Accepted Papers

  • Design of A Secure Disaster Notification System Using The Smartphone Based Beacon
    Jae Pil Lee , Jae Gwang Lee , Jun hyeon Lee , Ki-su Yoon and Jae Kwang Lee Han Nam University, Dae-jeon City, Korea
    ABSTRACT
    The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved region and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information as well as to provide the confidentiality during the data transfer between smartphone and notification server.
  • Advanced Centralized Clustering: A Novel protocol for Energy Efficient Wireless Sensor Network
    Elkamel Rabiaa, University Carthage,Tunisia, Messaoudi Asma and Cherif Adnane, University Tunis El Manar, Tunisia
    ABSTRACT
    Energy conservation is a key issue in the design of systems based on Wireless Sensor Networks. Clustering-based routing protocols have been developed to reduce network traffic to the BS and thus prolong the lifetime of the network. A variant of clustering is LEACH which is one of the most prominent hierarchical routing protocols used in wireless sensor networks(WSN). Maximize the network lifetime is one of the major challenges. Maximizing the lifetime of a sensor network is equivalent to minimizing the different energy sources. In fact, a sensor node consumes energy to accomplish are goal in the network. Its main role is the collection, processing and transmission of a set of physical quantity on the environment around it. This paper proposes a hierarchical routing protocol based on LEACH called LEACH-based-KG but the difference lies in the mode of formation of clusters and selection of cluster heads (CH) ensuring balance between energy consumption sensors. Simulations show that the LEACH-based-KG protocol extends the life of the network compared to LEACH.
  • Localized Network Coding Overhearing Strategy Based on Data Packet Switching and Scheduling
    Zuoting Ning, Dafang Zhang and Kun Xie , School of Information Science and Engineering, Hunan University, China
    ABSTRACT
    In recent years, more and more researchers aim to the research in wireless overhearing by using network coding,as network coding is a very effective approach to improve network throughput and reduce end-to-end delay. However, the existing approaches can’t thoroughly solve the problem that how to deal with newly overheard packets when the buffer is full, meanwhile, coding node doesn’t schedule the packets in coding queue according to the packets’ information in overhearing buffer. Therefore, these methodologies lack of flexibility and demand quite a few assumptions. To address these limitations,we propose a new network coding overhearing strategy which is based on data packet switching and scheduling(short for DPSS) algorithm. First, when overhearing buffer is full and the sink codes have overheard new packets, sink nodes will drop the recently overheard packets but record their IDs; Second, sink nodes report the packets’ information to the coding node that schedules the packets in coding queue for ease of encoding.Finally, sink nodes delete the packets which have been used for decoding, and call for the ever dropped packets when decoding ratio reaches the threshold. Theoretical analysis and simulation demonstrate that, compared with traditional overhearing policies, our scheme gets higher coding ratio and less delay.
Copyright ® NETCOM 2016