scispace - formally typeset
Search or ask a question
Author

Jitender Grover

Bio: Jitender Grover is an academic researcher from International Institute of Information Technology, Hyderabad. The author has contributed to research in topics: Wireless sensor network & Routing protocol. The author has an hindex of 10, co-authored 19 publications receiving 245 citations. Previous affiliations of Jitender Grover include Maharishi Markandeshwar University, Mullana.

Papers
More filters
Proceedings ArticleDOI
01 Sep 2016
TL;DR: In this paper, the authors studied the security issues and security threats in WSNs and gave brief description of some of the protocols used to achieve security in the network and compared the proposed methodologies analytically and demonstrates the findings in a table.
Abstract: Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper studies the various security issues and security threats in WSNs. Also, gives brief description of some of the protocols used to achieve security in the network. This paper also compares the proposed methodologies analytically and demonstrates the findings in a table. These findings can be used further by other researchers or Network implementers for making the WSN secure by choosing the best security mechanism.

38 citations

Proceedings ArticleDOI
11 Jul 2014
TL;DR: The purpose of this paper is to search out various issues in cloud computing where all computing is done on the server side and both data & tasks are stored on the data centers.
Abstract: Cloud Computing is one of the popular techniques in distributed computing due to its ability to minimize the cost of computing when scalability and flexibility of computer process get increased Cloud Computing provides shared resources and services via internet Services are delivered through data center Cloud Computing allows an interesting business proposal for IT industries to provide IT services without any extra investment Client is able to perform heavy computer processes with low capable device (like mobile) which has resource to run the web browser But cloud computing is crowded with many security related issues When client saves his data to the company's cloud, there may be chance of data breaching So the purpose of this paper is to search out various issues in cloud computing where all computing is done on the server side and both data & tasks are stored on the data centers

30 citations

Proceedings ArticleDOI
11 Jul 2014
TL;DR: This paper gives an explanation about location based routing and also analysis some important locationbased routing protocols Geographical and Energy Aware Routing (GEAR), Geographic Adaptive Fidelity (GAF) and Minimum Energy Communication Network (MECN) in detail.
Abstract: Location based routing protocols are used in Wireless Sensor Network (WSN) in which the information about the location of nodes is used for communication. It is also known as geographic routing protocol or position based routing protocols. These protocols reduce the energy consumption and increase the lifetime of the network. This paper gives an explanation about location based routing and also analysis some important location based routing protocols Geographical and Energy Aware Routing (GEAR), Geographic Adaptive Fidelity (GAF) and Minimum Energy Communication Network (MECN) in detail. For better understanding, the comparison between these protocols is shown.

26 citations

Proceedings ArticleDOI
01 Aug 2013
TL;DR: It is concluded that Agent Base load balancing scheme greatly reduces the communication cost of servers, accelerates the rate of load balancing which indirectly improves the Throughput and Response Time of the cloud.
Abstract: Cloud Computing is one of the latest computing paradigms in IT sector today where applications, platforms, software and some other IT services are provided over the internet. It is also known as On Demand Computing. Cloud Computing considers shared pool of configurable computing resources which requires proper resource distribution among the tasks, otherwise in some situations resources may over-utilized or underutilized. For the sake of efficient resource utilization, Load Balancing System problem needs more attention in cloud computing. In This paper, we have used Agent Based Dynamic Load Balancing (ABDLB) approach in which mobile agent plays very important role, which is a software entity and usually defined as an independent software program that runs on behalf of a network administrator. It has ability to learn. After comparing the proposed method with traditional load balancing scheme we concluded that Agent Base load balancing scheme greatly reduces the communication cost of servers, accelerates the rate of load balancing which indirectly improves the Throughput and Response Time of the cloud.

22 citations

Proceedings ArticleDOI
01 Oct 2014
TL;DR: A mechanism to improve theiscovery phase and reduces the energy used by nodes in discovery phase and increases the lifetime of network is proposed.
Abstract: The popularity of Wireless Sensor Network (WSN) has increased tremendously in recent times. WSN connects the physical world with the virtual world by forming a network of sensor nodes. In a sensor network the sensor nodes sense the data within their sensing range. Each node has limited energy which is used in transmitting and receiving the data thus energy preservation is most important for the survival of sensor networks for longer period time. Many routing protocols in WSN are used for the same purpose. In WSN, Geographic Adaptive Fidelity (GAF) is a location based routing protocol which transmits data on the basis of location information of destination node. It works in three phases i.e. discovery phase, sleeping phase and active phase. This paper proposes a mechanism to improve the discovery phase and reduces the energy used by nodes in discovery phase and increases the lifetime of network. Implementation of proposed Optimized GAF protocol is done using MATLAB.

21 citations


Cited by
More filters
Journal Article
TL;DR: In this article, Stann et al. present RMST (Reliable Multi-Segment Transport), a new transport layer for Directed Diffusion, which provides guaranteed delivery and fragmentation/reassembly for applications that require them.
Abstract: Appearing in 1st IEEE International Workshop on Sensor Net Protocols and Applications (SNPA). Anchorage, Alaska, USA. May 11, 2003. RMST: Reliable Data Transport in Sensor Networks Fred Stann, John Heidemann Abstract – Reliable data transport in wireless sensor networks is a multifaceted problem influenced by the physical, MAC, network, and transport layers. Because sensor networks are subject to strict resource constraints and are deployed by single organizations, they encourage revisiting traditional layering and are less bound by standardized placement of services such as reliability. This paper presents analysis and experiments resulting in specific recommendations for implementing reliable data transport in sensor nets. To explore reliability at the transport layer, we present RMST (Reliable Multi- Segment Transport), a new transport layer for Directed Diffusion. RMST provides guaranteed delivery and fragmentation/reassembly for applications that require them. RMST is a selective NACK-based protocol that can be configured for in-network caching and repair. Second, these energy constraints, plus relatively low wireless bandwidths, make in-network processing both feasible and desirable [3]. Third, because nodes in sensor networks are usually collaborating towards a common task, rather than representing independent users, optimization of the shared network focuses on throughput rather than fairness. Finally, because sensor networks are often deployed by a single organization with inexpensive hardware, there is less need for interoperability with existing standards. For all of these reasons, sensor networks provide an environment that encourages rethinking the structure of traditional communications protocols. The main contribution is an evaluation of the placement of reliability for data transport at different levels of the protocol stack. We consider implementing reliability in the MAC, transport layer, application, and combinations of these. We conclude that reliability is important at the MAC layer and the transport layer. MAC-level reliability is important not just to provide hop-by-hop error recovery for the transport layer, but also because it is needed for route discovery and maintenance. (This conclusion differs from previous studies in reliability for sensor nets that did not simulate routing. [4]) Second, we have developed RMST (Reliable Multi-Segment Transport), a new transport layer, in order to understand the role of in- network processing for reliable data transfer. RMST benefits from diffusion routing, adding minimal additional control traffic. RMST guarantees delivery, even when multiple hops exhibit very high error rates. 1 Introduction Wireless sensor networks provide an economical, fully distributed, sensing and computing solution for environments where conventional networks are impractical. This paper explores the design decisions related to providing reliable data transport in sensor nets. The reliable data transport problem in sensor nets is multi-faceted. The emphasis on energy conservation in sensor nets implies that poor paths should not be artificially bolstered via mechanisms such as MAC layer ARQ during route discovery and path selection [1]. Path maintenance, on the other hand, benefits from well- engineered recovery either at the MAC layer or the transport layer, or both. Recovery should not be costly however, since many applications in sensor nets are impervious to occasional packet loss, relying on the regular delivery of coarse-grained event descriptions. Other applications require loss detection and repair. These aspects of reliable data transport include the provision of guaranteed delivery and fragmentation/ reassembly of data entities larger than the network MTU. Sensor networks have different constraints than traditional wired nets. First, energy constraints are paramount in sensor networks since nodes can often not be recharged, so any wasted energy shortens their useful lifetime [2]. This work was supported by DARPA under grant DABT63-99-1-0011 as part of the SCAADS project, and was also made possible in part due to support from Intel Corporation and Xerox Corporation. Fred Stann and John Heidemann are with USC/Information Sciences Institute, 4676 Admiralty Way, Marina Del Rey, CA, USA E-mail: fstann@usc.edu, johnh@isi.edu. 2 Architectural Choices There are a number of key areas to consider when engineering reliability for sensor nets. Many current sensor networks exhibit high loss rates compared to wired networks (2% to 30% to immediate neighbors)[1,5,6]. While error detection and correction at the physical layer are important, approaches at the MAC layer and higher adapt well to the very wide range of loss rates seen in sensor networks and are the focus of this paper. MAC layer protocols can ameliorate PHY layer unreliability, and transport layers can guarantee delivery. An important question for this paper is the trade off between implementation of reliability at the MAC layer (i.e. hop to hop) vs. the Transport layer, which has traditionally been concerned with end-to-end reliability. Because sensor net applications are distributed, we also considered implementing reliability at the application layer. Our goal is to minimize the cost of repair in terms of transmission.

650 citations

Proceedings Article
01 Jan 2003
TL;DR: Three hardware platforms that addresses the needs of wireless sensor netwoks are presented that produces Operating system concepts for refining concurrency mechanisms and the full realization of the general architecture is represented.
Abstract: The Wireless sensor network play a vital role in collecting a Real – Time data, monitoring environmental conditions based on technology adoption. These sensor network is the combination of sensing, computation, and communication through a single tiny device. Here many tiny nodes assemble and configure themselves. It also controls actuators that extend control from cyberspace into the physical world. Here the sensor nodes communicate with the local peers rather than the high – power control tower or base station. Instead, of relying on a predeployed infrastructure, each individual sensor or actuator become part of the overall infrastructure. Here we have three hardware platforms that addresses the needs of wireless sensor netwoks. The operating system here uses an event based execution to support concurrency. The platform serves as a baseline and does not contain any hardware accelerators. . First platform serves as a baseline and it produces Operating system concepts for refining concurrency mechanisms. The second node validates the architectural designs and improve the communicational rates. The third node represents the full realization of the general architecture. Keywords— node, platform, concurrency.

371 citations

Journal ArticleDOI
TL;DR: The results clearly demonstrate that the proposed FF-AOMDV outperformed AomDV and AOMR-LM under majority of the network performance metrics and parameters.
Abstract: Mobile ad hoc network (MANET) is a collection of wireless mobile nodes that dynamically form a temporary network without the reliance of any infrastructure or central administration Energy consumption is considered as one of the major limitations in MANET, as the mobile nodes do not possess permanent power supply and have to rely on batteries, thus reducing network lifetime as batteries get exhausted very quickly as nodes move and change their positions rapidly across MANET This paper highlights the energy consumption in MANET by applying the fitness function technique to optimize the energy consumption in ad hoc on demand multipath distance vector (AOMDV) routing protocol The proposed protocol is called AOMDV with the fitness function (FF-AOMDV) The fitness function is used to find the optimal path from source node to destination node to reduce the energy consumption in multipath routing The performance of the proposed FF-AOMDV protocol has been evaluated by using network simulator version 2, where the performance was compared with AOMDV and ad hoc on demand multipath routing with life maximization (AOMR-LM) protocols, the two most popular protocols proposed in this area The comparison was evaluated based on energy consumption, throughput, packet delivery ratio, end-to-end delay, network lifetime and routing overhead ratio performance metrics, varying the node speed, packet size, and simulation time The results clearly demonstrate that the proposed FF-AOMDV outperformed AOMDV and AOMR-LM under majority of the network performance metrics and parameters

150 citations

Journal Article
TL;DR: The progress of the multipath routing technique is surveyed, various routing protocols are described and evaluated, which cover most types of multipath routed protocols, and a comparison and discussion of their respective merits and drawbacks are provided.
Abstract: There are significant differences between wire networks and MANETs.MANETs have nodes with high mobility,limited bandwidth resources,and variable topology.Therefore,there is a need for new routing protocols,which solves all these drawbacks.Most routing protocols for MANETs do not take fairness into account.They tend to have a heavy burden on the hosts along the shortest path from a source to a destination.As a result,heavily loaded hosts may deplete power energy quickly,which will lead to network disconnections and failure of application sessions.There have been some methods of multipath routing to solve the question.In this paper,the progress of the multipath routing technique is surveyed,and various routing protocols are described and evaluated,which cover most types of multipath routing protocols,and then provide a comparison and discussion of their respective merits and drawbacks.Finally,the future research directions are outlined.

92 citations

Journal ArticleDOI
TL;DR: The background of the 5G wireless networks is described and a deep insight is given into a set of 5G challenges and research opportunities for machine learning (ML) techniques to manage these challenges.
Abstract: 5G cellular networks are expected to be the key infrastructure to deliver the emerging services. These services bring new requirements and challenges that obstruct the desired goal of forthcoming networks. Mobile operators are rethinking their network design to provide more flexible, dynamic, cost-effective and intelligent solutions. This paper starts with describing the background of the 5G wireless networks then we give a deep insight into a set of 5G challenges and research opportunities for machine learning (ML) techniques to manage these challenges. The first part of the paper is devoted to overview the fifth-generation of cellular networks, explaining its requirements as well as its key technologies, their challenges and its forthcoming architecture. The second part is devoted to present a basic overview of ML techniques that are nowadays applied to cellular networks. The last part discusses the most important related works which propose ML solutions in order to overcome 5G challenges.

89 citations