Part 1 IReseau
Part 1 IReseau
Part 1 IReseau
Intelligent
Computing,
Networking,
and Informatics
Proceedings of the International
Conference on Advanced Computing,
Networking, and Informatics, India,
June 2013
Advances in Intelligent Systems
and Computing
Volume 243
Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
kacprzyk@ibspan.waw.pl
The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, eco-
nomics, business, e-commerce, environment, healthcare, life science are covered. The list of
topics spans all the areas of modern intelligent systems and computing.
The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarily
textbooks and proceedings of important conferences, symposia and congresses. They cover
significant recent developments in the field, both of a foundational and applicable character. An
important characteristic feature of the series is the short publication time and world-wide
distribution. This permits a rapid and broad dissemination of research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: jwang@mae.cuhk.edu.hk
Durga Prasad Mohapatra
Srikanta Patnaik
Editors
Intelligent Computing,
Networking, and Informatics
Proceedings of the International Conference
on Advanced Computing, Networking,
and Informatics, India, June 2013
123
Editors
Durga Prasad Mohapatra Srikanta Patnaik
Computer Science and Engineering Computer Science and Engineering
National Institute of Technology Rourkela SOA University
Rourkela, Orissa Bhubaneswar
India India
v
Committee
Advisory Committee
vii
viii Committee
Chief Patron
Patron
General Chairs
Programme Chair
Programme Co-Chairs
Publication Chairs
Organising Chairs
Publicity Chair
Programme Committee
Steering Committee
xiii
xiv Contents
Online Hybrid Model for Online Fraud Prevention and Detection . . . 805
Ankit Mundra and Nitin Rakesh
Abstract The wide spread use of biometrics in real world causes more security
and privacy concerns to be raised, because conventional biometric systems store
biometric templates as it is in database without any security, and this may lead to
the possibility of tracking personal information stored in database; moreover,
biometric templates are not revocable and are unusable throughout their life time
once they are lost or stolen. To overcome this non-revocability of biometrics, we
proposed two methods for image security and template security in this paper (these
methods are also applicable for some of the biometric traits); for image security,
we used chaotic mixing with watermarking technique; first chaotic mixing is
applied to the host image, and then, this resultant image is embedded in a sample
(cover or carrier) image, and if the intruder gets the chaotic mixed image, he/she
cannot get back the original host image, and for template security, we shuffled
the palmprint template according to the input random number. This shuffling
scheme increases the imposter matching score leaving genuine matching score.
Keywords Chaotic mixing Watermarking Cryptography Log-Gabor filter
Pearson correlation coefficient
1 Introduction
palmprint data (i.e., template and image). Security of the biometric data must be
provided in order to increase the widespread utilization of biometric traits.
According to Ratha et al. [3], there are eight basic types of attacks on the
biometric system. Kong et al. proposed different security methods to avoid replay
and database attacks [4] in palmprint recognition system, Lifang Wu et al. pro-
posed fuzzy vault scheme to provide the template protection online authentication
on the face database [5], Zhifang Wang et al. developed a secure face recognition
system using principle component analysis (PCA) [6], Brenden Chen et al. used
higher-order spectral (HOS) transform applied to biometric data as a secure hash
function [7], Feng Hao et al. proposed combining crypto with biometrics
effectively [8] using different coding techniques like Hadamard code and Reed-
Solomon code, Mayank Vatsa et al. developed a multimodal biometrics system
using watermarking [9], Thian Song Ong et al. used fuzzy commitment scheme for
biometric template protection [10], and Shenglin Yang et al. developed a secure
iris verification system based on error correcting code (ECC) cryptographic
technique [11].
Encryption and watermarking are two widely used techniques to achieve
security in biometrics. Encryption system does not give complete solution to the
problem, because once the password is known, everything is gone. With the help
of watermarking technique in biometric systems is good way to solve the prob-
lems. Watermarking [12–14] is simply known as embedding the watermark into
cover image in order to protect the copyright and authorization.
The rest of the paper is organized as follows: Sect. 2 explains about image
security with chaotic mixing and watermarking. Template security and proposed
system are explained in Sect. 3. Conclusion is given in Sect. 4.
2 Image Protection
Proposed approach uses both chaotic mixing and watermarking for image security.
Many researches have been done in watermarking and chaotic mixing for copy-
right protection. Voyatizis G et al. used strong chaotic mixing-based watermarking
algorithm for embedding logo; the security of the system lies in the strong
parameters of the chaotic mixing system [15]. Tefas et al. proposed a novel
approach for image authentication with chaotic mixing system because it increases
the security of the proposed method [16].
Fig. 1 a Binary palmprint image and b chaotic mixed image after n = 3, c n = 5, and d n = 15
r 0 ¼ Ar ðmod 1Þ ð2Þ
xnþ1 a11 a12 xn
¼ ðmod 1Þ ð3Þ
ynþ1 a21 a22 yn
where aij € Z, det A = 1, and A1, 2 {-1, 0, 1} are the eigenvalues of A. Iterated
actions of A on a point r0 € U from a dynamic system A(n):U ? U, given by the
iterative process:
Where n = 0, 1, 2,… The set of points hðr0 Þ ¼ fr0; r1; r3; . . .g is an orbit of
the system. Roughly speaking, if V0 is a dense subset of U, then its image Vn under
the map A(n) spreads chaotically over the entire space of U while preserving its
area, because det A = 1.
Equation (4) strongly explains about chaotic mixing, and it possesses a dense
set of periodic orbits. An orbit hðr0 Þ ¼ fr0; r1; r3; . . .g is periodic; if it is finite,
i.e., there exists a number ‘T’ of iterations such that r0 = rT. The necessary and
sufficient condition for an orbit to be periodic is that the initial position r0 has
rational coordinates. The inverse chaotic mixing is applied to get the
rnþ1 ¼ An r0 ðmod 1Þ or rnþ1 ¼ Arn ðmod 1Þ ð4Þ
original image from the chaotic mixed image; in our proposed method, we
embedded this chaotic mixed image into cover image for enhancing security.
2.2 Watermarking
Water-
Marking
Chaotic
Mixing
he will get the chaotic mixed palmprint image. With this, he cannot roll back to the
original palmprint image without knowing the ‘n’ value. To get back original
image, we used the reverse chaotic mixing.
3 Template Security
image is dependent on many factors like capturing device, rotation, etc., but tra-
ditional cryptographic techniques do not allow even a single bit of error. So,
storage of biometric template in a secure way has become an increasing important
issue in biometric authentication systems; to address these types of problems,
several methods have been proposed in the literature, and these methods can be
classified into biocryptosystems and cancellable systems. Biocryptosystems means
integration of biometrics with cryptography, and numerous advantages can be
obtained by this combination. Cancellable biometrics have been introduced in
Kanade et al. [22], where the template protection has been achieved by trans-
forming the template into other domain, where data cannot be reverted back to its
original form; for recognition, the input template is also transformed and then
matched. If the data are lost, then biometric template can be reissued with can-
cellable systems.
The main objective of this method is to enhance security to the palmprint template
which is stored in the database. First is template construction then security; well-
defined methods are used for template construction. Log-Gabor filter is used for
feature extraction in palmprint images. This filter is already used for texture
extraction in iris images [23]. For all our experiments, we used IIT-Delhi database
[24]; local features as for template construction for that palmprint image are
divided into 25 (5 9 5) non-overlapping sub-blocks (images). Then, compute
standard deviation on each sub-block that gives the feature vector (FV) of the
particular image. FV = [SD(1), SD(2),…SD(n)] where SD(i) is the standard
deviation of the ith block and ‘n’ is 25, so that here every template consists of
25 values.
First generate random number range in 1–25, then arrange the generated tem-
plate according to the input random number as shown in Fig. 3. If our first random
number is 10, then get tenth standard deviation value from original template and
store it in the first position in the new template and so on, but in this approach, the
constraint is duplicate random numbers are not allowed. If it is allowed, there is
possibility of losing some features. Then for every template, store both shuffled
template and random numbers in the database, but an intruder can access the
random numbers, and he can reshuffle the transformed template to the original
form with this random number. So, to avoid such problems, here we encrypted the
random numbers and stored the encrypted form (cipher text) of random numbers in
the database instead of storing them as it is in the database. The password for
encryption of random numbers is with the administrator of the database so that
nobody else cannot access the template; here, it is very difficult to the attacker to
find the original template from the shuffled template because the number of
possibilities is around 25. It is computationally infeasible. Figure 4 shows the
procedure for matching input template to the enrolled template. Here, first decrypt
Image and Template Security for Palmprint 7
Securing
Random
Random no.
numbers
Shuffling
Template template w.r.t Data-
of 25 std random base
values number
Input Palmprint
Template
Reject
the random numbers. Then, reshuffle the enrolled template according to the ran-
dom numbers. Then matching is done with the input template in our experiment.
For matching, we used Pearson correlation coefficient. This will give the matching
score between two templates or a value means how they are correlated. We got
satisfactory results using this method.
4 Conclusion
In this paper, image security and template security have been discussed. First,
image security is provided with the help of watermarking and chaotic mixing.
These two methods enhanced the security to the image, and for template security,
8 M. V. N. K. Prasad and B. Adinarayana
random number encryption and shuffling are used. These two methods are simple
methods for providing security to some of the biometric traits so these techniques
can be used for enhancing security to image database as well as for template
database.
References
1. Huang, D.S., Jia, W., Zang, D.: Palmprint verification based on principal lines. Pattern
Recogn. 41(4) (2008)
2. Laadjel, M., Bouridane, A., Kurugollu, F., Boussakta, S.: Palmprint recognition using Fisher-
Gabor feature extraction. In: IEEE International Conference on Acoustics, Speech and Signal
Processing (ICSSP), pp. 1709–1712 (2008)
3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based
authentication systems. IBM Syst. J. (End-to-End Security), 40 (2001)
4. Kong, A., Zhang, D., Kamel, M.: Three measures for secure palmprint identification. Pattern
Recogn. 41 (2008)
5. Wu, L., Yuan, S.: A face based fuzzy vault scheme for secure online authentication. In:
Second International Symposium on Data, Privacy and E-Commerce (ISDPE), Nov 2010,
pp. 45–49
6. Wang, Z., Wang, S., Ding, Q.: A secure face recognition algorithm based on adaptive non-
uniform quantization. In: First International Conference on Pervasive Computing, Signal
Processing and Applications (PCSPA), pp. 1115–1118 (2010)
7. Chen, B., Chandran, V.: Biometric template security using higher order spectra. In: IEEE
International Conference On Acoustics Speech and Signal Processing (ICASSP),
pp. 1730–1733 (2010)
8. Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE
Trans. Comput. 55, 1081–1088 (2006)
9. Vatsa, M., Singh, R., Mitra, P., Noore, A.: Digital watermarking based secure multimodal
biometric system. In: IEEE International Conference on Systems, Man and Cybernetics, vol.
3, pp. 2983–2987 (2004)
10. Teoh, A.B.J., Ong, T.S.: Secure biometric template protection via randomized dynamic
quantization transformation. In: International Symposium on Biometrics and Security
Technologies (ISBAST), pp. 1–6 (2008)
11. Yang, S., Verbauwhede, I.: Secure IRIS verification. In: IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), pp. 133–136 (2007)
12. Barni, M., Bartolini, F., Cappllini, V., Piva, A.: Copyright protection of digital images by
embedded unperceivable marks. Image Vis. Comput. 16 (1998)
13. Pereira, S.: Robust digital image watermarking. Doctoral Thesis, University of Geneva
(2000)
14. Pitas, I.: A method for watermark casting on digital image. IEEE Trans. Circuits Syst. Video
Technol. 8, 775–780 (2002)
15. Voyatzis, G., Pitas, I.: Digital image watermarking using mixing systems. Comput. Graph.
22, 405–416 (1998)
16. Tefas, A., Pitas, L.: Image authentication using chaotic mixing systems. In: IEEE
International Symposium on Circuits and Systems (ISCAS), vol. 1, pp. 216–219 (2000)
17. Shu, Z., Li, G., Gan, L., Zhan, L., Fang, W.: Image watermarking based on wavelet-based
contourlet packet transform with best tree. In: Second International Symposium on Electronic
Commerce and Security (ISECS), vol. 1, pp. 203–207 (2009)
Image and Template Security for Palmprint 9
18. Zhao, H.: Algorithm of digital image watermarking technique combined with HVS. In: IEEE
International Conference on Computer Science and Information Technology (ICCSIT),
pp. 774–777 (2010)
19. Zhang, C., Wang, J.: Digital image watermarking algorithm with double encryption by
Arnold transform and logistic. In: Fourth International Conference on Network Computing
and Advanced Information Management, vol. 1, pp. 329–334 (2008)
20. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25,
1494–1498 (2003)
21. Cao, J., Li, A., Lv, G.: Study on multiple watermarking scheme for GIS vector data. In: 18th
International Conference on Geoinformatics, pp. 1–6 (2010)
22. Kanade, S., Petrovska-Delacretaz, D., Dorizzi, B.: Cancelable iris biometrics and using error
correcting codes to reduce variability in biometric data. In: IEEE Conference on Computer
Vision and Pattern Recognition (CVPR), pp. 120–127 (2009)
23. Fan, L., Duan, H., Long, F.: Face recognition by subspace analysis of 2D Log-Gabor
wavelets features. In: Third International Conference on Intelligent system and Knowledge
Engineering (ISKE), vol. 1, pp. 1167–1172 (2008)
24. IITD Touchless Palmprint Database: http://web.iitd.ac.in/*ajaykr/Database_Palm.html
Extending Network Lifetime by Time-
Constrained Data Aggregation in Wireless
Sensor Networks
1 Introduction
Recent advances in technology have made wireless sensors compact and inexpen-
sive. Networks formed from such sensors are known as wireless sensor networks and
are used in a wide range of applications such as environmental surveillance, military
operation, and other domains. The wireless sensor network consists of groups of
nodes, which captures and transmits the data to the base station. The base station has
continuous power supply, while the nodes are battery-powered. If a sensor node runs
K. B. Ashwini (&)
Deeksha Integrated, Bharathiar University, Coimbatore, Tamil Nadu, India
e-mail: k.b.ashwini13@gmail.com
G. T. Raju
RNSIT, Bangalore, Karnataka, India
e-mail: drgtraju_rnsit@gmail.com
out of power, its coverage is lost. The network lifetime of a wireless sensor network
is determined by the time duration before the first node fails in the network [1].
Therefore, it is very important to manage the sensor nodes in an energy-efficient way
to extend the lifetime of the sensor network [2].
To increase the network lifetime, the number of packet transmission between
the sensor node and the sink must be decreased. Data aggregation is a technique
used to combine the information from the sensor nodes surrounding the event and
send the information to the end point, which thereby reduces congestion [3].
Wireless sensor networks offer different methods of data gathering in distributed
system architectures and dynamic access via wireless connectivity.
2 Related Work
Consider a connected graph G with N nodes (v1, v2…vn) powered by batteries with
non-replenishable energy E(i) and a base station v0 connected to an unlimited
power supply with energy E(o). The nodes monitor the environment and period-
ically report to the base station. Each sensor node generates one B-bit message per
time stamp. The messages from all sensors are collected at each time stamp and
aggregated at the intermediate sensor into a single outgoing message of size B-bit
and sent to the base station. The amount of time required to send or receive one bit
of data is as and ar.
Consider Fig. 1a where node 4 has to aggregate the data collected by the
children nodes 1, 2, and 3 and forward that to node 5. In Fig. 1b, four columns are
Extending Network Lifetime by Time-Constrained Data Aggregation 13
displayed where the first three represents the queues which store the packets
coming from nodes 1, 2, and 3. The last column stores the aggregated packets of 1,
2, and 3. The vertical axis denotes the time when the data packet is collected. Data
collected at the same time usually contain the information about the same event. In
this paper, we consider that data aggregation is done only on data collected at the
same time. Suppose a packet coming from node 1 at time stamp 5 has no packets at
that time stamp from nodes 2 and 3, the aggregation node just forwards packet
from node 1.
If the tree T has a lifetime L(T)
Data aggregation is required to maximize the network lifetime (A) max L(T) such
that T € A(G)
where A(G) is the set of data gathering trees in G.
Let C(T,i) be the number of children for node vi in T. B is the energy required by vi
to aggregate the data received from all children. During each time stamp node vi
receives B-bit message from each child. The energy consumption of node vi for
14 K. B. Ashwini and G. T. Raju
each time stamp after aggregating the received message and transmitting B-bit
message to its parent is ar B C(T,i) + at, its lifetime is L(T,i) = Ei-(ar B C (T,i) + at).
In Fig. 1c, node 2 postpones all its data collection by one slot, similarly with
node 3. Data aggregation cannot be done, since all the packets are collected at
different time stamps. As a result, the number of packets in queue 4 is the sum-
mation of packets of queues 1, 2, and 3’s. To keep the network stable and to
prevent the queue of node 4 from overflow, it has to transmit faster than the
aggregate rate of nodes 1, 2, and 3. This example reveals that as the transmission
rate of an aggregation node increases, the energy consumption increases and in
turn the network lifetime decreases.
Consider Fig. 2a where nodes 0, 1, and 2 work as source nodes. Nodes 1 and 2
are directly connected to the aggregation node 4, whereas node 0 depends on the
intermediate node 3 to transfer the data to aggregator 4. Suppose at a particular
time t1, as shown in Fig. 2b, nodes 1 and 2 have delivered some data to 4, whereas
there is a delay in the arrival of data from node 0.
1. At that time if node 4 has to wait till time t2, to receiving the data from node 0
and then aggregate as shown in Fig 2b at time t2 the delay increases.
2. At time t1, if node 4 delivers packets, it has to do the same job again after
receiving packet from node 0, which results in the increased network traffic and
decreased network lifetime.
Data aggregation aims to combine responses from multiple sensors into a single
message. By reducing the number of message transmission in the network, the
energy consumption can be reduced and the network lifetime is increased. In
practice, this is complicated by the fact that not every node has a response ready at
exactly the same time as in Fig. 1.
A: Time Approximation Algorithm for data aggregation at intermediate nodes.
Let each aggregation node estimate and report to the base station, the number of
children for the aggregation node vn, the minimum time required to receive B-bit
message from one child, and the maximum time required to receive B-bit message
from at least vn/2 nodes. The base station optimizes time allocation for the
aggregation node to extend network lifetime. Optimal Time Allocation Algorithm
Input: Aggregation node va with the number of children v1, v2, v3
Output: B-bit message from the aggregation node.
1. for time = min to max
2. B-bit message = aggregated result of any two children of node va
3. min = min +1
Extending Network Lifetime by Time-Constrained Data Aggregation 15
4. end for
5. Send B-bit message generated by the aggregator to its parent.
B: Time Approximation Algorithm for data aggregation Tree
In an unbalanced network as in Fig. 2, the response time will vary depending on
the difference in tree levels of the responding nodes.
16 K. B. Ashwini and G. T. Raju
1. The leaf nodes respond as soon as the event occurs and send the sensed data to
the aggregator.
2. The aggregator waits for a specific time before aggregating the response
received and sends the result to the parent.
3. The process continues till the sink receives a single B-bit message.
4. This also allows the sink to recalculate a more appropriate time for the next
query if necessary.
5 Conclusion
In this paper, we identify the unique challenges faced during data aggregation in
wireless sensor networks. We analyzed the importance of time when aggregating
data in WSN and formulated this problem as network utility maximization prob-
lem. We also proposed as algorithm to be implemented to solve the problem. In
future work, we plan to implement several algorithms to determine the optimal
time to be allocated for data aggregation.
References
1. Liang, W., Liu, Y.: Online data gathering for maximizing network lifetime in sensor networks.
IEEE Trans. Mob. Comput. 6(1), 2–11 (2007)
2. Tang, X., Xu, J.: Optimizing lifetime for continuous data aggregation with precision
guarantees in wireless sensor networks. IEEE/ACM Trans. Networking 16(4), 904–917 (2008)
3. Vaidyanathan, K., Sur, S., Narravula, S., Sinha, P.: Computer science and engineering. The
Ohio State University, Columbus (2004). OH, 43210
4. Krishnamachari, B., Estrin, D., Wicker, S.: The impact of data aggregation in wireless sensor
networks. Int. J. Comput. Telecommun. Netw. (2003)
5. Eskandari, Z., Yaghmaee, M.H., Mohaierzabeh A.H.: Energy efficient spanning tree for data
aggregation in wireless sensor networks. 978-1-4244-2390-3/08, IEEE (2008)
6. Thepvilojanapong, N., Yoshito, K.S.: On the construction of efficient data gathering tree in
wireless sensor networks. ieeexplore.ieee.org (2005)
7. Kulik, L., Tanin, E., Umer, M.: Efficient data collection and selective queries in sensor
networks, pp. 25–44. Springer, Heidelberg (2008). GSN 2006, LNCS 4540
The Complex Network Analysis of Power
Grid: A Case Study of the West Bengal
Power Network
H. Das (&)
Department of CSE, Roland Institute of Technology, Berhampur, Odisha, India
e-mail: das.himansu2007@gmail.com
G. S. Panda
Department of EEE, Roland Institute of Technology, Berhampur, Odisha, India
e-mail: gourisankar.panda@gmail.com
B. Muduli P. K. Rath
Department of MCA, Roland Institute of Technology, Berhampur, Odisha, India
e-mail: bhagaban.muduli@gmail.com
P. K. Rath
e-mail: pradeep.ratha@gmail.com
1 Introduction
The current power system is based on the renewable energy sources [1] such as
coal, natural gas, and oil, which emits CO2 to the atmosphere. To maintain the
nature clean and green, the power system should be changed toward renewable
energy sources [2] such as wind, solar, tide, and water. The future power system
(smart grid) is the integration of secure, reliable, and high-speed communication
infrastructure to manage the complex power grid network [3] toward more intel-
ligently. Although the technologies are enhancing, but still the rate of cascading
failures is not decreased, which leads to major blackouts in the power grid. The
major cause of the cascading failure is that there is some flaw in power trans-
mission line, which leads to blackouts in power grid. By taking this into consid-
eration, we modeled the power grid as a graph to trace the cause of failure in the
power grid, and in the same time, it also monitors [4] the power grid continuously
to provide harness power supply to the power network.
To study the power grids as a complex network, some simplifications are
necessary. In the undirected graphs, each node represents a bus. In physical grid,
the buses having different electrical properties, like nodes, are assumed to be
homogeneous. This representation ignores whether transformers, generators, loads,
or transmission lines attach to the bus. All communication lines are modeled as
edges with equal weights. Physical length and electrical impedance are ignored in
the undirected graph representation.
Most of the complex problems such as World Wide Web, Internet, social
interacting species, neural networks, chemical systems, and coupled biological
systems are solved by using topological analysis of the graph [3]. Though power
system is a complex network, it is necessary to go for topological analysis of
power grid. Topological analysis is performed based on the physical significance
[5] as the geographical distance of the network structure of the graph. But it will
ignore the electrical properties [5, 6] of power grid such as resistance, impedance
of the network. The comparison between the traditional power system and the
future power system [1, 2] is shown in Table 1.
Table 1 Represents the difference between traditional power system and future power system
Sl. Traditional power system Future power system
No.
1. It was centralized in nature It will be distributed in nature
2. Small number of large generators is used Large number of small generators will be used
3. High-capacity generators were used Low-capacity generators will be distributed
throughout the globe
4. Non-renewable energy sources were used Renewable energy sources will be used in
future
5. No computational and communication Having computational and communication
facility of generators facility of generators
6. It was expensive and not so reliable It will inexpensive and reliable
The Complex Network Analysis of Power Grid 19
In this section, we present the basic concepts of modeling power system as a graph.
An undirected graph is defined as a pair of sets G (n, m) such that n is the number
of nodes and m is the number of edges. There are some basic definitions of graph
that are as follows.
Definition 1 (Graph): A graph G (V, E) is a pair of sets where V is the set of
vertices and E is the set of edges.
Definition 2 (Power Grid as Graph): A graph G (V, E) is called power grid graph
if and only if each element vi Æ V is a transformer, substation, generating station,
or load unit of physical power grid and if there is an edge ei,j Æ E representing the
existence of physical cable between two nodes vi to vj in the power grid from
vertex vi to vj.
Definition 3 (Degree of Graph): In an undirected graph, the degree of vertex is
the number of edges e Æ E incident in a vertex v Æ V and is called degree of that
vertex in the graph. Simply, we can say that the degree of a node specifies the
number of nodes adjacent to that node.
Definition 4 (Adjacency Matrix): Let Vi be the vertices of graph G (V, E), then the
adjacency matrix A is the n 9 n matrix, where A represents the configuration of
the graph, such that aij = 1 if and only if there is an edge between the nodes i and
j otherwise 0.
1; when Vi and Vj are adjacent
A ¼ aij ¼ ð1Þ
0; otherwise
20 H. Das et al.
Definition 5 (Incidence Matrix): Let vi be the vertices and ei be the edges of graph
G (V, E), then the incidence matrix I is the n 9 m matrix where
8
< 1 If there is a direct path between i to j
I ¼ 1 If there is a direct path between j to i ð2Þ
:
0 if branch j is not incident at node i:
To represent the power grid as a complex network [3], we build an unweighted and
undirected graph [8] composed of nodes and edges. Using metrics from graph
theory and modern complex network analysis, the results provide insight into the
properties of power grids [9], considering only topological information. The goal
is to characterize the topological structure of the West Bengal power grids and
highlight implications for the performance of electricity infrastructures.
The Pearson coefficient (q) is also called correlation coefficient [5, 8, 9], which
gives a measure to evaluate the correlation of node degrees in the network. It tells
us about the assortativity of the electrical networks.
P
ði; jÞ ðki k Þ kj k
q ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
P ffi ð9Þ
ð k i kÞ2 kj k 2
ði; jÞ
The degree of a node indicates the number of nodes adjacent to that node. In
degree distribution [8, 9], we can represent the global connectivity of the network.
The first and second statistical distributions provide the average number of con-
nections per node and the variance. But for some distribution such as power laws,
these statistical moments do not provide a realistic presentation because the degree
varies over several orders of magnitudes. So it is useful to visualize the parameter
of probability mass function. The degree of node i in a graph with adjacency
matrix A is
X
N
ki ¼ aij ð11Þ
j¼1
1X N
CðGÞ ¼ Ci ð12Þ
N i¼1
where kG ðiÞ is the number of edges between the neighbors of node i and sG ðiÞ is
the total number of edges that could possibly exist among the neighbors of node.
For undirected graphs, sG ðiÞ ¼ ki ðki 1Þ=2 is the node degree.
The clustering coefficient for a random graph network theoretically equals the
probability of randomly selecting links from all possible links.
2m hki
C ð RÞ ¼ ¼ ð14Þ
NðN 1Þ N 1
The average shortest path or characteristic path length, hli, is used to measure the
shortest path between any given pair of nodes relative to the size of the network
[8]. hli is determined from the distance matrix as the average value of all the
possible entries for every combination of nodes, given that the entry dij is the
number of edges along the shortest path from i to j.
1 X
hli ¼ dij ð15Þ
nðn 1Þ
8i; j
i 6¼ j
It can also be determined by using Floyd–Warshall algorithm directly.
In this paper, random graphs are created following the standard algorithm
described in Erdos and Renyi [10] for a given number of nodes and edges such that
they are comparable to the power grid under study, namely the West Bengal power
system. In the random graph (ER) model, every edge is generated by randomly
selecting endpoints from a uniform distribution.
The generation of scale-free graphs was described by Barabasi and Albert [11].
This model has introduced variations in the degree distribution by modifying the
attachment mechanisms, implementing dynamic edge rewiring, etc. In every
24 H. Das et al.
iteration, it will generate a new node and approximately m/n edges; the result is a
graph with n nodes and roughly m edges.
This section presents the detailed methodology involved to present the topological
properties of West Bengal power system and how a grid service is deployed
subsequently. The service efficacy has been demonstrated by means of a case study
that considers the West Bengal power system as a test case. The power network of
West Bengal has been shown in Fig. 1, and its corresponding single-line diagram
is shown in Fig. 2. The power network graph and single-line diagram in this
network have been taken from West Bengal Power Transmission Corporation
Limited Web site [12], a state-owned company responsible for power transmission
in the state of West Bengal.
The ER graph of West Bengal power grid is shown in Fig. 3, and Fig. 4 shows its
scale-free graph. Table 2 shows the topological degree and clustering coefficient of
each node of the West Bengal power network. Node degree distribution of the same
power network is shown in Fig. 5 by considering the node degree of the individual
nodes with the probability of these nodes. West Bengal power grid follows the
exponential degree distribution. The physical topology of West Bengal power grid is
shown in Fig. 6 by considering the physical connection between nodes. The different
topological properties of West Bengal power grid is shown in Table 3.
26 H. Das et al.
Table 2 Individual topological degree and clustering coefficient of West Bengal power network
Node Topological degree Clustering coefficient
1 3 0
2 3 0
3 3 0
4 3 0
5 1 0
6 2 0
7 4 0.167
8 5 0.2
9 1 0
10 3 0
11 5 0
12 2 0
13 1 0
14 3 0
15 3 0
16 1 0
17 2 1
18 2 0
19 3 0.333
20 2 1
21 1 0
22 3 0
23 2 0
24 2 0
5 Conclusions
References
1. Irving, M., Taylor, G., Hobson, P.: Plug into grid computing. Power Energy Mag. IEEE 2(2),
40–44 (2004)
2. Taylor, G.A., Irving, M.R., Hobson, P.R., Huang, C., Kyberd, P., Taylor, R.J.: Distributed
monitoring and control of future power systems via grid computing. In: Power Engineering
Society General Meeting, 2006. IEEE, p. 5. IEEE, (2006)
3. Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.-U.: Complex networks:
structure and dynamics. Phys. Rep. 424(4), 175–308 (2006)
4. Himansu, D., Roy, D.S.: Article: a grid computing service for power system monitoring. Int.
J. Comput. Appl. 62(20), 1–6 (2013)
5. Cotilla-Sanchez, E., Hines, P.D.H., Barrows, C., Blumsack, S.: Comparing the topological
and electrical structure of the North American electric power infrastructure. pp. 1–1. (2012)
6. Hines, P., Blumsack, S., Cotilla Sanchez, E., Barrows, C.: The topological and electrical
structure of power grids. In: System Sciences (HICSS), 2010 43rd Hawaii International
Conference on, pp. 1–10. IEEE, (2010)
7. Grid Gain: www.gridgain.com. Last accessed on 13 May 2013
8. Wang, Z., Scaglione, A., Thomas, R.J.: Generating statistically correct random topologies for
testing smart grid communication and control networks. Smart Grid IEEE Trans. 1(1), 28–39
(2010)
9. Wang, Z., Thomas, R.J., Scaglione, A: Generating random topology power grids. In:
Proceedings of the 41st Annual Hawaii International Conference on System Sciences,
pp. 183–183. IEEE, (2008)
10. Erdos, P., Renyi, A.: On random graphs. Publ. Math. Debrecen 6, 290–297 (1959)
11. Watts, D.J., Strogatz S.H.: Collective dynamics of ‘small-world’ networks. Nature
393(6684), 440–442 (1998)
12. http://www.wbsldc.in/docs/2.%20WBSETLC%20POWER%20MAP.gif. Last accessed on 13
May 2013
Comparison and Analysis of Node
Deployment for Efficient Coverage
in Sensor Network
Keywords Wireless sensor network (WSN) Deployment Seamless coverage
Total coverage area Efficient coverage area ratio Net efficient coverage area ratio
1 Introduction
Wireless sensor networks are applied to various special application fields such as
industrial machine measurement, wild environment monitoring, and security sur-
veillance in military purpose measurement to daily applications fields such as fire
monitoring, pollution monitoring, and battlefields. Wireless sensor networks
ensure a wide range of applications such as previously unobserved environmental
phenomena, smart homes, and offices, improved healthcare, industrial diagnosis,
near the crater of a volcano to measure temperature, pressure, and seismic
activities.
Sensor deployment is a critical and an important issue since it reflects the cost
and detection capability of a WSN. It is categorized as random and planned
deployment. Within planned deployment, sensors are placed at planned locations,
whereas in random deployment, sensor nodes are scattered randomly creating an
infrastructure in an ad hoc manner. Random deployment of sensors may not satisfy
the basic requirements of deployment due to the hostile environment.
A good deployment should consider both coverage and connectivity. Coverage
is the physical sensing range of a node within which it is able to perform its
operation. Each location in the physical space of interest should be within the
sensing range of at least one of the sensors. In WSNs, the simple reason for
checking coverage is to provide the high quality of information in the region of
interest. This is also known as the area coverage, which is important for most WSN
applications. A full and partial coverage are both considered for WSN applica-
tions. To fulfill the desired coverage of a region, adjusting the sensing range has its
limitations due to the expensive energy consumption and restricted node capa-
bilities. Therefore, node deployment becomes very important. K-coverage is the
usual way of specifying conditions on coverage.
Connectivity is the communication radius within which it can communicate
with another node. In general, finding the optimal deployment pattern (in the
context of no. of sensors) has practically more significant. First, significance is
deploying the minimum number of sensors needed has obvious economic benefits.
Second, optimal deployment can be used to guide the development of heuristic
algorithms for topology control and sensor scheduling for better quality of service.
This paper analyzes several sensor deployments and computes total coverage area,
total coverage area ratio, net efficient coverage area and net efficient coverage area
ratio of nodes under the condition of seamless coverage. In this paper, we compare
various deployment patterns.
Our paper is organized as follows. We introduce problem formulation in Sect.
2. In Sect. 3, sensor node deployment and coverage area calculation are explained
mathematically. Section 4 presents the simulation results, comparison and analysis
of different node deployment patterns. Finally, we conclude the work presented in
this paper in Sect. 5.
Comparison and Analysis of Node Deployment 33
2 Problem Formulation
In this work, we consider the problem of how to deploy wireless sensor nodes in
order to computes efficient coverage areas and their efficient coverage area ratios.
Before we define the considered sensor and coverage model, we briefly describe
the efficient coverage area ratio and its calculation.
There are several key requirements in sensor deployments. First is covering the
sensor fields effectively and efficiently. Second is ensuring proper detection of
events and maintenance of connectivity throughout the entire network. Third is
strictly preserving the energy of the individual nodes in order to provision
acceptable network lifetime. A good sensor deployment pattern is necessary to
fully and seamlessly cover the sensor field.
Net efficient coverage area ratio (RNECA): Ratio of the area that is not covered
by other nodes to the total area of the node itself.
SNECA
RNECA ¼
D
Sensor nodes are deployed at the center of nine circles, which forms a square. As
shown in Fig. 3, each circle has sensor node at the center of the circle. From the
figure, geometrically it is represented that sensor nodes are deployed at A, B, C,
and D that is at the corners of the square where the edge length of the square
Comparison and Analysis of Node Deployment 35
ABCD is equal to the 2r. The radius of the circle r is equal to the maximum
transmission range of the sensor node. These sensor nodes form a square ABCD.
Edge length of square ABCD ¼ AB ¼ 2r
In Fig. 3, we have calculated the total coverage area, total coverage area ratio,
and net efficient coverage area ratio of nine sensors at the vertices of square as
given below:
Total coverage area for sensor nodes at the meeting point of the nine circles
(STCA1 )
STCA1 ¼ Area of sector EAF 4 þ Area of DAEX 8 þ Area of square ABCD
pffiffi
150 2 3 2
STCA1 ¼ pr 4 þ r 8 þ 4r 2
360 4
5 pffiffi
STCA1 ¼ p þ 2 3 þ 4 r2
3
Total coverage area ratio for sensor nodes at the meeting point of the nine
circles (RTCA1 )
pffiffi
STCA1 STCA1 5 2 3 4
RTCA1 ¼ ¼ ¼ þ þ ¼ 0:44 ð1Þ
D 9 pr 2 27 9p 9p
Net efficient coverage area for sensor nodes at the meeting point of the nine
circle (SNECA1 )
pffiffi
2 2 3 2 pr 2
SNECA1 ¼ D pr r þ
3 2 4
pffiffi pffiffi
2 11 2 3 2 pþ6 3 2
¼ pr pr r ¼ r
12 2 12
36 R. S. Raw et al.
Net efficient coverage area ratio for sensor nodes at the meeting point of the
nine circles (RNECA1 )
pffiffi pffiffi
SNECA1 ðp þ 6 3Þr 2 1 7 3
RNECA1 ¼ ¼ ¼ þ ¼ 0:35 ð2Þ
D 12 pr 2 12 44
As shown in Fig. 4, sensor nodes are placed at the center of sixteen circles.
Mathematically, it is represented by the square PQRS. Therefore, the edge length
pffiffi
of square is given as 3 2 r: The efficient coverage area of a meeting point is
shown in Fig. 4.
In Fig. 4, we have calculated the total coverage area, total coverage area ratio,
and net efficient coverage area ratio of nine sensors at the vertices of square as
given below:
Total coverage area of sensor nodes at the center of the sixteen circles (STCA2 )
STCA2 ¼ Area of sector UPT 4 þ Area of DPTQ 4 þ Area of square PQRS
180 2 r2
STCA2 ¼ pr 4 þ 4 þ 2 r 2
360 2
¼ 2pr 2 þ 2r 2 þ 2r 2 ¼ 2ðp þ 2Þr 2
Total coverage area ratio for sensor nodes at the center of the sixteen circles
(RTCA2 )
45 2 r 2
SNECA2 ¼D pr 4
360 4
¼ pr 2 pr 2 þ 2r 2 ¼ 2r 2
Net efficient coverage area ratio for sensor nodes at the center of the sixteen
circles (RNECA2 )
SNECA2 2r 2
RNECA2 ¼ ¼ 2 ¼ 0:63 ð4Þ
D pr
As shown in Fig. 5, sensor node has maximum efficient coverage area. We can
calculate the total coverage area and efficient coverage area ration as given below.
Total coverage area for sensor nodes at the center of the six circles (STCA3 )
STCA3 ¼ Area of sector FAG 5 þ Area of DAFB 5 þ Area of DABO 5
162 2 r2 2r 2
STCA3 ¼ pr 5 þ 5 þ 5
360 2 4 tan 36
9 9
STCA3 ¼ pr 2 þ 2:5r 2 þ 3:6r 2 ¼ p þ 6:1 r 2
4 4
Total coverage area ratio for sensor nodes at the center of the six circles (RTCA3 )
STCA3 9p 6:1
RTCA3 ¼ ¼ þ ¼ 0:70 ð5Þ
D 6 24p 6p
Net efficient coverage area for sensor nodes at the center of the six circles
(SNECA3 )
108 2 45 2 11 9
SNECA3 ¼ D pr þ pr 2 ¼ pr 2 pr 2 ¼ pr 2
360 360 20 20
Net efficient coverage area ratio for sensor nodes at the center of the six circles
(RNECA3 )
SNECA3 9
RNECA3 ¼ ¼ ¼ 0:45 ð6Þ
D 20
As shown in Fig. 6, sensor nodes are deployed at the center of each circle that
makes a small rhomb STUV. The central circle with sensor node at U intersects
with six peripheral circles at six points. In this case, the edge length of small
pffiffi pffiffi
rhomb STUV is equal to the 3 r and edge length of PQRS is 2 3 r. The authors
in [3–5] have solved WSN’s coverage problem and given some algorithmic
solutions. The efficient coverage area and its ratio are calculated as given below.
S2 is calculated as given in [2].
Total coverage area for sensor nodes at the vertexes of rhomb (STCA4 )
pffiffi
2 2 2p 3 3
STCA4 ¼ pr 9 S2 16 ¼ 9pr r 2 16
6
pffiffi
11p þ 24 3
STCA4 ¼ r2
3
Total coverage area ratio for sensor nodes at the vertexes of rhomb (RTCA4 )
pffiffi
STCA4 11p þ 24 3
RTCA4 ¼ 2 ¼ ¼ 0:88 ð7Þ
pr 9 27p
Net efficient coverage area for sensor nodes at the vertexes of rhomb (SNECA4 )
pffiffi pffiffi
2 2 2p 3 3 2 pþ3 3
SNECA4 ¼ pr 2 S2 ¼ pr 2 r ¼ r2
6 3
Net efficient coverage area ratio for sensor nodes at the vertexes of rhomb
(RNECA4 )
pffiffi
pþ3 3
RNECA4 ¼ ¼ 0:88 ð8Þ
3p
As shown in Fig. 7, sensor nodes are deployed at the center of each circle that makes
a hexagon EFGHIJ. The central circle with sensor node at K intersects with six
peripheral circles at six points, which divide the central circle into six equal parts.
In this case, the edge length of hexagon is equal to the transmission range r. The
efficient coverage area and its ratio are calculated as given below.
Total coverage area for sensor nodes at the meeting circle of six circles (STCA5 )
STCA5 ¼ Area of a circle 7 Area of overlapped circles 12
STCA5 ¼ pr 2 7 S2 12
pffiffi
2 2p 3 3 2 pffiffi
¼ 7pr 12 r ¼ ð3p þ 6 3Þr 2
6
Total coverage area ratio for sensor nodes at the meeting circle of six circles
(TCA5 )
pffiffi
3p þ 6 3Þ
RTCA5 ¼ ¼ 0:90 ð9Þ
7p
Net efficient coverage area for each sensor node at the meeting circle of six
circles (SNECA5 )
pffiffi
2 2p 3 3 2
SNECA5 ¼ D 3 S2 ¼ pr 3 r
6
pffiffi
3 3 2
SNECA5 ¼ r
2
Net efficient coverage area ratio for each sensor node at the meeting circle of
six circles (RNECA5 )
pffiffi
SNECA5 3 3
RNECA5 ¼ ¼ ¼ 0:82 ð10Þ
D 2p
In Fig. 8, the effect of total coverage area for varying number of nodes is shown.
We notice that the total coverage area of all three sensor node deployment patterns
decreases as the number of sensor node increase. But total coverage areas of
square and rhomb patterns are significantly lower than triangular pattern sensor
node deployment. This difference is clearly evident from the figure, when a
number of nodes are 1,000. For this density, the total coverage area for triangular
pattern is 45 %; for square pattern, it is 35 %; and for rhomb pattern, it is 20 %.
According to the simulation analysis, it is clear that the triangular pattern is far
better than square and rhomb patterns in the context of minimum number of nodes.
The total number of nodes is varied to obtain the total coverage area.
Formula of minimum number of nodes in relation to RTCA5 is
F F F 0:2 F
N¼ pffiffi ¼ ¼ ¼
ð3p þ 6 3Þr 2 D R TCA5 D 6:3 D
100
Ratio for square node deployment
90 Ratio for triangular node deployment
Ratio for rhomb node deployment
80
Total coverage area
70
60
50
40
30
20
10
0
0 500 1000 1500 2000 2500
Number of nodes
Fig. 8 Comparison curve between total coverage area ratio and number of nodes
42 R. S. Raw et al.
70
Ratio for square node deployment
Ratio for triangular node deployment
Net efficient coverage area ratio 60 Ratio for rhomb node deployment
50
40
30
20
10
0
0 500 1000 1500 2000 2500
Number of nodes
Fig. 9 Comparison curve between net efficient coverage area ratio and nodes
We again notice that the net efficient coverage area of all three sensor
deployment patterns decreases as the number of node increases. But net efficient
coverage areas of square and rhomb patterns are significantly lower than the
triangular pattern deployment. This difference is clearly evident from the figure,
when a number of nodes are 1,000. For this density, the net efficient coverage area
for triangular pattern is 34 %; for square pattern, it is 22 %; and for rhomb pattern,
it is 16 %. According to the simulation analysis, it is clear that the triangular
pattern is far better than square and rhomb patterns in the context of minimum
number of nodes. Formula of minimum number of sensor nodes with respect to
RNECA5 is
F F 1:21 F
N¼ pffiffi ¼ ¼
3 3 2 D RNECA5 D
2 r
5 Conclusion
In this paper, we study the sensor node deployment patterns in wireless sensor
networks. We have mathematically calculated the efficiency of some regular
deployment patterns such as square grid, triangular lattice, and rhomb in terms of
the number of sensor nodes required to provide coverage and connectivity. In the
simulation section, results have been computed in terms of total coverage area and
net efficient coverage area ratio for effect of varying number of nodes. After
comparison and results analysis, it is clearly shown an equilateral triangle sensor
node deployment pattern gives better results than the square and rhomb sensor
Comparison and Analysis of Node Deployment 43
References
1. Wang, X., Zhang, S.: Research on efficient coverage problem of node in wireless sensor
networks. In: The proceedings of 2009 International Conference on Industrial Mechatronics
and Automation, pp. 9–13 (2009)
2. Wang, X., Sun, F., Kong, X.: Research on optimal coverage problem of wireless sensor
networks. Proc. 2009 WRI Int. Conf. Commun. Mobile Comput. 1: 548–551 (2009)
3. Wang, X., Yang, Y., Zhang, Z.: A virtual rhomb grid-based movement-assisted sensor
deployment algorithm in wireless sensor networks. Proc. First Int.l Multi-Symp. Comput.
Comput. Sci. 1, 491–495 (2006)
4. Wang, X., Yang, Y.: k-Variable movement assisted sensor deployment based on virtual rhomb
grid in wireless sensor networks. In: The proceedings of 2nd IEEE International Workshop on
Self-Managed Networks, Systems, and Services, SelfMan, 3996 LNCS, pp. 179–183 (2006)
5. Wang, X., Yang, Y., Song, Y.: e-redundant movement-assisted sensor deployment based on
Virtual Rhomb Grid in wireless sensor networks. In: The proceedings of 2006 IEEE
International Conference on Mechatronics and Automation, pp. 775–779 (2006)
Performance Analysis of Routing
Protocols for VANETs with Real
Vehicular Traces
Sanjoy Das, Ram Shringar Raw, Indrani Das and Rajib Sarkar
Keywords LAR1 AODV DSR VANET Mobility model IDM_IM model
Packet delivery ratio
S. Das (&)
Galgotias University, Greater Noida, India
e-mail: sdas.jnu@gmail.com
R. S. Raw
Ambedkar Institute of Advanced Communication Technologies and Research, Delhi, India
e-mail: rsrao08@yahoo.in
I. Das
Department of Computer Science, Assam University, Assam, India
e-mail: indranidas2000@gmail.com
R. Sarkar
Central Institute of Technology, Raipur, India
e-mail: sarkar.rajibrcciit@gmail.com
1 Introduction
VANET is a special class of mobile ad hoc network (MANET), where every node
is a vehicle moving on the road. In this network, a node behaves like a router to
relay a message from one node to another. In VANET mobility of vehicles, the
structure of the geographic areas since node movement depends on it, timely
delivery of messages, and privacy are very important characteristics. VANET uses
two types of communication methods—one from vehicle to vehicle (V2V) and the
other is vehicle to fixed roadside equipment (V2R). In both the methods, vehicles
can communicate to other vehicles or roadside unit either directly or through
multiple hops. This totally depends on the position of the vehicles [1]. Further, the
roadside units (RSU) can also communicate with other RSU via single or multiple
hop fashion. The RSU supports numerous applications such as road safety, mes-
sage delivery; maintain connectivity by sending, receiving, or forwarding data in
the network. The main focus of the VANET is to provide real-time and safety
applications for drivers and passengers. By delivering message on time can min-
imize road accidents and save total journey time. The RSU can improve traffic
management system by providing drivers and passengers with vital information,
i.e., collision warnings, road sign alarms, blind turn warning. There are various
services currently support by VANET are internet connections facility, electronic
toll collection, and a variety of multimedia services. Various ad hoc routing
protocols have been proposed in recent years, whereas two main categories of
unicast protocols can be classified: position-based and topology-based protocols.
Unlike topology based such as AODV, DSR, position-based routing protocols such
as LAR, GPSR present challenging and interesting properties of VANETs [2, 3]. A
position-based routing protocol does not require any information on the global
topology, but uses the local information of neighbouring nodes that restricted to
the transmission range of any forwarding node. Due to this restrictions, it gives
low overhead of their creation and maintenance. Generally, position-based routing
is based on greedy forwarding scheme that guarantees loop-free operation. Over
the last few years, there have been numerous variations of position-based routing
protocols such as LAR, GPSR, and DIR protocols examined in the literature [4]. It
is desirable that routing protocols should maintain the low end-to-end delay and,
high delivery ratio, low overheads and minimum numbers of hops between source
and destination node during message transmission.
In this paper, we have evaluated the performance of VANET using ad hoc
routing protocols (both topology and position based). The rest of the paper is
organized as follows. We discuss the related work in Sect. 2. In Sect. 3, we
introduce the brief overview of LAR, AODV, and DSR routing protocols. Sec-
tion 4 presents simulation results and its analysis. Finally, we conclude this paper
in Sect. 5.
Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces 47
2 Related Works
Extensive works have been carried out by researchers, academicians, and indus-
tries for successfully routing of messages in VANET. There are several research
projects [5–8] on VANET being carried out by researchers. Some of them are
[CarTalk, FleetNet–Internet on the Road, NoW (Network on Wheel)] with
emphasis on deployment in the real world. The main focus of all these projects is
to provide safety and timely dissemination of message from one location to
another location. In [9], the authors have only considered the energy consumption
parameter for performance analysis of LAR1 protocol with DSR and AODV in
highly dense ad hoc networks. The results reported show that LAR1 performs
better than DSR and AODV protocols in highly dense network. But in low density,
DSR performs better than others in terms of energy consumption. In [10], the
authors show a wide analysis of their proposed protocol geographic source routing
(GSR) with DSR, AODV for VANET in city scenarios. They have done simulation
analysis of these protocols on realistic vehicular traffic for a particular city. The
real city map is considered and converted to graph for the analysis. Their result
shows that GSR performs better than DSR and AODV in terms of end-to-end
delivery and latency. In [11, 12], the authors proposed different modified LAR
algorithms. They have modified the request zone. Through simulation, the authors
have established that their proposed algorithms reduce route request overhead as
compared to original LAR. The performance analysis shows that their method
outperforms original LAR, especially in a dense and highly dynamic ad hoc net-
work such as VANET. In [13], the authors have proposed a greedy version of LAR
protocol known as Greedy Location-Aided Routing Protocol (GLAR). This
scheme improved the performance of LAR. In GLAR method, to find a route
between source and destination, a baseline is drawn between them. The route
request packets are broadcast within the request zone. The neighbouring node,
which has shortest distance towards baseline, is selected as a next broadcasting
node. The authors considered various network performance parameters to compare
LAR with GLAR. Their results revealed that GLAR reduces the number of route
discovery packets and increases the average network route lifetime. Most of these
protocols use random waypoint mobility model for performance analysis. The
protocols proposed in [10–13] did not consider structured city scenarios for the
performance analysis of LAR1 protocol in VANET.
found. This process will abort when the maximum number of hops is reached. If
any intermediate node knows an active route to the destination node, it will send a
reply message route reply (RREP) back to source node. After receiving RREP
packet, source node will start sending data packet.
4 Problem Formulation
4.1 Assumption
We have considered a sparsely populated network, where it is very rare that source
and destination node fall in each other transmission range. All nodes in the net-
work are equipped with GPS receivers, digital maps, optional sensors, and onboard
units (OBU). Location information of all vehicles can be collected through GPS
receivers. The only communications paths available are via the ad hoc network,
and there is no any other communication infrastructure. All the communications
are message oriented. The transmission range of each node in the vehicular net-
work environment is 250 m.
The simulation has been carried out to evaluate the performances of LAR
scheme 1, AODV, and DSR protocols in VANETs. We have used the network
simulator Glomosim 2.03 [18]. It is one of the widely used simulation tools for
research in mobile ad hoc networks and freely available simulator. The vehicular
movements and scenarios are generated using VanetMobiSim [19, 20]. Table 1
shows different simulation parameters, and Table 2 shows the different parameters
values considered for simulation. The results analysis done based on packet
delivery ratio for all three protocols. The values of packet delivery ratio are
presented in Table 3.
Packet delivery ratio (PDR) is a very important factor to measure the performance
of routing protocol in any network. The performance of the protocol depends on
various parameters chosen for the simulation. The major parameters are packet
size, number of nodes, transmission range, and the structure of the network. The
packet delivery ratio can be obtained from the total number of data packets arrived
at destinations divided by the total data packets sent from sources.
Figure 2 shows the packet delivery ratio for the sparse network for fixed
number of nodes that is 10 with varying node speed. In the figure, PDR of LAR1 is
nearly 100 % throughout the varying speed. As the speed of node increases, PDR
decreases at speed 50 m/s. In DSR protocol, PDR is initially 99 % at speed 10 m/s
and slightly increases noticed at speed 20 m/s and minimum value of PDR is
11.33 % for node speed 40 m/s. In AODV protocol, maximum achievable PDR is
93.6 % at speed 20 m/s. In AODV, PDR value increases as speed of the nodes
increases from 10 to 20 m/s but after that PDR decreases.
Figure 3 shows the packet delivery ratio for 20 nodes with varying node speed.
Figure shows that PDR of LAR1 is nearly 100 % up to speed 20 m/s and as the speed
of node increases between 20 and 50 m/s, PDR decreases lightly. In case of AODV
protocol, PDR value decreases at the speed from 10 to 20 m/s, after that increases up
to 30 m/s and maximum achievable PDR is 94.2 % at speed 30 m/s. Also, again
PDR value decreases as speed of the nodes increases from 30 to 50 m/s. As shown in
the figure, in DSR protocol, PDR is initially 87 % at speed 10 m/s and slightly
increases noticed at speed 20 m/s. The PDR decreases drastically up to speed 30 m/s
and increases drastically up to speed 40 m/s and again decreases after that for the
same number of nodes.
In Fig. 4, simulation is carried out for 30 vehicular nodes with varying node
speeds for the same three protocols. Results analysis shows that position-based
52 S. Das et al.
85
80
75
10 15 20 25 30 35 40 45 50
90
85
80
75
10 15 20 25 30 35 40 45 50
Speed (in m/s)
routing protocol LAR1 gives better performance than AODV and DSR in terms of
PDR. It is nearly 98–100 %. The node movement in the network is shown in
Fig. 5, when there are 30 nodes moving at the speed of 10 m/s.
In Fig. 6, further simulation is carried out for 40 vehicular nodes with varying
node speeds for the same three protocols. Comparison analysis among the pro-
tocols shows that position-based routing protocol LAR1 gives better performance
than AODV and DSR in terms of PDR as the nodes speed increases. The node
movement in the network is shown in Fig. 7, when there are 40 nodes moving at
the speed of 30 m/s.
Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces 53
100
LAR1
AODV
95
DSR
Packet Delivery Ratio
90
85
80
75
70
10 15 20 25 30 35 40 45 50
Fig. 4 Packet delivery ratio for node 30 with varying node speed
By analysing results as shown in the above figures, it clearly appears that in all
the cases, LAR1 gives better performance in terms of PDR than AODV and DSR
routing protocols. This may reflect the need for optimizing the number of nodes in
54 S. Das et al.
100
95
LAR1
AODV
Packet Delivery Ratio
DSR
90
85
80
75
70
10 15 20 25 30 35 40 45 50
Fig. 6 Packet delivery ratio for node 40 with varying node speed
the network to give better performance through LAR1 routing protocol. It means
for the minimum number of nodes and at minimum speed LAR1 gives better
results. Table 3 shows the PDR values for different routing protocols.
Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces 55
6 Conclusions
In this paper, we have analysed the performance of LAR1, AODV, and DSR
protocols for vehicular ad hoc networks through IDM_IM mobility model. The
performance of the protocols is thoroughly studied with varying node speeds. We
have calculated packet delivery ratio for LAR1, AODV, and DSR protocols. From
the result analysis, it is clearly evident that when the network is sparsely populated
the successful delivery of message is nearly 100 % in LAR1 protocol. Therefore,
the results show that LAR1 outperforms DSR and AODV in terms of packet
delivery ratio.
References
1. Moustafa, H., Zhang, Y.: Vehicular networks: Techniques, standards, and applications. CRC
Press, US (2009)
2. Lee, K.C., Lee, U., Gerla, M.: Survey of routing protocols in vehicular ad hoc networks. IGI
Global, pp. 149–170 (2010)
3. Shringar Raw, R., Das, S., Singh, N., Kumar, S., Kumar, S.: Feasibility evaluation of VANET
using Directional-Location Aided Routing (D-LAR) Protocol. Int. J. Comput. Sci. Issues 9(5,
No. 3), 404–410 (2012)
4. Stojmenovic, I., Ruhil A.P., Lobiyal, D.K.: Voronoi diagram and convex hull based
Geocasting and routing in wireless networks. Wireless Communications and Mobile
Computing Special Issue on Ad Hoc Wireless Networks. Wiley and Sons, Ltd. 6(2), 247–258
(2006)
5. The NoW: Network on wheels Project. http://www.network-on-wheels.de/about.html
6. http://www.cartalk2000.net/
7. FleetNet. http://www.fleetnet.de/
8. http://vanet.info/projects
9. Ahvar, E., Fathy, M.: Performance evaluation of routing protocols for high density ad hoc
networks based on energy consumption by GlomoSim simulator. World Acad. Sci., Eng.
Technol. 5, 97–100 (2007)
10. Lochert, C., Hartenstein, H., Tian, J., Füßler, H., Hermann, D., Mauve, M.: A Routing
strategy for vehicular ad hoc networks in city environments. In: Proceedings of IEEE
Intelligent Vehicles Symposium, pp. 156–161 (2003)
11. DeRango, F., Lera, A., Molinaro, A., Marano, S.: A modified location aided routing protocol
for the reduction of control overhead in ad-hoc wireless networks. ICT2003, vol. 2, Feb 23–
March 1, pp. 1033–1037 (2003)
12. Senouci, S.M., Rasheed, T.M.: Modified location aided routing protocols for control
overhead reduction in mobile ad hoc networks. The International Federation for Information
Processing, vol. 229, pp. 137–146 (2007)
13. Wang, N.C., Chen, J.S., Huang, Y.F., Wang, S.M.: A greedy location aided routing protocol
for mobile ad hoc networks. In proceedings of the 8th WSEAS International Conference on
Applied Computer and Applied Computational Science (ACACOS ‘09), pp. 175–180,
Hangzhou, China (2009)
14. Ko, Y.B., Vaidya, N.: Location-aided routing (LAR) in mobile ad hoc networks. ACM/IEEE,
MOBICOM’98, pp. 66–75 (1998)
56 S. Das et al.
15. Ahvar, E., Fathy, M.: Performance evaluation of routing protocols for high density ad hoc
networks based on energy consumption by GlomoSim simulator. In: The proceedings of
world academy of science, engineering and technology, vol. 23, pp. 97–100, Aug 2007
16. Broch, J., Johnson, D., Maltz, D.: The dynamic source routing protocol for mobile ad hoc
networks. http://www.ietf.org/internetdrafts/draft-ietfmanet-dsr-03.txt, IETF Internet draft,
Oct 1999
17. Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: Proceedings of
2nd IEEE workshop on mobile computing systems and applications, pp. 90–100, Feb 1999
18. UCLA, Glomosim. http://pcl.cs.ucla.edu/projects/glomosim
19. Haerri, J., Filali, F., Bonnet, C., Fiore, M.: VanetMobiSim: Generating realistic mobility
patterns for VANETs, Los Angeles, California, USA, 29 Sep 2006
20. Harri, J., Filali, F., Bonnet, C.: Mobility models for vehicular ad hoc networks: A survey and
taxonomy. EURECOM, 26 Mar 2007
A Bluetooth-Based Autonomous
Mining System
Keywords Bluetooth Scanners Wireless Mine Database GUI Locus
tracking Vehicle collision Mac ID
1 Motivation
This project poses its goal to implement a cost-effective and efficient communi-
cation system for mines using a wireless system as needless to say, a mechanism
without wires or cables would be the most convenient in case of any mine.
Wireless networks work without limitations of cabling, using as a medium either
infrared light (IR) or radio frequencies (RF). The current WLAN and Bluetooth
technology use the 2.4-GHz frequency band, which is the only unlicensed band in
most of countries. There are certainly many advantages in replacing cables by a
wireless medium. The most significant are mobility, flexibility, cost saving,
installation in difficult-to-wire areas, and reduction in installation time.
3 Why Bluetooth?
Underground mine mapping using GPS technology is not an easy task because
satellite signals do not penetrate through earth strata down to the underground
mine works. In most cases, the use of GPS data collection for underground mines
is limited to capturing the point locations such as mine entry, shaft locations, and
approximate mine location and then using traditional underground mine surveying
techniques to capture spatial data.
The radio-frequency identification (RFID) is a method that relies on storing and
remotely retrieving data via transmitting radio waves using devices called RFID
A Bluetooth-Based Autonomous Mining System 59
4 Methodology
Every person entering the mine would be given a Bluetooth device. This device
would facilitate the tracking of the personnel present in the mine and also allow
audio-visual communication.
The salient features of our Bluetooth-enabled wireless communication system
are as follows:
60 S. Roy et al.
• Employee database—All the personal details and records of each employee are
maintained on a daily basis using a database management system. The personal
data pertaining to each employee are initially entered into the database by means
of a graphic user interface (GUI).On the other hand, the daily records of the people
involved in the mining operations are automatically updated into the database at
periodic intervals. We will explain the mechanism of this process in due course.
• Use of database—The database contains all the important information
regarding the daily activities of the mine workers. As the database gets filled
with information, we may need to access certain data from it as and when
required. This can be done again using another GUI. This particular GUI
matches the given name with those in the database. In case that particular name
occurs multiple times in the database, it asks for more information regarding the
employee. In case the combination of all the provided fields occurs multiple
times, it asks for the employee ‘MacID’ or the ‘MacID’ of the device assigned to
that employee. Moreover, only authorized personnel can access the database.
• Scanning—The servers located at designated areas within the mine carry out the
function of detecting every Bluetooth device within their range. Each server
constantly checks for the devices in its range and feeds the updated data back
into the database attached to the mainframe. In this way, we are able to maintain
track of the location of people in the mine at a given time. The servers would
also detect any vehicles or other machines in the mine, thus enabling us to also
keep track of materials and equipment which would be in the mine at that time.
• Locus tracking—By checking the sequence of servers through which a device
has passed within the mine, we can determine the path traversed by a person or
vehicle inside the mine over a certain period of time. This is also updated to the
database at periodic intervals.
• Vehicle collision—We have made a provision to ensure that the chances of
vehicles colliding inside the mine are minimized. This has been done by using a
simple logic. Whenever any two or more vehicles in the mine are deemed to be
on a collision course, that is, when they are present under adjacent servers, a
warning is issued to them. This warning is in the form of an audio-visual output
in the Bluetooth device of the vehicle, showing its current location as well as
that of its counterpart(s).
• General warning issuing—In case of an emergency situation in the mine
brought about by an accident or any other unforeseeable circumstance, warnings
need to be issued to the people present inside the mine. This can be done by
playing one of several recorded audio messages in the servers, vehicles, or the
devices held by the mine superintendents.
A Bluetooth-Based Autonomous Mining System 61
5 Flowcharts
6 Algorithms
Step 1: Start.
Step 2: The devices to be used in the mine by workers, and for vehicles and other
equipment are scanned.
Step 3: The system administrator uses a graphical user interface to input the data
pertaining to each device.
Step 4: If entered data are in uppercase, proceed to step 6.
Step 5: The data are automatically converted into uppercase and then put into the
database.
Step 6: Once the data for all the scanned devices are entered into the database, a
message ‘All records are entered’ is displayed.
Step 7: Stop.
Step 1: Start.
Step 2: The system administrator uses a graphical user interface to access the
data present in the database.
62 S. Roy et al.
6.3 Scanning
Step 1: Start.
Step 2: The system administrator enters employee data into database on employ-
ment after Bluetooth device is assigned; a GUI is used to facilitate the
process.
Step 3: The scanners are activated at the start of each shift as the workers enter
the mine.
Step 4: There are two parallel process levels of the system.
Step 5: The actual scanning taking place in the mine is described from step 6,
whereas the system at surface level is described from step 14.
Step 6: Scanners detect the presence of Bluetooth devices and send data to
mainframe through the server network.
Step 7: If a device is detected for the first time, proceed to next step; otherwise,
proceed directly to step 9.
Step 8: The Mac ID of the device is added as a key of the dictionaries, and the
entry time to the time dictionary and presence flag is made 1.
Step 9: If a device previously present is not detected, proceed to next step;
otherwise, proceed directly to step 11.
Step 10: The exit time is added to the time dictionary, and the presence flag is
made 0.
Step 11: The entry and exit times of each device are stored into tuples with each
Mac ID being the key, and the whole data, in the dictionary, are put into
the database through the network.
Step 12: The sequence of servers detecting a particular worker or vehicle,
forming a locus, is also sent to mainframe.
Step 13: Proceed directly to step 17.
A Bluetooth-Based Autonomous Mining System 63
Step 14: The system administrator gets access to data sent by the scanners into
the mainframe database.
Step 15: The administrator can check relevant data sent by scanners (entry, exit
time, etc.) to keep constant track of miners, vehicles, etc.
Step 16: The administrator can check the path traversed by any worker or vehicle
over a certain period of time.
Step 17: Stop.
7 Results/Conclusion
All the Bluetooth devices are scanned, and each device is assigned to an employee
by adding the details of the employee pertaining to each device. All the details are
entered into their respective fields and subsequently put into the database. Through
the following GUI, the user can search for a specific record of a person at a
particular time or obtain all the records pertaining to a particular employee.
On entering the username and password, a GUI appears containing a list of all
the employees. The employee whose records are to be accessed is chosen. From
here, the user can obtain—(1) personal details of the employee. (2) path followed
by a person in the mine, (3) The most recent position of the person in case of
emergency situation. In case of accidents, we can send over a message to the
detected server and warn or reassure employees of rescue team making their way
toward them. There is also audio–video alarm provision to prevent vehicle colli-
sion in the cluttered mine environment.
64 S. Roy et al.
8 Related Work
The Active Badge system [2] was one in which sensors placed at known positions
within a building pick up the unique identifiers emitted from the IR badges and
relay these to the location manager software. Though this system provides accurate
location information, it has some drawbacks as well: (1) it performs poorly due to
the limited range of IR, (2) it incurs high installation and maintenance costs, and
(3) it performs poorly in the presence of direct sunlight.
A Bluetooth-based tracking system is described in [1]. This system uses mobile
phone terminals to build a virtual networking by combining GPS and Bluetooth
technology with mobile Internet. The Bluetooth scanners perform Bluetooth dis-
covery process and assign location information to found Bluetooth IDs based on
GPS coordinates. Another popular technology used for personnel and/or asset
tracking is radio-frequency identification (RFID) [2], which works by means of
electromagnetic induction.
References
Abstract In recent years, reversible logic has emerged as a major area of research
due to its ability to reduce the power dissipation, which is the main requirement in
the low-power digital circuit design. It has wide applications such as low-power
CMOS design, nanotechnology, digital signal processing, communication, DNA
computing, and optical computing. In this paper, two new 3 9 3 reversible gates
are proposed and these are being used to realize the classical set of logic gates in
the reversible domain. An important aspect of the two newly proposed reversible
gates is that a novel optimized 1-bit comparator can be realized. The proposed
reversible 1-bit comparator is better and optimized in terms of the number of
reversible gates used, the number of transistor counts, and the number of garbage
outputs. Also, a 4-bit comparator has been designed by cascading 1-bit compar-
ators in series. Using this, a 32-bit reversible comparator has been proposed.
Proposed circuits have been simulated using Modelsim.
1 Introduction
information bits lost during the operation. Information loss occurs because the
total number of output signals generated is less than the total number of input
signals applied. Thus, conventional combinational logic circuits dissipate heat for
every bit of information that is lost during their operation. In 1961, R. Landauer
proved that a single bit of information loss dissipates KTln2 joules of energy
where K is the Boltzmann’s constant and T is the temperature at which the
computation is performed [1]. In 1973, Bennett showed that in order to avoid
energy loss, it is necessary that all the computations have to be performed in a
reversible way [2]. Thus, to avoid power dissipation, circuits must be constructed
from reversible logic gates. Thus, every future technology has to use reversible
gates in order to reduce power dissipation. A circuit is said to be reversible if the
input vector can be uniquely recovered from the output vector and if there is a one-
to-one correspondence between its input and output assignment. A reversible
circuit maps each input vector into a unique output vector and vice versa. Thus,
reversible logic has application in various research areas such as digital signal
processing, quantum computing, low-power CMOS design, communication, bio-
informatics, and nanotechnology-based systems [3]. Synthesis of reversible logic
circuits is significantly more complicated than traditional irreversible logic circuits
because in a reversible logic circuit, we are not allowed to use fan-out and
feedback [4]. A reversible logic circuit should have the following features [5]:
Use minimum number of reversible gates
Use minimum number of garbage outputs
Use minimum constant inputs.
The output that cannot be used further for computation process is known as
garbage output. The input that is added to an nxk function to make it reversible is
called constant input [6]. The quantum cost of a reversible or quantum circuit is
defined as the number of 1 9 1 or 2 9 2 gates used to implement the circuit. The
major objective of a reversible logic design is to minimize the quantum cost and
the number of garbage outputs [7]. Hence, one of the major issues in reversible
circuit design is garbage minimization to minimize the power dissipation. Another
significant criterion in designing a reversible logic circuit is to minimize the
number of reversible gates used [8]. In this paper, we propose two new 3 9 3
reversible logic gates. The paper also focuses on the design of a reversible 1-bit
comparator using the two proposed reversible gates. The transistor representation
of the proposed circuit is better in terms of transistor count. The proposed work is
then compared with the existing comparator circuits. Also, a 4-bit reversible
comparator is designed using the 1-bit comparator. Using this, a 32-bit reversible
comparator has been designed. All the proposed circuits have been implemented
using VHDL and simulated using Modelsim. The paper is organized as follows:
Sect. 2 gives an overview of the reversible gates. Section 3 deals with the survey
of the existing work. Section 4 represents the design of the proposed reversible
gates. Section 5 represents the transistor implementation of the proposed gates.
Section 6 describes the proposed design of a 1-bit comparator using the two newly
proposed gates. Section 7 describes the design of a 4-bit comparator. Section 8
Transistor Representation of a Low-Power Reversible 32-Bit Comparator 69
Some of the important reversible logic gates are Feynman gate, Fredkin gate,
Toffoli gate, Peres gate, URG gate, BJN gate, TR gate, M gate, and L gate. Brief
introduction about these gates are as given in Table 1.
3 Literature Survey
Nagamani et al. [9] proposed a reversible 1-bit comparator design using the
existing reversible gates such as Fredkin, Peres, Toffoli, R, URG, TR and the
newly proposed gate BJN. The drawback of their work is that the number of
reversible gates required for each implementation is more. Also, it produces more
number of garbage outputs and the circuit uses more number of constant inputs.
Sengupta et al. [10] proposed a reversible 1-bit comparator design using a single
SCG gate. The number of garbage outputs produced is 1. It uses 2 constant inputs.
The transistor representation of their circuit is not given. Since the logical
expressions involved in SCG are complex, definitely it requires more number of
transistors to implement. To minimize the transistor count, we have proposed two
new 3 9 3 reversible gates, which can be combined for its use as a reversible 1-bit
comparator.
The logic diagram of the proposed new reversible gate1 is shown in Fig. 1.
Reversible gate1 is a 3 9 3 gate with inputs (A, B, C) and outputs P = B’,
Q = AB’ ? BC, and R = A C.
The truth table for the corresponding gate is shown in Table 2.
70 A. V. AnanthaLakshmi and G. F. Sudha
2. Toffoli P=A
Q=B
R = AB C
3. URG P = (A ? B) C
Q=B
R = AB C
4. TR P=A
Q=AB
R = AB’ C
5. BJN P=A
Q=B
R = (A ? B) C
6. Fredkin P=A
Q = A’B ? AC
R = AB ? A’C
7. Peres P=A
Q=AB
R = AB C
8. M P=A
Q = (A B)’
R = AB’ C
9. L P=A
Q=B
R = (A ? B)’ C
Fig. 1 Proposed 3 9 3
reversible gate1
Transistor Representation of a Low-Power Reversible 32-Bit Comparator 71
Fig. 2 Proposed 3 9 3
reversible gate2
The logic diagram of the proposed new reversible gate2 is shown in Fig. 2.
Reversible gate2 is a 3 9 3 gate with inputs (A, B, C) and outputs P = A’B’ C,
Q = A’ B’, and R = A.
The truth table for the corresponding gate is shown in Table 3.
To construct reversible gates with minimum transistor count, two-input XOR, OR,
and AND gates are implemented using GDI method [11]. Most of the boolean
functions require a complex (6–12 transistors) gate in CMOS (as well as in
standard PTL implementations), but are very simple (only two transistors per
function) in the GDI design methodology. GDI enables simpler gates, lower
transistor count, and lower power dissipation.
Fig. 5 Symbolic
representation of proposed
reversible 1-bit comparator
gate1 and gate2
Let the two 4-bit numbers to be compared for match be A=A3A2A1A0 and
B=B3B2B1B0. Each pair of bits (Ai B) is fed to each comparator. For efficient
realization of the greater of the two numbers, the Gi outputs are employed using
the following logical equation:
G ¼ G3 þ G2E3 þ G1E3E2 þ G0E3E2E1
On simplification, the above expression can be written as
Transistor Representation of a Low-Power Reversible 32-Bit Comparator 75
G0, G1, G2, G3, E0, E1, E2, E3, L0, L1, L2, and L3 are the outputs of the 1-bit
comparator block. The signal E = E3E2E1E0 will be high when the input A is
equal to B. Three Reversible Gate1s are required to realize the equality condition.
Table 5 shows the number of gates required to implement the equality of two 4-bit
numbers.
76 A. V. AnanthaLakshmi and G. F. Sudha
Table 4 Number of gates required to find the greater of two 4-bit numbers
SI. No Number of gates required Number of garbage outputs produced
1. Existing work [10] 10 22
2. Proposed work 14 16
Table 5 Number of gates required to find the equality of two 4-bit numbers
SI. No Number of gates required Number of garbage outputs produced
1. Existing work [10] 7 11
2. Proposed work 11 10
Since it can be detected whether two 4-bit numbers are equal or a number is
greater than the other, it can be inferred that the architecture of whether a number
is smaller than the other can also be designed simply by the logical expression:
L ¼ ðE þ GÞ0 ¼ E0 G0 ð2Þ
Thus, two outputs E and G are fed as the inputs to a reversible gate2 to realize
Eq. 2. Thus, the signal L will be high when the input A is smaller than B. Table 6
shows the number of gates required to implement the reversible 4-bit comparator
circuit.
From Table 6, it is inferred that the number of gates required to implement the
4-bit comparator circuit to find the greater, equality, and smaller of two numbers is
more when compared with the existing work [10]. Though the proposed work has
increased the number of gates required, it has scaled down the garbage outputs
produced, which is the most important criterion while designing a reversible cir-
cuit. The power dissipation gets reduced as the number of garbage outputs is
minimized.
The two 32-bit operands A and B are decomposed into four bits each. Thus, a
reversible 32-bit comparator is designed by using eight 4-bit comparators.
Table 6 Number of gates required to implement the reversible 4-bit comparator circuit
SI. No Number of gates required Number of garbage outputs produced
1. Existing work [10] 19 38
2. Proposed work 25 28
Transistor Representation of a Low-Power Reversible 32-Bit Comparator 77
Table 7 Number of gates required to find the equality of two 32-bit numbers
SI. No Number of gates required Number of garbage outputs produced
1. Proposed Work 71 46
Table 8 Number of gates required to find the greater of two 32-bit numbers
SI. No Number of gates required Number of garbage outputs produced
1. Proposed Work 77 58
Table 9 Number of gates required to implement the reversible 32-bit comparator circuit
SI. No Number of gates required Number of garbage outputs produced
1. Proposed Work 149 106
Tables 7, 8, and 9 represent the number of gates required to find the equality and
greater of two 32-bit numbers and to implement the reversible 32-bit comparator
circuit.
9 Simulation Results
The entire unit was functionally verified. A test bench is used to generate the
stimulus and applies it to the implemented reversible 1-bit, 4-bit, and 32-bit
comparators. The design was simulated using Modelsim and synthesized using
synthesis tool targeting Xilinx Virtex- V1000EFG680 FPGA.
Figure 7 shows the simulation result of the reversible 1-bit comparator. The
signals a, b, c represent the input and signals p, q, r represent the output, where p
denotes the greater condition, q represents the smaller condition, and r denotes the
equality condition. Thus, for the input combination a = 0, b = 1, and c = 0, the
outputs are p = 0, q = 1, and r = 0. Thus, the result indicates that a is smaller
than b.
Figure 8 depicts the simulation result of the reversible 32-bit comparator. The
inputs a and b represent two 32-bit signals, and gr, eq, and lt represent the output
signals to indicate the greater, equality, and smaller conditions. Thus, for inputs
a = 11110011011111111111111111111111 and b = 1111001100111111111111
1111111111, the outputs are gr = 1, eq = 0, and lt = 0. Thus, it indicates that a is
greater than b.
10 Conclusion
References
1. Landauer, R.: Irreversibility and heat generation in the computing process. IBM J. Res. Dev.
5(3), 183–191 (1961)
2. Bennett, C.H.: Logical reversibility of computation. IBM J. Res. Dev. 17(1), 525–532 (1973)
3. Peres, A.: Reversible logic and quantum computers. Phys. Rev. 32, 3266–3276 (1985)
4. Perkowski, M., Al-Rabadi, A., Kerntopf, P., Buller, A., Chrzanowska-Jeske, M., Mish
chenko, A., Azad Khan, M., Coppola, A., Ya Nushkevich, S., Shmerko, V.P., Jozwiak, L.: A
general decomposition for reversible logic. Proc. RM 1, 119–138 (2001)
5. Perkowski, M., Kerntopf, P.: Reversible logic. In: Proceedings of EURO-MICRO Warsaw,
Poland (2001)
6. Himanshu, T., Srinivas, M.B.: Novel reversible TSG gate and its application for designing
reversible carry look ahead adder and other adder architectures. In: Proceedings of the 10th
Asia-Pacific Computer Systems Architecture Conference (ACSAC 05) Lecture Notes of
Computer Science, 3740, pp. 775–786, Springer (2005)
Transistor Representation of a Low-Power Reversible 32-Bit Comparator 79
7. Benett, C.H.: Notes on the history of reversible computation. IBM J. Res. Dev. 32, 16–23
(1998)
8. Haghparast, M., Navi, K.: Design of a novel fault tolerant reversible full adder for nano
technology based systems. World Appl. Sci. J. 4, 114–118 (2005)
9. Nagamani, A.N., Jayashree, H.V., BhagyaLakshmi, H.R.: Novel low power comparator
design using reversible logic gates. Indian J. Comput. Sci. Eng. 2, 574–576 (2011)
10. Sengupta, Digantha, Sultana, Mahamuda, Chaudhuri, Atal: Realization of a novel reversible
SCG gate and its application for designing parallel adder/subtractor and match logic. Int.
J. Comput. Appl. 31, 30–35 (2011)
11. Morgenshtein, A., Moreinis, M., Ginosar, R.: Asynchronous Gate-Diffusion-Input (GDI)
Circuits. IEEE Transactions Very Large Scale Integration (VLSI) Systems (2004)
Performance Enhancement of Brillouin
Distributed Temperature Sensor Using
Optimized Fiber
1 Introduction
Brillouin distributed fiber optic sensor has become more popular due to its unique
advantage of simultaneously measuring the temperature and strain. The distributed
fiber sensors are attractive because a single fiber optic cable can potentially replace
thousands of individual point sensors. Besides, this sensor installation and main-
tenance issue is simplified using distributed sensor. Fiber sensors offer several