SHDT)
Exercising other
intelligent algorithms
instead of ABC
17 M. A. Bharathi, B.P.
Vijaya Kumar and D
H Manjaiah [17]
Confidentiality, Packet
delivery ratio, Processing
Time
Multi-dimensionalkey
distribution (MDKD) idea
Elliptical curve
cryptography , Elgamal
signature idea
ECC algorithm is more
complex and more
difficult to implement
Elgamal Signature
algorithm is rarely used
in practice
18 R. K.Kodali [18] Energy Consumption,
scalability,
Integrity
Identity basedkey management
(IBK) Hashing Algorithm
Idea of Probabilistic key pre-
distribution
Insecure against
Quantum Computer
attack
19 KarunaBabber and
Rajneesh
Randhva[19]
Initial energy of node, Energy
Spent on Data Aggregation,
Electronics Energy, Packet
Size, Number Of Nodes
Energy Efficient Uniform
Clustering Algorithm
Sensor Node May reside
any location , due to
uniformclustering
technique, few node
may be discarded or
cluster head may fail
20 Bharath K.
Samanthula[20]
Encryption Time, Energy
Consumption
Encryption scheme, Data
Aggregation Algorithm with
MIN and MAX
Still Chance of
Reduction in Size
encoding matrix using
appropriate size
reduction technique and
Heuristics
21 Ajay. K. Talele[21] Packet Delivery Rate, Packet
Delivery Rate, Efficiency,
Routing tree cost, Loss of
aggregated datadelay, latency.
Shortest path tree algorithm,
Centre at Nearest Source
Algorithm, Greedy Incremental
Tree Algorithm, DAG based In
NetworkAggregation, OPAG,
Ant Colony Algorithm
More Focus to increase
Network existence but
yet affect more
transmission delay