Volume 2, Issue 6 - IJIRTM
November - December (2018)
Impact Factor: 5.86 | Volume 9 | Issue 6
A Review on Cooperative Multicast Routing in Mobile Ad-hoc Network
π₯ Babloo, Jitendra Mishra
π Abstract : Multicast is a dissemination technique of paramount importance in wireless ad hoc networks. The multicast scheme is widely used within routing protocols by a wide range of wireless ad hoc networks such as mobile ad hoc networks, vehicular ad hoc networks, and wireless sensor networks, and used to spread emergency messages in critical scenarios after a disaster scenario and/or accidents. In this paper we present the study about the cooperative multicasting which focuses on the one to many communications in mobile ad-hoc network using various protocols.
π Keywords :οΈ Mobile ad-hoc networks, Multicasting, wireless sensor networks, Protocol, wireless mobile network.
Reduce Energy Consumption and Improve Performance in Wireless Network Control System
π₯ Prabha Patel, Jitendra Mishra
π Abstract : The communication system design for a WNCS requires guaranteeing the performance and stability of control system, with the limited battery resources of sensor nodes, despite the unreliability of wireless transmissions and delay resulting from packet transmission and shared wireless medium. The key parameters that need to be considered by both control and communication systems are the packet error probability, delay requirement and sampling period of the sensor nodes in the network. In this paper we proposed a new model for the wireless network controlled system and improve the performance of network using enhancement on performance parameter.
π Keywords :οΈ Wireless sensor-actuator networks, Wireless networked control systems, OFE, USR, SFDM.
A Review on Robust Strategy for Scale Free in Wireless Sensor Network
π₯ Yogendra Mishra, Jitendra Mishra
π Abstract : Sharing the infrastructure of wireless sensor networks (WSNs) for achieving concurrent requests becomes a trend nowadays, where a relatively complex request should be satisfied through aggregating complementary functionalities provided by contiguous sensor nodes contained in a certain network region. A key issue in wireless sensor network applications is how to accurately detect anomalies in an unstable environment and determine whether an event has occurred. This instability includes the harsh environment, node energy insufficiency, hardware and software breakdown, etc. In this paper we presents the literature survey for the robust wireless sensor networks.
π Keywords :οΈ Wireless sensor networks, Internet of Things, Fault detection, Distributed fault detection, Mobile ad-hoc networks.
Performance Analysis of Opportunistic Cooperation Schemes in Cognitive Radio based WSN
π₯ Chandra Kumar Kachhwaha, Jitendra Mishra
π Abstract : Driven by consumersβ increasing interest in wireless services, demand for radio spectrum has increased dramatically. Opportunistic unlicensed access to the (temporarily) unused frequency bands across the licensed radio spectrum is currently being investigated as a means to mitigate the spectrum scarcity. Such opportunistic access calls for the implementation of safeguards so that the ongoing licensed operations are not interfered with. This paper demonstrated that cooperative diversity provides an effective approach to improve the transmission performance of the secondary user while ensuring the QoS of the primary user, and improve the value of performance parameter like throughput, reduce end to end delay etc.
π Keywords :οΈ Cognitive radio, Spectrum sensing, Throughput, End to end delay.
Enhance the Performance of Vehicular Node on MAC Layer in MANET
π₯ Rohit Rajppot, Rachana Dubey
π Abstract : Vehicular Ad Hoc Network (VANET) is a form of Mobile Ad Hoc Networks (MANET). VANETs provide us with the infrastructure for developing new systems to enhance driversβ and passengersβ safety and comfort. VANETs are distributed self organizing networks formed between moving vehicles equipped with wireless communication devices. This type of networks is developed as part of the Intelligent Transportation Systems (ITS) to bring significant improvement to the transportation systems performance. One of the main goals of the ITS is to improve safety on the roads, and reduce traffic congestion, waiting times, and fuel consumptions. In this paper we present the new modified MAC layer protocol for the vehicular ad-hoc network and improve the results for the vehicular ad-hoc network.
π Keywords :οΈ Vehicular Ad-hoc Network, Data Link Layer, V2V, DSRC, IEEE.
Secure and Energy Efficient Spectrum Sensing for Cognitive Radio Sensor Network
π₯ Shujaat Khan, Jitendra Mishra
π Abstract : Wireless sensor network (WSN) has emerged as one of the most promising technologies for the future. This has been enabled by advances in technology and availability of small, inexpensive, and smart sensors resulting in cost effective and easily deployable WSNs. Thus, the next generation of wireless sensor networks is the cognitive wireless sensor networks (CWSNs). Cognitive radio has been proposed as a promising technology to resolve the spectrum scarcity problem by dynamically exploiting underutilized spectrum bands. Wireless sensor networks operating in the license free spectrum suffer from uncontrolled interference as those spectrum bands become increasingly crowded. With the rapid development of cognitive radio technology, increasing attention has been paid to securing spectrum sensing against SSDF attacks. In this article we proposed a new method for the attack detection in cognitive radio sensor network and improve the performance of system using accuracy, attack probability and detection speed evaluation parameters etc.
π Keywords :οΈ Cognitive Radio, Cognitive Radio Sensor Networks, SSDF, Attack, Spectrum sensing.
A Review on Data Mining Techniques for Network Based Intrusion Detection System
π₯
π Abstract : Data mining techniques have been successfully applied in the fields including marketing, manufacturing process control, fraud detection, and network management. Over the past two decade years, a growing number of research projects have applied data mining to intrusion detection. In this paper we presents a survey for the intrusion detection using various clustering and classification techniques, in addition also focus on some evolutionary and optimization methods to improve the detection rate for network.
π Keywords :οΈ Intrusion Detection System, KDD-CUP, Data Mining, Neural network, Support Vector machines.