scispace - formally typeset
Search or ask a question
JournalISSN: 1941-8663

International Journal of Interdisciplinary Telecommunications and Networking 

IGI Global
About: International Journal of Interdisciplinary Telecommunications and Networking is an academic journal published by IGI Global. The journal publishes majorly in the area(s): Computer science & Wireless network. It has an ISSN identifier of 1941-8663. Over the lifetime, 307 publications have been published receiving 1373 citations. The journal is also known as: IJITN.


Papers
More filters
Journal ArticleDOI
TL;DR: An intrusion detection system (IDS) based on self-organizing map (SOM) neural network to cluster the WSN routing attacks, and hence notify the system administrator at an early stage, reducing the risk of interrupting the network and consuming nodes' power.
Abstract: Routing over low power and lossy networks (RPL) is a standardized routing protocol for constrained Wireless Sensor Network (WSN) environments. The main node's constraints include processing capability, power, memory, and energy. RPL protocol describes how WSN nodes create a mesh topology, enabling them to route sensor data. Unfortunately, various attacks exist on the RPL protocol that can disrupt the topology and consume nodes' energy. In this article, the authors propose an intrusion detection system (IDS) based on self-organizing map (SOM) neural network to cluster the WSN routing attacks, and hence notify the system administrator at an early stage, reducing the risk of interrupting the network and consuming nodes' power. Results showed that the proposed SOM architecture is able to cluster routing packets into three different types of attacks, as well as clean data.

34 citations

Journal ArticleDOI
TL;DR: This paper presents a comprehensive description of two broad categories of data gathering algorithms for wireless sensor networks-the classical algorithms that are not energy-aware and modern energy- aware data gatheringgorithms.
Abstract: Wireless sensor networks comprise of vast numbers of sensor nodes deployed to monitor a particular event fire, intrusion, etc. or measure a parameter like temperature, pressure value representative of the physical condition of the ambient environment. There is a growing need of using energy-efficient data gathering algorithms that can effectively aggregate the monitored/measured data from the individual sensor nodes through a properly constructed communication topology and transmit a single representative data to a control center sink that is typically located far away from the network field. In order to maximize node lifetime and be fair to all nodes in the network, such a communication topology has to be dynamically constructed for every round of data gathering by taking into consideration available energy levels of sensor nodes. This paper presents a comprehensive description of two broad categories of data gathering algorithms for wireless sensor networks-the classical algorithms that are not energy-aware and modern energy-aware data gathering algorithms. These algorithms can also be classified based on the communication topology they choose to construct and use for data gathering. The authors also present an extensive simulation study that demonstrates the individual as well as the comparative performance of these data gathering algorithms.

32 citations

Journal ArticleDOI
TL;DR: Performance comparison studies involving well-known LEACH and PEGASIS algorithms indicate that ECDS-DG incurs the lowest energy consumption per round and sustains the largest number of rounds before first node failure.
Abstract: This paper develops an energy-aware connected dominating set based data gathering ECDS-DG algorithm for wireless sensor networks. The algorithm includes only nodes that have a relatively higher energy level in ECDS. For every round, a data gathering tree ECDS-DG tree rooted at the ECDS Leader, that is, the node with the largest available energy, which transmits the data packet to the sink, is formed by considering only the nodes in the ECDS as the intermediate nodes of the tree. The non-ECDS nodes are leaf nodes of the tree, and the upstream node of an intermediate ECDS node in the ECDS-DG tree is the closest ECDS node that is also relatively closer to the ECDS Leader. Performance comparison studies involving well-known LEACH and PEGASIS algorithms indicate that ECDS-DG incurs the lowest energy consumption per round and sustains the largest number of rounds before first node failure.

31 citations

Journal ArticleDOI
TL;DR: The authors describe a methodology for evaluating the performability (combined performance and reliability) of large communications networks and have developed a network analysis tool called nperf that embodies this methodology.
Abstract: The authors describe a methodology for evaluating the performability (combined performance and reliability) of large communications networks. Networks are represented by a 4-level hierarchical model, consisting of traffic matrix, network graph, “components†representing failure modes, and reliability information. Network states are assignments of modes to the network components, which usually represent network elements and their key modules, although they can be more abstract. The components can be binary or multi-modal, and each of their failure modes may change a set of attributes of the graph (e.g. the capacity or cost of a link). Their methodology also captures the effect of automatic restoration against network failures by including two common rerouting methods. To compute network performability measures, including upper and lower bounds on their cumulative distribution functions, we augment existing probabilistic state-space generation algorithms with our new “hybrid†algorithm. To characterize the network failures of highest impact, we compute the Pareto boundaries of the network’s risk space. The authors have developed a network analysis tool called nperf that embodies this methodology. To illustrate the methodology and the practicality of the tool, they describe a performability analysis of three design alternatives for a large commercial IP backbone network.

27 citations

Journal ArticleDOI
TL;DR: The authors examine the impact of wireless technology on gatekeeping practices in the context of EU news markets using the Shoemaker/ReeseGatekeeping Model.
Abstract: Mediation in news industries has received significant attention by researchers for more than half a century. Gatekeepers decide which information should be delivered to different audiences. The Shoemaker/ReeseGatekeeping Model identifies five different filters of content processing: individual influences, professional routines, the organization, extra-media influences and ideology. Journalism practices, intra-organization and extra-media-related procedures and strategic alliances, including culture and ideology, add more complexity in the contemporary globalized media landscape. Gatekeeping is being processed through out all the above mentioned pillars. ICT technologies related to the media have influenced the interactivity among the pillars and wireless technologies have influenced the digital media landscape. The European Union has experienced dramatic changes in its regulation environment and spectrum resources allocation. In this article, the authors examine the impact of wireless technology on gatekeeping practices in the context of EU news markets.

26 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20234
202235
202124
202025
201919
201821