Accepted Papers

  • A Routing Framework in Software Defined Network Environment
    Can Zhang1, Jian Li1, Chaojiong Zheng1, Zhaowen Lin1 and Yan Ma1,2,1Institute of Network Technology,Beijing and 2Beijing University of Posts and Telecommunications,Beijing.
    ABSTRACT
    In this paper we propose a new design and prototype implementation of a routing framework in Software Defined Network (SDN) environment.This framework features a logically centralized control plane by which users could easily manage and monitor their network. It exposes APIs to support various routing protocols and algorithms so as to integrate OpenFlow network with homogeneous or heterogeneous networks. We also discuss the motivation, design considerations and potential use cases in this paper.
  • Error Diagnosis in Infinite Wall Boundary Conditions of Schrodinger Equation with Wireless Networks
    Chetan Ambekar,K. J. Somaiya College of Engineering,India.
    ABSTRACT
    Wireless networking is the branch of communication in which wireless channels are used for the transmission of the signals. There are various terminologies in the field of wireless networking which are taken form quantum physics. Infact quantum physics consists of the signals which are in wireless medium. There are many important theories which are given in the field of quantum mechanics which can be related with the concepts of wireless networks. In this paper we have tried to link the famous Heisenberg Uncertainty Principle and the Schrödinger wave equation with the wireless network in order to find the error in the position, momentum and energy of the network. A new concept is also discussed regarding the error in the probability in which an attempt is made to derive the equation of error with respect to the displacement. In order to derive these equations various concepts of mathematical modeling, Fourier series, Fourier transform, error diagnosis are discussed briefly.
  • Performance Analysis of Spectrum Sensing Techniques for Cognitive Radio
    Chetan Ambekar,K. J. Somaiya College of Engineering,India.
    ABSTRACT
    Creation of new radio access technologies is limited by the shortage of the available radio spectrum.These new technologies are becoming ever more bandwidth demanding due to their higher rate requirements. Cognitive radio networks and spectrum sensing techniques are a natural way to allow these new technologies to be deployed. Cognitive radio has emerged as one of the most promising candidate solutions to improve spectrum utilization in next generation cellular networks. A crucial requirement for future cognitive radio networks is wideband spectrum sensing. Cognitive radio technology provides the efficient way to utilize the electromagnetic spectrum.Physical layer of cognitive radio provides the facility to sense spectrum to determine the spectrum holes. Literature has presented various techniques to sense the spectrum but still there is room for researchers in this field. This paper provides the implementation issues for several spectrums sensing techniques and performance analysis for energy detection and matched filter detection.
  • Topology Control and Maintenance in Dynamic Networks
    Jisha Shanavas and Simi S,Amrita School of Engineering,India.
    ABSTRACT
    In dynamic networks, the network topology changes over time due to the varying environmental and link characteristics. Distributed topology control of nodes in dynamic networks is a major factor that affects the connectivity and lifetime of the network. Nodes in networks like wireless sensor network have limited resources. Topology control algorithms are very effective to save energy, diminish interference between nodes and extend lifetime of the networks operating on battery power. This paper proposes a strategy for topology control and maintenance based on the dynamic network link characteristics. The algorithm calculates the bounds on the number of neighbors per node which helps to reduce power consumption and interference effects. Also the algorithm ensures strong connectivity in the network so that reachability between any two nodes in the network is guaranteed. Analysis and simulation results illustrate the correctness and effectiveness of our proposed algorithm.
  • Low Complex Optimal and Sub-optimal LDPC Decoding Algorithms
    1Sai Manoj Pudukotai Dinakarrao and 2Sudheer Reddy P,1Nanyang Technological University,Singapore and 2National Institute of Technology, India.
    ABSTRACT
    Wireless communications are playing a vital role in day-to-day communications. Many factors affect the performance of the communication system. A design of good decoder with correction capability can recover the data efficiently and can improve the performance.Low-density-parity-check (LDPC) codes are one of the widely used channel codes and have a very good performance. The performance of system depends on encoding and decoding of the transmitted data. In this paper, we present multiple optimal and sub-optimal LDPC decoding algorithms and also decoders with additional error correction capability. Results have shown that performance of decoder with error correction capability can perform better decoding. In addition, the performance can be enhanced by using the proper scheduling scheme inside the decoder. Complexity of different decoding algorithms and their performance are compared and presented.
  • Securing Online Reputation Systems through Temporal, Trust and User Correlation Analysis
    M.Divya, P.Kumudha, and N.Anithadevi,Coimbatore Institute of Technology,India.
    ABSTRACT
    Online reputation systems play a significant role in decision support during internet mediated service provision. With the fast development of online reputation systems in various social networks, operations against such systems are growing rapidly. It has been considered as an important but most difficult problem. In this paper, we propose a defense solution TTAUCA [Temporal, Trust And User Correlation Analysis, which secure the reputation systems from a novel angle], that is used to integrate time domain anomaly detection, DST [Dempster-Shafer Theory] based trust computation and user correlation analysis. Compared with previous scheme TATA [Temporal And Trust Analysis], TTAUCA achieves a better performance in terms of detecting products under attacks, identifying malicious users who insert illegitimate ratings, and recovering reputation scores of victim products.
  • A Network Selection Scheme for 4G Communication Systems Using Multi-Level Optimization (MLO) Technique
    Jeeva Susan Jacob and Preetha K.G,Rajagiri School of Engineering & Technology,India.
    ABSTRACT
    Freedom of choice is the most respected right craved by all human beings. The most attractive feature of 4G communication systems is the provision for users to retain the right of choosing suitable network for each service they avail. Choosing the best one from a set of available networks can be a tedious problem due to the numerous factors to be considered and the complicated calculations involved. The intention of this paper is to find an effective method for selection of network from a heterogeneous set of available networks. Multi-Level Optimization has been proposed as a solution for the network selection in 4G systems.
  • Detection of Rogue Access Points present in the WLAN(Wireless Local Area Network)
    Shivaraj Ashok Pattar and P. Jayarekha,BMS College of Engineering, India.
    ABSTRACT
    A Rogue Access Point is a wireless access point that has either been installed on a secure network without explicit authorization from a local network management or has been created to allow a cracker to conduct a man-in-the-middle attack.Rogue Access Points (RAPs) that pretend to be legitimate APs to lure users to connect to them. Two types of rogue APs can be set with different equipment. The first type uses a typical wireless router connected directly into an Ethernet jack on a wall. The second type of rogue APs are set on a portable laptop with two wireless cards, one connected to a real AP and the other configured as an AP to provide Internet access to WLAN stations. Many algorithms proposed to detect the rogue access point detection but some of them are time consuming and some of them are expensive. And maximum algorithms are work at client side only. Running client side detection program is not preferable every time. It is better to detect unauthorized access points from administrative side. This paper introduces a better approach to detect the rogue access point detection at the server side.
  • A Modified Remote User Authentication Scheme Using Smart Cards With Check Digits
    Shipra Kumari and Hari Om,Indian School of Mines,India.
    ABSTRACT
    Password Authentication is one of the simplest authentication mechanism to ensure secure communication on internet and electronic commerce technology. Recently Awasthi et al. [6] has discussed a user authentication scheme by using check digits and reports it more efficient than other schemes [1-5]. In this paper, we point out that the Awasthi et al. scheme suffers from the privileged insider attack and propose a solution to overcome different attacks. Our scheme has facility for mutual authentication and password change.
  • Designing of Road Signs Information Broadcasting Scheme in VANET
    Noopur Patne and Mangala Madankar,G.H. Raisoni College of Engineering,India.
    ABSTRACT
    Establishment of vehicular adhoc network is most demanding in smart traffic management system. In recent years many researcher are working on VANET and trying to implement the concepts in real world. Vehicular adhoc networks (VANETs) are being developed to provide on-demand wireless communication infrastructure among vehicles and authorities. Such an infrastructure is expected to deliver multiple road safety and driving assistance applications.In this paper, a system is proposed where the main objective is to detect road signs from a moving vehicle.The system will use one signal transmitter in each and every symbol or message board at road side and whenever any vehicle passes from that symbol the receiver situated inside the vehicle i.e. In-Car System will receive the signals and display proper message or the symbol details on display connected in car. Road Traffic Sign Detection is a technology by which a vehicle is able to recognize the traffic signs which are on the road e.g. "speed limit" or "school" or "turn ahead".
  • Enhancement of Secondary Link Capacity in Spectrum Sharing
    Amit Kumar and Gaurav Verma,National Institute of Technology,India.
    ABSTRACT
    In the previous investigations of secondary users capacity in spectrum-sharing environments have determined the secondary link capacity based on the interference power threshold set at the primary receiver. In contrast to these previous works, we analyze the secondary link capacity which is determined by the ratio of the distance between the secondary transmitter and primary receiver to the distance between the secondary receiver and transmitter. The secondary user capacity enhanced by this distance-ratio, the secondary transmitter has antennas and a simple antenna selection process is used for achieve better capacity. The numerical results obtained shows; improved capacity of the secondary link
  • Power-Leach: A Cluster-Based Routing Protocol For Wireless Sensor Network
    Preeti Bisht and Anil K. Verma,Thapar University,India
    ABSTRACT
    Wireless sensor network is a group of sensor nodes dispersed in an area for sensing and monitoring the environmental changes. Generally, sensor networks goes through a serious problem of limited power as nodes were placed in hostile environment therefore no direct wired power source were not provided to them. To deal with this problem researchers design many energy efficient algorithms and LEACH is one of them. It is a clustering protocol. To balance the energy usage and increase the lifetime, researchers most often try to choose cluster head (CH) efficiently for every round. But the selection of CH for every round seems unnecessary. In this paper, we present power-LEACH where CH selection is based on the threshold value and also we set power level to each node like if nodes do a inter-cluster communication then we assign a high power level because at that time CH needs to communicate with base station and for intra-cluster communication we assign low power level. In this way we try to balance the network energy and increase the network life time which is shown in our simulation results.
  • Analysis Of Near Field Distribution Variation Using Awas Electromagnetic Code For Wimax
    1Chhaya Dalela and 2Rahul Namawat,1JSS Academy Of Technical Education,India and2JECRC University,India.
    ABSTRACT
    Rapid Fluctuations and variations of signal strength at higher frequency range in Near Field zone, is a common difficulty to achieve higher data rate. As signal varies continuously, it starts decaying by the interference of the atmospheric obstructions and the electric field intensity gradually decreases with the distance. This effect is observed by AWAS Electromagnetic Code which predicts the rapid variations in electric field intensity irrespective of environment, whereas statistical models do not capture the fundamental physics and variations as per Environment. An Adequate and optimum values of these external parameters is essential for controlled and efficient transmission.