scispace - formally typeset
Search or ask a question
Author

Vinayak Musale

Bio: Vinayak Musale is an academic researcher from Government College of Engineering, Amravati. The author has contributed to research in topics: Wireless sensor network & Wireless network. The author has an hindex of 2, co-authored 5 publications receiving 11 citations.

Papers
More filters
Proceedings ArticleDOI
01 Jan 2017
TL;DR: The main purpose of this paper is to provide technical approaches to address three key challenges in designing of reliable and endurable wireless sensor networks, namely communication reliability, operation with significantly low and effective power sources and multi-tier network architecture.
Abstract: Now a days wireless sensors are attracting strong interest for different monitoring and controlling applications as they are integrated with the function of sensing, processing and wireless communication. The wireless sensor networks have been deployed for agricultural, industrial, remote monitoring and traffic management purposes. As energy shortage is a worldwide problem so that more attention has been placed on incorporating energy harvesting devices in wireless sensor networks. The main purpose of this paper is to focus on the systematic study of the design principles of wireless sensor networks and to provide technical approaches to address three key challenges in designing of reliable and endurable wireless sensor networks. The key challenges are namely communication reliability, operation with significantly low and effective power sources and multi-tier network architecture.

7 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: The improved approach is discussed which integrates sequential pattern mining with graph theory and design of web usage mining tool with improved approach with results are discussed.
Abstract: In this era, the web usage mining plays one of the important role in analyzing and improving performance of web applications. Initially in this paper, the concept of web usage mining has been introduced along with Improved AprioriAll algorithm which is the base algorithm for the proposed tool along with its limitation. The improved approach is discussed which integrates sequential pattern mining with graph theory. In the next part, design of web usage mining tool with improved approach is discussed. Implementation details of the tool are discussed along with the results. The last part covers how the raw result from the proposed tool can be further visualized and analyzed using new technologies like D3.js and Neo4j. The future scope of the proposed tool is mentioned at the end of the paper.

2 citations

Book ChapterDOI
07 Aug 2018
TL;DR: In this paper, the authors present a methodology to design attack-aware efficient secure keying mechanism that provides secure data transmission from one sensor node to another, which is an important constraint for the healthy operations of overall system in untrusted areas as these entities may disturb the proper functioning of applications by injecting wrong data into sensor networks.
Abstract: Now a days the wireless sensor technologies are mostly being used in a typical application areas including environmental, defence, medical, military and commercial enterprises. In upcoming years, wireless sensor networks will integrate more tiny sensors into a variety of application scenarios like cyber physical systems, IoT etc. The security of sensor networks is an important constraint for the healthy operations of overall system in untrusted areas as these entities may disturb the proper functioning of applications by injecting wrong data into sensor networks. One way to address this issue is to provide more security to sensor nodes and encrypt the communication among them. This paper presents methodology to design attack-aware efficient secure keying mechanism that provides secure data transmission from one sensor node to another.

2 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A new novel approach for securing wireless sensor networks with different layers of security along with data encryption / decryption strategies is proposed and will help the organizations to secure their information and make underlying wireless networks more secure and reliable.
Abstract: It has been observed that, the use of wireless sensor network platforms have procured vast popularity over last few years. The wireless sensor networks are being widely used in agriculture, home security, health care monitoring and traffic management systems. Usage of these systems has increased rapidly. An organization or institute can make use of the data obtained from various such sensor network systems for their analysis. Data obtained from such networks can be misused by any person if the systems are not well secured. Thus misuse of valuable information raises many problems for organization or institute. So to tackle this problem, we need to secure the sensor network systems from vulnerable attacks. In this paper, we propose a new novel approach for securing wireless sensor networks with different layers of security along with data encryption / decryption strategies. As there is a huge concern regarding privacy and integrity of data, this approach will help the organizations to secure their information and make underlying wireless networks more secure and reliable. This paper also brings focus on design and implementation of reliable secure sensor network for the health care monitoring in medical field. The architecture will allow smooth and efficient interconnection of patient's body area network and stationary wireless networks. It presents native solutions for event management, time synchronization and security.

1 citations

Journal Article
TL;DR: This paper mainly focuses on the various routing techniques, design challenges of routing protocols along with the performance issues of each routing technique in wireless sensor networks and presents comprehensive analysis of different routing techniques used to achieve energy efficiency.
Abstract: Wireless Sensor Network consists of small battery powered nodes with capabilities of sensing, computation, and wireless communication. In WSNs, many routing, power management and data dissemination protocols have been specially designed where energy awareness is an essential design issue. To achieve better energy efficiency, the focus, however, has been given to the routing protocols which might differ depending on the application and network architecture. In this paper, we mainly focuses on the various routing techniques, design challenges of routing protocols along with the performance issues of each routing technique in wireless sensor networks. Also present comprehensive analysis of different routing techniques used to achieve energy efficiency.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This evaluation intends to propose a new approach for examining methods by considering the methodology-based parameters such as capabilities and constraints, examined inputs and outputs in each method, type of algorithm used in the methods, the purpose of using algorithms, etc.

154 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, a tree-based clustering algorithm is used to mine the relevant items from the datasets and to predict the navigational behavior of the users, and the proposed method is evaluated over BUS log data, where the data is of greater significance since it contains the log data of all the students in the university.
Abstract: The improvements in tuning the website and improving the visitors’ retention are done by deploying the efficient weblog mining and navigational pattern prediction model. This crucial application initially performs data clearing and initialization procedures until the hidden knowledge is extracted as output. To obtain good results, the quality of the input data has to be promisingly good, and hence, more focus should be given to pre-processing and data cleaning operations. Other than this, the major challenge faced is the poor scalability during navigational pattern prediction. In this paper, the scalability of weblog mining is improved by using suitable pre-processing and data cleaning operations. This method uses a tree-based clustering algorithm to mine the relevant items from the datasets and to predict the navigational behavior of the users. The algorithm focus will be mainly on density-based learning to cluster and predict future requests. The proposed method is evaluated over BUS log data, where the data is of greater significance since it contains the log data of all the students in the university. The conducted experiments prove the effectiveness and applicability of weblog mining by using the proposed algorithm.

10 citations

Journal ArticleDOI
TL;DR: The objective of the each phase is to enhance the data accuracy of the collected data with minimized delay to achieve scalable and fairness medical sensor networks system.
Abstract: Advances made in the wearable and biosensor has attracted the applicability and usability of the healthcare applications. The biosensors collect the human physiological data from a remote area using wireless communication medium. Different form of security implications have to be exhibited in wireless body area networks (WBAN). This paper researches on enhancing the network layer and application layer of the WBAN in healthcare environment. The objective of the each phase is to enhance the data accuracy of the collected data with minimized delay. In the first phase, we have constructed attack model for Sybil, sinkhole and wormhole attacks and detected those attacks under different constraints. Secondly, an efficient packet transmission model which helps to transmit the sensed data based on their emergency using weighted product model. After devising network layer, a lightweight security scheme, an improved elliptic curve cryptography (ECC) that permits the data access for the authorized users. Experimental analysis is carried out for each phase under pre-defined simulation parameters which explores better results. The framed attack model detects the three eminent attacks in terms of false positive rate and false negative rate which helps the data controller for message transmission process. Likewise, we have also achieved 97% packet delivery ratio with 0.8 ms packet dropping ratio for better packet transmission model than the existing TOPSIS model. Time taken for key generation and secret key exchange using our proposed ECC achieved 2.4 and 0.96 ms. The overall system proves that our research model achieves scalable and fairness medical sensor networks system.

9 citations

Journal Article
TL;DR: A multi-objective swarm intelligence algorithm – which is based on Shuffled Frog-leaping and Firefly Algorithms (SFFA) – is presented as a clustering-based protocol for WSNs.
Abstract: Swarm intelligence-based algorithms are soft computing techniques, which have already been applied to solve a broad range of optimization problems. Generally, clustering is the most common technique, which, balances the energy consumption among all sensor nodes and minimizes traffic and overhead during data transmission phases of Wireless Sensor Networks. The performance scope of the existing clustering protocols is fixed and hence, cannot adapt to all possible areas of applications. In this paper, a multi-objective swarm intelligence algorithm – which is based on Shuffled Frog-leaping and Firefly Algorithms (SFFA) – is presented as a clustering-based protocol for WSNs. The multi-objective fitness function of SFFA considers different criteria such as cluster heads’ distances from the sink, residual energy of nodes, inter- and intra-cluster distances and finally overlap and load of clusters to select the most proper cluster heads at each round. The parameters of SFFA in clustering phase can be adapted and tuned to achieve the best performance based on the network requirements. The simulation outcomes demonstrated an average lifetime improvement of up to 49.1%, 38.3%, 7.1%, and 11.3% compared to LEACH, ERA, SIF, and FSFLA in different network scenarios, respectively.

8 citations

Journal ArticleDOI
TL;DR: A simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN is introduced.
Abstract: Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.

6 citations