bullet Advances in Networks, Security and Communications: Reviews, Vol. 1

   (Open Access Book)

        

  Title: Advances in Networks, Security and Communications: Reviews, Vol. 1, Book Series

  Editor: Sergey Y. Yurish

  Publisher: International Frequency Sensor Association (IFSA) Publishing

  Formats: paperback (print book) and printable pdf Acrobat (e-book) 394 pages

  Price: 110.00 EUR (shipping cost by a standard mail without a tracking code is included)

  Delivery time for print book: 7-17 days dependent on country of destination. Please contact us for priority (5-9 days), ground (3-8 days) and express (3-5 days) delivery options by e-mail

  Pubdate: 29 December 2017

  ISBN: 978-84-697-8994-0

  e-ISBN: 978-84-697-8993-3

 

  Creative Commons License

 

 

Open Access book in pdf format (free download, 16.3 Mb):

 

 Advances in Networks, Security and Communications: Reviews, Vol. 1, Book Series

 


 

Buy print book:

 

 Book Description

 

 

Networks are everywhere, from the Internet to sensor networks. They are used widely for various type of communications. Their safe existence and functioning need deep consideration of different security aspects. It was the reason to combine these three topics such as Networks, Communication and Security in one book volume.

 

The 1st volume of new Book Series contains 15 chapters submitted by 42 contributors from academia and industry from 13 countries: Brazil, Bulgatia, Burkina Faso, China, Czech Republic, France, India, Iran, Japan, Mauritius, Senegal, UK, and USA. The book is devided into three main parts: Networks (four chapters), Security (four chapters) and Communication (seven chapters). ‘Advances in Networks, Security and Communications: Reviews’ provides focused coverage of these three main technologies. It explores practical solutions to a wide range of network, communication and security issues. Chapters are written by experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes wireless sensor network routing improvement; connectivity recovery, augmentation and routing in wireless Ad Hoc networks; advanced modeling and simulation approach for the sensor networks management; security aspects for mobile agent and cloud computing; various communication aspects (algorithms, coding and hardware design) and others.

 

Every chapter of this book is independent and self-contained. Fifteen chapters of the book have the similar structure: introduction, state-of-the art, description of advances and list of well selected references, including books, journal articles, conference proceedings and web sites.

 

This book ensures that our readers will stay at the cutting edge of the field and get the right and effective start point and road map for the further researches and developments. By this way, they will be able to save more time for productive research activity and eliminate routine work.

 

This book will be a valuable tool in both learning how to design various networks, as well as a reference as an advance in readers’ research careers.

 

 

Contents:

 

Contents
Contributors
Preface

 


Networks


1. WSN Routing Improvement Techniques


1.1. Introduction
1.2. Architecture of a Wireless Sensor Node
1.2.1. The Sensing Unit
1.2.2. The Processing Unit
1.2.3. The Wireless Transceiver Unit
1.2.4. The Power Unit
1.3. The Offer of Sensor Manufacturers
1.3.1. The Tmote Sky of Moteiv
1.3.2. Sun SPOT from Sun Microsystems
1.3.3. The WiEye of EasySen
1.3.4. The Micaz Mote of Crossbow
1.3.5. Jennic Sensors
1.3.6. Other Commercial Applications
1.4. Wireless Sensor Network Architecture
1.4.1. Wireless Sensor Network Architecture
1.4.2. Energy Consumption Factors in WSNs
1.4.2.1. Collisions
1.4.2.2. Idle Listening
1.4.2.3. Overhearing
1.4.2.4. Overmitting
1.4.2.5. Control Packets Overhead
1.4.2.6. Network Protocols
1.4.2.7. Attacks and Security Issues
1.4.2.8. Cryptography and Security Solutions
1.5. Application Domains of Sensor Networks
1.5.1. Military Applications
1.5.2. Security and Safety Related Applications
1.5.3. Medical Applications
1.5.4. Environmental Applications
1.5.5. Commercial Applications
1.5.6. Cold Chain Monitoring System
1.5.6.1. Issues and Challenges
1.5.6.2. Needs and Operating Principles

1.6. Routing Mechanisms for WSN Cold Chain Monitoring System
1.6.1. Introduction
1.6.2. Backgrounds and Related Works
1.6.3. Routes Selection Criteria
1.6.3.1. Remaining Energy Level
1.6.3.2. Sensor Proximity with Respect to the Base Station (Proximity-BS)
1.6.3.3. Degree of Connectivity
1.6.3.4. LQI: Link Quality Indicator
1.6.3.5. Composite or Hybrid Metric
1.6.4. Routing Mechanisms
1.6.4.1. Simple Routing
1.6.4.2. Round Robin Routing
1.6.4.3. Weighted Round-Robin Routing (W2R routing)
1.7. L2RP: The Link Reliability Based Routing Protocol
1.8. Routing Protocol Performance Criteria
1.8.1. Average Ratio of the Remaining Energy
1.8.2. Average Path Lengths
1.8.3. LIF: Load Imbalance Factor
1.8.4. Network Lifetime
1.8.5. Average Percentage of Lost Packets
1.9. L2RP Routing Protocol Performance Evaluation Model
1.9.1. Energy Consumption Model
1.9.2. Network Deployment and Performance Evaluation Parameters
1.9.3. LQI Model for Performance Evaluation Purposes
1.10. L2RP Routing Protocol Performance Evaluation
1.10.1. Average Path Length
1.10.2. LIF: Load Imbalance Factor
1.10.3. Average Percentage of Packet Losses
1.10.4. Composite or Hybrid Metric
1.10.5. Average Network Lifetime
1.10.6. Average Ratio of the Remaining Energy
1.10.7. Impacts of Increasing the Number of Achtophorous Nodes
1.10.8. Impacts of the Unreliability of Wireless Links
1.11. Energy Over-Consumption Induced by Securing Routing Operations
1.11.1. Introduction and Backgrounds
1.11.2. Energy Over-Consumption Induced by Adding an Integrity Key to L2RP
1.12. Conclusions
Acknowledgements
References

 

 

2. Connectivity Recovery and Augmentation in Wireless Ad Hoc Networks


2.1. Introduction
2.2. Articulation Nodes and Bridges
2.2.1. Definitions and Terms
2.2.2. Location of Articulation and Bridges
2.2.3. Locating Articulations and Bridges in Wireless Ad Hoc Networks
2.3. Cooperative Communication
2.4. Connectivity Recovery
2.5. Connectivity Augmentation
2.6. Conclusion
References

 

 

3. QoS Routing in Ad Hoc Network


3.1. Introduction
3.2. Routing in Ad Hoc Network
3.3. Usual Metrics
3.3.1. Hop-Count Metric
3.3.2. Delay-Based Metrics
3.3.3. ETX Metric
3.3.4. BER-Based Metric
3.3.5. Retransmission-Based Metric
3.4. Taking Into Account the Quality of Links in the Choice of Route
3.5. Conclusion
Acknowledgements
References

 

 

4. A Knowledge-Based Modeling and Simulation Approach for the Management of Sensor Networks


4.1. Introduction
4.2. Related Work
4.2.1. Modelling and Simulation Tools for Sensor Networks
4.2.2. Environment Representation
4.2.3. Spatial Behaviours and Knowledge Management
4.3. Generation of Informed Virtual Geographic Environments
4.3.1. GIS Input Data Selection
4.3.2. Spatial Decomposition
4.3.3. Map Unification
4.3.4. Informed Topologic Graph
4.4. From Semantic Information to Environment Knowledge
4.4.1. Environment Knowledge
4.4.2. Inference Engine
4.4.3. Mapping Knowledge Using Environment Knowledge and Inference Engine
4.5. From Environment Knowledge to Spatial Behaviors
4.5.1. Agent Archetypes
4.5.2. Action Archetypes
4.6. A Knowledge-Based Approach
4.6.1. Agent-Based Simulation Using Informed Virtual Geographic Environments
4.6.2. Spatio-Temporal Knowledge
4.6.2.1. Representation Formalism
4.6.2.2. Knowledge Categories
4.7. Case Study: Simulation of a Sensor Network for Weather Monitoring
4.8. Discussion
4.9. Conclusion and Future Perspectives
Acknowledgements
References
 

 

Security


5. Reference Monitor-based Security Framework for Trust in Mobile Agent Computing


5.1. Introduction
5.2. Background Study
5.3. Reference Monitor Based Security Framework
5.4. Integration and Evaluation of RM-Agent
5.4.1. Distribution and Integration of RM-Agent into an AP
5.4.2. Verifying Authenticity and Integrity of RM-Agent
5.4.2.1. Authentication and Integrity Checking Protocol (AICP)
5.5. Experiments and Results
5.6. Conclusions and Future Work
References

 

 

6. Risk Assessment Considering Configuration of Hybrid Cloud Computing


6.1. Introduction
6.2. Overview of Hybrid Cloud Computing Configuration
6.2.1. Reference Model of Cloud Computing
6.2.2. Hybrid Cloud Computing
6.2.3. Related Work
6.3. Risk Identification and Analysis: Qualitative Risk Analysis of Hybrid Cloud Computing Configuration
6.3.1. Risk Identification: Extraction of Risk Factors in Hybrid Cloud Computing Configuration
6.3.2. Risk Analysis: Qualitative Analysis of Risk Factors in Hybrid Cloud Computing Configuration
6.3.2.1. Risk Analysis Method
6.3.2.2. Risk Analysis Result from Qualitative Viewpoint
6.3.2.3. Summary of Risk Analysis Results
6.4. Risk Evaluation: Quantitative Risk Evaluation of Hybrid Cloud Computing Configuration
6.4.1. Risk Formula
6.4.1.1. Approximation of Asset Value
6.4.1.2. Approximation of Threat Value
6.4.1.3. Approximation of Value of Vulnerability
6.4.2. Calculation of Risk Value
6.4.3. Discussion
6.5. Conclusion and Future Work
Acknowledgements
References

 

 

7. The Mathematical Modeling of Road Transport in Context of Critical Infrastructure Protection


7.1. Introduction
7.2. Critical Infrastructure
7.2.1. The Cross-Cutting Criteria
7.2.2. The Sectoral Criteria
7.3. Critical Road Infrastructure
7.4. Mathematical Models of Road Transport
7.4.1. Macroscopic Model
7.4.2. Macroscopic Model
7.5. The Use of Dynamic Modeling of the Impacts of Road Transport
7.6. Conclusion
Acknowledgements
References

 

 

8. The Assessment of the Soft Targets


8.1. Introduction
8.2. Methodology of the Solving
8.2.1. Deming’s Circle Methodology
8.2.2. Processes Management
8.2.3. Crisis Escalation
8.2.4. Failure Mode and Effect Analysis
8.3. The Proposed Static Assessment
8.4. The Proposed Dynamic Assesment
8.5. The Proposal of the Preventive Actions
8.6. Conclusions
Acknowledgements
References

 

 

Communications


9. Performance Analysis of Quadrature Amplitude Modulation Schemes in Amplify-and-Forward Relay Networks over Rayleigh Fading Channels


9.1. Introduction
9.2. System Model
9.3. ASER Performance Analysis
9.3.1. ASER of General Order RQAM for MRC Scheme
9.3.2. ASER of General Order XQAM for MRC Scheme
9.3.3. ASER of General Order XQAM for BRS Scheme
9.4. Numerical and Simulation Results
9.5. Conclusion
Acknowledgements
References

 

 

10. High-Gain Low-Cost Microstrip Antennas and Arrays Based on FR4 Epoxy


10.1. Introduction
10.2. The Studied Methods
10.3. Parameter Study and Performance Comparison
10.4. Design Examples
10.5. Conclusions
References

 

 

11. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks


11.1. Introduction
11.1.1. Motivation Towards Small Cells
11.1.2. Challenges of Vehicular Environment
11.2. Related Work
11.2.1. LTE Vehicular UEs Penetration Loss
11.2.2. Vehicular UEs Performance
11.2.3. Small Cells Interference
11.3. Mobile Femtocell Technology
11.4. Vehicular UEs Performance Analysis in LTE Networks
11.4.1. System Model
11.4.2. Results and Discussion
11.5. Interference Management for Co-Channel and Co-Tire Femtocells Technology
11.5.1. Coverage Optimisation
11.5.2. Transmission Power Control
11.5.3. The Proposed Interference Management Scheme
11.5.4. The Proposed Scheme (System Performance Analysis)
11.5.5. Results and Discussion
11.6. Conclusions and Further Work
11.6.1. Conclusion
11.6.1.1. Performance Evaluation
11.6.1.2. Interference Management Evaluation
11.6.2. Future Work
References

 

 

12. The Buffer Delay Correction Algorithm for VoIP Communication


12.1. Background
12.2. Theatrical Aspects of De-Jitter Buffer
12.3. Buffer Delay Correction Algorithm (BDCA)
12.4. Implementation and Results
12.5. Conclusion
References

 

 

13. Opportunistic Max2-Degree Network Coding for Wireless Data Broadcasting


13.1. Introduction
13.1.1. Motivation and Related Work
13.1.1.1. WDNC Based WBC
13.1.1.2. IDNC Based WBC
13.1.2. Contributions
13.2. System Model and Parameters
13.2.1. Mathematical Description
13.2.1.1. Signal Transmission
13.2.1.2. Signal Reception
13.2.2. Assumptions
13.3. The Proposed OM2DNC Based WBC Protocol
13.3.1. OM2DNC Strategy
13.3.2. Joint Network-RSC Decoding
13.4. Performance Analysis
13.5. Simulation Results
13.6. Conclusions
References

 

 

14. Analytical Model for Vehicular Mobility: A Microscopic Approach


14.1. Introduction
14.2. Communication Patterns
14.3. Information Dissemination
14.4. Vehicular Mobility Models
14.5. Network Architecture
14.6. Microscopic Analysis
14.6.1. Joint Poisson Spatial Distribution
14.6.1.1. Two-Lane Highway
14.6.1.2. K-Lane Highway
14.6.2. Conditional Probability of Number of Vehicles
14.6.2.1. Two-Lane Highway
14.6.2.2. Three-Lane Highway
14.6.3. Conditional Expected Number of Vehicles
14.6.3.1. Two-Lane Highway
14.6.3.2. Three-Lane Highway
14.6.3.3. K-Lane Highway
14.6.4. Tail Probability of Number of Vehicles
14.6.4.1. Two-Lane Highway
14.6.4.2. Three-Lane Highway
14.7. Conclusions and Future Work
References

 

 

15. USRP-based Implementations of Various Scenarios for Spectrum Sensing


15.1. Introduction
15.2. Theoretical Aspects
15.2.1. Energy Detection
15.2.1.1. System Model
15.2.1.2. Conventional Energy Detector
15.2.1.3. Energy Detection with Uncertainty
15.2.2. Eigenvalue Based Detection
15.2.2.1. Maximum-Minimum Eigenvalue (MME) Detection Method
15.2.2.2. Energy with Minimum Eigenvalue (EME) Detection Method
15.2.2.3. Cooperative Spectrum Sensing
15.2.2.4. Soft Data Fusion
15.2.2.5. Hard Decision Fusion
15.3. Experimental Setup
15.3.1. GNU Radio
15.3.2. GNU Radio Blocks
15.3.3. Results
15.3.3.1. Simulation Results
15.3.3.2. Experimental Results for Single Energy Detector
15.3.3.3. Eigenvalue Based Spectrum Sensing
15.3.3.4. Cooperative Spectrum Sensing Results
15.4. Conclusions
Acknowledgements
References


Index

 

 

Buy this print book:

 

 

See other books published by IFSA Publishing

Sensors Web Portal's logo

 

 

 

 

 

 

 

   


1999 - 2018 Copyright ©, International Frequency Sensor Association (IFSA). All Rights Reserved.


 

Home - Bookstore - Sensors & Transducers journal - IFSA Privacy Policy