Computer and Information Sciences - Publications
Permanent URI for this collection
Browse
Recent Submissions
1 - 5 of 1261
-
ItemArtificial bee colony algorithm for probabilistic target Q-coverage in wireless sensor networks( 2013-12-01)The lifetime of a wireless sensor network is dependent on the type of sensor deployment. If the application permits deterministic deployment of nodes and if the sensor nodes are limited, quality of sensing and energy conservation can be enhanced by restricting the sensing range requirement. This paper addresses deterministic deployment of nodes for probabilistic target Q-coverage. A probabilistic coverage model considers the effect of distance and medium on the sensing ability of a node. We use Artificial Bee Colony (ABC) algorithm to compute the optimal deployment of sensor nodes such that the required sensing range is minimum for probabilistic target Q-coverage. © 2013 Springer International Publishing.
-
ItemEnergy efficient aggregation in wireless sensor networks for multiple base stations( 2013-12-01)Data aggregation is essential for wireless sensor networks (WSN) where energy resources are limited. Due to scarce energy resources, construction of data aggregation tree in WSN from group of source nodes to sink nodes with less energy consumption is challenging. In this work, we propose a method to determine the aggregation tree with less energy consumption using Artificial Bee Colony (ABC) algorithm, which is a swarm intelligence technique. We compute the fitness (energy consumption of whole network) by considering multiple algorithms in the same network and then evolving the solution until fitness value is minimum. Our preliminary results suggest that, under investigated scenarios, the usage of ABC algorithm for aggregation in WSN with multiple base stations can achieve energy savings over Shortest path tree data aggregation and Ant colony data aggregation with multiple base stations. © 2013 Springer International Publishing.
-
Item
-
ItemA Secure Lightweight and Scalable Mobile Payment Framework( 2014-01-01)Existing SIP-based mobile payment solutions do not ensure all the security properties. In this paper we propose a Secure Lightweight and Scalable Mobile Payment Framework (SLSMP) using Signcryption scheme with Forward Secrecy (SFS) based on elliptic curve scheme which combines digital signature and encryption functions (Hwang et al., 2005) [5]. It takes lower computation and communication cost to provide security functions. SLSMP is highly scalable which is attributed to SIP for data exchange. This paper uses WPKI, UICC as Secure Element and depicts system architecture and detailed protocol of SIP based mobile payment solution. Our proposed framework is suitable for both micro and macro payments. Our proposed protocol ensures End to End security i.e. ensures Authentication, Integrity, Confidentiality and Non Repudiation properties, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, prevents Double Spending, Overspending and Money laundering. © Springer International Publishing Switzerland 2014.
-
Item