Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Ramesh Babu Battula

    MNIT, Cse, Faculty Member
    Wireless Sensor and Actor Networks (WSANs) are composed of heterogeneous nodes referred to as sensors and actors. Sensors are low-cost, low-power, multi-functional devices that communicate untethered in short distances. Actors collect and... more
    Wireless Sensor and Actor Networks (WSANs) are composed of heterogeneous nodes referred to as sensors and actors. Sensors are low-cost, low-power, multi-functional devices that communicate untethered in short distances. Actors collect and process sensor data and perform appropriate actions on the environment. Hence,actors are resource-rich devices equipped with higher processing and transmission capabilities, and longer battery life.In WSANs, the collaborative operation of the sensors enables the distributed sensing of a physical phenomenon. After sensors detect an event in the deployment field, the event data is distributively processed and transmitted to the actors, which gather, process, and eventually reconstruct the event data. WSANs can be considered a distributed control system designed to react to sensor information with an effective and timely action. For this reason, in WSANs it is important to provide real-time coordination and communication to guarantee timely execution ...
    Cognitive radio network (CRN) is one of theprominent technology for the next generation wirelessnetworks. Due to the CR version, the userswere classified into two types which are the primaryusers (PUs) and secondary users (SUs) which... more
    Cognitive radio network (CRN) is one of theprominent technology for the next generation wirelessnetworks. Due to the CR version, the userswere classified into two types which are the primaryusers (PUs) and secondary users (SUs) which arealso named as licensed and unlicensed users. Themain objective of CRN is to access the underutilizedlicensed bands of PUs by SUs without any interferenceto the PUs transmission. In the CR technology, medium access control (MAC) plays a vital role toincrease the spectrum efficiency and also minimizethe collisions among SUs. So to design an efficientMAC is one of the significant challenges in theCRN. The existed MAC protocols are unable toidentify the most appropriate spectrum to access. Thus, spectrum aware token based MAC protocolis proposed to resolve the spectrum selection issuein MAC design for CRN. In this paper, we considerexpected spectrum stability time (ESST) as a metricto assign ranks to the available licensed spectrumbands. Simulation results for various parametersshow that SAMAR protocol can approximately improvethroughput 8% decrease transmission delay75% compared with IEEE 802.11n. The remainingmetric results have demonstrated the performanceof existed MAC protocols like IEEE802.11n andTMAC with the proposed MAC.
    Security is a prime concern in the resource constrained wireless sensor networks. Traditional cryptographic mechanisms cannot be used with these networks due to their limited battery. Clustering is one of the popular methods to improve... more
    Security is a prime concern in the resource constrained wireless sensor networks. Traditional cryptographic mechanisms cannot be used with these networks due to their limited battery. Clustering is one of the popular methods to improve the energy efficiency of WSN. In this chapter, the authors propose a secure routing protocol for cluster-based wireless sensor networks. A hierarchical topology is formed by the base station, which is also responsible for distributing the cryptographic keys among the nodes. Security analysis of the proposed protocol is done against various security attacks. The efficiency of the proposed protocol is explained through mathematical calculations and simulations. The proposed protocol also performs better than other existing secure protocols for cluster-based WSN regarding battery life and security overhead.
    Cognitive Radio (CR) technology [1] is a prominent solution to resolve the problem of spectrum underutilization in licensed spectrum bands. The regulatory agencies are allowing Dynamic Spectrum Access (DSA) techniques to overcome this... more
    Cognitive Radio (CR) technology [1] is a prominent solution to resolve the problem of spectrum underutilization in licensed spectrum bands. The regulatory agencies are allowing Dynamic Spectrum Access (DSA) techniques to overcome this issue. These techniques are providing access to the Secondary User (SU) in the unused licensed bands without creating interference to Primary Users (PUs) [2]. The SU requires a reliable sensing technique to identify the unused spectrum holes in the licensed bands. The sensing techniques are not only minimizing interferences with PU transmission and also finding reliable information about the unused licensed bands in the wireless communication systems. The selection of spectrum sensing technique depends on the speed and reliability of PU signal identification. Matched filter detection, cyclostationary feature detection [3], energy detection [4], etc. are existing sensing techniques in the cognitive radio network (CRN).
    In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols... more
    In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters which are considered a constraint in underwater acoustic communication Keywords Medium access control protocol, network layer protocols, and underwater acoustics. 1. INTRODUCTION Underwater sensor networks are becoming popular every day due to their unique characteristics that make them easy to deploy in areas where adverse environmental conditions exist. Underwater sensor nodes play a major role in pollution monitoring in environmental systems, remote control in the offshore oil industry, collection of scientific data that is observed at ocean-bottom stations, navigational assistance and surveying ocean floor to search for new resources, disaster prevention and tactical surveillance applic...
    Software Defined Networking is an emerging networking technology that simplifies the network management by separating the control logic from the underlying switches and routers. The control plane’s flexibility is heavily relied on the... more
    Software Defined Networking is an emerging networking technology that simplifies the network management by separating the control logic from the underlying switches and routers. The control plane’s flexibility is heavily relied on the Controller Placement Problem (CPP), which deals with location of the controllers and assignment of forwarding elements to the controllers. Addressing the CPP should be the highest priority as this provides a significant improvement in reducing latency, addressing scalability and resilience, maintaining better load balancing and security in the network. Therefore, a new technique based on k-means clustering using Farthest Node Initialization (FANIC) has been suggested in order to assign the switches efficiently. This technique divides the network into k clusters and assigns all the switches to a specific controller. Then the best path from all the nodes to the controller is calculated inorder to reduce the latency between them. The suggested algorithm r...
    Smart cities require smart and effective solutions to tackle the problems faced by them. Traffic, Surveillance, Security, Medical, Transportation and other basic services need to be managed by the city administrators efficiently. Waste... more
    Smart cities require smart and effective solutions to tackle the problems faced by them. Traffic, Surveillance, Security, Medical, Transportation and other basic services need to be managed by the city administrators efficiently. Waste Management is one of issue faced by almost all countries around the globe. The Waste generation is a continuous process and is harming biodiversity and ecology is many ways. Many countries are trying to mitigate the harm by developing strategies using technology. Internet of Things (IoT) is one of the prominent solutions that can effectively and efficiently help in dealing with waste management. Indias waste management system will become more effective by incorporation of IoT in waste management architecture. In this paper, Architecture for Waste Management in Indian Smart Cities (AWMINS) has been proposed. This uses smart bins for garbage classification and collection. The smart bins are fitted with sensors and other necessary hardware equipment. The...
    Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models... more
    Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.
    Wireless Mesh Networks (WMNs) are emerging and low-cost next generation wireless networks. WMNs are able to provide communication for all types of networks with its backbone composed of low mobile or stationary Mesh Routers (MR). In WMNs,... more
    Wireless Mesh Networks (WMNs) are emerging and low-cost next generation wireless networks. WMNs are able to provide communication for all types of networks with its backbone composed of low mobile or stationary Mesh Routers (MR). In WMNs, most of the ...
    To prolong the overall lifetime of the network, development of energy efficient routing protocol is a major issue in Wireless Sensor Network. Clustering Protocols are one of the approaches to serve this purpose. LEACH-C is a cluster based... more
    To prolong the overall lifetime of the network, development of energy efficient routing protocol is a major issue in Wireless Sensor Network. Clustering Protocols are one of the approaches to serve this purpose. LEACH-C is a cluster based protocol in which cluster heads are selected by the base station randomly. All the nodes having the energy above average are eligible to be cluster heads. Base station runs a simulated annealing algorithm to find the optimal solution with better positions to reduce the energy consumption of cluster heads. This paper presents an Energy Efficient LEACH-C (EELEACH-C) protocol, in which base station runs a sorting algorithm to obtain a list of candidate cluster head nodes sorted in descending value their residual energy. After examining the candidate cluster head nodes it selects those with maximum residual energy and than calculate the quadratic sum of the distances from each cluster heads to its member nodes to find the optimal solution. Experimental result attests that the proposed protocol improves network longevity.
    In a Wireless Sensor Network (WSN) hundreds of tiny sensors with limited resources are accommodated to sense the information from the field. Transfer of gathered information from the sensing field to the base station must be done in... more
    In a Wireless Sensor Network (WSN) hundreds of tiny sensors with limited resources are accommodated to sense the information from the field. Transfer of gathered information from the sensing field to the base station must be done in proficiently to sustain the network longer. Clustering of sensor nodes is one way to achieve this goal. This paper introduces an Energy Efficient clustered routing protocol based on LEACH-C for WSN. In LEACH-C (Low Energy Adaptive Clustering Hierarchy-Centralized), the cluster heads are selected by the base station randomly. This paper introduces a novel cluster based routing protocol in which, the base station finds the highest energy node among the cluster and mark it as a cluster head for the current time. Thus in the proposed system the energy consumption of various nodes becomes more uniform as compared to LEACH-C. The simulation results indicate that our proposed method leads to efficient transmission of data packets with less energy and therefore increases the network longevity as compared to LEACH-C and LEACH.
    ABSTRACT-Next generation wireless communications will likely rely on integrated networks consisting of multiple wireless technologies. Hybrid networks based, for instance, on systems such as WMAN and WLAN can combine their respective... more
    ABSTRACT-Next generation wireless communications will likely rely on integrated networks consisting of multiple wireless technologies. Hybrid networks based, for instance, on systems such as WMAN and WLAN can combine their respective advantages on ...
    In this paper, a delay and energy aware coordination mechanism (DEACM) has been devised for wireless sensor–actor networks. In DEACM, a two‐level hierarchical K‐hop clustering mechanism is used to organize the sensors and actors for... more
    In this paper, a delay and energy aware coordination mechanism (DEACM) has been devised for wireless sensor–actor networks. In DEACM, a two‐level hierarchical K‐hop clustering mechanism is used to organize the sensors and actors for communication. In the first level, sensors form a K‐hop cluster using actors as cluster heads, and sink is made as the cluster head in the second level to form a cluster among actors. Sensor nodes, which are 1‐hop away from the actors, also called as relay nodes are elected as backup cluster head (BCH) based on the residual energy and node degree. BCH collects the data from sensors when an actor is away to perform actions in the affected area. The scheme is evaluated through exhaustive simulation in NS2 along with other existing schemes. Different parameters like average event waiting time, event reliability, and average energy dissipation are compared, varying the number of sensors, actors, and data transfer rate. In general, it is observed that the proposed DEACM outperforms other existing schemes. Copyright © 2016 John Wiley & Sons, Ltd.
    ABSTRACT In this paper, an efficient coordination mechanism is designed for Wireless Sensor and Actor Networks (WSANs) to perform reliable actions in the event area. It is a Voronoi diagram based energy and delay aware coordination... more
    ABSTRACT In this paper, an efficient coordination mechanism is designed for Wireless Sensor and Actor Networks (WSANs) to perform reliable actions in the event area. It is a Voronoi diagram based energy and delay aware coordination mechanism using two-level hierarchical clustering protocol. In the first level, every actor calculates the sensor Voronoi region using sensor range and residual energy. In the second level, the sink calculates the actor Voronoi region consisting of sensors using its acting range. An optimal number of actors are calculated based on the network area and number of sensors. A routing protocol is provided to communicate among sensor's and actor's based on their characteristics. The performance of the proposed mechanism is evaluated in NS2 and compared with existing protocols. Simulation results indicate that the proposed mechanism outperforms the existing algorithms in various network parameters namely, energy, delay and packet delivery ratio.
    In this paper, a survey on routing protocols, challenges and applications in wireless mesh networks (WMNs) is conducted. Wireless Mesh network is a type of distributed, self-organizing, self-configuring and self-healing network. When... more
    In this paper, a survey on routing protocols, challenges and applications in wireless mesh networks (WMNs) is conducted. Wireless Mesh network is a type of distributed, self-organizing, self-configuring and self-healing network. When access points in Wireless ...
    The growing concern for the increasing number of road accident deaths draws our attention towards a replacement of the traditional traffic management system. In today’s scenario, Traffic collision is the eighth leading cause of deaths and... more
    The growing concern for the increasing number of road accident deaths draws our attention towards a replacement of the traditional traffic management system. In today’s scenario, Traffic collision is the eighth leading cause of deaths and injuries in all over the world, hence the ITS comes into the picture. Sensors mounted at strategic places can use IoT which is an ecosystem of smart devices that use embedded systems to collect, send and act on data they acquire from their environments. For the communication between vehicles and infrastructure we use V2I which is a communication framework that enables several vehicles to share information with a variety of devices. The scope of this project is divided majorly into two modules, namely DSTC and APAS. Together, these two modules serve the purpose of traffic congestion control and quick post accident care, which broadly help us to achieve the goal of Smart Traffic Management.
    Internet of Vehicles (IoV) aims to make transportation easy for the user by trying to make the roads safer and more secure. The main challenge of IoV is that the vehicles should detect the pedestrians coming in their way spontaneously and... more
    Internet of Vehicles (IoV) aims to make transportation easy for the user by trying to make the roads safer and more secure. The main challenge of IoV is that the vehicles should detect the pedestrians coming in their way spontaneously and immediately respond to this unexpected interference with minimum delay. So an intelligent transportation system named FOOTREST (saFety On rOads ThRough intElligent tranSporTation system) has been proposed to resolve this issue. FOOTREST identifies the approaching pedestrian quickly and then warns the other nearby vehicles and entities. It can be used for emergency conditions, detection of animals, specially abled person peoples and children’s also. The sudden arrival of pedestrian causes interference among vehicles and therefore the vehicles have to reconnect again in less time to reduce probability of any mishap.
    ABSTRACT In this paper, we discuss an interference aware multichannel MAC (IAMMAC) protocol assign channels for communication in wireless sensor-actor networks. An actor acts as a cluster head for k-hop sensors and computes the shortest... more
    ABSTRACT In this paper, we discuss an interference aware multichannel MAC (IAMMAC) protocol assign channels for communication in wireless sensor-actor networks. An actor acts as a cluster head for k-hop sensors and computes the shortest path for all the sensors. Then, the actor partitions the cluster into multiple subtrees and assigns a noninterference channel to each subtree. The actor 1-hop sensors are represented as relay nodes. The actor selects a relay node as a backup cluster head (BCH) based on the residual energy and node degree. After selecting a BCH from the relay nodes, the actor broadcast this information to the remaining relay nodes using the common control channel. The relay sensors use the same channel of BCH to communicate with it. However, the other cluster members do not change their data channel. Further, interference-aware and throughput-aware multichannel MAC protocol is also proposed for actor–actor coordination. The performance of the proposed IAMMAC protocol is analyzed using standard network parameters such as packet delivery ratio, goodput, end-to-end delay, and energy dissipation in the network. The obtained simulation results indicate that the IAMMAC protocol has superior performance as compared with the existing MAC protocols
    Path