4,613 research outputs found
Comparison of CSMA based MAC protocols of wireless sensor networks
Energy conservation has been an important area of interest in Wireless Sensor
networks (WSNs). Medium Access Control (MAC) protocols play an important role
in energy conservation. In this paper, we describe CSMA based MAC protocols for
WSN and analyze the simulation results of these protocols. We implemented
S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator
which unlike other simulators simulates the same code running on real hardware.
Previous surveys mainly focused on the classification of MAC protocols
according to the techniques being used or problem dealt with and presented a
theoretical evaluation of protocols. This paper presents the comparative study
of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a
particular environment and supports the arguments with the simulation results.
The comparative study can be used to find the best suited MAC protocol for
wireless sensor networks in different environments.Comment: International Journal of AdHoc Network Systems, Volume 2, Number 2,
April 201
Sleep Deprivation Attack Detection in Wireless Sensor Network
Deployment of sensor network in hostile environment makes it mainly
vulnerable to battery drainage attacks because it is impossible to recharge or
replace the battery power of sensor nodes. Among different types of security
threats, low power sensor nodes are immensely affected by the attacks which
cause random drainage of the energy level of sensors, leading to death of the
nodes. The most dangerous type of attack in this category is sleep deprivation,
where target of the intruder is to maximize the power consumption of sensor
nodes, so that their lifetime is minimized. Most of the existing works on sleep
deprivation attack detection involve a lot of overhead, leading to poor
throughput. The need of the day is to design a model for detecting intrusions
accurately in an energy efficient manner. This paper proposes a hierarchical
framework based on distributed collaborative mechanism for detecting sleep
deprivation torture in wireless sensor network efficiently. Proposed model uses
anomaly detection technique in two steps to reduce the probability of false
intrusion.Comment: 7 pages,4 figures, IJCA Journal February 201
Development of a building information modelling (BIM) migration path model for construction professionals
The construction professionals have the notion that by implementing Building
Information Modelling (BIM) in construction could overcome problems such as delay,
cost overrun, clashes in project design and undesirable quality in construction.
However, they failed to take the advantages of the BIM benefit as they are still trying
to find the best way to take on board the BIM into current practices. Most of the
professionals do not know ‘when’ and ‘how’ to apply BIM throughout the construction
lifecycle. Several research models related to BIM has been developed to improve and
encourage BIM implementation. Nevertheless, the developed models have limitations
in highlighting the steps involved that could assist the construction professionals in
implementing BIM effectively in Malaysia. Therefore, this research is aimed to
develop a model that would be able to assist Malaysian construction professionals in
implementing BIM in a structured way. A semi-structured interview was carried out
with respondents that have various experienced and currently involved in BIM projects
in the Malaysian construction industry. Findings show that the construction
professionals are lacking in knowledge and experience in using BIM in various stages
of construction. Thus, they were unable to fully capitalise the benefit of 3D models.
Migration path model was proposed and evaluated as a strategic approach for BIM
implementation in the Malaysian construction industry. The identification of five (5)
activities (BIM Awareness, Develop BIM Strategy, Implement BIM, Monitor BIM
and Expand BIM Implementation) with the three (3) enablers (BIM work contract,
BIM work process and BIM technology) in the model is expected to be able to assist
construction professionals to implement BIM with the right BIM concept and later, the
benefit could be obtained for improving construction project. The proposed model
could be as a guideline for construction professionals in implementing BIM,
specifically in countries that new in BIM. The model is also expected to be able to fill
the gap in BIM implementation by supporting the initiatives by the Malaysian
government for increasing productivity in construction projects by using new
technology like BIM
- …