Wireless Sensor and Actor Networks (WSANs) are composed of heterogeneous nodes referred to as sen... more Wireless Sensor and Actor Networks (WSANs) are composed of heterogeneous nodes referred to as sensors and actors. Sensors are low-cost, low-power, multi-functional devices that communicate untethered in short distances. Actors collect and process sensor data and perform appropriate actions on the environment. Hence,actors are resource-rich devices equipped with higher processing and transmission capabilities, and longer battery life.In WSANs, the collaborative operation of the sensors enables the distributed sensing of a physical phenomenon. After sensors detect an event in the deployment field, the event data is distributively processed and transmitted to the actors, which gather, process, and eventually reconstruct the event data. WSANs can be considered a distributed control system designed to react to sensor information with an effective and timely action. For this reason, in WSANs it is important to provide real-time coordination and communication to guarantee timely execution ...
Cognitive radio network (CRN) is one of theprominent technology for the next generation wirelessn... more Cognitive radio network (CRN) is one of theprominent technology for the next generation wirelessnetworks. Due to the CR version, the userswere classified into two types which are the primaryusers (PUs) and secondary users (SUs) which arealso named as licensed and unlicensed users. Themain objective of CRN is to access the underutilizedlicensed bands of PUs by SUs without any interferenceto the PUs transmission. In the CR technology, medium access control (MAC) plays a vital role toincrease the spectrum efficiency and also minimizethe collisions among SUs. So to design an efficientMAC is one of the significant challenges in theCRN. The existed MAC protocols are unable toidentify the most appropriate spectrum to access. Thus, spectrum aware token based MAC protocolis proposed to resolve the spectrum selection issuein MAC design for CRN. In this paper, we considerexpected spectrum stability time (ESST) as a metricto assign ranks to the available licensed spectrumbands. Simulation results for various parametersshow that SAMAR protocol can approximately improvethroughput 8% decrease transmission delay75% compared with IEEE 802.11n. The remainingmetric results have demonstrated the performanceof existed MAC protocols like IEEE802.11n andTMAC with the proposed MAC.
Security is a prime concern in the resource constrained wireless sensor networks. Traditional cry... more Security is a prime concern in the resource constrained wireless sensor networks. Traditional cryptographic mechanisms cannot be used with these networks due to their limited battery. Clustering is one of the popular methods to improve the energy efficiency of WSN. In this chapter, the authors propose a secure routing protocol for cluster-based wireless sensor networks. A hierarchical topology is formed by the base station, which is also responsible for distributing the cryptographic keys among the nodes. Security analysis of the proposed protocol is done against various security attacks. The efficiency of the proposed protocol is explained through mathematical calculations and simulations. The proposed protocol also performs better than other existing secure protocols for cluster-based WSN regarding battery life and security overhead.
2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019
Cognitive Radio (CR) technology [1] is a prominent solution to resolve the problem of spectrum un... more Cognitive Radio (CR) technology [1] is a prominent solution to resolve the problem of spectrum underutilization in licensed spectrum bands. The regulatory agencies are allowing Dynamic Spectrum Access (DSA) techniques to overcome this issue. These techniques are providing access to the Secondary User (SU) in the unused licensed bands without creating interference to Primary Users (PUs) [2]. The SU requires a reliable sensing technique to identify the unused spectrum holes in the licensed bands. The sensing techniques are not only minimizing interferences with PU transmission and also finding reliable information about the unused licensed bands in the wireless communication systems. The selection of spectrum sensing technique depends on the speed and reliability of PU signal identification. Matched filter detection, cyclostationary feature detection [3], energy detection [4], etc. are existing sensing techniques in the cognitive radio network (CRN).
In this paper, a detailed survey on the current protocols for medium access control layer and rou... more In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters which are considered a constraint in underwater acoustic communication Keywords Medium access control protocol, network layer protocols, and underwater acoustics. 1. INTRODUCTION Underwater sensor networks are becoming popular every day due to their unique characteristics that make them easy to deploy in areas where adverse environmental conditions exist. Underwater sensor nodes play a major role in pollution monitoring in environmental systems, remote control in the offshore oil industry, collection of scientific data that is observed at ocean-bottom stations, navigational assistance and surveying ocean floor to search for new resources, disaster prevention and tactical surveillance applic...
Wireless Sensor and Actor Networks (WSANs) are composed of heterogeneous nodes referred to as sen... more Wireless Sensor and Actor Networks (WSANs) are composed of heterogeneous nodes referred to as sensors and actors. Sensors are low-cost, low-power, multi-functional devices that communicate untethered in short distances. Actors collect and process sensor data and perform appropriate actions on the environment. Hence,actors are resource-rich devices equipped with higher processing and transmission capabilities, and longer battery life.In WSANs, the collaborative operation of the sensors enables the distributed sensing of a physical phenomenon. After sensors detect an event in the deployment field, the event data is distributively processed and transmitted to the actors, which gather, process, and eventually reconstruct the event data. WSANs can be considered a distributed control system designed to react to sensor information with an effective and timely action. For this reason, in WSANs it is important to provide real-time coordination and communication to guarantee timely execution ...
Cognitive radio network (CRN) is one of theprominent technology for the next generation wirelessn... more Cognitive radio network (CRN) is one of theprominent technology for the next generation wirelessnetworks. Due to the CR version, the userswere classified into two types which are the primaryusers (PUs) and secondary users (SUs) which arealso named as licensed and unlicensed users. Themain objective of CRN is to access the underutilizedlicensed bands of PUs by SUs without any interferenceto the PUs transmission. In the CR technology, medium access control (MAC) plays a vital role toincrease the spectrum efficiency and also minimizethe collisions among SUs. So to design an efficientMAC is one of the significant challenges in theCRN. The existed MAC protocols are unable toidentify the most appropriate spectrum to access. Thus, spectrum aware token based MAC protocolis proposed to resolve the spectrum selection issuein MAC design for CRN. In this paper, we considerexpected spectrum stability time (ESST) as a metricto assign ranks to the available licensed spectrumbands. Simulation results for various parametersshow that SAMAR protocol can approximately improvethroughput 8% decrease transmission delay75% compared with IEEE 802.11n. The remainingmetric results have demonstrated the performanceof existed MAC protocols like IEEE802.11n andTMAC with the proposed MAC.
Security is a prime concern in the resource constrained wireless sensor networks. Traditional cry... more Security is a prime concern in the resource constrained wireless sensor networks. Traditional cryptographic mechanisms cannot be used with these networks due to their limited battery. Clustering is one of the popular methods to improve the energy efficiency of WSN. In this chapter, the authors propose a secure routing protocol for cluster-based wireless sensor networks. A hierarchical topology is formed by the base station, which is also responsible for distributing the cryptographic keys among the nodes. Security analysis of the proposed protocol is done against various security attacks. The efficiency of the proposed protocol is explained through mathematical calculations and simulations. The proposed protocol also performs better than other existing secure protocols for cluster-based WSN regarding battery life and security overhead.
2019 11th International Conference on Communication Systems & Networks (COMSNETS), 2019
Cognitive Radio (CR) technology [1] is a prominent solution to resolve the problem of spectrum un... more Cognitive Radio (CR) technology [1] is a prominent solution to resolve the problem of spectrum underutilization in licensed spectrum bands. The regulatory agencies are allowing Dynamic Spectrum Access (DSA) techniques to overcome this issue. These techniques are providing access to the Secondary User (SU) in the unused licensed bands without creating interference to Primary Users (PUs) [2]. The SU requires a reliable sensing technique to identify the unused spectrum holes in the licensed bands. The sensing techniques are not only minimizing interferences with PU transmission and also finding reliable information about the unused licensed bands in the wireless communication systems. The selection of spectrum sensing technique depends on the speed and reliability of PU signal identification. Matched filter detection, cyclostationary feature detection [3], energy detection [4], etc. are existing sensing techniques in the cognitive radio network (CRN).
In this paper, a detailed survey on the current protocols for medium access control layer and rou... more In this paper, a detailed survey on the current protocols for medium access control layer and routing layer in the area underwater acoustic sensor networks are given. This survey is on some of the best MAC protocols and routing protocols and also it compares them based on some critical parameters which are considered a constraint in underwater acoustic communication Keywords Medium access control protocol, network layer protocols, and underwater acoustics. 1. INTRODUCTION Underwater sensor networks are becoming popular every day due to their unique characteristics that make them easy to deploy in areas where adverse environmental conditions exist. Underwater sensor nodes play a major role in pollution monitoring in environmental systems, remote control in the offshore oil industry, collection of scientific data that is observed at ocean-bottom stations, navigational assistance and surveying ocean floor to search for new resources, disaster prevention and tactical surveillance applic...
Uploads
Papers by Ramesh Babu Battula