scispace - formally typeset
Search or ask a question
Author

M. L. Valarmathi

Bio: M. L. Valarmathi is an academic researcher from Government College of Technology, Coimbatore. The author has contributed to research in topics: WiMAX & Feature selection. The author has an hindex of 11, co-authored 66 publications receiving 487 citations. Previous affiliations of M. L. Valarmathi include Government College of Technology & Government College.


Papers
More filters
Journal ArticleDOI
TL;DR: A TDMA based MAC protocol was used to collect environmental data such as soil moisture and temperature of an irrigation system and the simulation results showed that the aggregation method was providing a 10% increase in the residual energy and 13% increased in the throughput.

79 citations

Journal ArticleDOI
01 Apr 2011
TL;DR: The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively.
Abstract: Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

52 citations

Journal ArticleDOI
TL;DR: This paper presents an overview of the various concepts and research works in the field of image watermark authentication, and the concept of content-based image water marking is reviewed in details.
Abstract: The digital revolution in digital image processing has made it possible to create, manipulate and transmit digital images in a simple and fast manner. The adverse affect of this is that the same image processing techniques can be used by hackers to tamper with any image and use it illegally. This has made digital image safety and integrity the top prioritized issue in today’s information explosion. Watermarking is a popular technique that is used for copyright protection and authentication. This paper presents an overview of the various concepts and research works in the field of image watermark authentication. In particular, the concept of content-based image watermarking is reviewed in details. KeywordsWatermark Lifecycle, Robust Watermarking Schemes, Fragile Watermarking Schemes, HVS, ICA.

44 citations

Journal ArticleDOI
01 Jul 2017
TL;DR: The authors propose a trust management scheme to facilitate trustworthy automatic decision making based on behaviour of objects to identify the presence of ‘on off’ selective forwarding attacks.
Abstract: The Internet is populated with billions of electronic gadgets that have become a part of our fabric. Internet of Things is gaining popularity in at most all applications from smart buildings, intelligent transportation, healthcare and defence. IoT is a many vision one paradigm technology. One of the many visions of IoT is to make ‘Things’ social. Social Internet of Things (SIoT) is a young paradigm that integrates IoT and Social networking principles where Things are not only autonomous and smarter but also socially conscious. The authors propose a trust management scheme to facilitate trustworthy automatic decision making based on behaviour of objects. The authors use SIoT Trust metrics namely direct trust, centrality, community interest, Cooperativeness, Service Score to compute Trustworthiness among objects. The Expected trust and periodic trust updates evidently identify the presence of ‘on off’ selective forwarding attacks. The authors demonstrate the advantages of the proposed scheme with other existing trust management schemes in the literature.

43 citations

Journal ArticleDOI
TL;DR: A Trust Management scheme for Social Internet of Things where trust between objects is computed based on Direct Observations, Indirect Recommendations, Centrality, Energy and Service Score of the object leading to a better application performance.
Abstract: Today’s electrical and electronic gadgets have become smarter and intelligent. These devices such as sensors, actuators, RFIDs are becoming part of our fabric. Internet of Things (IoT) and Social networking paradigms are not new. The increased pervasiveness has resulted not only in human to thing communication but also thing to thing communication. A new paradigm integrating IoT and Social Networks has emerged in recent years called the Social Internet of Things (SIoT) where objects are not only smarter but also socially conscious. Social Internet of Things is analogous to social network of intelligent objects. Trust is considered as a crucial factor in SIoT for objects to establish reliable autonomous communication. This paper proposes a Trust Management scheme for Social Internet of Things where trust between objects is computed based on Direct Observations, Indirect Recommendations, Centrality, Energy and Service Score of the object. The proposed trust model outperforms the existing trust models leading to a better application performance. The trust model is also tested in the presence of On Off selective forwarding attacks. Experimental results prove that the proposed model is reliable and defendant against On Off selective forwarding attacks.

25 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal Article
TL;DR: In this article, Stann et al. present RMST (Reliable Multi-Segment Transport), a new transport layer for Directed Diffusion, which provides guaranteed delivery and fragmentation/reassembly for applications that require them.
Abstract: Appearing in 1st IEEE International Workshop on Sensor Net Protocols and Applications (SNPA). Anchorage, Alaska, USA. May 11, 2003. RMST: Reliable Data Transport in Sensor Networks Fred Stann, John Heidemann Abstract – Reliable data transport in wireless sensor networks is a multifaceted problem influenced by the physical, MAC, network, and transport layers. Because sensor networks are subject to strict resource constraints and are deployed by single organizations, they encourage revisiting traditional layering and are less bound by standardized placement of services such as reliability. This paper presents analysis and experiments resulting in specific recommendations for implementing reliable data transport in sensor nets. To explore reliability at the transport layer, we present RMST (Reliable Multi- Segment Transport), a new transport layer for Directed Diffusion. RMST provides guaranteed delivery and fragmentation/reassembly for applications that require them. RMST is a selective NACK-based protocol that can be configured for in-network caching and repair. Second, these energy constraints, plus relatively low wireless bandwidths, make in-network processing both feasible and desirable [3]. Third, because nodes in sensor networks are usually collaborating towards a common task, rather than representing independent users, optimization of the shared network focuses on throughput rather than fairness. Finally, because sensor networks are often deployed by a single organization with inexpensive hardware, there is less need for interoperability with existing standards. For all of these reasons, sensor networks provide an environment that encourages rethinking the structure of traditional communications protocols. The main contribution is an evaluation of the placement of reliability for data transport at different levels of the protocol stack. We consider implementing reliability in the MAC, transport layer, application, and combinations of these. We conclude that reliability is important at the MAC layer and the transport layer. MAC-level reliability is important not just to provide hop-by-hop error recovery for the transport layer, but also because it is needed for route discovery and maintenance. (This conclusion differs from previous studies in reliability for sensor nets that did not simulate routing. [4]) Second, we have developed RMST (Reliable Multi-Segment Transport), a new transport layer, in order to understand the role of in- network processing for reliable data transfer. RMST benefits from diffusion routing, adding minimal additional control traffic. RMST guarantees delivery, even when multiple hops exhibit very high error rates. 1 Introduction Wireless sensor networks provide an economical, fully distributed, sensing and computing solution for environments where conventional networks are impractical. This paper explores the design decisions related to providing reliable data transport in sensor nets. The reliable data transport problem in sensor nets is multi-faceted. The emphasis on energy conservation in sensor nets implies that poor paths should not be artificially bolstered via mechanisms such as MAC layer ARQ during route discovery and path selection [1]. Path maintenance, on the other hand, benefits from well- engineered recovery either at the MAC layer or the transport layer, or both. Recovery should not be costly however, since many applications in sensor nets are impervious to occasional packet loss, relying on the regular delivery of coarse-grained event descriptions. Other applications require loss detection and repair. These aspects of reliable data transport include the provision of guaranteed delivery and fragmentation/ reassembly of data entities larger than the network MTU. Sensor networks have different constraints than traditional wired nets. First, energy constraints are paramount in sensor networks since nodes can often not be recharged, so any wasted energy shortens their useful lifetime [2]. This work was supported by DARPA under grant DABT63-99-1-0011 as part of the SCAADS project, and was also made possible in part due to support from Intel Corporation and Xerox Corporation. Fred Stann and John Heidemann are with USC/Information Sciences Institute, 4676 Admiralty Way, Marina Del Rey, CA, USA E-mail: fstann@usc.edu, johnh@isi.edu. 2 Architectural Choices There are a number of key areas to consider when engineering reliability for sensor nets. Many current sensor networks exhibit high loss rates compared to wired networks (2% to 30% to immediate neighbors)[1,5,6]. While error detection and correction at the physical layer are important, approaches at the MAC layer and higher adapt well to the very wide range of loss rates seen in sensor networks and are the focus of this paper. MAC layer protocols can ameliorate PHY layer unreliability, and transport layers can guarantee delivery. An important question for this paper is the trade off between implementation of reliability at the MAC layer (i.e. hop to hop) vs. the Transport layer, which has traditionally been concerned with end-to-end reliability. Because sensor net applications are distributed, we also considered implementing reliability at the application layer. Our goal is to minimize the cost of repair in terms of transmission.

650 citations

Journal ArticleDOI
03 Aug 2017-Sensors
TL;DR: This review outlines the recent applications of WSNs in agriculture research as well as classifies and compares various wireless communication protocols, the taxonomy of energy-efficient and energy harvesting techniques for W SNs that can be used in agricultural monitoring systems, and comparison between early research works on agriculture-based WSNS.
Abstract: Wireless sensor networks (WSNs) can be used in agriculture to provide farmers with a large amount of information. Precision agriculture (PA) is a management strategy that employs information technology to improve quality and production. Utilizing wireless sensor technologies and management tools can lead to a highly effective, green agriculture. Based on PA management, the same routine to a crop regardless of site environments can be avoided. From several perspectives, field management can improve PA, including the provision of adequate nutrients for crops and the wastage of pesticides for the effective control of weeds, pests, and diseases. This review outlines the recent applications of WSNs in agriculture research as well as classifies and compares various wireless communication protocols, the taxonomy of energy-efficient and energy harvesting techniques for WSNs that can be used in agricultural monitoring systems, and comparison between early research works on agriculture-based WSNs. The challenges and limitations of WSNs in the agricultural domain are explored, and several power reduction and agricultural management techniques for long-term monitoring are highlighted. These approaches may also increase the number of opportunities for processing Internet of Things (IoT) data.

405 citations

Journal ArticleDOI
TL;DR: The theoretical framework developed identifies IoT priority areas and challenges, providing a guide for those leading IoT initiatives and revealing opportunities for future IoT research.
Abstract: The Internet of Things (IoT) global arena is massive and growing exponentially. Those in the emerging digital world have recently witnessed the proliferation and impact of IoT-enabled devices. The IoT has provided new opportunities in the technology arena while bringing several challenges to an increased level of concern. This research has both practical and theoretical impetus since IoT is still in its infancy, and yet it is considered by many as the most important technology initiative of today. This study includes a systematic review and synthesis of IoT related literature and the development of a theoretical framework and conceptual model. The review of the literature reveals that the number of applications that make use of the IoT has increased dramatically and spans areas from business and manufacturing to home, health care, and knowledge management. Although IoT can create invaluable data in every industry, it does not occur without its challenges. The theoretical framework developed identifies IoT priority areas and challenges, providing a guide for those leading IoT initiatives and revealing opportunities for future IoT research.

259 citations