Medium 9781601323712

Wireless Networks: The 2016 International Conference Proceedings

Views: 87
Ratings: (0)

WorldComp is an international conference that serves researchers, scholars, professionals, students, and academicians who are looking to both foster working relationships and gain access to the latest research results. It is being held jointly (same location and dates) with a number of other research conferences; namely, The 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'16). The Congress is among the top five largest annual gathering of researchers in computer science, computer engineering and applied computing. We anticipate to have attendees from about 85 countries/territories.

List price: $49.95

Your Price: $39.96

You Save: 20%

Remix
Remove
 

6 Slices

Format Buy Remix

SESSION Ad-Hoc Networks and Applications

PDF

Int'l Conf. Wireless Networks | ICWN'16 |

1

SESSION

AD-HOC NETWORKS AND APPLICATIONS

Chair(s)

TBA

ISBN: 1-60132-440-5, CSREA Press ©

2

Int'l Conf. Wireless Networks | ICWN'16 |

ISBN: 1-60132-440-5, CSREA Press ©

Int'l Conf. Wireless Networks | ICWN'16 |

3

Scaling Properties of Minimal Spanning Trees in Simulated Ad Hoc

Wireless Networks

K. A. Hawick

Computer Science, University of Hull, Cottingham Road, Hull HU6 7RX, UK.

Email: k.a.hawick@hull.ac.uk, Tel: +44 01482 465181 Fax: +44 01482 466666

April 2016

ABSTRACT

Ad hoc networks of sensors or other deployable and mobile devices can have surprisingly complex emergent properties arising from combinations of individual interactive effects. We simulate such systems over a range of sizes of network and generate Minimal Spanning Tree connections between nodes. We analyse the scaling properties such as: the total arc length of the generated tree; the all-pairs average path-lengths; the betweenness centrality and its ranking amongst connected nodes; and the number of through-vertices; all as the network size is varied. We find various power-laws describing the scaling behaviour and suggest some relationships between these and the embedding spatial dimension. We discuss the scalability of network properties; the utility of these analysis methods; and their potential applicability to real world problems for sensor and mobile device networks.

 

SESSION Wireless Sensor Networks and Related Topics

PDF

Int'l Conf. Wireless Networks | ICWN'16 |

27

SESSION

WIRELESS SENSOR NETWORKS AND RELATED

TOPICS

Chair(s)

TBA

ISBN: 1-60132-440-5, CSREA Press ©

28

Int'l Conf. Wireless Networks | ICWN'16 |

ISBN: 1-60132-440-5, CSREA Press ©

Int'l Conf. Wireless Networks | ICWN'16 |

29

Wormhole Attack Detection in Wireless Sensor

Network using Discrete Wavelet Transform

Mohammad Nurul Afsar Shaon and Ken Ferens

Department of Electrical and Computer Engineering

University of Manitoba

Winnipeg, Manitoba, Canada

{shaonmna@myumanitoba.ca, ken.ferens@umanitoba.ca}

Abstract— The Wormhole attack is a critical and challenging security threat for wireless sensor networks

(WSNs). Although launching a wormhole attack is a relatively trivial task for the attacker, detecting it from an infected WSN is a tough job, because it can be launched from a compromised legitimate node. In recent years, signal processing methods, like the short term Fourier transform (STFT) and wavelet transform (WT) have been applied to find anomalies in computer network traffic [1]. According to the literature, the

 

SESSION Wireless Networks and Mobility + Security and Data Protections Issues

PDF

Int'l Conf. Wireless Networks | ICWN'16 |

49

SESSION

WIRELESS NETWORKS AND MOBILITY +

SECURITY AND DATA PROTECTION ISSUES

Chair(s)

TBA

ISBN: 1-60132-440-5, CSREA Press ©

50

Int'l Conf. Wireless Networks | ICWN'16 |

ISBN: 1-60132-440-5, CSREA Press ©

Int'l Conf. Wireless Networks | ICWN'16 |

51

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Isamu Shimada1 and Hiroaki Higaki1

1 Tokyo Denki University, Japan

Abstract— In wireless multihop communication, data messages are transmitted from a source wireless node to a destination one along a wireless multihop transmission route consisting of a sequence of intermediate wireless nodes.

Each intermediate wireless node forwards data messages to its next-hop wireless node. Here, a wireless signal carrying the data message is broadcasted by using an omni antenna and it is not difficult for a eavesdropper wireless node to overhear the wireless signal to get the data message.

 

SESSION Wireless Networks and Novel Applications

PDF

Int'l Conf. Wireless Networks | ICWN'16 |

93

SESSION

WIRELESS NETWORKS AND NOVEL

APPLICATIONS

Chair(s)

TBA

ISBN: 1-60132-440-5, CSREA Press ©

94

Int'l Conf. Wireless Networks | ICWN'16 |

ISBN: 1-60132-440-5, CSREA Press ©

Int'l Conf. Wireless Networks | ICWN'16 |

95

Implementation of EAX Mode of Operation within a

Real-Time Android Chatting Application

Levent Ertaul, Nikhitha Vadla Konda, Dharani G Ramasamy

CSU East Bay, Hayward, CA, USA levent.ertaul@csueastbay.edu, nvadlakonda2@horizon.csueastbay.edu, dgobichettypalayamramasamy@horizon.csueastbay.edu

Abstract— SMS has been a widely used data application till today, availing two-end users to share any information traditionally. Android chatting application helps the users to send and receive textual messages to and from other android mobile devices. Secrecy of messages was achieved through encryption but authentication was still pertain and the information shared was prone to several attacks either be eavesdropped or say identity theft. In order to facilitate a secure environment, this paper proposes one of the block-cipher modes of operation, EAX. The primary objective of this application mainly accounts on the implementation of EAX mode of operation within a real-time chatting application to ensure authenticated encryption. The JAVA programming language is used to implement the application with PHP language at the server-side connected to the SQLYog, a GUI tool for MySQL database that runs on the tomcat server. Finally, the performance analysis is calculated to demonstrate the efficiency and suggestions are made to improve the message security in the android application.

 

SESSION Poster Papers

PDF

Int'l Conf. Wireless Networks | ICWN'16 |

133

SESSION

POSTER PAPERS

Chair(s)

TBA

ISBN: 1-60132-440-5, CSREA Press ©

134

Int'l Conf. Wireless Networks | ICWN'16 |

ISBN: 1-60132-440-5, CSREA Press ©

Int'l Conf. Wireless Networks | ICWN'16 |

135

Spectrum Sensing using USRP SDRs and

Convolutional Neural Networks

Benjamin Neel, Samuel North, Marc Messier, Birsen Sirkeci-Mergen

Electrical Engineering Department, San Jose State University, San Jose, CA, USA

Keywords: Cognitive radios, convolutional neural networks, spectrum sensing, software-defined radios.

sample rate of 1MHz, and an FFT size of ¾ MHz. This was automatically trimmed by the usrp_spectrum_sense.py script

(GNU Radio) to remove distortion at the edges of the FFT range. The script was modified so that the artificial DC components introduced by the USRP SDRs are automatically removed. We store the current time, frequency of the current

 

SESSION Late Breaking Papers

PDF

Int'l Conf. Wireless Networks | ICWN'16 |

137

SESSION

LATE BREAKING PAPERS

Chair(s)

TBA

ISBN: 1-60132-440-5, CSREA Press ©

138

Int'l Conf. Wireless Networks | ICWN'16 |

ISBN: 1-60132-440-5, CSREA Press ©

Int'l Conf. Wireless Networks | ICWN'16 |

139

Estimating the Security of a Wireless Sensor Network

Cheryl V. Hinds 1, Jonathan M. Graham2

1

Computer Science Department, Norfolk State University, Norfolk, Virginia, U.S.A.

2

Computer Science Department, Norfolk State University, Norfolk, Virginia, U.S.A.

Abstract - Wireless Sensor Networks (WSN) are networks which can consist of hundreds of sensor nodes which monitor an environment and report readings to a base station. The sensor nodes are subject to attack and because of the unattended nature of these networks and the resource constraints, detecting compromised nodes is a challenge.

Because of the importance of these networks, finding efficient ways to detect node compromise is crucial to ensure the overall security of these networks.

 

Details

Print Book
E-Books
Slices

Format name
PDF
Encrypted
No
Sku
BPP0000226314
Isbn
9781601323712
File size
8.33 MB
Printing
Allowed
Copying
Allowed
Read aloud
Allowed
Format name
PDF
Encrypted
No
Printing
Allowed
Copying
Allowed
Read aloud
Allowed
Sku
In metadata
Isbn
In metadata
File size
In metadata