[AISWorld] Latest issue of IJBDCN and CFP

Sridhar Varadharajan sridhar.varadharajan at sasken.com
Thu Jan 5 05:00:32 EST 2012


The contents of the latest issue of:



International Journal of Business Data Communications and Networking (IJBDCN)

Official Publication of the Information Resources Management Association

Volume 7, Issue 4, October-December 2011

Published: Quarterly in Print and Electronically

ISSN: 1548-0631 EISSN: 1548-064X

Published by IGI Publishing, Hershey-New York, USA

www.igi-global.com/ijbdcn<http://www.igi-global.com/ijbdcn>



Editor-in-Chief: Varadharajan Sridhar, Sasken Communication Technologies, India; Debashis Saha, Indian Institute of Management Calcutta, India



EDITORIAL PREFACE



Debashis Saha, Indian Institute of Management Calcutta, India

Varadharajan Sridhar, Sasken Communication Technologies, India



To view the editorial preface, please click on the link below and click on "Preface" for the 4th Quarter issue.

http://www.igi-global.com/bookstore/titledetails.aspx?titleid=47832&detailstype=contents



PAPER ONE



Secure Video Transmission Against Black Hole Attack in MANETs

M. Umaparvathi, Anna University of Technology, India

Dharmishtan K. Varughese, Karpagam College of Engineering, India



Mobile Adhoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics like dynamic topology, shared medium, absence of infrastructure, and resource constraints. Data packets sent by a source node may reach destination through a number of intermediate nodes. In the absence of security mechanism, it is easy for an intermediate node to intercept or modify the messages, thus attacking the normal operation of MANET. One such attack is Black hole attack, in which, a malicious node called Black hole node attracts all the traffic of the network towards itself, and discards all the packets without forwarding them to the intended recipients. This paper evaluates the performance of Adhoc on-demand Distance Vector (AODV) and its multi-path variant Adhoc On-demand Multi-path Distance Vector (AOMDV) routing protocols under black hole attack. Non-cryptographic solutions Secure Blackhole AODV (SBAODV) and Secure Blackhole AOMDV (SBAOMDV) have been proposed to mitigate the effect of black hole attack. Through NS-2 simulations, the performance of the proposed protocols with video streaming is analyzed. The results show that the proposed solutions provide better performance than the conventional AODV and AOMDV.



To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/secure-video-transmission-against-black/61348



To read a PDF sample of this article, please visit

http://www.igi-global.com/viewtitlesample.aspx?id=61348



PAPER TWO



Enhancing Clustering in Wireless Sensor Networks with Energy Heterogeneity



Femi A. Aderohunmu, University of Otago, New Zealand

Jeremiah D. Deng, University of Otago, New Zealand

Martin K. Purvis, University of Otago, New Zealand



While wireless sensor networks (WSN) are increasingly equipped to handle more complex functions, in-network processing still requires the battery-powered sensors to judiciously use their constrained energy so as to prolong the elective network life time. There are a few protocols using sensor clusters to coordinate the energy consumption in a WSN, but how to deal with energy heterogeneity remains a research question. The authors propose a modified clustering algorithm with a three-tier energy setting, where energy consumption among sensor nodes is adaptive to their energy levels. A theoretical analysis shows that the proposed modifications result in an extended network stability period. Simulation has been conducted to evaluate the new clustering algorithm against some existing algorithms under different energy heterogeneity settings, and favourable results are obtained especially when the energy levels are significantly imbalanced.



To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/enhancing-clustering-wireless-sensor-networks/61349



To read a PDF sample of this article, please visit

http://www.igi-global.com/viewtitlesample.aspx?id=61349





PAPER THREE



New Strategies and Extensions in Kruskal's Algorithm in Multicast Routing



Mohamed Aissa, University of Nizwa, Oman

Adel Ben Mnaouer, Dar Al Uloom University, Saudi Arabia

Rion Murray, University of Trinidad and Tobago, Trinidad and Tobago

Abdelfettah Belghith, HANA Research Group University of Manouba, Tunisia



Multimedia applications are expected to guarantee end-to-end quality of service (QoS) and are characterized by stringent constraints on delay, delay-jitter, bandwidth, cost, and so forth. The authors observe that Kruskal's algorithm is limited to minimal (maximal) spanning unconstrained tree. As such, the authors extend Kruskal's algorithm to incorporate the delay bound constraint. Consequently, a novel algorithm is proposed, called EKRUS (Extended Kruskal), for constructing multicast trees. The EKRUS' distinguishing features consists of a better management of Kruskal's priority queues, and in the provision of edge priority aggregation. Preliminary results show that the proposed EKRUS algorithm performs as well as the best-known algorithms (such as the DDMC, DMCTc algorithms) while exhibiting reduced complexity. The authors conducted an intensive analysis and evaluations of different strategies of assigning edges into the classes of the queue as well as edge selection. As a result, the EKRUS algorithm was further extended with different edge assignment and selection strategies. Through extensive simulations, the authors have evaluated various versions of the EKRUS and analyzed their performance under different load conditions.



To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/new-strategies-extensions-kruskal-algorithm/61350



To read a PDF sample of this article, please visit

http://www.igi-global.com/viewtitlesample.aspx?id=61350



PAPER FOUR



Emerging Areas of Research in Business Data Communications



Debashis Saha, Indian Institute of Management Calcutta, India

Varadharajan Sridhar, Sasken Communication Technologies, India



Much like the financial crisis that precipitated a new world order, a quiet revolution of some sorts is happening in the telecom industry worldwide. The bankruptcy of stalwarts such as Nortel and the impregnation of Google and Apple into the mobile phone space at an amazing alacrity are changing the world order once dominated by the likes of biggies such as AT&T. What are these changes and what can we expect in the future? We explore in this article, the emerging technologies, market evolution, business models and regulatory interventions and indicate possible research directions in the area of data communications and networking in the coming days.



To obtain a copy of the entire article, click on the link below.

http://www.igi-global.com/article/emerging-areas-research-business-data/61351



To read a PDF sample of this article, please visit

http://www.igi-global.com/viewtitlesample.aspx?id=61351



*****************************************************

For full copies of the above articles, check for this issue of the International Journal of Business Data Communications and Networking (IJBDCN) in your institution's library.  This journal is also included in the IGI Global aggregated "InfoSci-Journals" database:
http://www.igi-global.com/EResources/InfoSciJournals.aspx.

*****************************************************



CALL FOR PAPERS



Mission of IJBDCN:



The mission of the International Journal of Business Data Communications and Networking (IJBDCN) is to disseminate practical and theoretical information, which will enable readers to understand, manage, use, and maintain business data communication networks more effectively. IJDBCN addresses key technology, management, and policy issues for utilizing data communications and networking in business and the current best practices for aligning this important technology with the strategic goals of the organization.



Coverage of IJBDCN:



IJBDCN covers the principles of both wired and wireless communications of voice, data, images, and video and the impact of their business values on the organizations in which they are used. This journal includes theoretical and practical works, relevant case studies, topical surveys, and research articles that address problems faced by telecommunication service providers, equipment manufacturers, enterprises, and policy makers in the areas of data communications and networking.



Topics should be drawn from, but not limited to, the following areas:



Adoption and diffusion of networking technologies

Business applications of telecommunications

Business implications of public WWANs and WLANs deployment

Business re-engineering issues associated with networking

Cross-border network-based information systems

Designing, deploying, and using networked systems in specialized sectors (i.e. health, education, and manufacturing)

Effects of legislation and regulation on telecommunications

Emerging networking trends

Frameworks for wireless security

Impact of the open source movement on business data communications

Management of business data communications projects

Management of telecommunications in organizations

Mobility and m-commerce issues

Network management contingency issues

Organizational impact of e-commerce connectivity

Outsourcing of networking and data communication services

Policy-based network management systems

Policy-based security systems

Quality of service issues associated with networked systems

Security of interconnected systems (procedures, implementation, mechanisms, protocols, and compatibility)

Standards and network interoperability issues

Strategic use of networking technologies

Success factors of networked systems

Telecommuting, remote access, and virtual private networks

Usability of business data communication networks

Use of distributed services (Web services/DCOM/CORBA) over wireless networks



Interested authors should consult the journal's manuscript submission guidelines at www.igi-global.com/ijbdcn<http://www.igi-global.com/ijbdcn>



All inquiries and submissions should be sent to:

Editor-in-Chief: Varadharajan Sridhar at v_sridhar at acm.org<mailto:v_sridhar at acm.org>; Debashis Saha at ds at iimcal.ac.in<mailto:ds at iimcal.ac.in>




Dr. V. Sridhar (www.vsridhar.info<http://www.vsridhar.info/>)
Research Fellow
Sasken Communication Technologies
139/25 Ring Road
Domlur
Bangalore 560035
INDIA
Phone: +918039814005
Mobile: +919972595708
Public email: v.sridhar001 at gmail.com<mailto:v.sridhar001 at gmail.com>


________________________________
SASKEN BUSINESS DISCLAIMER: This message may contain confidential, proprietary or legally privileged information. In case you are not the original intended Recipient of the message, you must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message and you are requested to delete it and inform the sender. Any views expressed in this message are those of the individual sender unless otherwise stated. Nothing contained in this message shall be construed as an offer or acceptance of any offer by Sasken Communication Technologies Limited ("Sasken") unless sent with that express intent and with due authority of Sasken. Sasken has taken enough precautions to prevent the spread of viruses. However the company accepts no liability for any damage caused by any virus transmitted by this email.
Read Disclaimer at http://www.sasken.com/extras/mail_disclaimer.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120105/274acc83/attachment.html>


More information about the AISWorld mailing list