Visible to the public Biblio

Filters: Keyword is wireless nodes  [Clear All Filters]
2021-03-15
Joykutty, A. M., Baranidharan, B..  2020.  Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security. 2020 International Conference on Smart Electronics and Communication (ICOSEC). :878–884.
Wireless networks are very significant in the present world owing to their widespread use and its application in domains like disaster management, smart cities, IoT etc. A wireless network is made up of a group of wireless nodes that communicate with each other without using any formal infrastructure. The topology of the wireless network is not fixed and it can vary. The huge increase in the number of wireless devices is a challenge owing to the limited availability of wireless spectrum. Opportunistic spectrum access by Cognitive radio enables the efficient usage of limited spectrum resources. The unused channels assigned to the primary users may go waste in idle time. Cognitive radio systems will sense the unused channel space and assigns it temporarily for secondary users. This paper discusses about the recent trends in the two most important aspects of Cognitive radio namely spectrum sensing and security.
2020-11-16
Januário, F., Cardoso, A., Gil, P..  2018.  Multi-Agent Framework for Resilience Enhancement over a WSAN. 2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). :110–113.
Advances on the integration of wireless sensor and actuator networks, as a whole, have contribute to the greater reconfigurability of systems and lower installation costs with application to supervision of networked control systems. This integration, however, increases some vulnerabilities associated with the physical world and also with the cyber and security world. This trend makes the wireless nodes one of the most vulnerable component of these kind of systems, which can have a major impact on the overall performance of the networked control system. This paper presents an architecture relying on a hierarchical multi-agent system for resilience enhancement, with focus on wireless sensor and actuator networks. The proposed framework was evaluated on an IPv6 test-bed comprising several distributed devices, where performance and communication links health are analyzed. The relevance of the proposed approach is demonstrated by results collected from the test-bed.
2020-06-01
Kapoor, Chavi.  2019.  Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks. 2019 International Conference on Automation, Computational and Technology Management (ICACTM). :174—177.

The internet of things (IoT) is the popular wireless network for data collection applications. The IoT networks are deployed in dense or sparse architectures, out of which the dense networks are vastly popular as these are capable of gathering the huge volumes of data. The collected data is analyzed using the historical or continuous analytical systems, which uses the back testing or time-series analytics to observe the desired patterns from the target data. The lost or bad interval data always carries the high probability to misguide the analysis reports. The data is lost due to a variety of reasons, out of which the most popular ones are associated with the node failures and connectivity holes, which occurs due to physical damage, software malfunctioning, blackhole/wormhole attacks, route poisoning, etc. In this paper, the work is carried on the new routing scheme for the IoTs to avoid the connectivity holes, which analyzes the activity of wireless nodes and takes the appropriate actions when required.

2019-12-30
Tootaghaj, Diman Zad, Farhat, Farshid, Pakravan, Mohammad-Reza, Aref, Mohammad-Reza.  2011.  Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks. 2011 IEEE Consumer Communications and Networking Conference (CCNC). :163–165.
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.