To search, Click below search items.

 

All Published Papers Search Service

Title

Delay-Efficient Approaches for Sleep Scheduling in Wireless Sensor Networks

Author

Arul Xavier V.M, Angelin Jeyaseeli D

Citation

Vol. 13  No. 11  pp. 130-134

Abstract

Wireless sensor networks (WSN) have recently used in many applications like surveillance, military applications, etc. In such applications, the sensor nodes are expected to be work long period of time without recharging their batteries. To extend the network lifetime, some sleep scheduling techniques always used, which may cause communication delay in large scale WSNs. In this paper, we present the challenges in the design of delay efficient sleep scheduling, comparison of different approaches in terms of performance metrics and future outlook of communication delay in WSN.

Keywords

sleep scheduling, wake-up pattern

URL

http://paper.ijcsns.org/07_book/201311/20131119.pdf

Title

Delay-Efficient Approaches for Sleep Scheduling in Wireless Sensor Networks

Author

Arul Xavier V.M, Angelin Jeyaseeli D

Citation

Vol. 13  No. 11  pp. 130-134

Abstract

Wireless sensor networks (WSN) have recently used in many applications like surveillance, military applications, etc. In such applications, the sensor nodes are expected to be work long period of time without recharging their batteries. To extend the network lifetime, some sleep scheduling techniques always used, which may cause communication delay in large scale WSNs. In this paper, we present the challenges in the design of delay efficient sleep scheduling, comparison of different approaches in terms of performance metrics and future outlook of communication delay in WSN.

Keywords

sleep scheduling, wake-up pattern

URL

http://paper.ijcsns.org/07_book/201311/20131119.pdf

Title

Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments

Author

Josenilson Dias Araujo, Zair Abdelouahab

Citation

Vol. 13  No. 11  pp. 135-142

Abstract

This article presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud, and launch attacks against legitimate users to gain access to private and privileged data. To effectively protect the cloud users, an IDS should have the ability to expand, increase or rapidly decrease the quantity of sensors according to the quantity of resources, as well as the ability to isolate access to the system levels and infrastructures. For this purpose, characteristics of virtual machines as quick startup, fast recovery, stop, migration between different hosts and execution across multiple platforms can be exploited in VM-based IDS, making it a great alternative for monitoring intrusions in cloud computing environments.

Keywords

Cloud computing, IDS, Virtualization, VM.

URL

http://paper.ijcsns.org/07_book/201311/20131120.pdf