Vol 2 No 4
Vol 2 No 4
Vol 2 No 4
Abstract: The development of multimedia propagations and The reality shows that, for each second of the movie, the
applications has led to a greater expansion in the field of video requirement be at least 27MB of memory; as a result, the
transmission over a heterogeneous media as well as iterative entire movie will need almost 162GB of memory. If this
delivery platforms with dedicated content requirements. It is movie were stored on DVD’s, then considered the current
known that conventional video coding systems encode video DVD capacity of 4.7 GB, would roughly require 35 DVD’s.
content with given bitrates adapted to a specific function or Therefore, video needs to be compressed considerably for
application. As a result, conventional video coding does not meet
efficient storage and sharing over the web [1]
the fundamental requirements of the state-of-the-art flexible
digital media application. The newly technology based on
However, there are a lot of redundancies within the video
scalable video coding appears as a new modus operandi that has data that can be eliminated yielding file size reduction or
the ability to satisfy the underlying requirements. In this work, compression.
a multi-users scenario was considered for an optimum
performance between multiple streams. A rate distortion 2. H.264/AVC Scalable Video Coding
optimized video frame dropping strategy which can be applied
on active network nodes during high traffic intensity was 2.1 Basic H.264/AVC structure
developed. The concept of scalability here, come to introduce the
operability of high level of suppleness coding and decoding The H.264/AVC standard has a range of coding tools
systems. A base layer which can display the suitable quality of contributing to its high compression performance, flexibility
the premium file was considered and take care of the and robustness. However, the performance improvements
improvement of video quality. come at a cost of significantly high computational
Keywords: Bitrates, PSNR, bandwidth, multi-users scenario complexity. Therefore, encoder implementations should
and RDO. make use of the available coding tools effectively to achieve
the desired compression performance with the available
1. Introduction processing resources.
H.264/AVC is an extremely scalable video codec,
The past few decades, starting in the early nineties, a delivering excellent quality across the entire bandwidth
remarkable development has been achieved in the field of spectrum, from high definition television to the video
video compression. A lot of efforts were and still are being conferencing and 3G mobile multimedia. The following can
exerted for compressing, storing data in digital medium and thusly be summarized as the important differences.
allocation over the web. • Enhanced motion prediction capability
It is very crucial to have the idea of monochrome digital
• Use of a small block-size exact match transform
video data sequence which is a set of individual pictures
• Adaptive in-loop deblocking filter
called frames happening at predetermined time increments.
• Enhanced entropy coding methods
This frame needs to be considered as a light intensity of two
dimensions in terms of function of variable x and y; f(x, y),
where x and y denote special coordinates and the value off at
any point (x, y) is proportional of the brightness of the frame
or the gray level at the point for monochrome. The normal
standard speed at which these frames are displayed is 30
frames per second.
This representation is called canonical representative.
However, this canonical representation has negative impact
because it needs very huge amounts of memory, resulting in
impracticality of being stored or shared on the web or to be
launched into digital channel. The fact may seem as an
amusing game when we try to illustrate how it could be
done. Figure 1. H.264/AVC structure
The clear picture is an example of a 100 minutes movie
2.2 Scalable Video Coding
displayed at 30 frames per second with width of frame
640x480 pixels with each pixel taking 3 bytes of memory.
2 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Scalable video coding is desirable in heterogeneous and Rate-distortion Optimisation (RDO) methods used in video
error-prone environments for various reasons. For example, compression are discussed in [6] [2], which include dynamic
scalable coding helps streaming servers avoid congestions in programming and Lagrange optimisation methods.
network by allowing the server to reduce the bitrate of A Lagrange optimisation method, which is also known as
bitstreams whilst still transmitting a useable bitstream. Lagrange multiplier method, offer computationally less
One application for scalability is to improve error complex (although sometimes sub-optimal) solutions to the
resilience in transport systems that allow different qualities optimisation problem was proposed. Due to its less complex
of service. nature, a specific form of the Lagrange optimisation method
For example, the essential information could be delivered has been used in rate-distortion optimisation of H.264/AVC
through a channel with high error protection. Scalability can [10].
also be used to enable different quality representations
depending on playback devices processing power. 3.2 Constrained Optimisation Problem
Devices with better processing power can decode and
display the full quality version, whereas devices having The objective function within source constraints is
lower processing power decode the lower quality version. minimized or maximized by the constrained optimization.
In the case here of video coding standards, this issue of
2.3 Types of SVC
constrained optimization can be considered as reducing the
There are three conventional types of scalability: temporal, amount of distortion of a given video sequence meaning to
quality and spatial. Temporal scalability enables adjustment strive looking to increase the number of bits that can be
of picture rate. encoded in exactly that particular coding sequence[4].
a) This is commonly carried out with either disposable Below is the mathematical representation of the constrained
pictures or disposable sub-sequences, which are optimization unit;
explained later on. Picture rate adjustment is then Let S represent all the allowable vectors and let B an
simply done by removing these disposable parts element of S, (BЄS). The objective function is defined for all
from the coded sequence thus lowering the frame B in S as D(B) and the constraint function R(B) is defined
rate. for all B in S . The constrained problem can be presented as:
b) In conventional quality scalability, also known as Given a constraint Rc, find
SNR scalability, an enhancement layer is achieved
with pictures having finer quantizers than the
particular picture in the lower reference layer[3]. BЄS
In coarse-granularity quality scalability, pictures in Subject to
enhancement layers may be used as prediction
references and therefore all the enhancement layer
pictures in a group of pictures typically have to be
disposed as a unit. In fine granularity scalability, The solution (BЄS*) to the problem satisfies that R (B*) ≤
the use of enhancement layer pictures as prediction Rc and D (B*) ≤D (B) for all B
sources is limited and therefore finer steps of In S*, where
bitrate can be achieved compared to coarse-
granularity scalability.
c) Finally, spatial scalability is used for creation of
multi-resolution bitstreams to meet different That is, if the solution to the problem is B*, then there is
display requirements or constraints and is very no other B in S which satisfies the constraint Rc, that will
similar to SNR scalability [5]. result in a smaller value for the objective function than D
A spatial enhancement layer enables recovery of coding loss (B*). The Lagrange multiplier theory offers a way of
between an up-sampled version of the reconstructed layer solving the above constrained problem (i.e. finding B*) by
used as a reference by the enhancement layer and a higher representing the problem as an unconstrained problem [3].
resolution version of the original picture.
3.3 Major Theorem
3. Rate Distortion Optimization
The constrained optimisation problem was presented earlier
3.1 Lagrangian multiplier method in previous section, equation (2). The Lagrange theory
represents the constrained problem as an unconstrained
In H.264/AVC, it is the art of the encoder to have the ability problem as follows:
of having the effective way of encoding a given video Theorem: for any λ≥0, the solution B*(λ) to the
sequence by selecting among numerous ranges of modes and unconstrained problem
parameters.
The encoder targets to achieve optimum rate distortion
performance by choosing the best of modes and parameters
of a given video. Doing this, the encoder would be looking
to minimize distortion in a sequence of particular video. This is considered as solution of the constrained problem in
(1) presenting Rc = R (B* (λ)) as the constraint.
Proof of the theorem
(IJCNS) International Journal of Computer and Network Security, 3
Vol. 2, No. 4, April 2010
Therefore,
3.4 Optimisation problem Objective video quality measurements are used to measure
the video quality, typically in situations where fast
Consider a macroblock, for which the encoder can encode (sometimes online) and repeatable measurements of the
the macroblock using only one of the ‘K’ possible modes distortion or the difference between the video under test and
given by the set m = {m1,, m2, … , mK }. Let ‘M’ (M Єm) be a reference video are needed [7].
the mode selected to code the macroblock. In the context of
H.264/AVC, these mode allocations could be any allowable 4.2 PSNR
combination of macroblock partition modes, Quantisation
Parameters (QP), choice of reference frames etc… so that The Peak Signal to Noise Ratio (PSNR) is the most
the K possible modes will include all the possible admissible commonly used objective measure of video quality. PSNR is
parameter combinations for the measured as follows:
Macroblock
Define the objective function D(M) and constraint
function R(M) , where D(M) and R(M) are distortion and
rate of the macroblock as a result of selecting a particular
coding mode. If the rate constraint is Rc, the constraint Where n is the bit depth and MSE is the Mean Squared
problem is defined as: Error between corresponding pixel values of the original
Find the coding mode M*, image and the current image of the sequence under test. For
M × N array of pixels, MSE is given by:
Subject to
5. Implementation
4 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
For the objectives to be achieved, software video simulation Based on Lagrangian Cost Function, if a video frame is to
tool JSVM was used to implement and test the algorithms. be sent on the outgoing link, it is first placed in the output
There are plenty and different H.264/AVC reference buffer. Note that, for simplicity, we don’t consider the buffer
software. JSVM was chosen for this research due to its limitations for the simulations in here.
flexibility of varying parameters. If the outgoing link cannot accommodate all the video
JSVM codec is commonly used to test new algorithms in packets, it will first drop the additional enhancement PR
the video community. The use of this reference software slices one by one. If the link is still overloaded, the spatial
enables realistic comparison of the performance of different enhancement layers are dropped next in the same spirit, i.e.,
algorithms developed by different researchers. The source scale out the enhancement layers completely sticking only to
code is mainly the same as the one used in the C the base layer. The optimized SVC offers better quality than
programming language [8]. the unoptimized SVC one
6. Results analysis
Football 37.2356 37.0052 36.2545 36.5485 "Complexity Reduction of H.264 using Lagrange
Optimization Methods," IEE VIE 2005, Glasgow, 4~6
Flower 40.3215 39.0235 37.5468 37.6256
April, 2005.
Claire 36.2597 36.4566 31.2564 32.2564 [2] H. Kim and Y. Altunbasak, "Low-complexity
Carphone 41.3255 38.4552 38.2545 39.2545 macroblock mode selection for H.264/AVC encoders,"
presented at International Conference on Image
Processing, Singapore, 2004.
[3] K. P. Lim, "JVT -I020, Fast INTER Mode Selection."
7. Recommendations San Diego: ISO/IEC MPEG and ITU-T VCEG Joint
Video Team, 2003.
Although the video coding standards exhibit acceptable [4] X. Li. Scalable video compression via over complete
quality-compression performance in many visual motion compensated wavelet coding. Signal Processing:
communication applications, further improvements are Image Communication, special issue on
desired and more features need to be added, especially for subband/wavelet interframe video coding, 19:637—651,
some specific applications. The important considerations August 2004.
for video coding schemes to be used within future networks [5] S.-R. Kang, Y. Zhang, M. Dai, and D. Loguinov, \Multi-
could be bases on Compression efficiency, robustness with layer active queue management and congestion control
respect to packet loss, adaptability to different available for scalable video streaming," in Proc. IEEE ICDCS,
bandwidths and adaptability to memory and computational Tokyo, Japan, Mar. 2004, pp. 768{777}.
power for different clients. [7] T. Oelbaum, V. Baroncini, T. K. Tan, and C. Fenimore,
Several other communication and networking issues are also “Subjective quality assessment of the emerging
relevant, such as scalability, robustness, and interactivity. AVC/H.264 video coding standard,” International
A network with a single active node was considered, in our Broadcasting Conference (IBC), Sept., 2004.
simulations. This could be further enhanced to more [7] R. Leung and D. Taubman. Impact of motion on the
practical situations with a hierarchy of many active network random access efficiency of scalable compressed video.
nodes and perform rate shaping at every node accordingly. Proc. IEEE Int. Conf. Image Processing, 3:169—172,
Different values for the Lagrangian multiplier λ could be September 2005.
modeled for more stringent buffer conditions. A reasonable [8] R. Leung and D. Taubman. Perceptual mappings for
value for λ can be determined in maximizing the visual quality enhancement in scalable video
Lagrangian cost function, since λ is determined as a compression. Proc. IEEE Int. Conf. Image Processing,
function of buffer fullness. 2:65—68, September 2005.
The scalable video coding approach could be further [9] R. Leung and D. Taubman. Transform and embedded
extended to MCTF based scalable video codec which coding techniques for maximum efficiency and random
employs an open-loop architecture. accessibility in 3-D scalable compression. IEEE Trans.
Image Processing, 14(10):1632—1646, October 2005.
8. Conclusion [10] R. Leung and D. Taubman. Minimizing the perceptual
The choice of a Scalable Video Coding framework in this impact of visual distortion in scalable wavelet
context brings technical and economical advantages. Under compressed video. Proc. IEEE Int. Conf. Image
this framework, network elements can adapt the video Processing, October 2006.
streams to the channel conditions and transport the adapted [11] R. Leung and D. Taubman. Perceptual optimization for
video streams to receivers with acceptable perceptual scalable video compression based on visual masking
quality. The advantages of deploying such an adaptive principles. IEEE Trans. Circuits Syst. Video Technol.,
framework are that it can achieve suitable QoS for video submitted in 2006.
over wired and wireless networks, bandwidth efficiency and [12] T. Wedi and Y. Kashiwagi, “Subjective quality
fairness in sharing resources [11]. evaluation of H.264/AVC FRExt for HD movie
The adaptive scalable video coding technology produces content,” Joint Video Team document JVT-L033, July,
bitstreams decodable at different bitrates, requiring 2004.
different computational power and channel bitrate. In [13] ISO/IEC JTC 1/SC 29/WG 11 (MPEG), “Report of the
addition, the bitstream is organized with a hierarchical formal verification tests on AVC/H.264,” MPEG
syntax that enables users to easily extract only a subpart of document N6231, Dec., 2003 (publicly available at
the data contained in the bitstream and still being able to http://www.chiariglione.org/mpeg/quality_tests.htm).
decode the original input video but at a reduced spatial [14] T. Schierl, T. Stockhammer and T. Wiegand, "Mobile
resolution or frame rate. This process can be applied Video Transmission using Scalable Video Coding
recursively, that is, once a new bit stream is extracted out of (SVC)," IEEE Trans. On Circuits and Systems for
the original, it can undergo successive extractions Video Technology, Special issue on Scalable Video
corresponding to always lower resolutions. Coding, scheduled June 2007.
[15] S. Wenger, Y.-K. Wang and T. Schierl, “Transport and
References Signaling of SVC in IP networks,” IEEE Transactions
on Circuits and Systems for Video Technology, Special
[1] C. S. Kannangara, I. E. G. Richardson, M Bystrom, J. issue on Scalable Video Coding, scheduled for: March
Solera, Y. Zhao, A. MacLennan & R. Cooney, 2007.
6 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
2
Indian Institute of Techmology
CBME Delhi, India
3
Indian Institute of Techmology
CBME Delhi, India
3. Proposed Model
Figure 1 presents the complete fetal circulatory system and
its equivalent Markov chain in figure 2. The mostly (8)
problems related to node Ia are Intrauterine Growth
Restriction (IUGR) and preeclampsia [5 ]. These are due to And
high blood pressure, diabetes, infection, kidney disease, P1(s) = p1(s+ gv) + gv p1/(s+ gv)(s+ u1 + u2)- gv (u1 +
heart or respiratory disease, alcohol, drugs and cigarette u2) (9)
smoking ( figure 3) which may lead to fetal hypoxia, fetal
death, low birth weight, placenta abruption (figure 4)[5]. P1(t) = (p1- p0)gv / (u1 + u2 )+ p1 (u1 + u2 - gv )/
The problems related to Umbilical Cord i.e. node II are two (u1 + u2 )e- (u1 + u2) t (10)
vessels, long cord, nuchal cord and short cord figure 5. The
node Ib and node III are less significant in fetal circulation
and are ignored. The modified nodes representation of the
fetal circulation system and is equivalent signal flow graph
is shown in figure 6. In term of mathematical model as
described by the Markov Model [7], node I represents full of
oxygen rich blood toward mother side and node II represents
the fetus side. Umbilicus cord connects the two nodes.
(1)
flow of Doppler FVW taken from the paper [5], it shows the impedance measurement derived using two tetrapolar
same blood flow pattern as actual. The figures 14(a) show probes of different sizes”, Biomedical Engineering ,pp
the simulated blood flow while 14(b) the actual flow. 1-7,2006.
[4] R.J Halter,., A. Hartov,., J.A. Heaney, K.D. Paulsen,.
A.R. Schned,., “Electrical Impedance Spectroscopy of
the Human Prostate”, IEEE Transactions on Biomedical
Engineering, pp 1321-1327 , 2007.
[5] A. Gaysen , S. K. Dua, A. Sengupta and Nagchoudhuri
, “ Effect of Non-Linearity Doppler Waveforms
Through Novel Model”, Biomedical Engineering
Online, pp1-13,2003.
[6] A S Gordon ,, J Strauss and G A Misrahy, “ Electrical
Impedance of Isolated Amnion”, Biophysical Journal,
,pp 855-865,2000.
(a)
[7] G. D. Clifford, F. Azuaje, P.E. McSharry , “Advanced
Methods and Tool for ECG Data Analysis”, Artech
House, pp 295-300 , 2006 .
[8] Guyton, Textbook of Medical Physiology, Eight
Editions, 1991.
[9] Ross and Wilson, Anatomy and Physiology in Health
and Illness, Tenth Edition , 2006.
[10] T. Erkinaro , “Fetal and Placental Haemodynamic
Responses to Hypoxaemia , Maternal and Vasopressor
Therapy in a Chronic Sheep Mode” l, Acta University ,
(b) pp-1-96, 2006.
Figure 14. Comparison of the flow of blood between result [11] J. C. Huhta , “ Fetal congestive heart failure” Seminars
from model and with actual flow, (a) Flow of blood response in Fetal & Neonatal Medicine 10, pp 542-552 , 2005.
of Markov model (b) Actual blood flow: A frame extracted [12] F. Kovacs, M. Torok, and I.Habermajer , “A Rule-
from Doppler FVW [5] Based Phonocardiographic Method for Long-Term
Fetal Heart Rate Monitoring” , IEEE Transactions on
5. Conclusion Biomedical Engineering , pp 124-130 , 2000.
The blood flow timing between the placenta-fetus and fetus - Authors Profile
placenta is given by the equation 8 and 10 respectively and
simulated using LabVIEW software. The flow is exponential Sarwan Kumar received the BTech and MTech degrees in
which shows that the umbilical cord structure (vein and Electrical Engineering from Regional Engineering College
arteries) acts as a capacitor in parallel to resistance. Time Kurukshetra in 1992 and 1997, respectively. He is associate
professor at National Institute of Technology Jalandhar. Now he is
taken by the blood to reach fetus is increases as conductivity
pursuing PhD from IIT Delhi, India under the guidance of
decreases. Also the time increases in case of lass quantity of
professors Sneh Anand IIT Delhi and Dr. Amit Sengupta, ,
blood is available due to uterine contractions, knot or any Consulting Obstetrician & Gynecologist (CHS), Mumbai.
other reason. The simulated results show the larger settling
time in case of short length. On the blood flow; it would be
useful to assist in developing a sensor for the evaluation of
conductivity of the umbilical cord and placenta during
pregnancy for the well-being of fetus. We are developing a
stand alone instrument for monitoring the various
parameters of the fetal model.
References
IPMS Module
Login Email Database Register Web_Content User User_Details Project Team Report Former_Student
Contain forms/documents
used to enable unit
coordinator to able to
modify user, project and
Logout from the system team information.
Contain forms/documents
used to enable students to
view Team’s performance
criteria
Logout from the system
40%
Once a user logins in as a student, the student menu displays
No. of Users
10%
0%
3.2.1 My Team menu Very Hard Hard Neutral Easy Very Easy
40%
No. of Users
Q3. Te am form ation Design through Risk Analysis”, Proceedings of 43rd ACM
60% Southeast Conference, pp. 2-300- 2-305, 2005.
No. of Users
50%
[3] G. Jones, “One Solution for Project Management”,
40% Paper-Based
40% Paper-Based [10] G. V. Seshagiri and S. Priya, "Walking the Talk: Building
30% NEW GUI
Quality into the Software Quality Management Tool",
20%
10%
Proceedings of the Third International Conference On
0% Quality Software (QSIC), pp. 67 – 74, 2003.
Very Hard Hard Neutral Easy Very Easy [11] N. Hanakawa and K. Okura, "A project management support
tool using communication for agile software development",
(e)
Proceedings of the 11th Asia-Pacific Software Engineering
Q6. Over all e xpe rie nce
Conference (APSEC), pp. 316 - 323, 2004.
70%
60% [12] R. Martin and H. Shi “Design and Implementation of IPMS
Web Portal”, Proceedings of International Conference on
No. of Users
50%
Paper-Based
40%
30%
NEW GUI Computers and Advanced Technology in Education (CATE),
20% pp. 16-21, 2007.
10% [13] H. Shi, "Reshaping ICT Industry Projects - My Three-Year
0%
Very Hard Hard Neutral Easy Very Easy
Experience", Proceedings of AusWIT06 Australian Women
in IT Conference, 4-5 December, Adelaide, Australia, pp.36-
(f) 46, 2006
Figure 11. User experience survey [14] R. El Tabbal, L. H. It, J. Toke and D. Tu, “Redevelopment of
Industry Project Management System”, Final-year Industry
5. Conclusions Project Design Report, School of Engineering and Science,
Victoria University, November 2009.-
IPMS has been upgraded to PHP5.0 after one-year [15] R. El Tabbal, L. H. It, J. Toke and D. Tu, “Redevelopment of
development. The usability test has proved the new Industry Project Management System”, Software Design
developed GUI efficient and user friendly. The new Document and User Manual, School of Engineering and
upgraded IPMS removes tedious manual process and Science, Victoria University, June 2009.
provides smooth management functionalities for students,
supervisors, and coordinator and industry sponsors. It is Author Profile
concluded that the newly developed IPMS meets the user
requirements and is better than the previous version.
Hao Shi obtained her BE in Electronics
Engineering from Shanghai Jiao Tong
Acknowledgements University, China and her PhD at
University of Wollongong. She is now an
The author would like to thank the project team, Riad El
Associate Professor and ICT Industry
Tabbal (team leader), Leang Heng It, Jack Toke and Duncan
Project coordinator at School of
Tu and the project supervisor, Associate Professor Xun Yi
Engineering and Science, Victoria
for their contributions in revitalising the IPMS GUI.
University. She has established Industry- Based Learning
program at the School and won a number of Teaching and
References Leaning grants and awards. She is currently managing more
than a dozen of ICT university scholarships with local
[1] J. Ceddia and J. Sheard, “Evaluation of WIER – A Capstone industry partners via her grants from Victorian Government,
Project Management Tool”, Proceedings of the International
Australia.
Conference on Computers in Education (ICCE), pp. 777-781,
2002.
[2] J. L. Smith, S. A. Bohner, D. S. McCrickard, “Project
Management for the 21st Century: Supporting Collaborative
16 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
These works include iterative deepening, k-walker k-walker BFS, subset of High High
random walk, modified random BFS, two-level k-walker random neighbor
Blind
random walk, directed BFS, intelligent search, local indices walk
based search, routing indices based search, attenuated bloom 2 Lvl k- BFS, subset of Low Low
filter based search, adaptive probabilistic search, and walker neighbor
dominating set based search. Blind
random
walk
Searching strategies in unstructured P2P systems are APS BFS, subset of Medium Medium
either blind search or informed search. In a blind search neighbor
such as iterative deepening, no node has information about Informed
the location of the desired data. In an informed search such
as routing indices, each node keeps some metadata about the Based on scalability, response time (RT), success rate(SR)
data location. To restrict the total bandwidth consumption, and bandwidth various searching methods are compared as
data queries in unstructured P2P systems may be terminated follows-
prematurely before the desired existing data is found;
Algorithm Search Query Message Node
therefore, the query may not return the desired data even if
method forward- over-head dupli-
the data actually exists in the system. An unstructured P2P
ing cation
network can not offer bounded routing efficiency due to lack
Flooding No High Medium Low
of structure.
The searching schemes in unstructured P2P systems can Iterative Yes High Medium Medium
also be classified as deterministic or probabilistic. In a Deepning
deterministic approach, the query forwarding is Local Yes Medium Medium Medium
deterministic. In a probabilistic approach, the query Indices
forwarding is probabilistic, random, or is based on ranking. Directed Yes Medium Medium High
Another way to categorize searching schemes in BFS
unstructured P2P systems is regular-grained or coarse-
grained. In a regular-grained approach, all nodes Intelligent Yes Medium Medium High
participate in query forwarding. In a coarse-grained scheme, Search
the query forwarding is performed by only a subset of nodes
in the entire network. Routing Yes Medium Medium High
indices
4. Comparison of Existing Search Algorithms
Std. Yes High Medium Low
Based on search method, Query forwarding, Message random
Overhead and node duplication various searching methods walk
are compared as follows- k-walker Yes Medium Medium low
random
Algo- Search Query Message Node walk
rithm method forward- over-head dupli- 2 Lvl k- Yes Medium Medium low
ing cation walker
Flooding BFS, Broadcast High High random
Blind walk
Iterative BFS, Broadcast High High APS Yes Low High Medium
Deepning
Blind
Local BFS, Broadcast Medium Mediu
Indices Among those algorithms, Adaptive Probability Search
Informed m
(APS) is the most efficient algorithm. APS is based on k-
Directed BFS, Partial Medium High walker random walk and probabilistic (not random)
BFS Broadcast forwarding. Another interesting algorithm is Two-Level
Informed
Intelligen BFS, subset of Medium Mediu Random Walk in which walkers are searching for an object
t Search neighbor in two levels. So it reduces the redundancy of nodes.
Informed m
Routing BFS, subset of Medium Mediu 5. Adaptive Probability Search (APS) [6]
indices neighbor In the Adaptive Probabilistic Search (APS) [6], it is
Informed m
assumed that the storage of objects and their copies in the
Std. BFS, One Low Low network follows a replication distribution. The number of
random neighbor query requests for each object follows a query distribution.
Blind
walk The search process does not affect object placement and the
P2P overlay topology.
18 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
10. Conclusion
In this research work, various searching techniques in
unstructured p2p networks are studied. Comparative study
of these techniques is done. A new Search Technique is
proposed which helps in further enhancing the performance
of APS.
References
Abstract: The proposed system combines cryptography and Signal to Noise Ratio (PSNR) and Correlation Coefficient
steganography for copyright protection of digital images using (CC) values of the extracted logo for different attacks[7].
DWT. The proposed algorithms tested on various attacks such as
median, wavelet compression, fading and resizing by comparing
different performance parameters such as mean square error,
peak signal to noise ratio, correlation coefficient and the results
2. Proposed System
are very encouraging. The sensitivity is least observed in DWT The block diagram for proposed system is as shown in
method where the watermark maintains a fair level of resistance figure 1.First the logo is encrypted and then it is inserted in
to noise and other attacks. The proposed system can be used for a given image using DWT and the logo is extracted and
enhanced copyright protection, detection of misappropriated then it is decrypted to get original logo.
images; detect alternation of images stored in a digital library.
Keywords: Cryptography, encryption, Decryption,
Steganography.
1. Introduction
Security is one of the major concerns in today’s age. Unlike
the past, most of the transactions between people take place
over the internet. But internet itself is not a secure medium.
So, when it comes to sending highly important documents
over the internet, an extra precaution has to be taken. In
other cases, authenticity of digital data is a big concern.
With the widespread usage of digital media, demand for
copyright protection has increased manifold as it is
evidently seen in the audio records industry. The extra
precaution for copyrighting digital media is required here as
well. Figure 1. Block Diagram of Proposed System
One of the ways to take this extra precaution is to use
Steganography. Steganography helps to hide the content of 3. Algorithm
interest which is to be protected, inside any image, audio or
video file. To further ensure that interception of content 3.1 Cryptography Algorithm
does not happen, the content can be encrypted using one the
The encryption algorithm works on the approach of
popular Cryptographic algorithms[1][2]. Fragile
swapping pixel values of randomly generated 128
Watermarking is used in the case where tamper detection
locations in the row of every logo. It is important that the
and authenticity have a higher priority whereas Robust
set of 128 locations so generated are done with the help of
Watermarking deals with copyright protection[3][4] [5][6].
a password and that they are all unique. The steps of the
The proposed system hides a logo in images using DWT .
algorithm are as follows:
The watermark should be imperceptible to anyone and
sensitive to any kind of tampering done on the image under a) Take the input logo.
consideration. The system is compared for various b) Ask the user to enter a 8 bit key.
algorithms for embedding the logo. The algorithms are c) Generate 8 random vectors of size 1X128.
compared on the basis of Mean Square Error (MSE), Peak
22 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
d) Specify the ‘state’ of the random number generator h) Perform the two level inverse discrete wavelet
by giving the ASCII value of each character in the transform of host image (all three planes) by using
key for every random vector. This will generate 8 approximation coefficients of three planes of host
random vectors. image.
e) Generation of Input vector: i) Find the mean square error (MSE) and peak signal
Ø The outer loop controls the column to noise ratio (PSNR) and the correlation
traversal of the watermark logo. coefficient (CC) between the original host image
Ø The middle loop controls the selection and invisible watermark image by using the related
of random vectors previously generated. formulae as these are the important performance
Ø The inner loop controls the row parameters.
traversal of the watermark logo.
Ø Inside the innermost loop, we select a 3.3 Performance Parameters
random vector based on the value of the middle
loop. With every turn of the innermost loop we 3.3.1 Peak Signal to Noise Ratio(PSNR) and
take two consecutive values, r(1,k,j) and Mean Square Error(MSE).
The imperceptibility of a watermark is measured by the
r(1,k+1,j) from this random vector and swap
watermarked image quality in terms of Peak-Signal-to-Noise
the corresponding location values from the Ratio (PSNR) (in dB). Most common difference measure
watermark image in the same column and between tow images is the mean square error. The mean
store it in another array called ‘encrypted’ at square error measure is popular because it correlates
the same position. reasonably with subjective visual tests and it is
mathematically tractable.
f) Every time the middle loop finishes, the random
Consider a discrete image A(m, n) for m=1,2,……M and
vectors are considered corresponding to the first n=1,2,……N, which is regarded as a reference image.
character of the password. Consider a second image Â(m, n), of the same spatial
g) This cycle continues till the last column is covered. dimension as A(m, n), that is to be compared to the
h) Thus the watermark image is encrypted into a new reference image.
image file ‘encrypted.bmp’. Under the assumption that A(m, n) and Ã(m, n) represent
samples of a stochastic process,
3.2 Proposed Steganography in color images MSE is given as
Algorithm
3.3.2 Correlation Coefficient (CC) Figure 3(a) shows original logo and figure 3(b) shows
The robustness performance of watermark extraction is watermark logo .Figure 4(a) shows watermarked image and
evaluated by normalized correlation coefficient, r, of the figure 4(b) shows extracted logo.
extracted watermark A and the original watermark B.
4.3 Comparative Study Of Different Watermarking
Algorithms for different original images
The algorithm of insertion is applied to five different input
images as shown in figure 5 through figure 9 and compared
Where A and B respectively, the normalized original and the result using different performance parameters. The
watermark image by subtracting its corresponding means comparison is as shown in table 1.. We can insert secret
value. The magnitude range of r is [0, 1], and the unity information in these images for copyright protection.
holds if the extracted image perfectly matches the original
one.
The correlation coefficient is used to compare original
image and the watermarked image, and also for comparing
original watermark and the retrieved watermark.
(a) (b)
(c) (a) (b)
Figure 2: (a) Original Logo (b) Encrypted Logo (c) Figure 6: (a) Original Image (b) Watermarked Image for
Decrypted Logo medical image
(a) (b)
Figure 7: (a) Original Image (b) Watermarked Image for
satellite image.
(a) (b)
Figure 3: (a) Original Image (b) Watermarked Logo (to be
hidden)
(a) (b)
Figure 8: (a) Original Image (b) Watermarked Image for
satellite Scene.
(a) (b)
Figure 4: (a) Original Image (b) Extracted Logo
24 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
(a) (b)
Figure 9: (a) Original Image (b) Watermarked Image for
text image. (c)
Figure 10: Graph of (a) PSNR, (b) MSE, (c) CC for
Table 1: PSNR, MSE, and CC for original image and steganography in images using DWT
watermark image for Invisible Watermarking for five
different images Graphically these values are shown in figure 10.
4.4 Attacks
The value of PSNR is sufficiently high, MSE is very low and The figure 11 through figure 14 shows the algorithm is
CC is nearly equal to 1.So this algorithm has created tested for median filter under four mask sizes 3X3, 5X5,
minimum disturbance to host image and perceptually both 7X7, 9X9. For each of these cases peak signal to noise ratio,
the images are alike. mean square error and correlation coefficient are calculated
and are as shown in figure 15.
(a) (b)
Figure 11: (a) Median filtered Watermark Image with mask
(a)
size 3X3, (b) Extracted Watermarked Logo
(a) (b)
Figure 12: (a) Median filtered Watermark Image with mask
size 5X5, (b) Extracted Watermarked Logo
(b)
(IJCNS) International Journal of Computer and Network Security, 25
Vol. 2, No. 4, April 2010
(a) (b)
Figure 13: (a) Median filtered Watermarked Image with
mask size 7X7, (b) Extracted Watermark Logo
(a) (b)
Figure 16 (a) Wavelet compressed Watermarked image (b)
Extracted Watermark Logo
4.4.3 Noise
(b)
(a) (b)
Figure 18: (a) Noise added Watermarked image,
(b) Extracted Watermark Logo
4.4.4 Resizing
The algorithm is tested for resizing where watermark image
(c) resized by a scaling factor of 2.and is as shown in figure
Figure 15: Graph of (a) PSNR, (b) MSE, (c) CC for 19.The performance parameters are MSE=0.0028
watermarked image for different mask size of median filter PSNR=49.5556 CC=0.9972.
26 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
∆ W ij = ηδ i x j + α ∆ W ij ( k − t ) (1.1)
c( s, t ) = ∑∑ f ( x, y)w( x − s, y − t ) (1.3)
Figure 2. Main form of GUI, “Document verification system”
Where x, y are co-ordinates of selected block and s=0, 1, In fig 2 photo of the currency note 1000 has been shown.
2…. M, t= 0,1,2,……N Where M×N is size of ideal After acquiring image the neural network has been trained.
watermark. Each pixel of the selected block is matched with Following figure 3 shows the training of neural network.
each corresponding pixel of ideal watermark block.
Difference between these is calculated called correlation
coefficient. Correlation coefficient of each block has been
calculated with the same procedure. Now select the block
which contains the highest correlation coefficient. The
system software flowchart is shown in figure 1 can be
described; the location of the water mark is detected[7].
After clicking ok main form displayed again then we have to We have implemented our technique on the Indian currency
verify it. By selecting verify from the menu bar will start and Indian postage stamp, but their technique is
process of verification. Following graph in figure 4 shows implemented on Thai currency. However output of this
the watermark accuracy present on the document. technique is also different it did not show the accuracy of
watermark. This technique searches the watermark into
whole image while our technique will split the image into
blocks and apply correlation on each block with ideal
watermark, which gives us a correlation coefficient. The
value of correlation coefficient gives us an idea of similarity
between two images. This technique takes shorter time to
find the watermark in the note.
and the use of vaccines is essential, however there is also The Notifier is a daemon responsible for monitoring the
need for an increased awareness and use of hygiene rules: computer on which it runs and collecting any information
avoiding crowded spaces, increasing the ventilation of our relevant to probable security attacks. There is a plethora of
working area etc. Once the epidemic subsides, these different approaches to incorporate in the Notifier; for
measures can be suspended; a person showing symptoms of simplicity in our preliminary implementation we only
the disease, of course, should still visit a doctor to receive monitor the log files of several security related applications,
medical care, regardless of whether the epidemic is still such as firewalls, anti-virus software and IDS systems.
taking place. These are applications that collect information about
The classic computer protection methods can be likened security threats and attacks to the computer system on
to the above medical situation: The vaccination of the which they are running and either notify the user of these
population can be compared to updating the virus signature attacks or take specific measures, while at the same time
files; the lookout for symptoms may be compared to storing information relevant to the attacks into log files. By
detection by an IDS; while the hygiene rules followed, regularly reading the log files generated by these
which are essential for the protection of the larger, still applications, the Notifier detects any recently identified
unaffected population, may be compared to the operation of security attacks to the computer it is running on. At regular
our proposed system, described in the time intervals t, the Notifier of node n will record the
following sections. number of hits (hnt) the node received over the past interval.
It will then calculate and transmit the percentage pnt by
2. Architecture: which this average differs from the average hits in an
Peer-to-peer networks, which we will hereafter reference aggregate of the k latest intervals, given by
as p2p networks, are often considered to be security threats
for organizations, companies or plain users, mainly due to
the use of p2p-based applications for illegal file sharing,
and to the ability of worms to be spread through such
applications (e.g. VBS.GWV.A [41, 40] and W32.Gnuman
[10]). Our work indicates, however, that p2p networks can
also be positively utilized to significantly reinforce network
security, by offering substantial help in the protection
against malicious applications. We propose an effective way
to achieve this by collecting and exchanging information
that will allow us to obtain a global overview of the network
status, with reference to ongoing security attacks. The goal
of our methodology is to select the most appropriate security
policy, based on the level of danger posed by rapid malcode
circulating in the network.
P2p networks leverage the principle that a much
better utilization of resources (processing power, bandwidth,
storage etc.) is achieved if the client/server model is
replaced by a network of equivalent peers. Every node in
such a p2p network is able to both request and offer services
to other peer nodes, thus acting as a server and a client at
the same time (hence the term “servent” = SERVer +
cliENT which is sometimes used).
The motivation behind basing applications on p2p
architectures or infrastructures derives to a large extent
from their adaptability to variable operating environments,
i.e. their ability to function, scale and self-organize in the
presence of a highly transient population of nodes (or
computers/users), hardware failures and network
outages,without the need for a central administrative server.
Our proposed application, which we call
“NetBiotic”, requires the cooperation of several computers
within a common peer group, in which messages are
exchanged describing the attacks received by each
computer. It consists of two independent entities: a Notifier
and a Handler. These entities act as independent daemons Figure 1. The architecture of the NetBiotic system
for UNIX systems, services for Windows NT/2000/XP or within a group of cooperating peer
processes for Windows 9x/Me. From now on we will be computers.
referring to these entities as daemons for simplicity. Figure
1 illustrates the architecture of the proposed system within a
group of cooperating peer computers.
32 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
of particular interest. Security provisions are usually System independence cannot be achieved in the case of the
incorporated in p2p architectures by means of various countermeasures taken, which will depend on the operating
cryptographic mechanisms such as the information system. Different scripts have to be used to modify the
dispersal algorithm [30] or Shamir’s secret sharing code security levels of applications in different operating
[33], anonymous cryptographic relays [32], distributed systems.
steganographic file systems [11], erasure coding [19],
SmartCards or various secure routing primitives [7].
JXTA peers function under a role-based trust model,
whereby individual peers function under the authority of
third-party peers to carry out specific tasks. Public key
encryption of the messages exchanged, which may be in
XML format, as well as the use of signed certificates are
supported, providing confidentiality to the system. The use
of message digests provides data integrity, while the use of
credentials — special to-kens that authenticate a peer’s
permission to send a message to a specific endpoint —
provide authentication and authorization. JXTA also
supports the use of secure pipes based on the TLS protocol.
Further work is being carried out based on the security
issues of the JXTA system, notably the implementation of a
p2p based web of trust in the Poblano Project [4], which
will be discussed in the future work Section.
Our system was implemented in Java (java2
version 1.4.0 02) using JXTA version 1.0, and uses the
winreg [36] tool to administer the windows registry and
modify the security settings of the various applications. The
main advantages of Java are its compatibility with most
operating systems as well as the fact that it is one of the
most secure programming languages.
In our preliminary implementation, the Handler
modifies the security settings of the Microsoft Outlook mail
client and the Microsoft Internet Explorer web
browser.These two applications were selected as they are
often the target of viruses. The simple operation of Figure 2. Operation of the Notifier and Handler daemons
increasing their security settings is therefore enough to
provide effective protection to a large number of users. Our system has been tested in laboratory
Most anti-virus programs can be adjusted to environment as well as in a peer group that was set up for
produce log files with the attacks they intercept. By this purpose, in which virus attacks were simulated on
regularly monitoring such log files, the Notifier daemon is some peers, resulting in the modification of the security
able to detect a security attack and notify the peers. To test settings of Microsoft Outlook and Internet Explorer on
our prototype system, we created a software tool which other peer computers. No real viruses were deployed. A
randomly appends supposed security attack entries to these program was running on each of the peer computers and
log files. periodically edited the log file of the antivirus software,
The NetBiotic architecture is compatible with any IDS simply changing its size to simulate a security attack event.
or anti-virus software that can be setup to record the The average frequency with which these events were
security attacks against the system it is protecting in a log simulated was random and different for each computer. The
file. Our aim is to make the NetBiotic system as exchange of messages, individual and overall average hit
independent as possible from the IDS with which it rates as well as the resulting changes in the security settings
cooperates and the underlying operating system. This of the application were recorded and verified against our
independence, however, theoretical expectations.
cannot be total, as the following factors will be unavoidably Finally, since our system consists of two independent
system dependent: daemons, it is possible to only install one of the two on
certain peer computers. For instance, the Notifier daemon
¯ Log files would be particularly useful running on a large company
In its simplest form, the system can simply check the size of server, and supplying the peers with information about the
the log file. For a more sophisticated operation, though, it security threats it faces. The administrators of such a server
would be necessary to incorporate a parser that would may prefer not to install the Handler daemon, and instead
extract specific information from the log files. Such a parser manually take action in the event of security attacks.
has to be specific to each different type of log file used. Similarly, for a personal computer user who may not have
adequate security measures and antivirus software installed
¯ Countermeasures taken (for either financial or other reasons), installing the Handler
34 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
daemon itself may provide an adequate level of protection. Emerald, like Hummingbird, can be invaluable in
In this case, the Handler daemon would modify the local protecting a computer system or network against
security level based on information received by the security distributed and targeted attacks. NetBiotic may not be in
focused peer group. The Handler would therefore operate the position to affront such attacks with the same
relying on the trustworthiness of the information received effectiveness, as its goal is the seamless and automated
from the peer group only, which may in some cases be a creation of a network of peers for the fast exchange of
disadvantage. information regarding rapid spread malcode activity,
leveraging the benefits of peer-to-peer architectures and
4. Related Work topologies, and providing basic protection to the
The research that is most relevant to our proposed participating peers.
system has been carried out within the framework of project Bakos and Bert [2] presented a system for the
Indra [14], with which we partially share a common detection of virus outbreaks. The fastest spreading worms
philosophy. We agree on the basic principle of using p2p use scanning techniques for identifying potential target
technology to share security attack information between computers. As a result, they also scan a large number of
computers in a network in order to activate security addresses that do not correspond to actual computers. The
countermeasures if necessary. routers that intercept such scanning messages usually reply
We differ however in the circumstances under which with a ICMP Destination Unreachable (also known as
specific countermeasures should be taken. According to the ICMP Type 3 or ICMP-T3) message. The authors propose
Indra project team, in the event that a security attack is that a carbon copy message be sent by the routers to a
detected countermeasures should be immediately initiated, central collector system, which will be responsible for
by using the appropriate plugins to protect the computer collecting, correlating and analyzing this data. Bakos and
system. A single security attack anywhere in the network is Bert have implemented such a system by modifying the
enough for them to generate a response. In short, Indra is kernel of the Linux operating system to act as a router. The
designed to respond to every single security attack. central collector receives the messages and forwards them
In contrast, our system’s goal is to determine if there to an analyzer system, which extracts the valuable
is a general increase in the virus or worm attacks in the information. It should however be examined whether the
network, or more importantly a virus or worm epidemic time required for the entire processing prohibits the use of
outbreak. Measures taken in this case, such as the increase this system for fast spreading worms, as described by
in security settings of mail clients, web browsers and anti- Staniford [38].
virus programs will only be effective during the epidemic, Systems that use an extended network to gather
and the system will return to its original state after it is information yet rely on a centralized client/server model
finished. In our design, individual virus or worm attacks in were also examined. DeepSight [6] is a system developed
the network are not considered separately. Furthermore, we by Symantec based on a client/server architecture, whereby
believe that our design can be expanded to very large centralized servers collect and re-distribute security attack
network sizes without considerably increasing the overall information. Since it is a commercial system it is not
network traffic. available for scientific research, however it does include a
A number of highly distributed systems rely on peer very widespread data collection network.
communications. The Hummingbird system [28] is based An approach similar to DeepSight is taken by
on a cooperative intrusion detection framework that relies DShield, in which hundreds of computers communicate
on the exchange of security related information between with central servers and transmit their IDS log files. The
networks or systems in the absence of central servers process the data and announce in a web site
administration. The structure of the Hummingbird system information about the currently active malware, the IP
is significantly more complex and advanced than addresses from which most attacks originated and other
NetBiotic, using a combination of Manager-Hosts, useful information. Through the incorporation of different
Managed Hosts, Slave Hosts as well as Peer, Friend and parsers, DShield supports various different IDS systems.
Symbiote relationships for the exchange of security related DShield has been active for more than two years, with a
information. The Hummingbird system includes advanced significant number of users. A disadvantage of the system is
visualization tools for its configuration and monitoring of that the large volume of data collected requires considerable
log files, and although it may require considerable effort processing time for extracting useful information. The
and expert knowledge for fine tuning the cooperation of theoretical times taken by the Flash and Warhol worms as
each host with the others, it is particularly effective for well as the measured times for the Slammer worm [22, 38]
distributed security attacks (such as doorknob, chaining, to spread through the Internet are probably beyond the
loopback attacks etc.). A potential secondary use of the ability of DShield to react.
Hummingbird system, in our view, could also be in the Both DeepSight and DShield aim at providing a
detection of malcode. global view of the Internet security status, however they are
Emerald [29, 25] is a system targeted towards the both subject to the disadvantages of the client/server
exchange of security incident related information between architecture they follow: their dependence on a single
different domains or large networks. It consists of a layered server for their operation and their lack of adaptability
architecture that provides a certain abstraction, and makes them vulnerable to targeted attacks. An original
requires the adjustment of parameters relevant to the trust approach taken by the AAFID [35], whereby agents are
relationships between cooperating parties. We believe that used to collect virus attack information also follows a
(IJCNS) International Journal of Computer and Network Security, 35
Vol. 2, No. 4, April 2010
centralized control structure. The same holds for the GrIDS purposes.
system [39], which uses activity graphs to control large 3. Other research groups are involved in the creation of a
scale networks and identify suspicious activities, based on p2p-based web of trust. We intend to study these systems to
the judgment of a System Security Officer. examine to what extent they can be used to enhance the
Finally, the following two approaches propose NetBiotic architecture.
different ways of monitoring the overall security state and ¯ Use of epidemiological models
threat level of a network: In the DIDS system [34], the We believe that the incorporation of mathematical
overall security state of a network under observation is epidemiological models for the detection of epidemic
represented by a numerical value ranging between 0 (safest) outbreaks in the network and determining the threshold for
and 100 (least safe), while a clearly visual approach to initiating security level modifications should significantly
representing the network security state has been proposed enhance the robustness of our system. A key point in our
[42, 8]. We find both approaches very descriptive and future research will be the selection of the thresholds for
useful to a System Security Officer. In our prototype modifying security policies. These thresholds will be
NetBiotic implementation, however, we are currently variable and will depend on each system’s characteristics
adopting a much simpler approach which consists of and on an analysis of the attack data collected. Studies [9,
choosing between three different security states (regular, 18, 16, 17] show that there is a correlation between the
low risk and high risk), as described in Section 2. patterns of spread of biological viruses and computer
viruses. These studies were mainly limited to closed local
5. Future Work area networks. P2p models are ideal for gathering large
The NetBiotic system is an evolving research scale network virus information, which can subsequently be
prototype. It is currently being extended in a number of processed and adapted to epidemiological models, leading
ways as discussed below, in order to subsequently be to decision tools for concluding, or perhaps even predicting,
released as open source software to allow the collaboration whether there is — or is likely to be — an epidemic
with other research groups working in similar directions. outbreak in the network.
At this stage, our goal is to propose an architecture, ¯ Choice of appropriate security policy
accompanied by a basic implementation for proof-of- In conjunction with other factors, such as the role of the
concept purposes, which, based on a p2p network system being protected, our system should be able to
infrastructure can provide security services for computer effectively choose the most appropriate security policy for
systems. Although our prototype performed well in the the specific period of time. In this way, single incidents of
situation in which we tested it, it is not suitable for virus attacks
performing large-scale testing. may not be the cause of any concern, yet the detection of
We expect that, before more advanced versions of epidemic outbreaks would initiate a modification of the
our application will be implemented, the scientific security policies.
community will examine the use p2p networks in security ¯ Platform porting
applications from a theoretical standpoint and provide In porting our system to Unix/Linux platforms, the
insight into the advantages and disadvantages of such an operating system could be instructed to launch or halt
approach. applications, or automatically request updates. The
The following conceptual and implementation configuration of these operating systems can be edited
improvements are currently being considered: through plain text files, which is an additional benefit for
our system.
¯ Vulnerability to malicious attacks
A major drawback of our current design is its 6. Conclusions
inability to effectively verify theinformation transmitted in Even the best protected organizations, companies
the network. If one or more malicious users manage to or personal users are finding it difficult to effectively shield
introduce in the peer network a large number of false hit themselves against all malicious security attacks due the
rate indications, the result may be the unwanted decrease of increasing rate with which they appear and spread.
the security measures of the computers in the network, Antivirus applications, as well as IDS systems, identify the
rending them vulnerable to virus attacks. unknown malware by employing behavioral based heuristic
We propose that all members of the security peer group will algorithms. These algorithms are particularly effective
have to be authenticated and verified, probably through the under a strict security policy, however they tend to produce
use of certificates, to enforce a consistent authentication and an increased number of false alarms, often disrupting and
authorization policy. upsetting the smooth operation of a computer system and
At the implementation level, to confront the the organization or users it supports. On the other hand, if
problem of malicious users introducing false information we the security policy is relaxed, the threat of a virus infection
further propose the following approaches, based on the becomes imminent.
capabilities offered by JXTA: We propose a platform based on p2p technology in
which the computers participating as peers of a network
1. JXTA supports the exchange of encrypted messages automatically notify each other of security threats they
based on the TLS algorithm secured pipes [3], which will receive. Based on the rate of the warning messages
be used for the transmission of warning messages. received, our system will increase or decrease the security
2. JXTA message digest will be used for data integrity measures taken by the vulnerable applications running on
36 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
the computer. Our approach automates elements of the IEEE WET ICE Workshop on Enterprize Security,
process of choosing the appropriate security policy, based Linz, Austria, June 2003.
on data useful for adjusting the security levels of both the [15] Project jxta v2.0 java programmer’s guide: Current
operating system (by launching and terminating related on-line (June 2003):
applications) and the security applications (by modifying http://www.jxta.org/docs/jxtaprogguide v2.pdf.
the security parameters of the heuristic algorithms they [16] J Kephart. How topology affects population dynamics.
employ). In Proceedings of Artificial Life 3, Santa Fe, New
An important aspect of our design is that the traffic Mexico, June 1992.
introduced in the network by the peer nodes as a result of [17] J. Kephart, D. Chess, and S. White. Computers and
the transmission of hit rate information is minimal. We epidemiology. IEEE Spectrum, May 1993.
believe that, with the inclusion of the future extensions we [18] J. Kephart and S. White. Directed-graph
are currently working on, our approach may lead to epidemiological models of computer viruses. In
operating systems, antivirus programs, IDS software and Proceedgings of IEEE Computer Society Symposium
applications that will be able to self-adjust their security on Research in Security and Privacy, pages 343–
policies. 361, Oakland, CA, 1991.
[19] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D.
References: Geels, S.R. Gummadi, H. Weatherspoon, W.
[1] Apache license: Current on-line (June 2003): Weimer, C. Wells, and B. Zhao. Oceanstore: An
http://httpd.apache.org/docs/license. architecture for global-scale persistent storage. In
[2] G. Bakos and V. Berk. Early detection of internet Proceedings of ACM ASPLOS. ACM, November
worm activity by metering icmp destination 2000.
unreachable messages. In Proceedings of the the [20] A. Mackie, J. Roculan, R. Russell, and VanVelzen M.
SPIE Aerosense, 2002. Nimda worm analysis - incident analysis report
[3] Wilson B.J. JXTA. New Riders, Indianapolis, IN, USA, version ii. September 2001.
June 2002. [21] J. Miller, J. Gough, B. Konstanecki, J. Talbot, and J.
[4] R. Chen and W. Yeager. Poblano: A distributed trust Roculan. Deepsight threat management system
model for peer-to-peer networks. Technical report, threat alert - microsoft DCOM RPC worm alert.
Sun Microsystems. Current on-line (August 2003):
[5] Code Red CRv2. Current on-line (June 2003): https://tms.symantec.com/members/analystreports/030811-
http://www.caida.org/analysis/security/code- alert-dcomworm.pdf.
red/coderedv2 analysis.xml. [22] D. Moore, V. Paxson, S. Savage, C. Shannon, S.
[6] Deepsight threat management system: Current on-line Staniford, and N. Weaver. The spread of the
(June 2003): http://www.securityfocus.org. sapphire/slammer worm. Current on-line (June
[7] P. Druschel and A. Rowstron. Past: A large-scale, 2003):
persistent peer-to-peer storage utility. In Proceedings http://www.caida.org/outreach/papers/2003/sapphire/
of the Eighth Workshop on Hot Topics in Operating sapphire.html. Technical
Systems, May 2001. report, 2003.
[8] R. Erbacher, K. Walker, and D. Frincke. Intrusion and [23] D. Moore, G. Voelker, and S. Savage. Internet
misuse detection in large scale systems. IEEE quarantine:requirements for containing self-
Computer Graphics and Applications, 22(1), 2002. propagating code. In Proceedings of the 2003 IEEE
[9] S. Forrest, S. Hofmeyr, and A. Somayaji. Computer Infocom Conference, San Francisco California,
immunology.Communications of the ACM, USA, April 2003.
40(10):88–96, 1997. [24] Microsoft security bulletin ms03-026. Current on-line
[10] W32.gnuman.worm: Current on-line (June 2003): (August 2003):
http://service1.symantec.com/sarc/sarc.nsf/html/w32. http://www.microsoft.com/technet/treeview/default.as
gnuman.worm.html. p? url=/technet/security/bulletin/ms03-026.asp.
[11] S. Hand and T. Roscoe. Mnemosyne: Peer-to-peer [25] P. Neumann and P. Porras. Experience with
steganographic storage. In Proceedings of the 1st EMERALD to date. In First USENIX Workshop on
International Workshop on Peer-to-Peer Systems Intrusion Detection and Network Monitoring, pages
(IPTPS ’02), MIT Faculty Club, Cambridge, MA, 73–80, Santa Clara, California, April 1999.
USA, March 2002. [26] Current on-line (June 2003):
[12] Icsa labs 2002 computer virus prevalence survey. http://www.incidents.org/react/nimda.pdf.
Current on-line (June 2003): [27] Current on-line (June 2003): http://www.f-
http://www.trusecure.com/download/dispatch/vps200 secure.com/v-descs/nimda.shtml.
2.pdf. [28] Polla, D., J. McConnell, T. Johnson, J. Marconi, D.
[13] Code Red II. Current on-line (June 2003): Tobin, and D. Frincke. A framework for cooperative
http://www.eeye.com/html/research/advisories/al200 intrusion detection. In Proceedings of the 21st
10804.html. National Information Systems Security Conference,
[14] R. Janakiraman, M. Waldvogel, and Q. Zhang. Indra: pages 361–373, October 1998.
A peer-to-peer approach to network intrusion [29] P. Porras and P. Neumann. EMERALD: Event
detection and prevention. In Proceedgings of 2003 monitoring enabling responses to anomalous live
(IJCNS) International Journal of Computer and Network Security, 37
Vol. 2, No. 4, April 2010
CHs (e.g. P=0.05) current round, and G is the set of nodes Where in this equation P = the desired percentage of CHs
that have not been CH in the last 1/P rounds, r is the (e.g. P=0.05) the current round, and E n_current is the current
number of the current round. energy and En_max the initial energy of the node, with r s as
For each node, a random number between 0 and 1 the number of consecutive rounds in which a node has not
is generated. If this random number is less than T(n ) , this been CH. Thus, the chance of node n to become cluster head
sensor node will become a cluster head in this round and increases because of a higher threshold. A possible blockade
broadcast an advertisement message to other sensor of the network is solved. Additionally, r s is reset to 0 when a
node becomes CH. Thus, we ensure that data is transmitted
nodes near it.
to the base station as long as nodes are alive [6].
When each node has elected as cluster head itself for the
current round broadcasts an advertisement message to the Our clustering model is based on confidence value
rest of the nodes in the network. All the non-cluster head associated with broadcast from CHs. Confidence value of a
nodes, after receiving this advertisement message, decide on CH is a function of some parameters (1) distance between
the cluster to which they will belong for this round. This the CH, the node and (2) the CH current battery power and
decision is based on the received signal strength of the (3) number of nodes already were a member of this CH.
advertisement messages. After cluster head receives all the Basically, our model checks first if, with the current battery
messages from the nodes that would like to be included in power the CH has, it would be able to support the current
members at maximum data broadcast rate. A node decides
the cluster and based on the number of nodes in the cluster,
to join a CH if the head can still support the node with its
the cluster head creates a TDMA schedule and assigns each
rest power. Confidence value given by:
node a time slot when it can transmit [3].
Despite many advantages in using of the LEACH protocol
for cluster organization, CH selection and incising network Cv(i) = Bp
(3)
lifetime, there are a few features that the protocol does not Cm* Dc
support. LEACH assumes nodes power energies Where in this equation BP is the battery power of given
homogeneously. In a real, wireless sensor networks node, Cm is number of nodes already a member of given CH,
scenario, sensor nodes energy spread in heterogeneous Dc is distance between the CH and the node.
manner. Like LEACH, in order to reduce the probability of
collision among joint-REQ messages during the setup phase,
3. The New Protocol CSMA (Carrier Sense Multiple Access) is utilized as the
In this section, the details of PEAP are introduced. The MAC layer protocol. When a cluster head has data to send,
major application of a wireless sensor network is to it must sense the channel to see if anyone else is
monitoring of a remote environment. Data of individual transmitting using the BS spreading code. If so, the cluster
nodes are usually not very important. Since the data of head waits to transmit the data. Otherwise, the cluster head
sensor nodes are correlated with their neighbor nodes, data sends the data using the BS spreading code [3].
aggregation can increase reliability of the measured
parameter and decrease the amount of traffic to the base 4. Simulation Results
station. PEAP uses this observation to increase the efficiency
of the network. In order to develop the PEAP, some In order to evaluate the performance of the PEAP protocol,
assumptions are made about sensor nodes and the the simulator, specific to the needs of our model, was coded
underlying network model. For sensor nodes, it is assumed in PHP with Apache HTTP server version 2.2 and uses
that all nodes are able to transmit with enough power to PHP/SWF Charts for its graphical needs.
reach the BS if needed, that the nodes can adjust the amount We assume a simple model for the radio hardware energy
of transmit power, and each node can support different dissipation where the transmitter dissipates energy to run
Medium Access Control (MAC) protocols and perform the radio electronics and the power amplifier, and the
signal processing functions. These assumptions are receiver dissipates energy to run the radio electronics, as
reasonable due to the technological advances in radio shown in Fig. 1. For the experiments described here, both
hardware and low-power computing [3]. For the network, it the free space (d2 power loss) and the multi path fading (d4
is assumed that nodes have always data to send to the end power loss) channel models were used, depending on the
user and the nodes located close to each other have distance between the transmitter and receiver [7]. Power
correlated data. control can be used to invert this loss by appropriately
Such as LEACH, in first phase, PEAP chooses a node setting the power amplifier. If the distance is less than a
stochastically, , the principal will be explained in the threshold do, the free space (fs) model is used; otherwise, the
following: all sensor nodes compute a value T(n ) multi path (mp) model is used. Thus, to transmit l-bit
according to the following formula at the beginning of all message a distance, the radio expends
rounds.
lEelec +lεfs d 2 , d <d o
E E n _ current ETx(l,d) = ETx- elec(l ) + ETx- amp(l, d ) = (3 )
n _ current lEelec +lεmpd ,
4
d ≥ do
T(n) = p* * 1 − (2)
E E n _ max
n _ max
And to receive this message, the radio expends:
40 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Abstract: Before the advent of mobile sensor nodes, static of the hexagon. They move in a systematic manner on
nodes have been used to provide coverage, which focuses on rectangular and triangular parts of hexagon. Previous work
repositioning of sensors to achieve coverage. But mobile sensor on Mobile traversal has been done using triangulation based
nodes provide a dynamic approach to cover age. Targets that
coverage [3], but the hexagonal approach proves to be more
might never be detected in a stationery sensor network can be
detected by moving sensors. Mobile sensors can compensate for efficient as the total distance traveled and time taken is
lack of sensors and improve network coverage. Here, we focus comparatively less. Deploying a good topology is also
on coverage of a rectangular region which is divided into beneficial to management and energy saving, and the
regular hexagons. The region is covered with mobile sensor hexagonal topology provides 2-coverage, as we wish to
nodes, where a group of four MSNs position themselves on four ensure optimal and energy efficient coverage. A
vertices of a hexagon. We can employ N≥4 MSNs for this deterministic energy-efficient protocol for sensor networks is
purpose, although basically only 4 MSNs are needed but extras
used in [1] that focuses on energy efficient coverage of ROI.
are employed in case of failure of any MSN.
Energy efficient distributed algorithms for sensor target
Key Words: coverage, mobile sensor nodes, energy coverage based on properties of an optimal schedule is
efficiency, hexagonal coverage. included in [2]. Power efficient organization of wireless
sensor networks is done in [4]. A coverage-preserving node
1. Introduction scheduling scheme for large wireless sensor networks is
discussed in [5].
The coverage problem is a fundamental issue in WSN,
which mainly concerns with a fundamental question: How The proposed objectives of our approach are:
well a sensor field is observed by the deployed sensors? To
optimize network coverage, the traditional approach (i) is to Covering the sensing area by minimum
deploy a large number of stationary sensor nodes and then to number of sensors, N≥4, as well as providing highly reliable
schedule their sensing activities in an efficient way [6]. and long
Recently, mobile sensor nodes have received much attention system lifetime, which is the main design challenge in
since network performance can be greatly improved by sensor networks.
using just a few of mobile nodes. Mobile sensor nodes have (ii) Upon a failure, the remaining MSN’s (N-4) efficiently
the movement capability to collaboratively reinstall the complete the coverage of the targeted area, otherwise they
network coverage. They are extremely valuable in situations remain in sleeping mode.
where traditional deployment mechanisms fail or are not
suitable, for example, a hostile environment where sensors We assume the following:
cannot be manually deployed or air-dropped. It is well (i) The sensing range of a sensor x, is a disc of radius
known that mobility increases the capacity of networks r centered at x and defined by
(MANETs) by reducing the number of relays for routing, Sx (r) = {a € R2 : | x-a| ≤ r}
prolonging the lifespan of wireless sensor networks (WSNs) where |x-a| stands for the Euclidian distance
and ensuring network connectivity in delay-tolerant between x and a.
networks (DTNs), using mobile nodes to connect different (ii)A location in region A is said to be covered by sensor x if
parts of a disconnected network. In this paper we present it is within x’s sensing range. A location in A is said to be
Mobile Traversal Algorithm (MTA) where the region of covered if it is within at least K sensor’s sensing
interest [ROI], considered as a rectangular area, is covered range.
by regular hexagons. The MSNs are placed at four vertices
42 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
indicated directions and travel together a distance 2a, Fig 3.2.1 Total traveling Distance for different sides of
4(d). To cover the isosceles triangle one MSN (namely ‘c’ in varying length of the hexagons
figure) moves along the indicated direction a distance of
√13/2a, Fig 4(e). To cover the next isosceles triangles MSN To compare our results, with the results of [3], we have
‘b’ travels a distance of √7a, Fig 4(f). To cover the right- considered the area of ROI as a rectangular plot of size
angled triangle(right most half triangle) in the next row 4500*2000 units of measure. The side of the hexagon (taken
MSNs ‘a’, ‘b’, ‘c’ travel a distance of 3a, Fig 4 (vii) To less than the sensing range) is considered 45, 50,55,60,65
units. The Total traveling distance of MSNs for their
cover the rightmost half-rectangle in the next row the four
varying sensing ranges is determined. The traveling
MSNs (namely ‘a’, ‘b’, ‘c’, ‘d’ in figure) travel a total
distance of the MSNs decrease as the length, a, of the side is
distance of 5a , Fig 4 (g).This way the MSNs cover the
increased. i.e., we can say that the traveling distance of the
rectangular region (ROI) upto m columns and n rows. MSNs is inversely proportional to the length, a, of the side
of the hexagon. The data is graphically represented in
Figure 5, and in tabular form in Table 1.
Length of side of
hexagon (a) Total traveling distance
Figure 5. Extra sensors to provide coverage in case of (D)
sensor failure 45 690677.78
50 624499.33
If a sensor fails at say i th row and jth column, then the 55 569478.6
sensor staying at the nearest corner to the coordinate 60 536880.36
position (i, j) will move to cover that point. 65 465344.62
3.2 Total traveling Distance
Based on the number of moves and individual traveling
In [3] the authors have taken equilateral triangle of sides of
distance of the MSNs the total traveling distance, D, is
length, a=50 units and distance traveled by the MSNs
calculated as:
covering the rectangular region and starting at arbitrary
D = n [6 3 a + 4 (m − 2 ) × 3 3 ] + points in the region varies from 7.38*105 to 7.54*105 which
[5 a + 2 13 a + 2 7 (m − 2 )a ](n − 1) + 5 a (n − 1) is much more than 6.91*105 obtained in our case for the
(1) regular hexagon having sides of length a=50.
44 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
4. Conclusions
In this paper, we present a MTA for the coverage of a Mrs. (Dr.) Seema Verma obtained her M.Tech and Ph.D degree
rectangular field by N≥4 mobile sensors. Though only 4 from Banasthali University in 2003 and 2006 respectively. She is
sensors are sufficient to cover the region, however, in case a associate Professor of Electronics. Her research areas are VLSI
of failure, extra MSN’s kept in reserve/sleeping mode are Design, communication Networks. She has published around 18
activated. Thus the system is reliable for coverage. We also research papers in various Journals.
observe that as side ‘a’ of the hexagon is increased the total
traveling distance covered by MSNs decreases. The
hexagonal topology provides an efficient and reliable
coverage as each point in the ROI is covered at least by 2-
sensors.
References
[1] A. Dhawan, S. K. Prasad, “Energy efficient distributed
algorithm for sensor target coverage based
Performance Computing, 2008.
[2] A. Khan, C. Qiao, S.K. Tripathi, “Mobile Traversal
Schemes based on Triangulation Coverage,” Mobile
Netw Appl, Vol. 12, pp. 422-437, 2007.
[3] Wang, H. B. Lim, D. Ma, “A survey of movement
strategies for improving network coverage in wireless
sensor networks,” Computer Communications, Vol.
32, pp. 1427- 1436, 2009.
[4] D. Brinza, Al. Zelikovsky, “Deeps: Deterministic
energy- efficient protocol for sensor networks,”
Proceedings of the International Workshop on Self
Assembling Wireless Networks (SAWN), pp. 261–
266, 2006.
[5] D. Tian, N. D. Georganas, “A coverage-preserving
node scheduling scheme for large wireless sensor
networks,” In WSN Proceedings of the 1st ACM
international workshop on Wireless sensor networks
and applications, New York, NY, USA, ACM, pp. 32–
41, 2002.
[6] S. Slijepcevic, M. Potkonjak, “Power efficient
organization of wireless sensor networks,” IEEE
International Conference on Communications (ICC),
Vol. 2, pp. 472– 476, 2001.
Authors Profile
Megha Sharma received the B.C.A and
M.C.A degree from I.G.N.O.U in 2004 and
2008, respectively. She is currently working
towards a Ph.D degree in computer Science at
the Banasthali University of Rajasthan. Her
research interests include wireless sensor
networks with a focus on the coverage of
wireless sensor networks.
Besides proper coloring there are many types of coloring 2. Auxiliary Definitions
(labeling) of vertices. One such generalization is L(p,q)-
labeling, in which the labels at adjacent vertices should 2.1 Graph Powers
differ by atleast p and labels at vertices at distance 2 should
differ by atleast q [6]. L(p,q)- labeling problem has attracted In this section we consider different powers of graph, which
attention of many researchers in the past [7]. Particular finds application in channel assignments, L(p, q)- coloring
cases of L(p,q)- labeling (i) L(1,1)- labeling and (ii) L(2,1)- of graphs etc.
labeling have been defined and a lot of research has been
done in this area. L(1,1)- labeling is also known as distance
46 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
2.1.1 Square of a graph (G2) - The Square G2 of a graph G in Gk and hence Gk will be a complete graph on n vertices
= (V, E) is the graph, whose vertex set is V itself and there and thus (C n)k =Kn.
is an edge between two vertices vi and vj if and only if their
graph distance (length of shortest path between vi and vj) in Case (ii): Let G = Cn (n≥2k+1) and let vi be an arbitrary
G is at most 2. Examples of a graph and its square graphs vertex of graph G. We have to show that deg (vi) = 2k ∀ vi є
are given in following figures: C n. We know that deg (vi) = 2, ∀ vi є C n . From the
definition of Gk, two vertices will be adjacent if the distance
between them is at most k.
2.1.3 Kth power of a graph (Gk) - The kth power Gk of a 2.2 Labeling of a graph G (V, E)
graph G (V, E) is the graph, whose vertex set is V and there
is an edge between two vertices vi and vj if and only if their 2.2.1 L (p, q) – Labeling - For two positive integers p and
graph distance in G is at most k. q, an L(p,q)- Labeling of a graph G is a function
C:V(G) → N such that C(vi) - C(vj) ≥ p if vertex vi and
As a special case we prove the following results for cycle Cn
and complete bipartite graph Km,n. vj are adjacent and C(vi) - C(vj) ≥ q if vertex vi and vj
are at distance 2.
Theorem 2.1 If G = Cycle with n vertices (Cn), Then
In particular L(1, 1)- labeling and L(2,1)- labeling are well
known examples of L(p,q)- Labeling.
2.2.4 L (p,q,r) – Labeling - For three positive integers p, q V and there is an edge between two vertices vi and vj if and
and r, an L(p,q, r)- Labeling of a graph G is a function only if their graph distance in GUD is at most 3.
C:V(G) → N such that C(vi) - C(vj) ≥ p if vertex vi and
3.5 Euclidean distance three graph of a Unit Disk graph
vj are adjacent, C(vi) - C(vj) ≥ q if vertex vi and vj are at (GUDED3) - Euclidean distance three graph of a unit disk
graph GUD (V, E) is the graph whose vertex set is V and
distance 2 and C(vi) - C(vj) ≥ r if vertex vi and vj are at there is an edge between two vertices vi and vj if and only if
distance 3. their Euclidean distance in GUD is at most 3.
In particular L(1,1,1)- Labeling is more useful in channel
assignment problem and in wireless (sensor) network than
the others.
Theorem 3.1 For any Unit disk graph GUD, GUD2 ⊆ GUDED2.
Theorem 3.2 For any Unit disk graph GUD, GUD3 ⊆ GUDED3.
(v, w) are three edges in GUD. Since GUD is a Unit Disk Now in order to label the nodes we adopt the Cellular
graph. Partition algorithm. In this algorithm first of all we partition
the whole plane in unit hexagonal cells with a side length ½
If we consider dEd(c, w) denotes the Euclidean distance thus the diagonal length of each cell is 1. If there is any UD
between c and w, then graph in this plane, vertices of the graph inside the cell will
form a clique, since no two vertices in the same hexagon
dED(c, w) ≤ dED(c, v) + dED (v, w) have a Euclidean distance greater than 1. Let the maximum
clique size be ω then there can not be more than ω vertices
≤dED(c, u) + dED (u, v) + dED (v, w) in the same hexagonal cell. Since we know that ω colors are
sufficient to color each hexagonal cell. Therefore we can
= 1+1+1 = 3. color the whole graph properly.
Hence dED (c, w) ≤ 3. Thus the edge (c, w) is an edge in Using the above Cellular Partition algorithm we prove the
GUDED3. following theorem:
Hence GUD3 ⊆ GUDED3 Theorem 4.1 Euclidean distance three graph GUDED3 for any
UD graph GUD can be properly colored by at the most 25ω
Further GUD3 may be proper subgraph of GUDED3 in some colors where ω is the maximum clique size.
instances. We will show that there might be an edge in
GUDED3 but not in GUD3. As shown in figure 4(b), there might Proof: We partition the whole plane into hexagonal cells
be a vertex x in GUDED3 such that 1<dED(c, x) ≤ 3 and but with side ½ and diagonal 1. All vertices included in any
there are no two vertices u' and v' such that (c, u'), (u', v') hexagon would form a clique. Since ω is the maximum
and (v', x) are edges in GUD. Thus (c, x) is an edge in GUDED3 clique size, so we could place at most ω vertices into each
but not in GUD3. Similarly there might be a vertex y in cell.
GUDED3 such that 1<dED(c, y) ≤ 2 but there are no vertex w'
such that (c, w') and (w', y) are edges in GUD. Thus (c, y) is Next we construct a patch of 25 hexagons* and use 25ω
an edge in GUDED3 but not in GUD3. color to color the patch. An example of the patch is shown
in figure [5] and keeps the same orientation of patches of 25
Theorem 3.3 For any UD graph GUD, a coloring scheme χ to cover the whole plane as shown in figure [6]. Now we
(GUDED3 ) for coloring GUDED3 would also color GUD3 which is prove that a vertex in ith hexagon in a patch would be at a
equivalent to L(1,1,1)- labeling of GUD. Euclidean distance of at least 3 to any other vertex in the ith
hexagon in any other adjacent patch.
Proof: Since we’ve proved in previous theorem, any GUD3 be
a subgraph of GUDED3 then ∃ a coloring scheme χ (GUDED3)
to color GUDED3 properly could be sufficient to any of its
subgraph. Therefore it would also color GUD3. Since L(1,1,1)
labeling of GUD is equivalent to proper coloring of GUD3 .
Thus χ (GUDED3) fulfill L(1,1,1) labeling of GUD.
In order to cover the targeted area by sensors, we have to We know that AB = 10* 3 /4 = 4.33 > 4.
divide the whole area in smaller cells (area). We have
chosen regular hexagons to cover the whole plane based on Also we have AD = ½ + ½ + 1+ ½ + 1+ ¼
the observation that hexagon is the most suitable polygon = 15/4
which could cover the plane efficiently. It is the most
suitable tile that could cover the plane with no overlap and
thus it is the most efficient way to cover the plane.
(IJCNS) International Journal of Computer and Network Security, 49
Vol. 2, No. 4, April 2010
References
Acknowledgement
Abstract: This paper address security in dynamic context available at that point of time. This reduces the data storage
aware systems. Context awareness is a emerging as an important and transmission for using only the bits making it very
element in wireless systems. Security challenges in context much easy to complement in networks where the bandwidth
aware systems include integrity, confidentiality and availability of the network is very low.
of context information as well as end user’s privacy. The paper The anytime, anywhere access infrastructures is to enable a
addresses the dynamic changes happening in the mapping new generation of applications that can leverage
between the roles and permissions depending on context
continuously manage, adapt and finally optimization is
information. The paper presents a access control method using
artificial neural networks. It represents the data in terms of bits
required.
to express the roles and permissions which helps in reducing the The major challenge faced in Wireless applications is
data transmission and is a good fit for wireless networks with managing the security of the system using Access Control
lower bandwidth. It also introduces a novel method for storing Lists. ACL's is a very common mechanism used in Access
the information in a reduced format. Instead of accessing the Control. It has been observed that the ACL's are used to
access control tables the machine is learning it, which in turn check for permission to access resources or services.
reduces the time required to access the tables. Being dynamic in Another point to be noted at this juncture is such type of
nature there is no requirement for changes, any change is taken approach is very inadequate for wireless applications, since
care by the machine learning itself. Further, the algorithm is most proposed models do not take care of context
simple and easy to implement in wireless networks. information into consideration.
There is a need for giving control in a dynamic way as the
Keywords: Dynamic Context, Wireless Networks.
context changes according to location, time, system
resources, network security configuration etc., Therefore,
1. Introduction access control mechanism that changes the permission of a
user dynamically based on context information is very much
It has been proved that Dynamic Role Based Access Control essential.
can manage Access Control and security, more and more In this direction [3] have proposed a GRBAC Model and
mobile devices are incorporating this feature. Pervasive representing the system using State Machines. Using this
communication technology is becoming a everyday feature model, It is representing the information for the new
and it is changing the way of communicating with the algorithm proposed and show how it can be stored and
external world. This type of DRBAC requires the following retrieved. Then finally, show how this can be used to train
tables: 1. User Location Table 2. User Role Table 3. Role – the system without accessing the matrix.
Permission Table and 4. Mutual Exclusive role table.
Each time anybody accesses the system the first three tables
2. Background
are searched.
Further, there is a very complex mapping of Location, users,
Location, User, Role and Permission are the major
roles and permissions. It has been observed that frequently
components of a DRBAC which are represented as follows:
searching the tables reduces the efficiency of access control.
L = {L1, L2, ........................Li}
An disadvantage of wireless devices are that they have less
U = {U1, U2, .......................Ui}
power, storage, computing and transmission abilities.
R = {R1, R2, .......................Ri}
Hence, performing access control in wireless environments
P = {P1, P2, ........................Pi}
is actually more complex than that I wired environments.
T = {T1, T2, T3}
Therefore, any approach to access control must be relatively
The permission only directly maps to one role. In case many
simple and very efficient.
roles want to own the same permission, this need to be done
This paper addresses the following points:
using role inheritance. Since conflicted permissions also
It gives a access control algorithm and storage is reduced
needs to be addressed.
using the EAR decomposition and is retrieved accordingly.
It also uses a ANN to train the system so that this procedure
is learnt by the system, rather than searching the tables.
This algorithm assigns the user with different permissions
in different sessions depending on the context aware data
(IJCNS) International Journal of Computer and Network Security, 51
Vol. 2, No. 4, April 2010
Using the following information we try to ascertain whether Based on the permission rights for that user the access is
a user is permitted to login from a particular location or not allowed. These two matrix are represented in the form of a
using matrix1. If the said user has access rights from that graph and then use the open ear decomposition technique to
location the step 2 of the algorithm is executed i.e., is reduce this information and store it.
mapping the IP address to a role else the access right is
denied. 6. Performance test of the algorithm
Matrix1 The test bed was created as a kernel program in SeLinux. It
L1 L2 L3 L4 L5 is allowed to run with the same modules that Se Linux has
U1 1 1 1 1 1 in addition to the modules created for this purpose.
Whenever somebody logins into the system it uses the
U2 0 1 1 1 1 authentication methods presently provided by the operating
U3 0 1 1 1 1 system. Using this to our advantage we put our static
U4 0 0 0 1 0 addresses specific to the location based on the labeling of
IPSec object called labeled IPSec. This particular feature is
. 0 0 0 1 0
available in mainline Linux version 2.6.16 itself. This does
U5 1 1 1 1 1 the authorization process as described in [5] and also we use
the same information to determine the location of the user.
The function of the second matrix defines the relationship Once the user's location is ascertained the next step is to
between the Location and roles for the time the user logs in. look out for the time at which this login has been requested.
Depending on the time the user logs in the roles are This is done with the help of the system clock. With this
assigned. This is used to check whether a role has access context information that is generated, access roles are
rights at various locations are not. Further, the permission accordingly assigned.
for the roles are defined during the time the role is created. The SELinux user identities are different from UNIX
If the role column in the matrix is 1 it means that role can identities. Here, for experimentation the normal roles
be provided access for that location and further step 3 of the defined are R1, R2, R3, R4, ............R24 and the
algorithm is executed else the access to that role is denied. corresponding Selinux roles defined are R1_r, R2_r, R3_r,
R4_r, ......R24_r. These roles are associated with the user.
Matrix2 The normal user are U1, U2, U3, U4, ........Un and the
For Time T1 corresponding Selinux users defined are U1_u, U2_u, U3_u,
R1 R2 R3 R4 R5 R6 R7 R8 U4_u, ........... Un_u.
Here _r identifies the roles while _u identifies the user.
L1 1 0 0 0 0 0 0 0 SELinux user identities are different from UNIX identities.
L2 1 1 1 0 0 0 0 0 They are applied as part of the security
label and can be changed in real time under limited
L3 1 1 1 0 0 0 0 0 conditions. SELinux identities are not primarily
L4 1 1 1 1 0 0 0 0 used in the targeted policy. In the targeted policy, processes
and objects are system_u, and the default
L5 1 1 1 0 1 1 1 0 for Linux users is user_u. When identities are part of the
policy scheme, they are usually identical to
For Time T2 the Linux account name (UID), and are compiled into the
R9 R10 R11 R12 R13 R14 R15 R16 policy. In such a strict policy, some system
accounts may run under a generic, unprivileged user_u
L1 1 0 0 0 0 0 0 0
identity, while other accounts have direct
L2 1 1 1 0 0 0 0 0 identities in the policy database
L3 1 1 1 0 0 0 0 0 _t identifies type. SELINUX_SRC/rbac is the place in which
roles are allowed to attain which other roles.
L4 1 1 1 1 0 0 0 0 Types are the primary security attribute Selinux uses in
L5 1 1 1 0 1 1 1 0 making authorization decisions as defined in permissions
above. This is defined in /etc/security/selinux/src/policy.
For Time T3 Depending on this roles can be assigned.
R17 R18 R19 R20 R21 R22 R23 R24 7. Representation of the Matrix and
decomposition / retrieval
L1 1 0 0 0 0 0 0 0
Using the three Matrix defined in the above method, the
L2 1 1 1 0 0 0 0 0 next step is to apply the well known Hungarian Algorithm
L3 1 1 1 0 0 0 0 0 to represent the matrix in the form of a graph. The Steps in
the Hungarian Algorithm is as follows:
L4 1 1 1 1 0 0 0 0
L5 1 1 1 0 1 1 1 0
(IJCNS) International Journal of Computer and Network Security, 53
Vol. 2, No. 4, April 2010
Step 1 Similarly, the graphs for the other two matrix is drawn and
Generate initial labeling L and matching M in EL. reduced as shown.
Now, using the two graphs we apply the path ear
Step 2 decomposition algorithm. The steps of the path Ear
If M perfect, stop. decomposition algorithm is as follows:
Otherwise pick free vertex U such that it belongs to X. An ear decomposition D = [ P0 , P1 , P2 , ………., Pr-1 ] of an
Set S = { U } , T = Null. undirected graph G = (V, E) is a partition of E into an
ordered collection of edge-disjoint simple paths P0 , P1 , P2 ,
Step 3 ………., Pr-1 such that P0 is an edge, P0 U P1 is a simple
cycle, and each end point of Pi , for i > 1, is contained in
If NL (S) = T, Update labels (forcing NL(S) ≠ T) some Pj , j < i, and none of the internal vertices of Pj are
contained in any Pj , j < i. The paths in D are called ears. An
αl = mins € S, y does not belong to T. ear is open if it is non-cyclic and is closed otherwise. A
trivial ear is an ear containing a single edge. D is an open
l(v) – αl if v € S ear decomposition if all ears are open.
l’(v) = l(v) + αl if v € T Let D = [ P0 , P1 , P2 , ………., Pr-1 ] be an ear
l(v) otherwise decomposition for a graph G = (V, E). For a vertex v in V,
we denote by ear(v), the index of the lowest numbered ear
that contains v; for an edge e = (x,y) in E, we denote by
Step 4 ear(e) (or ear(x,y)), the index of the unique ear that contains
If Nl (S) ≠ T, Pick y € Nl (S) – T e. A vertex v belongs to Pear(v).
If y free, u – y is the augmenting path, The path ear decomposition algorithm:
Then Augment M and Go to step 2. Input: A connected graph G = (V, E) with a root r € V, and
Else with V = n.
If y matched, say to z, extend alternating tree: Output : A depth first search tree of G, together with a label
Such that, S = Su { z }, T = T U { y } on each edge in E, indicating its ear number.
Go to step 3. Set T of edges; integer count;
Procedure df s(vertex v);
Matrix1 and its graph representation G1 { * This is a recursive procedure. The call df s(v) of the
main program constructs a depth first search tree T of G
rooted at r; the recursive call df s(w) constructs the sub tree
of T rooted at w. The depth first search tree is constructed
by placing the tree edges in the set T and labeling the
vertices in the sub tree rooted at vertex v in pre-order
numbering, starting with count. The procedure assigns ear
labels to the edges of G while constructing the depth first
search tree. An edge that does not belong to any ear is given
the label (∞, ∞). Initially, all vertices are unmarked. * }
Vertex w;
‘mark’ v;
Pre-order(v) := count; count := count + 1; low(v) := n;
ear(v) := (n,n);
For each vertex w adjacent to v
{ * This for loop performs a depth forth search of each child
of v in turn and assigns ear labels to the tree and non tree
Matrix2 and its graph representation G2
edges incident on vertices in the sub trees rooted at the
children of v. * }
If w is not marked
Add (v,w) to T; parent(w) : = v; df s(w);
If low(w) ≥ pre-order(w)
ear(parent
(w), w) := (∞, ∞)
Low(w) < pre-order(w) ear(parent(w),w) := ear(w)
Fi;
Low(v) := min(low(v), low(w));
Ear(v) := lexmin(ear(v), ear(w))
If w is marked
If w ≠ parent (v)
Low(v) := min(low(v), pre-order(w));
54 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Acknowledgements
Mr. Nagarajan S is presently working
We Would like to thank Prof. K. A Venkatesh, HOD as Selection Grade Lecturer, at the
Department of Computer Applications, Alliance Business Alliance Business Academy, Bangalore.
Academy for all his support and discussions. We would also He is also a Research Scholar at
like to thank Mr. Mahesh M S for the experimental support Bharathiar University at Coimbatore. He
provided in the lab during the preparation of this algorithm has nearly about 13 years of Industry and
and module. teaching experience. He has published
one international paper in an
International Journal and 5 in various conferences.
(IJCNS) International Journal of Computer and Network Security, 55
Vol. 2, No. 4, April 2010
2. Literature Survey
3. Proposed Algorithm AB AD A’ D
è(Crossover) è (Mutation)
The algorithm consists of two phases where the first phase
CD CB C’ B
is of generating random numbers and the other performs
encryption/ decryption.
Double Crossover
3.4 Key Generation Suppose that the Message is AB and Key is CD
The algorithm uses a 4-tuple key {p, q, s, k} where p and
q are large prime numbers, s is a chosen random number Where, A is part of Plain text before first breaking point
which is relatively prime to n, the product of p and q and k, B is part of Plain text between first and second
the key size. The key size is of Variable one. breaking points.
Then, the algorithm uses the Blum, Blum, Shub C is part of Plain text after the second breaking
Generator for generating the random numbers (Which is point.
described in Section 2.1) which are used as keys in each D is part of Key before first breaking point.
iteration for encryption. E is part of Key between first and second breaking
1. Choose p=7 and q=19
point.
2. Implies, n= 7 X 19 = 133
F is part of Key after the second breaking point.
3. Choose s=100, relatively prime with 133
4. Then, X0 =s2mod n= (100)2 mod 133= 25
X1=(X0)2 mod n= (25)2 mod 133= 93 ABC DBF D B’ F
X2=(X1)2 mod n= (93)2 mod 133= 4 è(Double Crossover) è(Mutation)
X3=(X2)2 mod n= (4)2 mod 133= 16 DEF AEC A E’ C
. .
. . Then, the Plain Text’s (Binary representation of ASCII
Here, the key is represented as {7, 19, 100, 8 }. code) is cross-over’d with Key (Binary representation)
generated by BBS (Section 3.1)
3.5 Encryption/ Decryption Algorithm
The proposed algorithm follows the below given method Here, The Cipher text that will be sent consists of 2 numbers
for encryption and decryption. The Random numbers should A’D and C’B instead of AB in the reverse number (if single
be generated concurrently in both the processes. crossover is performed) and DB’F and AE’C instead of
3.2.4 Encryption ABC in the reverse order (if double crossover is performed).
The Encryption process is carried out as :
for every bit in the file until EOF For the plain text “TEXT” the encryption process is as
if random number generated is odd follows:
perform CROSSOVER between plain text(binary
representation of ASCII value) and the random Character ASCII Value Binary Value
number(in binary representations ) where the T 83 01010011
breaking point is xi%k . E 69 01000101
else if the number generated is even X 87 01010111
perform Double CROSSOVER between plain T 83 01010011
text(binary representation of ASCII value) and the
random number(in binary represenations) where the 01010011(83) 01011001 01001001(73)
first breaking point is xi%k and second one is è(Crossover) è(Mutation)
(xi+s)%k. 00011001(25) 00010011 00000011(3)
perform MUTATION at the (2*xi)%k position in the
offsprings.. So the Cipher Text is (3, 73). This process is continued until
all the text in source file (Plain text) is completed.
The set of two numbers from the above output is the cipher 3.2.5 Decryption
text.
Single Crossover The Decryption process is carried out as :
Generate random numbers concurrently.
Suppose that the Message is AB and Key is CD for every bit in the file(cipher text) until EOF
Where, A is part of Plain text before breaking point if random number generated is odd
B is part of Plain text after breaking point. read two characters at a time.
C is part of Key before breaking point. perform CROSSOVER between the second number
D is part of Key after breaking point. read and the xi(binary representations) where the
breaking point is n%k .
perform MUTATION at the (2*xi)%k position in the
crossovered numbers.
(IJCNS) International Journal of Computer and Network Security, 57
Vol. 2, No. 4, April 2010
perform CROSSOVER between first offspring of the Ease of analysis : The algorithm is explained concisely over
above phase and the first character read(in binary here. Even though it is difficult to cryptanalyze . RSA and
representations). DES lacks in this feature.
else if the number generated is even
perform Double CROSSOVER between the second 5. Conclusion and Future Enhancements
number and the key (binary representation of ASCII
Hence, The paper proposes a new algorithm which is
value)where the first breaking point is xi%k and
equivalently secure with RSA and Triple DES and which
second one is (xi+s)%k .
can be easily implemented on the hardware.
perform MUTATION at the (2*xi)%k position in the
crossovered numbers. Future process will be devoted to extend the algorithm to
perform CROSSOVER between first number of the achieve the other security services like Authentication, Data
above output and the first character read(binary Integrity etc.,
representations).
References
The first number of the above output is the plain text(if
single crossover is to be performed) [1] Lenore Blum, Manuel Blum, and Michael Shub.,
“Comparision of two pseudo random number
generators” Proc. CRYPTO’82, pages. 61-78,
A’ D A’ D A D
Newyork, 1983.
è (Crossover) è(Mutation)
[2] William Stallings, “Cryptography and Network
C D C’ D C’ D
Security”, Prentice Hall, 3rd Edition.
[3] Subramil Som, Jyotsna Kumar Mandal and Soumya
A D A B à Plain Text Basu, “A Genetic Functions Based Cryptosystem
è(Crossover) (GFC)”, IJCSNS, September 2009.
C’ B C’ D [4] Ankit Fadia, “Network Security”, Macmillan India Ltd.
Abstract: Cluster Management using Cluster Size Ratio delivering messages in a decentralized environment where
(CMCSR) is a completely distributed algorithm for partitioning network topology fluctuates is not a welldefined problem
a given set of mobile nodes into clusters. The proposed algorithm [1].
tries to reduce the amount of computational and information
overhead while maintaining a stable cluster formation. It 1.2 Clustering in Ad Hoc Networks
constructs and maintains a backbone topology based on a A wireless ad hoc network consists of nodes that move freely
minimal dominating set (MDS) of the network. According to this
and communicate with each other using wireless links. Ad-
algorithm, each node determines the membership in the MDS for
itself and its one-hop neighbors based on one-hop neighbor
hoc networks do not use specialized routers for path
information that is disseminated among neighboring nodes discovery and traffic routing. One way to support efficient
using willingness and priority information of the nodes. The communication between nodes is to develop wireless
algorithm then ensures that the members of the MDS are backbone architecture; this means that certain nodes must be
connected into a connected dominating set (CDS), which can be selected to form the backbone. Over time, the backbone
used to form the backbone infrastructure of the communication must change to reflect the changes in the network topology
network to facilitate routing. The algorithm outperforms the as nodes move around. The algorithm that selects the
existing algorithms with respect to stability. Load balancing the members of the backbone should naturally be fast, but also
cluster heads using the cluster size ratio is the heuristic used in should require as little communication between nodes as
this algorithm. possible, since mobile nodes are often powered by batteries.
One way to solve this problem is to group the nodes into
1. Introduction clusters, where one node in each cluster functions as cluster
head, responsible for routing [2].
This section discusses elementary issues of ad hoc networks
and benefits of clustering. 1.3 Benefits of clustering
Ad-hoc networks are suited for use in situations where an
1.1 Ad Hoc Networks infrastructure is unavailable or to deploy one is not cost
In the next generation of wireless communication systems, effective. One of many possible uses of mobile ad-hoc
there will be a need for the rapid deployment of independent networks is in some business environments, where the need
mobile users. Significant examples include establishing for collaborative computing might be more important
survivable, efficient, dynamic communication for outside the office environment than inside, such as in
emergency/ rescue operations, disaster relief efforts, and business meeting outside the office to brief clients on a
military networks. Such network scenarios cannot rely on given assignment.
centralized and organized connectivity, and can be Mobile ad-hoc networks allow the construction of flexible
conceived as applications of ad hoc networks. An ad hoc and adaptive networks with no fixed infrastructure. These
network is an autonomous collection of mobile users that networks are expected to play an important role in the future
communicate over relatively bandwidth constrained wireless wireless generation. Future wireless technology will require
links. Since the nodes are mobile, the network topology may highly-adaptive mobile networking technology to effectively
change rapidly and unpredictably over time. The network is manage multi-hop ad-hoc network clusters, which will not
decentralized, where all network activity including only operate autonomously but also will be able to attach at
discovering the topology and delivering messages will be some point to the fixed networks.
taken care by the nodes, i.e., routing functionality will be
incorporated into mobile nodes. 2. Literature Review
The set of applications for ad hoc networks is diverse, This section emphasizes some of the past clustering
ranging from small, static networks that are constrained by techniques.
power sources, to large-scale, mobile, highly dynamic
networks. The design of network protocols for these 2.1 Types of Topology Management
networks is a complex issue. Regardless of the application, There are two approaches to topology management in ad
ad hoc networks need efficient distributed algorithms to hoc networks:
determine network organization, link scheduling, and
• Power control.
routing. However, determining viable routing paths and
• Hierarchical topology organization.
(IJCNS) International Journal of Computer and Network Security, 59
Vol. 2, No. 4, April 2010
other. We will only consider bidirectional links. It is priorities that consists of two components: (a) Neighboring
assumed the MAC layer will mask unidirectional links and Nodes, (b) Willingness value assigned to a node as a
pass only bidirectional links. Beacons could be used to function of its mobility and energy level.
determine the presence of neighboring nodes. After the We denote the willingness value of node i by Wi, the speed
absence of some number of successive beacons from a of node i by a scalar Mi that ranges from 0 to 1 meters per
neighboring node, it is concluded that the node is no longer second, and the remaining energy on node i as E i in the
a neighbor. Two nodes that have a wireless link will, range of 0 and 1. The willingness Wi is a function that
henceforth, be said to be one wireless hop away from each should be defined according to the following criteria:
other. They are also said to be immediate neighbors.
Communication between nodes is over a single shared 1. To enhance survivability, each node should have the
channel. responsibility of serving as a cluster head with some
nonzero probability determined by its willingness value.
In ad hoc networks the nodes within each neighborhood are 2. To facilitate with the stability and the frequency with
not known a priori. The individual cluster may transition to which cluster head elections must take place, the
spatial TDMA for inter-cluster and intra-cluster willingness value of a node should remain constant as long
communication. All nodes broadcast their node identity as the variation of the speed and energy level of the node do
periodically to maintain neighborhood integrity. Due to not exceed some threshold values.
mobility, a node’s neighborhood changes with time. As the 3. To avoid electing cluster heads that quickly lose
mobility of nodes may not be predictable, changes in connectivity with their neighbors after being elected, the
network topology over time are arbitrary. However, nodes willingness value of a node should decrease drastically after
may not be aware of changes in their neighborhood. the mobility of the node exceeds a given value.
Therefore, clusters and cluster heads must be updated 4. To prolong the battery life of a node, its willingness
frequently to maintain accurate network topology. value should decrease drastically after the remaining energy
of the node drops below the given level.
3.2.1 Attributes of a node
Willingness value (Wi) is as specified below:
The attributes of a node and their functionality are as given log2(Ei+.9)log2(Mi+2)
Wi = 2
in Table I.
Here the constants 0.9 and 2 in Eq. (1) eliminate the
Table 1: Attributes of a node and their functionality
boundary conditions in the logarithmic operations. The
ATTRIBUTE FUNCTION logarithmic operations on the speed and the remaining
energy values render higher willingness values in the high
ID Unique name given to node
energy and low speed field, while giving close to zero values
ENERGY The capacity to work in
in the low energy and high-speed region.
MOBILITY The speed of the node when it
is moving Priority value (Pi) is a function of no.of neighbors and
WILLINGNESS How much the node is willing willingness
to be a cluster head i.prio = 2log2(Wi)/n
PRIORITY Has the priority among other Figure 1 illustrates the effect of the two factors on the
nodes to became a cluster head priority values. From the Figure 2 we can conclude that the
CLUSTER SIZE Cluster size ratio which it is priority is directly proportional to the willingness value and
having number of neighbors.
TYPE Whether it is cluster head or
gateway or door way or
member
NEIGHBORS Number of one – hop neighbors
1
Duration, which provides a basis for evaluating the shaped line indicates the cluster head duration with load i..e.
performance of the proposed load-balancing heuristic. incase of CMCSR.
For the purposes of these simulations we have set the cluster
head budget to be a function of the maximum amount of
4.2 Nodes Vs Number of Cluster Heads
work it performs That is, once a node becomes a cluster
head it will remain a cluster head until it has exhausted its Figure 3 shows the graph for the average number of cluster
maximum work load, or until it loses out to another cluster heads formed during the topology management. The
head based on the rules of the cluster election heuristic. topology management is executed for 1800 seconds for each
of x nodes and the values are noted. The diamond shaped
The proposed CMCSR algorithm makes a noticeable line indicates the number of cluster head formed during
difference in the cluster head duration (ranging from 4% to topology management without load (TMPO). Second the
28%). This shows that the load-balancing heuristics topology management executed for the 600 seconds for each
generates longer cluster head durations; it will also produce x nodes and the values are noted. Totally the program is
much tighter and more deterministic responses (stability). executed for 18000 seconds. The square shaped line
These results are not surprising. Therefore, once a cluster indicates the cluster head formed during topology
head is elected it continues as cluster head for a maximum management with load (CMCSR).
of the programmed budget. This will provide the longer
cluster head durations that we see. The cluster size ratio 16
No.of Clusters
cluster head among all nodes. We present below three
8
graphs for our simulation results. First one is the average
cluster head duration. Second one is the average number of 6
cluster head. And finally the improvement graph for the
cluster head duration. 4
2
4.1 Nodes Vs Cluster Head Duration
0
Figure 2 shows the graph for the average cluster head 10 20 30 40 50 60 70 80 90 100
duration. X-axis takes the number of nodes and y-axis No.of Nodes
shows the cluster head duration in seconds. The topology TMPO CMCSR
management is executed for 1800 seconds for each x nodes
Figure 3. Average no. of clusters
and the values are noted. Totally the program is executed for
18000 seconds. The diamond shaped line indicates the
cluster head duration without load i.e. incase of TMPO.
25
30
25
20
Cluster Head Duration(in Sec)
20
15
15
10
10
5
0
10 20 30 40 50 60 70 80 90 100
No. of Nodes
0
T MPO CMCSR
900 1800 2700 3600
Syst em Executed(Sec)
Figure 2. Average Cluster head duration Vs no. of nodes TMPO CMCSR
Second the topology management is executed for the 600 Figure 4. Average Cluster head duration
seconds for each x nodes and the values are noted. Totally
the program is executed for 18000 seconds. The square
(IJCNS) International Journal of Computer and Network Security, 63
Vol. 2, No. 4, April 2010
4.3 Improvement in Cluster head Duration Sciences Research 2(6): 336-340, INSInet Publication,
2006.
Figure 4 shows the graph for the average cluster head
[4] L. Hu. “Topology Control for Multihop Packet Radio
duration. X-axis takes system executed in seconds and y-
Networks,”. IEEE Transactions on Communications,
axis shows the average cluster head duration in seconds.
41(10), Oct. 1993.
The below graph is constructed under the following
[5] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and
conditions. Both TMPO and CMCSR is run for 900 sec,
P. R. Kumar, “Power Control in Ad-Hoc Networks:
1800 sec, 2700 sec and 3600 sec by taking total number of
Theory, Architecture, Algorithm and Implementation of
nodes into account as 50. The diamond shaped line indicates
the COMPOW Protocol,” Proceedings of the European
the cluster head duration without load and the square shaped
Wireless Conference on Next Generation Wireless
line indicates the cluster head duration with load. The
Networks: Technologies, Protocols, Services and
results related to the above three graphs indicates that
Applications, pages 156-162, Florence, Italy, Feb. 25-
CMCSR outperforms TMPO.
28, 2002.
[6] H. Takagi and L. Kleinrock, “Optimal Transmission
Ranges for Randomly Distributed Packet Radio
5. Conclusions Terminals,” IEEE Transactions on Communications,
32(3),7, Mar. 1984.
The cluster size load balancing heuristics have been [7] L. Li, V. Bahl, Y.M. Wang, and R. Wattenhofer,
proposed for ad hoc networks. The cluster election heuristics “Distributed Topology Control for Power Efficient
favor the election of cluster heads based on node willingness Operation in Multihop Wireless Ad Hoc Networks,”
and number of neighbors. Here the heuristic places a cluster Proceedings of IEEE Conference on Computer
size budget on the contiguous amount of time that a node Communications (INFOCOM), Apr. 2001.
acts as cluster head. As seen from the simulation results, [8] R. Ramanathan and R. Rosales-Hain, “Topology
this heuristic produce larger cluster head durations while Control of Multihop Wireless Networks using Transmit
decreasing the cluster size and enhancing the stability. Power Adjustment,” Proceedings of IEEE Conference
on Computer Communications (INFOCOM), IEEE,
Our proposed CMCSR is a novel energy-aware topology Mar. 26-30, 2000.
management approach based on dynamic node priorities and [9] R. Prakash, “Unidirectional Links Prove Costly in
cluster size load in ad hoc networks. CMCSR consists of two Wireless Ad-Hoc Networks,” Proceedings of the
parts that implement the MDS and CDS elections Discrete Algorithms and Methods for Mobile
respectively. Compared to five prior heuristics of MDS and Computing and Communications - DialM, Seattle, WA,
CDS elections in ad hoc networks, MDS offers four key Aug. 20, 1999.
advantages. i) CMCSR obtains the MDS and CDS of the [10] S. Bandyopadhyay and E. J. Coyle, “An Energy
network without any negotiation stage; only two-hop Efficient Hierarchical Clustering Algorithm for
neighbor information is needed. ii) CMCSR allows nodes in Wireless Sensor Networks”, In Proc. INFOCOM 2003,
the network to periodically re-compute their priorities, so as San Francisco, Apr, 2003.
to balance the cluster head role and prolong the battery life [11] M. Maeda and Ed Callaway, "Cluster Tree Protocol
of each node. iii) CMCSR introduces the willingness value (ver.0.6)",http://www.ieee802.org/15/pub/2001/May01/
of a node, which decides the probability of the node being 01189r0P80215_ TG4-Cluster-Tree-Network.pdf.
elected into the MDS according to the battery life and [12] L. Bao and J.J. Garcia-Luna-Aceves, “Transmission
mobility of the node and iv) MDS introduces doorway Scheduling in Ad Hoc Networks with Directional
concept for the CDS in addition to the well-known gateway Antennas,” Proc. ACM Eighth Annual International
and cluster head concepts. Conference on Mobile Computing and networking,
A key contribution of this work consists of converting the Atlanta, Georgia, USA, Sep, 23-28 2002.
static attributes of a node, such as node identifier, into a [13] B. Chen, K. Jamieson, H. Balakrishnan, and R.
dynamic control mechanism that incorporates the three key Morris, “Span: an Energy-Efficient Coordination
factors for topology management in ad hoc networks -- the Algorithm for Topology Maintenance in Ad Hoc
nodal battery life, mobility, and cluster size load balancing. Wireless Networks,” In Proc. 7th ACM MOBICOM,
Although existing proposals have addressed all these Rome, Italy, Jul, 2001.
aspects, CMCSR constitutes a more comprehensive [14] C.C. Chiang, H.K. Wu, W. Liu, and M. Gerla,
approach. “Routing in Clustered Multihop, Mobile Wireless
Networks with Fading Channel,” IEEE Singapore
References International Conference on Networks SICON'97, pages
[1] http://w3.antd.nist.gov/wahn_mahn.shtml. 197-211, Singapore, Apr. 14-17, 1997.
[2] Tomas Johansson and Lenka Carr-Motyˇckov´. “On [15] L. Bao and J.J. Garcia-Luna-Aceves, “Topology
Clustering in Ad Hoc Networks,” First Swedish Management in Ad Hoc Networks,” Proc of the 4th
National Computer Networking Workshop, ACM Interational Symposium on Mobile Ad Hoc
SNCNW2003, 8-10 September, 2003. Networking and Computing (MOBIHOC), Annapolis,
[3] R.Pandian, P.Seethalakshmi and V.Ramachandran, Maryland, USA, Jun. 2003.
“Enhanced Routing Protocol for Video Transmission
over Mobile Adhoc Network,” Journal of Applied
64 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Authors Profile
Mr D K L V Chandra Mouly received M.Tech (CSE) from S V
University College of Engineering, Tirupati, India in the year
2007. Currently he is pursuing his Ph.D. (Part-time) at S V
University, Tirupati. His areas of interests are Computer Networks
and Distributed Systems.
battery and lamp; and LEDs luminosity level), control layer level.
(switch the luminosity level lamp on or off; switch on/off a In contrast to reactive algorithms, there are proactive
lamp post, a selected segment, a street, neighbourhood, city, algorithms, such as DSDV (Dynamic Destination Sequenced
etc; automatic programmed actions and freedom to actuate Distance-Vector) [14] and OLSR (Optimized Link State
the devices through a remote tool) and diagnostic and Routing) [15]. Instead of building optimized routes only
alarms (trigger an event when a network, hardware or lamp when they are necessary, proactive algorithms keep a matrix
failure occurs). of connections always updated, which reflects the current
During each device’s initialization, a GPS set attributes the network status and channels available for data transfer.
geographic coordinates of their positions. From the computational and electric power consumption
The user would be able to select a specific area on the map point of view, these algorithms are too costly, especially
besides the previously programmed area (for example, when providing mobility or when a fail occurs.
selecting a segment from a street) to actuate (switch the Geographic routing algorithms use the geographic location
lights on or off). Figure 1 shows the area selected by the user of the devices as a reference, and the location can be
through the system supervision and control tool. obtained from a GPS. The great advantage for this type of
routing is that routing tables are not necessary because the
devices decide where to forward the package according to
the smallest Euclidean distance of the destination
coordinate, for example.
Since those algorithms were designed for mobile devices,
one of the steps for this type of routing is transmitting
“hello” messages to all neighbouring devices (in radio
range), that periodically send packages with the
identification (such as the network address) of the device
and its position. So, the devices store the location of their
neighbours. They apply the greedy routing [16] by
transmitting a message to their neighbours that are
relatively closer in distance to the final destination. For any
variation of the greedy algorithm, it is important to define a
discard criterion to prevent the message from being
Figure 1. System Supervision and Control Screen transmitted uninterruptedly over the network in case the
specified destination is not located. However, in cases where
Mechanisms to automatize input information process in the it is necessary to find a balance between performance and
public lighting system must be applied, in order to become guarantee of delivery, the discard criterion must be defined
the process simplest and fast. Such mechanisms are not in
even if there is a path to the final addressee.
the scope of this paper.
To assure package delivery, greedy algorithms are
frequently used combined with recovering strategies,
4. Correlated works of routing algorithms for providing two operation modes. Such strategies are used
WSN when a package is discarded in “pure” greedy mode, in case
This section intends to review researches found in the there is an obstacle or a non-operating network device, for
literature related to routing algorithms for WSN in general, example.
independent of the application. The most prominent recovering strategy uses planar graphs.
Routing algorithms for mesh-based networks, such as Basically, the idea is to draw the network as a unique graph
AODV (Ad-Hoc On Demand Distance Vector) [12], DSR on a plane and forward the message in the direction of the
(Dynamic Source Routing) [13], and DREAM (Distance adjacent faces, which consequently forward the package to
Routing Effect Algorithm for Mobility) [13] were developed the final destination. Those strategies are extensively
to provide mobility. These algorithms are reactive, that is, studied, as in GFG (Greedy-Face-Greedy) [17], GPVFR
routes are determined by flooding through nodes searching (Greedy Path Vector Face Routing) [18], GPSR (Greedy
the addressee node when a flow of information (triggered by Perimeter Stateless Routing) [19] and GOAFR++ (Greedy
the upper layer) occurs. When the route is determined, it is Other Adaptive Face Routing plus plus) [20].
stored in the memory of the participant nodes. This In the GPSR algorithm, the recovering strategy is named
mechanism causes high energy costs, performance costs and perimeter mode and uses the right hand rule to direct the
guarantee of delivery costs. Besides, devices would have to flow of network packages through the devices. In case the
keep large routing tables in dense networks, which would be distance from the device to the destination is smaller than
impossible considering that such devices have low memory the distance to its neighbours, the algorithm returns to the
available. It is also interesting to keep the minimum possible greedy mode.
overhead in the network package, because it is limited at The term unicast means a point-to-point connection where
127 Kb by the IEEE 802.15.4 specification on the data link data is sent from a sender to a receiver. The most
(IJCNS) International Journal of Computer and Network Security, 67
Vol. 2, No. 4, April 2010
appropriate type of routing in our context, however, is the messages are responsible to forward the packages; and,
so-called geocast, that also requires the devices to know finally, consultation messages are responsible to obtain the
their geographic positions via GPS. The algorithms deliver location of the addressees from one or more location
network messages to the devices in a specific geographic databases for a certain unique device’s identification (for
area, delivering a message from one device to many devices. example, the network address). Once the scenario does not
There are several routing algorithms developed for that have mobility, consultation messages and location servers
purpose, some based on flooding messages, directed can be removed. Such functionality was implemented
through “hello” messages that send the unique identification
flooding messages, and without flooding. Flooding messages
and the location. Besides, the supervision and control
algorithms find the path to the destination area the same
software requires the location of all devices on the network.
way AODV does. The first package arriving at the
Thus, the package would be sent by the system with the
destination area broadcasts to all nodes in the area. On the geographic coordinate of the destination, instead of having
other hand, directed flooding messages algorithms define only the network address and requiring the current device to
two types of areas, the destination and the routing area. An obtain its location through the location server.
example of directed flooding is the LBM (Location Based The difference between GGPSR and GGPSRII consists only
Multicast) algorithm [21] that is executed as follows: the in the trigger condition of “hello” messages. In GGPSR, the
routing area is defined as an area in the direction of the trigger is invocated according to a pre-determinated
destination area, and packages forwarded outside these two frequency (period). On the other hand, in GGPSRII, the
areas are discarded. trigger is invocated if only the data message does not reach
the destination (geocast region).Thus, it is necessary to
5. Proposed Routing Algorithms implement a confirmation message to inform the data
message forwarding failure. Table II show the GGPSRII
The algorithms proposed in this study, without flooding, are simplified pseudo-algorithm.
named GGPSR (Geocast Greedy Perimeter Stateless Routing
Protocol) and GGPSR II (Geocast Greedy Perimeter Table 1: GGPSR simplified pseudo-algorithm
Stateless Routing Protocol II). They consist of two parts: // Initialization
modified GPSR to find the destination area and geocast to For all devices
Send_Broadcast_Hello_Neighbors ();
broadcast the message to all addressee devices.
Instead of using the specific coordinate of a device as the Start Hello_Timer (period);
destination, the central point of the destination area is If Hello_Timer_Expire
calculated. The package is then forwarded to this point and, Send_Broadcast_Hello_Neighbors ();
when it gets to the destination area, the first device //Send
receiving the message broadcasts it to all devices in the area. If (Packet.Destination_Position != myPosition &&
myPosition = = UNICAST)
As soon as a device receives the broadcasted message, the ModifiedGPSR_Forward (Packet);
device checks if it has already received this message, Else If (Packet.Destination_Position = = myPosition
&& myPosition = = GEOCAST){
checking a sequential number and therefore avoiding If (Packet.seqN_ < ReceivedSeqNo){
Broadcast_Neighborhood_Geocast_Region(Packet);
unnecessary retransmissions. In case the device has not }
received the message yet but it is in the destination area, the }
device receives and rebroadcasts the message to the network. //Receive
Table I shows the pseudo-algorithm GGPSR in a simplified If (Packet.Destination_Position = = myPosition &&
myPosition = = UNICAST)
way. ModifiedGPSR_Receive (Packet);
Considering the GPSR part of the proposed algorithm Else If (Packet.Destination_Position = = myPosition
&& myPosition = = GEOCAST){
GGPSR (only), this work suggests some modifications for If (Packet.seqNo¬ _ < ReceivedSeqNo){
lighting systems applications. The first modification is ModifiedGPSR_Receive (Packet);
}
related to the “hello” messages. For the discussed }
application, devices are fixed. Initially, it was assumed that
only one “hello” message when the device is initialized Regarding the destination area, it can have the shape of a
would be enough. However, it is interesting to keep this four-vertex polygon, circle and point (in this last case, the
functionality but with a periodicity much longer than what it communication is unicast).
is used in mobile devices. The reason to still keep this The geographic position is represented through geodesic
periodicity is that the device can simply stop operating coordinates (latitude and longitude). Each coordinate is
because of a permanent or temporary failure caused by an allocated as floating types, which in language C has 4 bytes
obstruction. Information about the neighbors from the and precision of seven decimal places. In relation to the
devices can affect the network reliability because each value ranges, this size is more than enough: the field
device is also a message router. "hours" of the latitude coordinate varies between -180 and
The second modification is related to storing geographic 180, whereas longitude varies between -90 and 90.
positions for the neighbors (applied to GGPSR and Table III shows the header struct in C language of the
GGPSRII). Originally, GPSR has three types of messages: packet types, including “hello” messages (hdr_gpsr_hello),
“hello” messages, consultation to destination locations and and data messages (hdr_gpsr_data) of the proposed protocol.
data messages [19]. “Hello” messages are responsible to
inform the new device’s location to its neighbors; data
68 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Related to the “hello” packet, the field “type_” refers to the Table 4: Configurations for simulation
packet type (whether it is “hello” or data packet). The field Network Interface Phy/WirelessPhy/802_15_4
“x_” and “y_” are the source device geodesic coordinates. MAC Mac/802_15_4
The field “seqNo” is used to control the receiving and IFQ Queue/DropTail/PriQueue
rebroadcast actions, i. e., a device must have to broadcast Link Layer LL
just a once “hello” messages to its neighbours. Antena Antenna/OmniAntenna
Related to the data packet, the fields “sx_” and “sy_” are Dimension X 170
the source device geodesic coordinates. The field “ts_” is the Dimension Y 270
timestamp, used for calculate latency. The fields IFQLEN 50
“sx_GF_Failed” and “sy_GF_Failed_” correspond to the Propagation Propagation/TwoRayGround
coordinates where the greedy mode have failed, that are Phy/WirelessPhy Pt_ 7.214e-3 (100m)
Number of Devices 100
used for the packet whether it can be return to that mode in
Duration 1000 simulation time
case it is in the perimeter mode. The field “seqNo” is used
Transmission Power 0.3 mW
for control the receiving and rebroadcast actions on the
Reception Power 0.28 mW
geocast region. The rest of variables are the polygon 1 Joule
Initial Energy
coordinates’. Packet size (less 64 bytes
header)
Table 3: GGPSR and GGPSRII header packets Flow CBR (Constant Bit Rate)
struct hdr_gpsr_hello {
u_int8_t type_;
float x_; Simulation foresees the basic operation situation: network
float y_;
int seqNo_; traffic is requested every twelve hours (assuming that the
}; unit of simulation is in hours), that is, switch the lights on
struct hdr_gpsr_data {
u_int8_t type_; and off for a street segment, for example.
u_int8_t mode_;
float sx_; GPSR and GGPSR “Hello” messages periodicity were
float sy_; configured to 12 hours, that is the time to send data.
float ts_;
float sx_GF_Failed_; It is important to emphasize that in case of unicast
float sy_GF_Failed_; algorithms, ten messages are sent from device 98 to all
float dst_x1; devices in the “last line”, as mentioned before. In case of
float dst_y1;
float dst_x2; geocast algorithms, only one message is sent to all
float dst_y2; addressees.
float dst_x3;
float dst_y3; Figure 3 shows a comparison of the electric power of all
float dst_x4; devices in the network summed during the time interval. It
float dst_y4;
int seqNo_; was verified that the AODV protocol is the least efficient,
}; and GGPSRII is the most efficient. It can be concluded that
the use of ZigBee protocol is strongly not recommended.
(IJCNS) International Journal of Computer and Network Security, 69
Vol. 2, No. 4, April 2010
Acknowledgment
The authors gratefully acknowledge the academic support and
research structure from the Engineering School of São Carlos
- University of São Paulo. The authors also acknowledge the
important technical contributions from Smar International
Corporation and the Prof. Tracy Camp for helping in provide
Figure 4. Delivery rate an implementation of LBM algorithm, which was very
helpful for an implementation of the LBM implementation of
this work.
70 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
References [18] Leong, B.; Mitra, S.; Liskov. B. “Path vector face
routing: Geographic routing with local face information”.
[1] Reluz Program (Jan. 2010). “National Program of In Proceedings of the IEEE Conference on Network
Efficient Public Lighting and Traffic Lights”. Available: Protocols, 2005.
http://www.eletrobras.gov.br/ EM_Programas_Reluz [19] Karp, B; Kung, H. T. (2000) GPSR: greedy perimeter
[2] Ei-Shirbeeny, E.H.T.; Bakka, M.E.. “Experimental pilot stateless routing for wireless networks. in Proceedings of
project for automating street lighting system in Abu Dhabi the 6th ACM/IEEE MobiCom. 2000, pp. 243-254, ACM
using powerline communication”. Proceedings of the 10th Press.
IEEE International Conference on Electronics, Circuits [20] Kuhn,F.;Wattenhofer,R.;Zhang,Y.;Zollinger, A.
and Systems. Vol. 2, p.743 – 746, Dec. 2003 “Geometric ad-hoc routing: of theory and practice”. in
[3] Chueiri, I.J.; Bianchim, C.G. “Sistema de Comando e Proceedings of the 22nd annual symposium on principles
Controle de Potência em Grupo para Iluminação Pública”. of distributed computing, 2003.
BR n.PI0201334-7, 2002. [21] Ko, Y.; Vaidya, N.H.”Geocasting in mobile ahoc
[4] Sungkwan C.; Dhingra, V. “Street lighting control networks: Location-based multicast algnrithms” .In
based on LonWorks power line communication Power Proceedings of WMCSA, pages 101-110, 1999.
Line Communications and Its Applications”. IEEE [22] Network Simulator NS2 (Jan. 2010). Available:
Symposium, 2008. http://www.isi.edu/nsnam/ns
[5] Sutterlin, P.; Downey, W. (1999). “A power line [23] Lee,S.;Ko,Y. “Geometry-driven Scheme for Geocast
communication tutorial – challenges and technologies”, Routing in Mobile Ad Hoc Networks”. The 2006 IEEE
Technical Report, Echelon Corporation, 1999. 63rd Vehicular Technology Conference (VTC),
[6] Streetlight Intelligence (Jan. 2010). Available: Melbourne, Australia, 2006.
http://www.streetlightiq.com
[7] Barriquello, C.H. ; Garcia, J.M. ; Corrêa, C. ; Menezes,
C.V. ; Campos, A. ; Do Prado, R.N. “Sistema Inteligente Authors Profile
Baseado em Zigbee para Iluminação Pública com
Lâmpadas de LEDS”. In: XVII Congresso Brasileiro de Rodrigo Palucci Pantoni R&D Systems
Automática. Anais do XVII CBA. Juiz de Fora, 2008. Analyst, received the Computer Science
degree in 2000 and subsequently received
[8] Zigbee. ZigBee PRO Specification, ZigBee Alliance.
the M.S. in 2006 at the University of São
2007. Paulo (USP). He's attending the Ph.D
[9] Denardin, G.W.; Barriquello, C.H.; Campos, A. Do course, in the same university, as part of his
Prado, R.N. “An Intelligent System for Street Lighting job at the Smar R&D department in the area
Monitoring and Control”. 10° Congresso Brasileiro de of software development for automation control and fieldbuses. He
Eletrônica de Potência. Brasil, Bonito, 2009. joined Smar in 2000, working
[10] Kushalnagar, N.; Montenegro, G.; Schumacher, C.. in the Smar R&D department where he conducts research and
“IPv6 over Low-Power Wireless Personal Area Networks development of host systems, including a Fieldbus Foundation
(6LoWPANs): Overview, Assumptions, Problem Asset Management and a Configurator system. He now teaches
Statement, and Goals”. Request for Comments: 4919, computer networks at Information Systems course at University
2007. Dr. Francisco Maeda.
[11] IEEE 802.15.4. “Wireless Medium Access Control
(MAC) and Physical Layer (PHY) Specifications for Low-
Rate Wireless Personal Area Networks”, IEEE Computer Dennis Brandão He received his Ph.D. degree in mechanical
Society, 2006. engineering at the University of São Paulo in
2005. He now teaches “Industrial
[12] Perkins, C. E.; Belding-Royer, E. M.; Das, S. R.. “Ad
Automation” at the Department of Electrical
Hoc On-Demand Distance Vector Routing”, Request for
Engineering of the same university. His
Comments: 3561, 2003. research activities are mainly in the area of
[13] Basagni, S.; Chlamtac, I.; Syrotiuk, V.R.; Woodward, fieldbus technology and application, with a
B.A. “A distance routing effect algorithm for mobility particular interest for distributed systems
(dream)”. In Proceedings of ACM/IEEE MobiCom ’98, and continuous process control.
1998.
[14] Perkins, C.; Bhagwat, P. “Highly Dynamic Destination
Sequenced Distance-Vector Routing for Mobile
Computers”. Comp. Commun. 1994.
[15] Clausen, T.; Jacquet, P. “Optimized Link State Routing
Protocol”. Request for Comments: 3626, 2003.
[16] Finn, G.G. “Routing and addressing problems in large
metropolitan scale internetworks”. Technical Report
ISI/RR-87-180, ISI, 1987.
[17] Bose, P.; Morin, P., Stojmenovic, I.; Urrutia, J.”Routing
with guaranteed delivery in ad hoc wireless networks”. In:
Proceedings of the 3rd International Workshop on Discrete
algorithms and methods for mobile computing and
communications. 1999, ACM Press.
(IJCNS) International Journal of Computer and Network Security, 71
Vol. 2, No. 4, April 2010
number of hops to reach the destination, the sequence must assume that connectivity with that neighbor has been
number of the information received regarding the lost. When a mobile receives a hello message from a new
destination, as well as a new sequence number unique to the node, that new node is added to the mobile’s routing table,
broadcast [2].. and the mobile sends the new node a copy of its routing
table information. Part of the novelty of WRP stems from
2.1.2The Wireless Routing Protocol the way in which it achieves loop freedom. In WRP, routing
The Wireless Routing Protocol (WRP) described in [5] is a nodes communicate the distance and second-to-last hop
table-based protocol with the goal of maintaining routing information for each destination in the wireless networks.
information among all nodes in the network. To describe WRP belongs to the class of path-finding algorithms with an
WRP, we model a network as an undirected graph important exception. It avoids the “count-to-infinity”
represented as G.V; E. , where V is the set of nodes and E is problem [6] by forcing each node to perform consistency
the set of links (or edges) connecting the nodes. Each node checks of predecessor information reported by all its
represents a router and is a computing unit involving a neighbors. This ultimately (although not instantaneously)
processor, local memory and input and output queues with eliminates looping situations and provides faster route
unlimited capacity. In a wireless network, a node has radio convergence when a link failure event occurs.
connectivity with multiple nodes and a single physical radio
link connects a node with many other nodes. Each node in 2.2 Source-Initiated On-Demand Routing
the network is responsible for maintaining four tables:
• Distance table A different approach from table-driven routing is source-initiated
• Routing table on-demand routing. This type of routing creates routes only when
• Link-cost table desired by the source node. When a node requires a route to
• Message retransmission list (MRL) table a destination, it initiates a route discovery process within the
Each entry of the MRL of the update Message, network. This process is completed once a route is found or
a retransmission counter, an acknowledgment- required flag all possible route permutations have been examined. Once a
vector with one entry per neighbor, and a list of updates sent route has been established, it is maintained by a route
in the update message. A link is assumed to exist between maintenance procedure until either the destination becomes
two nodes only if there is radio connectivity between the two inaccessible along every path from the source or until the
nodes and they can exchange update messages reliably with route is no longer desired.
a certain probability of success The MRL records which
updates in an update message need to be retransmitted and 2.2.1 Ad Hoc On-Demand Distance Vector Routing
which neighbors should acknowledge the retransmission [5]. (AODV)
Mobiles inform each other of link changes through the use The Ad Hoc On-Demand Distance Vector routing protocol
of update messages. An update message is sent only between (AODV) is an improvement of the Destination-Sequenced
neighboring nodes and contains a list of updates (the Distance Vector routing protocol (DSDV)1. DSDV has its
destination, the distance to the destination, and the efficiency in creating smaller ad-hoc networks. Since it
predecessor of the destination), as well as a list of responses requires periodic advertisement and global dissemination of
indicating which mobiles should acknowledge (ACK) the connectivity information for correct operation, it leads to
update. Mobiles send update messages after processing recurrent system-wide broadcasts. Therefore the size of
updates from neighbors or detecting a change in a link to a DSDV ad-hoc networks is strongly limited. When using
neighbor. In the event of the loss of a link between two DSDV, every mobile node also needs to maintain a whole
nodes, the nodes send update messages to their neighbors. list of routes for each destination within the mobile network.
The neighbors then modify their distance table entries and The advantage of AODV is that it tries to reduce the number
check for new possible paths through other nodes. Nodes of required broadcasts. It creates the routes on an on-
learn of the existence of their neighbors from the receipt of demand basis, as opposed to maintain a complete list of
acknowledgments and other messages. If a node is not routes for each destination. Therefore, the authors of AODV
sending messages, it must send a hello message within a classify it as a pure on-demand route acquisition system [3].
specified time period to ensure connectivity. Otherwise, the
lack of messages from the node indicates the failure of that 2.2.1.1 Path Discovery Process
link; this may cause a false alarm. Because of the broadcast When trying to send a message to a destination node
nature of the radio channel, a node can send a single update without knowing an active route2 to it, the sending node
message to inform all its neighbors about changes in its will initiate a path discovery process. A route request
routing table; however, each such neighbor sends an ACK to message (RREQ) is broadcasted to all neighbors, which
the originator node. To ensure that connectivity with a persist to broadcast the message to their neighbors and so
neighbor still exists when there are no recent transmissions on. The forwarding process is continued until the
of routing table updates or ACKs, periodic update messages destination node is reached or until an intermediate node
without any routing table changes (null update messages) knows a route to the destination that is new enough. To
are sent to the neighbors. The time interval between two ensure loop-free and most recent route information, every
such null update messages is the HelloInterval. If a node node maintains two counters: sequence number and
fails to receive any type of message from a neighbor for a broadcast_id. The broadcast_id and the address of the
specified amount of time (e.g., three or four times the source node uniquely identify a RREQ message.
HelloInterval known as the Router Dead-Interval), the node broadcast_id is incremented for every RREQ the source
74 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
node initiates. An intermediate node can receive multiple discover a route across multiple network hops to any
copies of the same route request broadcast from various destination. DSR uses no periodic routing messages, thereby
neighbors. In this case – if a node has already received a reducing network bandwidth overhead, conserving battery
RREQ with the same source address and broadcast_id – it power and avoiding large routing updates throughout the
will discard the packet without broadcasting it furthermore. ad-hoc network. Instead DSR relies on support from the
When an intermediate node forwards the RREQ message, it MAC layer (the MAC layer should inform the routing
records the address of the neighbor from which it received protocol about link failures). The two basic modes of
the first copy of the broadcast packet. This way, the reverse operation in DSR are route discovery and route
path from all nodes back to the source is being built maintenance.
automatically. The RREQ packet contains two sequence
numbers: the source sequence number and the last
destination sequence number known to the source. The
source sequence number is used to maintain “freshness”
information about the reverse route to the source while the
destination sequence number specifies what actuality a route
to the destination must have before it is accepted by the
source. [3] When the route request broadcast reaches the
destination or an intermediate node with a fresh enough
route, the node responds by sending a unicast route reply
Figure 4. AODV Route Maintenance by using Link
packet (RREP) back to the node from which it received the
failure Notification Message
RREQ. So actually the packet is sent back reverse the path
built during broadcast forwarding. A route is considered 2.2.2.1Route Discovery
fresh enough, if the intermediate node’s route to the Route discovery allows any host in the ad hoc network to
destination node has a destination sequence number which dynamically find out a route to any other host in the ad hoc
is equal or greater than the one contained in the RREQ network, whether directly reachable within wireless
packet. As the RREP is sent back to the source, every transmission range or reachable through one or more
intermediate node along this path adds a forward route entry intermediate network hops through other hosts. A host
to its routing table. The forward route is set active for some initiating a route discovery broadcasts a route request packet
time indicated by a route timer entry. The default value is which may be received by those hosts within wireless
3000 milliseconds, as referred in the AODV RFC [4]. If the transmission range of it. The route request packet identifies
route is no longer used, it will be deleted after the specified the host, refer red to as the target of the route discovery, for
amount of time. Since the RREP packet is always sent back which the route is requested. If the route discovery is
the reverse path established by the routing request, AODV successful the initiating host receives a route reply packet
only supports symmetric links. listing a sequence of network hops through which it may
reach the target. In addition to the address of the original
initiator of the request and the target of the request, each
route request packet contains a route record, in which is
accumulated a record of the sequence of hops taken by the
route request packet as it is propagated through the ad hoc
network during this route discovery. Each route request
packet also contains a unique request id, set by the initiator
from a locally-maintained sequence number. In order to
detect each
duplicate route requests received, host in the ad hoc network
maintains a list of the h initiator address, request id i pairs
that it has recently received on any route request.
receives a route error packet, the hop in error is removed speed distributed uniformly between 0 and some maximum
from the route cache and all routes containing this hop are speed. Upon reaching the destination, the node pauses again
truncated at that point. End-to-end acknowledgement may for pause time seconds, selects another destination, and
be used, if wireless transmission between two hosts does not proceeds there as previously described, repeating this
work equally well in both directions. As long as a route behavior for the duration of the simulation. Each simulation
exists by which the two end hosts are able to communicate, ran for 200 seconds of simulated time. We ran our
route maintenance is possible. There may be different routes simulations with movement patterns generated for 9
in both directions. In this case, replies or acknowledgements different pause times: 2, 10, 15, 25, 35, 50, 75, 85, 100
on the application or transport layer may be used to indicate seconds. A pause time of 0 seconds corresponds to
the status of the route from one host to the other. However, continuous motion, and a pause time of 200 (the length of
with end-to-end acknowledgement it is not possible to find the simulation) corresponds to no motion. Hence reducing
out the hop which has been in error. pause time increases mobility. In this way we put our
protocols in networks of varying mobility. Because the
3 .Simulation And Its Parameters performance of the protocols is very sensitive to movement
pattern, we generated scenario files with 9 different pause
3.1 Methodology times. All routing protocols were run on the same 9 scenario
The main concentration of the project was to test the ability files. We report in this paper data from simulations using a
of different routing protocols to respond on network maximum node speed of 20 meters per second (average
topology changes (for instance link breaks, node movement, speed 10 meters per second).
and so on). Furthermore the focus was set on different
network sizes, varying number of nodes and area sizes. Our 3.3 Communication Model
investigations did not include the protocol’s operation under As the purpose of our simulation was to compare the
heavy load, e.g. its operation in congestion situations. performance of each routing protocol, we select our traffic
Therefore only rather small packet sizes and one source sources to be constant bit rate (CBR) sources. When
node were selected. As referenced in many other papers, defining the parameters of the communication model, we
Our protocol evaluations are based on the simulation of 50 experimented with sending rates of 3 packets per second,
wireless nodes forming an ad hoc network, moving about networks containing maximum connection of 35, and packet
over a rectangular (1500m X 300m) flat space for 200 sizes of 512 bytes. All communication patterns were peer-to-
seconds of simulated time. We chose a rectangular space in peer, and connections were started at times uniformly
order to force the use of longer routes between nodes than distributed between 0 and 180 seconds. The 9 different
would occur in a square space with equal node density. In scenario files for maximum node movement speed (20 m/s)
order to enable direct, fair comparisons between the moving in a random waypoint model with which we
protocols, it was critical to challenge the protocols with compared the routing protocols.
identical loads and environmental conditions. Each run of
the simulator accepts as input a scenario file that describes 3.4 Performance Metrics
the exact motion of each node and the exact sequence of In order to compare routing protocols, the following
packets originated by each node, together with the exact performance metrics are considered:
time at which each change in motion or packet origination • Throughput: a dimensional parameter which gives the
is to occur. We pre-generated 9 different scenario files with portion of the channel capacity used for useful transmission
varying movement patterns and traffic loads, and then ran selects a destination at the beginning of the simulation and
all three routing protocols against each of these scenario (i.e., data packets correctly delivered to the destinations).
files. Since each protocol was challenged in an identical • Average End to End delay: the average end-to-end delay
fashion, we can directly compare the performance results of of data packets, i.e. the period between the data packet
the protocols generation time and the time when the last bit arrives at the
destination.
3.2 Mobility Model •Packet delivery ratio: the ratio among the number of
An important factor in mobile ad-hoc networks is the packets received by the TCP descends at the final
movement of nodes, which is characterized by speed, destination and the number of packets originated by the
direction and rate of change. Mobility in the “physical “application layer” sources. It is a measure of efficiency of
world” is unpredictable, often unrepeatable, and it has a the protocol
dramatic effect on the protocols developed to support node
movement. Therefore, different “synthetic” types of mobility 4. Performances Analysis
models have been proposed to simulate new protocols.
Synthetic means to realistically represent node movement, DSDV which is a table driven proactive routing protocol
but without using network traces. Nodes in the simulation completely prevails over the on demand reactive routing
move according to a model that we call the “random protocols AODV and DSR .Since DSDV proactively
waypoint” model. The movement scenario files we used for maintains the routes to all destination in its table it does not
each simulation are characterized by a pause time. Each have to initiate the route request process as frequently as in
node begins the simulation by remaining stationary for AODV and DSR while sending packets. Hence on average
pause time seconds. It then selects a random destination in DSDV clearly has less delay. Now we can easily examine
the 1500m x 300m space and moves to that destination at a
76 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
that DSR is the worst protocol in terms of delay. At high packets, with no regard to when and how frequently such
mobility and more network load (512 byte packets at 3 routes are preferred. It relies on an underlying routing table
packets/sec) insistent route caching strategy of DSR fails. In revise mechanism that involves the stable propagation of
these stressful condition links break very often leading to routing information. This is not the case, however, for on-
invalidation of routes cached .Hence in these conditions, demand routing protocols. When a node using an
picking up of staled cached routes occur leading to
utilization of additional network bandwidth and interface
queue slots even though the packet is ultimately dropped,
leading to more delay DSR performed inefficiently in our
metrics (PDR and Throughput) in these “stressful”
situations (higher mobility, more network load). The reason
of these phenomena is the aggressive use of route caching in
DSR. In our observation, such caching provides a significant
benefit up to a certain extent. With higher loads the degree
of caching is deemed too large to benefit performance.
Often, stale routes are chosen since route length (and not
any freshness criterion) is the only metric used to pick
routes from the cache when faced with multiple choices. Figure 5. Throughput of Receiving Packets
Picking stale routes causes two problems:
• Consumption of additional network bandwidth and
interface queue slots even though the packet is eventually
dropped or delayed
• Possible pollution of caches in other nodes
With high mobility, the possibilities of the caches being
stale are quite high in DSR. Eventually when a route
discovery is initiated, the large number of replies (as all
RREQs are replied) received in response is associated with
higher MAC overhead and cause increased interference to
data traffic. Hence, the cache staleness and high MAC
Figure 6. Packet Delivery Ratios
overhead mutually result in significant degradation in
performance for DSR in high mobility An efficient
desires a route to a new destination, it will have to wait until
mechanism to remove stale cached routes can improve
such a route can be discovered. On the other hand, since
performance of DSR. On other hand since in AODV only
routing information is constantly propagated and
the first arriving request packet (RREQs) is answered and
maintained in table-driven routing protocols, a route to
further no RREQs are answered therefore it leads to less no.
every other node in the ad hoc network is always available,
of replies (RREPs) .Also the error packets RERRs are are
regardless of whether or not it is needed. This feature,
broadcasted in AODV which leads to lesser MAC load as
although useful for datagram traffic, incurs substantial
compared to unicasted REERs of DSR which leads to much
signaling traffic and power consumption. Since both
MAC layer load.
bandwidth and battery power are scarce resources in mobile
computers, this becomes a serious limitation.
6. Conclusion
In this paper we provide descriptions of several routing
schemes proposed for ad hoc mobile networks. We also
provide a classification of these schemes according to the
routing strategy (i.e., table-driven and on-demand). We have
presented a comparison of these two categories of routing
protocols, highlighting their features, differences,
and characteristics .We has compared the performance of
Figure 4. Average End To End Delay DSDV, AODV and DSR We used a detailed simulation
model to demonstrate the performance characteristics of
these protocols. By simulating we can argue that if delay is
5. Comparisons
our main criteria than DSDV can be our best choice But if
The subsequent sections provide comparisons of the
reliability and throughput are our main parameters for
previously described routing algorithms. The next section
selection then AODV gives better results compare to others
compares table-driven protocols, and a further section
because its throughput and packet delivery ratio is best
compares on demand protocols.
among others. While there are many other issues that need
to be considered in analyzing the performance of ad hoc
5.1 Table-Driven vs. On-Demand Routing
networks, we believe that our work could provide intuition
As discussed former, the table-driven ad hoc routing border
for future protocol selection and analysis in ad hoc
on is similar to the connectionless approach of forwarding
(IJCNS) International Journal of Computer and Network Security, 77
Vol. 2, No. 4, April 2010
networks. While we focus only on the network throughput, as a Sr. Engineer of Computern Application. Mr. Agarwal is the
reliability and the delay, it would be interesting to consider author of number of books. He has written number of books on
other metrics like power consumption, the number of hops various topics such as DBMS, Data Structure, Algoritms etc. Mr.
to route the packet, fault tolerance, minimizing the number Agarwal is also pursuing his Ph.D. in computer scince.He has
presented a number of papers in various national
of control packets etc.
conferences.Number of papers have been published in the National
Parameters On-demand Table-den
& International Journals.Mr Agarwal has also attended various
References Faculty Development Programe conducted by Infosys and TCS.
[1] J. Jubin and J. Tornow, “The DARPA Packet Radio Network Dr. Yahpal Singh is a Reader and HOD (CS)
Protocols,” Proc. IEEE, vol. 75, no. 1, 1987, pp. 21–32. in BIET, Jhansi (U.P.). He obtained Ph.D.
[2] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination- degree in Computer Science from Bundelkhand
Sequenced Distance-Vector Routing (DSDV) for Mobile University, Jhansi. He has experience of
Computers,” Comp. Commun.Rev., Oct. 1994, pp. 234–44. teaching in various courses at undergraduate
[3] L. R. Ford Jr. and D. R. Fulkerson, Flows in Networks, Princeton and postgraduate level since 1999. His areas of
Univ. Press, 1962. interest are Computer Network, OOPS, DBMS.
[4] C. Perkins, E. Belding-Royer, and S. Das, “RFC 3561: Ad hoc on- He has authored many popular books of
demand distance vector (AODV) routing,” July 2003, category: Computer Science for graduate and postgraduate level. He has
experimental. [Online]. Available: ftp://ftp.isi.edu/in- attended many national and international repute seminars and
notes/rfc3561.txt conferences. He has also authored many research papers of
[5] S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing international repute.
Protocol for Wireless Networks,” ACM Mobile Networks and App.
J., Special Issue on Routing in Mobile Communication Networks, Manish Varshney received his M.Sc (C.S)
Oct. 1996, pp. 183–97. degree from Dr. B.R.A. University, Agra,
[6] A. S. Tanenbaum, Computer Networks, 3rd ed., Ch. 5, Englewood M.Tech. (IT) from Allahabad University and
Cliffs, NJ: Prentice Hall, 1996, pp. 357–58. Pursuing PhD in Computer Science. He is
[7] C. E. Perkins and E. M. Royer, “Ad-hoc On-Demand Distance working as a HOD (CS/IT) in SRMSWCET
Vector Routing,” Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Bareilly. He has been teaching various
Apps., Feb. 1999, pp. 90–100. subjects of computer science for more than
[8] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad- half a decade. He is known for his skills at
HocWireless Networks,” Mobile Computing, T. Imielinski and H. bringing advanced computer topics down to
Korth, Eds., Kluwer, 1996, pp. 153–81. the novice's level. He has experience of industry as well as
[9] J. Broch, D. B. Johnson, and D. A. Maltz, “The Dynamic Source teaching various courses. He has authored various popular books
Routing Protocol for Mobile Ad Hoc Networks,” IETF Internet such as Data Structure, Database Management System, Design
draft, draft-ietfmanet-dsr-01.txt, Dec. 1998 (work in progress). and Implementation of Algorithms, Compiler Design books for the
[10] V. D. Park and M. S. Corson, “A Highly Adaptive Distributed technical students of graduation and postgraduation.He has
Routing Algorithm for Mobile Wireless Networks,” Proc. published various research papers in National and International
INFOCOM ’97, Apr. 1997. journals. He has also attended one faculty development program
[11] M. S. Corson and A. Ephremides, “A Distributed Routing organized by Oracle Mumbai on Introduction to Oracle 9i SQL and
Algorithm for Mobile Wireless Networks,” ACM/Baltzer Wireless DBA Fundamental I.
Networks J., vol. 1,no. 1, Feb. 1995, pp. 61–81.
[12] C-K. Toh, “A Novel Distributed Routing Protocol To Support Vidushi Gupta received her B.tech (C.S)
Ad-Hoc Mobile Computing,” Proc. 1996 IEEE 15th Annual Int’l. degree from Uttar Pradesh Technical
Phoenix Conf.Comp. and Commun., Mar. 1996, pp. 480–86. University, Lucknow.She is also pursuing
[13] R. Dube et al., “Signal Stability based Adaptive Routing (SSA) M.tech from Karnataka University, She is
for Ad-Hoc Mobile Networks,” IEEE Pers. Commun., Feb. 1997, working as Lecturer ( CS/IT department) in
pp. 36–45. SRMSWCET, Bareilly .She has published a
[14] C-K. Toh, “Associativity-Based Routing for Ad-Hoc Mobile research paper in an International journal. She
Networks,” Wireless Pers. Commun., vol. 4, no. 2, Mar. 1997, pp. has also attended one faculty development
1–36. program based on the “Research Methodologies”.
[15] S. Murthy and J. J. Garcia-Luna-Aceves, “Loop-Free Internet
Routing Using Hierarchical Routing Trees,” Proc. INFOCOM ’97,
Apr. 7–11, 1997.
[16] C. E. Perkins and E. M. Royer, “Ad Hoc On Demand Distance
Vector (AODV) Routing,” IETF Internet draft, draft-ietf-manet-
aodv-02.txt, Nov.1998 (work in progress).
Authors Profile
Vineet Agrawal is having total more than 15
years experience in teacing and industry.Mr.
Vineet Agarwal is presently working as a Asst.
Director of Rakspal Bahadur College of
Engineering & Technology, Bareilly. Author is
MCA & M.Tech from Birla Institute of
Technology, Mesra Ranchi. Author has worked
in Synthetic & Chemicals Ltd. For four years since 1995 to 1999
78 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Abstract: Due to dramatic enhancement in computers and masquerade like a particular person or monitor the person’s
communications and due to huge use of electronic media, private data [3].
security gains more and more importance especially in those Similarly some chaos-based cryptosystems are used to solve
organizations where information is more critical and more the privacy and security problems of biometric templates.
important. The older techniques such as conventional The secret keys are randomly generated and each session
cryptography use encryption keys, which are long bit strings and has different secret keys. Thus biometric templates are
are very hard to memorize such a long random numbers. Also it
encrypted by means of chaotic cryptographic scheme which
can be easily attacked by using the brute force attack technique.
Instead of using the traditional cryptographic techniques,
makes them more difficult to decipher under attacks [4].
Biometrics like Iris, fingerprints, voice etc. uniquely identifies a Moreover some chaotic fingerprint images encryption
person and a secure method for stream cipher, because techniques are also proposed which combines the shuttle
Biometric characteristics are ever living and unstable in nature operation and nonlinear dynamic chaos system. The
(with respect to recognition). In this paper we used the idea of proposed image encryption technique provides an efficient
bio-chaotic stream cipher which encrypts the images over the and a secure way for fingerprint images encryption and
electronic media and also used to encrypt the images to store it storage [5].
into the databases to make it more secure by using a biometric Similarly some new image encryption technique based on
key and a bio-chaotic function. It enhances the security of the hyper-chaos is also proposed, which uses an image total
images and it should not be compromised. The idea also gives shuffling matrix to shuffle the pixel positions of the plain
birth to a new kind of stream cipher named bio-chaotic stream
image and then the states combination of hyper-chaos is
cipher. The paper also describes how to generate an initial key
used to change the gray values of the shuffled image [6].
also called initial condition from a biometric string and how to
encrypt and decrypt the desired data by using the bio-chaotic In order to improve the security of the images we proposed a
function. better idea which is a new type of algorithm called Bio-
Keywords: Biometric, stream cipher, bio-chaotic algorithm Chaotic stream cipher algorithm (BCA) for image
(BCA), cryptography, key. encryption which overcomes the problems of some of the
algorithms used previously for the same purpose. In this
1. Introduction algorithm we used the iris images and extract their features
by using the L.Rosa [9] iris feature extraction code. These
Due to dramatic enhancement in computers and
features are then used to generate the initial condition for
communications and due to huge use of electronic media,
the secret key using the Hamming Distance technique,
security gains more and more importance especially the
which is then Xored to the iris extracted features to generate
security of biometric images become a hot issue. Biometric
another secret key called biometric key. This biometric key
images are mostly used for the authentication system
is then used in the chaotic function to generate the bio-
because of there ever living and unstable (with respect to
chaotic stream cipher for further encryption.
recognition) characteristics. Conventional or traditional
The rest of the paper is organized such that section 2
symmetric or asymmetric cryptography is limited only to
consists the related work of the paper. Section 3 will show
text files but it cannot be used in case of huge files like
the basic working and idea of the BCA. Section 4 presents
images and videos.
the graphical representation of the key generation process
Image encryption techniques are extensively used to
and logistic map for the algorithm. Section 5 shows some
overcome the problem of secure transmission for both
mathematical comparisons with other algorithms. Finally
images and text over the electronic media by using the
section 6 draws a conclusion.
conventional cryptographic algorithms. But the problem is
that it cannot be used in case of huge amount of data and 2. Related work
high resolution images [2].
Instead of using the traditional way of cryptography for The same work is carried out in our conference paper
image encryption we can also use biometric e.g. fingerprint, already published. The same algorithm is used for the
iris, face, voice etc for the same purpose. The main encryption of the Iris images. In this paper we elaborate the
advantage of a biometric is that it is ever living and unstable algorithm with more detail and add some new features to the
characteristics of a human being and it cannot be existing proposed system [19].
compromised. However it also suffers from some biometric
specific threats and that is the privacy risk in biometric The work that we seen relevant to our work is that of
systems. An attacker can interpret a person’s biometric data, Haojiang Gao, Yisheng Zhang, Shuyun Liang and Dequn Li
which he can use for many illegal operations such is to which proposed a new chaotic algorithm for image
(IJCNS) International Journal of Computer and Network Security, 79
Vol. 2, No. 4, April 2010
encryption[2]. In this paper they presented a new nonlinear condition and to increase the security of the proposed system
chaotic algorithm (NCA) which uses power function and [10].
tangent function instead of linear function. The
experimental results demonstrated in this paper for the
image encryption algorithm based on NCA shows 3. Proposed System Bio-Chaotic Algorithm
advantages of large key space and high-level security, while (BCA)
maintaining acceptable efficiency [2].
The basic idea of the algorithm is such that we took an iris
Similarly the work done by Song Zhao, Hengjian Li, and Xu image and extract its features by using L.Rosa code [9]. L.
Yan for the security and Encryption of fingerprint images is Rosa used a code to generate a binary pattern from the given
more relevant to our work [5]. In this paper they proposed a iris image. The binary pattern is further divided into small
novel chaotic fingerprint images encryption scheme blocks of binary data to make the process simplified,
combining with shuttle operation and nonlinear dynamic because it is very difficult to encrypt the binary pattern of
chaos system. The proposed system in this paper shows that hundreds of thousands of bits at once. In our case we made
the image encryption scheme provides an efficient and each block of 128 bits to make it simpler and to encrypt each
secure way for fingerprint images encryption and storage block easily. A random block is then selected to create the
[5]. initial condition for the secret key. The random selection of
Also the work done by Muhammad Khurram Khan and the block is preferred because of the attackers, so that no one
Jiashu Zhang for implementing templates security in remote can easily understand that which block is selected for the
biometric Authentication systems seems relevant to us [4]. initial condition.
In this paper they presented a new chaos-based cryptosystem At the transmission time of the image the bits of this
to solve the privacy and security issues in remote biometric random selected block is encrypted by using Quantum
authentication over the network. Experimental results Encryption Technique [8]. Quantum encryption uses light
derived in this paper shows that the security, performance particles, also call photons instead of bits at communication
and accuracy of the presented system are encouraging for time. A photon can have one of the four orientations or
the practical implementation in real environment [4]. shapes, 450 diagonal, -450 diagonal, horizontal or vertical.
Each of these represents a bit, - and / represents a 0, while |
Similarly a new image encryption technique was introduced and \ represents a 1[8].
by Tiegang Gao and Zengqiang Chen in their paper based Fig 1 presents the block diagram of the proposed bio-chaotic
on the image total shuffling matrix to shuffle the position of algorithm. The basic steps of the algorithm are as follows.
the image pixels and then uses a hyper chaotic function to
complex the relationship between the plain image and the I. Generation of the initial condition from the randomly
cipher image. The suggested image encryption algorithm selected block taken from the binary pattern of the iris
has the advantage of large key space and high security [6]. image. The technique used to create the initial condition
is that of Hamming Distance i.e.
Moreover a coupled nonlinear chaotic map and a novel
chaos-based image encryption technique were used to
encrypt the color images by Sahar Mazloom and Amir Where n=1, 2, 3, 4…... Some other techniques can also be
Masud Eftekhari-Moghadam in their paper [10]. They used used for the same purpose like
the chaotic cryptography technique which is basically a
symmetric key cryptography with a stream cipher structure.
They used the 240 bit long secret key to generate the initial
II. This initial condition is then converted into secret key by are included in this section. The logistic maps are derived
using the LFSR method. An LFSR of length n over a on the basis of the following mathematical function.
finite field Pq consist of n stages [an-1,an-2,an-3,……..,a0]
with ai Є of Pq, and a polynomial On the basis of the above equation we generate different
logistic maps using different values. Fig.3 and 4 shows the
statistical correlation curves of the sequence. By observing
the maps carefully it’s clear that even changing in a small
III. The secret key and iris template is then Xored in parallel part of the value the whole map become different.
to generate the biometric key by using the equation, Fig.5 shows the encrypted images by using different chaotic
values. From the figure it is clear that how strong the
encryption process is that by changing even a small part of
IV. This biometric key is further Xored with different the value the image become more and more invisible.
blocks of the iris template (divided into blocks of 128 Similarly the decryption process is more sample as like the
bits/block) which encrypts the image in such a way that encryption by just Xoring the Ciphered image with the key
and we will get the original image.
no intruder or attacker can easily decrypt the image.
V. To make the algorithm stronger and more secure we
add the chaotic function to the biometric key and apply
it over the iris image which encrypts it in a more secure
way. We use the following logistic equation [4].
The decryption process of the used image is carried on by Figure 2. iris images used for experiments
the same way using the same key used for the encryption
process but in the opposite direction i.e. the ciphered image
is Xored with the biometric key to get the image back in its
original form. The receiver will first decrypt the randomly 1
0.5
0
0 20 40 60 80 100 120
Logistic
Real value b/w 0 and 1
1
0.5
5.2 Confusion and Diffusion By using the above equation we found the entropy of our
proposed system which is round about 127.3. The values
Confusion and diffusion are the two properties of the show better uncertainty and randomness of bits in the
operation of a secure cipher. Confusion refers to making the algorithm. The probability of each bit is 0.5. The entropy
relationship between the key and the cipher text as complex will be high if there is more randomness in the bits used in
and as involved as possible. Diffusion refers to the property the ciphered image. Table 2 shows the entropy of our
that redundancy in the statistics of the plain text is proposed system.
dissipated in the statistics of the cipher text [12]. Confusion
and diffusion are the same properties like Avalanche effect
which is elaborated in the previous section. The confusion Table 2: Entropy of Bio-chaotic Algorithm
and diffusion of the proposed algorithm is round about 49%,
which shows the strength of the proposed system. Bio-chaotic Algorithm Entropy(H(X))
1 64.67
5.3 Entropy
8000
7000
6000
5000
4000
3000
2000
1000
15000
10000
5000
Authors Profile
Dr. Abdullah Alghamdi is a full time
associate professor, SWE Department,
College of Computer and Information
Sciences, KSU. He holds a Ph.D. in the
field of Software Engineering from the
department of computer science,
Sheffield University, UK, 1997. He
obtained his M.Sc. in the field of
software development technologies
from the UK in 1993. In the academic
year 2004/5 he worked as a visiting
professor at School of IT and Engineering, University of Ottawa,
Ottawa, Canada, where he conducted intensified research in Web
Engineering as part of his Post-Doc program. He recently
published a number of papers in the field of Web engineering
methodologies and tools. Dr. Abdullah worked as a part-time
consultant with a number of governmental and private
organizations in the field of IT strategic planning and headed a
number of IT committees inside and outside KSU. Currently he is
chairing the Software Engineering Department at KSU and part
time consultant at Ministry of Defense and Aviation.
Abstract: Routers on the Internet use an interdomain routing BGP convergence time analysis: How long it takes BGP to
protocol called the Border Gateway Protocol (BGP) to share the converge to a stable routing outcome? This is another
routing information between the Autonomous Systems (ASes). question, which is closely related to BGP. To answer this
These ASes defines local BGP policies that lead to various question, we require a formal definition of measuring the
routing anomalies like BGP divergence. In this paper, we close a convergence rate, as the Internet is asynchronous.
long-standing open question of Griffin and Wilfong, by
We analyze the BGP convergence time in particular,
showing, for any network structure, if there exists two stable
Internet-like settings. In this Gao and Rexford settings,
routing outcomes, then there is a possibility of BGP oscillations.
Our results provide the first non-trivial necessary condition for every pair of neighboring ASes can have a business
BGP safety – uniqueness of the stable routing outcome. relationship or a peering relationship, which causes natural
Another question, which is closely related to BGP, is how constraints on the ASes’ routing policies.
long it will take to converge to a stable routing outcome. We also However, our first result is negative. We show that, even
address this by analyzing a formal measure of the convergence for the restricted class of preferences, there are instances
time of BGP for the policies presented by Gao and Rexford. such that the convergence rate of BGP is linear in the size of
Even for the restricted class of preferences, we prove that (i) the the network. Specifically we show that in a network with n
convergence time is linear in the size of network (ii) BGP’s nodes, it takes n phases to converge. We also prove that the
running time cannot be more than (roughly) twice the length of lower bound is tight: BGP is always guaranteed to converge
the longest customer-provider chain in the network. in n time steps. As there are thousands of ASes in today’s
Internet, the linear bound does not signify well. However,
Keywords: BGP, Border Gateway Protocol, Interdomain routing,
one would expect BGP to converge at a much quicker rate in
network security, routing, networks, routing protocols, BGP safety.
practice as ASes’ routing policies are local in the sense that
they are not influenced by ASes that are far away. We prove
1. Introduction that the number of phases required for convergence is
bounded by approximately twice the depth of customer-
provider hierarchy.
BGP is the de facto protocol enabling interdomain
routing in the Internet. The task of Interdomain routing is to
establish routes between the administrative domains which
are called as Autonomous Systems (ASes) in the Internet. 2. A formal Model
Global routes are formed from the local decisions that are
based on the private routing policies. These routing
2.1 BGP dynamics
selections are communicated by the ASes to the neighboring
ASes. Persistent routing oscillations are formed due to the Network model and its policies: In our model, we define
lack of global coordination between the local routing a network by an AS graph G = (N, L), where N represents
policies. the set of ASes, and L represents number of physical
communication links between ASes. N consists of n source-
BGP safety – Unique stable routing outcome: The main nodes {1,…,n} and a unique destination node d. P i denotes
contribution in this paper is showing that BGP safety the set of all simple non-cyclic routes from i to d in G. Each
necessitates the existence of a unique stable solution. This is source-node i has a ranking function ≤i , that defines a strict
the result that closes the long-standing open question first order over P i (that is i has strict preferences over all routes
posed by Griffin and Wilfong [8]. To be more precise, Two from i to d). We allow ties between two routes in P i only if
stable solutions in a network implies that the network is they share the same first link (i,j). The routing policy of
unstable that lead to oscillations. To analyze the BGP each node i consists of ≤i and of i’s import policy and export
dynamics in a more simplified form, we use a more policy.
convenient structure, called state-transition graph. The
i’s import policy dictates which set of routes Im(i) ⊆ P i i
state-transition graph, not only a useful conceptual tool for
is willing to send traffic along. We assume that ø ≤i Ri for
evaluating and designing various network configurations but
any route Ri ∈ Im(i) (i prefers any route in Im(i) to not
also assist in detecting the potential routing oscillations and
getting a route at all) and that R’i ≤i ø for any route R’I ∉
how to debug them.
86 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Im(i) (i will not send traffic at all rather than send traffic node i to a neighboring node j announcing the route
along a route not it Im(i)). that i believes it is sending traffic along. Formally, there
i’s export policy dictates which set of routes Ex(i,j) ⊆ P i i is a ji-knowledge transition from state s to state s’ if
is willing to announce to each neighbor j. there is a node i and a neighboring node j such that:
Update Messages and Activation Sequence: Basically The forwarding vectors in the two states are identical.
the BGP belongs to a family of routing protocols named The knowledge matrix in s’ is identical to the
path-vector protocols. In this model, there are two kinds of knowledge matrix in s with the exception of i’s belief
actions that an active node may carry out potentially change about j, and ks’ij = ks ij. In other words, i learns of the
the global routing state: route that j currently believes it is using.
• A node i may select a route or change its selected This definition reflects the restricted asynchrony of our
route from the routes to given destination d that it dynamic model. We can phrase this restriction equivalently
currently believes to be available. as: Update messages can be delayed in transit, but when
• A node j may send an update message to a they are delivered, a fresh update message from the same
neighboring node i, informing i of the route that j sender is delivered immediately (and thus overrides the
is currently using to destination d. The update delayed update.) Thus, the state description does not have to
message is assumed to be delivered immediately include messages in transit.
(without propagation delay), and is immediately
reflected in updated beliefs that i has about j’s Stability and Oscillations in the State-Transition Graph:
route.
The selection and update actions can occur at arbitrary A stable state is one in which the nodes forward traffic
times. In particular, note that the update messages are not along a stable solution, and have complete and accurate
required to be sent at a given time interval or whenever j’s knowledge about their neighbors’ routes. We want to prove
route changes. It is easy to show that a stable solution is the existence of potential BGP oscillations in the state
always in the form of a tree rooted in d. Further, the import transition graph. In many cases, oscillations occur only for
and export policies can be folded into the routing policies, specific timings of asynchronous events. In particular,
by modifying the preferences so that paths that are filtered starting at any given point of time, every node eventually
out have the lowest possible value. updates its route selection if its knowledge of routes has
changed, and every node eventually receives update
2.2 The State-Transition Graph messages from each neighbor that has changed a route.
Further, in a given router, there can only be a finite
In this subsection, we describe the state transition graph – number of other activations taking place between subsequent
a tool that we use to analyze the convergence of BGP on routing selections or updates. It is for this reason, we look
different instances. for oscillations that can arise through a fair activation
The state-transition graph of an instance of BGP is sequence. An infinite activation sequence σ said to be fair if
defined as follows: The graph consists of a finite number of each transition in A appears infinitely often in σ. A fair
states, each state s is represented by an n-dimensional cycle in the state-transition graph is a finite cyclic path that
does not contain a sink, such that every action in A is taken
at least once in each traversal of the cycle.
forwarding vector of routing choices rs = (rs1,…,rsn), and n ∗
2.3 Implications for the evaluation model of Griffin
We modify the dynamic evaluation model of Griffin in
n knowledge matrix Ks = {ksij}i,j. rsi specifies the identity of two ways:
the node to which node i’s traffic is being forwarded, and ksij • Update messages are not delayed, instead, arrive
specifies the (loop-free) route that node i believes that its immediately to the destinations.
neighboring node j is using. We define ksij = NULL when j • In BGP execution, it is not necessary that a node
is not a neighbor of i; any knowledge that i has about non- inform a neighboring node of every new route it
neighboring nodes’ routes is irrelevant to i’s route selection changes, rather it is enough if it announces once in a
and advertisement decisions. We assume, naturally, that while.
node i knows who it is forwarding traffic to: r si must be the
first hop in ksij. We allow two types of atomic actions that 3. Two stable solutions leads to BGP
lead to transitions from s to s’: oscillation
• Route transition – Route selection actions: Informally, a
route transition arises when a node I updates its selected In this section we prove our main result, that if there are
route by picking its favorite route from its current two stable solutions then the network is unstable in the sense
knowledge set of routes used by its neighbors. Formally, that persistent route oscillations are possible.
there is an i-route transition from state s to state s’ if Theorem: If the AS graph G contains two stable solutions,
there is a node i such that: The forwarding vector in s’ then there is a fair activation sequence under which BGP
is identical to the forwarding vector in s with the will oscillate on G. That is, two stable solutions imply that
possible exception of i. the network is unstable, in the sense that it could plausibly
• Knowledge transition – Informally, a knowledge lead to persistent route oscillations. Therefore, to achieve
transition is an update message sent from a specific
(IJCNS) International Journal of Computer and Network Security, 87
Vol. 2, No. 4, April 2010
BGP stability, the network must have a unique stable the longest route in the stable solution. It is easy to construct
solution. instances with n nodes in which there are routes of length
The intuition behind our proof is as follows. In the state- Ω(n). However, these instances are unnatural; currently,
transition graph, each stable state will have a corresponding Internet routes tend to be much shorter than this. For this
“attractor region”: a subset of states (possibly just the stable reason, we focus on bounding the BGP convergence time on
state itself, or much larger) that, once reached, we can be Internet-like graphs.
certain that the system will ultimately converge to the stable Example: The graph in Figure 1 depicts a network with n
state. We can visualize the state-transition graph as a map, nodes, and a destination node d. Node 1 prefers to go
with each attractor region a different color – red, blue, etc. directly to d. Any other node i prefers the route i → i− 1 →
However, there will also be some states that do not lie in any d over the direct route i → d. All routes of length greater
one attractor region, because different evolutions from that than 2 are less desirable to any node. This set of path
state could lead to different stable states. We label these preferences is compatible with the Gao-Rexford constraints
states with a distinct color – purple, say – and show that the for the following set of customer-provider relationships: 1 is
Zero state must belong in this subset. a customer of 2, 2 is a customer of 3, etc.; and, additionally,
The key to the proof is showing that, starting from any d is a customer of every other node.
purple state, we can find a fair activation sequence that ends
at another purple state. We use the properties of route
selection and update actions to show that we can swap the
order of any two consecutive activations, perhaps repeating
one of them, and achieve the same result as the original
order. Thus, it is not possible that any given activation a
leads to a red state in the original order, but leads to a blue
state in the perturbed order. Using this, we show that we can
add each activation while staying within the purple region.
As the graph is finite, this implies the existence of a fair
cycle. If an instance of BGP results in a state- transition
graph (for a given destination) that has a fair cycle, we will In each phase, initially all update messages go through,
infer that there is a plausible sequence of route selections and then all nodes are activated. In the first phase, only node
and updates that will cause BGP to oscillate. 1 will change its routing choice and will route to d. In the
next phase, only node 2 will change its routing choice and
4. BGP’s convergence Rate will route through 1. Then node 3 will change to route
In this section, we handle the question of how long BGP through d and so on. The network will eventually converge
takes to converge to the unique stable solution. BGP is an to the routing outcome in which all odd nodes route directly
asynchronous protocol, and individual messages may be lost to d and all even nodes route the rough their counter-
or delayed arbitrarily. As we cannot assume a bound on the clockwise neighbor.
actual elapsed time of a single message, any model of We prove that this bound is tight for the class of instances
convergence “time” needs to define a unit of time that satisfy the Gao-Rexford conditions. In fact, we prove a
measurement that remains meaningful in this asynchronous slightly stronger result: The following proposal shows that
setting. Let us consider the following definition: our bound on BGP’s convergence rate is tight on the larger
Definition: A BGP phase is a period of time in which all class consisting of all instances in which the “No Dispute
nodes get at least one update message from each Wheel” condition of [3], [5] holds.
neighboring node, and all nodes are activated at least once Proposal: If “No Dispute Wheel” holds then BGP’s
after receiving updates from their neighbors. convergence rate is at most n phases.
We analyze the number of BGP phases it requires for the Proof: Let us assume that indeed the “No Dispute Wheel”
network to converge. The underlying principle in this condition holds in a network graph G with a destination
definition is that, although it is difficult for the analyst to node d. At every phase, one of the nodes of the graph
assert numerical bounds on the update frequencies at converges to a route that will not change from that point on.
different nodes, it is reasonable to expect that all nodes are The first node that converges in the first phase is the
updating at similar timescales. The definition of phases destination node d, that has the empty path, and announces
admits asynchrony, thus capturing the realistic possibility that path to its neighbors. We now show that there must
that different sequences of update activations can lead to exist a node in the network that is a direct neighbor of the
different transient behavior. At the same time, by tying the destination d and that its most preferred path is going
unit of measurement to the slowest node’s update instead of directly to d.
a fixed time unit (or the fastest update), we avoid To see that this is indeed the case, pick an arbitrary node
pathological worst-case time bounds that are only attained v, look at its most preferred path to the destination. This
if, for example, one node’s update cycle is measured in years path goes through a neighbor of d right before it reaches d.
instead of seconds or minutes. We shall denote this neighbor by v1. Now, consider the most
How many consecutive phases does it take BGP to preferred path of node v1, and the closest node to d on that
converge to a stable solution in the worst case? Routes are path that we shall denote by v2. In this manner we define
propagated through the network one hop at a time, so the the nodes vi for i = 1, 2, 3, ... At some point, nodes in the
best we can hope for is a time proportional to the length of sequence we defined must start repeating. If only one node
88 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
repeats infinitely then this node must have a direct route as Answers to these questions could provide network operators
its most preferred path, and we are done. Otherwise, the with new principles to tradeoff the desire for flexible
sequence of repeating nodes vk , vk+1 , . . . , vk+l (for some k, autonomous policies with the need for global routing
l) forms a dispute wheel: each node prefers to go through efficiency. Finally, there are practical aspects of BGP
the next one in the sequence rather than directly to d. This operations not considered in this paper such as MRAI
contradicts our assumption. Therefore, there exists a node (Minimum Route Advertisement Interval) and RFD (Route
that prefers to go directly to d over any other path. It will Flap Damping [19]), which play a significant role in BGP
choose this path to d on the second phase, send update convergence [20], [21].
messages to its neighbors, and will never again change its
path (since no path will be better).
We now continue to follow the convergence process, and References
observe that at any phase, there must exist a node v that
converges to its most preferred route given the route of the [1] K. Varadhan, R. Govindan, and D. Estrin,
nodes in the system that have already permanently “Persistent route oscillations in inter-domain
converged. This node will never again change its path routing,” Computer Networks, vol. 32, no. 1, pp. 1–
(because unless previous nodes change, it will have no better 16, March 2000.
path, and these previous nodes have also converged). To [2] T. G. Griffin and G. Wilfong, “An analysis of BGP
prove that such a node must exist, we fix the routes of all convergence properties,” in Proceedings of
permanently converged nodes, and pick an arbitrary node v1 SIGCOMM 1999.
that did not converge. We once again define the sequence of [3] T. G. Griffin, F. B. Shepherd, and G. Wilfong, “The
nodes v1, v2 , v3 . . . by defining the node vi+1 as the node that stable paths problem and interdomain routing,”
is closest to d on the most preferred path of node vi that did IEEE/ACM Transactions on Networking, vol. 10,
not permanently converge. The set of paths from which we no. 2, pp. 232–243, April 2002.
select this most preferred path, is the set of paths that are [4] L. Gao and J. Rexford, “Stable Internet routing
consistent with the nodes that have already permanently without global coordination,” IEEE/ACM
converged. Once again, this sequence of nodes must repeat, Transactions on Networking, vol. 9, no. 6, pp.
and since it cannot contain a dispute wheel, it must have 681–692, 2001.
only a single repeating node that is the closest node that did [5] L. Gao, T. G. Griffin, and J. Rexford, “Inherently
not converge on its own most preferred path. In the next safe backup routing
phase, this node’s path converges. We have thus shown that with BGP,” in 20th INFOCOM. Pistacaway: IEEE,
if the AS graph contains no dispute wheels, the convergence 2001, pp. 547–556.
time of BGP is bounded by the number of nodes in the entire [6] T. G. Griffin, A. D. Jaggard, and V. Ramachandran,
network graph. “Design principles of policy languages for path
vector protocols,” in SIGCOMM ’03: Proceedings
5. Conclusion of the 2003 conference on Applications,
technologies, architectures, and protocols for
computer communications. New York: ACM, 2003,
We studied fundamental questions related to BGP pp. 61–72.
whether it will converge to a unique stable solution and how [7] A. D. Jaggard and V. Ramachandran, “Robustness
long it will take to converge. We proved that, for any of class-based path- vector systems,” in
network, if there exists two stable routing outcome, then Proceedings of ICNP’04, IEEE Computer Society.
persistent BGP oscillations are possible. So the existence of IEEE Press, October 2004, pp. 84–93.
unique stable routing outcome is a necessary condition for [8] N. Feamster, R. Johari, and H. Balakrishnan,
the BGP safe convergence. We also analyzed the worst-case “Implications of autonomy for the expressiveness of
convergence time of BGP on instances that satisfy the policy routing,” in SIGCOMM ’05: Proceedings of
conditions mentioned by Gao-Rexford. We proved that the the 2005 conference on Applications, technologies,
convergence time on a graph with n nodes is Θ(n) in the architectures, and protocols for computer comm.
worst case, but is much smaller in networks with shallow New York, NY, USA: ACM Press, 2005.
customer-provider hierarchies. [9] Sobrinho, “An algebraic theory of dynamic network
An interesting direction for future research is proposing routing,” IEEE/ACM Transactions on
formal models for addressing these issues and assessing Networking, vol. 13, no. 5, pp. 1160–1173, 2005.
their impact on our necessary condition for BGP safety. [10]T. G. Griffin and G. Huston, “TRFC 4264: BGP
First, can we close the gap between our necessary condition wedgies,” 2005.
and known sufficient conditions for safe convergence? [11]L. Subramanian, S. Agarwal, J. Rexford, and R.
Second, can we develop a compositional theory for safe Katz, “Characterizing the internet hierarchy from
policies? If we put together two sub networks with unique multiple vantage points,” INFOCOM 2002. Twenty-
stable solutions, when does the combination also have a First Annual Joint Conference of the IEEE
unique stable solution? It would also be valuable to extend Computer and Comm.Societies. Proceedings. IEEE,
the convergence-time analysis to broader classes of vol. 2, pp. 618–627, 2002.
preferences, and to characterize the average-case (instead of [12] C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian,
worst-case) convergence time following a network change. “Delayed internet routing convergence,” SIGCOMM
(IJCNS) International Journal of Computer and Network Security, 89
Vol. 2, No. 4, April 2010
1. Introduction
3.2 Characteristics of Biometrics In voice recognition, assuming the voice and not the
pronunciation is being measured; this biometric is
Table.1 compares the seven mainstream biometrics in terms
moderately robust and distinctive. Iris scans are both highly
of a lot of properties, ranging from how robust and distinct
robust because they are not highly vulnerable to routine
[10] they are to what they can be used for (i.e., identification
changes or damages and distinctive because they are
or verification or verification alone). This table is an effort to
randomly formed. At last dynamic signature verification and
lend a hand to reader in categorizing biometrics along
keystroke dynamics are not robust or distinctive.
important dimensions. Because this industry is still
functioning to establish comprehensive standards and the
technology is varying rapidly, however, it is difficult to make 4. Problem Statement
assessments with which everyone would agree. The table
shows an assessment based on consideration with Even though the RSA algorithm uses the finger printing
technologists, vendors, and program managers. The table is biometrics system to generate the public key and private key
not proposed to be an aid to those in the market for generation there are some problems in that approach.
biometrics; rather it is a guide for the unskilled.
They are:
1. Brute-force attack: The maximum size of the public key
Table.1 Comparison of Mainstream Biometrics and private key obtained by RSA algorithm is 155
digits. It can be captured by a brute force attacker using
Identify thousands of machines and it requires three month of
Biometric versus Robust Distincti Intrusive computation. {Ref: Journal of Telecommunications and
Verify ve Information Technology. Volume 4/2002. Pages 08-
09}.
2. Increased key storage requirement: RSA key storage
Fingerprint Either Medium High Touching (private keys and public key) requires significant
amounts of memory. So, we have to store the public
Hand Verify Medium Low Touching key and private key in any equipment or in brain.{Ref:
Journal of Telecommunications and Information
Facial Either Medium Medium 12+ Technology. Volume 4/2002. Pages 41-56}.
inches 3. No Dynamic key generation: There is no dynamic key
generation in RSA algorithm. Therefore the user must
Voice Verify Medium Low Remote keep secretly his private key. There is a chance to lose
or stolen, forgotten the private key of the RSA
algorithm, hence he may lose the data.
Iris Scan Either High High 12+
inches
5. Proposed Scheme
Retinal Either High High 1–2 The architecture of the proposed scheme is shown in
inches Figure.3. The client generates the public key and sends to
the KDC. On document send process it retrieve the
Keystroke Verify Low Low Touching receiver’s public key from KDC and encode the data with
Dynamics aid of generated public key. Then it sends the encoded data
to the receiver. While viewing the document it dynamically
When comparing ways of using biometrics, half can be used generates the private key which is used to decode the
for both the identification and verification, and the encoded data.
remaining can only be used for authentication. In specific,
hand geometry has only been used for confirmation The proposed digital signature algorithm is a version of the
applications, such as physical access control and time and RSA algorithm that overcomes the problems in the RSA
attendance verification. Adding to this, voice detection system. A brute force attacker can able to hack the private
because of the need for staffing and matching using a pass- key by using every possible combination of the key (i.e.
phrase, is used for verification only. Numeric key). In our system, we use alpha numeric
(combination of alphabets and numeric) keys, hence the
There is considerable changeability in terms of robustness attacker can not able to obtained the key values easily.
and individuality. Fingerprinting is sort of robust, and, even
though it is distinctive, a small proportion of the population The second problem in the existing RSA algorithm is key
has unusable prints, always because of age, genetics, injury, storage requirement. In our proposed system we generate the
career, spotlight to chemicals, or other occupational hazards. private key dynamically. Hence there is no need for key
Hand/finger geometry is moderate on the distinctiveness storage requirement. The third problem in the existing
scale, but it is not very robust, while facial recognition is system is no dynamic key generation. Normally, by using
either highly robust or distinctive. RSA algorithm they have to generate their public key and
private key. Then they have to send the public key to the key
(IJCNS) International Journal of Computer and Network Security, 93
Vol. 2, No. 4, April 2010
distribution centre and keep their private keys secretly with existing key value is replaced from the list and the new key
themselves. value is added into the list.
In our proposed algorithm we generate the public key using 6.2 Client
the finger print and send that public key to the key The client application is designed to hold the document
distribution centre. While encrypting the data the sender get transfer process and the key generation process. The client
the public key of the receiver from the key distribution centre application is divided into four modules. They are the Key
and encrypt the data with that public key. generation module, the sender module, the receiver module
and the document view module. The key generation module
To decrypt the ciphertext the receiver requires his private generates the key from the finger print data. The sender
key. At that time of decryption only the receiver will be able module is used to encode and send the document. The
to know his private key. This process is called ‘Dynamic receiver module receives the decoded documents that are
private key generation’. sent by the other clients. The document view module
Key Update maintains received documents after the decoding process the
Client user can view the document.
Pub Key
Generation 6.3 Key Generation Module
The key generation process is shown in Figure.4. This
Document module is to generate the public key by using the finger print
Send Key KDC
Retrieval data. The input data is given as an image to the system. This
value is to create the key base value that is used to generate
the public key value.
Encode Send
process. The decoded documents are stored in the specified Using Java language under windows platform develops the
folder simulation tool. Java supports multiple platforms, GUI
design and network operations. Using the Java language
7. Testing and Implementation develops the system. Image processing, cryptographic
operations, network transmissions and file processing are the
Testing is the important phase in the system development major are in the system. Java provides a variety of packages
process. The system is developed as a GUI based application. and classes to support all these tasks. The user interface is
The system is tested before the implementation process. The designed with GUI support. The application is designed to
system is tested with different testing methods. They are unit run under any platform. The finger print values are
test, integration test, system test, validation test and stress retrieved from image files. The image file data are extracted
test. The system is tested with different network and and converted into pixel matrix. Using the classes such as
platform environments. The system uses the image scanner Image, MediaTracker and PixelGrabber in Java the system
to capture finger print image data. The system is tested in does these processing. The Image class is used to convert an
the Intranet environment. In this system each and every image into an object. The Media Tracker and the Pixel
modules is tested separately for the unit test. For example Grabber classes are used to support the data extraction and
the RSA algorithms processes key generation, encode and pixel conversion process. These classes are available in the
decode operations are tested with the corresponding java.awt package.
modules.
Java provides a separate package JCE for the cryptography
The Client application and the Key distribution applications process. But the JCE requires the Service Providers for the
are tested separately. The integration test is performed after implementation. In Java cryptography can be implemented
all the modules are connected with the main menu. The in two ways. They are using the JCE with service providers
entire system is tested with all the operations by using a set and the other one write the code for the cryptographic
of finger print values. The stress test is conducted to test the algorithms. In this work the second method is applied. The
load management strength of the client application and the RSA algorithm is implemented by using the java.math
key distribution centre application. Connecting multiple package support. RSA requires high bit length data type
clients with the KDC tests the key distribution centre stress. support. Java provides a class Big Integer to process values
In the client application sending a large file to the other in 128 bits. All RSA key generation, encoding and decoding
client tests the strength. The validation test is performed for operations are done by using the Big Integer class.
all input values. The finger print image availability is
checked before the key base generation process. The file process and the data transmission process are
implemented with the support of java.io and java.net
The system is developed to distribute document with security package. All the files are processed using the byte stream
using the biometrics. The system is tested and the results are classes. The data transmission tasks are done using the
very good. The implementation of the system is conducted TCP/IP support classes in the java.net package. The key
as direct change over mechanism. The new system is directly distribution centre application is designed using the UDP.
installed and activated into the action for usage. The system The client application transfers the files using the Server
can be implemented in any network environment. The Socket and Socket classes. Data gram Socket and Data gram
system supports all type of file transfer operations. The Packet classes are used in KDC process.
system has developed as two applications the key
distribution centre and the client application. The key 8. Conclusion
distribution centre application is loaded into a separate
machine. The client application can be loaded into all other The System is developed to provide security for the file
client machines. transfer process in distributed environment. Document
transmission between the systems that are in the distributed
All the client application should be configured for the key environment is a usual task. The same environment is also
distribution centre IP address for the key updating and shared by a lot of members. So the system should ensure the
request process. The system now designed to get the security of the documents that are transferred. Different
fingerprints images from the image file. So the system must cryptographic techniques are used to secure the data. In the
be connected with an image scanner. The system can also be recent days, biometrics is used to recognize the users. This
connected with the fingerprint image scanner devices. The work combines the biometrics and cryptography to provide
client application and the key distribution applications can the security for the document transmission process in the
be continuously executed to maintain the connection and distributed environment. Generally passwords and smart
message receive process. All the messages are directly cards are used for the security systems.
received by the client applications. The system requires a
lesser amount of hard disk space to store the received and The system uses the biometrics technology as the security-
decoded documents. The key distribution centre should be providing medium. This system uses the fingerprints for the
connected with all the client applications. The system can be security system. Password can be hacked by trial and error
run with one or more network environments. basis. But it is not possible to break the biometrics based
security system. The system is developed as two applications.
7.1 Software Selection They are the key distribution centre application and the
(IJCNS) International Journal of Computer and Network Security, 95
Vol. 2, No. 4, April 2010
client application. The KDC supplies the public key values [13] www.mit.bme.hu/events/minisy2003/papers/orvos.p
to the required clients. The client application is designed to df
handle all the data transfer and security operations. [14] http://rpmfreelancer.no
ip.com:8080/duncan21/biometrics/finger.html
The system uses a designed key base generation algorithm [15] www.cost275.gts.tsc.uvigo.es/presentations/COST2
and RSA algorithm. The system is tested with various 75_Jain.pdf
samples and clients. The performance of the system is very [16] www.research.ibm.com/ecvg/pubs/sharat-
good. The system is tested with different type of file formats. proc.pdfM. Wegmuller, J. P. von der Weid, P.
The result shows that the system supports all types of file Oberson, and N. Gisin, “High resolution fiber
format. The system stores and distributes the public key distributed measurements with coherent OFDR,” in
values for all clients in the key distribution centre. The Proc. ECOC’00, 2000, paper 11.3.4, p. 109.
system does not require any key storage process for the [17] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn,
secret key. In this work using the fingerprint values, the “High-speed digital-to-RF converter,” U.S. Patent 5
system can generate both the public key and private key. 668 842, Sept. 16, 1997.
Damages that occurred in the finger print may impact the [18] The IEEE website. (2002) [Online]. Available:
recovery of the documents. http://www.ieee.org/
[19] M. Shell. (2002) IEEE Transaction homepage on
In future the system can be implemented for all type of CTAN. [Online]. Available:
authentication process such as capillary patterns in the http://www.ctan.org/tex-
retina, hand geometry, facial characteristics, signature archive/macros/latex/contrib/supported/IEEEtran/
dynamics, voice pattern, and timing of keystrokes. Data [20] W.Diffie and M.Hellman.” New Directions in
compression technique can be used to reduce the content Cryptography”. IEEE Transaction on Information
size, process time and transmission time. In future the Theory.IT-22(1978).472-492.
system will include noise detection and filtering facility for
the input process.
Authors Profile
References
Mr.P.Balakumar received the B.E. and
[1] Bruce Schneier, “Applied Cryptography Protocols, M.E. degrees in Computer
Algorithms” 2nd Edition, Wiley publication. Science and Engineering from PSG
[2] Naughton.P and H.Schildt, “Java 2: The Complete College of Technology, Coimbatore, in
Reference” , McGraw-Hill,1999 1997 and Anna University, Chennai in 2004
[3] William Stallings, “Cryptography and Network respectively. During 1999-2001, he worked
Security Principles and practice”, 2nd Edition, as Lecturer in PSG College of Technology in
Prentice Hall, Upper Saddle River. Coimbatore. Later during 2003-2008, he worked as Lecturer &
[4] Anil Jain, Lin Hong, Sharath Pankanti, and Ruud Assistant Professor in AMS Engineering College, Namakkal. He
now with Selvam College of Technology, Namakkal, Tamilnadu,
Bolle, “ An Identity Authentication System Using
India as Assistant Professor in Department of Computer Science
Fingerprints” Department of Computer Science, and Engineering.
Michigan State University East Lansing.
[5] James L. Wayman, “ Biometrics Identification” , Dr.R.Venkatesan was born in Tamilnadu,
Communications of the ACM, February 2000. India, in 1958. He received his B.E (Hons)
[6] Katrin Franke, Javier Ruiz-del-Solar, Mario, “ Soft- degree from Madras University in 1980. He
Biometrics: Soft-Computing for Biometric- completed his Masters degree in Industrial
Applications” Dept of Pattern Recognition, Engineering from Madras University in
Fraunhofer IPK, Berlin, Germany. 1982. He obtained his second Masters
degree MS in Computer and Information
[7] Nalini K. Ratha, Jonathan H. Connell, and Ruud
Science from University of Michigan, USA
M. Bolle J, “ An Analysis of Minutiae Matching in 1999. He was awarded with PhD from Anna University, Chennai
Strength” Watson Research Center. in 2007. He is currently Professor and Head in the
[8] Rowley. T, “ Silicon Fingerprint Readers: A solid Department of Information Technology PSG College of
state approach to biometrics” , Proc. of the Card Technology, Coimbatore, India. His research interests are in
Tech / Secure Tech, Orlando, Florida, May 97. Simulation and Modeling, Software Engineering, Algorithm
[9] Schneier.B, “ The uses and abuses of biometrics” . Design, Software Process Management.
Communications of the ACM, August 1999.
[10] Schneir.B, “ Security pitfalls in cryptography” ,
Proc. of Card Tech /Secure Tech, Washington D.C.,
April 98.
[11] Wong C K and Lam S S, “Digital Signatures for
flows and multicasts”, IEEE/ACM Transaction and
Networking”, August 1999.
[12] www.rand.org/publications/MR/MR1237/MR1237.
appa.pdf
96 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
2
G.H.Raisoni College of Engineering
CRPF Gate 3 , Digdoh hills Hingna road Nagpur (India)
narenbawane@rediffmail.com
3
G.H.Raisoni College of Engineering
CRPF Gate 3 , Digdoh hills Hingna road Nagpur (India)
sonalibodkhe@raisoni.com
4
Govt Polytechnic,Nagpur(India)
madhuribawane@rediffmail.com
Figure 1. Typical electrode placements under the (1) The latent variables (or independent components) are
International 10 –20 system statistically independent and the mixing is linear.
(2) There is no more than one gaussian signal among the
The original EEG in f1.EDF from second 7500 to second latent variables and the latent variables have cumulative
8100 (f1_750to810.set, 12 Mbytes). This EEG frame density function not much different from a logistic sigmoid .
contains a seizure[18][19]. (3) The number of observed signals, m, is greater than or
equal to the number of latent variables, n (i.e. m _ n).
3. Independent Component Analysis(ICA) If n > m, we come to a special category of Independent
Component Analysis called ICA with over-complete bases .
Independent Component Analysis (ICA) is one of a group of In such a case the mixed signals do not have enough
algorithms to achieve blind separation of sources [Jutten & information to separate the independent components. There
Herault 1991]. ICA finds an unmixing matrix which linearly have been attempts to solve this particular problem but no
decomposes the multichannel EEG data into a sum of rigorous proofs exist as of yet . If m > n then there is
maximally temporally independent and spatially fixed redundancy in the mixed signals. The ICA model works
components. These Independent Components (ICs) account ideally when n = m.
for artifacts, stimulus and response locked events and (4) The mixing matrix is of full column rank, which means
spontaneous EEG activity. One of the standard applications that the rows of the mixing matrix are linearly independent.
of ICA to EEG includes artifact detection and removal . If the mixing matrix is not of full rank then the mixed
Selected components responsible for artifacts are set to zero signals will be linear multiples of one another.
and all other ICs can be projected back onto the scalp (5) The propagation delay of the mixing medium is
yielding EEG in true polarity and amplitudes. Related negligible.
approaches to magneto encephalographic signals can be
found . Some simple neural network algorithms cane blindly 3.3 The ICA model applied to EEG Data
separate mixtures, of independent sources. On maximizing
the joint entropy(y), of the output of neural processor In case of EEG signals we have m-scalp electrodes picking
minimizes the mutual information among the output up correlated brain signals where we would like to know
components, yi = g(ui), where g(ui) is an invertible bounded what effectively independent brain sources produced these
nonlinearity and u=Wx, a version of the original sources. signals. The ICA model appears well suited for this scenario
ICA is suitable for performing blind source separation on because it satisfies most of the model assumptions
EEG data because: (1) it is possible that EEG data recorded considered in section 4. Start with assuming that EEG data
at multiple scalp sensors are linear sums of temporally can be modeled as a collection of statistically independent
independent components arising from spatially fixed, brain signals. Assumption (5) is valid since volume
distinct brain or extra-brain networks, and, (2) EEG data by conduction in the brain is effectively instantaneous and
volume conduction does not involve significant time delays. assumption (2) is plausible . In this paper, it will attempt to
In EEG analysis, the rows of the input matrix x are the EEG separate the m-observed EEG signals into n-statistically
signals recorded at different electrodes, while the columns independent components (thus satisfying assumption (3) and
are measurements recorded at different time points. (4)). However, it is questionable to assume whether EEG
data recorded from m-electrodes is made up of exactly n-
3.1 Types of artifacts statistically independent components since it ultimately
cannot know the exact number of independent components
Severe contamination of EEG activity by artifacts such as embedded in the EEG data. Nonetheless, this assumption is
eye movements, blinks, head movements, muscle, and line usually enough to identify and separate artifacts that are
noise create a problem for proper EEG interpretation and concentrated in certain areas of the brain such as eye,
analysis. The three types of muscle artifacts studied in this temporal, and occipital artifacts . The ICA model tends to
paper are: have a more difficult time in separating artifacts that are
1) Eye artifacts – project mainly to the frontal side more spaced out over the scalp such as muscle artifacts.
2) Rear head artifacts – project mainly to the occipital
Side
98 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
For i=1:EndofBlock
u=weightsxdata+w0
y=1/(1+exp(-u))
weights=weights+Irate*(I-2yu)*weights
Weights
=> Yes wts_blowup=1
maxWts? noChange=1
No
Yes Yes
Yes
oldwtchange=weights-old_wts
step++
~wts_blowup angledelta=0
Yes
? delta=oldwtchange
change=oldwtchange 2
No
step=0;change=nochange;
wts_blowup=0
block=1;
Irate=Irate*lowerIrate%restart with
lower Irate
weights=identity matrix;
old wts=weights;
Yes
2
3
1
(IJCNS) International Journal of Computer and Network Security, 99
Vol. 2, No. 4, April 2010
3 2
Yes
rnk=rank(data)
No
RETURN
Display("lower learning rate to <Irate> and starting again")
No
display('setp<step>-
Irate<Irate>,wchange<change>')
oldwts=weights;
Irate=IratexlowerIrate;
angledelta>60? Yes olddelta=delta;
oldchange=change;
No
olddelta=delta;
step==1? Yes
oldchange=chnage;
No
No
∂y ∂y
E ln ≈ ln
∂x ∂x
−1
∂H(y) ∂ ∂y ∂y ∂ ∂y
∆wα = ln =
∂w dw ∂x ∂x ∂w ∂x
(5)
Figure 3. Transformation of the fx(x), of x when x is mixed
with a sigmoid mixing function
The above equation is the general form of the weight change
An increase in the joint entropy of the output, H(y),means a rule for any transformation function y. For the logistic
decrease in its mutual information. The entropy of the output sigmoid function eq.(1), the terms in eq .(5) are evaluated
is maximized when we align the high density parts of pdf of as:
x with the high sloping parts of the function g(x) (hence the
need for the biasing weight w0). The function g(x) is ∂y
monotonically increasing (i.e. has a unique inverse) and thus = wy (1 − y) (6)
the output fy(y) can be written as a function of the input fx(x) ∂x
as:
( y) =
f (x) ∂ ∂y
= y(1 − y)(1 + wx (1 − 2 y))
x
f
∂y
y
(7)
∂w ∂x
∂x
(1) Substituting the above equations into eq.(5) gives the weight
The entropy of the output is given by, update rule for y = logistic sigmoid function:
∞
H ( y) = −E{ln f y ( y)} = − ∫ f y ( y) ln f y ( y)dy (2) ∆ w α w − 1 + (1 − 2 y ) x (8)
−∞
∂y ∆ w 0α 1 − 2 y
H ( y ) = E ln − E {ln f x ( x )} (3) (9)
∂x
Following similar steps we can derive the learning rules for
We now would like to maximize H(y) of eq.(3) for statistical multivariate data for a sigmoid function:
independence. Looking at the right hand side we see that the
function x is fixed and the only variable we can change is y.
Or more preciously, the slope, w, of y. Hence we take the ∆Wα W T [ ] −1
+ (1 − 2 y) xT (10)
(IJCNS) International Journal of Computer and Network Security, 101
Vol. 2, No. 4, April 2010
∆ w 0α 1 − 2 y (11)
4. MatLab Implementation
Equations (10) and (11) give the learning rules for updating
the weights to perform ICA. Implementing them directly
into Matlab will involve performing the inverse function,
which is computationally very intensive. We therefore
modify eq.(10) by multiplying it by WTW (this does not
change anything since W is orthogonal):
∂H ( y) T
∆Wα W W
∂W
[ ]
⇒ ∆Wα ( W T
−1
− (1 − 2 y) xT )W TW Figure 4. EEG data from Data Set (f1.set)
⇒ ∆Wα ( I + (1 − 2 y) xTW TW (12)
5.1 Independent Components:
⇒ ∆Wα ( I + (1 − 2 y)u T )W, Execution of the data is processed through Matlab function of
EEG toolbox[19]. The resulting independent components are
shown in figure(5).
Where u=xW
The bias weight update rule remains the same:
∆w0α (1 − 2 y) (13)
5. Result Discussion
Data Set f1.set considered in the paper contains 600 seconds
of data with sampling frequency Fs=250 Hz. There are 21
channels of data. The data was collected from electrodes
placed on the scalp at standard locations using the
international 10-20 system[4]. The EEG data is plotted using
function implemented in Matlab[18] and is depicted in
figure(1).
This data contains a seizure onset around 300 onwards on T3- Figure 6. Independent Components with their respective
T5 channel with the appearance of rhythmic waves. Occipital topographical projection of Dataset(f1.set)
artifacts on O1and O2 .Eye blink artifact are on Fp1 and Fp2
and Muscle Artifact are on all channels.
102 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Author Profile
1
Department of Electrical and Electronics Engineering,
Bannari Amman Institute of Technology Anna University, Tamil Nadu India
ramsenthil2@gmail.com
2
Department of Control and Instrumentation Engineering,
PSG College of Technology, Anna University, Tamil Nadu India
jjovitha@yahoo.com
3
Department of Electrical and Electronics Engineering,
Bannari Amman Institute of Technology Anna University, Tamil Nadu India
nithyabhamaeee@gmail.com
1. Number of 6 8
1 0001 0 0 -Vd
(b)
SWITCHES
(b) S1 S2 S3 S4 S5 S6 N1 N2
DEGREES
4. Simulation Results
The Figure 11 shows the three phase AC rectifier and its
output.
The Figure 14 is the three phase input source voltage for the
UPS.
Figure 11.Simulation circuit for rectifier.
5. Conclusion
The three phase four wire UPS has been proposed in this
paper. The fourth wire makes the inverter have the ability of
Figure 17.Simulation result for three phase four wire handling unbalancing loads. The inductor in fourth wire
inverter reduces the current through the switching components. The
Table 4: Simulation result parameters
inverter control has the advantages of both lower switching
to fundamental frequency ratio and outstanding ability to
carry unbalanced loads.
Parameter Values
References
Voltage for each phase 100V
[1] Fanghua Zhang, and Yangguang Yan “Selective
Frequency 50HZ Harmonic Elimination PWM Control Scheme on a
Three-Phase Four-Leg Voltage Source Inverter” IEEE
DC input voltage 200V Trans. Power Electronics, vol. 24, no. 7, July 2009.
[2] Lihua Li and Keyue Ma Smedley, “A New Analog
Inductance(L) 1mH Controller for Three-Phase Four-Wire Voltage
Generation Inverters” IEEE Trans. Power Electronics,
Capacitance(C) 1000µF
vol. 24, no. 7, July 2009.
Neutral inductance(Ln) 1mH [3] Liu Zeng, Liu Jinjun and Li Jin “Modeling, Analysis
and Mitigation of Load Neutral Point Voltage for
Rated resistive load 100Ω Three-phase Four-leg Inverter” IPEMC2009.
The neutral voltage waveform for four wire inverter as [4] Salvador Ceballos, Josep Pou, Jordi Zaragoza, José L.
shown in Figure 18. Martín, Eider Robles, Igor Gabiola, and Pedro Ibanez,
“Efficient Modulation Technique for a Four-Leg Fault-
Tolerant Neutral-Point-Clamped Inverter” IEEE Trans.
Industrial Electronics, vol. 55, no. 3, March 2008.
[5] Armando Bellini and Stefano Bifaretti “Modulation
Techniques for Three-Phase Four-Leg Inverters”
Proceedings of the 6th WSEAS International
Conference on Power Systems, Lisbon, Portugal,
September 22-24, 2006.
[6] Bellini and S. Bifaretti “A Simple Control Technique
for three phase four leg inverters”. SPEEDAM 2006.
[7] Richard Zhang, V. Himamshu Prasad, Dushan
Boroyevich and Fred C.Le “Three-Dimensional space
Vector Modulation for Four –Leg Voltage-Source
Figure 18.Simulation result for neutral voltage Converters” IEEE Trans.Power Electronics, vol.17,
no.3, May 2002.
The Figure 19 shows the THD level for three Phase four [8] Salem M. Ali Marian and P. Kazmierkowski “PWM
wire system. The harmonic distortion is reduced and its Voltage and Current Control of Four-Leg VSI” 1998
THD level is 3.92%. IEEE.
110 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 4, April 2010
Authors Profile
SenthilKumar.R was born in
Tamilnadu, India, on November 2, 1966.
He received the B.E degree in Electrical
and Electronics Engineering from
Madurai Kamaraj University, in 1989.
He received his M.E (Power systems)
from Annamalai University, in 1991. He
has 15 yrs of teaching experience.
Currently he is working as Asst.
Professor in EEE department, Bannari
Amman Institute of Technology Sathyamanglam. Currently he is
doing research in the field of power
converters for UPS Applications.
4. Algorithm
1 The non singular quadratic form is chosen.
2 The matrix Q of the quadratic is obtained.
3 The plain text is converted into its equivalent
message matrix M which is multiplied with Q
to obtain N.
(IJCNS) International Journal of Computer and Network Security, 113
Vol. 2, No. 4, April 2010
References
Mrs.Naga Lakshmi is working as Assistant
Professor in the Department of Engineering
[1] K.R.Sudha, A.Chandra Sekhar and Prasad Mathematics . She is pursuing her MPhil in
Reddy.P.V.G.D “Cryptography protection of digital number theory and cryptography under the
signals using some Recurrence relations” IJCSNS guidance of Dr.A.Chandra Sekhar
International Journal of Computer Science and Network
Security, VOL.7 No.5, May 2007 pp 203-207
Authors Profile
Dr.A .Chandra Sekhar received his PhD
degree in number theory from JNT University
and MSc., degree with specialization in
algebraic number theory from Andhra
University . He Secured the prestigious
K.NAGABHUSHANAM Memorial Award in
M.Sc., for obtaining University First rank. He
did his MPhil from Andhra University in 2000.He was with Gayatri
degree college during 1991to 1995 and later joined GITAM
Engineering college in 1995. Presently he is working as Professor
and Head of the Department of Engineering Mathematics at
GITAM Engineering college, Visakhapatnam, INDIA.