LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs
|
|
- Marvin Doyle
- 5 years ago
- Views:
Transcription
1 LOKS: Low-Overhead Forward and Backward Key Seecy n WSNs Malvka Ashok CSE Department M. M. Engneerng College M. M. Unversty Mullana, Ambala, Haryana, Inda-3307 Roht Vad CSE Department M. M. Engneerng College M. M. Unversty Mullana, Ambala, Haryana, Inda-3307 ABSTRACT Securty plays an mportant role n desgnng a wreless sensor networks (WSNs. As the medum s wreless n nature whch s more vulnerable to adversares attacks n the network. Key management s used to acheve securty n WSNs. If symmetrc key s used n the network then one key s more enough to secure the network but the ssue s that once the key s compromsed, entre network gets compromsed. On the other hand, f an ndvdual key s provded to every sensor n the network then sensor to sensor communcaton s not possble n the network. Therefore sensors are grouped together to form a cluster. Each cluster s assgns a cluster key shared by every cluster member of the group. If ths key s fxed then key compromsng affects the securty prncple n the entre group. So to avod ths type of attack, key s updated after a fx nterval of tme. But f key updatng s done by the base staton, communcaton overheads n updatng the keys are neased n the network. Therefore resource constraned wreless sensor networks; the concept of key generaton s used nstead of key dstrbuton. In key generaton process, the key s generated by applyng a one way hash functon on a gven seet. But the problem s that f ths seet s compromsed, all the keys whch are generated n past or to be generated n the future are mmedately compromsed. In ths research paper, we present a LOKS: Low-Overhead Forward and Backward Key Seecy scheme to secure WSNs. Ths scheme updates the keys of each cluster n the network wth reslency to attack. Smulaton results proves that presented scheme takes less number of communcaton overheads as compared to exstng schemes gven n lterature to update the group keys for every groups after every round. Keywords Backward Seecy, Cluster Head, Forward Seecy, Key Generaton, Key Seecy, Sensor nodes, WSNs.. INTRODUCTION Due to the advancements n the technology wreless networks are used n ntense and dffcult stuatons where humans can t reach easly. Due to ts self-confgured nature t s used n varous applcatons. But sensor networks are resource constraned, so the man challenge n these networks s to provde secure communcaton n an effcent manner. There are many protocols that have been developed to utlze these knds of networks n an effcent way so to nease the lfe tme of the network. One of such technque s also presented n ths paper to provde secure communcaton over the network wth low communcaton overhead. As the sensor network s more prone to nsde and outsde attacks because the medum s wreless. So Securty s one of the bg ssues n Wreless sensor network. As the data s communcated through the wreless medum so the attacker or ntruder can easly hack or tamper the data, make the nodes to be compromsed, ntroduce malcous nodes n the network. All these actvtes make the network less secure and also deease the lfetme of the network as they work on battery. So t becomes very mportant to make the network secure and generate the methods whch should nease the network lfetme. To provde securty, t s very mportant that the data that s beng communcated must be enypted and verfed. The data enypton means hdng the data or nformaton nto some code words so that no unauthorzed person could harm the data. The same data when reached securely to the recever sde t s deypted frst.e. changng the data nto ts orgnal form. But the problem s how to secure the nformaton between the sender and the recever and how to keep the network away from the reach of the attackers or ntruders. All ths process of enypton and deypton nvolves the keys. Keys are the seet number or code that s used to provde securty to the nformaton n the network.. Forward and Backward Key Seecy The process of key generaton s shown n Fg. The key whch s used n each round by dfferent sensor node n a partcular round s generated by applyng a one way hash functon on round key of prevous round,.e. th round key s used to generate the round key of (+ th round. Key generaton s used n replace of key dstrbuton to reduce complexty n the network. Fg : Key Generaton Process The drawback of key generaton scheme s that once a key of some round s compromsed, the key of any round s easly calculated by an attacker as the functon used to generate a key s statc n nature and s open to all sensors. The problem s shown n Fg where the key of th round s compromsed whch results to dsclose the round key of all the rounds. 36
2 Current Round Seed value generated by sensor node S S S 3 S 3 Seed value generated by sensor node S Table. Key Updatng [5] Sensor node S send the enypted value to sensor node S S0 Sensor node S send the enypted value to sensor node S S Generaton of round Key S S S S S S Key ( S S S S, S S S S, S Key ( S, S S S S S S Key ( 3 3 S 3 S3 : : : : : : : : : : : : : : : : : : th S 3 3 S3 S S S S, S S S S, S Key ( S, S S and smlarly sensor node S generates ts own random seed value S. Now S enypts S wth the help of a S 0 and send t to S as shown n Eq.. Fg : All key of the System are compromsed due to one key compromsng So the process of key generaton s mplemented n such a way that the prncple of Forward and Backward Seecy s mantaned n the network. Accordng to the prncple of Forward Seecy, the compromse of a key does not dsclose the round key of any round that s used n future. Smlarly the prncple of Backward Seecy states that compromse of a key does not dsclose the round key of any round that s used n past. The prncple of Forward and Backward Seecy s shown n Fg 3. The system s hghly secured by ths technque. S0 S S ( Smlarly S enypts S wth the help of as shown n Eq.. S S and send t to S S S ( Now both sensor nodes generates a round key used n frst round by applyng a one way hash functon as shown n Eq. 3. S Key ( (3 So now n round sensor node S generates ts random seed value S and enypt t wth S and send t to sensor node S as shown n Eq. 4. S S S, S (4 Fg 3: Forward and Backward Key Seecy. EXISTING SCHEME TO ACHIEVE FORWARD AND BACKWARD KEY SECRECY IN WSNs [5] Let there are two sensor nodes S and S deployed n wreless sensor networks. These two sensor nodes want to share a round key K n round wth each other. Every sensor node generates a random seed value n each round. Ths seed value s used n generatng the round key of current round n whch t s generated. Let S s the ntal seed value generated by 0 sensor node S before the startng of frst round and smlarly S s the seed value generated by sensor node S n round. Let S0 s the ntal seed value generated by sensor node S before the startng of frst round and smlarly S s the seed value generated by sensor node S n round. It s also assumed that both sensor nodes already share ts own seed value wth other sensor before the startng of frst round. In frst round sensor node S generates ts random seed value Smlarly S enypts S wth the help of as shown n Eq. 5. S and send t to S S S S, S (5 Now both sensor nodes generates a round key used n round by applyng a one way hash functon as shown n Eq. 6. Key ( S, S (6 Proceedng n ths way the nodes generate new key n every round and use that key to communcate wth each-others. The key updatng method s shown n Table.. Issues n Exstng Scheme The exstng system works well wth two nodes only. As soon as the number of nodes n the network neases, the complexty of the system neases very hgh. The number of messages that communcates between all the nodes n the network to share and generates the key also neases. If the exstng scheme to generate the keys s used then key generaton n the system becomes the bottleneck of the network and becomes more dffcult to exchange key generaton parameters n the network. Each node generates ts 37
3 own random number and broadcast n the network. Fg 4 shows that the sensor node A transmttng ts random number Ra to each sensor n the network. Fg 4: Sensor node A broadcast ts random number n the Network Ths random number s enypted wth the random number of frst sensor node wth the help of a random number generated n prevous round by frst sensor node and transmtted to frst sensor node then sensor node A enypts Ra wth the help of a random number generated by second sensor node n prevous round and transmt to second sensor node and so on. Ths process s acheved by all the sensors n the network. Each sensor generates ts random number and sent t to each and every sensor one by one as shown n Fg 5. round. But the drawback of ths scheme s that once a key of any round s compromsed, the prncple of Forward and Backward Seecy s not mantaned n the network. So broadcastng s not used n ths system. If each sensor broadcast ts random number wth the round key of prevous round. The second method to broadcast the random number s that each sensor node enypts ts random number wth the help of ts own random number that s used n prevous round, as random number of all the sensor n prevous round are known to each sensor n the network.. Communcaton Overheads n Exstng Scheme Let there are n number of sensors n the network that wants and generate a key shared among all of them. To generate a key wth the gven scheme, each sensor node sent the random number by enyptng ths random number wth the prevous round random number of ndvdual sensor. Ths way each sensor transmts ts random number to all the other sensors n the network one by one. So each sensor sent expectedly n- number of messages n the network, thus total n*n- messages communcated n the network as shown n Fg 6. As the number of sensors neases n the network, the communcaton overheads nease at very hgh speed. So ths scheme s not effcent for more than two sensors. Fg 5: Each sensor nodes broadcastng ts random number n the network The drawback of ths scheme s that broadcastng s not possble n ths system, as the random numbers of each sensor n prevous round are dfferent. Only the round key of prevous round s common between all the sensors. So the only method to broadcast the ransom number of current round s to enypt t wth the help of a round key used n prevous Fg 6: Communcaton Overheads n Exstng Scheme Table. Lst of abbrevatons S. No Name Despton CH Cluster head for current round CH Cluster head n next round CH Cluster head n prevous round R Random number generated by cluster head of current round R Random number generated by cluster head of next round R Random number generated by cluster head of prevous round K Round key used n current round 8. E k Enypton key 38
4 3. PRESENTED KEY GENERATION SCHEME WITH FORWARD AND BACKWARD KEY SECRECY The problem n the exstng system was the complexty. As the number of nodes n the system neases the system becomes more and more complex. The presented scheme for key generaton s very effcent n terms of communcaton overheads by mantanng the prncple of Forward and Backward Key Seecy n the network. Varous notatons used n understandng the presented scheme are gven n Table. In presented system, communcaton overheads are reduced by lmt the number of nodes parcpatng n key generaton process to three only. In each round all the nodes n the group does not partcpate n generatng the random number that s used n key generaton process, only three nodes wll generate the random numbers. These three nodes are cluster head nodes n three dfferent consecutve rounds,.e. cluster head of prevous round ( CH, cluster head of current round ( CH and cluster head n next round ( CH. CH becomes CH n round number (+. So n every round a new cluster head s elected that s known as cluster head of next round ( CH. Ths cluster head becomes the current cluster head n round number (+. But n frst round only two cluster heads are choosen whch partcpate n key generaton process by generatng ther random numbers. From these two cluster heads, one cluster head plays the role of current cluster head and other play ther role of next round cluster head. In ths round there s no prevous round cluster head. In ths round, CH sends the generated random number ( RCH to CH as shown n Fg 7. Fg 8: Prevous and next round CH sendng random numbers to th round CH Fg 8 shows the concept of three cluster heads. In ths fgure, cluster head CH and CH sent seed values to cluster head CH. Now after recevng the random numbers from CH and CH, the cluster head of current round CH generate the key K used n current round by applyng a one way hash functon on the values RCH, RCH and RCH. After generatng the round key, CH broadcast ths round key ( K n the network as shown n Fg 9. Fg 7: Next round CH sendng ts random number to current CH Fg 9: CH broadcastng key to all sensors n the network Ths round key s broadcasted n the network n enypted form. Ths key s enypted wth enypton key. Ths enypton key ( KE s generated by applyng a one way hash functon on round key of prevous round and seed value of current round as shown n Eq. 8. Where seed value n each round s generated by apply a one way hash functon on seed 39
5 value of prevous round and round key of prevous round as shown n Eq. 9. K Hf ( RCH, RCH, RCH (7 KE Hf ( K, sd (8 sd Hf ( K, sd (9 3 After recevng the enypted key, ndvdual sensor deypt t wth the deypton key to get the round key of current round. Deypton key s generated wth same technque that s choosen by the current round cluster head as shown n Eq. 7. As enypted key s broadcasted n the network so there s no chance that ths key s hacked by the adversary because the enypton key s generated wth the help of a seed value whch s never communcated over the network. So the presented system provdes a scalable forward and backward key seecy n WSNs. 3. Key Generaton Process The followng algorthm shows the steps nvolved n presented key generaton scheme A. B. C. CH CH : RCH Cluster head n prevous round sendng ts random number to current round cluster head. CH CH : RCH Cluster head for next round sendng ts random number to current round cluster head. CH : RCH Cluster head n current round generatng ts random number n current round. D. CH : K Hf ( RCH, RCH, RCH Cluster head n current round generatng the current round key by applyng one wat hash functon on the random numbers of prevous, current and next round cluster heads. E. CH KE Hf ( K, sd : Cluster head n current round generatng key Enypton key for current round by applyng one way hash functon on prevous round key and the current round seed value. F. CH KE ( K : Current round cluster head broadcastng current round key to all ts cluster members by enyptng the key wth the enypton key G. sd Hf 3( K, sd Every sensor updates ts seed value for next round by applyng a one way hash functon on current round key and the current round seed value. In ths way n each round new cluster head s selected and new key s generated for the new round. The seed value s never communcated on the network, t always reman hdden from the adversary. So f an adversary somehow hack the medum and gets the random number of any sensor node, t may never be able to generate the key. Due to the seed value that s nvolved n the enypton key the adversary may not be able to get the keys of any round nor past nether future keys. So the network s secure and the concept of forward and backward seecy s mantaned n the network. 4. COMMUNICATION OVERHEADS Communcaton overheads n the proposed scheme are reduced due to number of sensors nvolved n key generaton process s lmted to three only. So n presented scheme, communcaton overheads are gven below n Eq. 0. CO=+ (n- (0 Where CO s the communcaton overhead and n s the total number of sensor nodes n the network. Fg 0: Communcaton overheads n presented system Fg 0 shows the communcaton overheads n presented system wth varable number of sensors n the network. Comparson between communcaton overheads n presented v/s exstng scheme s shown n Fg. Fg : Communcaton overhead n presented v/s exstng scheme 5. CONCLUSION In ths paper, we present a model to acheve the prncple technque of forward and backward key seecy n the WSNs. The presented model s scalable for large network wth hgh number of sensor nodes. Presented scheme reduces the number of communcaton overheads as compared to exstng scheme wth reducng number of communcaton overheads. The scheme s very benefcal for cluster based approach where a group of nodes share a key wth cluster head node. In ths scheme, cluster heads are selected n each round where a current head of current round s responsble for generatng and 40
6 broadcastng a round key n entre cluster. In future, the scheme s appled for dynamc clusterng where a node moves from one cluster to another cluster by ossng the cluster boundary. 6. REFERENCES [] Al Bagherna, Akbar Bemana, Sohrab Hojjatkhah and Al Jouharpourr, A Key Management Approach for Wreless Sensor Networks, IJITMC, pp. -9, 04. [] Baojang Cu, Zyue Wang, Bng Zhao, Xaobng Lang and Yuemn Dng, Enhanced Key Management Protocols for Wreless Sensor Networks, pp. -0, September 04 [3] Han Alzad, DongGook Park, Juan Gonzalez Neto, Coln Boyd and Ernest Foo, A Forward & Backward Secure Key Management n Wreless Sensor Networks for PCS/SCADA, Volume 4,, pp 66-8, 00. [4] Roberto D Petro, Lug V. Mancn and Sushl Jajoda, Provdng seecy n key management protocols for large wreless sensors networks, Elsever, Vol., pp , November 003. [5] Vnayak Nak, Ansh Arora, Sandeep Bapat and Mohamed Gouda, Whsper: Local Seet Mantenance n Sensor Networks, pp. -6, 003. [6] Reza Azarderskhsh and Arash Reyhan-Masoleh, Secure Clusterng and Symmetrc Key Establshment n HeterogeneousWreless Sensor Networks, Hndaw Publshng Corporaton EURASIP Journal onwreless Communcatons and Networkng, pp. -, October, 00. [7] Wensheng Zhang, Mnh Tran, Sencun Zhu and Guohong Cao, A Random Perturbaton-Based Scheme for Parwse Key Establshment n Sensor Networks, ACM , pp. -0, Sept 007. [8] Erc Ke Wang, Lucas C.K HUI and S.M. Yu, A New Key Establshment Scheme for Wreless Sensor Networks, Internatonal Journal of Network Securty and ts Applcatons(IJNSA, Vol., No., pp. 7-7, July 009. [9] Wenlang Du, Jng Deng, Yunghsang S.Han, Pramod K. Varshney, Jonathan Katz and Aram Khall, A Parwse Key Pre-Dstrbuton Scheme for Wreless Sensor Networks, ACM Journal Name, Vol.4, pp. -9, September 9, 00. [0] Mu Kun and L L, An Effcent Parwse Key Predstrbuton Scheme for Wreless Sensor Networks, JOURNAL OF NETWORKS, Vol. 9, No., pp. -6, February 04. [] Donggang Lu, Peng Nng, Establshng Parwse Keys n Dstrbuted Sensor Networks, ACM , 003. [] Seyt Ahmet Camtepe, Bulent Yener, Mot Yung, Expander Graph based Key Dstrbuton Mechansms n Wreless Sensor Networks, IEEE Internatonal Conference, pp. -6, 006. [3] Wenlang Du, Jng Deng, Pramod K. Varshney, et al., A Parwse Key Pre-Dstrbuton Scheme for Wreless Sensor Networks, ACM Journal Name, Vol. V, pp. 8-58, May 005. [4] Ch Yuan Chen and Han Cheh Chao, A survey of key dstrbuton n wreless sensor networks, Wley Onlne Lbrary, pp. -4, 0. [5] Roht Vad and Vjay Kumar, Securty ssues and Remedes n Wreless Sensor Networks- A Survey, Internatonal Journal of Computer Applcatons, Vol. 79, No. 4, October 03. [6] Saurabh Sngh, Dr. Harsh Kumar Verma, Securty for Wreless Sensor Network, Internatonal Journal for Computer Scence and Engneerng (IJCSE, Vol. 3, No. 6, pp. -7, 0. IJCA TM : 4
Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationA Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)
A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationProcedia Computer Science
Proceda Computer Scence 3 (211) 714 72 Proceda Computer Scence (21) Proceda Computer Scence www.elsever.com/locate/proceda www.elsever.com/locate/proceda WCIT-21 Performance evaluaton of data delvery approaches
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationAn Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationGenetic Algorithm for Sensor Scheduling with Adjustable Sensing Range
Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department
More informationA Predictive QoS Control Strategy for Wireless Sensor Networks
The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu
More informationRational Secret Sharing without Broadcast
Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept
More informationA New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs
Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationMicro-grid Inverter Parallel Droop Control Method for Improving Dynamic Properties and the Effect of Power Sharing
2015 AASRI Internatonal Conference on Industral Electroncs and Applcatons (IEA 2015) Mcro-grd Inverter Parallel Droop Control Method for Improvng Dynamc Propertes and the Effect of Power Sharng aohong
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationAn efficient cluster-based power saving scheme for wireless sensor networks
RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationPriority based Dynamic Multiple Robot Path Planning
2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna
More informationJoint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding
Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent
More informationA Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web
A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,
More informationCOMPARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HOP WIRELESS SENSOR NETWORKS 1
Internatonal Journal of Computer Networks & Communcatons (IJCNC), Vol., No.4, July 1 COMARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HO WIRELESS SENSOR NETWORKS 1 S. Mehta and K.S. Kwak UWB Wreless
More informationBroadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Sensors 2010, 10, 8683-8695; do:10.3390/s100908683 OPEN CCESS sensors ISSN 1424-8220 www.mdp.com/ournal/sensors rtcle roadcast uthentcaton for Wreless Sensor Networks Usng Nested Hashng and the Chnese
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationDesign of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network
Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve
More informationContext-aware Cluster Based Device-to-Device Communication to Serve Machine Type Communications
Context-aware Cluster Based Devce-to-Devce Communcaton to Serve Machne Type Communcatons J Langha, Lu Man, Hans D. Schotten Char of Wreless Communcaton, Unversty of Kaserslautern, Germany {j,manlu,schotten}@et.un-kl.de
More informationAn Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks
An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationAdaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks
Adaptve Dstrbuted Topology Control for Wreless Ad-Hoc Sensor Networks Ka-Tng Chu, Chh-Yu Wen, Yen-Cheh Ouyang, and Wllam A. Sethares Abstract Ths paper presents a decentralzed clusterng and gateway selecton
More informationAn Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,
More informationTopology Control for C-RAN Architecture Based on Complex Network
Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton
More informationResearch Article Performance Evaluation of Uplink Delay-Tolerant Packet Service in IEEE Based Networks
Hndaw Publshng Corporaton EURASIP Journal on Wreless Communcatons and Networkng Volume 2011, Artcle ID 549492, 12 pages do:10.1155/2011/549492 Research Artcle Performance Evaluaton of Uplnk Delay-Tolerant
More informationResearch on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d
Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,
More informationAd hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce
Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann, Kurt Gehs, Gero Mühl Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationUtility-based Routing
Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton
More informationMULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)
Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)
More informationA Preliminary Study of Information Collection in a Mobile Sensor Network
A Prelmnary Study of Informaton ollecton n a Moble Sensor Network Yuemng Hu, Qng L ollege of Informaton South hna Agrcultural Unversty {ymhu@, lqng1004@stu.}scau.edu.cn Fangmng Lu, Gabrel Y. Keung, Bo
More informationErgodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power
7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power
More informationAN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS
Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS
More informationPrevention of Sequential Message Loss in CAN Systems
Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar
More informationAn Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks
An Actvty Based Moblty Predcton Strategy Usng Markov Modelng for Wreless Networks R.V. Mathvarun and V.Vadeh Abstract: The foremost objectve of a wreless network s to facltate the communcaton of moble
More informationA Novel DSA-Driven MAC Protocol for Cognitive Radio Networks
Wreless Sensor Networ, 29, 2, 6-2 do:.4236/wsn.29.2 7 Publshed Onlne July 29 (http://www.scrp.org/journal/wsn/). A Novel DSA-Drven MAC Protocol for Cogntve Rado Networs Hua SONG, Xaola LIN School of Informaton
More informationOn Sensor Fusion in the Presence of Packet-dropping Communication Channels
On Sensor Fuson n the Presence of Packet-droppng Communcaton Channels Vjay Gupta, Babak Hassb, Rchard M Murray Abstract In ths paper we look at the problem of multsensor data fuson when data s beng communcated
More informationAd hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce
Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/ PTB-Semnar, 3./4. November
More informationNew Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.
Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable
More informationRelevance of Energy Efficiency Gain in Massive MIMO Wireless Network
Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz
More informationAn Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network
Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton
More informationA Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute
More informationMovement - Assisted Sensor Deployment
Intro Self Deploy Vrtual Movement Performance Concluson Movement - Asssted Sensor Deployment G. Wang, G. Cao, T. La Porta Dego Cammarano Laurea Magstrale n Informatca Facoltà d Ingegnera dell Informazone,
More informationAn Optimal Model and Solution of Deployment of Airships for High Altitude Platforms
An Optmal Model and Soluton of Deployment of Arshps for Hgh Alttude Platforms Xuyu Wang, Xnbo Gao, Ru Zong, Peng Cheng. VIPS Lab, School of Electronc Engneerng, Xdan Unversty, X an 77, Chna. Department
More informationOn Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution
Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed
More informationOn the Feasibility of Receive Collaboration in Wireless Sensor Networks
On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationDistributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks
Journal of Communcatons Vol., No., November 26 Dstrbuted Adaptve Channel Allocaton n Mult-Rado Wreless Sensor Networks We Peng, Dongyan Chen, Wenhu Sun, and Guqng Zhang2,3 School of Control Scence and
More informationReal-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode
1 Real-Tme Transmsson Mechansm Desgn for Wreless IoT Sensors wth Energy Harvestng under Power Savng Mode Jn Shang, Muhammad Junad Faroo, Student Member, IEEE, and Quanyan Zhu, Member, IEEE arxv:1812.2615v1
More informationAn Algorithm Forecasting Time Series Using Wavelet
IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman
More informationInternational Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)
Internatonal Conference on Informaton cences, Machnery, Materals and Energy (ICIMME 05) The ystem of Outdoor Vsble ght Communcaton wth Fast Blnd Algorthm Zheng-Guo un, Y-Jun Zhu & Yan-Yu Zhang Department
More informationThroughput Maximization by Adaptive Threshold Adjustment for AMC Systems
APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal
More informationMODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J.
ABSTRACT Research Artcle MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patdar, J. Sngha Address for Correspondence Maulana Azad
More informationDistributed Channel Allocation Algorithm with Power Control
Dstrbuted Channel Allocaton Algorthm wth Power Control Shaoj N Helsnk Unversty of Technology, Insttute of Rado Communcatons, Communcatons Laboratory, Otakaar 5, 0150 Espoo, Fnland. E-mal: n@tltu.hut.f
More informationAn Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG
An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh
More informationAnalysis of Lifetime of Large Wireless Sensor Networks Based on Multiple Battery Levels
I. J. Communcatons, Network and System Scences, 008,, 05-06 Publshed Onlne May 008 n ScRes (http://www.srpublshng.org/journal/jcns/). Analyss of Lfetme of Large Wreless Sensor Networks Based on Multple
More informationVRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,
VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationResearch Article Capacity of Data Collection in Wireless Sensor Networks Based on Mutual Information and MMSE Estimation
Hndaw Publshng Corporaton ISRN Sensor Networks, Artcle ID 38945, 9 pages http://dx.do.org/0.55/04/38945 Research Artcle Capacty of Data Collecton n Wreless Sensor Networks Based on Mutual Informaton and
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationKing s Research Portal
Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,
More informationIntelligent Wakening Scheme for Wireless Sensor Networks Surveillance
The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese
More informationMaximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks
Maxmzng Lfetme of Sensor-Target Survellance n Wreless Sensor Networks Ha Lu, Xaowen Chu, Yu-Wng Leung Computer Scence, Hong Kong Baptst Unversty Xaohua Ja, Peng-Jun Wan Computer Scence, Cty Unversty of
More informationCooperative perimeter surveillance with a team of mobile robots under communication constraints
213 IEEE/RSJ Internatonal Conference on Intellgent Robots and Systems (IROS) November 3-7, 213. Toyo, Japan Cooperatve permeter survellance wth a team of moble robots under communcaton constrants J.J.
More informationEnsemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame
Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749
More informationActive and Reactive Power Control of DFIG for Wind Energy Conversion Using Back to Back Converters (PWM Technique)
World Essays Journal / 4 (1): 45-50, 2016 2016 Avalable onlne at www. worldessaysj.com Actve and Reactve Power Control of DFIG for Wnd Energy Converson Usng Back to Back Converters (PWM Technque) Mojtaba
More informationA thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment
Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree
More informationMIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.
IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationAdaptive Phase Synchronisation Algorithm for Collaborative Beamforming in Wireless Sensor Networks
213 7th Asa Modellng Symposum Adaptve Phase Synchronsaton Algorthm for Collaboratve Beamformng n Wreless Sensor Networks Chen How Wong, Zhan We Sew, Renee Ka Yn Chn, Aroland Krng, Kenneth Tze Kn Teo Modellng,
More informationLow Complexity Duty Cycle Control with Joint Delay and Energy Efficiency for Beacon-enabled IEEE Wireless Sensor Networks
Low Complexty Duty Cycle Control wth Jont Delay and Energy Effcency for Beacon-enabled IEEE 8254 Wreless Sensor Networks Yun L Kok Keong Cha Yue Chen Jonathan Loo School of Electronc Engneerng and Computer
More informationA MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS
A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr
More informationHIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY
Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,
More informationAn Improved Weighted Centroid Localization Algorithm
Internatonal Journal of Future Generaton Communcaton an Networng Vol.6, No.5 (203), pp.45-52 http://x.o.org/0.4257/fgcn.203.6.5.05 An Improve Weghte Centro Localzaton Algorthm L Bn, Dou Zheng*, Nng Yu
More informationA Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept
J. Appl. Envron. Bol. Sc., 5(1)20-27, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com A Mathematcal Model for Restoraton Problem n Smart
More informationUtility Maximization for Uplink MU-MIMO: Combining Spectral-Energy Efficiency and Fairness
EuCNC-MngtTech 79 7 8 9 7 8 9 7 8 9 7 8 9 7 8 9 7 Utlty Maxmzaton for Uplnk MU-MIMO: Combnng Spectral-Energy Effcency and Farness Le Deng, Wenje Zhang, Yun Ru, Yeo Cha Kat Department of Informaton Engneerng,
More informationFrog Call-Inspired Self-Organizing Anti-Phase Synchronization for Wireless Sensor Networks
Frog Call-Inspred Self-Organzng Ant-Phase Synchronzaton for Wreless Sensor Networks Akra Mutazono Graduate School of Informaton Scence and Technology Osaka Unversty -5, Yamadaoka, Suta-sh, Osaka 565-87,
More informationNOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION
NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationDiversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L
, pp. 207-220 http://dx.do.org/10.14257/jht.2016.9.1.18 Dverson of Constant Crossover Rate DE\BBO to Varable Crossover Rate DE\BBO\L Ekta 1, Mandeep Kaur 2 1 Department of Computer Scence, GNDU, RC, Jalandhar
More informationInverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationCentralized approach for multi-node localization and identification
Centralzed approach for mult-node localzaton and dentfcaton Ola A. Hasan Electrcal Engneerng Department Unversty of Basrah Basrah, Iraq Lolastar91@gmal.com Ramzy S. Al Electrcal Engneerng Department Unversty
More informationDIMENSIONAL SYNTHESIS FOR WIDE-BAND BAND- PASS FILTERS WITH QUARTER-WAVELENGTH RES- ONATORS
Progress In Electromagnetcs Research B, Vol. 17, 213 231, 29 DIMENSIONAL SYNTHESIS FOR WIDE-BAND BAND- PASS FILTERS WITH QUARTER-WAVELENGTH RES- ONATORS Q. Zhang and Y. Lu School of Electrcal and Electroncs
More informationMulticast Transmission Protocol for Multimedia Services in Smart Home
Multcast Transmsson rotocol for Multmeda Servces n Smart Home Jeong-Jun Suh, Shan Guo Quan, Jong-Ku ar, Jong Hyu ar 3 and Young Yong Km Department of Electrcal and Electronc Engneerng, Yonse nversty 34
More informationImproving the Authentication Scheme and Access Control Protocol for VANETs
Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu
More informationExperimenting an Indoor Bluetooth-based Positioning Service
Expermentng an Indoor Bluetooth-based Postonng Servce G. Anastas, Computer Engneerng Dept., Unversty of Psa, Italy g.anastas@et.unp.t R. Bandellon, Computer Scence Dept. Unversty of Trento, Italy Renata.Bandellon@st.cnr.t
More informationCommunication-Aware Distributed PSO for Dynamic Robotic Search
Communcaton-Aware Dstrbuted PSO for Dynamc Robotc Search Logan Perreault Montana State Unversty Bozeman, Montana 59715 logan.perreault@cs.montana.edu Mke P. Wtte Montana State Unversty Bozeman, Montana
More informationOptimal Decentralized Kalman Filter
17th Medterranean Conference on Control & Automaton Makedona Palace, Thessalonk, Greece June 24-26, 2009 Optmal Decentralzed Kalman Flter S Oruç, J Sjs, PPJ van den Bosch Abstract The Kalman flter s a
More informationAn Energy Efficient Distributed Algorithm for Connected Sensor Cover in Sensor Networks
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No.9, September 28 265 An Energy Effcent Dstrbuted Algorthm for Connected Sensor Cover n Sensor Networks M.Senthamlselv and Dr.N.Devarajan
More informationAvailable Transfer Capability (ATC) Under Deregulated Power Systems
Volume-4, Issue-2, Aprl-2, IN : 2-758 Internatonal Journal of Engneerng and Management Research Avalable at: www.emr.net Page Number: 3-8 Avalable Transfer Capablty (ATC) Under Deregulated Power ystems
More informationsensors ISSN by MDPI
Sensors 2007, 7, 628-648 Full Paper sensors ISSN 1424-8220 2007 by MDPI www.mdp.org/sensors Dstrbuted Partcle Swarm Optmzaton and Smulated Annealng for Energy-effcent Coverage n Wreless Sensor Networks
More information