Home > Computer science essays > A ROBUST DATA AGGREGATION AND DATA HANDOVER USING DBHFA IN WIMAX NETWORK

Essay: A ROBUST DATA AGGREGATION AND DATA HANDOVER USING DBHFA IN WIMAX NETWORK

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 9 minutes
  • Price: Free download
  • Published: 15 October 2019*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 2,389 (approx)
  • Number of pages: 10 (approx)

Text preview of this essay:

This page of the essay has 2,389 words.

Table of Contents

Abstract:

The WiMax network is to provide the users with access to the info of interest from data gathered by spatially distributed sensors. Generally the employers require only assured aggregate functions of this dispersed data. Computation of this collective data under the end-to-end evidence flow paradigm by interactive all the relevant data to a middle collector node is a highly incompetent solution for this determination. An alternative proposal is to perform in-network calculation. This, however, raises inquiries such as: what is the optimal way to calculate an collective purpose from a set of statistically connected principles store in dissimilar nodes; what the security of such aggregation is as the consequences sent by a cooperated or faulty node in the network can adversely affect the accurateness of the computed result. In this paper, we have obtainable an energy efficient aggregation algorithm for WiMax that is healthy beside malicious insider attack by any compromise or out of order node in the network. In difference to the conventional data collection move toward in WiMax, a node inside the proposed algorithm instead of unicasting its sensed evidence to its parent node, broadcasts its estimate to all its neighbors. This makes the system more fault-tolerant and growth the information obtainability in the network. The imitationsaccompanied on the proposed algorithm have created results that validate its effectiveness.

Keywords:

Data aggregation, handover, DBHFA, WiMax

1. INTRODUCTION:

They are rapidly developing technology which will consume a strong influence on research and will developed an integral part of our lives in the near future. The huge application space of WiMax covers national security, shadowing, military, health care, environment intensive care and many more. Therefore, the main challenge for this energy- forced system is to design energy-efficient procedures to maximize the generation of the network. In this paper showing that how the system lifetime is enhanced, by jointly improving routing and data aggregation, the network lifetime can be protracted from two dimensions.

Similar in the course of the far removed after cellular in control to broadband technology, international mobility related look into in WiMAX is additional frequently than not listen sensibly position founding and submission direction. In the previous, the crucial set of relatives technology path and carry on the exact condition of wireless terminal in belongings at what time they are powered-on, powered-off or still on the get out On the supplementary give the closing deals by returns of the dynamic change place of wireless terminuses on or succeeding the be in grounds to give the imprint of being responsible of a BS in on its own section to the administer of an additional BS in a assorted cell.

Giveovers can be in extensivesecret hooked on two far undisturbed from types contingent on the advanced social contact: in a conventional line handover and at right angles deliveries. For example, commend side by many WiMAX network are in a conservative line, but those node between WiMAX in adding to 3G or WLAN network be as the crow flies downward.The all consistency group has distinct three types of approach towards surrender for the knowledge. In WiMAX, a handover beginning choice by a wireless incurable or BS is reliant on the conventional Signal Strengths from the present Serving BS (SBS) and the adjacent BSs. The SBS together make a decision on when to begin a handover movement. at whatever time the RSS on or after the SBS drops lower a certain entrance, which strength get in the way an continuing announcement sitting.

One is to decrease the traffic crossways the network by data aggregation, which can reduce the power ingesting of the nodes close to the sink node. The other is to poise the traffic to avoid irresistible bottleneck nodes. The energy consumption can be minimalized if the quantity of data that needs to be conveyed is also minimized. The answer to this is data aggregation. Since the maximum generation problem cannot be solved directly by means of the unassuming distributed methods, we propose a flattening function to estimate the original max purpose by exploiting the special construction of the network. We behavior extensive imitations to show that the proposed scheme can meaningfully reduce the statistics traffic and recover the network lifetime.

2. RELATED WORK:

Thustheconveyance out an occupied EAP validation, the MS and the AS determination only require a on its own round trip to swap over the ERP messages. In, a re-authentication system has been upcoming with the intention of the practical for give in among varied network. The modus operand makes use of an encoded official article, which is recognized to bevalidation of its past straightforward performances and be theoretical to be available to the tBS for the handover [1, 2].

The main thought is to let the MS to have prompt access to the organization from side to side a feeble but fast legalization first follow by a stouter in addition to supplementary costly corroboration. Base on the equivalent idea. By dropping the number of mail replaced and simplify the cryptographic operation, re-authentication technique container lower the verification signaling latency [4]. Thus, the handover holdup could be efficaciously abridged to the same quantity of the time used by a 3-way salutation, subsequent in the straight validation signaling delay.A data collection problem is distinct where, in a round of message, each sensor node has a packet to be sent to the distant base station [5,6] .

There is some fixed quantity of energy cost in the electronics when transmitting or getting a packet and a variable cost once transmitting a packet which be contingent on the distance of transmission. If each node communicates its sensed data directly to the base station, then it will reduce its power quickly.Data aggregation is aassured technique aiming to conserve energy by reducing the amount of packet transmissions through the network where message costs are usually more classy than computing costs. The two needed conditions for an effectual data aggregation are spatial and time-based convergence [7].

Indeed, the main contests are to build up appropriate routes besides also apply effectual scheduling instruments to the packs in such a way that they have more chance to light at the same node at the similar time. Actually, dissimilar streams are aggregated if they happen to intersect on their technique to the sink [9, 10].

3. PROPOSED SYSTEM:

We have proposed an energy efficient aggregation method for reducing handover delay as well as toprotected and robust against mean insider attack launched by cooperated or faulty node. Simulations approved out on the proposed algorithm have established the efficiency of the security module of the scheme. Itcomprises designing an integrated method towards development of a data aggregation model that syndicates several important issues such as: security, processing overhead, communication overhead, energy consumption, and data compression rate. Inspired by the concept is enlarged to support an ADA (A data Aggregation) strategy. The presentation evaluation results in series of situations verify that the ADA scheme can make the packages with the same attribute spatially convergent as much as potential and therefore improve the efficiency of data aggregation.

Figure 1 handover process in network

The nodes, when obtains the beacon messages, the instrument nodes of the particular area starts to sends the collected information. Based on the arrangement time and priority of data packets alteration the packets are aggregated in the sink node. The packets are transformed to mobile sink node through the intermediate relay node.

3.1 DELAY BASED HANDOVER FRAMEWORK AND AUTHENTICATION (DBHFA):

Its based confirmation can make available strong common substantiation it has be chosen by the WiMax meeting as one of the selections for the arrangement of the authentication course of action inserted between the mobile position and the confirmation server. The EAP confirmation is performed between a mobile station and the base position in the key organization system. To use energy feasting model on their network. Take different limitations like throughput, delivery ratio, and delay and energy ingesting on network. Issues like scalability and dependability of the aggregation scheme in attendance of various types of malevolent nodes that do not participate in packet promoting, would also be considered in the design.

Pseudo Code of Initial Clustering:

Input: Data Set D

Output: Initial Cluster C

Read input data set D.

identify number of data samples N.

initializesd , AF, AT, csd, psd.

for each attribute Ai  of  di  from D

SA = sort(A(D)).

For each SAi

cumulative variance Sdn = µ (∑σ2 (A0 A1, An).)

Csd=sdn; // current variance.

Psd = sdn. // previous variance.

If csd>psd then

sd(i) = sdn .

AF(i)=0;

AT(i)= n.

Sdn=0;

I=n.

End

End

Nc=Δ(sd)

create cluster C={c1,c2..cNc};

Assign labels to data points.

Stop

This functionality of the pre-authentication method because EAP base the method of DA considered in and revealed that there are three safety measures vulnerabilities, which will show the method to attack and replay attacks. The defenselessness in the confirmation procedure in handovers under the attack and the repetition attacks and to improve the effectiveness to reduce the number of require cryptographic meanings as well as the pre verification latency, we have designed to have the mobile station to conversation keying substantial with the authentication server, and the verification server will be accountable to distribute the key to the target access service network when a handover is confirmed. Pre-authentication arrangement cannot only detect and prevent the occurrence and the replay attacks; it can likewisemeaningfully reduce pre authentication delay as well as computing power required.

4. RESULT DISCUSSION:

To obtain the stationary if the forward/non-forward location of both node is strong on the static opinion only; if not, it is lively. The stationary broadcast procedure is a singular case of the active one. The difference is that the advancing node set resulting from static views container be used in any diffusion while the one resulting from dynamic interpretations is in general used in a detailed dissemination.

4.1 Throughput Performance

This remains the production of entire number of usual data packets separated by total number of sent data packets.

Fig1. Performance of throughput

This metric stretches an approximation of how well-organized a routing procedure is, since the amount of routing packages sent per statistics packet gives an idea of how well the protocol keeps the routing in order updated. The developed the Usual Sending Load metric is, the developed the upstairs of routing packets and so the lower the competence of the protocol.

4.2 The Data Delivery Fraction:-

The packets are transported from source to destination on their network. It is intended by dividing the number of data conventional by ending state finished the quantity set originated from initial point on network.

PDF = (Pr/Ps)*100

Fig 2. Performance of Delivery ratio

Where Pr is total Data received & Ps is the total data sending on their network.

4.3 Handover Delay Performance:

The handover expansion initiated by the portable station in network. When the mobile posting initiates entrust request the ASN demand and confirms the collection important and then initiates the trust module. The entrust module achieves the three way handclasp procedure with the portable location in network. After the procedure of pre verification the handover module sends a process acknowledgement. By receiving this acknowledgement the mobile station directs the node handover request to the handover module.

Fig 3. Performance of handover

A difficulty is with the determination of unsuccessful the call container be for the time being interrupt or even ended strangely. Technologies which make use of hard handovers, more often than not have events which can reinstate the association to the foundation cell if the association to the objective cell cannot be finished. However re-establishing this suggestion may not for all time be possible and level at what time likely the operation may cause a temporary break to the describe.

4.4 The End-to-End delay:-

They consume compute a regular number of delay on network, it comprises all conceivable delay produced by protecting through route uncovering latency, line up at the border queue, retransmission delay on intermediate node control, spread and move time.

D = (Tr –Ts)

Where Tr is receive Time and Ts is sent Time.

Fig4. Performance of delay ratio

That time taken a data packet to be across a WiMax network since twitch to termination point on the network. To minimize the liveliness ingesting by means of different algorithms. These procedures proposition a decent solution, then they select the enlargement with the advanced remaining energy in the group as the collection data for the next round. However, this does not promise the maximum continuation of the general network lifetime. Therefore, if the node through the uppermost outstanding energy is a node situated at the lateral of the network this container lead other nodes to spend substantial amounts of energy to spread that node, which cannot be liveliness well-organized for the complete network.

5. CONCLUSION:-

The data aggregation is an effective mechanism to save energy as well as to provide handover in WiMax. Packet loss will be reduced.  Transfer of packets will be increased duplication will be avoided. The work concentrates on efficient data aggregation through the relay enhancement. The network relay revolves around the static network environment. Then through the broadcasting beacon message the handover nodes sends the collected data information to mobile relay. The mobile relay nodes are acted as an intermediate node in dense network. Through this process efficient data aggregation is achieved and the life time of sensor node is increased.

References:

[1] IEEE Standard 802.16e-2005, in Part 16: “Air border for permanent andmovable Broadband Wireless Access system”, Feb. 2006.

[2] D. Q. Liu and M. Coslow, “Extensible substantiation protocol for IEEEprinciples 802.11 and 802.16,” 2008, pp. 1–9.

[3] A. M. Taha, A. T. Abdel-Hamid, and S. Tahar, “Formal analysis ofthe handover schemes in mobile WiMAX networks,” in Proc. 2009

[4] Ivan stojmenovic, Stephan oar, “Data-Centric Protocols for WirelessSensor Networks”

[5] T. Aura and M. Roe, “Reducing reauthentication delay in wirelessnetworks,”

[6] Y. Kim and S. Bah, “Enhancing security using the discarded security information in mobile WiMAX networks,”

[7] Y. Hoban, Q. Wu, G. Zorn,“ExtensibleAuthentication Protocol (EAP) early authentication problem statement”.

[8] L. Jong-Hyouk and C. Tai-Young, “Secure entrust for alternative MobileIPv6 in next-generation road and rail network: scenarios and presentation,”

[9] H. M. Sun, Y. H. Lin, S. M. Chen, and Y. C. Sheen, “Secure and fasthandover scheme based on pre-authentication method for 802.16/WiMAXi nfrastructure networks,” in Proc. 2007

[10] R. Q. Hun et al. “On the development of Handoff organization and Network structural design in WiMAX” In Proc.March 2007

 

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, A ROBUST DATA AGGREGATION AND DATA HANDOVER USING DBHFA IN WIMAX NETWORK. Available from:<https://www.essaysauce.com/computer-science-essays/2016-1-18-1453140694/> [Accessed 11-04-26].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.