Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Nahar Sultana

    Nahar Sultana

    As the field of communication network is growing up, one of the most challenging and emerging technology is wireless sensor network. In this age, wireless sensor network is rapidly coming up with the demand of age. It has expanded many... more
    As the field of communication network is growing up, one of the most challenging and emerging technology is wireless sensor network. In this age, wireless sensor network is rapidly coming up with the demand of age. It has expanded many application areas both for military and public. The combination of sensing technology and processing power makes more attractive the wireless sensor network .As wireless sensor network technology is growing rapidly so it does the need for security mechanisms. Network security is essential for wireless sensor networks because they are easily susceptible to many threats and attacks. The most important security services required are authentication and confidentiality. Many researchers have done work in security mechanisms for wireless sensor network. The intent of this paper is to identify the security related issues and review proposed mechanisms for wireless sensor network.
    Collecting data from heterogeneous on body and implanted sensor devices of Wireless Body Area Network (WBAN) is a challenging problem due to interference and strict delay deadlines of application data. While prioritized data collection is... more
    Collecting data from heterogeneous on body and implanted sensor devices of Wireless Body Area Network (WBAN) is a challenging problem due to interference and strict delay deadlines of application data. While prioritized data collection is addressed in the literature for inter-WBANs, however how to prioritize medium accesses from different intra-Wban sensor devices is yet to be explored. In this work, we develop collaborative medium access mechanisms (CMAC) for critical and noncritical data traffic co-located with relevant data. We develop new super frame structures for accommodating different data types and schedule their transmissions based on their priorities. The result of performance analysis depicts that the proposed MAC mechanism offers significantly reduced data delivery delay for the critical traffic compare to its counterpart.
    ... The edge nodes bordering group G' will forward the challenge to it. Group G' will use the challenge Ck to choose a responder in a manner similar to the selection of the challenger. ... [12]J. Deng, R. Han, S. Mishra,... more
    ... The edge nodes bordering group G' will forward the challenge to it. Group G' will use the challenge Ck to choose a responder in a manner similar to the selection of the challenger. ... [12]J. Deng, R. Han, S. Mishra, “Intrusion tolerant routing for wireless sensor networks” Elsevier ...
    Narrowband Internet of Things (NB-IoT) is a promising technology for healthcare applications since it reduces the latency necessary in acquiring healthcare data from patients, as well as handling remote patients. Due to the interference,... more
    Narrowband Internet of Things (NB-IoT) is a promising technology for healthcare applications since it reduces the latency necessary in acquiring healthcare data from patients, as well as handling remote patients. Due to the interference, limited bandwidth, and heterogeneity of generated data packets, developing a data transmission framework that offers differentiated Quality of Services (QoS) to the critical and non-critical data packets is challenging. The existing literature studies suffer from insufficient access scheduling considering heterogeneous data packets and relationship among them in healthcare applications. In this paper, we develop an optimal resource allocation framework for NB-IoT that maximizes a user’s utility through event prioritization, rate enhancement, and interference mitigation. The proposed Priority Aware Utility Maximization (PAUM) system also ensures weighted fair access to resources. The suggested system outperforms the state-of-the-art works significant...
    Mobile sensor networks consist of mobile nodes interconnected by multihop path that has no fixed network infrastructure support. Due to limited bandwidth and resource and also the frequent changes in topologies, sensor network should... more
    Mobile sensor networks consist of mobile nodes interconnected by multihop path that has no fixed network infrastructure support. Due to limited bandwidth and resource and also the frequent changes in topologies, sensor network should consider these features for the provision of security. This paper proposes and analyzes a scalable and efficient routing protocol by introducing identity based infrastructure for secure group communication in wireless sensor networks. In a group communication, group merge is one of the operations for multiple member changes in a group. The newly merged group needs a secure route to maintain relationship with other groups. To ensure scalability for proposed ID based routing protocol, the system takes signcryption method which combines signature and encryption which provides a significant cost. Through comparison and analysis we have shown that our protocol has high probability to be resilient for secure communication among mobile nodes.
    A wireless sensor network (WSN) consists of numerous distributed, self-sufficient micro sensor nodes to agreeably monitor physical or environmental circumstances, such as temperature, sound, vibration, pressure, moisture, traffic, motion,... more
    A wireless sensor network (WSN) consists of numerous distributed, self-sufficient micro sensor nodes to agreeably monitor physical or environmental circumstances, such as temperature, sound, vibration, pressure, moisture, traffic, motion, pollutants or habitat monitoring etc. Event based WSN rely on the combined effort of a number of micro sensor nodes. Reliable event detection at the sink is based on combined information provided by source nodes, not on any individual report. Hence, conventional end-to-end reliability description and solution are unsuitable in Wireless Sensor Network (WSN). Moreover simultaneous multiple event detection is an issue for a large sensor field consisting of thousands of sensor nodes which is discussed in Event-to-Sink Reliable Transport protocol with some issues needed to resolve. In order to address those need, a new simultaneous multiple event reliable transport scheme for wireless sensor network (WSN), is proposed in this paper. SMESRT is a transpor...
    The selection of workers for carrying out tasks in mobile crowdsourcing systems that maximizes Quality of Service (QoS) is a challenging problem due to their diverse task completion properties and profit demands. The existing works in the... more
    The selection of workers for carrying out tasks in mobile crowdsourcing systems that maximizes Quality of Service (QoS) is a challenging problem due to their diverse task completion properties and profit demands. The existing works in the literature are limited either by merely considering the minimization of task completion time only or exploitation of colocated locations of the worker and task. In this paper, we have developed an optimization framework to make a trade-off in between the profit of workers and task completion time. The proposed framework considers locations related to task's service point, task's delivery point and current location of the worker. The results of performance studies depict that the proposed system offers competitive task delivery time as well as workers' profit.
    Wireless sensor networks (WSN) have recently achieved a great deal of attention due to its numerous attractive applications in many different fields. The focus of monitoring application is to acquire and verify information about enemy... more
    Wireless sensor networks (WSN) have recently achieved a great deal of attention due to its numerous attractive applications in many different fields. The focus of monitoring application is to acquire and verify information about enemy capabilities and positions of hostile targets. Monitoring applications related to security and reliability requires guaranteed k-coverage of the area at all times. A point in the monitored area is covered if it is within the sensing range of a sensor. We consider a WSN consisting of a set of sensors deployed randomly and form groups for its application. This paper focuses on k-coverage and security issues for group based application of WSN. An efficient secure coverage protocol for monitoring application is proposed and its efficiency is analyzed.
    Page 1. International Journal of Engineering and Technology Volume 1 No. 1, October, 2011 Copyright IJET © 2011 - IJET Publications UK SMESRT: A PROTOCOL FOR MULTIPLE EVENT-TO-SINK RELIABILITY IN WSN Hafizur ...