Vol 2 No 3
Vol 2 No 3
Step 2: The registration center computes the messages Step 1: Si checks if the format of C i ’s IDi is valid or
ri = h ( PWi || fi ) and not.
ei = h( IDi || Xs) ⊕ h( PWi || fi ) , where fi = h( Bi ) and Xs is Step 2: If the above-mentioned holds, Si computes the
the secret information generated by Si . messages M 3 = h( IDi || Xs) , M 4 = M 2 ⊕ M 3 = Rc ,
Step 3: The registration center stores ( IDi , h (.), fi , ei ) M 5 = M 3 ⊕ Rs , and M 6 = h( M 2 || M 4 ) to provide mutual
into the user’s smart card and then sends it to the user authentication between client and server.
through a secure channel. Step 3: Next, Si sends the messages (M5, M6) to Ci .
Step 4: On receiving the Si ’s message, C i checks if
Ci Ri
IDi , Bi , PWi M 6 = h( M 2 || Rc) .
Step 5: If the above-mentioned holds, C i considers that
Computes
Si is authenticated and then computes the following
ri = h(PWi || fi )
messages to offer mutual authentication between client and
ei = h(IDi || Xs) ⊕ h(PWi || fi ) server.
Stores ( ID i , h(.), f i , e i ) in the smart card M 7 = M 5 ⊕ M 1 = Rs ,
M 8 = h( M 5 || M 7 ) ,
Smart card where M7 is the random number of the server. The client,
which knows M 1 = h ( IDi || Xs) , can send back the message
of M 8 = h((h( IDi || Xs ) ⊕ Rs) || Rs) .
Figure 1. The registration phase
Step 6: Ci sends the message M8 to Si .
2.2 The Login Phase Step 7: On receiving C i ’s message, Si checks if
Whenever the users want to login to the server, they need M 8 = h( M 5 || Rs) .
to perform the following steps, as shown in Figure 2.
Step 8: If it holds, the server accepts C i ’s login
Step 1: The users insert their smart card into the smart
card reader of a terminal and offer their personal biometrics, request; otherwise, it rejects it.
Bi , on the specific device to verify user biometrics. Next,
the system checks if h( Bi ) = f i . Ci Si
Checks the format of Ci ' s IDi
Step 2: If it holds, the user passes the biometrics
Computes M 3 = h(IDi | | Xs)
verification. Then the user inputs the PWi . Otherwise, it
M 4 = M 2 ⊕ M 3 = Rc
means the user did not pass the biometrics verification and
the client terminates the session. M5 = M 3 ⊕ Rs
Step 3: After receiving C i ’s password, the smart card M6 = h(M 2 || M 4 )
will compute the messages M5 , M 6
ri ' = h( PWi || f i ) , M 1 = ei ⊕ ri ' = h( IDi || Xs) , and ?
Verifies M 6 = h(M 2 || Rc)
M 2 = M 1 ⊕ Rc , where Rc is a random number generated
Computes M 7 = M 5 ⊕ M1
by the user.
Step 4: Finally, Ci sends the messages ( IDi , M 2 ) to Si . M 8 = h(M 5 || M 7 )
M8
Ci Si
?
Inserts the smart card and offers Bi Verifies M 8 = h(M 5 || Rs)
ei′′ = ei′ ⊕ h( PWi new || fi ) , the ei will be replaced with ei′′ 3.2 It cannot withstand password-guessing attacks
new
According to some of the research work [7], [8], storing
and PWi has been changed with PWi . of data as smart card messages is vulnerable, because the
secret information stored in the smart card could be
Ci Si extracted by monitoring its power consumption (power
Inserts the smart card and offers Bi analysis attacks). Using power consumption attacks, the
attacker can get the message ( fi , ei ) and intercept the
Verifies h(Bi )=? fi , Ci inputs PWi and PWi new
message (M2, M6) from the network. Through password-
Computes ri' = h(PWi || fi )
guessing attacks, the attacker can guess the password P Wi′ ,
ei' = ei ⊕ ri' = h( IDi || Xs)
and compute the value as Rc' = ei ⊕ h( P Wi′ || fi ) ⊕ M 2 to
ei'' = ei' ⊕ h( PWi new || fi )
check if M 6 = h( M 2 || Rc' ) . If it holds, the attacker can
The ei will be replaced with ei'' masquerade the user. Otherwise, the attacker can try for the
next guessed password P Wi′ until M 6 = h( M 2 || Rc' ) is
true. A detailed description is given below:
Figure 4. Change password phase Step 1: Using power consumption, the adversary gets the
message ( fi , ei ) .
3. The Weaknesses of Li and Hwang’s Step 2: The adversary intercepts the message (M2, M6)
from the network.
Proposed Scheme
Step 3: By choosing a password P Wi′ , the adversary
It can be seen that Li and Hwang’s proposed scheme
computes the message of Rc' = ei ⊕ h( P Wi′ || fi ) ⊕ M 2 to
enables users to change their passwords freely and provides
mutual authentication between the user and the server. The check if M 6 = h( M 2 || Rc' ) .
most significant feature of this scheme is that its operating Step 4: If the above-mentioned holds, it means the
mechanism is based on the users’ personal biometrics. password guessed, P Wi′ , is the correct password; thus, the
However, Li and Hwang’s proposed scheme still retains adversary can masquerade the user.
three weaknesses, as explained below:
Step 5: On the contrary, if it does not hold, the adversary
tries for the next password guess until M 6 = h( M 2 || Rc' )
3.1 It cannot protect against impersonation attacks is true.
In the authentication phase, the server checks the format
3.3 Adversary can impersonate not only the client
of the client’s identity; if it holds, the server computes the
but also the server
message (M3, M4, M5, M6), and the server can get the
message ( IDi , M 2 ) from the client in the login phase. The Through a power analysis attack and the above-mentioned
statement 3.2, the attacker can get the value of h( IDi || Xs) ;
server can use the message ( IDi , M 2 ) and secret
then, the attacker can masquerade not only the client but
information Xs to masquerade M2 ' , then get
also the server. As the attacker can intercept the
M 1 = M 3 = h( IDi || Xs) ; therefore, the attacker can message ( IDi , M 2 ) from the network, using the message
impersonate the client. The detailed procedure is given h( IDi || Xs) , it can compute the message
below:
(M 3 , M 4 , M 5 , M 6 ) to masquerade the server as well.
Step 1: The malicious server can compute the hash value
h( IDi || Xs) itself, and sends the message h( IDi || Xs) to the
adversary.
Step 2: After receiving the message h( IDi || Xs) , the 4. Conclusions
adversary chooses the random number Rc' to compute This paper points out that the scheme proposed by Li and
M 2 ' = h( IDi || Xs) ⊕ Rc ' . The adversary can Hwang is not secure enough against some weaknesses and
masquerade IDi and sends the login request message proves that it is incapable to withstand impersonation and
power consumption attacks. The attacker can break in as a
( IDi , M 2 ' ) to the server. legal user and intercept the messages from networks to
Step 3: The adversary can use the hash value h( IDi || Xs) masquerade the user. Although Li and Hwang’s proposed
to compute the random number Rs chosen by the server. The personal biometrics scheme is practical in some fields, the
adversary will compute M 8 = h((h( IDi || Xs) ⊕ Rs ) || Rs) to security is substandard.
achieve the validity of the login processes. The drawback
exists because the server does not execute the biometrics
Acknowledgment
verification processes, thus causing insider attacks as
mentioned above. Furthermore, the scheme cannot achieve
non repudiation. This work was partially supported by the National
Science Council, Taiwan, R.O.C. under Grant NSC 98-
2221-E-324-019.
4 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
References
[1] L. Lamport “Password authentication with insecure
communication”, Communications of the ACM 24, pp.
770–772, 1981.
[2] M.S. Hwang and L.H. Li, “A new remote user
authentication scheme using smart cards”, IEEE
Transactions on Consumer Electronics, vol. 46, pp.
28–30, 2000.
[3] M. Kim and CK. Koc, “A simple attack on a recently
introduced hash-based strong-password authentication
scheme”, International Journal of Network Security,
vol. 1, pp. 77–80, 2005.
[4] N.Y. Lee and Y.C. Chiu. “Improved remote
authentication scheme with smart card”, Computer
Standards and Interfaces, vol. 27, pp. 177–180, 2005.
[5] C.T. Li and M.S. Hwang, “An online biometrics-based
secret sharing scheme for multiparty cryptosystem
using smart cards”, International Journal of Innovative
Computing Information and Control, 2009.
[6] C.T. Li and M.S. Hwang, “An efficient biometrics-based
remote user authentication scheme using smart cards”,
Journal of Network and Computer Applications, vol. 33,
pp. 1-5, 2010.
[7] T.S. Messerges, E.A. Dabbish, and R.H. Sloan,
“Examining smart-card security under the threat of
power analysis attacks”, IEEE Transactions on
Computers, vol. 51, pp. 541–552, 2002.
[8] P. Kocher, J. Jaffe, and B. Jun, “Differential power
analysis”, Proceedings of Advances in Cryptology, pp.
388–397, 1999
(IJCNS) International Journal of Computer and Network Security, 5
Vol. 2, No. 3, March 2010
ratio of the image and its low-pass version serves as zero mean and unit variance. The advantage of the method
estimation for luminance. Chen et al [15] discards the low is low computation complexity.
frequency DCT component in the logarithm domain to This paper proposes an new illumination compensation
achieve illumination invariance. They first expand the pixel method for face recognition . The proposed method aims to
intensity in the dark region using logarithm transform. correct the illumination variation rather than to simply
Then, discrete cosine transform is applied on the image in discard it. Compared to existing methods based on the DCT,
logarithm domain. The low frequency components are the proposed method here does not discard the low
discarded by setting the corresponding coefficients as zero. frequency components which represent most of the effects of
Nanni and Lumini [16] had investigated discrete wavelet illumination variations. This allows us to retain more
transform features under different lighting conditions. They information, which might be useful for face
found that the most useful sub-band are the first level of recognition. Furthermore, some of the effects of this
decomposition obtained by Biorthogonal wavelet and the illumination variation lie in the higher frequency band,
horizontal details are the third level of decomposition approximately the same frequencies as occupied by some
obtained by Reverse Biorthogonal wavelet, which is robust important facial features. As previously mentioned, the
against illumination variation. Franco and Nanni [17] effect of these kinds of illumination variation creates
proposed classifiers fusion scheme. PCA is applied to shadow and specularities in the image. Thus, removing the
extract and reduce the dimensionality of the useful features low frequency component does not help in this case. The
from DWT domain [16] and DCT domain [15]. The proposed method here manipulates the odd and even DCT
individual classifier for each feature is Kernel Laplacian components to remove these artifacts. Using the DCT
Eigenmap. The output of each classifier is further fused approach, the complexity of the previously described
using sum rule. methods is avoided while retaining a comparable
Generally, human face is similar in shape, have two eyes, performance [8]-[10], [15], [21]-[24]. The proposed method
a mouth and a nose. Each of these components makes is based solely on 2D images and does not need to estimate
different distinctive shadows and specularities depending on the 3D shape. It requires much less computation resource
the direction of the lighting in a fixed pose. By using such than other methods based on 3D model as stated above.
characteristic, the lighting direction can be estimated and Besides that, it does not require any prior information on the
illumination variation can be compensated. Quotient image illumination model and training images. Furthermore, the
(QI) [18] is an effective method to handle illumination parameter selection is simple. Only one parameter, the cut-
problem. This method is very practical because it off-frequency of the filter, is required to be
only requires one training image for each person. The determined. Experimental results on Yale face database B
authors in literature [19] and [20] further improved the [11] using PCA- and support vector machines (SVM)--based
original QI method and proposed the self-quotient face recognition algorithms showed that the proposed
image (SQI) method. The luminance is estimated as the method has achieved good performance as compared
smoothed version of the image by Gaussian filtering. The to some of the more complicated methods described above.
illumination variation is eliminated
by dividing the estimated luminance. However, the 2. Method
parameter selection for the weighted Gaussian filter is
empirical and complicated. Shan et al As aforementioned before, an illuminated face image, I(x,y)
[21] proposed quotient illumination relighting (QIR) , can be regarded as product of reflectance, R(x,y) , and
method which synthesizes images under a predefined luminance, L(x,y) , as shown in (1). Taking logarithm
normal lighting condition from the provided face images transform on (1), we have (2).
captured under non-uniform lighting conditions. Zhao et al
[22] proposed illumination ratio image. One training image
for each lighting conditions is required to simulate the
distribution of the images under varying lighting condition.
Liu et al [23] proposed an illumination restoration method. (2)
The illuminated image is restored to image under frontal
light source using a ratio-image between the face image The logarithm transform transforms (1) into linear
under different lighting conditions and a face image under equation where the logarithm transform of the illuminated
frontal light source, both of which are blurred by Gaussian image is the sum of the logarithm transformed of reflectance
filter. The image is further enhanced through an iterative and the logarithm transform of luminance as shown in
algorithm where Gaussian filter with different sizes are (2). In the image processing field, logarithm transform
applied on different regions of the face image. Vuccini et al is often employed to expand the values of the dark
[24] adopted Liu et al’s method to restore and enhance the pixels. Fig. 1 gives a comparison between the original image
illuminated image. LDA is employed as feature extractor. and the same image following the logarithm transform. The
They proposed an image synthesis method based on QI to brightness of the right image is spread more uniformly.
generate training images to overcome the small-sample-size
problem. Xie and Lam [25] normalize the lighting effect
using local normalization technique. The face image is
partitioned to blocks with fixed size. For each block, the
pixel intensities are normalized in such a way that it has
(IJCNS) International Journal of Computer and Network Security, 7
Vol. 2, No. 3, March 2010
Computer Vision and Pattern Recognition, 2, pp. 498- [24] E. Vucini, M. Gökmen, E. Gröller, “Face recognition
505, 2004. under varying illumination”, In Proceedings of the 15th
[20] H. Wang, S.Z. Li, Y. Wang, “Face recognition under Conferences in Central Europe on Computer Graphics,
varying lighting conditions using self quotient image”, Visualization and Computer Vision, pp.57-64, 2007.
In Proceedings of the IEEE International Conference [25] X. Xie, KM. Lam, “An efficient illumination
on Automatic Face and Gesture Recognition, pp. 819- normalization method for face recognition”, Pattern
824, 2004. Recognition Letters. 27, pp.609-617, 2006.
[21] S. Shan, W. Gao, B. Gao, D. Zhao, “Illumination [26] V. Vapnik, The nature of statistical learning theory.
normalization for robust face recognition against Springer-Verlag, New York, 1995.
varying lighting conditions”, In Proceedings of the [27] B.E. Boser, I. Guyon, V. Vapnik, “A training
IEEE Workshop on AMFG, pp. 157-164, 2003. algorithm for optimal margin classiffers”, In
[22] J. Zhao, Y. Su, D. Wang S. Luo, “Illumination ratio Proceedings of the Fifth Annual Workshop on
image: synthesizing and recognition with varying Computational Learning Theory, pp144-152, 1992.
illuminations”, Pattern Recognition Letters. 24, [28] C. Cortes, V. Vapnik, “Support-vector network.,
pp.2703-2710, 2003. Machine Learning”,20 , pp.273-297, 1995.
[23] DH. Liu, KM Lam, LS. Shen, “Illumination invariant
face recognition”, Pattern Recognition. 38 , pp.1705-
1716, 2005.
(IJCNS) International Journal of Computer and Network Security, 13
Vol. 2, No. 3, March 2010
Abstract: Pervasive computing systems inside modern However, the realization of a fully wireless car bus system is
automobiles are made up of hundreds of interconnected, often still far away. Fiber optic connections for multimedia bus
replaceable devices and software components. In-vehicle systems offer advantages regarding costs and bandwidth,
multimedia components and applications are becoming complex and the demanded reliability of mission-critical networks
artifacts due to advancement in technology and increased still require wired connections to ensure the safe operation
competition. There is a growing need for software platform to
enable efficient deployment of multimedia services in
of the car. Though, cost-effective wireless subsystems which
automotive environment. This paper presents the architecture of could extend or partly replace wired bus systems are already
a Bluetooth based multimedia ad hoc network in a car. The nowadays conceivable. A very promising technology in this
architecture is explained and presented together with a prototype context is specified by the recent Bluetooth 3.0 [1] standard.
implementation running on hand-held devices. Further, the
different fundamental architectural tradeoffs, based on The provisioning of multimedia streaming applications
measurements, have also been analyzed. using wireless network, inside the vehicle, requires
managing differentiated performance levels depending on
Keywords: Ad Hoc Networks, Pervasive Computing, In application/user/device requirements in order to properly
Vehicle Multimedia, Bluetooth. allocate network bandwidth, especially the limited one
available in the wireless last-meter [3]. In particular, the
1. Introduction Bluetooth specification [1] offers limited support to
performance differentiation, by allowing to choose which of
During the last few years, the proliferation of miniaturized the three kind of logical transports to exploit and to
devices with networking capabilities has provided the statically configure performance requirements for ACL
technological grounds for pervasive networking even in ones.
automotive environments. Growing demand for personal
In addition, current implementations of the Bluetooth
device connectivity, mobile Internet access, remote
software stack do not allow applications to exploit the
monitoring and diagnostics, as well as enhanced safety and
limited performance functions included in the specification
security is driving vehicle manufacturers and suppliers to
in a portable way. The result is that the development of
seek out new wireless technologies. Wireless technology
Bluetooth operations in multimedia ad hoc applications
integration strategies would enhance the value proposition
currently depends on specific implementation details of the
of vehicles by integrating advanced electronics systems such
target Bluetooth hardware/software platform. This
as infotainment systems, safety and stability systems, and
relevantly complicates service design and implementation,
comfort and convenience enhancement systems.
limits the portability of developed applications, and calls for
The evolutionary development of in-car electronic systems the adequate modeling of performance parameters
has lead to a significant increase of the number of corresponding to potential ad hoc applications and services.
connecting cables within a car. To reduce the amount of
The design presented in this paper is for a wireless
cabling and to simplify the interworking of dedicated
streaming system that offers a means for bringing the
devices, currently appropriate wired bus systems are being
participatory media and bulk content distribution into the
considered. These systems are related with high costs and
wireless domain. The basis for the service is an
effort regarding the installation of cables and accessory
opportunistic distribution of among network. Users in our
components. Thus, wireless systems are a flexible and very
system exchange data when their corresponding
advanced alterative to wired connections.
application(s) receive trigger. The system is going to be
14 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
By relying on short-range communication, the network will 2.1 The Multimedia PAN
be highly disrupted most of time. The communication is
further challenged by relatively short transfer opportunities Bluetooth technology is based on a master-slave concept
which might be in the range of a few seconds when for where the master device controls data transmissions through
example two nodes communicate with each other. The a polling procedure. The master is defined as the device that
contribution of this paper is twofold: initiates the connection. A collection of slave devices
associated with a single master device is referred to as a
Ø A mechanism for content streaming based on piconet. The master dictates packet transmissions within a
opportunistic communication; piconet according to a time-slot process. The channel is
divided into time slots that are numbered according to an
Ø An evaluation of the mechanism through the internal clock running on the master. A time division
use of realistic use cases and real traces.
duplex (TDD) scheme is used where the master and slaves
The rest of the paper is organized as follows: Section 2 alternatively transmit packets, where even numbered time
provides the description of system and potential application slots are reserved for master-slave transmissions, while odd
scenarios. In section 3, the architecture and design of the numbered time slots are reserved for slave-master
system has been discussed. Section 4 evaluates the design of transmissions.
the system. Section 5 provides an overview of related
research and section 6 concludes the paper.
2. System Description
Figure 2 provides an overview of the multimedia PAN up and running, its Bluetooth module is ready to pair with
inside the car with the role of different nodes. The piconet other available device. Pairing with iPhone or with rear-seat
here consists of a master, the infotainment device, and two entertainment unit or with both establishes the network.
slaves, the smart phone (iPhone) and rear-seat
entertainment device. As soon as the infotainment system is
fountain codes, to speed up and secure the data transfer, synchronization. The transfer mode is based on a client-
specifically when packets are received unordered. The server model. The communication protocol is a request-
streams packets themselves are then again cut into smaller response system. It is not a strict system though; some
parts to optimize the interaction with the data link layer; requests do not generate a response whereas other requests
i.e., the size is set to the PDU size of the data link layer. can generate several responses. The goal is to send as few
data packets as possible to reduce the communication
The proposed system is designed to work on any MAC overhead.
architecture, however, to be effective even in the presence of
short contact durations, short setup times and high data Figure 4 illustrates the state diagram of the transfer mode.
rates are important for achieving high application It shows the three most important stages of synchronization
communication throughput. The design is further between two device nodes: the negotiation, data query, and
characterized by two fundamental choices. data communication stage.
Ø First, it allows only pair wise associations even In the Negotiation stage, both devices determine if some of
when the MAC layer supports multi-point the subscribed channels are available on the other device.
communication. Instead of querying every single channel, the devices
Ø Second, it never pushes data in the network and exchange a channel filter that contains all channel
relies instead on receiver-driven dissemination. subscriptions a device offers. The devices then start to test
their subscribed channels against the filter of the other
The arguments for these two choices are simplicity and
device and create a list of matching channels. This is a local
optimal usage of short contact durations. Furthermore, the
transport layer is able to optimize the flow control between process and does not involve the exchange of messages.
the nodes and is not constrained by the slowest receiver in
range. Since the framework does not perform multi-hop
routing explicitly, the system performance is mainly
determined by the selection of nodes, it is synchronizing
with and the order by which it transfers data from the peers.
This task is performed by the synchronization service,
depicted in Figure 1. The synchronization service is
responsible for maintaining state about past synchronization
encounters and current devices in the PAN.
2. A peer requests any stream which is newer than a 4.3 Device Synchronization
given date starting with the newest streams.
We next look at the synchronization time. The
3. The peer requests any streams that are newer than
synchronization time is the time between the moment two
a given date starting with the oldest stream.
devices have discovered each other and associate until they
The actual communication of streams is handled in the Data start data communication. Figure 5 shows the performance
Communication stage which usually takes up most of the of the architecture for device synchronization with different
connection time. The device starts to process the list of PDU number of channels using channel filters compared to the
streams that was created in the previous stage. The time it would take without filters.
communication itself works analogous to the download
process of BitTorrent [7]. Missing PDUs which are available
at the remote peer are randomly selected and downloaded.
Remark that a stream is divided into several pieces (PDUs)
which are requested
4. Evaluation
time with the iPhone and the Infotainment unit. The results users who retrieve data act simultaneously as clients and
are from average data communication measurements of servers. It has post-facto gained interest in the research
around 12 MB video streams showing the download time community; see for instance [7]. This system has similarities
when two or five devices are part of the PAN inside the car. to BitTorrent [7], but the mobility assisted delivery means
that data are provided in a random order from a random mix
4.5 PAN Accuracy of peers whereas peer-to-peer content distribution systems
like BitTorrent selects peers based on specific rules. The
When sending data to multiple receivers, a Bluetooth master closest research field is the delay tolerant networking. The
must form a piconet. In a piconet, the master sends data to Delay Tolerant Network Research Group (DTNRG) [14] has
each receiver one packet at a time in a round-robin fashion. proposed architecture [13] to support communication that
To evaluate architecture’s accuracy in piconet mode, we may be used by delay tolerant applications. The architecture
performed the following experiment. We set up a sending consists mainly of the addition of an overlay, called the
device to transmit a very large video file to each slave bundle layer, above a network transport layer. Messages of
joining its piconet. We set up two iPhone as slaves to join any size are transferred in bundles in an atomic fashion that
the piconet one by one, every 90 seconds. We measure the ensures node-to-node reliability. Multicast for delay-tolerant
transfer rate of the initial flow established between the networks has been proposed in [12]. In contrast to multicast,
master and the first joining slave and we plot how this rate our work assumes open user groups. The info-station
changes over time in Figure 7. concept is akin to our proposal and the paper in Ref. [10]
studies means for avoiding exploitation of other nodes. We
differ in that we make the nodal exchanges governed by a
protocol instead of a social contract between users.
The overall resulting performance is promising and shows ACM SIGCOMM CHANTS Workshop, Pisa, Italy,
the feasibility of wireless opportunistic communication September 2006.
inside a vehicle. With the proposed opportunistic [10] W. H. Yuen, R. D. Yates, and S. C. Sung.
communication system, the scope of multimedia content Noncooperative content distribution in mobile
exchange may broaden and that new participatory wireless infostation networks. In Proceedings of the IEEE
broadcasting applications using the proposed concepts will WCNC, 2003.
emerge in the near future. [11] G. Sollazzo, M. Musolesi, and C. Mascolo, “TACO-
DTN: A Time-Aware COntent-based dissemination
We anticipate two main directions for the future work: system for Delay Tolerant Networks,” in Proceedings
of the First International Workshop on Mobile
Ø Develop analytical models for relevant measures Opportunistic Networking, Puerto Rico, June 2007.
of performance for the described ad hoc network. [12] W. Zhao, M. Ammar, and E. Zegura. Multicasting in
Ø Performance analysis of multimedia protocol for delay tolerant networks: Semantic models and routing
algorithms. In Proceedings of the Sigcomm Workshop
different multimedia resources and performance
on Delay Tolerant Networking, August 2005.
attributes.
[13] S. Burleigh, A Hooke, L. Torgerson, K. Fall, V. Cerf,
B. Durst, and K. Scott. Delay-tolerant Networking: An
References Approach to Interplanetary Internet. IEEE
Communications Magazine, 41(6):128–136, 2003.
[14] Delay Tolerant Network Research Group (DTNRG).
[1] Bluetooth Special Interest Group., “Core Specification
http://www.dtnrg.org.
of the Bluetooth System v 3.0”. Apr. 2009.
[15] A. Broder and M. Mitzenmacher. Network applications
[2] R. Nüsser, R. Pelz, “Bluetooth-based Wireless
of bloom filters: A survey. Proceedings of the 40th
Connectivity in an Automotive Environment”, Proc. of
Annual Allerton Conference, 2002.
the IEEE Vehicular Technology Conference, Fall
2000, vol. 4, pp.1935-1942.
[3] S. Burleigh, A Hooke, L. Torgerson, K. Fall, V. Cerf, Authors Profile
B. Durst, and K. Scott. Delay-tolerant Networking: An
Approach to Interplanetary Internet. IEEE Kamal Sharma received the M. Sc. (Electronics) and M. Tech.
Communications Magazine, 41(6):128–136, 2003. (Future Studies & Planning) degrees from Devi Ahilya University
[4] J.C. Haartsen, “The Bluetooth Radio System,” IEEE in 2002 and 2005, respectively. He is currently with Devi Ahilya
Personal Comm., vol. 7, no. 1, pp. 28-36, Feb. 2000. University, Indore, INDIA.
[5] P. Johansson, M. Kazantzidis, R. Kapoor, and M.
Hemant Sharma received the M. Sc., M. Tech. and Ph D
Gerla, “Bluetooth: An Enabler for Personal Area
degrees from Devi Ahilya University in 1996, 1998 and 2009,
Networking,” IEEE Network, vol. 15, no. 5, pp. 28-37, respectively. He is in to designing and developing platform
Sept.-Oct. 2001. architecture for In-vehicle Infotainment Systems for more than 10
[6] Augustin Chaintreau, Pan Hui, Jon Crowcroft, years. He is currently with Delphi Delco Electronics Europe
Christophe Diot, Richard Gass, and James Scott. GmbH, Germany.
Impact of Human Mobility on the Design of
Opportunistic Forwarding Algorithms. In Proceedings Dr. A. K. Ramani received his Master of Engineering (Digital
of IEEE INFOCOM, Barcelona, Spain, April 2006. Systems) and Ph. D, from Devi Ahilya University, Indore. He
[7] M. Izal, G. Urvoy-Keller, E.W. Biersack, P. Felber, A. worked as a research engineer in ISRO Satellite Center, Dept. of
Al Hamra, and L. Garcés-Erice. Dissecting BitTorrent: Space, Bangalore, India, during 1979-83. Since Jan. 1990, he is a
professor with the School of Computer Science at Devi Ahilya
Five Months in a Torrent’s Lifetime. In Proceedings of
University. He was associate professor at University Putra
Passive and Acrive Measurements Conference, April Malaysia, Dept. of Computer Science during May95 toMay99.
2004. During Sept 2005- July 2006, He was with the College of
[8] Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki Computer Science and Information Technology, at King Faisal
Cho, and Mario Gerla. BlueTorrent: Cooperative University (KFU), Kingdom of Saudi Arabia. He has guided 13
Content Sharing for Bluetooth Users,. In Proceedings PhDs in different areas of Computer Science and Information
of PerCom, NY, USA, March 2007. Technology and has authored about 70 research papers.
[9] Gunnar Karlsson, Vincent Lenders, and Martin May.
Delay-Tolerant Broadcasting. In Proceedings of the
20 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
Abstract: Future legacy evolution has always been a great This work is motivated by migration approach suggested in
challenge because of continuous changes in business operation [11] that explains why a module based migration approach
influenced by requirements changes, production of large can be implemented for software maintenance, paper also
commercial benefits, information and communication
technologies development. Usually legacies are not been made to
suggested in this direction but with legacy technical aspects
accommodate these fast changing advancements, this is one of and implantation procedures.
the basic challenge of legacy evolution and renovation also
requires forward and backward procedures and specific
knowledge generation for renovators. Web enabling legacy and 3. Modularization
COBOL based applications interaction with e-commerce based Following fig. 1 depicts how the legacy source is divided in
application is potentially hard to maintain and loss huge
to interacting modules.
amount of organizational economical assets, this paper proposes
the solutions procedures in this evolutionary direction so that on
demand legacy evolution can be performed through adaptive
maintenances.
1. Introduction
This paper presents a closer look at software renovation and
explains how legacy software evolutions take place for
future change. It is based on the view that an organization's Figure 1: Dividing legacy source in modules
software systems provide valuable functionality that has
been proven in practice. As such, it should be reused Following are some identified issues associated with this
whenever possible. At the same time, the packaging of this procedure:
business functionality is usually far from optimal as they are
often based on old languages, database systems, and • Availability of legacy sources.
transaction monitors, monolithic in design, and non • Language used to develop legacy source.
maintainable as a result of repeated modification without • Complexity of source understanding and
supporting documents. As a consequence, legacy systems comprehension.
are very hard to change. • Status of documentation and complexity in re-
documentation.
A software system can be effectively evolved with following • Implementation of the tools for analysis and results
procedures: description.
• Modularization • Check feasibility of division of modules.
• Restructuring
• Analysis If division of source in modules is feasible and above
mentioned issues are resolved then undertake next sequence
• Reformation of procedural approach.
• Transformation.
Procedures proposed are explained in the following sections.
4. Restructuring
2. Related Work Intercommunication of the modules using organized of
architecture is to replace the internal structure of the legacy
(IJCNS) International Journal of Computer and Network Security, 21
Vol. 2, No. 3, March 2010
source. Legacy modules are wrapped to interact with the The interactive search for modules can have any one of a
organized architecture, appear as modules. This process is number of different starting points.
only forward process since the only modifications made to
the legacy are: • The first is to interview, if possible, the users,
• Division in sub-modules. maintainers, and designers of the legacy system in order to
• Wrapping of the modules and major parts of the get a picture of the overall functionality of the system, and,
legacy remain untouched. more specifically, to get an impression which functionality
should be preserved and which is redundant.
5. Analysis of Legacy Source • The screen /reports sequence can be identified, together
with the key strokes leading to each subsequent
The objective is to examine the sources of the legacy system
screen/reports. Such screen/reports sequences are very close
and extract information from them that reveals their purpose
to use cases, telling what actions an end user performs.
and architecture.
Moreover, following the flow of screen input fields through
the program identifies those program slices that implement
the given use case. This form of analysis can very well be
5.1 Analysis Methods for Legacy Sources
supported by automated, interactive, tools.
The objective of analysis is to extract information from
legacy source that presents their purpose, and architecture.
• Techniques for combining legacy elements into original
Analysis techniques are crucial for before and further
ways in order to arrive at coherent modules include concept
procedures, this section covers those analysis techniques that
analysis and cluster analysis. Such techniques can be used to
can help to find candidate modules for reformation and
spot combined usage of pieces of data and functionality. For
development in a legacy system.
example, they can be used to group data elements into
candidate classes, based on their usage in programs or
Tools collect all classes of information about the system,
procedures which can then be made into methods of the
which is used by the renovation engineer to find candidate
derived class. In particular concept analysis can be used to
modules. There is no single way to find all good modules
display the various combination possibilities in a concise
therefore the tools should provide many different views on
and meaningful manner.
one legacy source system, and show potential combinations
of these views. This requires a hypertext-based browsing
• Search for modules of specific functions, for example, a
mechanism, potentially supported by intelligent agents and
module for valuing insurance options. A hypertext-based
automata producing specialized reports, as well as an on
legacy browsing system can provide various starting points
line explanation mechanism.
for such a search, such as indexes on words occurring in
comments, column names, inferred types, and so on.
22 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
The reformation automata have usually three inputs: In those cases that the decision is to perform a detailed
• The sources of the legacy system. reformation based on the existing code modules, typically
• The repository resulting from the system analysis when much useful business logic is contained in its
phase. transformation techniques may be applied to the code of the
• A set of Automata Detailed Requirements module.
specifications for Transformation.
The issues associated with this procedure are:
The crucial elements in successful reformation tools are:
(IJCNS) International Journal of Computer and Network Security, 23
Vol. 2, No. 3, March 2010
• Transformation intended for code improvement and [6] M. Fowler, K. Beck, J. Brant, W. Opdyke, and D.
applying uniform layout conventions, goto Roberts. Refactoring: Improving the Design of Existing
elimination, code restructuring, and dead code, Code. Addison-Wesley, 1999.
dead data elimination etc. [7] I. Jacobson, M. Griss, and P. Jonsson. Software Reuse;
• Transformation intended for replacement of certain Architecture, Process and Organization for Business
properties of the code and change of the user- Success. Addison Wesley, 1997.
interface or the database engine etc. [8] C. Jones. Applied Software Measurement: Assuring
• Full translation of the code to another language or Productivity and Quality. McGraw-Hill, 1991.
platform and conversion between COBOL dialects [9]Oluwaseyi Adeyinka, “Service Oriented Architecture &
or translation from obsolete 4GL to standard 3GL. Web Services: Guidelines for Migrating from Legacy
Systems and Financial Consideration” Master thesis,
Blekinge Institute of Technology, 2008.
8. Conclusion
[10] M. Simos.Organization domain modelling (ODM)
The work presented in this paper provides the procedural guidebook version 2.0. Technical Report STARS-VC-
integrated approach to overcome the major challenges for A025/001/00, Synquiry Technologies, Inc, 1996. URL:
future business operations which are the alignment with http://www.synquiry.com/. 450 pp.
changing business goals and changing technologies, while [11] B. Meyer and C. Mingins. Component-base
retaining the assets legacy systems which supporting today's development: From buzz to spark. IEEE Computer,
business operations. It is also discussed the automated 23(7):35-37, 1999.
analysis and transformation of legacy systems. The [12] Dr. Vladimir Bacvanski, An Object-Oriented,
necessary techniques for analysis, transformation, and Component-based, Approach to Migrating Legacy
reformation of legacy systems were also discussed. Paper Systems, 2004.
also concludes that the legacy evolution is an economically
motivated task and legacy is a valuable asset for
organization and business operations. Discussed approach Authors Profile
focuses on modularization of whole legacy system, issues
and propose the successive development procedure for the
affective evolution. Dr. Shahanawaj Ahamad is an
active academician and researcher
References in the field of Software Reverse
Engineering with experience of ten
[1] A.V. Aho, R. Sethi, and J.D. Ullman. Compilers. years, working with King Saud
Principles, Techniques and Tools. Addison Wesley, University’s College of Arts and
1986. Science in Wadi Al-Dawasir,
[2] G. Visaggio, Value-based decision model for renovation K.S.A. He is the member of various
processes in software maintenance, Annals of Software national and international academic and research groups, member
Engineering, 9, Kluwer Academic Publishers, May of journal editorial board and reviewer. He is currently working on
2000, pp 215-233. Legacy Systems Migration, Evolution and Reverse Engineering,
[3]G. Visaggio, Ageing of a Data-Intensive Legacy System: published more than twenty papers in his credit in national and
Symptoms and Remedies, Journal of Software international journals and conference proceedings. He holds M.
Maintenance: Research and Practice, John Wiley; vol. Tech. Degree in Information Technology followed by Ph.D. in
13, pp. 281-308, 2001. Computer Science major Software Engineering, supervised many
[4]C. Szyperski. Component Software; Beyond Object- bachelor projects and master thesis.
Oriented Programming. Addison-Wesley, 1998.
[5] E. Stroulia, M. El-Ramly, L. Kong, P. Sorenson, and B.
Matichuck. Reverse engineering legacy interfaces: An
interaction-driven approach. In 6th Working
Conference on Reverse Engineering, WCRE'99, pages
292-301. Society, 1999.
24 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
Abstract: In aerospace and defense, maintenance is being (Eric Jorgensen, 1994). The information in these manuals is
carried out using technical manuals in hardcopy. Manuals presented in a window frame with navigation tools for
in hardcopy format are very difficult to carry, access zooming and panning allowing easy comprehension.
information and understand while carrying out Information is displayed based on the
maintenance. This paper brings out the concept of
Interactive Electronic Technical Manuals that can run on
Wearable Computers making maintenance more effective
while reducing the effort involved. Manuals are now
compact and easy to handle, easier to access, can be read
in a systematic manner and easily comprehendible.
1. Introduction
An aircraft is required to be maintained in airworthy
condition. During maintenance of aircrafts, a technician is
often required to refer manuals for maintenance procedures. Figure 1. Interactive Electronic Technical Manual
These manuals are at present in hardcopy consuming time
to access the relevant information. These hardcopy manuals
can be replaced by Interactive Electronic Technical Manuals 3. Need for Interactive Electronic Technical
(IETM) and accessed using wearable computers improving Manuals (IETMs) when compared to Paper-
the performance of technicians by increasing accessibility to Based Manuals
information. Moreover these technicians can receive the
latest information updates electronically without waiting for • Information can retrieved easily
the amended manuals in hardcopy. Following are the • Since information is presented in electronic form, less
objectives to be obtained by using Interactive Electronic storage would be required
Technical Manuals instead of paper-based manuals: • As in the case of hardcopies, pages will not be subject to
• 100% identification of causes of problems (fault wear and tear
isolation) • IETMs can be easily loaded into portable and wearable
• Time spent in solving the problem (troubleshooting) computers which maintenance personnel can take to the
decreased by 20 - 25% field
• Error reduction in performing removals and • Difficult procedures can be integrated with multimedia
replacements by 35 - 40% elements like video and animations to make
understanding easier
2. Interactive Electronic Technical Manuals • Information on various configurations of equipments can
(IETMs) be maintained and displayed by storing only the
difference
Interactive Electronic Technical Manuals (IETMs) are
• The IETM can be used as a basis for developing
manuals in electronic format with interactivity designed for
Computer based training Packages on the same subject
display on computers. An IETM is intended to be the
functional equivalent of a paper-based Technical Manual
and in most cases a total replacement for the paper manual
(IJCNS) International Journal of Computer and Network Security, 25
Vol. 2, No. 3, March 2010
Viewer Module
To view manuals by clicking on their respective
chapters, sections and subsections
Features:
• User Authentication – to enter the Viewer a user is
prompted to enter the login identification (ID) and
password
• Split Window - to view text pages and corresponding
illustrations simultaneously
• Image Viewer - to pan and zoom illustrations
Figure 2. IETMs compared to Paper-Based Manuals • Safety Notes - warnings, cautions and notes used in the
manual to be displayed in separate windows to alert
4. Types of Interactive Electronic Technical users on their importance
Manuals • Acronyms and Abbreviations - Glossary containing the
list of acronyms and abbreviations used in the manuals
• Page images obtained by scanning in rater format with • Find – to search for a specific word in a page
the table of contents, list of tables, list of figures and • Search – to search for a specific word within manuals
index hyperlinked to the respective contents of the • Notes – facility for users to create their own notes while
manual. A user can select a topic from the table of browsing
contents and the respective raster page is displayed. The • History Back and Forward – keeps a track of the order of
page orientation of the manual is retained and it can be pages that have been visited by the user
viewed and directly printed as per format specifications.
• Bookmark- allow a user to bookmark a page to return to
• An ASCII or PDF document in a scrolling text window. it later
In addition to the above hyperlinks it also contains
• Print - to print a desired chapter, section or subsection
hyperlinks to sections, tables and figures. This document
• Help – to guide the user how to use this Viewer Module
can be linked to video, audio and external applications.
May contain raster and vector graphics. Bookmarks,
search and sticky notes are provided. The manual can be
6. Manuals commonly used in IETM
viewed and directly printed as per format specifications. Maintenance Manual
• SGML files with the content structured so that it can be The description and operation of each aircraft system is
viewed as smaller logical blocks of text with very limited explained in this manual with procedures for removal and
use of scrolling. It is viewed as an indexed PDF file. installation of assemblies that constitute that system.
• The information authored is fully structured and Procedure for repair and cleaning is also included along
hierarchical. In a relational database data tagged with with inspection and testing.
SGML is stored to prevent data redundancy and enforce
Illustrated Parts Catalogue
26 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
The assemblies along with their respective parts are A wearable computer is a potential platform for many
mentioned in this manual. Each part has a unique part different applications that require privacy, mobility and
number, nomenclature and the quantity of that part in the continuous access to information (Lehikoinen, 2002).
assembly. Vendor that supplies this part is also mentioned.
Flight Manual
The description and operation of each aircraft system is
explained in this manual. Recommended procedures for
normal operations and emergencies are mentioned. Figure 3. WT4000 wearable computer with a scanner
attachment
Consumable Products Manual
For each aircraft system, the list of consumables The WT4000 is 5.7 inches in length, width 3.7 inches
required to carry out maintenance of that system. The part and height of 1.0 inches, weighing approximately 390.2
number, which is unique along with the nomenclature and grams. It has a keyboard consisting of 23 alphanumeric keys
quantity, are mentioned in this manual. and a memory (FLASH/RAM) of 64/128 MB. The display
type is a backlit color TFT having a display resolution of
Master Servicing Schedules QVGA in landscape mode (320x240). The operating system
This manual covers the preventive maintenance is Microsoft Windows CE 5.0 Professional Version. It can
operations to be carried out to maintain the aircraft in be operated in temperatures ranging from -20° to 50° C and
airworthy condition. It also includes basic servicing, can withstand multiple drops on concrete from a height of 4
component replacements and unconditional inspections and feet. Optional accessories include wearable scanners RS309
checks. and RS409.
(fault isolation) from 58% to 100% to handle, easier to access, can be read in a systematic
• Time spent in solving the problem (troubleshooting) manner and easily comprehendible.
decreased by 23%
• Error reduction in performing removals and
replacements by 36%
Correct identification of 5 9
causes of 9 problems (faults)
10. Conclusion
The metrics collected for maintenance being carried out
on a Military Helicopter and Transport Aircraft using
IETMs on Wearable Computers are analyzed and following
are the benefits
• 100% identification of causes of problems (fault
isolation)
• Time spent in solving the problem (troubleshooting)
decreased by 20 - 25%
• Error reduction in performing removals and
replacements by 35 - 40%
In conclusion Interactive Electronic Technical Manuals
run on Wearable result in manuals being compact and easy
28 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
4. Remote Control Architecture The path planner generates the path using as input the goal,
the mobile system localization and the global map of the
3.4 Control architecture environment.
Humans are sophisticated autonomous agents that are able The reactive part of our architecture, based on couples of
to function in complex environments through a combination agents perception / action, allows the mobile system to react
of reactive behavior and deliberative reasoning. Motivated facing the unforeseen events (Figure 5).
by this observation, we propose a hybrid control
architecture, called EAAS [7] for EAS (Equipe Architecture
des Systèmes) Architecture for Autonomous System. Our
architecture combines a behavior-based reactive component
and a logic-based deliberative component. EAAS is useful in
advanced mobile systems that require or can benefit from
highly autonomous operation in unknown environment,
time-varying surroundings, such as in space robotics and
planetary exploration systems, where large distances and
communication infrastructure limitations render human
teleoperation exceedingly difficult.
The proposed generic architecture consists in associating a
deliberative approach for the high part and a reactive
approach for the low part. The deliberative part or
Figure 5. Reactive Part of the EAAS Architecture
hierarchical agent allows decision-making and actions
planning thanks to the use of the agent selection of actions
(Figure 4). This last is composed of three levels: pilot, 3.5 Remote control software architecture
navigator and path planner. A Software architecture has been defined to make remote
control of mobile systems possible. Our software
architecture is based on a set of independent agents running
in parallel.
On the left side of figure 6, the server side is represented. It
is basically composed of three main agents: “Connection
Manager” which manages the different connected clients
according to a Control Algorithm. This one is chosen by the
designer of the system depending on the application:
master/slave, priority, timeout... The “Media” agent
communicates with the camera in order to broadcast signals
(video, images) of the mobile system in its environment.
The “SMA EAAS” (EAS Architecture for Autonomous
Systems) which represents our control architecture. EAAS
architecture is a hybrid control architecture including a
Figure 4. Actions Selection Agent deliberative part (Actions Selection Agent) and a reactive
part. The reactive part is based on direct link between the
The pilot generates the setting points needed for action sensors (Perception Agent) and the effectors (Action Agent).
agent, based on a trajectory provided as an input. This
trajectory is expressed in a different frame (e.g. Cartesian
frame) from that of the setting points. This trajectory
describes, in time, the position, kinematics and/or dynamic
parameters of the mobile system in its workspace. The pilot
function is to convert these trajectories into setting points to
be performed by the action agent. The navigator generates
the trajectories for the pilot based on data received from the
upper level. These input data are of a geometrical type, still
in a Cartesian frame, but not necessarily in the mobile
system frame. Moreover, these data do not integrate
dynamics or kinematics aspects; contrary to the trajectory,
there is not a strict definition of the velocity, the
acceleration or the force versus time. These input data are
called path – continuous or discontinuous – in cartesian Figure 6. Remote control software architecture proposed
frame. The navigator must translate a path into a trajectory.
(IJCNS) International Journal of Computer and Network Security, 31
Vol. 2, No. 3, March 2010
The right side of the figure represents the client side. Agents standard Internet protocols. First, the communication is
are loaded in a web navigator. The “Remote Client” based on the HTTP protocol, through a home page linking
corresponds to a graphical user interface which allows the the applets used to move the mobile system. These applets
user to send orders to the mobile system and receive are interpreted by the JVM of the browser. Then, the applets
information about the environment. “Sender” and downloaded on the client communicate with the application
“Receiver” agents are used to allow the communication server through the TCP/IP protocol.
between the client and the server. “Pinger” and “Ponger”
agents are used to observe dynamically the network. If the
connexion is accepted, the “Connection Manager” will
inform the “Local Client” agent which achieves the
interface with the “SMA EAAS” to transmit orders
transmission to the mobile system.
5. Application
The mobile system used in our application is a Lego robot.
Lego Mindstorms [8] is a development kit for
manufacturing a robot using Lego blocks, and is gaining
widespread acceptance in the field of technical education.
By using a Mindstorm, a robot can be manufactured for
various purposes and functions. It is beginning to be
considered as a component of experimental equipment in
robotics research.
The Lego mobile robot (Figure 7) is powered by three
reversible motors coupled to wheels and equipped with four
sensors: sonar sensor, sound sensor, light sensor and touch
sensor. The data produced by these sensors are used by Figure 8. Web Interface
perception agent to build a global map of the Lego robot
environment’s. This global map, the goal and the Lego The remote users can pass online tests of knowledge in
robot localisation are used by the actions selection agent to order to follow a formation answering to their needs.
define a plan of actions to achieve its mission. The Lego Different modules of formation (Cursus link) are available
robot is equipped with Bluetooth connection that permits the on our web site, to know: remote control, multi-agents
communication with the application server and facilitates its systems, systems architecture, control architecture and
displacement in the environment in order to reach its autonomous mobile system. We have also set to the remote
objective. users a discussion forum within our application to
interchange their ideas over the remote control subject.
6. Conclusion
In this paper, we have presented a Web-based remote
control application so that Internet users, especially
researchers and students, can control the mobile robot to
explore a dynamic environment remotely from their home
and share this unique robotic system with us. In the first
part, an analysis of the existing control architectures and the
approaches for their development has guided us to design a
hybrid control architecture. It is called EAAS for EAS
Architecture for Autonomous System. The proposed generic
Figure 7. General Architecture architecture consists in associating a deliberative approach
for the high level and a reactive approach for the low level.
The Web interface of our application is designed with the The deliberative level allows decision-making and actions
intention of making the remote control easy for researchers planning thanks to the use of the agent selection of actions.
and students in order to interact with the Lego mobile robot. The reactive level, based on couples of agents perception /
A simple interface is designed to provide as much action, allows the mobile system to react facing the
information as possible for remote control. This user unforeseen events. Then, the software implementation of our
interface consists of several Java Applets as shown in Figure architecture was presented. It is achieved under the shape of
8. It can work on any web browser. a multi-agents system by reason of its autonomy,
The link between client(s) and server is based on two intelligence, flexibility and the various possibilities of
32 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
evolution. In the second part, in order to validate the choice Adil Lebbat received his Degree in High
of our architecture, we presented one of applications Education Deepened in Network & Telecom
in 2004 from the chouaib doukkali
achieved by the system architecture team of the ENSEM.
university, Eljadida, Morocco. In 2006 he
rejoined the system architecture team of the
ENSEM. Her main research is mainly about
References real time distributed platform based on
multi agents systems: Application based on
[1] P. Le parc, J. Vareille and L. Marce, “E-productique ou the core Linux for products of
contrôle et supervision distante de systèmes telecommunications.
mécaniques sur l’Internet”, Journal européen des
systèmes automatisés (JESA), Vol. 38, n° 5, pp. 525-
558, 2004.
[2] C. Novales, G. Mourioux and G. Poisson, “A multi- Hicham Medromi received the PhD in
level architecture controlling robots from autonomy engineering science from the Sophia
to teleoperation”, First National Workshop on Antipolis University in 1996, Nice, France.
He is responsible of the system
Control Architectures of Robots. Montpellier. April
architecture team of the ENSEM Hassan II
6,7 2006. University, Casablanca, Morocco. His
[3] R. Alami, R. Chatila, S.Fleury, M.Ghallab and actual main research interest concern
F.Ingrand, “An architecture for autonomy. The Control Architecture of Mobile Systems
International Journal of Robotics Research”, Special Based on Multi Agents Systems. Since
Issue on Integrated Architectures for Robot Control 2003 he is a full professor for automatic
and Programming, vol. 17, n° 4, pp. 315-337, 1998. productic and computer sciences at the
[4] J. Ferber, “Multi-Agent Systems: An Introduction to ENSEM, Hassan II University, Casablanca.
Distributed Artificial Intelligence”, Addison Wesley
Longman, Harlow, UK, 1999. Fatima Qrichi Aniba received an electrical
Engineer’s degree from the ENSAM in 2003
[5] A. Sayouti, F. Qrichi Aniba and H. Medromi, “Remote
Meknes, Morocco. In 2005 she got her
Control Architecture over Internet Based on Multi Degree in High Education Deepened in
agents Systems”, International Review on Computers automatic productic from the ENSEM,
and Software (I.RE.CO.S), Vol 3, n° 6, pp. 666 – Hassan II University, Casablanca, Morocco.
671, November 2008. In 2005 she rejoined the system architecture
[6] A. Sayouti, “Conception et Réalisation d’une team of the ENSEM. Her main research is
Architecture de Contrôle à Distance Via Internet à mainly about Real Time Architecture Based
Base des Systèmes Multi-Agents”, Phd. Thesis, on Multi Agents Systems.
ENSEM, Hassan II University 2009.
[7] A. Sayouti, H. Medromi, F. Qrichi Aniba, S. Benhadou
and A. Echchahad, “Modeling Autonomous Mobile
System with an Agent Oriented Approach”,
International Journal of Computer Science and
Network Security (IJCSNS), Vol 9, n° 9, pp. 316 –
321,September 2009.
[8] LEGO Company, “Lego mindstorms official page”,
http ://mindstorms.lego.com, 1997.
Authors Profile
Adil Sayouti received the PhD in
computer science from the ENSEM,
Hassan II University in July 2009,
Casablanca, Morocco. In the same year he
received the price of excellence of the best
sustained thesis in 2009. In 2003 he
obtained the Microsoft Certified Systems
Engineer (MCSE). In 2005 he joined the
system architecture team of the ENSEM,
Casablanca, Morocco. His actual main
research interests concern Remote Control over Internet Based on
Multi agents Systems.
(IJCNS) International Journal of Computer and Network Security, 33
Vol. 2, No. 3, March 2010
Abstract: In this paper, we study about the resource allocation same desired range (2) Spacial reuse: since transmission is
techniques in wireless network ,thus describing utility based focused in a particular direction, the surrounding area in the
functions and various protocols using directional antenna .In other directions can still be used by other nodes to
other words the stud is based on utility-based maximization for communicate ,now coming back to the point of throughput
resource allocation. We consider two types of traffic, i.e., best and fairness required in resource allocation .
effort and hard QoS, and develop some essential theorems for “Throughput” and “fairness,” however, are conflicting
optimal wireless resource allocation. Directional antenna
performance metrics. To maximize system throughput, the
technology provides the capability for considerable increase in
spatial reuse which is essential in the wireless medium. In this
system will allocate more resource to the users in better
paper, a bandwidth reservation protocol for QoS routing in channel conditions. This may cause radio resource
TDMA-based MANETs using directional antennas is presented. monopolized by a small number of users, leading to
The routing algorithm allows a source node to reserve a path to unfairness. On the other hand, to provide fairness to all
a particular destination with the needed bandwidth which is users, the system tends to allocate more resource to the users
represented by the number of slots in the data phase of the in worse channel conditions so as to compensate for their
TDMA frame. The performance of the proposed schemes is shares. As a result, the system throughput may be degraded
evaluated via simulations. The results show that optimal dramatically. The work in [6-7] show that the system can
wireless resource allocation is dependent on traffic types, total behave either throughput-oriented” or “fairness oriented” by
available resource, and channel quality, rather than solely adjusting certain parameters. However, they do not describe
dependent on the channel quality or traffic types as assumed in
how to determine and justify the value of these parameters,
most existing work. Further optimizations to improve the
leaving this trade-off unsolved.
efficiency and resource utilization of the network is provided.
In this paper, we focus on basic techniques required for
Keywords: Utility-based maximization, wireless networks, resource allocation in wireless networks .through the work
resource allocation, , Mobile ad hoc networks (MANETs), quality we came to the basic two factors which are to be resolved ,
of service (QoS), routing, time division multiple access (TDMA). 1)the first factor relates “user satisfaction” for resource
allocation to avoid such a “throughput-fairness” dilemma
Since it is unlikely to fully satisfy the different demands of
all users, we turn to maximize the total degree of user
1. Introduction satisfaction. The degree of user satisfaction with a given
RESOURCE allocation is an important research topic in amount of resource can be described by the utility function
wireless networks [1-7]. In such networks, radio resource is U(r), a non-decreasing function with respect to the given
limited, and the channel quality of each user may vary with amount of resource r. The more the resource is allocated, the
time. Given channel conditions and total amount of more the user is satisfied. The marginal utility function
available resource, the system may allocate resource to users defined by u(r) = dU(r) dr is the derivative of the utility
according to some performance metrics such as throughput function U(r) with respect to the given amount of resource r.
and fairness [1], [2] or according to the types of traffic The exact expression of a utility function may depend on
[3].but another foremost factor that is required in wireless traffic types, and can be obtained by studying the behavior
network is spatial reuse of network. In order to and feeling of users. We leave the work of finding utility
communicate with another node in a particular location, a functions to psychologists and economists, and focus on
node that is transmitting using an omnidirectional antenna maximizing the total utility for a given set of utility
radiates its power equally in all directions. This prevents functions. and 2) the second factor link to the directional
other nodes located in the area covered by the transmission antennas There are different models that are presented in
from using the medium simultaneously. For this purpose the literature for directional antennas [8].In this paper, the
directional antennas are used. Directional antennas allow a multi-beam adaptive array (MBAA) system is used [1]. It is
transmitting node to focus its antenna in a particular capable of forming multiple beams for simultaneous
direction. Similarly, a receiving node can focus its antenna transmissions or receptions of different data messages.
in a particular direction, which leads to increased sensitivity The rest of the paper is organized as follows. In Sec. II,
in that direction and significantly reducing multi-path resource allocation in wireless networks through utility
effects and cochannel interference (CCI). This allows functions are proposed and proved to be optimal under
directional antennas to accomplish two objectives: (1) Power certain conditions while In Sec. III, resource allocation in
saving: a smaller amount of power can be used to cover the wireless networks through directional antennas Finally, the
paper is concluded in Sec. IV.
34 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
The utility function for user i with hard QoS traffic is 4) If the queue is not empty, then pop out the QoS user i at
described by where the head of the queue; else go to Step (8).
is a unit-step function, is the channel quality of this user, 5) For the popped user i: if ≥ , then = ;else
Mi is the kind of QoS traffic, is the preferred amount of
= 0; go to Step (4).
resource to be allocated.
6) Δ = − .
7) If (Δ > 0), then = − ; go to Step (4); else
= 0; go to Step (8);
8) If ( ) < (0), then = ( ));else = 0.
The allocation rule of this mixed allocation is to: 1) allocate
resource to the first k QoS users at the sorted queue, and 2)
then allocate the residual bandwidth (i.e., − ) to
all best effort users based on the elastic allocation. The
value of k is determined based on the requirement that there
is sufficient resource for this QoS user and the utility gain
Figure 2. Allocation ordering of k users in the HQ ΔUk is positive (i.e., − > 0) .
allocation.
2.2 Resource Allocation Using Directional Antennas
2.1.3 . Elastic Allocation for Best Effort Traffic Medium Access Protocols (MAC) protocols for directional
We next consider the best effort traffic. The resource antenna systems can be classified into two categories: on
allocation algorithm for users with concave utility functions demand and scheduled. In the on-demand scheme nodes
is referred to as the elastic allocation and the output is must exchange short signals to establish a communication
denoted by = {r 1, r 2 ,∙∙∙, r n }. Given the total session.
available resource , the channel quality qi and
marginal utility function for each user i, can
be obtained as follows.
1) For each user i, derive , the inverted function of
.
2) Derive , by summing up , over all users i,
i.e, = .
3) Find , the inverted function of .
4) Find , which is equal to ).
5) For all , i = 1, 2, · · · , n,if < (0), then =
; else = 0.
Figure 3. An example of mixed allocation
The allocation rule of this scheme is to 1) derive the
aggregated utility function from the inverse functions of all Data message transmission is done using the
users, 2) calculate the allocated marginal utility from the omnidirectional mode, and reception is done using the
aggregated utility function, and 3) determine for each directional mode. Directional antennas are used to transmit
user. request-to-send (RTS) and receive clear-to-send (CTS)
signals while the receiver antenna remains in the
2.1.4 Mixture of Hard QoS and Best Effort Traffic omnidirectional mode during this exchange. In [13],
Finally, we consider the co-existence of QoS and best effort communicating pairs are set up using the multi-beam
traffic in the system, which is referred to as mixed forming ability of directional antennas. through cashing of
allocation and the output of which is denoted by = {r 1 , the angle of arrival (AoA), Takai [14] avoided the use of the
r 2 , ∙∙∙ , r n }. omnidirectional mode, which is only used when the AoA
Let denote the amount of residual resource to be given to information is not available.
best effort traffic, and ΔUi, the utility gain by allocating
resource to QoS user i. Other notations remain the same as
in the HQ and the elastic allocations. Given the total
available resource , the channel quality and
marginal utility function for each user i, can be
obtained as follows.
1) Initialize ri ← 0, i = 1, 2, · · · , n ; and ← . Figure 4 . (a) Transmission pattern of an omnidirectional
2) Sort all QoS users i in descending order of , and antenna. (b) Transmission pattern of a directional antenna.
store them in the queue.
2.2.1 Directional Antenna System Assumptions And
3) For each best effort user j, derive from ;
Definitions
Find by summing up over all users j; In this paper, it is assumed that each node in the network is
Find , the inverted function of . equipped with an MBAA-antenna system. Each antenna is
capable of transmitting or receiving using any one of k
36 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
beams which can be directed towards the node with which directional antenna systems. Each node keeps track of the
communication is desired. In order for node x to transmit to slot status information of its 1-hop and 2-hop neighbors.
a node y, node x directs one of its k antennas to transmit in This is necessary in order to allocate slots in a way that does
the direction of node y, and node y in turn directs one of its not violate the slot allocation conditions imposed by the
k antennas to receive from the direction of node x. nature of the wireless medium and to take the hidden and
Radio signals transmitted by omnidirectional antennas exposed terminal problems into consideration.
propagate equally in all directions. On the other hand,
directional antennas install multiple antenna elements so 2.2.3 Slot Allocation Conditions For Directional
that individual omnidirectional RF radiations from these Antennas
antenna elements interfere with each other in a constructive A time slot t is considered free to be allocated to send data
or destructive manner. from a node x to a node y if the following conditions are
true:
1) Slot t is not scheduled to receive in node x or scheduled to
send in node y, by any of the antennas of either node (i.e.
antennas of x must not be scheduled to receive and antennas
of y must not be scheduled to transmit, in slot t).
2) Slot t is not scheduled for receiving in any node z, that is
a 1-hop neighbor of x, from node x where y and z are not in
the same angular direction with respect to x (i.e. ∩
Figure 5. Transmission pattern of an MBAA antenna ≠ ).
system with k=4 beams. Each of the k beams can be oriented 3) Slot t is not scheduled for receiving in node y from any
in a different desired direction. The figure shows: (a) Beams node z, that is a 1-hop neighbor of x, where x and z are in
in transmission mode. (b) Beams in reception mode. the same angular direction with respect to y (i.e. ∩ ≠
).
This causes the signal strength to increase in one or multiple 4) Slot t is not scheduled for communication (receiving or
directions. The increase of the signal strength in a desired transmitting) between two nodes z and w, that are 1-hop
direction and the lack of it in other directions are modeled neighbors of x, where w and y are in the same angular
as a lobe. The angle of the directions, relative to the center direction with respect to z (i.e. ∩ ≠ ), and x and z
of the antenna pattern, where the radiated power drops to are in the same angular direction with respect to w (i.e.
one-half the maximum value of the lobe is defined as the ∩ ≠ ).
antenna beamwidth, denoted by β [9]. With the In Figure6, which illustrates allocation rule 2, node x cannot
advancement of silicon and DSP technologies, DSP modules transmit to node y using slot t, because it is already using
in directional antenna systems can form several antenna slot t to transmit to node z, which is in the same angular
patterns in different desired directions (for transmission or direction as node y. In Figure7, which illustrates allocation
reception) simultaneously. Figure 4(a) shows the rule 3, node x cannot allocate slot t for sending to node y
transmission patterns of an omnidirectional antenna. Figure because slot t is already scheduled for sending from node z,
4(b) shows the transmission pattern of a directional antenna that is a 1-hop neighbor of x, and ∩ ≠ . In Figure
.In this paper, it is assumed that an MBAA antenna system 9, which illustrates allocation rule 4, slot t cannot be
is capable of detecting the precise angular position of a allocated to send from x to y because it is already scheduled
single source for locating and tracking neighbor nodes. for communication between two nodes z and w, that are 1-
Figure 5 shows a node equipped with an MBAA antenna hop neighbors of x, where ∩ ≠ and ∩ ≠
array with k=4 beams. Each of the k beams is able to be . When a node S wants to send data to a node D, with a
oriented in a different desired direction. Figure 5(a) shows bandwidth requirement of b slots, it initiates the QoS path
the antenna array in the transmission mode, and Figure 5(b) discovery process
shows the antenna array in the reception mode.
Node S determines if enough slots are available to send the schemes proposed in [18-19] are the examples of the
from itself to at least one of its 1-hop neighbors. If that is ”fairness” scheme (i.e., α = − 1), and the GR+ scheme in [9]
the case, it broadcasts a QREQ(S, D, id, b, x, PATH, NH) to is an example of the ”throughput” scheme. Fig. 8(a)
all of its neighbors. The message contains the following compares the proposed HQ allocation with different
fields: allocation schemes, and Fig. 9(b) compares the proposed
• S, D and id: IDs of the source, destination and the session. elastic allocation with different allocation schemes. Note
The (S,D, id) triple is therefore unique for every QREQ that the axis of in Fig. 9(b) is in the logarithmic scale.
message and is used to prevent looping. Theresults show that the ”throughput-first” scheme has a
• b: Number of slots required. higher total utility when is small, but the ”fixed”
• x: The node ID of the host forwarding this message. allocation one is closer to the proposed scheme as
• PATH: A list of the form (( ). It increases. Finally, when becomes very large, the
contains the accumulated list of hosts and time slots, which ”fairness-first” scheme can achieve the highest utility. In
have been allocated by this QREQ message so far? is the order to verify, and analyze the performance of the
ith host in the path, and is the list of slots used by to directional antennas (protocols presented in paper),
send to . Each of the elements of contains the slot simulation experiments were conducted. Several
number that would be used, along with the corresponding performance measures were computed as the traffic rate
the set of angular groups, , which represents the (messages/second) is varied. The measured parameters are
direction in which the sending antenna of host i must be the overall percentage of packets received successfully, the
pointed, during that slot, to send data to host i + 1. average number of requests per successful acquisition of
• NH: A list of the form (( ). It QoS path , The average number of requests per session, and
contains the next hop information. If node x is forwarding the average QoS path acquisition time
this QREQ message, then NH contains a list of the next hop
host candidates. The couple is the ID of the host,
which can be a next hop in the path, along with a list of the
slots, which can be used to send data from x to is a
list of the slots to be used to send from host i to host i+1
along with the angular group for each slot. has the same
format as in PATH.
3. Performance Analysis
(a)
four-antenna case to the two antenna case is 1.84, which is paths due to the extended range of directional antennas
also > 1 and < 2, and the ratio for the four-antenna case to using the same total transmission power compared to the
the one-antenna case is 2.95 which are < 4. This is to be omnidirectional case. In turn this results in reduced end-to-
expected from the theory of parallel and distributed systems end delay. The simulation results clearly show a significant
because the actual speed-up factor is always below the ratio gain in performance with an increase in the number of
of the number of parallel units, or antennas. successfully received packets, as well as a decrease in the
QoS path acquisition time. However, as expected, this gain
in performance is still below the theoretical speed-up factor.
4. Conclusion In the future, we intend to improve this protocol through the
employment of additional optimization techniques. T
his leads us to conclude that existing channel-dependent-
In this paper, we study about two basic method of allocating only resource schemes and schedulers cannot provide
resources in wireless networks the first one Data message optimal allocation in wireless networks. So In addition, we
length:100MB was utility-based maximization for resource intend to perform more simulations in order to further study,
allocation in infrastructure-based wireless networks. analyze and improve the performance of the protocol under
different network environments including different mobility
rates, and traffic conditions.
References
[1] D.Angelini and M. Zorzi, “On the throughput and
fairness performance of heterogeneous downlink
packet traffic in a locally centralized CDMA/TDD
system,” in Proc. IEEE VTC-Fall 2002.
(a) [2] Furuskar et al., “Performance of WCDMA high speed
Packet data,” in Proc. IEEE VTC 2002-Spring.
[3] Y. Cao, V. O. K. Li, and Z. Cao, “Scheduling delay-
sensitive and besteffort traffic in wireless networks,”
in Proc. IEEE ICC 2003.
[4] M. Xiao, N. B. Shroff, and E. K. P. Chong, “A utility-
based power control scheme in wireless cellular
systems,” IEEE/ACM Trans. Netw., vol. 11, no. 2,
2003.
(b) [5] X. Gao, T. Nandagopal, and V. Bharghavan,
Figure 10. Simulation results. “Achieving application level fairness through utility-
based wireless fair scheduling,” in Proc. IEEE
In this we develop some essential theorems for utility- Globecom 2001.
based resource management. Then, three polynomial time [6] F. P. Kelly, “Charging and rate control for elastic
resource allocation algorithms are proposed for two types of traffic,” European Trans. Telecommun., Jan. 1997.
utility functions. We prove that, in any case, the difference [7] V. A. Siris, B. Briscoe, and D. Songhurst, “Economic
between the total utilities obtained by our proposed models for resource control in wireless networks,” in
solutions and the optimal utility is bounded, and under Proc. IEEE PIMRC 2002, Lisbon, Portugal, Sept. 2002.
certain conditions, all these three schemes can achieve the [8] L. Chen, S. H. Low, and J. C. Doyle, “Joint congestion
maximum total utility (i.e., optimal). From the simulation control and media access control design for wireless ad
results, we find that different types of traffic require hoc networks,” in Proc. IEEE Infocom, Miami, FL,
different kinds of schemes to achieve optimal allocation. In March 2005.
addition, when is small, the system tends to allocate [9] L. Bao and J. J. Garcia-Luna-Aceves. Transmission
more resources to the users in better channel conditions, i.e., scheduling in ad hoc networks with directional
”throughput-oriented;” however, when is abundant, the antennas. Proc. of the 8th annual international
system becomes ”fairness-oriented,” meaning that even with conference on mobile computing and networking, pages
the same traffic, the preference tendency between 48–58, September 2002.
throughput and fairness can still differ. The second one was [10] Q. Dai and J. Wu. Construction of power efficient
a protocol for TDMA-based bandwidth reservation for QoS routing tree for adhoc wireless networks using
routing in MANETs using directional antennas The protocol directional antenna. Distributed Computing Systems
takes advantage of the significant increase in spacial reuse Workshops. Proceedings. 24th International
provided by the directional antenna environment, which Conference on, pages 718–722, March 2004.
drastically increases the efficiency of communication in [11] Jawhar and J. Wu. A race-free bandwidth
MANETs. This is due to the reduction in signal reservation protocol for QoS routing in mobile ad
interference, and the amount of power necessary to establish hoc networks. Proc. of the 37th Annual Hawaii
and maintain communication sessions. Additionally, this International Conference on System Sciences
protocol provides for a relatively smaller hop count for QoS (HICSS’04), IEEE Computer Society, 9, January 2004.
(IJCNS) International Journal of Computer and Network Security, 39
Vol. 2, No. 3, March 2010
[12] W.-H. Liao, Y.-C. Tseng, and K.-P. Shih. A TDMA- Algorithms, Compiler Design books for the technical students of
based bandwidth reservation protocol for QoS routing graduation and postgraduation.He has published various research
in a wireless mobile ad hoc network. Communications, papers in National and International journals. He has also
ICC 2002. IEEE International Conference on, attended one faculty development program organized by Oracle
Mumbai on Introduction to Oracle 9i SQL and DBA
5:3186–3190, 2002.
Fundamental.
[13] S.; You J.; Hiromoto R.E.; Nasipuri, A.; Ye. A MAC
protocol for mobile ad hoc networks using directional Vidushi Gupta received her B.tech (C.S)
antennas. Wireless Communications and Networking degree from Uttar Pradesh Technical
Conference, 2000. WCNC. 2000 IEEE, 3(23-28):1214– University, Lucknow.She is also pursuing
1219, September 2000. M.tech from Karnataka University, She is
[14] M. Takai, J. Martin, and R. Bagrodia. Directional working as Lecturer ( CS/IT department) in
virtual carrier sensing for directional antennas in SRMSWCET, and Bareilly She has also
mobile ad hoc networks. In Proc. ACM International attended one faculty development program based on the
“Research Methodologies”.
Symposium on Mobile Ad Hoc Networking and
Computing (MOBIHOC), Lausanne, Switzerland, June
2002.
[15] J. Ward and R.T.Jr. Compton. High throughput slotted
aloha packet radio networks with adaptive arrays.
Communications, IEEE Transactions on, 41(3):460–
470, March 1993.
[16] J. Zander. Slotted aloha multihop packet radio networks
with directional antennas. Electronics Letters,
26(25):2098–2100, December 1990.
[17] C. R. Lin and J.-S. Liu. QoS routing in ad hoc wireless
networks. IEEE Journal on selected areas in
communications, 17(8):1426–1438, August 1999.
[18] Jawhar and J. Wu. Qos support in TDMA-based mobile
ad hoc networks. The Journal of Computer Science and
Technology (JCST), Springer, 20(6):797–810,
November 2005.
[19] Jawhar and J. Wu. Race-free resource allocation for
QoS support in wireless networks. Ad Hoc and Sensor
Wireless Networks: An International Journal, 1(3):179–
206, May 2005
Authors Profile
Dr. Yahpal Singh is a Reader and HOD (CS)
in BIET, Jhansi (U.P.). He obtained Ph.D.
degree in Computer Science from
Bundelkhand University, Jhansi. He has
experience of teaching in various courses at
undergraduate and postgraduate level since
1999. His areas of interest are Computer
Network, OOPS, DBMS. He has authored
many popular books of Computer Science for graduate and
postgraduate level. He has attended many national and
international repute seminars and conferences. He has also
authored many research papers of international repute.
introduced above, the IEEE 802.11 DCF and MACA 3. Spectrum Reuse and the Capture
(Multiple Access Collision Avoidance) also employs a Phenomenon
technique called “virtual” carrier sensing. The virtual
carrier sense technique relies on in-band control frames to The radio spectrum needs to be spatially reused in multihop
deal with hidden terminals. Before sending a data frame in wireless network for improving network through-put. Better
to the idle medium after proper deferrals and back offs, a spectrum reuse allows more transmissions to go on
source sends out a Request to Send (RTS) frame to contact simultaneously in the network without collisions. A
the receiver and reserve the medium a round the source, If phenomenon closely related to spectrum reuse is “capture”
the receiver receives the RTS frame and its channel is which implies that, when two frames collide at a receiver in
determined to be clear, the receiver sends out a Clear to a wireless network, one of the frames may still be correctly
Send (CTS) frame to respond to the sender and reserve the decoded if the received power of the frame is higher than
medium too. The data transmission then begins if the that of the other by a threshold. However, as we now show
handshake and medium reservation process succeeds. the capture effect is not sufficient to eliminate collisions and
Several situations may cause difficulties to the virtual carrier collision detection is required to prevent bandwidth wastage
sensing technique. One of them is the ‘chained’ hidden on corrupted frames. To illustrate the possibility of
terminal phenomenon. Basically, in a data transaction in the collisions in the presence of capture effect, two scenarios are
MAC layer, the CTS frame sent by a receiver to suppress the shown in Figure. 2a and 2b (the nodes are in a line for easy
hidden terminals of the initiating sender may be lost at the demonstration). In the case, nodes A and D are the initiating
receiver’s neighbors due to the receiver’s own hidden senders, whereas nodes B and C are their receivers,
terminals. In such a case, some hidden terminals of the respectively. In the second case, nodes B and C are the
initiating sender may not be suppressed. An example is senders and nodes A and D are their receivers, respectively.
shown in Figure 1, where node A is the initiating sender In these two cases, assuming same transmission power
and node B is the receiver, The CTS frame generated by levels and ambient noise, captures for the data frames may
node B is corrupted at node C (a hidden terminal of node A) easily happen at receivers because the senders are much
by the signals of node D, which is a hidden terminal of node closer to their receivers than the interference sources.
B. Node mobility may also limit the effectiveness of the However, for combating high link error rates,
virtual carrier sensing technique with a small probability. acknowledgments for data frames are widely used in the
With virtual carrier sensing, only nodes that have receive MAC sub layer of wireless networks. Therefore, interference
the medium reservation message know when to defer. may come not only from the initiating senders, but also from
Therefore, when a node newly moves into a neighborhood their receivers. In both cases shown in Figure. 2b, the two
and misses the preceding reservation information, it senders have to finish their transmissions almost at the same
becomes an unsuppressed hidden terminal to an ongoing time for all the data and acknowledgment frames to be
data transaction, another phenomenon that may impact received without collisions. For example, in case A shown
virtual carrier sensing is that the interference range of a in Figure. 2a, if node A finishes its data transmission earlier
node can larger than its data transmission range[12]. than node D, then node B will send its acknowledgment
Therefore, even if a node is out of the range of another node frame to node A while node C is still receiving the data
for successfully receiving its CTS frame, the node may still frame from node D. A collision may therefore easily occur at
interfere with the other node’s data reception. A more node C. Similarly, if node D finishes is transmission earlier,
effective way to suppress hidden terminals is to use an out- then node B may easily have a collision. The same thing is
of-band control channel. With a single data channel, control true for case B. The corrupted frame, however, be an
information cannot be delivered when the data frame is in acknowledgment instead of a data frame. In reality, two
transmission. With an additional control channel, however, nodes may not finish their transmissions the same time,
control signals can always be present whenever necessary, since their frames may have different sizes and their
which improves the ability of hidden terminal suppression. transmissions may begin at different times. Thus, collision
detection is important in these cases to terminate the
colliding transmissions.
5. Results
The comparison of MAC protocols CSMA, MACA and
IEEE 802.11 has been simulated using Network Simulator
Glomosim 2.03. In our simulation each node always has
packets to send, and the destination of each packet is
randomly drawn among the neighbors of the node. The
Figure 3. RTS / CTS dialogue IEEE 802.11 MAC results for three wireless MAC protocols in terms of
HANDSHAKE collision rate and throughput. Figure 3 a, 3 b. Shows the
collision rate and throughput simulation graph for CSMA.
3.7 Collision Avoidance and Detection Figure 4 a, 4 b. Shows the collision rate and throughput
This section further explains how the proposed MAC simulation graph for MACA. Figure 5 a, 5 b. Shows the
protocol achieves collision avoidance and collision collision rate and throughput simulation graph for IEEE
detection. As in the CSMA case, the protocol considers it a 802.11.The protocol IEEE802.11 has significant
potential colliding situation when a transmitting node performance gains in terms of node throughput and reduce
detects another transmitting node. For collision avoidance, the network collisions.
the proposed protocol uses handshake and medium
reservation procedures like those used by traditional wireless
MAC protocols. The difference is that, in the proposed
protocol, these procedures are moved to the control channel
where CTS pulses are used for handshaking and the pulse
relay is used for medium reservation. When the collision
mechanism comes into play and this is the essential
difference between the proposed protocol and other wireless
MAC protocols. To understand how the proposed protocol
resolves collisions, we consider the case where two
neighboring nodes cause collisions. If two neighboring
nodes draw the same back off delays at a contention point
for medium access, then they start to transmit signals in the
data and control channels almost at the same time. If both
receivers of the two senders cannot correctly read the frame
headers due to the resulting collision (that is, the address or
another field in the header does not have a legitimate value),
then neither will send back a CTS pulse. Both senders will Figure 3 a. CSMA – Nodes Vs Collision
44 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
6. Conclusion
From the simulation result, we conclude that, a better
behavior is obtained when using CSMA instead of MACA
because of the RTS / CTS messages. The use of RTS packets
whenever a source has a data packet to send without first
sensing the channel, results in an increase in packet
collisions and hence decreased throughput. The collision
avoidance mechanism incorporated into IEEE 802.11 for the
transmission of RTS packets aids in the reduction of the
number of collision improves the throughput.
Consequently, more data packets reach their destination. We
conclude that, the MAC protocol IEEE802.11 has
Figure 4 b. MACA – Nodes Vs Throughput significant performance gains in terms of node throughput
and reduces the network collisions in Mobile Ad Hoc
Networks.
(IJCNS) International Journal of Computer and Network Security, 45
Vol. 2, No. 3, March 2010
* Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam, India,
[email protected]
2
Department of Electrical Engineering, Andhra University, Visakhapatnam, India,
[email protected]
3
Department of Computer Science and Systems Engineering, Sir.C.R.Reddy College of Engineering, Eluru,
[email protected]
recipient’s location L and the time that the recipient will be of the cipher text denoted by X consisting of the
there, and can be applied especially effectively in situations binary bits of the form x11 x12 x13 ……xn 21…..xn28
where the recipient remains stationary in a well-known As the numbers in the first stage of the cipher text are
location. between 0 to 256 we have bits in every number. Here we
The mobile client transmits a target latitude/longitude have 8n 2 binary bits . Thus we divide the string of 8n 2
coordinate and an LDEA key is obtained for data encryption binary bits into 8 substrings each having n 2 binary bits.
to information server. The client can only decrypt the 1. The next stage of the cipher we transpose the
ciphertext when the coordinate acquired form GPS receiver matrix X consisting of 7 substrings and we
matches with the target coordinate. For improved security, a interchange the first bit of the substring with k1th
random key (R-key) is incorporated in addition to the LDEA bit of the entire string. Similarly the second bit
key. In the present paper the objective is to modify the with k2th bit of the entire string. This process is
cipher by introducing the concept of key dependent circular continued for all the bits in X to get the final cipher
rotation. In this the bits are rotated depending upon the R- text.
key after whitening with the LDEA key using the Exclusive 2. The next stage of the cipher we transpose the
– OR operation. matrix X consisting of 7 substrings. The bits in X
2. Random number generator using are rotated left di times where di = ki mod n 2. In the
quadruple vector decryption process the bits are rotated di bits right.
For the generation of the random numbers a quadruple
vector is used[7][10]. The quadruple vector T is generated 3.1 Algorithm
for 44 values i.e for 0-255 ASCII values.
Algorithm for Encryption:
T=[0 0 0 0 0 0 0 0 1 1 ……………… 0 0 0 0 1 1 1 1 2
{
2…………………….. 0 1 2 3 0 1 2 3 0 1
1. read n,K,P,r
……………………..3]
2. For i=1 to n
The recurrence matrix[1][2][3] [4]
{
0 1 0
3. p=convert(P);
A = 1 1 0
4. X=p LDEA key
0 0 1
5. C1=Permute(X)
is used to generate the random sequence for the 0-255 6. C=Lrotate(C1)
ASCII characters by multiplying r=[A] *[T] and }
considering the values to mod 4. The random sequence 7. Write(C)
generated using the formula [40 41 42]*r is generated.[10] }
Algorithm for Decryption:
3. Development of the cipher {
1. read LDEA-key,R-key,n,C
Consider a plain text represented by P which is represented 2. for i=1 to n
in the form P=[Pij] where i=1to n and j=1 to n ---1 {
Let the key matrix be defined by 3. C1=Rrotate(C)
K=[Kij] where i=1 to n and j=1 to n ---2 4. X=permute(C1)
Let the cipher text be denoted by C=[ Cij] where i=1to n and 5. p= X LDEA key
j=1 to n corresponding to the plain text (1) 6. P=convert(p)
For the sake of convenience the matrices P,K and C are }
represented as 7. write P;
P=[p1 p2 ……pn2] }
K=[k1 k2 ……kn2]
C=[c1 c2 ……cn2 ] 4. Illustration of the cipher
Where in the components are taken row wise from the
corresponding matrices. Encryption :
The process of encryption and decryption are shown
1. The components of p are first converted into their The distance between every pair of points in the universe is
corresponding binary bits in the form negligible by virtue of communication facilities. Let us
p11 p12 p13 p14 p15 p16 p17 p18, p21 ……pn2 1…..pn28 reach each point in the sky. This is the wish of scientists.
where p11 p12 .... are the corresponding binary bits
corresponding to p1 p2….. ASCII equivalent
As the numbers in the plain text are between 0 to 256
we have bits in every number. Here we have 8n 2 binary P=[ 84 104 101 32 100 105 115 116 97 110
bits . Thus we divide the string of 8n 2 binary bits into 8 99 101 32 98 101 116 119 101 101 110 32
substrings each having n 2 binary bits. 101 118 101 114 121 32 112 97 105 114 32
2. The plain text P is whitened by using the Exclusive – 111 102 32 112 111 105 110 116 115 32 105
or operation with the LDEA key to get the first stage 110 32 116 104 101 32 117 110 105 118 101
114 115 101 32 105 115 32 110 101 103 108
48 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
105 103 105 98 108 101 32 98 121 32 118 32 102 97 99 105 108 105 116 105 101 115
105 114 116 117 101 32 111 102 32 99 111 46 76 101 116 32 117 115 32 114 101 97
109 109 117 110 105 99 97 116 105 111 110 99 104 32 101 97 99 104 32 112 111 105
32 102 97 99 105 108 105 116 105 101 115 110 116 32 105 110 32 116 104 101 32 115
46 76 101 116 32 117 115 32 114 101 97 107 121 46 84 104 105 115 32 105 115 32
99 104 32 101 97 99 104 32 112 111 105 116 104 101 32 119 105 115 104 32 111 102
110 116 32 105 110 32 116 104 101 32 115 32 115 99 105 101 110 116 105 115 116 115
107 121 46 84 104 105 115 32 105 115 32 46]
116 104 101 32 119 105 115 104 32 111 102
32 115 99 105 101 110 116 105 115 116 115 The distance between every pair of points in the universe is
46] negligible by virtue of communication facilities. Let us
reach each point in the sky. This is the wish of scientists.
LDEA- key
r1=[ 0 0 1 0 0 0 1 1 ]; 5. Cryptanalysis
r2= [1 0 0 1 1 1 1 1 ];
r3= [1 1 1 1 1 1 1 1]; If the latitude and longitude coordinate is simply used as the
key for data encryption; the strength is not strong enough.
X=P xor LDEA key That is the reason why a random key is incorporated into
Permuting with R-key and Rotating right di times where di LDEA algorithm.
= ki mod 16 and transposing Let us consider the cryptanalysis of the cipher. In this cipher
C=[34 88 14 9 32 120 38 3 101 125 86 the length of the key is 8n2 binary bits. Hence the key space
87 53 89 95 85 99 94 110 13 58 120 55 is 28n2 . Due to this fact the cipher cannot be broken by
43 39 104 86 30 33 25 122 69 49 89 111 Brute force attack.
69 102 124 22 27 121 111 119 102 127 30 The Cipher cannot be broken with known plain text attack
91 61 99 31 74 77 60 104 55 50 39 105 as there is no direct relation between the plain text and the
86 94 37 25 122 85 49 89 79 69 100 124 cipher text even if the longitude and latitude details are
22 19 39 104 118 30 35 25 122 77 107 93 known.
78 109 52 122 55 19 109 110 118 54 59 It is noted that the key dependent permutation plays an
27 91 109 123 87 79 109 92 126 53 51 124 important role in displacing the binary bits at various stages
109 55 114 119 31 75 93 103 92 78 29 of iteration, and this induces enormous strength to the
48 121 55 67 113 109 119 70 119 28 91 cipher.
29 65 76 76 4 48 48 19 3 61 105 119
118 103 31 90 93 81 13 73 68 116 36 19 Avalanche Effect
18 61 105 119 118 103 31 90 93 117 93 With change in LDEA key from 2334719 to 2334718 the
79 85 116 125 23 83 101 110 118 22 59 cipher text would change to
25 91 109] G=[34 88 14 9 32 120 38 3 37 121 86
Cipher text C = 87 37 89 94 85 99 94 110 13 58 120 55
"Xx& e}VW5Y_Uc^n:x7+'hV-! zE1YoEf| yowf -[=c 43 103 108 86 30 49 25 123 69 49 89 111
JM<h72'iV^% zU1YOEd| 'hv-# zMk]Nm4z7 mnv6; 69 102 124 22 27 57 107 119 102 111 30
[m{WOm\~53|m7rwK] 90 61 99 31 74 77 60 104 55 50 103 109
g\N 0y7CqmwFw [ ALL 00 =iwvgZ] Q 86 94 53 25 123 85 49 89 79 69 100 124
IDt$ =iwvgZ] u]OUt} Senv ; [m 22 19 103 108 118 30 51 25 123 77 107
Decryption: 93 78 109 52 122 55 19 45 106 118 54
cipher text C= 43 27 90 109 123 87 79 109 92 126 53 51
"Xx& e}VW5Y_Uc^n:x7+'hV-! zE1YoEf| yowf -[=c 60 105 55 114 103 31 74 93 103 92 78 29
JM<h72'iV^% zU1YOEd| 'hv-# zMk]Nm4z7 mnv6; 48 121 55 67 49 105 119 70 103 28 90
[m{WOm\~53|m7rwK] 29 65 76 76 4 48 48 19 3 125 109 119
g\N 0y7CqmwFw [ ALL 00 =iwvgZ] Q 118 119 31 91 93 81 13 73 68 116 36 19
IDt$ =iwvgZ] u]OUt} Senv ; [m 18 125 109 119 118 119 31 91 93 117 93 79
After key dependent permuting and circular rotation the 85 116 125 23 83 37 106 118 22 43 25
ASCII equivalent is 90 109]
The change in the cipher text is 44 bits
P=[ 84 104 101 32 100 105 115 116 97 110
99 101 32 98 101 116 119 101 101 110 32 6. Conclusions
101 118 101 114 121 32 112 97 105 114 32
111 102 32 112 111 105 110 116 115 32 105
In this chapter a cipher is developed using the LDEA key
110 32 116 104 101 32 117 110 105 118 101
dependent permutation and circular rotation as the primary
114 115 101 32 105 115 32 110 101 103 108
concept. The cryptanalysis is discussed which indicates that
105 103 105 98 108 101 32 98 121 32 118
the cipher is strong and cannot be broken by any
105 114 116 117 101 32 111 102 32 99 111
109 109 117 110 105 99 97 116 105 111 110
(IJCNS) International Journal of Computer and Network Security, 49
Vol. 2, No. 3, March 2010
to improve visual quality. One of the four trees is quantized difference is greater than the adaptive threshold value;
according to the binary value of the two embedded otherwise, a watermark bit 0 is extracted. Experimental
watermark bits. But these methods [9-11] cannot effectively results show that the proposed method is very efficient for
resist the attacks of low-pass filtering for JPEG resisting various kinds of attacks.
compression. In this paper, propose a blind watermarking
method based on wavelet tree quantization. 2. Watermarking by Quantization of Wavelet
Trees
the local second maximum wavelet coefficient of the ith Otherwise, the embed a watermark bit 0 according to Eq. (7)
wavelet tree, 1≤ i ≤ Nw. If the embedded watermark bit is 1, as follows:
the local maximum coefficient is not quantized under if (seci < 0 ), than maxinew = 0, secinew = 0;
Maximum (ε ,T) Δi ≥ ε and is quantized under Δi <
Maximum (ε ,T) . If the embedded watermark bit is 0, the otherwise maxinew = seci (7)
local maximum coefficient is quantized by setting the local
maximum coefficient = local second maximum coefficient. Where secinew denotes the new second maximum coefficient
in the ith wavelet tree after embedding the watermark bit 0.
When embedding a watermark bit 1, the maximum local
2.3 Watermark Embedding
Let maxi and seci be the local maximum wavelet significant coefficient is quantized and added by an
incremental β if Δi < Maximum (ε, T); otherwise (i.e., Δi ≥
coefficient and the local second maximum wavelet
Maximum (ε, T)), it is kept the same as before. The reason
coefficient in a wavelet tree; the difference between both of
for not quantizing the maximum local significant coefficient
them is named as the local significant difference. The select
is that we won’t increase the distortion of the image. Some
a threshold value β as an increment for quantization. The images having small ε imply that their significant difference
larger the β is, the better robustness but the worse distortion is not obvious. We need an extra parameter T to improve the
of the watermarked image will be. Each time at embed a robustness. The larger the T is, the higher probability the
watermark bit and quantize the maximum coefficient in a maxi is quantized to a larger value; but, in the meanwhile,
wavelet tree. the more distortion of the image will be as well. For
example, let ε =12 and Δi = 13. Suppose T is set to be less
if (maxi < 0), then maxi = 0 (2) than ε, such as T =11, maxi will not be quantized as Δi >ε
=12. On the other hand, if T is set to be larger than ε, such
Δi = maxi − seci, (3) as T =14, maxi will be quantized and increased by β as Δi
<T=14. On the contrary, when embedding a watermark bit
Where Δi denotes the significant difference between the 0, the value of maxi is quantized by decreasing to the local
maximum coefficient and the second maximum coefficient second maximum seci and hence the new Δi will be equal to
in the ith wavelet tree of Nw. Because some maximum 0. Based on this strategy, there exists a large 91 energy
coefficients in a wavelet tree may be a negative value, and a difference between embedding watermark bit 1 and
positive value has higher robustness than a negative value watermark bit 0.
under attacks, it will result in Δi more significant if we
modify the maximum coefficient from a negative value to a 3. Design of Watermark Decoder
positive value. When the Δi is more significant, it will be
more accurate at extracting watermark. To achieve the new 3.1 The Decoder Design
maximum coefficient be positive and to decrease the In the proposed method, neither an original image nor an
original watermark image is required for the extraction
distortion of watermarked image due to quantization, the
process. During the embedding process, embed a watermark
new maximum coefficient is set to a smallest positive value
bit 1 by adding an energy β (or β × γ ) to the local maximum
zero here.
wavelet coefficient in the wavelet tree, and embed a
When embed a watermark bit 1, the maxi is quantized by watermark bit 0 by setting maxi = seci Hence, if the
wavelet tree was embedded a watermark bit 0, the local
maxinew = maxi ,if (Δi ≥ Maximum (ε, T)) (4) significant difference between the largest two coefficients
will be close to zero; otherwise, if the wavelet tree was
maxinew = maxi + β, if (Δi < Maximum (ε ,T) embedded a watermark bit 1, the local significant difference
and maxi is root) (5) between the largest two coefficients will be greater than β.
In order to extract watermark bits correctly and the value
maxinew = maxi + β × γ , if (Δi < Maximum(ε ,T) of y by Eq. (8).
and maxi is root) (6)
1 Nw × α
Where maxinew denotes the new maximum coefficient in y = --------- ∑ ϕ j ------ (8)
the ith wavelet tree after embedding the watermark bit. The Nw × α j = 1
maxi located at lower resolution level (child node) is less
robust than those located at higher resolution levels (root Where φ = {max1 - sec1 ,max2 - sec2 ,…..,maxi - seci }, for
node). The reason has been stated in Section II-B. i=1,2,…,N; the sorted φ is denoted as ϕ (φ) = { ϕ1,ϕ 2 ...ϕ
According to the band sensitivity, the coefficients quantized Nw }, ϕ1 < ϕ 2 < .... < ϕ Nw ; α is the scale parameter, 0 <
at different resolution level are given different weights. The α ≤ 1; α is crucial to y and is used to determine how many
quantized coefficient at the lower resolution level is given a percentages of the significant difference in φ can be used for
heavier weight than that at the higher resolution level. the average. Hence, α marks the minimal y value for
Hence, if the maxi does not locate at the highest resolution extracting the watermark. The larger α is, the larger the y
level, we will quantize the maxi by adding γ times of β will be. Suppose all embedded watermark bits are 1 in the
energy, here γ is a scale parameter and we set γ =1.5. watermark. This means that the difference between the
(IJCNS) International Journal of Computer and Network Security, 53
Vol. 2, No. 3, March 2010
maximum wavelet coefficients and the second maximum The peak signal-to-noise ratio (PSNR) to evaluate the
wavelet coefficients for any embedded wavelet tree is greater quality between the attacked image and the original image.
than β. The value of α should be set as small as possible to After extracting the watermark, the normalized correlation
avoid extraction errors (see Eq. (9),(10)); the reason for this coefficient (NC) is computed using the original watermark
is that it can exclude those big significant differences of the and extracted watermark to judge the existence of the
embedded wavelet trees in Eq. (8). On the other hand, if all watermark. The value of the NC coefficient is defined as
embedded watermark bits are 0 in the watermark, the value follows:
of α must be set as large as possible. Therefore, α is sensitive
to the content of the watermark. 1 w h -1 w w -1
NC = ----------- ∑ ∑ w (i, j) × w ' (i, j) (11)
3.2 Watermark Extraction wh ×ww i = 0 j = 0
Following Eqs. (8),(9) and (10), it would be easy to extract
the watermark. If the local significant difference is greater Where wh and ww are the height and width of the
than or equal to y, where 0 < y ≤ β, then the embedded watermark. w (i, j) and w' (i, j) are the values of the
watermark bit could be 1; otherwise, the embedded coordinate (i, j) in the original watermark and the extracted
watermark bit could be 0. The watermark bit can be watermark, respectively. Here w (i, j) is set to 1 if it is a
extracted based on Eq. (9) and (10) as follows: watermark bit 1; otherwise, it is set to -1. w' (i, j) is set in
the same way. So the value of w(i, j) × w' (i, j) is either -1 or
watermark bit = 1, if (maxi - seci ) > y (9) 1.
watermark bit = 0, otherwise (10) Table 1: Normalized Correlation Coefficients (NC) after
Attacks by JPEG Compression with the Quality Factors
(QF) 10, 20, 30, 40, 50, 60, 70, 80, 90, AND 100.
Normalized
Quality Factors Correlation Extracted
(QF) Coefficients Watermark
(NC)
10 0.33
20 0.65 E
30 0.78 ES
40 0.82 E A
ESHA
(a) (b) 50 0.89 ES
Figure 3. (a) The original image of Lena of size 512×512. 60 0.96 ESH
(b) The original binary watermark of size 32×16.
70 1 ESHA
80 1 ESHA
90 1 ESHA
100 1 ESHA
decreased. The less the quality factor is, the more vague the In this paper, propose a wavelet-tree-based blind
extracted watermark is. watermarking method by quantizing the maximum wavelet
coefficient in a wavelet tree. Embed a watermark bit by
quantizing the maximum wavelet coefficient in a wavelet
tree. The trees are so quantized that they exhibit a
4.1 Experiment Analysis sufficiently large enough energy difference between a
Compare the proposed method with BKL [9], EL [10], watermark bit 0 and a watermark bit 1, which difference,
and SHW [11] using the Lena image. The watermark denoted as significant difference, is then useful for later
consists of 256 bit 1and 256 bit 0. The results are shown in watermark extraction. During extraction, an adaptive
Table 2. From Table 2, the PSNR of the proposed method is threshold value is designed. The magnitude of the
better than those of [11]. In this method, it is not so good for significant difference in a wavelet tree is compared to the
the rotation attacks with degree greater than ± 0.70; but it is adaptive threshold value. Furthermore, regarding each
far better than the listed methods; especially for low pass wavelet tree embedded with a watermark bit, we not only
filtering attacks for JPEG compression. can embed more bits in an image but can extract the
watermark without any need of the original image and
Table 2: Comparison of the Proposed Method and the watermark. Moreover by designing an adaptive threshold
Methods in [9], 10] and [11]. value in the extraction process. In addition to the copyright
protection, the proposed method can also be applied to data
hiding and image authentication.
Attacks / SHW EL BKL Proposed
NC PSNR = PSNR= PSNR= Method
38.2dB 40.6dB 41.54dB PSNR =
References
41.88dB
[1] D. P. Mukherjee, S. Maitra, and S. T. Acton, "Spatial
JEPG NA 0.15 0.17 0.33 domain digital watermarking of multimedia objects for
(QF = buyer authentication," IEEE Trans. Multimedia, vol. 6,
10) pp. 1-15, Feb. 2004.
[2] N. Nikolaidis and I. Pitas, "Robust image watermarking
JEPG NA 0.34 0.61 0.65 in the spatial domain," Signal Processing, vol. 66, pp.
(QF = 385-403, 1998.
20)
[3] A. K. Mahmood and A. Selin,"Spatially adaptive
wavelet thresholding for image
JEPG 0.15 0.52 0.79 0.78
(QF = watermarking,"presented at Proc.IEEE ICME, Toronto,
30) 2006 of Conference.
[4] J. R. Hernandez, M. Amado, and F. Perez- Gonzalez,
JEPG 0.23 0.52 0.83 0.82 "DCT- omain watermarking techniques for still images:
(QF = detector performance analysis and a new structure,"
40) IEEE Trans.Image Processing, vol. 9, pp.55- 68, Jan.
2000.
JEPG 0.28 0.52 0.89 0.89 [5] L. Sin-Joo and J. Sung-Hwan, "A survey of
(QF =
watermarking techniques applied to multimedia," in
50)
Proc. IEEE ISIE 2001, pp. 272-277
JEPG 0.46 0.59 0.94 0.96 [6] V. M. Potdar, S. Han, and E. Chang,"A survey of digital
(QF = image watermarking techniques,"presented at Proc.
60) IEEE INDIN 2005 of Conference.
[7] H. J. Wang, P. C. Su, and C. C. J. Kuo, "Wavelet-based
JEPG 0.57 0.63 0.97 1 digital image watermarking," Optics Express,vol.3, pp.
(QF = 491- 496, Dec. 1998.
70) [8] M. Hsieh, D. Tseng, and Y. Huang, "Hiding digital
watermarks using multiresolution wavelet transform,"
JEPG 0.89 0.71 0.99 1 IEEE Trans. Ind. Electron., vol. 48, pp. 875-882, Oct.
(QF =
2001.
80)
[9] B. K. Lien and W. H. Lin,"A watermarking method
JEPG 1 0.78 1 1 based on maximum distance wavelet tree
(QF = quantization," presented at 19th Conf. Computer
90) Vision, Graphics and Image Processing, 2006 of
Conference.
JEPG 1 0.88 1 1 [10] E. Li, H. Liang, and X. Niu,"An integer wavelet based
(QF = multiple logo-watermarking scheme," presented at
100) Proc. IEEE WCICA, 2006 of Conference.
[11] S. H. Wang and Y. P. Lin, "Wavelet tree quantization
5. Conclusion for copyright protection watermarking," IEEE Trans.
(IJCNS) International Journal of Computer and Network Security, 55
Vol. 2, No. 3, March 2010
Image Processing, vol. 13, pp. 154-165, Feb. 2004. Guide Award” five times from Tamil Nadu state Government. He
[12] G. C. Langelaar and R. L. Lagendijk, "Optimal is also the recipient of “Best Outstanding Fellow Corporate
differential energy watermarking of DCT encoded Member Award” by Institution of Engineers (IE),India -2004 and
images and video,"IEEE Trans. Image Processing, “Jewel of India” Award by International Institute of Education and
Management, New Delhi–2004 and “Bharatiya Vidya Bhavan
vol. 10, pp. 148-158, Jan.2001.
National Award for Best Engineering College Principal 2005” by
Indian Society for Technical Education (ISTE). “Education
[13] F. A. P. Petitcolas, Weakness of existing watermark Excellence Award” by All India Business& Community
Scheme 1997[online] Available: Foundation, New Delhi.
http://www.petitcolas.net/fabien/watermarking/stirma
rk/index.html.
[14] PhotoImpact 11 software, http://www.ulead.com,
Ulead system, Inc.
Authors Profile
study and the schematic diagram of the ATM network are 2.2 GA Level 2
discussed in section 3. In Section 4 we provide an extensive GA is optimized to find the best value of (fi) such that the
and comprehensive formulation of the use of HGA for overall delay is minimized. The computed network delay is
solving the ATM design problem. In section 5 we present then returned to GA Level 1 to be considered as the new
our preliminary results for the ATM network case study. fittest value. The fitness criterion, in this level, is considered
Finally, in section 6 we offer several concluding remarks and as the mean time delay. The mean delay is computed as in
address the challenges ahead in the future enhancements. Equation 3.
2. Hierarchical GA 1 N fi N
T = ∑ , θ = ∑ fi (3)
The ATM design problem was considered as a parameter θ i =1 C
i − fi i = 1
estimation problem. GAs has been used in a hierarchical
approach to optimize the ATM network. The proposed novel
where θ is the total traffic over the network, N is the number
HGA optimization problem is shown in Figure 1. There are of links. This idea was presented in [16].
two levels were performed to produce an optimal ATM
network design. The two levels are evolved in parallel. The
3. Case Study: ATM Network
fitness score of the individuals in each level depends on the
performance of the chromosomes in both levels. There are two sets of customers to be considered while
planning the ATM network design:
1) the user who uses the services through the network. The
network should meet the user’s needs in terms of quality
of service. The flow assignment and the capacities links
are the two main entities affecting the cost of the ATM
network. The maximum flow assignment must be tested,
and the network should maintain a high capacity.
2) the company which will be building the ATM network
and maintaining it. The network operation should be as
cost effective as possible for both installation and
maintenance. Minimizing the total cost is mainly an
important matter of selecting the best design of ATM
network.
The schematic diagram for the ATM under study with all
specified links and capacities is shown in Figure 2.
2.1 GA Level 1
GA is used to install a new network with a set of network
links which satisfies the constraints demand criterion and
has a minimum delay over the network. In this level, a new
network structure is evolved which has all nodes of the
original network and a subset of its links. The network
configuration must be implemented subject to the constraints
defined in Equations 1 and 2.
Figure 2. The ATM Network Topology
f ≤ C × 95% (1)
i i
This ATM network was presented in [17], [18]. The network
Thus, the maximum flow value (fi) for link (i) in Equation 1 has 7 nodes with 14 links. The links and capacities for each
is restricted not to exceed 95% of the capacity (Ci). node are presented in Table 1.
n Each network link is characterized by a set of attributes;
Throughput ≥ 0.5 × ∑ C
i
(2) these attributes for a given link (i) form the flow (fi ) and the
i =1 capacity (Ci ). (fi ) is defined as the effective quantity of
The throughput of the network is allowed not to be less than information transported by link (i). The capacity (Ci ) is
half the sum of all capacities. We must realize that the defined as the measure of the maximal quantity of
boundary range of the genes values is based on the link ID of information that can be transmitted by link (i).
the ATM experiments and the gene redundancy must be
eliminated. A gene duplicate leads to a link duplicate, which
leads to the increase of the network delay.
58 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
Table 1: ATM network capacity of each link selection method is the fitness assignment. Each individual
in the selection pool receives a reproduction probability
Links depending on its objective value. This fitness is used for the
Start Node End Node Link Capacity
ID selection step afterwards. Stochastic uniform selection
1 1 4 150 mechanism is considered in this work.
2 1 6 150 Reproduction: This step increases the number of good
chromosomes in the next generation. This scheme
3 1 3 225
determines how the new individuals will be assimilated into
4 1 2 225
the population. Many number of reproduction operators were
5 2 3 150 presented in the literature [3], [7].
6 2 6 150 Crossover: This procedure exchanges genes between the
7 2 5 150 parents. Two chromosomes are randomly selected from the
8 3 4 150 population as parent chromosomes. Two new chromosomes
with the genes from both the parent chromosomes are
9 3 5 150
obtained. A scattered function for the crossover is considered
10 4 6 150
in this work.
11 6 5 150 Mutation: This step is used to have a new chromosome
12 5 7 150 which differs from the chromosomes in the population. A
13 6 7 150 chromosome is randomly selected as the mutated
14 4 7 150 chromosome. In this paper, the mutation type is Gaussian
function with Scale equal 1 and Shrink equal 1.
Fitness Evaluation: The fitness function is computed by
4. Problem Formulation
using the mean time delay as given in Equation 3. This
The optimization problem of the ATM network is fitness is based on a given objective function on level 2
implemented in a hierarchical manner. Two levels of GAs which is the minimum time delay over the evolved network
are used. in level 1. Each chromosome in the population is assigned a
• GAs Level 1 is used to select the best network topology specific value associated with the gene arrangement in order
and forward it to GA Level 2. The ATM network should to select the best individuals. Finally, the effectiveness of the
be effectively connected such that at least half the proposed algorithm was tested based on the GA utilization.
network bandwidth is busy. The GA utilization criterion can be computed as given in
• GAs level 2 computes the minimum delay over the Equation 4.
network. In GAs level 2 we determine the (fi) parameters f
for each network link (i). Utilization = i (4)
HGA requires number of steps for the problem formulation C
i
as shown below: Improving GA utilization in all cases will increase the flow
Encoding Mechanism: This step is used to encode the assignment of the links for the ATM network. HGA requires
variables of the optimization problem in terms of genes. In number of tuning parameters in accordance with GA
this work, a table was created for all pairs of links optimization. We run GA using various population sizes in
combination. The links in the table correspond to the virtual the two levels of HGA. The corresponding results of the
paths included between pair of nodes. In the proposed network topology for the various population sizes are shown
algorithm each link is identified by an ID number which is in Figures 3, 4, 5, 6, 7, 8, 9, 10 and 11.
in accordance to the row number in the table. The proposed
GAs will have 14 genes. Each gene corresponds to a link
and each link has an identified (Ci).
Initialization: This step uses the encoding method to create
a random initial population by randomly generating a
suitable number of chromosomes. In this paper, the
chromosome length equals to the number of links in the
original network.
Number of Populations: Various population sizes were used
while running GA in each level.
Selection Mechanism: Selection schemes helps in
determining the convergence properties of GAs. A selection Figure 3. Network Topology evolved by Pop. Size L1 = 10
scheme in GAs is known as the process which favorably and Pop. Size L2 = 25
selects better individuals in the current population for the
mating pool [19], [20]. The selection method determines
how individuals are chosen for mating. The first step in the
(IJCNS) International Journal of Computer and Network Security, 59
Vol. 2, No. 3, March 2010
The HGA related parameters used in the experiments were was presented to show the performance of the proposed
determined as shown in Table 2. HGA algorithm. Figure 12 shows the convergence process of
GAs with various population sizes for both level 1 and level
Table 2: Parameters evolved for GA-based experiments 2.
Operator Type
Maximum generations 50
5. Experimental Results
From the developed results, the proposed HGA was able to
provide number of ATM network with various topologies.
Having a closer look to each developed structure, we can Figure 12. The convergence process of GAs with various
find that all evolved network have seven links except one population sizes
network which has 8 links (see Figure 4). This network has
the maximum delay which is expected since the number of The algorithm converges to the optimal solution at ”high”
links increased. The evolved network were able to achieve speed and finds a good solution in less than 20 generations
the required criteria which is specified by the designer (i.e. of running. Moreover, the algorithm reached a solution with
increasing the network throughput to at least 50% of the the lowest (i.e. optimal) delay in most cases. In some cases,
network capacity and manage the traffic to be with the algorithm finds the optimal solution very quickly;
minimum delay). The developed network could be unreliable however, there are some cases where longer convergence
in some sense because the reduced number of links may times are observed in order to obtain the optimal solution.
cause a problem if failure occurs in a link. This could be
another objective to investigate in the future. Of course the 6. Conclusions and Future Work
best reliable network will be the fully connected network. A Hierarchical Genetic Algorithms (HGA) based
This will be, of course, a very expensive network to optimization mechanism for Asynchronous Transfer Mode
implement. The computed delay times for various population (ATM) network has been formulated. Minimizing the total
sizes of the GA in levels 1 and 2 are shown in Table 3. cost is mainly the purpose of the proposed approach,
subsequently; the work addresses the maximum allowable
flow assignment in each link while simultaneously keeping
Table 3: Delay time for various Pop. sizes of GA levels the overall delay within the minimum acceptable range. It
can be inferred from the results obtained that ATM network
Description GAs level 1 GAs level 2 Delay time design using HGA produces good network plans in terms of
Pop. Size 10 25 10.81690 network throughput and GA utilization. Also, it allows more
Pop. Size 10 50 11.02230 flexibility in the traffic management, and less complexity of
Pop. Size 10 75 10.76282 the planning task. It is suggested to improve the current
work by adding new issues related to dynamic capacity
Pop. Size 30 25 10.80090
allocation within the network. Additionally, improvement
Pop. Size 30 50 10.75810
can be achieved if using Parallel Genetic Algorithms
Pop. Size 30 75 10.75850 (PGAs). This way the computation time can be reduced to a
Pop. Size 50 25 10.76630 reasonable computational effort.
Pop. Size 50 50 10.76430
Pop. Size 50 75 10.76006 References
[1] L. Painton and J. Campbell, “Genetic algorithms in
It was found that the minimum delay was achieved with optimization of system reliability,” IEEE Transactions
population size 30 for GA level 1 and 50 for GA level 2. In on Reliability, vol. 44, pp. 172–178, 1995.
general, as a common practice, the convergence of the GA
(IJCNS) International Journal of Computer and Network Security, 61
Vol. 2, No. 3, March 2010
[2] D. Raychaudhuri and D. Wilson, “ATM–based networks: Genetic algorithm and tabu search
transport architecture for multiservices wireless approach,” International Journal of Computer Science,
personal communication networks,” IEEE Journal On vol. 1, no. 3, 2006.
Selected Areas In Communications, vol. 12, no. 8, pp. [18] R. Susmi, A. M. Sherry, and B. V. Reddy, “ATM
1401–1413, 1994. network planning: A genetic algorithm approach,”
[3] H. El-Madbouly, “Design and bandwidth allocation of Journal of Theoretical and Applied Information
embedded ATM networks using genetic algorithm,” In Technology, vol. 1, pp. 74–79, 2007.
Proceedings of World Academy of Science, [19] D. Thierens and D. E. Goldberg, “Convergence models
Engineering and Technology, vol. 8, pp. 249–252, of genetic algorithm selection schemes,” In PPSN III:
2005. Proceedings of the International Conference on
[4] D. W. Coit and A. E. Smith, “Reliability optimization Evolutionary Computation. The Third Conference on
of series-parallel systems using genetic algorithm,” Parallel Problem Solving from Nature. London, UK:
IEEE Transactions on Reliability, vol. 45, pp. 254–260, Springer-Verlag, pp. 119– 129, 1994.
1996. [20] B. L. Miller and D. E. Goldberg, “Genetic algorithms,
[5] Alaa Sheta, Mohammad Salamah and Malik Braik,” selection schemes, and the varying effects of noise,”
Topology Optimization and Traffic Management in Evolutionary Computation. vol. 4, no. 2, pp. 113–131,
Telecommunication Network Using Hierarchical 1996.
Genetic Algorithms”, In the Proceedings of
ICICIS2009, Ain Shams Univ., Cairo, Egypt, pp. 143- Authors Profile
148, March, 2009.
[6] E. lbaum and M. Sidi, “Topological design of local-
area networks using genetic algorithms,” In Alaa Sheta received his B.E., M.Sc.
IEEE/ACM Transactions on Networking, vol. 4, pp.
degrees in Electronics and Communication
766–778, 1996.
[7] K. Walkowiak, “Genetic algorithms for backup virtual Engineering from Faculty of Engineering,
path routing in survivable ATM networks,” In Cairo University in 1988 and 1994,
Proceedings of MOSIS 99, vol. 2, pp. 123–130, 1999.
respectively. A. Sheta received his Ph.D.
[8] A. Kasprzak and K. Walkowiak, “Algorithms for flow
assignment ATM virtual private networks,” In degree from the Computer Science
Proceedings Of First Polish-German Teletraffic Department, School of Information Technology and Engineering,
Symposium PGTS 2000, vol. 2, pp. 24–26, 2000.
[9] E. Alba, “Parallel evolutionary algorithms in George Mason University, Fairfax, VA, USA. His published work
telecommunications: Two case studies,” In Proceedings exceeds 70 publications between book chapters, journal papers,
of the CACIC02, Buenos Aires, Argentina, 2002. conferences and invited talks. His research interests include
[10] L. He and N. Mort, “Hybrid genetic algorithms for
telecommunications network back-up routing,” BT Evolutionary Computation, Computer Networks, Image Processing,
Technology Journal, vol. 18, no. 4, pp. 42–50, 2000. Software Reliability and Software Cost Estimation. Currently, Dr.
[11] L. Xian, “Network capacity allocation for traffic with
Sheta is a Professor with the College of Computers and Information
time priorities,” Journal of International Network
Management, vol. 13, pp. 411–417, 2003. Systems and the Director of the Vision and Robotics Laboratory at
[12] C. Rose and R. Yates, “Genetic algorithms and call Taif University, Taif, Saudi Arabia. He is on leave from the
admission to telecommunications networks,”
Electronics Research Institute (ERI), Giza, Egypt.
Computers and Operations Research, vol. 23, pp. 9–6,
1996.
[13] L. Davis and Coombs, Optimizing networks link sizes Malik Braik received his B.Sc. degree in
with genetic algorithms. Modeling and Simulation
Methodology, Knowledge System’s Paradigms, Electrical Engineering from Faculty of
Amsterdam, The Netherland: Elsevier, 1989. Engineering, Jordan University of Science
[14] S. Pierre and H. H. Hoang, “An artificial intelligence and Technology in 2000. Five years later,
approach for improving computer communication
network design,” Journal Of Operational Research M. Braik received his M.Sc in Computer
Society, vol. 41, no. 5, pp. 405–418, 1990. Science from Department of Information
[15] M. Gerla, J. A. S. Monteiro, and R. Pazos, “Topology
Technology, Al-Balqa Applied University, Jordan in 2005. His
design and bandwidth allocation in ATM nets,” IEEE.
JSAC, vol. 7, no. 8, pp. 1253–1262, 1989. research interests focus on Evolutionary Computation, Image
[16] A. Sheta, M. Salamah, H. Turabieh, and H. Heyasat, Processing, Data Security and Computer Networks. Currently,
“Selection of appropriate traffic of a computer network
Braik is working with the Department of Information Technology,
with fixed topology using GAs,” International Journal
of Computer Science, IAENG, vol. 34, no. 1, 2007. Prince Abdullah Bin Ghazi Faculty of Science and Information
[17] S. Routray, A. Sherry, and B. Reddy, “Bandwidth Technology, Al-Balqa Applied University, Al-Salt, Jordan.
optimization through dynamic routing in ATM
62 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
Abstract: The 3G cellular networks are being designed to CDMA all subscribers use same frequency & this creates
provide high bit rate services, multimedia traffic, in addition to inter-cell & intra-cell co-channel interference. Thus the
voice calls within the limited bandwidth available. The suitable actual performance of CDMA system is still interference
solution to the bandwidth limitation is the smart antenna. The
limited and is affected by adverse channel conditions created
smart antennas at the base station of cellular system have the
interference rejection or signal to interference plus noise by multipath propagation. It is obvious that the capacity of
improvement capability and in turn to improve the capacity of CDMA based wireless communication system can be
cellular system. The smart antennas can generally be classified improved by different interference reduction techniques &
as either switched beam or adaptive array smart antenna. that can be achieved by using smart antennas such as
However switched beam smart antenna is cheaper to implement switched beam smart antenna (SBSA) or adaptive array
in many applications and hence investigated here much in smart antenna . In this paper section 2. describes switched
detail.
beam smart antenna used to improve the capacity of
Switched beam smart antenna (SBSA) creates a group of
CDMA cellular system.
overlapping beams that together result in omni directional
coverage. SBSA has the interference rejection capability
depending on side lobe level. The simplest way to reduce the side
lobe level and improve the SINR of SBSA is to use non adaptive
2. Switched Beam Smart Antenna and its
windowed beam forming functions. In this paper performance of Array Pattern
linear SBSA has been investigated using MATLAB for various
windowed beam forming functions such as Hamming, Gaussian 2.1 Concept of SBSA
and Kaiser-Bessel functions. It has been observed that the Depending upon the various aspects of smart antenna
Kaiser-Bessel weights provide one of which lowest array side
technology they are categorized as switched beam smart
lobe levels still maintaining nearly the same beam width as
uniform weights and consequently Kaiser-Bessel function can antenna and adaptive array smart antenna. Here we
widely be used with SBSA to improve the capacity of 3G cellular investigate switched beam smart antenna in detail. The
system. switched beam smart antenna (SBSA) has multiple fixed
beams in different directions & this can be accomplished
Keywords: SBSA, DS/CDMA, Windowed Beam forming using feed network referred to as beam former & most
commonly used beam former is Butler matrix. In terms of
1. Introduction radiation patterns switched beam is an extension of cellular
Nowadays the wireless operators are faced with increasing sectorization method of splitting a typical cell. That is
capacity demands for both voice & data services. To achieve switched beam antenna increases the capacity of cellular
this, multiple access techniques such as TDMA & CDMA system by creating micro sectors and each micro sector
can be employed. For instance in TDMA based wireless contains a pre-determined fixed beam pattern with greatest
communication system (2G systems) the frequency reuse sensitivity located in the centre of the beam & less sensitivity
factor is normally greater than 6. That is these systems elsewhere. The receiver selects the beam that provides
employ the frequency reuse concept which increases their greatest signal enhancement & interference reduction.
capacity to some extent. But this frequency reuse concept Actually SBSA enhances receive signals & switch from one
creates the co-channel interference. In CDMA systems the beam to another as the desired user moves throughout the
frequency reuse factor is 1 which enables it to offer higher sector. An N beam switched beam antenna generally
capacities & the capacity improvement by CDMA provides an N-fold antenna gain and some diversity gain by
technology may be as high as 13 times that of TDMA. But in combining the received signal from different beams as
64 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
Beam-1
S = [S1 S2 S3 ------- SN ]
(3)
Beam-2 B where Si = √Pi*[1 e-jφi e-j2φi e-j3φi ……. e-j (N-1)φi ] is the
e ith user signal φi=2πd/λ*sinΦ i ; Φi is the ith user angle of
a
m arrival signal with power Pi. Taking into account an
Signal output equation (1) and equation (3) the output of SBSA is
Interference f Beam
Signal o Select
r Y=AHS = [Y1 Y2 Y3 ----------YN]
m
Beam-3 e (4)
r
Beam-4 If all users are located exactly as өi = Φi; the vector Yi=[0, 0,
0, 0, √Pi, 0, 0, --- 0]. But if өi ≠ Φi; , we have to evaluate
Desired signal Direction the maximum element of each vector to detect active users.
0
Figure 1. Switched beam smart antenna.
-5
-50
2.2 Signal model and array pattern of SBSA -60 -40 -20 0 20 40 60
AOA
The SBSA creates a number of two way spatial channels on
a single conventional channel in frequency, time or code. Figure 2. SBSA Array pattern for number of antenna
Each of these spatial channels has the interference rejection elements N = 8.
capabilities of the array depending on side lobe level (γ).The It is apparent from Fig.2 that the array factor of SBSA has
steering matrix for N element SBSA is given by side lobe level γ= -16 dB. The presence of side lobes means
A= [a1 a2 a3 ------- aN ] (1) the array radiates in untended directions or the side lobes
can receive the same signal from multiple angles which may
cause fading in communication systems. These harmful side
where ai = [1 e-jΨi e-j2Ψi e-j3Ψi ……. e-j (N-1)Ψi ] is the lobes of SBSA can be suppressed by windowing the array
steering vector; Ψi=2πd/λ*sinөi ; өi is the ith reference elements also called as array weighting and is discussed in
angle, d is the spacing between the antenna elements. The section 3.
matrix A forms the special filters with orthogonal properties
aiH ak =N, if i=k; and aiH ak =0, if i≠k. 3. WINDOWED BEAM FORMERS FOR SBSA
In practice the SBSA creates several simultaneous fixed
beams through the use of equation (1) and Butlar Matrix
y
theory. With Butlar Matrix for SBSA of N elements the
array factor can be given as
sin[Nπd/λ (sinө - sinөℓ)]
AF(ө) = (2)
Ѳ
Nπd/λ (sinө - sinөℓ) wN/2 w2 w1 w1 w2 wN/2
x
d
where sinөℓ = ℓλ/Nd; ℓ= ±1/2, ±3/2, ------- ± (N-1)/2. If
the element spacing is d = λ/2 the beams of SBSA are evenly
distributed over the span of 1800 and using MATLAB 7.0 Figure 3. N Element linear antenna array with
equation (2) for N=8 is simulated and simulation results are weights.
(IJCNS) International Journal of Computer and Network Security, 65
Vol. 2, No. 3, March 2010
|A F |d B
windowing the array elements as shown in Figure 3. The -30
array factor of such N linear element windowed array is
given by
-40
N/2
AFn (ө) = Σ wncos((2n-1/2)kdsinө)
-50
(6)
n=1
To determine the weights wn there are number of useful
-60
window functions that can provide weights for each element -90 -60 -30 0 30 60 90
in array viz. Hamming, Gaussian, Kaiser-Bessel functions θ
etc. By carefully controlling the side lobes in windowed
Figure 4. Array factor with Hamming weights for N=8
SBSA arrays, most interference can be reduced to
insignificant level. But side lobe suppression is achieved at
the expense of main lobe beam width. These windowed non 3.1.2 Gaussian weight function: The Gaussian
adaptive beam formers have advantages as: weights are found by Gaussian function to be
-30
hamming(N) command in MATLAB. Array pattern for N=8
elements with normalized Hamming weights for linear array
-40
is plotted in Fig. 4. It is apparent that Hamming weights
provide side lobe suppression γ = -39 db at the expense of
large increase in beam width ∆=2. -50
Weight types w1 w2 w3 w4 Figure 5. Array factor with Gaussion weights for N=8
It is clear that Gaussian weighted array pattern provides side
lobe suppression γ = -48dB with increase in main lobe beam
Hamming 1 0.673 0.2653 0.0838
width ∆=1.85
66 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
3.1.3 Kaiser-Bessel weight function: The Kaiser lobe beam width (∆=1.2) compared to Hamming and
Bessel weights are determined by Gaussian weight functions & hence Kaiser Bessel weight
functions are chosen to suppress the side lobes in switched
beam smart antenna. (SBSA)
I0
w (n) =
(9) 4. Performance analysis of Kaiser-Bessel
I0
windowed SBSA and simulation results
We consider the DS/CDMA system model in which the data
where n= 0,…..,N/2, α>1 is modulated using BPSK format. The pulse and PN code
amplitudes are all independently and identically distributed
The Kaiser-Bessel normalized weights for N=8 are found random variables. We assume that the PN code length
using the Kaiser(N,α) command in MATLAB . M=128 & the power of each mobile station is perfectly
controlled by the same base station BS which employs
Table 2: Kaiser-Bessel normalized weights for array switched beam smart antenna.
N=8
As shown in [2] the bit error rate (BER) for DS-CDMA,
Weight types w1 w2 w3 w4 1200 sectorized systems is given by
Kaiser-Bessel 1 0.8136 0.5136 0.210
-20
Pe= Q (11)
|A F |d B
-30
0
10
-60 120 deg. sect. Antenna
-90 -60 -30 0 30 60 90 Boxcar SBSA
θ -2 Kaiser-Bessel SBSA
10
Figure 6. Array factor with Kaiser-Bessel weights N=8
-4
Table 3: Important parameters of windowed beams for 10
Bit Error Rate
For Boxcar (non windowed) SBSA the side lobe level (as [5] Md. Bhakar, Vani R. M., P. V. Hunagund, “Smart
shown in fig.2) γ = -16 db. While as Kaiser-Bessel weights Antennas Systems: Concepts of Beam steered Array
shown in Table 2 can be selected for SBSA so that its side Configurations”, Proceedings of IEEE International
lobe level (as shown in fig.6) can be reduced to γ= -33db. symposium on microwaves 2008, Banglore section
Using MATLAB 7.0 equation (10) and equation (11) with [6] David Cabrera, Joel Rodriuez,Adviser:Victor
γ= -16 db. & γ= -33db are simulated. V.Zaharov, “ Switched Beam Smart Antenna BER
Performance analysis for 3G CDMA Cellular
That is using equation (10) & (11) the simulation results are Communication”, Polytechnic University of Puerto
presented in Fig 7. where BER as a function of Eb/N0 and Rico.
number of active users = 100 in the service area is plotted.
Fig. 7 presents BER of DS/CDMA system with conventional Authors Profile
1200 sectored antenna, no windowed SBSA (N=8, γ= -16dB)
& Kaiser Bessel windowed SBSA (N=8, γ = -33dB). As
follows from Fig. 7 for the fixing level of BER, e.g. for 3G T.B. Lavate received ME (Microwave)
communication system acceptable BER is Pe =10-4 , by degree in E&T/C in 2002 from Pune
the application of SBSA the number of active users in University. He is pursuing his Ph.D. in
conventional CDMA system can be increased up to 1.12 College of Engineering, Pune-5 affiliated to
times for no windowed SBSA antenna and up to 1.4 times pune university. He has published nine
with Kaiser- Bessel windowed SBSA antenna. i.e Kaiser- papers on wireless communication & smart
Bessel windowed SBSA antenna can increase the number of antenna. He is member of IETE & ISTE.
active users in 3G system significantly without losing of
performance quality.
V. K. Kokate graduated in E & T/C from
University of Pune in 1973 and received his
5. Conclusion Masters in E & T/C (Spl: Microwave) from
In this paper the performance analysis of windowed SBSA is the University of Pune..
investigated. The relation of BER for DS/CDMA is extended Presently he is working as H.O.D. of E&TC Engineering
for the case of application of SBSA at base station. As a Department of Indira College of Engineering, , Pune. having
over 35 years experience in teaching and administrative. His
result shows, the application of Kaiser-Bessel windowed
fields of interests are Radar, Microwaves, Antennas and
SBSA improves the BER which in turn increases the active
EMI & C. He is a Fellow Member of IETE and Member
users in conventional CDMA system significantly & hence
of ISTE/IEEE.
SBSA is still an attractive solution to increase the capacity of In his credit, he has about twenty papers published in
existing 3G cellular wireless communication system. International/National repute Conferences/ Journals.
D. finally features of the entire image, E, are obtained by Fig. 6 shows segmented of Fig. 5. This segmented image is
combining features of F and G. By putting F and G together, created with histogram thresholding. Fig. 7 shows the
we can achieve smooth of original image as is shown in Fig. reverse N for image processing in this model. Fig. 8 shows
3 [8]. ADBT of Fig. 6. This ADBT has three levels, numbered as
0, 1 and 2. The features of regions are stored in the leaves.
Fig. 4 shows the array, which stores the ADBT of Fig. 2. Features of L0 are obtained by combining features of R0 and
R1. In the same way, features of L1 are obtained from R2
and R3. Finally features of the entire image, L2, are
obtained by combining features of L0 and L1. By putting L0
and L1 together, we can achieve smooth of original image
as is shown in Fig. 9. Fig. 10 shows the ADBT of Fig. 6 that
1
Figure 1. an I 2 Image [8]. has been stored in an array.
1
Figure 2. ADBT of an I2 image [8].
3. Our Works
Authors Profile
Asghar Shahrzad Khashandarag received the
B.S. degree in computer engineering from the
Payame Noor University Bonab Branch, Iran, in
2008, and the M.S. degree in computer
engineering from the Islamic Azad University
Tabriz Branch, Iran, in 2009, respectively.
From 2008, he works as a researcher with the Young Researchers
Club of Tabriz. He has published more than 10 papers in various
journals and conference proceeding. His research interests include
Figure 13. Results: Lena (a) Lena gray, (b) histogram, (c) 2 image processing, signal processing, wireless sensor network.
level thresholding, (d) 4 level, (e) 6 level and (f) 8 level.
Alireza Mousavi received his B.Sc. in computer
engineering, software Engineering, from
Allameh Mohaddes Nouri University,
Mazandaran, Iran, in 2008, and the M.S. degree
in computer engineering from the Islamic Azad
University Tabriz Branch, Iran, in 2010,
respectively. His research interests include image processing,
Residue Number systems, wireless sensor network.
Figure 14. Result of Histogram Ramin Aliabadian received the B.Sc. degree in
computer engineering from the Shomal
University, Amole, Iran, in 2008, and the M.S.
degree in computer engineering from the Islamic
Azad University Arak Branch, Iran, in 2010,
References respectively. His research interests include
[1] Zhiyong Wang, Dagan Feng, and Zheru Chi, “Region- image processing, computer architecture, computer networks.
Based Binary Tree Representation For Image
Classification”, IEEE International Conference on
Neural Networks & Signal Processing, Nanjing,
China, 2003.
[2] Xiaolin Wu, “Image Coding by Adaptive Tree-
Structured Segmentation”, IEEE Transactions on Davar Kheirandish Taleshmekaeil received
Information Theory, VOL. 38, NO. 6, 1992. the B.Sc. degree in Computer Hardware
[3] G.S.Seetharaman, B.Zavidovique, “Image Processing in engineering from the Allameh Mohaddes Nouri
a Tree of Peano Coded Images”, Computer Architecture University, Mazandaran, Iran, in 2008, and the
for Machine Perception, 1997.CAMP’97. Proceeding M.S. degree in computer engineering from
Fourth IEEE International Workshop on.
[4] M. Kunt, M. Benard, and R. Leonardi, “Recent results the Islamic Azad University Tabriz Branch,
in highcompression image coding”, IEEE Transaction Tabriz, Iran, in 2010, respectively. His research interests include
Circuits Syst., vol. CAS- 34, no. 11, pp. 1306-1336, image processing, computer architecture, computer networks.
Nov 1987.
[5] R. Leonardi and M Kunt, “Adaptive split-and-merge for
image analysis and coding”, Proc. SPIE, vol. 594, 1985.
[6] G. J. Sullivan and R. L. Baker, “Efficient quadtree
coding of images and video”, in ICASSP Proc., May Ali Ranjide Rezai received the B.Sc. degree in
1991, pp. 2661-2664. computer engineering from the Shomal
[7] J. Vaisey and A. Gersho, “Image compression with University Amole, Iran, in 2008, and the M.S.
variable block size segmentation”, IEEE Trans. Signal
Processing, vol. SP-40, pp.2040- 2060, Aug. 1992. degree in computer engineering from the
[8] A. Habibizad Navin, A. Sadighi, M. Naghian Islamic Azad University Tabriz Branch, Iran, in
Fesharaki, M. Mirnia, M. Teshnelab, and R. Keshmiri, 2010, respectively. His research interests
"Data Oriented Model of image : as a framework for include image processing, computer architecture.
image processing", World Academy of Science,
Engineering and Technology 34 2007
[9] http://en.wikipedia.org/wiki/Windows_bitmap
[10] http://en.wikipedia.org/wiki/GIF
[11] http://en.wikipedia.org/wiki/JPEG
[12] http://www.pages.drexel.edu/~weg22/edge.html
[13] S. Arora, J. Acharya , A. Verma, Prasanta K.
Panigrahi, " Multilevel thresholding for image
72 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 3, March 2010
Abstract: This research paper focuses on the analysis and wish to plan an escape from jail.
enhancement of steganographic strategies for multimedia data
hiding authentication. Based on an authentication game
between an image and its authorized receiver, and an opponent,
security of authentication watermarking is measured by the
opponent's inability to launch a successful attack. In this work,
we consider two stages of data hiding mechanism: Hiding the
data in an image along with conditional security and detecting
the hidden data. First we detect whether there exists a hidden
message within the image and then applying the conditional
security mechanism, we extract that hidden message. We
propose a novel security enhancement strategy that results in
efficient and secure LSB-based embedding and verification
phenomenon. Both theoretical analysis and experimental results
are presented. They show that using our approach, protection is Figure 1. Stenography Process
achieved without significant increase in image size and color
distortion, and without sacrificing the image or video quality. However, the prison warden, Ward, can monitor any
communication between Alice and Bob, and if he detects any
Keywords: Steganography, LSB, Stego image, Stego key, hint of “unusual" communications, he throws them both in
payload, Watermarking, Covert Communication solitary confinement. Alice and Bob must then transmit their
secret plans so that nothing in their communication seems
1. Introduction unusual" to Ward. There have been many proposed solutions
to this problem, ranging from rudimentary schemes using
The word steganography literally means covered writing as invisible ink to a protocol which is provably secure assuming
derived from Greek. It includes a vast array of methods of that one-way functions exist.
secret communications that conceal the very existence of the
message. Among these methods are invisible inks, microdots,
character arrangement (other than the cryptographic methods
of permutation and substitution), digital signatures, covert
Channels and spread-spectrum communications.
Steganography is the art of concealing the existence of
information within seemingly inoffensive carriers.
Steganography can be viewed as parallel to cryptography.
Both have been used throughout recorded history as means to
protect information. At times these two technologies seem to
converge while the objectives of the two differ.
Cryptographic techniques "scramble" messages so if
intercepted, the messages cannot be understood.
Steganography, in an essence, "camouflages" a message to
hide its existence and make it seem "invisible" thus
concealing the fact that a message is being sent altogether. Figure 2. General Model of Steganography
An encrypted message may draw suspicion while invisible
messages will not [1]. Steganography refers to the problem of 2. Literature Survey
sending messages hidden in “innocent looking"
communications over a public channel so that an adversary 2.1 Steganography Techniques
eavesdropping on the channel cannot even detect the presence
2.1.1 Physical steganography
of the hidden messages. Simmons gave the most popular
Steganography has been widely used including recent
formulation of the problem: two prisoners, Alice and Bob[2],
historical times and the present day. Possible permutations
(IJCNS) International Journal of Computer and Network Security, 73
Vol. 2, No. 3, March 2010
Image resulting difference between the new from the original color
value is called the embedding error. Since there are only
three LSB’s for each pixel, the total number of bits that can
be hidden is only three times the total number of pixels
having the dimensions 768x512.
The difference between the original image and the image Figure 17. Merge Image
after insertion of stego message is shown in fig. 15. The two
images look exactly the same which is why image On the receiving end the stego image can be recovered by
steganography is so important and useful in hiding data or entering the password as shown in fig. 18.
sending secret messages
Figure 15. View Difference The stego image is finally extracted after entering the
password as shown in fig. 19
The difference between the original image and the image Figure 22. View Frames
after insertion of stego message is shown in fig. 20. The two
images look exactly the same. The stego text is added to be embedded in the video as shown
in fig. 23
References
Abstract: This paper focuses on the design and development of 3. Small Wind Turbine in Battery Charging
synchronous buck converter in low power generation system.
The buck topology suffers from low efficiency at light loads due
Application
to dissipation that does not scale with load current. In this paper
The performance limitations of permanent magnet wind
we present a method for improving efficiency in buck converter
turbine generators in battery-charging applications are
by reducing gate drive losses. Results of PSIM simulation are
presented. caused by the poor match of the rotor, generator and load
characteristics over most of the operating wind speed range.
Keywords: Buck Converter, Synchronous Rectification, PMG, Even the small amount of energy (1kWh) that these batteries
Wind turbine. store can sufficiently improve the quality of life for such
areas, giving people access to electrical lighting, TV/radio,
1. Introduction and other household conveniences. We placed an optimizing
Small wind turbines offer a promising alternative for direct current DC/DC voltage converter between the rectifier
many remote electrical uses where there is a good wind and batteries. We can control the current output of the
resource. The goal of this work is to characterize small wind synchronous buck converter, which allows us to control the
turbines, wind-diesel hybrid system components and wind- power going to the batteries. Battery-charging systems are
hybrid systems and to develop new off-grid applications for very important in developing countries where rural families
small wind turbines in order to expand the international cannot afford a solar-battery home system or other
market for these systems. Projects fall into two electricity options. The technical aspects of charging
classifications: applications development and testing. numerous 28-V batteries with a small permanent magnet
Testing includes both small turbines and wind-hybrid alternator wind turbine suggest that a special battery-
systems. Although the projects that fall under applications charging station needs to be developed. The major
development and testing are varied, they all focus on the advantage of a centralized battery-charging station is that it
remote power market and all include small wind turbines as can bring electric service to a very low-income segment of
the power source. the population. This performance improvement comes at
higher system capital cost; however, the cost per charged
2. Block Diagram battery of the system with the individual charge controllers
is lower because of better performance characteristics.
A block diagram consists of a rectifier stage , a buck
converter and controller. Many small wind turbine
generators consist of a variable-speed rotor driving a 4. Permanent Magnet Generator
permanent-magnet synchronous generator. The principal
Permanent magnet alternators are the most powerful
application of such wind turbines is battery charging, in
and cost-effective solution for building a wind generator.
which the generator is connected through a rectifier to a
Their low-rpm performance is excellent, and at high
battery bank. The wind turbine electrical interface is
speeds they can really crank out the current due to their
essentially the same whether the turbine is part of a remote
efficiency. They provide an optimal solution for varying-
power supply for tele communications, a
speed wind turbines, of gearless or single stage gear
stand-alone residential power system or a hybrid village
configuration. [5] The evolution of the control design of
power system.
PM drives begins with the cost reduction of permanent
magnet material and follows the progress of control
theory of AC electric machinery. The main difference
between PM drives and their earlier developed counter
parts lies in the removal of the excitation field circuitry
with troublesome brushes and its replacement with
permanent magnets. But the application PM disables
classical field weakening control, because the magnets
produce constant magnetic field intensity. With the cost
reduction of rare permanent magnet materials PM
machines became very popular in industry due to their
• Simple structure
Figure 1. Block Diagram
(IJCNS) International Journal of Computer and Network Security, 81
Vol. 2, No. 3, March 2010
• High efficiency explained below. The first state corresponds to the case
• Robustness when the switch is ON. In this state, the current through the
• High torque to size ratio. inductor rises, as the source voltage would be greater than
the output voltage, whereas the capacitor current may be in
4.1 Types of Permanent Magnet Generators either direction, depending on the inductor current and the
load current. When the inductor current rises, the energy
Modern permanent magnet generators need no separate stored in it increases. During this state, the inductor
excitation system. They can be gearless or with gearbox and acquires energy. When the switch is closed the diode is in
are fully controlled with variable speed and reactive power the off state. In Figure 2 the capacitor is getting charge.
supply. They provide the highest power quality and The second state relates to the condition when the switch
efficiency for the end user. They offer three different is OFF and the diode is ON. In this state, the inductor
concepts of permanent magnet generator technology. current freewheels through the diode and the inductor
supplies energy to the RC network at the output. The energy
4.1.1. Low Speed Robust Gearless System stored in the inductor falls in this state. In this state, the
In a direct drive application the turbine and the generator inductor discharges its energy and the capacitor current may
are integrated to form compact and structurally integrated be in either direction, depending on the inductor current and
unit. The design gives free access to all parts for easy the load current.
installation and maintenance. The simple and robust low
speed rotor design with no separate excitation or cooling
system results in minimum wear, reduced maintenance
requirements, lower life cycle costs, and a long lifetime.
Although these features would appear to favor current- MOSFETs. Under light loads, the control block usually
mode control in applications that require a fast dynamic turns the lower MOSFET off to emulate a diode.
response, this control method has some disadvantages. For Synchronous rectification with discrete MOSFETs causes
example, it tends to be sensitive to noise in the control loop. variable switching delays because of the variations in gate
Also, current-mode control method requires two feedback charge and threshold voltage from one MOSFET to another.
loops: a current inner loop and a voltage outer loop, thus Standard control circuits compensate for these variations by
complicating the design. Finally, the controller uses a delaying the turn-on drive of the lower MOSFET until after
current-sensing resistor in series with the output inductor. the gate voltage of the upper MOSFET falls below a
This current-sensing resistance typically dissipates as much threshold. This delay creates a dead time in which neither
power as do the MOSFETs, further reducing the current- MOSFET conducts. The dead time eliminates the possibility
mode converter's efficiency. Voltage-mode control is of a destructive shoot-through condition in which both
attractive for low-voltage buck converters because, it MOSFETs conduct simultaneously. Standard designs use
involves a single control loop, exhibits good noise immunity the same method to delay the turn-on of the upper device. A
and allows a wide range for the PWM duty-cycle ratio. Also, typical design delays discrete MOSFET conduction with a
voltage-mode converters do not require a resistor for sensing 60-nsec dead time and limits converter switching frequency
current. However, the transfer function of standard voltage- to 300 kHz.
mode buck converters that use Schottky diodes changes from
no load to full load, making it difficult to achieve fast 6.1 Conventional Vs Synchronous Buck Converter
response to large dynamic loads. The voltage drop of a
MOSFET is much less than that of a Schottky diode, The comparison of efficiency between a synchronous
which rectifier with a parallel Schottky diode and that of a
improves the efficiency of buck converters using Schottky diode alone is shown in Figure 6.
synchronous rectification. Synchronous rectification
increases the efficiency of a buck converter by replacing the
Schottky diode with a low-side NMOSFET. The resultant
voltage drop across the MOSFET is smaller than the
forward voltage drop of the Schottky diode. A more
comprehensive comparison includes the switching losses for
both the MOSFET and the Schottky diode. However, at
typical operating frequencies and voltages, a buck
regulator's switching losses are usually small in comparison
with the conduction losses. The low-side MOSFET conducts
current in its third quadrant during the off times of the high-
side MOSFET. This synchronous switch operates in the
Figure 6. Efficiency Graph
third quadrant, because the current flows from the source to
the drain, which results in a negative bias across the switch.
A positive voltage at the gate of the device still enhances the 7. Test Results
channel. 7.1Generator Testing Details
Generator Speed in
2000
Figure 7. Generator Speed Vs Generator Output Voltage
1500
rpm
7.1.2. Generator Output Voltage Vs Wind Velocity 1000
Figure 10. Simulated Circuit Diagram of IEEE Power Electronics Conference. pp. 787-791,
2006.
[6] A.B. Raju, K.Chatterjee and B.G. Fernandes, “A
The figure shows the simulated circuit diagram. The Simple Power Point Tracker for Grid connected
Synchronous buck converter operate in current program Variable Speed Wind Energy Conversion System with
mode control .The unit is a PI controlled device that controls reduced Switch Count Power Converters”, IEEE
the power level at which the converter operates. The unit is conference on Power Electronic specillists,2003. pp
primarily designed to operate from the three-phase 456-462.
alternating current output of the wind turbine. The
following graph shows the PSIM simulation results for the
output voltage from the synchronous buck converter. Authors Profile