Pooja Saini | Kurukshetra University (original) (raw)
Uploads
Papers by Pooja Saini
To achieve security in wireless sensor networks it is important to be able to encrypt the message... more To achieve security in wireless sensor networks it is important to be able to encrypt the messages sen t among the sensor nodes. Keys for encryption and authenticatio n purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size), achievin g such key agreement in wireless sensor network is extremely difficult. Many key agreement schemes used in general networks, such as Diffie-Hellman and public key based schemes, are not suitable for wireless sensor networks. Pre-distribu tion of secret key for all the pair of nodes is not possible due to the large amount of memory is used when network size is large. In this paper, we provide a view of pairwise key pre-distribution scheme and the deployment knowledge; and also describe the pairwise key pre-distribution scheme with d eployment knowledge as an improvement. Deployment knowledge avoids the unnecessary key assignments and improves the performance of the sensor networks in terms of memory usage.
Wireless Mesh Network (WMN) is considered to be an effective solution to support multimedia servi... more Wireless Mesh Network (WMN) is considered to be an effective solution to support multimedia services in last miles due to their automatic configuration and low cost deployment. The main feature of WMNs is multihop communications which may result in increased region coverage, better robustness and more capacity. Wireless mesh networks (WMNs) will play an important role in the next-generation wireless communication systems because it can support broadband services with ubiquitous coverage by low power consumption. Voice internet over protocol is an important services of wireless mesh network. Wireless Voip is more popular due to low cost and easy to deploy. Wireless mesh network is a good solution for Voip services deployment, performance evaluation. Performance is main challenges in QOS phase in this paper analyze four parameters to evaluate performance.
In Mobile Adhoc Network (MANET) there is no central infrastructure and the mobile devices are mov... more In Mobile Adhoc Network (MANET) there is no central infrastructure and the mobile devices are moving randomly, they may give rise to various kinds of problems, such as energy efficiency and power consumption within a network. Our aim is to make energy efficient. Lot of research work has been done on energy efficiency in MANET with different constraints and with different protocols. One critical issue in MANETs is how to conserve energy of devices in the network. In this paper Energy model is used in GPSR protocol and various threshold are implemented at the MAC Layer to conserve energy.. Finally performance of entire network using different parameters like Total Energy Consumed, Throughput has been analyzed.
Computing Research Repository, 2010
In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the... more In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to
Arxiv preprint arXiv:1007.0410, 2010
The medium access control (MAC) protocol is the main element which determines the system performa... more The medium access control (MAC) protocol is the main element which determines the system performance in wireless local area networks. The MAC technique of the IEEE 802.11 protocol is called Distributed Coordination Function (DCF). In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to analysis of the existing backoff algorithms in multi-hop ad hoc networks. Thus, in this paper, we considered two important multi-hop adhoc network scenarios: (a) Node Mobility Scenario and (b) Transmission Range Scenario and analyze and evaluate both the impact of mobility (i.e. node speed) and the impact of transmission range of nodes on the performance of various backoff algorithms.
To achieve security in wireless sensor networks it is important to be able to encrypt the message... more To achieve security in wireless sensor networks it is important to be able to encrypt the messages sen t among the sensor nodes. Keys for encryption and authenticatio n purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size), achievin g such key agreement in wireless sensor network is extremely difficult. Many key agreement schemes used in general networks, such as Diffie-Hellman and public key based schemes, are not suitable for wireless sensor networks. Pre-distribu tion of secret key for all the pair of nodes is not possible due to the large amount of memory is used when network size is large. In this paper, we provide a view of pairwise key pre-distribution scheme and the deployment knowledge; and also describe the pairwise key pre-distribution scheme with d eployment knowledge as an improvement. Deployment knowledge avoids the unnecessary key assignments and improves the performance of the sensor networks in terms of memory usage.
Wireless Mesh Network (WMN) is considered to be an effective solution to support multimedia servi... more Wireless Mesh Network (WMN) is considered to be an effective solution to support multimedia services in last miles due to their automatic configuration and low cost deployment. The main feature of WMNs is multihop communications which may result in increased region coverage, better robustness and more capacity. Wireless mesh networks (WMNs) will play an important role in the next-generation wireless communication systems because it can support broadband services with ubiquitous coverage by low power consumption. Voice internet over protocol is an important services of wireless mesh network. Wireless Voip is more popular due to low cost and easy to deploy. Wireless mesh network is a good solution for Voip services deployment, performance evaluation. Performance is main challenges in QOS phase in this paper analyze four parameters to evaluate performance.
In Mobile Adhoc Network (MANET) there is no central infrastructure and the mobile devices are mov... more In Mobile Adhoc Network (MANET) there is no central infrastructure and the mobile devices are moving randomly, they may give rise to various kinds of problems, such as energy efficiency and power consumption within a network. Our aim is to make energy efficient. Lot of research work has been done on energy efficiency in MANET with different constraints and with different protocols. One critical issue in MANETs is how to conserve energy of devices in the network. In this paper Energy model is used in GPSR protocol and various threshold are implemented at the MAC Layer to conserve energy.. Finally performance of entire network using different parameters like Total Energy Consumed, Throughput has been analyzed.
Computing Research Repository, 2010
In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the... more In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to
Arxiv preprint arXiv:1007.0410, 2010
The medium access control (MAC) protocol is the main element which determines the system performa... more The medium access control (MAC) protocol is the main element which determines the system performance in wireless local area networks. The MAC technique of the IEEE 802.11 protocol is called Distributed Coordination Function (DCF). In IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Backoff algorithm. First step to design a an efficient backoff algorithm for multi-hop ad hoc network is to analysis of the existing backoff algorithms in multi-hop ad hoc networks. Thus, in this paper, we considered two important multi-hop adhoc network scenarios: (a) Node Mobility Scenario and (b) Transmission Range Scenario and analyze and evaluate both the impact of mobility (i.e. node speed) and the impact of transmission range of nodes on the performance of various backoff algorithms.