Vol. 2 No. 3

Document Sample
Vol. 2 No. 3 Powered By Docstoc
					                                                               (IJCNS) International Journal of Computer and Network Security, 1
                                                                                                          Vol. 2, No. 3, March 2010

   Cryptanalysis of an efficient biometrics-based
remote user authentication scheme using smart cards
                                            Fuw-Yi Yang 1 and Jian-Sen Wang 2
                                    Department of Computer Science and Information Engineering,
                                                Chaoyang University of Technology,
                                   168 Jifong E. Rd., Wufong Township Taichung County, 41349,
                                                          Taiwan, R.O.C.
                                    Department of Computer Science and Information Engineering,
                                                Chaoyang University of Technology,
                                   168 Jifong E. Rd., Wufong Township Taichung County, 41349,
                                                          Taiwan, R.O.C.

                                                                   2, we give a brief review of Li and Hwang’s proposed
Abstract:     The authors Li and Hwang have proposed an
efficient biometrics-based remote user authentication scheme       scheme, and then, in Section 3, we demonstrate this
using smart cards. Security is provided through one-way hash       scheme’s weaknesses. Finally, we conclude this paper in
functions and biometrics verification. This scheme is more         Section 4.
efficient than other related schemes and enables the users to
change their passwords freely. However, there are some flaws in    2. Review of Li and Hwang’s proposed scheme
it, such as vulnerability to impersonation attacks, password-
guessing attacks, and power analysis attacks. Thus, this paper        Li and Hwang proposed an efficient biometrics-based
shows that the scheme proposed by Li and Hwang can be              remote user authentication scheme using smart cards. The
susceptible to certain types of attacks.                           scheme is divided into three phases: registration phase,
   Keywords: Biometrics, remote user authentication,               login phase, and authentication phase. Here, we briefly
impersonation attacks, password-guessing attacks, power analysis   introduce the three phases. In Table 1, we list the notations
attacks                                                            and abbreviations used in their scheme. The three phases are
                                                                   as follows:
1. Introduction                                                              Table 1: Notations used in their scheme
   In an insecure network environment, user authentication                       Client
is a significant component of security. Remote user
authentication schemes are used to verify the validity of the       Si           Server
user login request. In 1981, Lamport [1] proposed a remote          Ri           Trust registration center
user authentication scheme with verification tables.                 IDi         Identity of the user
However, Hwang and Li pointed out that if the verification
tables were modified or stolen, the remote authentication            PWi         Password of the user between Ci and Si
system would be influenced. Therefore, in 2000, Li and              Bi           Biometrics template of the user
Hwang proposed [2] a remote user authentication scheme              h (.)        One-way hash function
without any verification tables, using smart cards.
                                                                    Xs           Secret information maintained by the Si
   In general, ID-based remote user authentication schemes
are based on passwords [3], [4]. As simple passwords are             Rc          Random number chosen by the Ci
easy to break, many schemes have been proposed to enhance            Rs          Random number chosen by the Si
the security of the remote user authentication. But the
passwords can be lost, forgotten, or shared with other              ||           Concatenation
people, and thus, there is no way to know who the actual            ⊕            XOR operation
user is. Therefore, it cannot provide non repudiation. Hence,
biometric keys have been proposed [5], which are based on            2.1 The Registration Phase
personal characteristics such as fingerprints, palm prints,
and irises.                                                           Before the users login to the system, they must perform
   Li and Hwang have proposed an efficient biometrics-             the following steps, as shown in Figure 1.
based remote user authentication scheme using smart cards             Step 1: The users offer their personal biometrics, Bi , on
[6], which, however, could not withstand the impersonation         the specific device and input the password, PWi , and the
and power consumption attacks. This paper shall point out          user identity, IDi , to the registration center in person.
the flaws of this proposed scheme.
   The rest of this paper is organized as follows. In Section
2                                                                     (IJCNS) International Journal of Computer and Network Security,
                                                                                                                 Vol. 2, No. 3, March 2010

   Step 2: The registration center computes the messages                   Step 1: Si checks if the format of C i ’s IDi is valid or
ri = h ( PWi || fi ) and                                                 not.
 ei = h( IDi || Xs) ⊕ h( PWi || fi ) , where fi = h( Bi ) and Xs is        Step 2: If the above-mentioned holds, Si computes the
the secret information generated by Si .                                 messages           M 3 = h( IDi || Xs) ,     M 4 = M 2 ⊕ M 3 = Rc ,
    Step 3: The registration center stores ( IDi , h (.), fi , ei )       M 5 = M 3 ⊕ Rs , and M 6 = h( M 2 || M 4 ) to provide mutual
into the user’s smart card and then sends it to the user                 authentication between client and server.
through a secure channel.                                                  Step 3: Next, Si sends the messages (M5, M6) to Ci .
                                                                            Step 4: On receiving the Si ’s message, C i checks if
           Ci                    Ri
                IDi , Bi , PWi                                            M 6 = h( M 2 || Rc) .
                                                                            Step 5: If the above-mentioned holds, C i considers that
                                                                          Si is authenticated and then computes the following
                             ri = h(PW || fi )
                                                                         messages to offer mutual authentication between client and
                             ei = h(IDi || Xs) ⊕ h(PW || fi )
                                                     i                   server.
                Stores ( ID i , h(.), f i , e i ) in the smart card       M 7 = M 5 ⊕ M 1 = Rs ,
                                                                         M 8 = h( M 5 || M 7 ) ,
                  Smart card                                             where M7 is the random number of the server. The client,
                                                                         which knows M 1 = h ( IDi || Xs) , can send back the message
                                                                         of M 8 = h((h( IDi || Xs ) ⊕ Rs) || Rs) .
                 Figure 1. The registration phase
                                                                            Step 6: Ci sends the message M8 to Si .
   2.2 The Login Phase                                                      Step 7: On receiving C i ’s message, Si checks if
   Whenever the users want to login to the server, they need              M 8 = h( M 5 || Rs) .
to perform the following steps, as shown in Figure 2.
                                                                            Step 8: If it holds, the server accepts C i ’s login
   Step 1: The users insert their smart card into the smart
card reader of a terminal and offer their personal biometrics,           request; otherwise, it rejects it.
 Bi , on the specific device to verify user biometrics. Next,
the system checks if h( Bi ) = f i .                                                   Ci                   Si
                                                                                                    Checks the format of Ci ' s IDi
     Step 2: If it holds, the user passes the biometrics
                                                                                                    Computes M 3 = h(IDi | | Xs)
verification. Then the user inputs the PWi . Otherwise, it
                                                                                                                 M 4 = M 2 ⊕ M 3 = Rc
means the user did not pass the biometrics verification and
the client terminates the session.                                                                               M5 = M 3 ⊕ Rs
     Step 3: After receiving C i ’s password, the smart card                                                     M6 = h(M 2 || M 4 )
will compute the messages                                                                             M5 , M 6
 ri ' = h( PWi || f i ) , M 1 = ei ⊕ ri ' = h( IDi || Xs) , and                                 ?
                                                                                Verifies M 6 = h(M 2 || Rc)
M 2 = M 1 ⊕ Rc , where Rc is a random number generated
                                                                                Computes M 7 = M 5 ⊕ M1
by the user.
   Step 4: Finally, Ci sends the messages ( IDi , M 2 ) to Si .                               M 8 = h(M 5 || M 7 )

      Ci                              Si
     Inserts the smart card and offers Bi                                                                Verifies M 8 = h(M 5 || Rs)
     Verifies h(Bi )= fi , Ci inputs PWi
                                                                                       Figure 3. The authentication phase
     Computes ri' = h(PWi || fi )
                  M1 = ei ⊕ ri'                                             2.4 Changing of password
                  M 2 = M1 ⊕ Rc                                            Whenever the users want to change their passwords, they
                                                                         can easily and freely change the password PWi to a new
                                           IDi , M 2                     password, PWi new , as shown in Figure 4.
                                                                              Step 1: The users insert their smart card in the smart
                     Figure 2. The login phase                           card reader and offer their biometrics to the specific device
                                                                         in order to verify the user biometrics.
    2.3 The Authentication Phase                                              Step 2: If it holds, the user can input the old
  On receiving the login request message, Si will                        password, PWi , and the new password, PWi new .
authenticate whether the user is legal or not in the following               Step        3:           The        smart        card  computes
manner, as shown in Figure 3.                                             ri′ = h( PWi || f i ) , ei′ = ei ⊕ ri′ = h( IDi || Xs ) ,     and
                                                                        (IJCNS) International Journal of Computer and Network Security, 3
                                                                                                                   Vol. 2, No. 3, March 2010

ei′′ = ei′ ⊕ h( PWi new || fi ) , the ei will be replaced with ei′′            3.2 It cannot withstand password-guessing attacks
                                                                               According to some of the research work [7], [8], storing
and PWi has been changed with PWi                     .                     of data as smart card messages is vulnerable, because the
                                                                            secret information stored in the smart card could be
              Ci                     Si                                     extracted by monitoring its power consumption (power
         Inserts the smart card and offers Bi                               analysis attacks). Using power consumption attacks, the
                                                                            attacker can get the message ( fi , ei ) and intercept the
         Verifies h(Bi )= fi , Ci inputs PWi and PWi new
                                                                            message (M2, M6) from the network. Through password-
         Computes ri' = h(PWi || fi )
                                                                            guessing attacks, the attacker can guess the password P Wi′ ,
                    ei' = ei ⊕ ri' = h( IDi || Xs)
                                                                            and compute the value as Rc' = ei ⊕ h( P Wi′ || fi ) ⊕ M 2 to
                    ei'' = ei' ⊕ h( PWi new || fi )
                                                                            check if M 6 = h( M 2 || Rc' ) . If it holds, the attacker can
         The ei will be replaced with ei''                                  masquerade the user. Otherwise, the attacker can try for the
                                                                            next guessed password P Wi′ until M 6 = h( M 2 || Rc' ) is
                                                                            true. A detailed description is given below:
                Figure 4. Change password phase                                Step 1: Using power consumption, the adversary gets the
                                                                            message ( fi , ei ) .
3. The Weaknesses                    of     Li        and      Hwang’s         Step 2: The adversary intercepts the message (M2, M6)
                                                                            from the network.
   Proposed Scheme
                                                                               Step 3: By choosing a password P Wi′ , the adversary
  It can be seen that Li and Hwang’s proposed scheme
                                                                            computes the message of Rc' = ei ⊕ h( P Wi′ || fi ) ⊕ M 2 to
enables users to change their passwords freely and provides
mutual authentication between the user and the server. The                  check if M 6 = h( M 2 || Rc' ) .
most significant feature of this scheme is that its operating                   Step 4: If the above-mentioned holds, it means the
mechanism is based on the users’ personal biometrics.                       password guessed, P Wi′ , is the correct password; thus, the
However, Li and Hwang’s proposed scheme still retains                       adversary can masquerade the user.
three weaknesses, as explained below:
                                                                               Step 5: On the contrary, if it does not hold, the adversary
                                                                            tries for the next password guess until M 6 = h( M 2 || Rc' )
  3.1 It cannot protect against impersonation attacks                       is true.
  In the authentication phase, the server checks the format
                                                                              3.3    Adversary can impersonate not only the client
of the client’s identity; if it holds, the server computes the
                                                                                     but also the server
message (M3, M4, M5, M6), and the server can get the
message ( IDi , M 2 ) from the client in the login phase. The                  Through a power analysis attack and the above-mentioned
                                                                            statement 3.2, the attacker can get the value of h( IDi || Xs) ;
server    can use the message                ( IDi , M 2 )     and secret
                                                                            then, the attacker can masquerade not only the client but
information        Xs    to      masquerade           M2 ' ,   then   get
                                                                            also the server. As the attacker can intercept the
 M 1 = M 3 = h( IDi || Xs) ; therefore, the attacker can                    message ( IDi , M 2 ) from the network, using the message
impersonate the client. The detailed procedure is given                     h( IDi || Xs) ,   it     can     compute        the     message
                                                                            (M 3 , M 4 , M 5 , M 6 ) to masquerade the server as well.
   Step 1: The malicious server can compute the hash value
 h( IDi || Xs) itself, and sends the message h( IDi || Xs) to the
   Step 2: After receiving the message h( IDi || Xs) , the                  4. Conclusions
adversary chooses the random number Rc' to compute                             This paper points out that the scheme proposed by Li and
 M 2 ' = h( IDi || Xs) ⊕ Rc ' .    The      adversary        can            Hwang is not secure enough against some weaknesses and
masquerade IDi and sends the login request message                          proves that it is incapable to withstand impersonation and
                                                                            power consumption attacks. The attacker can break in as a
( IDi , M 2 ' ) to the server.                                              legal user and intercept the messages from networks to
   Step 3: The adversary can use the hash value h( IDi || Xs)               masquerade the user. Although Li and Hwang’s proposed
to compute the random number Rs chosen by the server. The                   personal biometrics scheme is practical in some fields, the
adversary will compute M 8 = h((h( IDi || Xs) ⊕ Rs ) || Rs) to              security is substandard.
achieve the validity of the login processes. The drawback
exists because the server does not execute the biometrics
verification processes, thus causing insider attacks as
mentioned above. Furthermore, the scheme cannot achieve
non repudiation.                                                              This work was partially supported by the National
                                                                            Science Council, Taiwan, R.O.C. under Grant NSC 98-
4                                                          (IJCNS) International Journal of Computer and Network Security,
                                                                                                      Vol. 2, No. 3, March 2010

[1] L. Lamport “Password authentication with insecure
     communication”, Communications of the ACM 24, pp.
     770–772, 1981.
[2] M.S. Hwang and L.H. Li, “A new remote user
     authentication scheme using smart cards”, IEEE
     Transactions on Consumer Electronics, vol. 46, pp.
     28–30, 2000.
[3] M. Kim and CK. Koc, “A simple attack on a recently
     introduced hash-based strong-password authentication
     scheme”, International Journal of Network Security,
     vol. 1, pp. 77–80, 2005.
[4] N.Y. Lee and Y.C. Chiu. “Improved remote
     authentication scheme with smart card”, Computer
     Standards and Interfaces, vol. 27, pp. 177–180, 2005.
[5] C.T. Li and M.S. Hwang, “An online biometrics-based
     secret sharing scheme for multiparty cryptosystem
     using smart cards”, International Journal of Innovative
     Computing Information and Control, 2009.
[6] C.T. Li and M.S. Hwang, “An efficient biometrics-based
    remote user authentication scheme using smart cards”,
    Journal of Network and Computer Applications, vol. 33,
    pp. 1-5, 2010.
[7] T.S. Messerges, E.A. Dabbish, and R.H. Sloan,
    “Examining smart-card security under the threat of
    power analysis attacks”, IEEE Transactions on
    Computers, vol. 51, pp. 541–552, 2002.
[8] P. Kocher, J. Jaffe, and B. Jun, “Differential power
    analysis”, Proceedings of Advances in Cryptology, pp.
    388–397, 1999
                                                                     (IJCNS) International Journal of Computer and Network Security, 5
                                                                                                                Vol. 2, No. 3, March 2010

   New Illumination Compensation Method for Face
                                                     Heng Fui Liau1and Dino Isa2
             Faculty of Engineering, School of Electrical and Electronic Engineering,University of Nottingham Malaysia Campus,
                                             Jalan Broga, 43500 Semenyih, Selangor, Malaysia.
                  Faculty of Engineering, School of Electrical and Electronic Engineering,University of Nottingham Malaysia Campus,
                                                  Jalan Broga, 43500 Semenyih, Selangor, Malaysia.

                                                                         of a lambertian surface in fixed pose, under variable lighting
  Abstract: This paper proposes a method for implementing
illumination invariant face recognition based on discrete cosine
                                                                         and without shadowing, is a 3D linear subspace [5]-[7]. One
transform (DCT). This is done to address the effect of varying           of the approaches used to solve the problem is building a 3D
illumination on the performance of appearance based face                 illumination model. Basri et al [5] proposed spherical
recognition systems. The proposed method aims to correct the             harmonic model where illuminated images are represented
illumination variation rather than to simply discard it. In the          in low-dimensional subspace. Lee et al [8] proposed the 9D
proposed method, illumination variation, which lies mainly in            linear subspace approach using nine images captured under
the low frequency band, is normalized in the DCT                         nine different lighting directions. Face images obtained
domain. Other effects of illumination variation which manifest           under different lighting conditions are regarded as a convex
themselves        by       the       formation       of shadows          Lambertian and can be approximated well by a 9D linear
and specular defects are corrected by      manipulating      the         subspace [8]. The illumination convex cone method [9]-[11]
properties of the odd and even components of the DCT. The
                                                                         showed that a set of images of an object in a fixed
proposed method possesses several advantages. First, it does not
                                                                         pose under all possible illumination conditions is a convex
require the use of training images or an illumination
model and can be applied directly to the test image. Second is           cone in the image space. This method requires a number of
the simplicity of the system. It needs only one parameter to be          training images for each face taken with different lighting
determined, making              it           simple           to         directions to build the generative model. Unfortunately, the
implement. Experimental results on Yale face database B using            illumination cone is extremely complex to build. Several
PCA- and support vector machines (SVM)-based face                        simpler models that approximate it in the best possible way
recognition algorithms showed that the proposed method gave              with minimum complexity is presented in [10], such as low
comparable performance compared to other well-known but                  dimension subspace model, and cones-attached and cones-
more complicated methods.                                                cast using extreme rays. Gross et al [12] proposed a 3D
   Keywords: face recognition, illumination invariant, discrete          method based on light-field estimation. It operates by
cosine transform, biometrics.                                            estimating a representation of the light field of the subject
                                                                         head. The light field is then used as the set of features for
                                                                         recognition. Recently, Zhang et al [13] proposed a 3D
1. Introduction                                                          Spherical Harmonic Basis Morphable Model. They showed
                                                                         that any faces under arbitrary unknown lighting condition
Face recognition has gained much attention in the past two               can be simply represented by three low-dimensional vectors
decades, particularly for its potential role in information and          which correspond to shape, spherical harmonic and
forensic    security.    Principal      component      analysis          illumination. One of the major drawbacks of the 3D
(PCA) [1] and linear discriminant analysis (LDA) [2] are                 illumination model-based approach is that a number
the two most well-known and widely-used appearance-based                 of training images of the subject under varying lighting
methods. Existing face recognition systems including PCA                 conditions or information of 3D shapes are needed during
and LDA do not perform well in the presence                              the training phase. Moreover, its application range is
of illumination variation. For example, Adini et al [3] stated           limited by the 3D face model, and has significant drawback
that the variation between the images of the same person                 for real-time system due to its expensive computation
due to illumination inconsistencies is always larger than                requirement.
image variation due to the change in face identity. Due to                   Every single pixel of the illuminated face image can be
the importance of this issue, recent researchers focus on                regarded as a product of reflectance and luminance at that
developing robust face recognition systems. However,                     point. Luminance varies slowly while reflectance can
illumination variation still remains a challenging problem               change abruptly. In other words, luminance, which
[4].                                                                     corresponds to the illumination variation, is located
   The problems associated with Illumination variation for               mainly in low frequency band but reflectance, which
facial image are mainly due to the different appearance of               corresponds to the stable facial features under illumination
the 3D shape of human faces under lighting from different                variation, is located at higher frequency band. Land's
direction. Early work showed that the variability of images              "retinex” model [14] approximates the reflectance as the
6                                                           (IJCNS) International Journal of Computer and Network Security,
                                                                                                       Vol. 2, No. 3, March 2010

ratio of the image and its low-pass version serves as           zero mean and unit variance. The advantage of the method
estimation for luminance. Chen et al [15] discards the low      is low computation complexity.
frequency DCT component in the logarithm domain to                 This paper proposes an new illumination compensation
achieve illumination invariance. They first expand the pixel    method for face recognition . The proposed method aims to
intensity in the dark region using logarithm transform.         correct the illumination variation rather than to simply
Then, discrete cosine transform is applied on the image in      discard it. Compared to existing methods based on the DCT,
logarithm domain. The low frequency components are              the proposed method here does not discard the low
discarded by setting the corresponding coefficients as zero.    frequency components which represent most of the effects of
Nanni and Lumini [16] had investigated discrete wavelet         illumination variations. This allows us to retain more
transform features under different lighting conditions. They    information, which might be useful for face
found that the most useful sub-band are the first level of      recognition. Furthermore, some of the effects of this
decomposition obtained by Biorthogonal wavelet and the          illumination variation lie in the higher frequency band,
horizontal details are the third level of decomposition         approximately the same frequencies as occupied by some
obtained by Reverse Biorthogonal wavelet, which is robust       important facial features. As previously mentioned, the
against illumination variation. Franco and Nanni [17]           effect of these kinds of illumination variation creates
proposed classifiers fusion scheme. PCA is applied to           shadow and specularities in the image. Thus, removing the
extract and reduce the dimensionality of the useful features    low frequency component does not help in this case. The
from DWT domain [16] and DCT domain [15]. The                   proposed method here manipulates the odd and even DCT
individual classifier for each feature is Kernel Laplacian      components to remove these artifacts. Using the DCT
Eigenmap. The output of each classifier is further fused        approach, the complexity of the previously described
using sum rule.                                                 methods is avoided while retaining a comparable
    Generally, human face is similar in shape, have two eyes,   performance [8]-[10], [15], [21]-[24]. The proposed method
a mouth and a nose. Each of these components makes              is based solely on 2D images and does not need to estimate
different distinctive shadows and specularities depending on    the 3D shape. It requires much less computation resource
the direction of the lighting in a fixed pose. By using such    than other methods based on 3D model as stated above.
characteristic, the lighting direction can be estimated and     Besides that, it does not require any prior information on the
illumination variation can be compensated. Quotient image       illumination model and training images. Furthermore, the
(QI) [18] is an effective method to handle illumination         parameter selection is simple. Only one parameter, the cut-
problem. This method is very practical because it               off-frequency of the filter, is required              to be
only requires one training image for each person. The           determined. Experimental results on Yale face database B
authors in literature [19] and [20] further improved the        [11] using PCA- and support vector machines (SVM)--based
original QI method and proposed the self-quotient               face recognition algorithms showed that the proposed
image (SQI) method. The luminance is estimated as the           method has achieved good performance as compared
smoothed version of the image by Gaussian filtering. The        to some of the more complicated methods described above.
illumination           variation        is         eliminated
by dividing the estimated        luminance. However,      the   2. Method
parameter selection for the weighted Gaussian filter is
empirical        and       complicated. Shan        et     al   As aforementioned before, an illuminated face image, I(x,y)
[21] proposed quotient illumination relighting (QIR)            , can be regarded as product of reflectance, R(x,y) , and
method which synthesizes images under a predefined              luminance, L(x,y) , as shown in (1). Taking logarithm
normal lighting condition from the provided face images         transform on (1), we have (2).
captured under non-uniform lighting conditions. Zhao et al
[22] proposed illumination ratio image. One training image
for each lighting conditions is required to simulate the
distribution of the images under varying lighting condition.
Liu et al [23] proposed an illumination restoration method.                                                        (2)
The illuminated image is restored to image under frontal
light source using a ratio-image between the face image         The logarithm transform transforms (1) into linear
under different lighting conditions and a face image under      equation where the logarithm transform of the illuminated
frontal light source, both of which are blurred by Gaussian     image is the sum of the logarithm transformed of reflectance
filter. The image is further enhanced through an iterative      and the logarithm transform of luminance as shown in
algorithm where Gaussian filter with different sizes are        (2). In the image processing field, logarithm transform
applied on different regions of the face image. Vuccini et al   is often employed to expand the values of the dark
[24] adopted Liu et al’s method to restore and enhance the      pixels. Fig. 1 gives a comparison between the original image
illuminated image. LDA is employed as feature extractor.        and the same image following the logarithm transform. The
They proposed an image synthesis method based on QI to          brightness of the right image is spread more uniformly.
generate training images to overcome the small-sample-size
problem. Xie and Lam [25] normalize the lighting effect
using local normalization technique. The face image is
partitioned to blocks with fixed size. For each block, the
pixel intensities are normalized in such a way that it has
                                                             (IJCNS) International Journal of Computer and Network Security, 7
                                                                                                        Vol. 2, No. 3, March 2010

                                                                 number. Furthermore, DCT has lower computation
                                                                 complexity than Discrete Wavelet Transform. For an N×N
                                                                 image, the 2D DCT is given by (5). For υ , ν = 0,1,2,…N-1.
                                                                    and    represent the horizontal component and vertical
                                                                 component respectively is the          is the value of the
                                                                 pixel at coordinate (x,y). For 2D DCT, the frequency is
                                                                 computed as the square root of the sum of      and . The
                                                                 inverse 2D DCT is expressed as (6).

Figure 1. On the left is the original face image. On the right
           is the output of logarithm transform                                                                           (5)

    Luminance component lies mainly in the low frequency
band while the reflectance component lies mainly in the
higher frequency band. The luminance component can be
approximated as the 'low-pass version' of the illuminated            From (6), the uniform luminance component can be
image. The reflectance component of an illuminated face          obtained from the original image by adding a compensation
image represents the stable facial features under varying        term,            which compensates for the nonuniform
lighting conditions. Thus, the illumination variations can be    illumination.
compensated for provided we can estimate them relatively             Generally human faces are almost symmetrical. The left-
well.                                                            half side of the face is almost identical to the right-half side
   Let        be the incident luminance and             be the   of the face in most of the cases. For non-uniformly
uniform luminance. A uniformly illuminated image, , can          illuminated images, part of the face is brightened and the
be expressed as (3). In order to normalize the brightness        others are darkened. The                         component is
across all of the images, the mean value of         are set to   approximated as the 'low-pass version' of                  with
be the same for all image.                                       certain cut-off frequency. The compensation term can be
                                                                 estimated as follow. Firstly, the mean of an             image
                                                   (3)           reconstructed from low frequency DCT components is
                                                                 computed according to (7). Then, each pixel is subtracted by
                                                                 the mean as shown in (8).                is estimated using the
                                                                 low frequency DCT components. A negative value indicates
The luminance component corresponds to the illumination          that a single pixel is 'dark' and positive value indicates that
variation. As previously described, the illumination             the corresponding pixel is 'bright'. Each pixel is adjusted by
variation can be well-approximated by the low frequency          halving the difference between pixel value and mean value
components of the illuminated face image. In section 2.1, an     as shown in (8). In other words, the intensity of each pixel is
illumination compensation method based on low frequency          adjusted according to the difference between the mean
DCT components are presented. In fact, illumination              intensity of the image that is reconstructed using only low
variation cannot be perfectly separated from the original        frequency components. The illumination variations which
image in the frequency domain. Under large and complex           lie mainly in the low frequency band are reduced while
illumination variations, the shadows and specularities are       important facial features are preserved. In other words,
casted on the face due to the unique 3D shape of human           the low-pass version of the image in the DCT domain serves
face. Some shadows and specularities lie in the same             as an estimated of the luminance component. Fig. 2 shows
frequency band as the reflectance, which corresponds to          the effect of illumination normalization in the low frequency
facial features do. In this case, compensation technique         DCT components on a face image. The left-most image is
based on low frequency components will be unable to              the original image. The second, third and forth images are
remove the artifacts. In section 2.2, an illumination            the processed image with the cut-off frequency set at 2, 4
compensation method based on the properties of odd and           and 6 respectively. As you can see, the shadow effects at left
even DCT components in horizontal direction, which has           side of the face are reduced at the increasing value of the
the capability to remove artifacts in the high frequency         cut-off frequency while the facial features are unaffected.
band, is presented.                                              Unlike other similar methods, only one parameter needs to
.                                                                be determined, which is the cut-off frequency of the low-
                                                                 pass filter. However, the normalization may cause some
  2.1 Illumination normalization using low frequency
                                                                 information lost in the process due to wrong estimations of
  DCT components
                                                                 the 'dark' and 'bright' zones.

DCT has been widely used in modern imaging and video
compression. DCT possesses some fine properties, such as
de-correlation and energy compaction. The DCT is chosen
because it only gives real value, unlike Discrete Fourier
Transform       (DFT)      which      gives      complex
8                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                        Vol. 2, No. 3, March 2010

                                                                 is always below 0.5. For the non-uniformly illuminated
                                                                 image, the strong signals (greater than one) are located at
                                                                 the low frequency band. However, the middle and high
                                                                 frequency band contain points that have strength greater
                                                                 than 0.5. This shows that the illumination variation also
                                                                 corrupts the high frequency component, which corresponds
                                                                 to reflectance. Hence, this proves that no features are robust
                                                                 enough to be against the illumination variation.
      Figure 2. Normalization on low frequency DCT
    components. The left most image is the original image

    2.2 Illumination Correction Using Odd and Even DCT
    Components in Horizontal Direction
Under large and complex illumination variation, the effect
of illumination variation occurs across almost the
entire frequency band. Some variations such as shadows           Figure 4. The top and bottom is the odd DCT component of
and specularities lie in the same frequency band as some             original image and illuminated image respectively
important     facial    features   do. In this section, we
propose an illumination correction method which uses the
                                                                    Since human face generally have symmetry property, we
properties of odd and even DCT components to eliminate
                                                                 can easily compensate the illumination variation in the face
the shadows and specularities and to restore the original
                                                                 based on the properties of odd and even components of
features.                                                        DCT. Here, an illumination compensation method based on
                                                                 manipulating even and odd DCT components is proposed.
                                                                 First, two new images,          and      , are reconstructed
                                                                 from the odd and even DCT components in the horizontal
                                                                 direction of the original images. The pixels on the left half
             Figure 3. 2D-DCT basis functions                    are compared with the pixels on the right half. If the left-
                                                                 side pixel is negative and the corresponding right-side pixel
                                                                 is positive, the values of both pixels will be adjusted
In Fig. 3, different images have been produced by varying        according to (10) and (11). is the compensation term. Fig
the DCT components in the horizontal direction. As shown         .5 shows an illuminated image and the corresponding
in the Fig. 3, the second and forth images have                  and .
been reconstructed by different even DCT components in the
horizontal direction and the symmetry is evident. The first
and third asymmetry images are reconstructed by odd DCT
components         in     the       horizontal      direction
are asymmetrical. Non-uniform illumination gives rise
to the     odd      DCT      components        and affects the
magnitude of the even DCT components. (5) can now be
rewritten in that,
                                                                 Figure 5. From left to right: illuminated image,         and

   Odd DCT components can be regarded as noise or
luminance components due to illumination variation and the
even DCT components represent the wanted information
which may or may not be slightly corrupted by non-uniform
luminance. Under such model, the luminance components
can be estimated using odd DCT components thereby giving
estimation for the correction term as well. Fig. 4 shows
the difference between odd DCT components of image under            If the left-side pixel is positive and the corresponding
variable illumination and the image of same person under         right-side pixel is negative, the values of both pixels will be
uniformly illuminated condition. As shown in the top of          adjusted according to (12) and (13).
Fig. 4, the odd components of the illuminated images
fluctuate greatly with the magnitude greater than one. In
contrast, the bottom of Fig. 4 also shows that illumination
variation happens across the entire frequency band. Note
that, the signal strength of the uniformly illuminated image
                                                                (IJCNS) International Journal of Computer and Network Security, 9
                                                                                                           Vol. 2, No. 3, March 2010

                                                                    3. Experiment results on Yale Face database B
                                                                    Yale face database B is commonly used to evaluate the
                                                                    performance of illumination invariant face recognition. The
                                                                    Yale face database B contains 10 individuals in nine
                                                                    different poses. For each pose, there are 64 different
                                                                    illumination conditions. All images were manually aligned.
                                                                    The size of face images are cropped to 64×55 pixels. The
                                                                    face images were divided into 4 subsets according to the
                                                                    [11].The four subsets were, subset 1               ), subset 2
  Figure 6. The sum of the correction term and even DCT
                                                                                ), subset 3             ) and subset 4           ),
    components gives the illumination corrected image
                                                                    where bracketed numbers indicate the angular position
                                                                    of light of incident with respect to the person.
   The new pixel intensity for the compensated image can
then be computed using (14). As shown in Fig. 6, the
                                                                      3.1 Face recognition using principal component
shadow created by the nose has been eliminated. Fig. 7
shows the illumination-corrected image using the proposed
method. Illumination variations are largely reduced while
the important facial features are preserved. Here, we would         PCA is a classical face recognition method. PCA seeks for a
like to emphasize that the proposed method is able to               set of projection vectors which projects the input data in
recover facial feature as long as the specularities or shadow       such a way that the covariance matrix of the training images
regions occur only on one side of the face. The output image        is maximized. Six images in subset 1 were selected to serve
looks different from the original image because the proposed        as training images to build the covariance matrix for PCA
method corrects the illumination variation based on the             [13] and [17]. Eigenvalue decomposition was applied on the
symmetry of human face. The output image is aligned in              covariance matrix to seek for the eigenvector that projected
such a way that the left-half side is identical to the right-half   the data in the direction that maximized the covariance
side. Due to some subtle variations in the two halves of            matrix. The nearest neighbour rule was used as a classifier
every face, a face image is not exactly symmetrical; for            with the Euclidean distance as the distance metric. Fig. 8
example, the two eyes have slightly different sizes, there is a     shows that the largest thirty principal components were
mole at only one side of cheek, etc. Therefore, the output          sufficient to give the best result and to represent the face
images may have an adverse effect. All of the images are            image. Therefore, thirty principal components were used to
normalized to a mean of 0.5.                                        form the projection matrix. Fig. 9 and Fig. 10 show the
                                                                    performance of the proposed method for subset 3 and 4
                                                                    respectively under different values of cut-off frequency.
                                                                    Setting the cut-off frequency at six gave the best results for
                                                                    both subsets.

  Figure 7. Illumination normalization and compensation
                                                                      Figure 8. Recognition rate for subset 3 and subset 4 that
                 based on proposed method
                                                                         correspond to the number of principal components

The flow of the proposed illumination invariant face
recognition system can be summarized as below:
1. Perform logarithm transform on the input images to
expand the values of the dark pixels.
2. Correct the non-uniform luminance in the low frequency
domain using the proposed method in section 2.1.
3. Eliminate the specularities and shadows that lie in the
same frequency band as the reflectance does using the
proposed method in section 2.2.

                                                                     Figure 9. Recognition rate for subset 3 that correspond to
                                                                                      the cut-off frequency
10                                                             (IJCNS) International Journal of Computer and Network Security,
                                                                                                          Vol. 2, No. 3, March 2010

                                                                  of SVM tremendously in Subset 4. Our method scored 100%
                                                                  recognition rate in Subset 3 and 96.4% in subset 4.

                                                                               Table 2: Face recognition using SVM
                                                                                  Method            Subset 3 Subset 4
                                                                                  Original           13.6%       55%
                                                                                 Histogram            100%      61.4%
                                                                              Proposed method         100%      96.4%
 Figure 10. Recognition rate for subset 4 that correspond to
                  the cut-off frequency
                                                                     3.3 Comparison with other methods
                                                                      The results for subset 3 and 4, along with other well-
            Table 1: Face recognition using PCA
                                                                  known methods, are presented in Table 3. From Table 3,
        Method                   Subset 3 Subset 4                it is           shown that            the            proposed
        Histogram                58.4%      15.6%                 method gave results comparable with other well-known but
        equalization                                              more complicated methods. In contrast, the proposed
        Proposed method          100%       92.1%                 method is much simpler to implement with much less
                                                                  computation resource requirement. The baseline system only
   Without illumination normalization in the low frequency        scored 58.4% and 15.6% in subset 3 and subset 4
band, the proposed method was only able to achieve 96.3%          respectively. The proposed method outperformed linear
and 64.1% recognition rate in subset 3 and 4 respectively.        subspace method, cones-attached method, illumination ratio
The poor results were due to the large variation in the low       image method and QIR method. As aforementioned, the
frequency band where the illumination correction algorithm        above stated methods required training images to build the
was unable to cope with. As we increased the value of cut-        illumination model or to estimate the lighting
off frequency, the performance improved steadily although         conditions. The authors in [15] discards low frequency
there were some small fluctuations. It gave the best              components, keeping only the high frequency ones
performance when the cut-off frequency was set at 6 (100%         which correspond to the reflectance component. Fig.
for subset 3). For subset 4, the best performance was 92.1%       11 shows the difference between the proposed method and
when the cut-off frequency was at 6, 7 or 9. Beyond that, the     [15]. The shadows and specular defects remained on the
performance      decreased     because     some    important      image because they lay in the same frequency band as the
features might have lost in the illumination normalization        reflectance component does. Discarding low frequency
process.                                                          components might remove the important facial features that
   Table 1 shows that our method can achieve a better             lie in low frequency band and degrade the performance of
performance level than if only histogram equalization was         the face recognition system when the number of class was
used.                                                             large. The proposed method aims to correct the
                                                                  illumination variation rather than to simply discard it to
   3.2 Face recognition using support vector machine              achieve illumination invariance. However asymmetrically,
                                                                  it was unable to completely remove artifacts that appeared
Support vector machine (SVM) [26]-[28] is a popular
                                                                  on the both sides of the face. This caused the proposed
technique for classification motivated by the results of
                                                                  method to have rather unimpressive performance in subset
statistics learning theory. Unlike traditional methods such as
                                                                  4 compared to [15]. Our method is robust against
neural network that minimize the empirical training error,
                                                                  illumination variation and is easy to implement. It can be a
SVM is designed based structural minimization principal.
                                                                  pre-processing stage for other face recognition algorithms.
SVM maps the training data into a higher dimensional
feature using kernel trick, in which an optimal hyperplane
                                                                    Table 3: Recognition rate comparison with other methods
with large separating margin between two classes of the
                                                                                 Methods                   Recognition rate
labeled data is constructed. The training data of SVM are
the PCA feature set described in the previous section. In this
paper, several types of kernel such as linear kernel, wavelet                                            subset 3 subset 4
kernel, polynomial kernel and radial basis function (RBF)                 Linear Subspace [10]             100         85
kernel are studied. RBF kernel gives the best result. The                  Cones-attached [10]             100        91.4
RBF function is defined as below:                                            Cone-cast [10]                100        100
                                                                      Illumination ratio image [22]        96.7       81.4
                                                                    Quotient Illumination Relighting       100        90.6
                                                                      illumination restoration [23]        98.3       96.4
where    is the width of the RBF.                                    DCT in logarithm domain [15]          100        99.8
                                                                        Vucini et al’s method [24]         100         95
   Table 2 shows the performance of SVM under different                     Our method+PCA                 100        92.1
types of methods. Our algorithm improved the performance                   Our method +SVM                 100        96.4
                                                            (IJCNS) International Journal of Computer and Network Security, 11
                                                                                                       Vol. 2, No. 3, March 2010

                                                                [5] R. Basri, D.W. Jacobs, “Lambertian reflectance and
                                                                     linear subspaces”, IEEE Transaction on Pattern
                                                                     Analysis and Machine Intelligent, 25(2), pp.218-233,
                                                                [6] S. Nayar, H. Murase, “Dimensionality of illumination
                                                                     manifold in eigenspace”, Technical Report CUCS-021-
                                                                     94 Columbia University.
                                                                [7] S. Amnon, “Photometric issues in 3D visual
                                                                     recognition from a single 2D image”, International
Figure 11. Comparison between proposed method (bottom)
                                                                     Journal of Computer Vision,2, pp. 99-122, 1997.
                    and [10] (top)
                                                                [8] K.C. Lee, J. Ho, D.J. Kriegman, “Nine points of light:
                                                                     acquiring subspaces for face recognition under variable
  3.4 Computation time
                                                                     lighting and pose”, In Proceedings of the IEEE
An efficient and simple illumination compensation method             Conference on Computer Vision and Pattern
in DCT domain is presented. All experiments were                     Recognition, vol.2, pp. 519-526, 2001.
conducted using Matlab 2008a on Core 2 Duo E6750 CPU            [9] P.N. Belhumeur, D.J. Kriegman, “What is the set of
and 2GB RAM. It takes 2.050 seconds and 2.311 seconds to             images of an object under all possible illumination
process all of the face images included in subset 3 and              conditions?”, In Proceedings of the IEEE Conference
subset 4 respectively. The mean computation time for each            on Computer Vision and Pattern Recognition, pp. 270-
image is 0.0167 second. The complexity is low and it can be          277, 1996.
implemented in real-time system.                                [10] A.S. Georghiades, P.N. Belhumeur, D.W. Jacobs,
                                                                     “From few to many: illumination cone models for face
4. Conclusion                                                        recognition under variable lighting and pose”, IEEE
                                                                     Transaction on Pattern Analysis and Machine
This paper proposes a novel illumination compensation
                                                                     Intelligent, 23(6), pp.630-660, 2001.
method in DCT domain. The illumination is normalized
                                                                [11] H.F. Chen, P.N. Belhumeur, D.J. Kriegman, “In search
based on the low frequency components of DCT.
                                                                     of illumination invariants”, iIn Proceedings of the
Subsequently, the illumination variations which create
                                                                     IEEE Conference on Computer Vision and Pattern
shadows and specularities are further corrected by the
                                                                     Recognition, pp. 13-15, 2000.
proposed method which uses the properties of odd and even
                                                                [12] R. Gross, I. Matthews, S. Baker, “Appearance-based
components of DCT. The proposed method is simple in
                                                                     face recognition and light-fields”, IEEE Transaction
terms of design, where there is only one parameter that
                                                                     on Pattern Analysis and Machine Intelligent,26(4),
needs to be determined, which is the cutoff frequency of the
                                                                     pp.449-465, 2004.
filter for the illumination normalization process. The
                                                                [13] L. Zhang, S. Wang, D. Samaras, “Face synthesis and
proposed method gives comparable result with other well-
                                                                     recognition from a single image under arbitrary
known but more complicated methods in Yale face database
                                                                     unknown lighting using a spherical harmonic basic
B. The proposed method has rather unimpressive
                                                                     morphable model”, In Proceedings of the IEEE
performance in subset 4 due to reason that large
                                                                     Computer Society Conference on Computer Vision and
illumination variation creates shadows and specularities that
                                                                     Pattern Recognition, vol.2, pp.209-216, 2005.
occur at both sides of the face. Our method is robust against
                                                                [14] E.H. Land, J.J. McCann, “Lightness and retinex
illumination variation and is easy to implement. It can be a
                                                                     theory”, Journal of the Optical. Society of America,61
pre-processing stage for other face recognition algorithms.
                                                                     (1), pp. 1-11, 1971.
                                                                [15] W. Chen, M.J. Er, S. Wu, “Illumination compensation
References                                                           and normalization for robust face recognition using
                                                                     discrete cosine transform in logarithm domain”, IEEE
[1] M.A. Turk, A.P. Pentland, “Eigenface for face                    Transaction on System, Man and Cybernetics. B,36 (2)
    recognition”, Journal of Cognitive Neurosience, 3, pp.           pp. 458-466, 2006.
    71-86, 1991.                                                [16] L. Nanni, A. Lumini, “Wavelet decomposition tree
[2] P.N. Belhumeur, J.P. Hespanha, D.J. Kriegman,                    selection for palm and face authentication”, Pattern
    “Eigenface versus Fisherface”, IEEE Transaction on               Recognition Letters, 329, pp.343-353, 2008.
    Pattern Analysis and Machine Intelligent,19 (6),            [17] A. Franco, L. Nanni, “Fusion of classifiers for
    pp.711-720, 1997.                                                illumination robust face recognition”, Expert Systems
[3] Y. Aldini, Y. Moses, S. Ullman, “Face recognition: the           with Applications: An International Journal, 36,
    problem of compensating for changes in illumination              pp.8964-8954, 2009.
    direction”, IEEE Transaction on Pattern Analysis and        [18] S. Amnon, R.-R Tammy, “The quotient image: class-
    Machine Intelligent, 19 (7), pp.721-732, 1997.                   based re-rendering and recognition with with varying
[4] P.J. Phillips, W.T. Scruggs, A.J. O’Toole, P.J. Flynn,           illuminations”, IEEE Transaction on Pattern Analysis
    K.W. Bowyer, C.L. Schott, M. Sharpe, “FRVT 2006                  and Machine Intelligent,23 (2),pp.129-139, 2001.
    and ICE 2006 large-scale results”, National Institute of    [19] H. Wang, S.Z. Li, Y. Wang, “Generalized quotient
    Standards and Technology Report.                                 image”, In Proceedings of the IEEE Conference on
12                                                           (IJCNS) International Journal of Computer and Network Security,
                                                                                                        Vol. 2, No. 3, March 2010

       Computer Vision and Pattern Recognition, 2, pp. 498-      [24] E. Vucini, M. Gökmen, E. Gröller, “Face recognition
       505, 2004.                                                     under varying illumination”, In Proceedings of the 15th
[20]   H. Wang, S.Z. Li, Y. Wang, “Face recognition under             Conferences in Central Europe on Computer Graphics,
       varying lighting conditions using self quotient image”,        Visualization and Computer Vision, pp.57-64, 2007.
       In Proceedings of the IEEE International Conference       [25] X. Xie, KM. Lam, “An efficient illumination
       on Automatic Face and Gesture Recognition, pp. 819-            normalization method for face recognition”, Pattern
       824, 2004.                                                     Recognition Letters. 27, pp.609-617, 2006.
[21]   S. Shan, W. Gao, B. Gao, D. Zhao, “Illumination           [26] V. Vapnik, The nature of statistical learning theory.
       normalization for robust face recognition against              Springer-Verlag, New York, 1995.
       varying lighting conditions”, In Proceedings of the       [27] B.E. Boser, I. Guyon, V. Vapnik, “A training
       IEEE Workshop on AMFG, pp. 157-164, 2003.                      algorithm for optimal margin classiffers”, In
[22]   J. Zhao, Y. Su, D. Wang S. Luo, “Illumination ratio            Proceedings of the Fifth Annual Workshop on
       image: synthesizing and recognition with varying               Computational Learning Theory, pp144-152, 1992.
       illuminations”, Pattern Recognition Letters. 24,          [28] C. Cortes, V. Vapnik, “Support-vector network.,
       pp.2703-2710, 2003.                                            Machine Learning”,20 , pp.273-297, 1995.
[23]   DH. Liu, KM Lam, LS. Shen, “Illumination invariant
       face recognition”, Pattern Recognition. 38 , pp.1705-
       1716, 2005.
                                                                   (IJCNS) International Journal of Computer and Network Security, 13
                                                                                                              Vol. 2, No. 3, March 2010

      Towards In-Car Ad Hoc Network for Pervasive
                  Multimedia Services
                                 Kamal Sharma1, Hemant Sharma2 and Dr. A K Ramani3
                                        Institute of Computer Science & IT, Devi Ahilya University,
                                                            Indore (M.P.), India
                                      Software Architect, Delphi Delco Electronics & safety Europe GmbH,
                                             Tec Centre, D 31162 Bad Salzdetfurth, Germany
                              Prof. & Head, 1Institute of Computer Science & IT, Devi Ahilya University,
                                                          Indore (M.P.), India

Abstract: Pervasive computing systems inside modern                    However, the realization of a fully wireless car bus system is
automobiles are made up of hundreds of interconnected, often           still far away. Fiber optic connections for multimedia bus
replaceable devices and software components. In-vehicle                systems offer advantages regarding costs and bandwidth,
multimedia components and applications are becoming complex            and the demanded reliability of mission-critical networks
artifacts due to advancement in technology and increased               still require wired connections to ensure the safe operation
competition. There is a growing need for software platform to
enable efficient deployment of multimedia services in
                                                                       of the car. Though, cost-effective wireless subsystems which
automotive environment. This paper presents the architecture of        could extend or partly replace wired bus systems are already
a Bluetooth based multimedia ad hoc network in a car. The              nowadays conceivable. A very promising technology in this
architecture is explained and presented together with a prototype      context is specified by the recent Bluetooth 3.0 [1] standard.
implementation running on hand-held devices. Further, the
different fundamental architectural tradeoffs, based on                The provisioning of multimedia streaming applications
measurements, have also been analyzed.                                 using wireless network, inside the vehicle, requires
                                                                       managing differentiated performance levels depending on
  Keywords: Ad Hoc Networks, Pervasive Computing, In                   application/user/device requirements in order to properly
Vehicle Multimedia, Bluetooth.                                         allocate network bandwidth, especially the limited one
                                                                       available in the wireless last-meter [3]. In particular, the
1. Introduction                                                        Bluetooth specification [1] offers limited support to
                                                                       performance differentiation, by allowing to choose which of
During the last few years, the proliferation of miniaturized           the three kind of logical transports to exploit and to
devices with networking capabilities has provided the                  statically configure performance requirements for ACL
technological grounds for pervasive networking even in                 ones.
automotive environments. Growing demand for personal
                                                                       In addition, current implementations of the Bluetooth
device connectivity, mobile Internet access, remote
                                                                       software stack do not allow applications to exploit the
monitoring and diagnostics, as well as enhanced safety and
                                                                       limited performance functions included in the specification
security is driving vehicle manufacturers and suppliers to
                                                                       in a portable way. The result is that the development of
seek out new wireless technologies. Wireless technology
                                                                       Bluetooth operations in multimedia ad hoc applications
integration strategies would enhance the value proposition
                                                                       currently depends on specific implementation details of the
of vehicles by integrating advanced electronics systems such
                                                                       target Bluetooth hardware/software platform. This
as infotainment systems, safety and stability systems, and
                                                                       relevantly complicates service design and implementation,
comfort and convenience enhancement systems.
                                                                       limits the portability of developed applications, and calls for
The evolutionary development of in-car electronic systems              the adequate modeling of performance parameters
has lead to a significant increase of the number of                    corresponding to potential ad hoc applications and services.
connecting cables within a car. To reduce the amount of
                                                                       The design presented in this paper is for a wireless
cabling and to simplify the interworking of dedicated
                                                                       streaming system that offers a means for bringing the
devices, currently appropriate wired bus systems are being
                                                                       participatory media and bulk content distribution into the
considered. These systems are related with high costs and
                                                                       wireless domain. The basis for the service is an
effort regarding the installation of cables and accessory
                                                                       opportunistic distribution of among network. Users in our
components. Thus, wireless systems are a flexible and very
                                                                       system exchange data when their corresponding
advanced alterative to wired connections.
                                                                       application(s) receive trigger. The system is going to be
14                                                          (IJCNS) International Journal of Computer and Network Security,
                                                                                                       Vol. 2, No. 3, March 2010

open to any node who wants to provide and consume the
content. Hence, it is based on unlicensed short-range
communication specifically Bluetooth.

                                    Figure 1. Overview of In- Car Multimedia Network

By relying on short-range communication, the network will       2.1 The Multimedia PAN
be highly disrupted most of time. The communication is
further challenged by relatively short transfer opportunities   Bluetooth technology is based on a master-slave concept
which might be in the range of a few seconds when for           where the master device controls data transmissions through
example two nodes communicate with each other. The              a polling procedure. The master is defined as the device that
contribution of this paper is twofold:                          initiates the connection. A collection of slave devices
                                                                associated with a single master device is referred to as a
        Ø   A mechanism for content streaming based on          piconet. The master dictates packet transmissions within a
            opportunistic communication;                        piconet according to a time-slot process. The channel is
                                                                divided into time slots that are numbered according to an
        Ø   An evaluation of the mechanism through the          internal clock running on the master. A time division
            use of realistic use cases and real traces.
                                                                duplex (TDD) scheme is used where the master and slaves
The rest of the paper is organized as follows: Section 2        alternatively transmit packets, where even numbered time
provides the description of system and potential application    slots are reserved for master-slave transmissions, while odd
scenarios. In section 3, the architecture and design of the     numbered time slots are reserved for slave-master
system has been discussed. Section 4 evaluates the design of    transmissions.
the system. Section 5 provides an overview of related
research and section 6 concludes the paper.

2. System Description

An ad hoc multimedia network in a car and participating
devices are shown in figure 1. The diagram presents an ad
hoc network containing a smart phone, an infotainment
system, and rear seat entertainment system. The devices are
equipped with Bluetooth module and are capable of
establishing a Bluetooth connection. A piconet can be
established between Infotainment system and iPhone when
the driver or any other occupant of the vehicle pairs the
phone. Similarly a piconet could be established between
Infotainment system and rear seat entertainment system.
The piconet shall enable sharing of iPhone data or access to
information from internet, if appropriate application
framework is available at infotainment system.
                                                                              Figure 2. The Multimedia PAN
                                                           (IJCNS) International Journal of Computer and Network Security, 15
                                                                                                      Vol. 2, No. 3, March 2010

Figure 2 provides an overview of the multimedia PAN            up and running, its Bluetooth module is ready to pair with
inside the car with the role of different nodes. The piconet   other available device. Pairing with iPhone or with rear-seat
here consists of a master, the infotainment device, and two    entertainment unit or with both establishes the network.
slaves, the smart phone (iPhone) and rear-seat
entertainment device. As soon as the infotainment system is

                         Figure 3. Overview of Ad Hoc Multimedia Communication Architecture.

                                                               communication of intended data streams. Therefore, every
2.2 Application Scenarios
                                                               application subscribes to the channels that it is interested in,
The ad hoc multimedia network consisting of Infotainment       and his corresponding device node will try to retrieve any
system and the slave devices shall provide following           data belonging to those channels. Following the approach
services:                                                      used in the Internet-based podcasting protocols; the
                                                               framework structures channels into different media streams.
    Ø   Access to audio streams from iPhone to                 To make efficient use of contacts with a small duration, the
        infotainment system that could be played and           streams are further divide into data packets, transport-level
        hearable on the vehicle’s sound system.                data units of a size that can typically be downloaded in an
                                                               individual node encounter. Each data stream is further
    Ø   Access to video streams from iPhone to rear- seat      divided into protocol data units (PDU), the atomic transport
        entertainment unit via the piconet master.             unit of the network.
    Ø   Access to internet from rear-seat unit using iPhone
        via the piconet master.                                The resulting system architecture is illustrated in Figure 3.
                                                               The transport layer acts directly on top of the link-layer
    Ø   Applications based on information received by the      without any routing layer. To distribute information among
        iPhone to help safe driving, such as weather           the communicating nodes, the framework does not rely on
        information or traffic information.                    any explicit multi-hop routing scheme. Instead of explicitly
                                                               routing the data through specific nodes, it relies on a
                                                               receiver-driven application-level dissemination model,
3. System Architecture and Implementation
                                                               where data content are routed implicitly as nodes retrieve
                                                               information that they request from neighboring nodes. It
This section describes the design and implementation of our
                                                               distinguishes between an application layer, a transport layer,
Ad Hoc network system. We first give a brief overview, then
                                                               and the data link layer. In a first level of aggregation, the
describe the system architecture, and finally discuss the
                                                               application organizes the data in media stream channels.
protocols involved in a pair-wise association when devices
in the network communicate.
                                                               Below the application layer, the transport layer organizes
                                                               the data into data streams. Streams are smaller data units
3.1 System Architecture
                                                               that should be able to communicate over short contacts. The
The architecture organizes application data into               use of smaller file blocks is also supported by the idea of
communication channels to facilitate identification and the    integrating forward error correction, for instance the use of
16                                                             (IJCNS) International Journal of Computer and Network Security,
                                                                                                          Vol. 2, No. 3, March 2010

fountain codes, to speed up and secure the data transfer,          synchronization. The transfer mode is based on a client-
specifically when packets are received unordered. The              server model. The communication protocol is a request-
streams packets themselves are then again cut into smaller         response system. It is not a strict system though; some
parts to optimize the interaction with the data link layer;        requests do not generate a response whereas other requests
i.e., the size is set to the PDU size of the data link layer.      can generate several responses. The goal is to send as few
                                                                   data packets as possible to reduce the communication
The proposed system is designed to work on any MAC                 overhead.
architecture, however, to be effective even in the presence of
short contact durations, short setup times and high data            Figure 4 illustrates the state diagram of the transfer mode.
rates are important for achieving high application                 It shows the three most important stages of synchronization
communication throughput. The design is further                    between two device nodes: the negotiation, data query, and
characterized by two fundamental choices.                          data communication stage.

        Ø    First, it allows only pair wise associations even     In the Negotiation stage, both devices determine if some of
             when the MAC layer supports multi-point               the subscribed channels are available on the other device.
             communication.                                        Instead of querying every single channel, the devices
        Ø    Second, it never pushes data in the network and       exchange a channel filter that contains all channel
             relies instead on receiver-driven dissemination.      subscriptions a device offers. The devices then start to test
                                                                   their subscribed channels against the filter of the other
The arguments for these two choices are simplicity and
                                                                   device and create a list of matching channels. This is a local
optimal usage of short contact durations. Furthermore, the
transport layer is able to optimize the flow control between       process and does not involve the exchange of messages.
the nodes and is not constrained by the slowest receiver in
range. Since the framework does not perform multi-hop
routing explicitly, the system performance is mainly
determined by the selection of nodes, it is synchronizing
with and the order by which it transfers data from the peers.
This task is performed by the synchronization service,
depicted in Figure 1. The synchronization service is
responsible for maintaining state about past synchronization
encounters and current devices in the PAN.

3.2 Association Phases

This section next describes the process when two nodes
associate. The framework differentiates two phases: a
discovery phase in which nodes detect that they are in a
range and a data exchange phase in which the nodes
negotiate and perform data transfer.

  1) Device Discovery Phase

We assume that every device that participates in the
opportunistic data sharing belongs to the same network,
e.g., with IEEE 802.15 every device is configured in ad hoc
mode. While the detection of new devices in the network is
handled by the MAC layer, the application in the nodes has
to take care of the discovery of devices that participate in the
wireless communication service.
                                                                           Figure 4. State Diagram – Data Transfer Modes.
The synchronization service keeps track of the discovery
messages received from each peer and maintains a history           In the Data Query stage, a device confirms the channels
list. An important aspect of the discovery process is to           selected in the previous stage and then retrieves a list of
identify peers with a good connection. Since the system is         streams offered by the remote device within those channels.
designed for ad hoc scenarios, it has to consider the specifics    Our implementation supports three different types of stream
of wireless communication.                                         retrievals:
  2) Data Transfer Phase
                                                                      1.      The peer requests any random stream within a
Once a device node has been detected, the synchronization                     channel that the remote peer offers.
services switches to the transfer mode which handles the
                                                             (IJCNS) International Journal of Computer and Network Security, 17
                                                                                                        Vol. 2, No. 3, March 2010

   2.    A peer requests any stream which is newer than a        4.3 Device Synchronization
         given date starting with the newest streams.
                                                                 We next look at the synchronization time. The
   3.    The peer requests any streams that are newer than
                                                                 synchronization time is the time between the moment two
         a given date starting with the oldest stream.
                                                                 devices have discovered each other and associate until they
The actual communication of streams is handled in the Data       start data communication. Figure 5 shows the performance
Communication stage which usually takes up most of the           of the architecture for device synchronization with different
connection time. The device starts to process the list of PDU    number of channels using channel filters compared to the
streams that was created in the previous stage. The              time it would take without filters.
communication itself works analogous to the download
process of BitTorrent [7]. Missing PDUs which are available
at the remote peer are randomly selected and downloaded.
Remark that a stream is divided into several pieces (PDUs)
which are requested

4. Evaluation

This section evaluates important design choices of the
proposed architecture as well as the performance we might
expect from a wireless opportunistic application and content
sharing service. Our evaluation relies on our prototype
implementation and focuses on typical deployment scenarios
in which:                                                           Figure 5. Device Synchronization with and with out
                                                                                      channel filter.
        Ø   the nodes are co-located (e.g., all devices are in
            the car) ; or                                        4.4 Data Transfer
        Ø   When nodes are not co-located (paired iPhone
                                                                 The system limits the association time to ensure that the
            is not in the car).
                                                                 system remains fair when multiple nodes are interested in
                                                                 the data provided by just a few nodes. Without this artificial
4.1 Evaluation Setup and Methodology
                                                                 limit, the first node that associates with the node having
All devices communicated over their integrated Bluetooth         new data content would be able to communicate for an
interface (802.15) turned into ad hoc mode. Our data             indefinite amount of time, letting the other nodes starve for
communication application is written in C++. The devices
that participate in the data communication system are
configured in ad hoc mode using the same identifier. .

We evaluated the framework’s accuracy by comparing its
data flows to actual Bluetooth flows between the same
devices. Performing this evaluation on a large-scale is
difficult because it requires control over the software
running at both end-points of a Bluetooth flow. We
performed our evaluation by pre-instrumented Bluetooth
stack of two classes of devices: Infotainment Unit and

4.2 Device Discovery Phase

An important aspect of opportunistic wireless podcasting is
the discovery time. The discovery time is the time between
the moment two nodes move into transmission range until
they discover each other at the application layer and start
the synchronization phase.
                                                                 Figure 6. Average Data Exchange Time between the PAN
This time is directly impacted by the interval at which the                             devices
messages are sent. The more frequent these messages are
sent, the quicker they will discover each other and be able to   To show how our implementation performs on different
transfer data streams.                                           PAN nodes, Figure 6 shows a comparison of the download
18                                                           (IJCNS) International Journal of Computer and Network Security,
                                                                                                        Vol. 2, No. 3, March 2010

time with the iPhone and the Infotainment unit. The results      users who retrieve data act simultaneously as clients and
are from average data communication measurements of              servers. It has post-facto gained interest in the research
around 12 MB video streams showing the download time             community; see for instance [7]. This system has similarities
when two or five devices are part of the PAN inside the car.     to BitTorrent [7], but the mobility assisted delivery means
                                                                 that data are provided in a random order from a random mix
4.5 PAN Accuracy                                                 of peers whereas peer-to-peer content distribution systems
                                                                 like BitTorrent selects peers based on specific rules. The
When sending data to multiple receivers, a Bluetooth master      closest research field is the delay tolerant networking. The
must form a piconet. In a piconet, the master sends data to      Delay Tolerant Network Research Group (DTNRG) [14] has
each receiver one packet at a time in a round-robin fashion.     proposed architecture [13] to support communication that
To evaluate architecture’s accuracy in piconet mode, we          may be used by delay tolerant applications. The architecture
performed the following experiment. We set up a sending          consists mainly of the addition of an overlay, called the
device to transmit a very large video file to each slave         bundle layer, above a network transport layer. Messages of
joining its piconet. We set up two iPhone as slaves to join      any size are transferred in bundles in an atomic fashion that
the piconet one by one, every 90 seconds. We measure the         ensures node-to-node reliability. Multicast for delay-tolerant
transfer rate of the initial flow established between the        networks has been proposed in [12]. In contrast to multicast,
master and the first joining slave and we plot how this rate     our work assumes open user groups. The info-station
changes over time in Figure 7.                                   concept is akin to our proposal and the paper in Ref. [10]
                                                                 studies means for avoiding exploitation of other nodes. We
                                                                 differ in that we make the nodal exchanges governed by a
                                                                 protocol instead of a social contract between users.

                                                                 In reference [9], it has been shown that delay-tolerant
                                                                 broadcasting between mobile nodes results in sufficiently
                                                                 high application level throughput even for streaming. This
                                                                 is the case in urban pedestrian areas with reasonably high
                                                                 densities of users, as well as in public transportation and in
                                                                 places where people gather occasionally (e.g., sport fields,
                                                                 shopping malls, recreational areas). Contact patterns of
                                                                 human mobility have been analyzed in the Haggle project
                                                                 [6]. This project aims at developing an application-
                                                                 independent networking architecture for delay-tolerant
 Figure 7. Data communicate rate in PAN scenario, when           networks. In contrast, we implement the podcasting service
      iPhone and Infotainment Unit has been paired.              directly on top of the link layer to exploit application-
                                                                 specific policies in the way information spreads across the
Our results demonstrate that framework is accurate: its          mobile users.
emulate flows behave similarly to Bluetooth flows with
respect to the number of packets exchanged and packet            BlueTorrent [8] is a cooperative content sharing system for
sizes. Finally, we found that framework is accurate when         Bluetooth. It differs from our approach in the search
running in piconet mode.                                         mechanisms and the content structuring. We rely on a
                                                                 channel-based content structure with a subscription model
                                                                 whereas BlueTorrent employs flat structuring with
5. Related Research                                              traditional query string search. TACO-DTN [11] is a
                                                                 content-based dissemination system for delay tolerant
Bluetooth is a low-cost technology initially designed for        networks. It is implemented as a publish/subscribe system
cable replacement [4] but more generally intended for all        and was mainly designed to distribute temporal events
kinds of Personal Area Network (PAN) applications [5]. It is     whereas our approach is implemented as a pure receiver-
probable that, in the very near future, Bluetooth will be        driven system and optimized for dissemination of streaming
embedded in almost every mobile device. These features           media. We use bloom filters in the searching for data; a
coupled with the interoperability characteristic provided by     survey of the use of bloom filters in networking is given in
Bluetooth specifications [1], make this wireless technology      [15].
very appealing for applications in automotive environments
[2]. As an example, Bluetooth headsets are very popular as
wireless audio link to a mobile phone, also for vehicular use.   6. Conclusions
These reasons make Bluetooth the most suited technology
for the design of the low power Wireless Communication           We presented, in this paper, architecture of wireless
Network (WCN).                                                   opportunistic communication network for In-vehicle
                                                                 multimedia application. The prototype implementation is
There has been substantial work on peer-to-peer content          targeted at devices that communicate over IEEE 802.15. We
distribution for the wireless network and Internet.              have evaluated different tradeoffs in the discovery,
BitTorrent is a successful instance of such systems where        synchronization, and data communication phases.
                                                          (IJCNS) International Journal of Computer and Network Security, 19
                                                                                                     Vol. 2, No. 3, March 2010

The overall resulting performance is promising and shows             ACM SIGCOMM CHANTS Workshop, Pisa, Italy,
the feasibility of wireless opportunistic communication              September 2006.
inside a vehicle. With the proposed opportunistic             [10]   W. H. Yuen, R. D. Yates, and S. C. Sung.
communication system, the scope of multimedia content                Noncooperative content distribution in mobile
exchange may broaden and that new participatory wireless             infostation networks. In Proceedings of the IEEE
broadcasting applications using the proposed concepts will           WCNC, 2003.
emerge in the near future.                                    [11]   G. Sollazzo, M. Musolesi, and C. Mascolo, “TACO-
                                                                     DTN: A Time-Aware COntent-based dissemination
We anticipate two main directions for the future work:               system for Delay Tolerant Networks,” in Proceedings
                                                                     of the First International Workshop on Mobile
      Ø    Develop analytical models for relevant measures           Opportunistic Networking, Puerto Rico, June 2007.
           of performance for the described ad hoc network.   [12]   W. Zhao, M. Ammar, and E. Zegura. Multicasting in
      Ø    Performance analysis of multimedia protocol for           delay tolerant networks: Semantic models and routing
                                                                     algorithms. In Proceedings of the Sigcomm Workshop
           different multimedia resources and performance
                                                                     on Delay Tolerant Networking, August 2005.
                                                              [13]   S. Burleigh, A Hooke, L. Torgerson, K. Fall, V. Cerf,
                                                                     B. Durst, and K. Scott. Delay-tolerant Networking: An
References                                                           Approach      to   Interplanetary    Internet.  IEEE
                                                                     Communications Magazine, 41(6):128–136, 2003.
                                                              [14]   Delay Tolerant Network Research Group (DTNRG).
 [1] Bluetooth Special Interest Group., “Core Specification
      of the Bluetooth System v 3.0”. Apr. 2009.
                                                              [15]   A. Broder and M. Mitzenmacher. Network applications
[2] R. Nüsser, R. Pelz, “Bluetooth-based Wireless
                                                                     of bloom filters: A survey. Proceedings of the 40th
     Connectivity in an Automotive Environment”, Proc. of
                                                                     Annual Allerton Conference, 2002.
     the IEEE Vehicular Technology Conference, Fall
     2000, vol. 4, pp.1935-1942.
[3] S. Burleigh, A Hooke, L. Torgerson, K. Fall, V. Cerf,     Authors Profile
     B. Durst, and K. Scott. Delay-tolerant Networking: An
     Approach      to    Interplanetary   Internet.   IEEE    Kamal Sharma received the M. Sc. (Electronics) and M. Tech.
     Communications Magazine, 41(6):128–136, 2003.            (Future Studies & Planning) degrees from Devi Ahilya University
[4] J.C. Haartsen, “The Bluetooth Radio System,” IEEE         in 2002 and 2005, respectively. He is currently with Devi Ahilya
     Personal Comm., vol. 7, no. 1, pp. 28-36, Feb. 2000.     University, Indore, INDIA.
[5] P. Johansson, M. Kazantzidis, R. Kapoor, and M.
                                                              Hemant Sharma received the M. Sc., M. Tech. and Ph D
     Gerla, “Bluetooth: An Enabler for Personal Area
                                                              degrees from Devi Ahilya University in 1996, 1998 and 2009,
     Networking,” IEEE Network, vol. 15, no. 5, pp. 28-37,    respectively. He is in to designing and developing platform
     Sept.-Oct. 2001.                                         architecture for In-vehicle Infotainment Systems for more than 10
[6] Augustin Chaintreau, Pan Hui, Jon Crowcroft,              years. He is currently with Delphi Delco Electronics Europe
     Christophe Diot, Richard Gass, and James Scott.          GmbH, Germany.
     Impact of Human Mobility on the Design of
     Opportunistic Forwarding Algorithms. In Proceedings      Dr. A. K. Ramani received his Master of Engineering (Digital
     of IEEE INFOCOM, Barcelona, Spain, April 2006.           Systems) and Ph. D, from Devi Ahilya University, Indore. He
[7] M. Izal, G. Urvoy-Keller, E.W. Biersack, P. Felber, A.    worked as a research engineer in ISRO Satellite Center, Dept. of
     Al Hamra, and L. Garcés-Erice. Dissecting BitTorrent:    Space, Bangalore, India, during 1979-83. Since Jan. 1990, he is a
                                                              professor with the School of Computer Science at Devi Ahilya
     Five Months in a Torrent’s Lifetime. In Proceedings of
                                                              University. He was associate professor at University Putra
     Passive and Acrive Measurements Conference, April        Malaysia, Dept. of Computer Science during May95 toMay99.
     2004.                                                    During Sept 2005- July 2006, He was with the College of
[8] Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki          Computer Science and Information Technology, at King Faisal
     Cho, and Mario Gerla. BlueTorrent: Cooperative           University (KFU), Kingdom of Saudi Arabia. He has guided 13
     Content Sharing for Bluetooth Users,. In Proceedings     PhDs in different areas of Computer Science and Information
     of PerCom, NY, USA, March 2007.                          Technology and has authored about 70 research papers.
[9] Gunnar Karlsson, Vincent Lenders, and Martin May.
     Delay-Tolerant Broadcasting. In Proceedings of the
20                                                               (IJCNS) International Journal of Computer and Network Security,
                                                                                                            Vol. 2, No. 3, March 2010

      An Integrated Approach for Legacy Information
                    System Evolution
                                                   Dr. Shahanawaj Ahamad1
                                                   Department of Computer Science
                                            College of Arts & Science in Wadi Al-Dawasir,
                                                        King Saud University
                                                       Wadi Al-Dawasir-11991
                                                      Kingdom of Saudi Arabia.

Abstract: Future legacy evolution has always been a great            This work is motivated by migration approach suggested in
challenge because of continuous changes in business operation        [11] that explains why a module based migration approach
influenced by requirements changes, production of large              can be implemented for software maintenance, paper also
commercial benefits, information and communication
technologies development. Usually legacies are not been made to
                                                                     suggested in this direction but with legacy technical aspects
accommodate these fast changing advancements, this is one of         and implantation procedures.
the basic challenge of legacy evolution and renovation also
requires forward and backward procedures and specific
knowledge generation for renovators. Web enabling legacy and         3. Modularization
COBOL based applications interaction with e-commerce based           Following fig. 1 depicts how the legacy source is divided in
application is potentially hard to maintain and loss huge
                                                                     to interacting modules.
amount of organizational economical assets, this paper proposes
the solutions procedures in this evolutionary direction so that on
demand legacy evolution can be performed through adaptive

Keywords: Legacy Systems; Software Evolution; Legacy
Modules; Legacy Code; Legacy Restructuring.

1. Introduction
This paper presents a closer look at software renovation and
explains how legacy software evolutions take place for
future change. It is based on the view that an organization's                Figure 1: Dividing legacy source in modules
software systems provide valuable functionality that has
been proven in practice. As such, it should be reused                Following are some identified issues associated with this
whenever possible. At the same time, the packaging of this           procedure:
business functionality is usually far from optimal as they are
often based on old languages, database systems, and                      • Availability of legacy sources.
transaction monitors, monolithic in design, and non                      • Language used to develop legacy source.
maintainable as a result of repeated modification without                • Complexity of         source     understanding  and
supporting documents. As a consequence, legacy systems                      comprehension.
are very hard to change.                                                 • Status of documentation and complexity in re-
A software system can be effectively evolved with following              • Implementation of the tools for analysis and results
procedures:                                                                 description.
    • Modularization                                                     • Check feasibility of division of modules.
    • Restructuring
    • Analysis                                                       If division of source in modules is feasible and above
                                                                     mentioned issues are resolved then undertake next sequence
    • Reformation                                                    of procedural approach.
    • Transformation.
Procedures proposed are explained in the following sections.
                                                                     4. Restructuring
2. Related Work                                                      Intercommunication of the modules using organized of
                                                                     architecture is to replace the internal structure of the legacy
                                                             (IJCNS) International Journal of Computer and Network Security, 21
                                                                                                        Vol. 2, No. 3, March 2010

source. Legacy modules are wrapped to interact with the          The interactive search for modules can have any one of a
organized architecture, appear as modules. This process is       number of different starting points.
only forward process since the only modifications made to
the legacy are:                                                  • The first is to interview, if possible, the users,
     • Division in sub-modules.                                  maintainers, and designers of the legacy system in order to
     • Wrapping of the modules and major parts of the            get a picture of the overall functionality of the system, and,
         legacy remain untouched.                                more specifically, to get an impression which functionality
                                                                 should be preserved and which is redundant.

                                                                 • Another starting point is to use the persistent data stores.
                                                                 Of all the different sorts of data playing a role in the legacy
                                                                 system, it is likely that the data stored in the database
                                                                 represents business (domain-specific) entities. Following
                                                                 such data down to the actual computations as program/data
                                                                 CRUD Analysis which leads to those programs or
                                                                 procedures that could be candidate (domain-specific)

                                                                 • Another starting point consists of the program call
            Figure 2: Restructuring procedure
                                                                 relationships, which is inter-programs relationships
                                                                 analysis, which can disclose about cohesion and coupling of
The issues associated with this procedure are:
                                                                 modules, or about the layers built into the legacy system. If
    • Reengineer the Data Bases
                                                                 one procedure invokes many others (high fan-out), and
    • Build a software access layer to access the Data
                                                                 doesn't get invoked itself, it is likely to be a control
        Bases (Legacy and New)
                                                                 (organized) module, with little built-in functionality.
    • Restore the programs so that they can access the new
                                                                 Likewise, if a procedure is called by many others (high fan-
        Data Bases.
                                                                 in), it is likely to be some sort of utility routine, dealing with
    • Externalize a wrapper for each module.
                                                                 error handling or logging. The procedures with both low
    • Write organized scripts to interconnect the modules.
                                                                 fan-in and low fan-out are the ones that are likely to contain
    • Test the restructured system.
                                                                 business logic.

5. Analysis of Legacy Source                                     • The screen /reports sequence can be identified, together
                                                                 with the key strokes leading to each subsequent
The objective is to examine the sources of the legacy system
                                                                 screen/reports. Such screen/reports sequences are very close
and extract information from them that reveals their purpose
                                                                 to use cases, telling what actions an end user performs.
and architecture.
                                                                 Moreover, following the flow of screen input fields through
                                                                 the program identifies those program slices that implement
                                                                 the given use case. This form of analysis can very well be
5.1 Analysis Methods for Legacy Sources
                                                                 supported by automated, interactive, tools.
The objective of analysis is to extract information from
legacy source that presents their purpose, and architecture.
                                                                 • Techniques for combining legacy elements into original
Analysis techniques are crucial for before and further
                                                                 ways in order to arrive at coherent modules include concept
procedures, this section covers those analysis techniques that
                                                                 analysis and cluster analysis. Such techniques can be used to
can help to find candidate modules for reformation and
                                                                 spot combined usage of pieces of data and functionality. For
development in a legacy system.
                                                                 example, they can be used to group data elements into
                                                                 candidate classes, based on their usage in programs or
Tools collect all classes of information about the system,
                                                                 procedures which can then be made into methods of the
which is used by the renovation engineer to find candidate
                                                                 derived class. In particular concept analysis can be used to
modules. There is no single way to find all good modules
                                                                 display the various combination possibilities in a concise
therefore the tools should provide many different views on
                                                                 and meaningful manner.
one legacy source system, and show potential combinations
of these views. This requires a hypertext-based browsing
                                                                 • Search for modules of specific functions, for example, a
mechanism, potentially supported by intelligent agents and
                                                                 module for valuing insurance options. A hypertext-based
automata producing specialized reports, as well as an on
                                                                 legacy browsing system can provide various starting points
line explanation mechanism.
                                                                 for such a search, such as indexes on words occurring in
                                                                 comments, column names, inferred types, and so on.
22                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

Moreover typical computations necessary for the behavior of           •   Language knowledge
the module looked may be identified using plan recognition            •   Domain knowledge.
and these computations may then be packaged into the                  •   System Knowledge.
required modules.                                                     •   Requirements and strategy.

                                                                  It is a fact that major parts of the reformation procedure can
6. Reformation
                                                                  be automated by combining human efforts with full
This is reformation of individual modules and this                automation of repetitive tasks as speed, quality,
procedure is to consider the renovation, up gradation of          reproducibility, traceability along with human intelligence.
individual modules as depicted in Figure 3.
                                                                  7.2 Restructuring Support
The issues associated with this procedure are:                    Division of legacy source resulting from modularization,
        • Determine for each module for which renovation          now requires replacing the direct connections between
             strategy is to use.                                  legacy modules into indirect connections that are leveraged
        • Leave as is.                                            by the organized architecture. This procedure is forward
        • Completely replace it by commercial off-the-            process as the system is reorganized into modules but the
             shelve software systems.                             code of each module is hardly affected. The following
        • Perform a very detailed analysis of the component       sequences of operations are needed to achieve this:
             in order to extract its business logic that can be
             used to rebuild or regenerate the modules.               • Reengineer the Data Bases.
        • Apply the selected reformation strategy.                    • Build a software access layer to access the Data
        • Test the modules.                                              Bases legacy and new.
                                                                      • Restore the programs so that they can access the new
                                                                         Data Bases
                                                                      • Identify the level of granularity at which the legacy
                                                                         system will be decomposed.

                                                                  The major issue associated with this are:
                                                                      • The total number of modules should be manageable.
           Figure 3: Reformation with modules                         • Smaller modules with many cross relationships are
                                                                         better handled as a single, larger, module.
7. Transformation                                                     • Wrap the identified module in order to connect them
                                                                         with the organized architecture.
The goal is to technically restructure and improve the                • Write organized scripts that simulate the
sources of the legacy modules. Transformation is forward                 connectivity in the original legacy system.
process as the legacy sources are modified.
                                                                  7.3 Reformation Support
7.1 Transformation Techniques for Legacy Sources                  The reformation can be started with individual modules.
Transformation techniques perform forward, systematic,            This can be originally changes the original code of the
modifications of the legacy module source in order to enable      module. The most interesting properties of this approach
their evolution and increase their flexibility. The legacy        are:
module source is transformed for:
     • Restructure the whole system.                                  • The mutual dependencies between the evolution
     • Restructure the code of individual module.                        projects of the various modules have been
     • Apply uniform comment conventions.                                eliminated or minimized.
     • Eliminate deplore language features.
     • Convert to a new language version.                             • The reformation strategy may differ per module as
     • Translate to another language.                                    some modules may be replaced by COTS.

The reformation automata have usually three inputs:               In those cases that the decision is to perform a detailed
    • The sources of the legacy system.                           reformation based on the existing code modules, typically
    • The repository resulting from the system analysis           when much useful business logic is contained in its
        phase.                                                    transformation techniques may be applied to the code of the
    • A set of Automata Detailed Requirements                     module.
        specifications for Transformation.
                                                                  The issues associated with this procedure are:
The crucial elements in successful reformation tools are:
                                                           (IJCNS) International Journal of Computer and Network Security, 23
                                                                                                      Vol. 2, No. 3, March 2010

    • Transformation intended for code improvement and         [6] M. Fowler, K. Beck, J. Brant, W. Opdyke, and D.
       applying uniform layout conventions, goto                    Roberts. Refactoring: Improving the Design of Existing
       elimination, code restructuring, and dead code,              Code. Addison-Wesley, 1999.
       dead data elimination etc.                              [7] I. Jacobson, M. Griss, and P. Jonsson. Software Reuse;
    • Transformation intended for replacement of certain            Architecture, Process and Organization for Business
       properties of the code and change of the user-               Success. Addison Wesley, 1997.
       interface or the database engine etc.                   [8] C. Jones. Applied Software Measurement: Assuring
    • Full translation of the code to another language or           Productivity and Quality. McGraw-Hill, 1991.
       platform and conversion between COBOL dialects          [9]Oluwaseyi Adeyinka, “Service Oriented Architecture &
       or translation from obsolete 4GL to standard 3GL.            Web Services: Guidelines for Migrating from Legacy
                                                                    Systems and Financial Consideration” Master thesis,
                                                                    Blekinge Institute of Technology, 2008.
8. Conclusion
                                                               [10] M. Simos.Organization domain modelling (ODM)
The work presented in this paper provides the procedural            guidebook version 2.0. Technical Report STARS-VC-
integrated approach to overcome the major challenges for            A025/001/00, Synquiry Technologies, Inc, 1996. URL:
future business operations which are the alignment with    450 pp.
changing business goals and changing technologies, while       [11]      B. Meyer and C. Mingins. Component-base
retaining the assets legacy systems which supporting today's        development: From buzz to spark. IEEE Computer,
business operations. It is also discussed the automated             23(7):35-37, 1999.
analysis and transformation of legacy systems. The             [12] Dr. Vladimir Bacvanski, An Object-Oriented,
necessary techniques for analysis, transformation, and              Component-based, Approach to Migrating Legacy
reformation of legacy systems were also discussed. Paper            Systems, 2004.
also concludes that the legacy evolution is an economically
motivated task and legacy is a valuable asset for
organization and business operations. Discussed approach       Authors Profile
focuses on modularization of whole legacy system, issues
and propose the successive development procedure for the
affective evolution.                                                                           Dr. Shahanawaj Ahamad is an
                                                                                               active academician and researcher
References                                                                                     in the field of Software Reverse
                                                                                               Engineering with experience of ten
[1] A.V. Aho, R. Sethi, and J.D. Ullman. Compilers.                                            years, working with King Saud
    Principles, Techniques and Tools. Addison Wesley,                                          University’s College of Arts and
    1986.                                                                                      Science in Wadi Al-Dawasir,
[2] G. Visaggio, Value-based decision model for renovation                                     K.S.A. He is the member of various
    processes in software maintenance, Annals of Software      national and international academic and research groups, member
    Engineering, 9, Kluwer Academic Publishers, May            of journal editorial board and reviewer. He is currently working on
    2000, pp 215-233.                                          Legacy Systems Migration, Evolution and Reverse Engineering,
[3]G. Visaggio, Ageing of a Data-Intensive Legacy System:      published more than twenty papers in his credit in national and
    Symptoms and Remedies, Journal of Software                 international journals and conference proceedings. He holds M.
    Maintenance: Research and Practice, John Wiley; vol.       Tech. Degree in Information Technology followed by Ph.D. in
    13, pp. 281-308, 2001.                                     Computer Science major Software Engineering, supervised many
[4]C. Szyperski. Component Software; Beyond Object-            bachelor projects and master thesis.
    Oriented Programming. Addison-Wesley, 1998.
[5] E. Stroulia, M. El-Ramly, L. Kong, P. Sorenson, and B.
    Matichuck. Reverse engineering legacy interfaces: An
    interaction-driven approach. In 6th Working
    Conference on Reverse Engineering, WCRE'99, pages
    292-301. Society, 1999.
24                                                             (IJCNS) International Journal of Computer and Network Security,
                                                                                                          Vol. 2, No. 3, March 2010

          Improving Information Accessibility In
         Maintenance Using Wearable Computers
                                      Lt.Dr.S Santhosh Baboo1 and Nikhil Lobo2
                                           P.G. & Research Dept of Computer Science
                                              D.G.Vaishnav College, Chennai 106
                                                            Research Scholar
                                                      Bharathiar University

Abstract: In aerospace and defense, maintenance is being          (Eric Jorgensen, 1994). The information in these manuals is
carried out using technical manuals in hardcopy. Manuals          presented in a window frame with navigation tools for
in hardcopy format are very difficult to carry, access            zooming and panning allowing easy comprehension.
information and understand while carrying out                     Information is displayed based on the
maintenance. This paper brings out the concept of
Interactive Electronic Technical Manuals that can run on
Wearable Computers making maintenance more effective
while reducing the effort involved. Manuals are now
compact and easy to handle, easier to access, can be read
in a systematic manner and easily comprehendible.

Keywords: Wearable Computer, Interactive Electronic Technical
Manual, Manuals, Documentation

1. Introduction
An aircraft is required to be maintained in airworthy
condition. During maintenance of aircrafts, a technician is
often required to refer manuals for maintenance procedures.            Figure 1. Interactive Electronic Technical Manual
These manuals are at present in hardcopy consuming time
to access the relevant information. These hardcopy manuals
can be replaced by Interactive Electronic Technical Manuals       3. Need for Interactive Electronic Technical
(IETM) and accessed using wearable computers improving               Manuals (IETMs) when compared to Paper-
the performance of technicians by increasing accessibility to        Based Manuals
information. Moreover these technicians can receive the
latest information updates electronically without waiting for     •   Information can retrieved easily
the amended manuals in hardcopy. Following are the                •   Since information is presented in electronic form, less
objectives to be obtained by using Interactive Electronic             storage would be required
Technical Manuals instead of paper-based manuals:                 •   As in the case of hardcopies, pages will not be subject to
• 100% identification of causes of problems (fault                    wear and tear
    isolation)                                                    •   IETMs can be easily loaded into portable and wearable
• Time spent in solving the problem (troubleshooting)                 computers which maintenance personnel can take to the
    decreased by 20 - 25%                                             field
• Error reduction in performing removals and                      •   Difficult procedures can be integrated with multimedia
    replacements by 35 - 40%                                          elements like video and animations to make
                                                                      understanding easier
2. Interactive Electronic Technical Manuals                       •   Information on various configurations of equipments can
   (IETMs)                                                            be maintained and displayed by storing only the
Interactive Electronic Technical Manuals (IETMs) are
                                                                  •   The IETM can be used as a basis for developing
manuals in electronic format with interactivity designed for
                                                                      Computer based training Packages on the same subject
display on computers. An IETM is intended to be the
functional equivalent of a paper-based Technical Manual
and in most cases a total replacement for the paper manual
                                                             (IJCNS) International Journal of Computer and Network Security, 25
                                                                                                        Vol. 2, No. 3, March 2010

                                                                     data integrity. Cross-references are dynamic and search
                                                                     feature is robust.
                                                                 •   The above IETM is integrated with data from other
                                                                     processes and systems like expert systems, test
                                                                     equipments and diagnostics

                                                                 5. Features of Interactive Electronic Technical
                                                                 Authoring Module
                                                                      To create manuals with their respective chapters,
                                                                 sections and subsections and incorporate them into the
                                                                 • User Authentication – to enter the Authoring Module a
                                                                     user is prompted to enter the login identification (ID)
                                                                     and password
                                                                 • Manual Description – facility to add or delete manuals
                                                                     and their respective chapters, sections and subsections
                                                                 • Builder – an editor that allows users to create individual
                                                                     pages to be incorporated into the manual
                                                                 • Publishing – publishing a viewer module

                                                                 Viewer Module
                                                                      To view manuals by clicking on their respective
                                                                 chapters, sections and subsections
                                                                 • User Authentication – to enter the Viewer a user is
                                                                    prompted to enter the login identification (ID) and
                                                                 • Split Window - to view text pages and corresponding
                                                                    illustrations simultaneously
                                                                 • Image Viewer - to pan and zoom illustrations
    Figure 2. IETMs compared to Paper-Based Manuals              • Safety Notes - warnings, cautions and notes used in the
                                                                    manual to be displayed in separate windows to alert
4. Types of Interactive Electronic Technical                        users on their importance
   Manuals                                                       • Acronyms and Abbreviations - Glossary containing the
                                                                    list of acronyms and abbreviations used in the manuals
•   Page images obtained by scanning in rater format with        • Find – to search for a specific word in a page
    the table of contents, list of tables, list of figures and   • Search – to search for a specific word within manuals
    index hyperlinked to the respective contents of the          • Notes – facility for users to create their own notes while
    manual. A user can select a topic from the table of             browsing
    contents and the respective raster page is displayed. The    • History Back and Forward – keeps a track of the order of
    page orientation of the manual is retained and it can be        pages that have been visited by the user
    viewed and directly printed as per format specifications.
                                                                 • Bookmark- allow a user to bookmark a page to return to
•   An ASCII or PDF document in a scrolling text window.            it later
    In addition to the above hyperlinks it also contains
                                                                 • Print - to print a desired chapter, section or subsection
    hyperlinks to sections, tables and figures. This document
                                                                 • Help – to guide the user how to use this Viewer Module
    can be linked to video, audio and external applications.
    May contain raster and vector graphics. Bookmarks,
    search and sticky notes are provided. The manual can be
                                                                 6. Manuals commonly used in IETM
    viewed and directly printed as per format specifications.         Maintenance Manual
•   SGML files with the content structured so that it can be          The description and operation of each aircraft system is
    viewed as smaller logical blocks of text with very limited   explained in this manual with procedures for removal and
    use of scrolling. It is viewed as an indexed PDF file.       installation of assemblies that constitute that system.
•   The information authored is fully structured and             Procedure for repair and cleaning is also included along
    hierarchical. In a relational database data tagged with      with inspection and testing.
    SGML is stored to prevent data redundancy and enforce
                                                                      Illustrated Parts Catalogue
26                                                          (IJCNS) International Journal of Computer and Network Security,
                                                                                                       Vol. 2, No. 3, March 2010

    The assemblies along with their respective parts are             A wearable computer is a potential platform for many
mentioned in this manual. Each part has a unique part           different applications that require privacy, mobility and
number, nomenclature and the quantity of that part in the       continuous access to information (Lehikoinen, 2002).
assembly. Vendor that supplies this part is also mentioned.

     Description and Operation Manual
     The description and operation of each aircraft system is
explained in this manual.

     Flight Manual
     The description and operation of each aircraft system is
explained in this manual. Recommended procedures for
normal operations and emergencies are mentioned.                      Figure 3. WT4000 wearable computer with a scanner
     Consumable Products Manual
     For each aircraft system, the list of consumables                The WT4000 is 5.7 inches in length, width 3.7 inches
required to carry out maintenance of that system. The part      and height of 1.0 inches, weighing approximately 390.2
number, which is unique along with the nomenclature and         grams. It has a keyboard consisting of 23 alphanumeric keys
quantity, are mentioned in this manual.                         and a memory (FLASH/RAM) of 64/128 MB. The display
                                                                type is a backlit color TFT having a display resolution of
    Master Servicing Schedules                                  QVGA in landscape mode (320x240). The operating system
    This manual covers the preventive maintenance               is Microsoft Windows CE 5.0 Professional Version. It can
operations to be carried out to maintain the aircraft in        be operated in temperatures ranging from -20° to 50° C and
airworthy condition. It also includes basic servicing,          can withstand multiple drops on concrete from a height of 4
component replacements and unconditional inspections and        feet. Optional accessories include wearable scanners RS309
checks.                                                         and RS409.

      Storage and Preservation manual                           8. Creation of Interactive Electronic Technical
      The manual details the procedures to be carried out for      Manuals for a Military Helicopter
storage and preservation of that aircraft and its components.
It also includes instructions for packing and transportation        Interactive electronic technical manuals were
of an aircraft with its on-board components.                    developed and implemented on the field using wearable
                                                                computers for the following manuals
    TTGE                                                        • Description and Operation
    For maintenance of an aircraft, the tools and ground        • Maintenance Manual
support equipment are mentioned in this manual.                 • Fault Isolation Manual
                                                                • Airplane Illustrated Parts Catalog
7. Wearable Computers                                               Following are the metrics collected on the field during
                                                                maintenance of the helicopter
     A computer that is subsumed into the personal space of
the user, controlled by the wearer, and that is always on and       Table 1: Comparison between Paper-Based Manuals and
always accessible (Steve Mann, 1997).                                Interactive Electronic Technical Manuals for a Military
     A portable computer worn around the body of a
technician into which commands can be entered and                             Task              Paper-Based       Interactive
executed while the technician is performing maintenance                                           Manuals         Electronic
operations. These portable computers normally contain                                                         Technical Manuals
voice recognition and head mounted display as input and
output interfaces. The technician is now able to access the
                                                                    Correct identification of
capabilities of a desktop and is in contact with Interactive         causes of 12 problems          7                12
Electronic Technical Manuals containing maintenance                          (faults)
instructions at all times.
                                                                     Time spent in solving
      Three dominant aspects characterize wearable                      the 12 problems          82 hours         63 hours
computers: they are always on and always ready, they are               (troubleshooting)
totally controlled by the user, and they are considered both
by the user and by the others around to belong to the user’s           Number of errors
personal space (Mann, 1997).                                           encountered when             14               9
                                                                    performing 38 removals
                                                                     and 12 replacements
                                                                       The above metrics indicate the following
                                                                •     Improvement in identification of causes of problems
                                                                 (IJCNS) International Journal of Computer and Network Security, 27
                                                                                                            Vol. 2, No. 3, March 2010

      (fault isolation) from 58% to 100%                             to handle, easier to access, can be read in a systematic
•     Time spent in solving the problem (troubleshooting)            manner and easily comprehendible.
      decreased by 23%
•     Error reduction in performing removals and
      replacements by 36%

9. Creation of Interactive Electronic Technical                      References
   Manuals for a Transport Aircraft
                                                                     [1] Steve Mann, “Smart Clothing: The Wearable
    Interactive electronic technical manuals were                        Computer and WearCam”, Personal Technologies,
developed and implemented on the field using wearable                    Vol.1 No.1, Mar. 1997.
computers for the following manuals                                  [2] Eric L. Jorgensen, “The Interactive Electronic
• Maintenance Manual                                                     Technical Manual Overview – Setting the Stage”,
• Fault Isolation Manual                                                 AFEI CALS Expo International, Oct. 1994.
• Airplane Illustrated Parts Catalog                                 [3] Steve Mann, “An Historical Account of the WearComp
                                                                         and WearCam Inventions Developed for Applications
                                                                         in 'Personal Imaging”, The First International
    Following are the metrics collected on the field during
                                                                         Symposium on Wearable Computers: Digest of Papers,
maintenance of the transport aircraft
                                                                         IEEE Computer Society, pp. 66–73, 1997.
                                                                     [4] Lehikoinen J, “Interacting with wearable computers:
    Table 2: Comparison between Paper-Based Manuals and
                                                                         techniques and their application in wayfinding using
    Interactive Electronic Technical Manuals for a Transport
                                                                         digital maps”. Ph.D. Thesis. University of Tampere.
                                                                         Department of Computer and Information Sciences,
                                                                         Report A-2002-2, 2002.
            Task                Paper-Based Interactive Electronic
                                 Manuals     Technical Manuals

  Correct identification of          5                 9
causes of 9 problems (faults)

 Time spent in solving the 9     58 hours          46 hours
 problems (troubleshooting)

Number of errors encountered         8                 5
when performing 16 removals
    and 4 replacements

        The above metrics indicate the following
•     Improvement in identification of causes of problems
      (fault isolation) from 56% to 100%
•     Time spent in solving the problem (troubleshooting)
      decreased by 21%
•     Error reduction in performing removals and
      replacements by 38%

10. Conclusion
      The metrics collected for maintenance being carried out
on a Military Helicopter and Transport Aircraft using
IETMs on Wearable Computers are analyzed and following
are the benefits
• 100% identification of causes of problems (fault
• Time spent in solving the problem (troubleshooting)
    decreased by 20 - 25%
• Error reduction in performing removals and
    replacements by 35 - 40%
      In conclusion Interactive Electronic Technical Manuals
run on Wearable result in manuals being compact and easy
28                                                              (IJCNS) International Journal of Computer and Network Security,
                                                                                                           Vol. 2, No. 3, March 2010

     Remote Laboratory for Teaching Mobile Systems
              Adil SAYOUTI1, Adil LEBBAT 1, Hicham MEDROMI1 and Fatima QRICHI ANIBA1
                                  Laboratoire d’Informatique, Systèmes et Énergies Renouvelables

                            Team Architecture of Systems, ENSEM, BP 8118, Oasis, Casablanca, Morocco
               ,, and

Abstract: This paper presents the current contribution of
ENSEM (Hassan II University) in the Innovative Educational          •   Remote laboratories (Figure 1), which offer remote
Concepts for Autonomous and Teleoperated Systems project                access to real laboratory equipment and instruments;
which aims at create an innovative educational tool to allow        •   Virtual laboratories (Figure 2), which offer access to a
students to perform remote laboratory experiments on                    virtual environment using for this simulation software.
autonomous and teleoperated mobile systems. Although the
Internet offers a cheap and readily available communication
channel for teleoperation, there are still many problems that
need to be solved before successful real-world applications can
be realized. These problems include its restricted bandwidth and
arbitrarily large transmission delay, which influence the
performance of the remote control over Internet. In this article,
we propose a solution that consists in equipping the mobile
systems with a high degree of local intelligence in order for
them to autonomously handle the uncertainty in the real world
and also the arbitrary network delay.
  Keywords: E-learning, Control Architecture, Software
Architecture, Multi-agents System, Distributed System, Mobile
System, Internet.
                                                                                    Figure 2. Virtual laboratories
1. Introduction
                                                                    2. Multi-Agent          Systems        for     Autonomous
Experimentation is a very important part of education in
engineering. This is also true for mechatronic engineering,
which is a relatively new field, combining three engineering        The organization of a system - or its control architecture -
disciplines: mechanical engineering, electrical engineering         determines its capacities to achieve autonomous tasks and to
and software engineering. The equipments needed for                 react to events [2]. The control architecture of an
experiments in mechatronic are generally expensive. One             autonomous mobile system must have both decision-making
solution for expensive equipments is sharing the available          and reactive capabilities: situations must be anticipated and
equipments with other universities around the world [1].            the adequate actions decided by the mobile system
Two are the possibilities to realize it:                            accordingly, tasks must be instantiated and refined at
• Remotely accessible student laboratory facilities - with          execution time according to the actual context, and the
    the advent of the Internet and its rapidly spreading            mobile system must react in a timely fashion to events. This
    adoption in almost all spheres of society - have become         can be defined as a rational behavior, measured by the
    feasible and are increasingly gaining popularity.               mobile system's effectiveness and robustness in carrying out
• Virtual reality (VR) is a system which allows one or              tasks.
    more users to move and react in a computer generated            To meet this global requirement, the control system
    environment.                                                    architecture should have the following properties [3]:
At present, several e-learning laboratories have been               • Programmability: a useful mobile system cannot be
developed. It can be distinguish two categories of them:                designed for a single environment or task, programmed
                                                                        in detail. It should be able to achieve multiple tasks
                                                                        described at an abstract level. The functions should be
                                                                        easily combined according to the task to be executed.
                                                                    • Autonomy and adaptability: the mobile system should be
                                                                        able to carry out its actions and to refine or modify the
                                                                        task and its own behavior according to the current goal
                                                                        and execution context as perceived.
                                                                    • Reactivity: the mobile system has to take into account
                                                                        events with time bounds compatible with the correct and
                                                                        efficient achievement of its goals (including its own
                Figure 1. Remote laboratories                           safety). Consistent behavior: the reactions of the mobile
                                                               (IJCNS) International Journal of Computer and Network Security, 29
                                                                                                          Vol. 2, No. 3, March 2010

     system to events must be guided by the objectives of is       3. System Architecture
                                                                   The remote laboratories provide a live performance
• Robustness: the control architecture should be able to
                                                                   laboratory accessible via Internet, which can be used to
     exploit the redundancy of the processing functions.
                                                                   cover the experimental issues in any tele-education system.
     Robustness will require the control to be decentralized to
                                                                   Clearly as bandwidth increases and higher speed network
     some extent.
                                                                   access reaches users; these factors play an important role in
• Extensibility: integration of new functions and definition
                                                                   user adoption of remote laboratories.
     of new tasks should be easy. Learning capabilities are
                                                                   The concept of remote laboratories is defined as a
     important to consider here: the architecture should make
                                                                   mechatronic workspace for distance collaboration and
     learning possible.
                                                                   experimentation in research or other creative activity, to
We note an interesting link between the desirable properties
                                                                   generate and deliver results using distributed information
of intelligent control architecture for autonomous mobile
                                                                   and communication technologies. To implement a remote
systems and the behavior of agent-based systems:
                                                                   laboratory, a common Internet-based teleoperation model [5]
• Agent-based approaches to software and algorithm
                                                                   is used as shown in figure3.
     development have received a great deal of research
     attention in recent years and are becoming widely
     utilised in the construction of complex systems.
• Agents use their own localised knowledge for decision-
     making, supplementing this with information gained by
     communication with other agents.
• Remaining independent of any kind of centralised
     control while taking a local view of decisions gives rise
     to a tendency for robust behavior.
• The distributed nature of such an approach also provides
     a degree of tolerance to faults, both those originating in
     the software/hardware system itself and in the wider
It is for these reasons that we consider an agent-based
system to be a suitable model on which to base an intelligent
control architecture for complex systems requiring a large
degree of autonomy.
Although widely used, multi-agent systems research has also                       Figure 3. System Architecture
lead to a number of definitions of agency. Once again, in
some cases, these definitions are inconsistent. In our             The Remote user, through his Internet navigator, addresses
context, the terms agent or intelligent agent refer to a           a http request to a Web server and downloads an application
material or software entity with one or more independent           on his work station. A connection is then established
threads of execution, and which is entirely responsible for        towards the server in charge of the management of the
its own input and output from/to the environment in which          mobile system to control. The user is then able to take the
it is situated [4]. It is therefore autonomous. We assume that     remote control of it. In parallel, other connections are also
the agent has well-defined objectives or goals and exercises       established towards multi-media servers broadcasting
problem-solving behavior in pursuit of these goals; reacting       signals (video, sound) of the system to be controlled.
in a timely fashion. It is this behavior that allows us to refer   The Internet network (network without quality of service)
to the agent as intelligent. While being flexible problem          limits the quantity of information that can be transmitted
solvers in their own right, the power of agents is only fully      (bandwidth) and introduces delays which can make the
realised once multiple agents are combined and                     remote control difficult or impossible. The solution
communicating. This is referred to as a multi-agent system         proposed, through this work, to face the limitations of the
(MAS). As agents are equipped with different abilities and         Internet, is founded on the autonomy and the intelligence,
different goals, each agent has a distinct sphere of influence     based on multi-agents systems, granted to the mobile system
within the environment in which all the agents are situated.       in order to interact with its environment and to collaborate
These spheres of influence may overlap, defining a                 with the remote user. The need that consists in wanting to
fundamental relationship between agents. Further                   assign to the mobile system the maximum of autonomy and
relationships may be superimposed through the use of               intelligence brought us to examine in the detail the choice of
communication channels. A MAS, therefore, has all the              a remote control architecture [6].
basic properties of a complex system: autonomy,
asynchronicity, concurrency, reactivity and extensibility.
30                                                             (IJCNS) International Journal of Computer and Network Security,
                                                                                                          Vol. 2, No. 3, March 2010

4. Remote Control Architecture                                     The path planner generates the path using as input the goal,
                                                                   the mobile system localization and the global map of the
   3.4 Control architecture                                        environment.
Humans are sophisticated autonomous agents that are able           The reactive part of our architecture, based on couples of
to function in complex environments through a combination          agents perception / action, allows the mobile system to react
of reactive behavior and deliberative reasoning. Motivated         facing the unforeseen events (Figure 5).
by this observation, we propose a hybrid control
architecture, called EAAS [7] for EAS (Equipe Architecture
des Systèmes) Architecture for Autonomous System. Our
architecture combines a behavior-based reactive component
and a logic-based deliberative component. EAAS is useful in
advanced mobile systems that require or can benefit from
highly autonomous operation in unknown environment,
time-varying surroundings, such as in space robotics and
planetary exploration systems, where large distances and
communication infrastructure limitations render human
teleoperation exceedingly difficult.
The proposed generic architecture consists in associating a
deliberative approach for the high part and a reactive
approach for the low part. The deliberative part or
                                                                        Figure 5. Reactive Part of the EAAS Architecture
hierarchical agent allows decision-making and actions
planning thanks to the use of the agent selection of actions
(Figure 4). This last is composed of three levels: pilot,            3.5 Remote control software architecture
navigator and path planner.                                        A Software architecture has been defined to make remote
                                                                   control of mobile systems possible. Our software
                                                                   architecture is based on a set of independent agents running
                                                                   in parallel.
                                                                   On the left side of figure 6, the server side is represented. It
                                                                   is basically composed of three main agents: “Connection
                                                                   Manager” which manages the different connected clients
                                                                   according to a Control Algorithm. This one is chosen by the
                                                                   designer of the system depending on the application:
                                                                   master/slave, priority, timeout... The “Media” agent
                                                                   communicates with the camera in order to broadcast signals
                                                                   (video, images) of the mobile system in its environment.
                                                                   The “SMA EAAS” (EAS Architecture for Autonomous
                                                                   Systems) which represents our control architecture. EAAS
                                                                   architecture is a hybrid control architecture including a
             Figure 4. Actions Selection Agent                     deliberative part (Actions Selection Agent) and a reactive
                                                                   part. The reactive part is based on direct link between the
The pilot generates the setting points needed for action           sensors (Perception Agent) and the effectors (Action Agent).
agent, based on a trajectory provided as an input. This
trajectory is expressed in a different frame (e.g. Cartesian
frame) from that of the setting points. This trajectory
describes, in time, the position, kinematics and/or dynamic
parameters of the mobile system in its workspace. The pilot
function is to convert these trajectories into setting points to
be performed by the action agent. The navigator generates
the trajectories for the pilot based on data received from the
upper level. These input data are of a geometrical type, still
in a Cartesian frame, but not necessarily in the mobile
system frame. Moreover, these data do not integrate
dynamics or kinematics aspects; contrary to the trajectory,
there is not a strict definition of the velocity, the
acceleration or the force versus time. These input data are
called path – continuous or discontinuous – in cartesian             Figure 6. Remote control software architecture proposed
frame. The navigator must translate a path into a trajectory.
                                                              (IJCNS) International Journal of Computer and Network Security, 31
                                                                                                         Vol. 2, No. 3, March 2010

The right side of the figure represents the client side. Agents   standard Internet protocols. First, the communication is
are loaded in a web navigator. The “Remote Client”                based on the HTTP protocol, through a home page linking
corresponds to a graphical user interface which allows the        the applets used to move the mobile system. These applets
user to send orders to the mobile system and receive              are interpreted by the JVM of the browser. Then, the applets
information about the environment. “Sender” and                   downloaded on the client communicate with the application
“Receiver” agents are used to allow the communication             server through the TCP/IP protocol.
between the client and the server. “Pinger” and “Ponger”
agents are used to observe dynamically the network. If the
connexion is accepted, the “Connection Manager” will
inform the “Local Client” agent which achieves the
interface with the “SMA EAAS” to transmit orders
transmission to the mobile system.

5. Application
The mobile system used in our application is a Lego robot.
Lego Mindstorms [8] is a development kit for
manufacturing a robot using Lego blocks, and is gaining
widespread acceptance in the field of technical education.
By using a Mindstorm, a robot can be manufactured for
various purposes and functions. It is beginning to be
considered as a component of experimental equipment in
robotics research.
The Lego mobile robot (Figure 7) is powered by three
reversible motors coupled to wheels and equipped with four
sensors: sonar sensor, sound sensor, light sensor and touch
sensor. The data produced by these sensors are used by                               Figure 8. Web Interface
perception agent to build a global map of the Lego robot
environment’s. This global map, the goal and the Lego             The remote users can pass online tests of knowledge in
robot localisation are used by the actions selection agent to     order to follow a formation answering to their needs.
define a plan of actions to achieve its mission. The Lego         Different modules of formation (Cursus link) are available
robot is equipped with Bluetooth connection that permits the      on our web site, to know: remote control, multi-agents
communication with the application server and facilitates its     systems, systems architecture, control architecture and
displacement in the environment in order to reach its             autonomous mobile system. We have also set to the remote
objective.                                                        users a discussion forum within our application to
                                                                  interchange their ideas over the remote control subject.

                                                                  6. Conclusion
                                                                  In this paper, we have presented a Web-based remote
                                                                  control application so that Internet users, especially
                                                                  researchers and students, can control the mobile robot to
                                                                  explore a dynamic environment remotely from their home
                                                                  and share this unique robotic system with us. In the first
                                                                  part, an analysis of the existing control architectures and the
                                                                  approaches for their development has guided us to design a
                                                                  hybrid control architecture. It is called EAAS for EAS
                                                                  Architecture for Autonomous System. The proposed generic
               Figure 7. General Architecture                     architecture consists in associating a deliberative approach
                                                                  for the high level and a reactive approach for the low level.
The Web interface of our application is designed with the         The deliberative level allows decision-making and actions
intention of making the remote control easy for researchers       planning thanks to the use of the agent selection of actions.
and students in order to interact with the Lego mobile robot.     The reactive level, based on couples of agents perception /
A simple interface is designed to provide as much                 action, allows the mobile system to react facing the
information as possible for remote control. This user             unforeseen events. Then, the software implementation of our
interface consists of several Java Applets as shown in Figure     architecture was presented. It is achieved under the shape of
8. It can work on any web browser.                                a multi-agents system by reason of its autonomy,
The link between client(s) and server is based on two             intelligence, flexibility and the various possibilities of
32                                                                 (IJCNS) International Journal of Computer and Network Security,
                                                                                                              Vol. 2, No. 3, March 2010

evolution. In the second part, in order to validate the choice                               Adil Lebbat received his Degree in High
of our architecture, we presented one of applications                                        Education Deepened in Network & Telecom
                                                                                             in 2004 from the chouaib doukkali
achieved by the system architecture team of the ENSEM.
                                                                                             university, Eljadida, Morocco. In 2006 he
                                                                                             rejoined the system architecture team of the
                                                                                             ENSEM. Her main research is mainly about
References                                                                                   real time distributed platform based on
                                                                                             multi agents systems: Application based on
[1] P. Le parc, J. Vareille and L. Marce, “E-productique ou                                  the core Linux for products of
      contrôle et supervision distante de systèmes                     telecommunications.
      mécaniques sur l’Internet”, Journal européen des
      systèmes automatisés (JESA), Vol. 38, n° 5, pp. 525-
      558, 2004.
[2] C. Novales, G. Mourioux and G. Poisson, “A multi-                                      Hicham Medromi received the PhD in
      level architecture controlling robots from autonomy                                  engineering science from the Sophia
      to teleoperation”, First National Workshop on                                        Antipolis University in 1996, Nice, France.
                                                                                           He is responsible of the system
      Control Architectures of Robots. Montpellier. April
                                                                                           architecture team of the ENSEM Hassan II
      6,7 2006.                                                                            University, Casablanca, Morocco. His
[3] R. Alami, R. Chatila, S.Fleury, M.Ghallab and                                          actual main research interest concern
      F.Ingrand, “An architecture for autonomy. The                                        Control Architecture of Mobile Systems
      International Journal of Robotics Research”, Special                                 Based on Multi Agents Systems. Since
      Issue on Integrated Architectures for Robot Control                                  2003 he is a full professor for automatic
      and Programming, vol. 17, n° 4, pp. 315-337, 1998.                                   productic and computer sciences at the
[4] J. Ferber, “Multi-Agent Systems: An Introduction to                ENSEM, Hassan II University, Casablanca.
      Distributed Artificial Intelligence”, Addison Wesley
      Longman, Harlow, UK, 1999.                                                             Fatima Qrichi Aniba received an electrical
                                                                                             Engineer’s degree from the ENSAM in 2003
[5] A. Sayouti, F. Qrichi Aniba and H. Medromi, “Remote
                                                                                             Meknes, Morocco. In 2005 she got her
      Control Architecture over Internet Based on Multi                                      Degree in High Education Deepened in
      agents Systems”, International Review on Computers                                     automatic productic from the ENSEM,
      and Software (I.RE.CO.S), Vol 3, n° 6, pp. 666 –                                       Hassan II University, Casablanca, Morocco.
      671, November 2008.                                                                    In 2005 she rejoined the system architecture
[6] A. Sayouti, “Conception et Réalisation d’une                                             team of the ENSEM. Her main research is
      Architecture de Contrôle à Distance Via Internet à                                     mainly about Real Time Architecture Based
      Base des Systèmes Multi-Agents”, Phd. Thesis,                                          on Multi Agents Systems.
      ENSEM, Hassan II University 2009.
[7] A. Sayouti, H. Medromi, F. Qrichi Aniba, S. Benhadou
      and A. Echchahad, “Modeling Autonomous Mobile
      System with an Agent Oriented Approach”,
      International Journal of Computer Science and
      Network Security (IJCSNS), Vol 9, n° 9, pp. 316 –
      321,September 2009.
[8] LEGO Company, “Lego mindstorms official page”,
      http ://, 1997.

Authors Profile
                        Adil Sayouti received the PhD in
                        computer science from the ENSEM,
                        Hassan II University in July 2009,
                        Casablanca, Morocco. In the same year he
                        received the price of excellence of the best
                        sustained thesis in 2009. In 2003 he
                        obtained the Microsoft Certified Systems
                        Engineer (MCSE). In 2005 he joined the
                        system architecture team of the ENSEM,
                        Casablanca, Morocco. His actual main
research interests concern Remote Control over Internet Based on
Multi agents Systems.
                                                                (IJCNS) International Journal of Computer and Network Security, 33
                                                                                                           Vol. 2, No. 3, March 2010

            Resource Allocation in Wireless Networks
                                        Manish Varshney, 2Dr Yashpal Singh, 3Vidushi Gupta
                             Sr Lecturer Deptt of Computer Science & Engg, SRMSWCET Bareilly, India
                                     Reader Deptt of Computer Science & Engg BIET Jhansi, India
                               Lecturer Deptt of Computer Science & Engg, SRMSWCET Bareilly, India

Abstract: In this paper, we study about the resource allocation     same desired range (2) Spacial reuse: since transmission is
techniques in wireless network ,thus describing utility based       focused in a particular direction, the surrounding area in the
functions and various protocols using directional antenna .In       other directions can still be used by other nodes to
other words the stud is based on utility-based maximization for     communicate ,now coming back to the point of throughput
resource allocation. We consider two types of traffic, i.e., best   and fairness required in resource allocation .
effort and hard QoS, and develop some essential theorems for        “Throughput” and “fairness,” however, are conflicting
optimal wireless resource allocation. Directional antenna
                                                                    performance metrics. To maximize system throughput, the
technology provides the capability for considerable increase in
spatial reuse which is essential in the wireless medium. In this
                                                                    system will allocate more resource to the users in better
paper, a bandwidth reservation protocol for QoS routing in          channel conditions. This may cause radio resource
TDMA-based MANETs using directional antennas is presented.          monopolized by a small number of users, leading to
The routing algorithm allows a source node to reserve a path to     unfairness. On the other hand, to provide fairness to all
a particular destination with the needed bandwidth which is         users, the system tends to allocate more resource to the users
represented by the number of slots in the data phase of the         in worse channel conditions so as to compensate for their
TDMA frame. The performance of the proposed schemes is              shares. As a result, the system throughput may be degraded
evaluated via simulations. The results show that optimal            dramatically. The work in [6-7] show that the system can
wireless resource allocation is dependent on traffic types, total   behave either throughput-oriented” or “fairness oriented” by
available resource, and channel quality, rather than solely         adjusting certain parameters. However, they do not describe
dependent on the channel quality or traffic types as assumed in
                                                                    how to determine and justify the value of these parameters,
most existing work. Further optimizations to improve the
                                                                    leaving this trade-off unsolved.
efficiency and resource utilization of the network is provided.
                                                                    In this paper, we focus on basic techniques required for
Keywords: Utility-based maximization, wireless networks,            resource allocation in wireless networks .through the work
resource allocation, , Mobile ad hoc networks (MANETs), quality     we came to the basic two factors which are to be resolved ,
of service (QoS), routing, time division multiple access (TDMA).    1)the first factor relates “user satisfaction” for resource
                                                                    allocation to avoid such a “throughput-fairness” dilemma
                                                                    Since it is unlikely to fully satisfy the different demands of
                                                                    all users, we turn to maximize the total degree of user
1. Introduction                                                     satisfaction. The degree of user satisfaction with a given
RESOURCE allocation is an important research topic in               amount of resource can be described by the utility function
wireless networks [1-7]. In such networks, radio resource is        U(r), a non-decreasing function with respect to the given
limited, and the channel quality of each user may vary with         amount of resource r. The more the resource is allocated, the
time. Given channel conditions and total amount of                  more the user is satisfied. The marginal utility function
available resource, the system may allocate resource to users       defined by u(r) = dU(r) dr is the derivative of the utility
according to some performance metrics such as throughput            function U(r) with respect to the given amount of resource r.
and fairness [1], [2] or according to the types of traffic          The exact expression of a utility function may depend on
[3].but another foremost factor that is required in wireless        traffic types, and can be obtained by studying the behavior
network is spatial reuse of network. In order to                    and feeling of users. We leave the work of finding utility
communicate with another node in a particular location, a           functions to psychologists and economists, and focus on
node that is transmitting using an omnidirectional antenna          maximizing the total utility for a given set of utility
radiates its power equally in all directions. This prevents         functions. and 2) the second factor link to the directional
other nodes located in the area covered by the transmission         antennas There are different models that are presented in
from using the medium simultaneously. For this purpose              the literature for directional antennas [8].In this paper, the
directional antennas are used. Directional antennas allow a         multi-beam adaptive array (MBAA) system is used [1]. It is
transmitting node to focus its antenna in a particular              capable of forming multiple beams for simultaneous
direction. Similarly, a receiving node can focus its antenna        transmissions or receptions of different data messages.
in a particular direction, which leads to increased sensitivity     The rest of the paper is organized as follows. In Sec. II,
in that direction and significantly reducing multi-path             resource allocation in wireless networks through utility
effects and cochannel interference (CCI). This allows               functions are proposed and proved to be optimal under
directional antennas to accomplish two objectives: (1) Power        certain conditions while In Sec. III, resource allocation in
saving: a smaller amount of power can be used to cover the          wireless networks through directional antennas Finally, the
                                                                    paper is concluded in Sec. IV.
34                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

                                                                  2.1.1 Problem Statement and Definitions
2. Resource Allocation In Wireless Networks                       Suppose that there are n users served by a base station. Let
   Through Utility Functions                                      rtotal denote the total amount of radio resource available at
                                                                  the base station, and r i, the amount of resource to be
                                                                  allocated to user i. Users with the same kind of traffic may
In [4], a utility-based power control scheme with respect to      not feel the same way by given the same amount of resource
channel quality is proposed. In that scheme, users with           because the wireless channel quality for each user may not
higher SIR values have higher utilities, and thus are more        be identical. Let denote the channel quality 2 of user i, 0 ≤
likely to transmit packets. Therefore, the wireless medium            ≤ 1, and i = 1, 2, · · ·n. The smaller the value of the
can be better utilized and the transmission power can be          worse the channel quality. Given an amount of resource r i
conserved, which can adapt to channel conditions and              and channel quality qi, the amount of resource actually
guarantee the minimum utility requested by each user. In          beneficial to user i is given by θ i = · qi . Let T (i) denote the
[8-9], the authors design a utility-based fair allocation         type of traffic of user i. The utility function of user I is
scheme to ensure the same utility value for each user.            expressed by                         where        (.) is the utility
However, letting users with different traffic demands to          function of traffic T (i) and Ui(.) is the utility function for
achieve an identical level of satisfaction may not be an          the type of traffic described by UT(i)(.) but taking into
efficient way of using wireless resource. Worse, traffic          account the channel quality of user i. The marginal utility
which is difficult to be satisfied tends to consume most of
the system resource leading to another kind of unfairness. In     function of Ui(.) is                                    and that of

                                                                                                            and ∀ ≥ 0. An
[5], a utility-based scheduler together with a Forward Error            (.) is         (.). Our objective is to maximize
Correction (FEC) and an ARQ scheme is proposed. That                          subject to
work gives lagging users more resource and thus results in a      optimal allocation for n users with total available resource
similar performance level (i.e., fixed utility value) for each         is defined as follows. Note that the optimal allocation
user. The work in [13-14] targets at multi-hop wireless           may not be unique in the system.
networks Utility functions have also been widely used in
Internet pricing and congestion control [6]. The typical
approach is to set a price to radio resource and to allocate
tokens to users. The objective is then to maximize the
“social welfare” through a bidding process. These kinds of
bidding schemes, while useful for Internet pricing and
congestion control, may not be practical for wireless
networks. In wireless environments, the types of traffic, the
number of users, and channel conditions are all time-
                                                                  Figure 1. The utility functions of two types of traffic
varying. It would-be very expensive to implement a wireless
                                                                      • Definition 2.1: A resource allocation R+ = {r 1 ,r 2
bidding process because the users would have to keep
                                                                       ,∙∙∙,r n } for n users is an optimal allocation if for all
exchanging control messages for real-time bidding, and the
                                                                       feasible allocations Ra= {r ’1,r ’2 ,∙∙∙,r ’n},U(R+ ) ≥
control protocols of the wireless system would also have to
                                                                       U(Ra ),where       U(R+ ) =                      and U(Ra )=
be modified to accommodate this process. Finally, the
complexity and efficiency of wireless bidding have not been                          .
analyzed. It is hard to estimate the time elapsed to achieve          • Definition 2.2: R = {r 1, r 2 ,∙∙∙, r n } is a full allocation
the Nash equilibrium. We consider two common types of                  if
traffic: hard QoS and best effort traffic, and propose three
allocation algorithms1 for these two types of traffic, namely,    2.1.2 HQ Allocation for Hard QoS Traffic
1) the HQ allocation for hard-QoS traffic, 2) the elastic         Suppose that there are n users in the queue, all with hard
allocation for best effort traffic, and 3) the mixed allocation   QoS traffic. Let               denote the residual resource in the
for the co-existence of both types of traffic. These three        system. The resource allocation algorithm designed for users
allocation schemes are all polynomial time solutions and          whose utility functions are all unit-step functions is referred
proved to be optimal under certain conditions, and in any         to as the HQ allocation and the output is denoted by RHQ =
case, the difference between the total utilities obtained by      {r 1, r 2 ,∙∙∙, r n }. Given the total available resource in the
our solutions and the optimal utility are bounded. The            system               , the channel quality and utility function
performance of the proposed schemes is validated via                      (.) for all users i, RHQ can be obtained as follows.
simulations. The results show that optimal wireless resource      1) Initialize ← 0, i = 1, 2, · · · , n;          ←
allocation depends on the traffic demand, total available
                                                                  2) Sort all users i in the queue in descending order of
resource, and wireless channel quality, rather than solely
dependent on channel quality or traffic type as assumed in        .
most existing work.                                               3) Repeat Steps (4) and (5) until the queue becomes empty.
                                                                  4) Pop out user i who is now at the head of the queue.
2.1 Resource Allocation Using Hard Qos, Best, And                 5) If         >        , then    =      , ;         =           −
Mixed Traffic In Wireless Network Through Utility
Based Functions                                                     .
                                                                       (IJCNS) International Journal of Computer and Network Security, 35
                                                                                                                  Vol. 2, No. 3, March 2010

The utility function for user i with hard QoS traffic is                   4) If the queue is not empty, then pop out the QoS user i at
described by                                     where                     the head of the queue; else go to Step (8).
is a unit-step function, is the channel quality of this user,              5) For the popped user i: if         ≥   ,   then   =      ;else
Mi is the kind of QoS traffic,    is the preferred amount of
                                                                             = 0; go to Step (4).
resource to be allocated.
                                                                           6) Δ =         −                 .
                                                                           7) If (Δ > 0), then         =     − ; go to Step (4); else
                                                                           = 0; go to Step (8);
                                                                           8) If    ( ) < (0), then =              ( ));else = 0.
                                                                           The allocation rule of this mixed allocation is to: 1) allocate
                                                                           resource to the first k QoS users at the sorted queue, and 2)
                                                                           then allocate the residual bandwidth (i.e.,       −        ) to
                                                                           all best effort users based on the elastic allocation. The
                                                                           value of k is determined based on the requirement that there
                                                                           is sufficient resource for this QoS user and the utility gain
Figure 2. Allocation ordering of k users in the HQ                         ΔUk is positive (i.e.,    − > 0) .
                                                                           2.2 Resource Allocation Using Directional Antennas
2.1.3 . Elastic Allocation for Best Effort Traffic                         Medium Access Protocols (MAC) protocols for directional
We next consider the best effort traffic. The resource                     antenna systems can be classified into two categories: on
allocation algorithm for users with concave utility functions              demand and scheduled. In the on-demand scheme nodes
        is referred to as the elastic allocation and the output is         must exchange short signals to establish a communication
denoted by                  = {r 1, r 2 ,∙∙∙, r n }. Given the total       session.
available resource              , the channel quality qi and
marginal utility function              for each user i,            can
be obtained as follows.
1) For each user i, derive               , the inverted function of
2) Derive             , by summing up                , over all users i,
i.e,          =             .
3) Find          , the inverted function of             .
4) Find        , which is equal to               ).
5) For all , i = 1, 2, · · · , n,if                 < (0), then =
            ; else = 0.
                                                                           Figure 3. An example of mixed allocation
The allocation rule of this scheme is to 1) derive the
aggregated utility function from the inverse functions of all              Data message transmission is done using the
users, 2) calculate the allocated marginal utility from the                omnidirectional mode, and reception is done using the
aggregated utility function, and 3) determine                 for each     directional mode. Directional antennas are used to transmit
user.                                                                      request-to-send (RTS) and receive clear-to-send (CTS)
                                                                           signals while the receiver antenna remains in the
2.1.4 Mixture of Hard QoS and Best Effort Traffic                          omnidirectional mode during this exchange. In [13],
Finally, we consider the co-existence of QoS and best effort               communicating pairs are set up using the multi-beam
traffic in the system, which is referred to as mixed                       forming ability of directional antennas. through cashing of
allocation and the output of which is denoted by               = {r 1 ,    the angle of arrival (AoA), Takai [14] avoided the use of the
r 2 , ∙∙∙ , r n }.                                                         omnidirectional mode, which is only used when the AoA
Let            denote the amount of residual resource to be given to       information is not available.
best effort traffic, and ΔUi, the utility gain by allocating
resource to QoS user i. Other notations remain the same as
in the HQ and the elastic allocations. Given the total
available resource              , the channel quality            and
marginal utility function              for each user i,      can be
obtained as follows.
1) Initialize ri ← 0, i = 1, 2, · · · , n ; and     ←        .             Figure 4 . (a) Transmission pattern of an omnidirectional
2) Sort all QoS users i in descending order of                   , and     antenna. (b) Transmission pattern of a directional antenna.
store them in the queue.
                                                                           2.2.1 Directional Antenna System Assumptions And
3) For each best effort user j, derive        from                 ;
Find          by summing up            over all users j;                   In this paper, it is assumed that each node in the network is
Find       , the inverted function of        .                             equipped with an MBAA-antenna system. Each antenna is
                                                                           capable of transmitting or receiving using any one of k
36                                                           (IJCNS) International Journal of Computer and Network Security,
                                                                                                        Vol. 2, No. 3, March 2010

beams which can be directed towards the node with which          directional antenna systems. Each node keeps track of the
communication is desired. In order for node x to transmit to     slot status information of its 1-hop and 2-hop neighbors.
a node y, node x directs one of its k antennas to transmit in    This is necessary in order to allocate slots in a way that does
the direction of node y, and node y in turn directs one of its   not violate the slot allocation conditions imposed by the
k antennas to receive from the direction of node x.              nature of the wireless medium and to take the hidden and
Radio signals transmitted by omnidirectional antennas            exposed terminal problems into consideration.
propagate equally in all directions. On the other hand,
directional antennas install multiple antenna elements so        2.2.3 Slot Allocation Conditions For Directional
that individual omnidirectional RF radiations from these         Antennas
antenna elements interfere with each other in a constructive     A time slot t is considered free to be allocated to send data
or destructive manner.                                           from a node x to a node y if the following conditions are
                                                                 1) Slot t is not scheduled to receive in node x or scheduled to
                                                                 send in node y, by any of the antennas of either node (i.e.
                                                                 antennas of x must not be scheduled to receive and antennas
                                                                 of y must not be scheduled to transmit, in slot t).
                                                                 2) Slot t is not scheduled for receiving in any node z, that is
                                                                 a 1-hop neighbor of x, from node x where y and z are not in
                                                                 the same angular direction with respect to x (i.e.       ∩
Figure 5. Transmission pattern of an MBAA antenna                ≠ ).
system with k=4 beams. Each of the k beams can be oriented       3) Slot t is not scheduled for receiving in node y from any
in a different desired direction. The figure shows: (a) Beams    node z, that is a 1-hop neighbor of x, where x and z are in
in transmission mode. (b) Beams in reception mode.               the same angular direction with respect to y (i.e.     ∩      ≠
This causes the signal strength to increase in one or multiple   4) Slot t is not scheduled for communication (receiving or
directions. The increase of the signal strength in a desired     transmitting) between two nodes z and w, that are 1-hop
direction and the lack of it in other directions are modeled     neighbors of x, where w and y are in the same angular
as a lobe. The angle of the directions, relative to the center   direction with respect to z (i.e.    ∩      ≠ ), and x and z
of the antenna pattern, where the radiated power drops to        are in the same angular direction with respect to w (i.e.
one-half the maximum value of the lobe is defined as the         ∩       ≠ ).
antenna beamwidth, denoted by β [9]. With the                    In Figure6, which illustrates allocation rule 2, node x cannot
advancement of silicon and DSP technologies, DSP modules         transmit to node y using slot t, because it is already using
in directional antenna systems can form several antenna          slot t to transmit to node z, which is in the same angular
patterns in different desired directions (for transmission or    direction as node y. In Figure7, which illustrates allocation
reception) simultaneously.        Figure 4(a) shows the          rule 3, node x cannot allocate slot t for sending to node y
transmission patterns of an omnidirectional antenna. Figure      because slot t is already scheduled for sending from node z,
4(b) shows the transmission pattern of a directional antenna     that is a 1-hop neighbor of x, and       ∩      ≠ . In Figure
.In this paper, it is assumed that an MBAA antenna system        9, which illustrates allocation rule 4, slot t cannot be
is capable of detecting the precise angular position of a        allocated to send from x to y because it is already scheduled
single source for locating and tracking neighbor nodes.          for communication between two nodes z and w, that are 1-
Figure 5 shows a node equipped with an MBAA antenna              hop neighbors of x, where        ∩      ≠ and        ∩    ≠
array with k=4 beams. Each of the k beams is able to be          . When a node S wants to send data to a node D, with a
oriented in a different desired direction. Figure 5(a) shows     bandwidth requirement of b slots, it initiates the QoS path
the antenna array in the transmission mode, and Figure 5(b)      discovery process
shows the antenna array in the reception mode.

2.2.2 Protocols For Directional Antennas
The networking environment that is assumed in this paper is
TDMA where a single channel is used to communicate                Figure 6. Illustration of allocation rule 2.
between nodes. The TDMA frame is composed of a control
phase and a data phase [17]. Each node in the network has a
designated control time slot, which it uses to transmit its
control information. However, the different nodes in the         Figure 7. Illustration of allocation rule 3.
network must compete for the use of the data time slots in
the data phase of the frame. In this section, the slot
allocation rules for the TDMA directional antenna
environment are presented. The hidden and exposed
terminal problems make each node’s allocation of slots           Figure 8. Illustration of allocation rule 4.
dependent on its 1-hop and 2-hop neighbor’s current use of
                                                                 2.2.4 The Qos Path Reservation Algorithm
that slot. The model used in this protocol is similar to that
used in [11] and [12], but includes modifications to support
                                                                  (IJCNS) International Journal of Computer and Network Security, 37
                                                                                                             Vol. 2, No. 3, March 2010

 Node S determines if enough slots are available to send              the schemes proposed in [18-19] are the examples of the
from itself to at least one of its 1-hop neighbors. If that is        ”fairness” scheme (i.e., α = − 1), and the GR+ scheme in [9]
the case, it broadcasts a QREQ(S, D, id, b, x, PATH, NH) to           is an example of the ”throughput” scheme. Fig. 8(a)
all of its neighbors. The message contains the following              compares the proposed HQ allocation with different
fields:                                                               allocation schemes, and Fig. 9(b) compares the proposed
• S, D and id: IDs of the source, destination and the session.        elastic allocation with different allocation schemes. Note
The (S,D, id) triple is therefore unique for every QREQ               that the axis of       in Fig. 9(b) is in the logarithmic scale.
message and is used to prevent looping.                               Theresults show that the ”throughput-first” scheme has a
• b: Number of slots required.                                        higher total utility when          is small, but the ”fixed”
• x: The node ID of the host forwarding this message.                 allocation one is closer to the proposed scheme as
• PATH: A list of the form ((                                 ). It         increases. Finally, when          becomes very large, the
contains the accumulated list of hosts and time slots, which          ”fairness-first” scheme can achieve the highest utility. In
have been allocated by this QREQ message so far?           is the     order to verify, and analyze the performance of the
ith host in the path, and is the list of slots used by           to   directional antennas (protocols presented in paper),
send to        . Each of the elements of       contains the slot      simulation      experiments     were      conducted.    Several
number that would be used, along with the corresponding               performance measures were computed as the traffic rate
the set of angular groups,             , which represents the         (messages/second) is varied. The measured parameters are
direction in which the sending antenna of host i must be              the overall percentage of packets received successfully, the
pointed, during that slot, to send data to host i + 1.                average number of requests per successful acquisition of
• NH: A list of the form ((                             ). It         QoS path , The average number of requests per session, and
contains the next hop information. If node x is forwarding            the average QoS path acquisition time
this QREQ message, then NH contains a list of the next hop
host candidates. The couple              is the ID of the host,
which can be a next hop in the path, along with a list of the
slots, which can be used to send data from x to            is a
list of the slots to be used to send from host i to host i+1
along with the angular group for each slot.       has the same
format as in PATH.

3. Performance Analysis

In this paper we have gone through two methods of resource
allocation i.e resource allocation through utility functions
and the other using directional antennas. Now since both
methods are for resource allocation it is necessary to
analyze the performance of both the above given methods,
analyzing them leads to the comparison of the the resource
allocation method . In this section, we conduct simulations
to evaluate the performance of our allocation algorithms.                                           (b)
firstly analyzing resource allocation in wireless network             Figure 9. Utility comparison with different resource
through utility function. So we consider QoS traffic, best            allocation schemes a)Qos traffic b)best effort traffic
effort traffic, and the con-existence of both. The simulation
parameters are described as follows. For QoS traffic, the              Simulation results clearly demonstrate the increased
utility function is a unit-step function with        = 10 and UM      efficiency and performance of the network as the number of
= 1, i.e., UQoS(r) = fu(r − 10); for best effort traffic, UBE(r) =    directional antennas increases. As was indicated earlier, this
1 − er/10. The value of qi is randomly generated by a uniform         increased performance is due to the considerable increase in
distribution over [0, 1]. We then measure the distributions           spatial reuse and the ability for each node to simultaneously
of and θ i under different values of           .                      send or receive data in different directions. This functionally
In Fig. 9, different resource allocation schemes are                  increases the effective number data slots by a multiple of the
compared with the proposed allocation schemes. The                    number of antennas (or directions) used. This effect
comparison is based on the scheme proposed in [10], which             significantly improves performance. As the data shows, the
allocates radio resource proportionally based on factor               increase in performance, or speed-up factor, when the
Depending on the setting of the value α, the system can be            number of antenna is increased by a factor of 2 (i.e. doubled
tuned to work with different performance metrics. The curve           from 1 to 2, and then from 2 to 4) is significant (speed up
denoted ”throughput” is for α = 1, which gives more                   factor > 1).As expected, however, it still below a theoretical
resources to the users in better channel conditions, thereby          speed-up factor of 2. For the first set of experiments for
leading to a larger system throughput. The curve denoted              example, the data shows that that ratio of the overall
”fairness” is for α = − 1, giving all users an identical value        average percentage (average for all data traffic rates) of
of θi = · qi. The curve denoted ”fixed” is for α = 0, which           successful packets of the two-antenna case to the one-
provides the same amount of resource to all users. Note that          antenna case is 1.61, which is > 1 and < 2. The ratio for the
38                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

four-antenna case to the two antenna case is 1.84, which is       paths due to the extended range of directional antennas
also > 1 and < 2, and the ratio for the four-antenna case to      using the same total transmission power compared to the
the one-antenna case is 2.95 which are < 4. This is to be         omnidirectional case. In turn this results in reduced end-to-
expected from the theory of parallel and distributed systems      end delay. The simulation results clearly show a significant
because the actual speed-up factor is always below the ratio      gain in performance with an increase in the number of
of the number of parallel units, or antennas.                     successfully received packets, as well as a decrease in the
                                                                  QoS path acquisition time. However, as expected, this gain
                                                                  in performance is still below the theoretical speed-up factor.
4. Conclusion                                                     In the future, we intend to improve this protocol through the
                                                                  employment of additional optimization techniques. T
                                                                  his leads us to conclude that existing channel-dependent-
In this paper, we study about two basic method of allocating      only resource schemes and schedulers cannot provide
resources in wireless networks the first one Data message         optimal allocation in wireless networks. So In addition, we
length:100MB was utility-based maximization for resource          intend to perform more simulations in order to further study,
allocation in infrastructure-based wireless networks.             analyze and improve the performance of the protocol under
                                                                  different network environments including different mobility
                                                                  rates, and traffic conditions.

                                                                  [1] D.Angelini and M. Zorzi, “On the throughput and
                                                                       fairness      performance of heterogeneous downlink
                                                                       packet traffic in a locally centralized CDMA/TDD
                                                                       system,” in Proc. IEEE VTC-Fall 2002.
                              (a)                                 [2] Furuskar et al., “Performance of WCDMA high speed
                                                                       Packet data,” in Proc. IEEE VTC 2002-Spring.
                                                                  [3] Y. Cao, V. O. K. Li, and Z. Cao, “Scheduling delay-
                                                                       sensitive and besteffort traffic in wireless networks,”
                                                                       in Proc. IEEE ICC 2003.
                                                                  [4] M. Xiao, N. B. Shroff, and E. K. P. Chong, “A utility-
                                                                       based power control scheme in wireless cellular
                                                                       systems,” IEEE/ACM Trans. Netw., vol. 11, no. 2,
                              (b)                                 [5] X. Gao, T. Nandagopal, and V. Bharghavan,
               Figure 10. Simulation results.                          “Achieving application level fairness through utility-
                                                                       based wireless fair scheduling,” in Proc. IEEE
  In this we develop some essential theorems for utility-              Globecom 2001.
based resource management. Then, three polynomial time            [6] F. P. Kelly, “Charging and rate control for elastic
resource allocation algorithms are proposed for two types of           traffic,” European Trans. Telecommun., Jan. 1997.
utility functions. We prove that, in any case, the difference     [7] V. A. Siris, B. Briscoe, and D. Songhurst, “Economic
between the total utilities obtained by our proposed                   models for resource control in wireless networks,” in
solutions and the optimal utility is bounded, and under                Proc. IEEE PIMRC 2002, Lisbon, Portugal, Sept. 2002.
certain conditions, all these three schemes can achieve the       [8] L. Chen, S. H. Low, and J. C. Doyle, “Joint congestion
maximum total utility (i.e., optimal). From the simulation             control and media access control design for wireless ad
results, we find that different types of traffic require               hoc networks,” in Proc. IEEE Infocom, Miami, FL,
different kinds of schemes to achieve optimal allocation. In           March 2005.
addition, when         is small, the system tends to allocate     [9] L. Bao and J. J. Garcia-Luna-Aceves. Transmission
more resources to the users in better channel conditions, i.e.,        scheduling in ad hoc networks with directional
”throughput-oriented;” however, when         is abundant, the          antennas. Proc. of the 8th annual international
system becomes ”fairness-oriented,” meaning that even with             conference on mobile computing and networking, pages
the same traffic, the preference tendency between                      48–58, September 2002.
throughput and fairness can still differ. The second one was      [10] Q. Dai and J. Wu. Construction of power efficient
a protocol for TDMA-based bandwidth reservation for QoS                routing tree for adhoc wireless networks using
routing in MANETs using directional antennas The protocol              directional antenna. Distributed Computing Systems
takes advantage of the significant increase in spacial reuse           Workshops. Proceedings. 24th International
provided by the directional antenna environment, which                 Conference on, pages 718–722, March 2004.
drastically increases the efficiency of communication in          [11]       Jawhar and J. Wu. A race-free bandwidth
MANETs. This is due to the reduction in signal                         reservation     protocol for QoS routing in mobile ad
interference, and the amount of power necessary to establish           hoc networks. Proc. of the 37th Annual Hawaii
and maintain communication sessions. Additionally, this                International Conference on System Sciences
protocol provides for a relatively smaller hop count for QoS           (HICSS’04), IEEE Computer Society, 9, January 2004.
                                                                  (IJCNS) International Journal of Computer and Network Security, 39
                                                                                                             Vol. 2, No. 3, March 2010

[12] W.-H. Liao, Y.-C. Tseng, and K.-P. Shih. A TDMA-                  Algorithms, Compiler Design books for the technical students of
     based bandwidth reservation protocol for QoS routing              graduation and postgraduation.He has published various research
     in a wireless mobile ad hoc network. Communications,              papers in National and International journals. He has also
     ICC 2002. IEEE International Conference on,                       attended one faculty development program organized by Oracle
                                                                       Mumbai on Introduction to Oracle 9i SQL and DBA
     5:3186–3190, 2002.
[13] S.; You J.; Hiromoto R.E.; Nasipuri, A.; Ye. A MAC
     protocol for mobile ad hoc networks using directional                             Vidushi Gupta received her (C.S)
     antennas. Wireless Communications and Networking                                  degree from Uttar Pradesh Technical
     Conference, 2000. WCNC. 2000 IEEE, 3(23-28):1214–                                 University, Lucknow.She is also pursuing
     1219, September 2000.                                                    from Karnataka University, She is
[14] M. Takai, J. Martin, and R. Bagrodia. Directional                                 working as Lecturer ( CS/IT department) in
     virtual carrier sensing for directional antennas in                               SRMSWCET, and Bareilly She has also
     mobile ad hoc networks. In Proc. ACM International                attended one faculty development program based on the
                                                                       “Research Methodologies”.
     Symposium on Mobile Ad Hoc Networking and
     Computing (MOBIHOC), Lausanne, Switzerland, June
[15] J. Ward and R.T.Jr. Compton. High throughput slotted
     aloha packet radio networks with adaptive arrays.
     Communications, IEEE Transactions on, 41(3):460–
     470, March 1993.
[16] J. Zander. Slotted aloha multihop packet radio networks
     with directional antennas. Electronics Letters,
     26(25):2098–2100, December 1990.
[17] C. R. Lin and J.-S. Liu. QoS routing in ad hoc wireless
     networks. IEEE Journal on selected areas in
     communications, 17(8):1426–1438, August 1999.
[18] Jawhar and J. Wu. Qos support in TDMA-based mobile
     ad hoc networks. The Journal of Computer Science and
     Technology (JCST), Springer, 20(6):797–810,
     November 2005.
[19] Jawhar and J. Wu. Race-free resource allocation for
     QoS support in wireless networks. Ad Hoc and Sensor
     Wireless Networks: An International Journal, 1(3):179–
     206, May 2005

Authors Profile
                   Dr. Yahpal Singh is a Reader and HOD (CS)
                   in BIET, Jhansi (U.P.). He obtained Ph.D.
                   degree    in     Computer      Science from
                   Bundelkhand University, Jhansi. He has
                   experience of teaching in various courses at
                   undergraduate and postgraduate level since
                   1999. His areas of interest are Computer
                   Network, OOPS, DBMS. He has authored
 many popular books of Computer Science for graduate and
 postgraduate level. He has attended many national and
 international repute seminars and conferences. He has also
 authored many research papers of international repute.

                     Manish Varshney received his M.Sc (C.S)
                    degree from Dr. B.R.A. University, Agra,
                    M.Tech. (IT) from Allahabad University and
                    Pursuing PhD in Computer Science. He is
                    working as a HOD (CS/IT) in SRMSWCET
                    Bareilly. He has been teaching various
                    subjects of computer science for more than
                    half a decade. He is known for his skills at
 bringing advanced computer topics down to the novice's level. He
 has experience of industry as well as teaching various courses. He
 has authored various popular books such as Data Structure,
 Database Management System, Design and Implementation of
40                                                               (IJCNS) International Journal of Computer and Network Security,
                                                                                                            Vol. 2, No. 3, March 2010

   Comparative Analysis of Wireless MAC Protocol
  for Collision Detection and Collision Avoidance in
               Mobile Ad Hoc Networks
                                              D.Sivaganesan1, Dr.R.Venkatesan2
                                         Department of Computer Science and Engineering,
                                 Karpagam College of Engineering, Coimbatore-32, TamilNadu, India.
                                                  Department of Information Technology.
                                        PSG College of Technology, Coimbatore, TamilNadu, India.

                                                                     collision detection requires a node to transmit and listen at
Abstract:    Packet collisions at the Medium Access Control
(MAC) layer in distributed wireless networks use a combination       the same time for terminating a possible collision. Although
of carrier sensing and collision avoidance. When the collision       CSMA/CD have been proven to be very successful in wired
avoidance strategy fails, such schemes cannot detect collisions      LANs, it cannot be directly employed in wireless networks
and corrupted data frames are still transmitted in their entirety,   because of two problems [21]. The first is the hidden
thereby wasting the channel bandwidth and significantly              terminal problem [3]. Two mutually hidden terminals are
reducing the network throughput. To address this problem, this       two nodes that cannot sense each other (due to the distance
paper compares the wireless MAC protocol CSMA, MACA and
                                                                     or obstacles between them) but can still interfere with each
IEEE802.11 capable of collision detection and collision
avoidance. The performance of the MAC protocol has been              other at a receiver. With hidden terminals, carrier sense
investigated using extensive analysis and simulations. Our           alone cannot effectively avoid collisions. The other problem
results shows that as compared with CSMA, MACA MAC                   for CSMA/ CD in wireless networks is that, in the same
protocols, the protocol IEEE802.11 has significant performance       wireless channel, the outgoing signal can easily overwhelm
gains in terms of node throughput and reduce the network             the incoming signal due to high signal attenuation in
                                                                     wireless channels. This problem makes it difficult for a
  Keywords: MAC, collision detection, collision avoidance,           sender to directly detect collisions in a wireless channel.
CSMA, CSMA/CD, MACA.                                                 Some existing MAC protocols [5],[6],[7],[8] depend on in-
                                                                     band control frames for exploring the possible future
1. Introduction                                                      channel condition for a data frame and also for reserving the
Distributed Medium Access Control (MAC) protocols such               medium for the data frame. However, when the collision
as the IEEE 802.11 Distributed Coordination function                 avoidance strategy fails, a corrupted data frame is still fully
(DCF) are widely used in computer networks to allow users            transmitted. Another category of protocols [3],[9],[10]uses
to statistically share a common channel for their data               one or more out-of-hand control channels to avoid
transmissions. In wireless networks, a critical drawback of          collisions, These protocols are more effective in dealing
distributed MAC protocols is the inability of nodes to detect        with hidden terminals and thus, reduce the probability of
collisions while they are transmitting. As a result,                 collisions in a network. However, they are incapable of
bandwidth is wasted in transmitting corrupted packets, and           detecting collisions either, and if the collision prevention
the achieved throughput degrades. This situation is                  strategies of these protocols fail, then the collided data
exacerbated as the number of nodes in the network                    frames are still transmitted in their entirety.
increases, since, now, the rate of collisions increases. To
address this issue, this paper presents MAC protocol capable         2. Carrier Sensing and Collision Avoidance
of detecting collisions in wireless networks which                   The most widely used mechanism to avoid collisions in the
outperforms existing MAC protocols. The Aloha protocol               contention-based MAC is probably ‘‘carrier sensing” [11].
[1] was the first MAC protocol proposed for packet radio             Which is used in both wired and wireless networks? The
networks. With pure Aloha, a node sends out a packet                 drawbacks associated with this mechanism that motivates
immediately upon its arrival at the MAC sub layer and a              the development of a scheme with collision detection. With
collided packet is retransmitted with a probability P                carrier sensing, a node listens before it transmits. If the
immediately or after each packet transmission time. Carrier          medium is busy, then the node defers its transmission. After
Sense Multiple Access with Collision Detection                       the medium has been sensed idle for a specified amount of
(CSMA/CD) [2] employs two mechanisms to enhance the                  time, the node usually takes a random back off before
medium utilization in aired local area networks                      transmitting its frame. The random back off is for avoiding
(LANs):“carrier sense” and “collision detection.” Carrier            collisions with other nodes that are also contending for the
sense requires a node to listen before transmitting and              medium. Besides the “physical” carrier sensing technique
                                                               (IJCNS) International Journal of Computer and Network Security, 41
                                                                                                          Vol. 2, No. 3, March 2010

introduced above, the IEEE 802.11 DCF and MACA                     3. Spectrum Reuse                 and       the     Capture
(Multiple Access Collision Avoidance) also employs a                  Phenomenon
technique called “virtual” carrier sensing. The virtual
carrier sense technique relies on in-band control frames to        The radio spectrum needs to be spatially reused in multihop
deal with hidden terminals. Before sending a data frame in         wireless network for improving network through-put. Better
to the idle medium after proper deferrals and back offs, a         spectrum reuse allows more transmissions to go on
source sends out a Request to Send (RTS) frame to contact          simultaneously in the network without collisions. A
the receiver and reserve the medium a round the source, If         phenomenon closely related to spectrum reuse is “capture”
the receiver receives the RTS frame and its channel is             which implies that, when two frames collide at a receiver in
determined to be clear, the receiver sends out a Clear to          a wireless network, one of the frames may still be correctly
Send (CTS) frame to respond to the sender and reserve the          decoded if the received power of the frame is higher than
medium too. The data transmission then begins if the               that of the other by a threshold. However, as we now show
handshake and medium reservation process succeeds.                 the capture effect is not sufficient to eliminate collisions and
Several situations may cause difficulties to the virtual carrier   collision detection is required to prevent bandwidth wastage
sensing technique. One of them is the ‘chained’ hidden             on corrupted frames. To illustrate the possibility of
terminal phenomenon. Basically, in a data transaction in the       collisions in the presence of capture effect, two scenarios are
MAC layer, the CTS frame sent by a receiver to suppress the        shown in Figure. 2a and 2b (the nodes are in a line for easy
hidden terminals of the initiating sender may be lost at the       demonstration). In the case, nodes A and D are the initiating
receiver’s neighbors due to the receiver’s own hidden              senders, whereas nodes B and C are their receivers,
terminals. In such a case, some hidden terminals of the            respectively. In the second case, nodes B and C are the
initiating sender may not be suppressed. An example is             senders and nodes A and D are their receivers, respectively.
shown in Figure 1, where node A is the initiating sender           In these two cases, assuming same transmission power
and node B is the receiver, The CTS frame generated by             levels and ambient noise, captures for the data frames may
node B is corrupted at node C (a hidden terminal of node A)        easily happen at receivers because the senders are much
by the signals of node D, which is a hidden terminal of node       closer to their receivers than the interference sources.
B. Node mobility may also limit the effectiveness of the           However, for combating high link error rates,
virtual carrier sensing technique with a small probability.        acknowledgments for data frames are widely used in the
With virtual carrier sensing, only nodes that have receive         MAC sub layer of wireless networks. Therefore, interference
the medium reservation message know when to defer.                 may come not only from the initiating senders, but also from
Therefore, when a node newly moves into a neighborhood             their receivers. In both cases shown in Figure. 2b, the two
and misses the preceding reservation information, it               senders have to finish their transmissions almost at the same
becomes an unsuppressed hidden terminal to an ongoing              time for all the data and acknowledgment frames to be
data transaction, another phenomenon that may impact               received without collisions. For example, in case A shown
virtual carrier sensing is that the interference range of a        in Figure. 2a, if node A finishes its data transmission earlier
node can larger than its data transmission range[12].              than node D, then node B will send its acknowledgment
Therefore, even if a node is out of the range of another node      frame to node A while node C is still receiving the data
for successfully receiving its CTS frame, the node may still       frame from node D. A collision may therefore easily occur at
interfere with the other node’s data reception. A more             node C. Similarly, if node D finishes is transmission earlier,
effective way to suppress hidden terminals is to use an out-       then node B may easily have a collision. The same thing is
of-band control channel. With a single data channel, control       true for case B. The corrupted frame, however, be an
information cannot be delivered when the data frame is in          acknowledgment instead of a data frame. In reality, two
transmission. With an additional control channel, however,         nodes may not finish their transmissions the same time,
control signals can always be present whenever necessary,          since their frames may have different sizes and their
which improves the ability of hidden terminal suppression.         transmissions may begin at different times. Thus, collision
                                                                   detection is important in these cases to terminate the
                                                                   colliding transmissions.

            Figure 1. Hidden Terminal Problem

                                                                              Figure 2 a. Exposed Terminal Problem
42                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

                                                                  Once the node has finished transmitting the frame header in
                                                                  the data channel, it expects the intended receiver node B to
Case A                                                            have received the information and reply with a CTS pulse in
                                                                  the control channel. The CTS pulse is transmitted by node B
     A                                           B                during a pause in the pulses being sent by node A in the
                                                                  control channel. If a node A does not obtain the expected
                                                                  CTS pulse in the following pause period after the frame
                                                                  header is transmitted then node A aborts its transmission in
                                                                  both channels If node A obtains the expected CTS pulse.
     C                                           D                Then it keeps transmitting. Node A, however may still abort
Case B                                                            its transmissions after obtaining the expected CTS pulse if it
                                                                  detects a pulse of another node in one of its pulse pauses
                                                                  after, which indicates a colliding situation. If the node
         C                                     D                  aborts its transmissions due to the lack of the expected CTS
                                                                  pulse or the detection of a pulse of another node, then it
                                                                  doubles its contention window and then returns to monitor
                                                                  the control channel. After node A fully transmits the packet,
                                                                  it expects an acknowledgment from the receiver. If the node
     A                                         B
                                                                  does not obtain the expected acknowledgment, then it
                                                                  doubles its contention window and starts to monitor the
             Figure 2 b. Collision involving capture              control channel again to look for a retransmission
                                                                  opportunity. The whole process repeats until either node A
4. The MAC Protocol IEEE 802.11                                   obtains an acknowledgment for the packet or the retry limit
                                                                  is reached. The node discards the packet in the latter case
  3.6    IEEE 802.11-Carrier Sensing and Collision                and resets its contention window to the minimum size in
         Avoidance                                                both cases. The above description is for the case of a unicast
The MAC protocol in this paper assumes that each node has         packet. In the case of a broadcast packet, the proposed
the ability to simultaneously transmit on two channels, the       protocol uses the basic CSMA protocol as in the IEEE
control and data channels, with two antennas and, their           802.11 DCF. Figure 3. Shows the RTS / CTS dialogue.
associated communication circuitry. The control channel
has a much smaller bandwidth as compared to the data
channel and is used for transmitting medium reservation
related signals, whereas the data channel is for transmitting
the data and acknowledgments. Instead of relying on bit-
based frames, the control channel employs pulses to deliver
control information. The pulses in the control channel are
single-frequency waves with random length pauses. In the
proposed protocol, pulses only appear in the control channel
and the control channel only carries pulses. When a node is
an active sender or receiver in the data channel, it monitors
the control channel all times, except when it itself is
transmitting in the control channel. If a node is transmitting
in the data channel but detects a pulse in the control
channel, then it aborts its transmissions. To describe the
operation of the protocol, we consider what happens when
the MAC sub layer at a node say node A, receives a packet
to transmit to node B. Before node A can transmit, it first
listens to the control channel to make sure that it is idle. If
the control channel is found idle for a period of time longer
than the maximum pause duration of a pulse, then node A
starts a random back off timer whose value is drawn from
the node’s contention window. If the node detects no pulse
before its back off timer expires, then it proceeds to transmit
the packet upon the expiration of its back off timer.
Otherwise, the node cancels It’s back off timer and keeps
monitoring the control channel. As soon as the back off
timer of node A expires, it starts to transmit pulses in the
control channel a long with the packet in the data channel.
                                                              (IJCNS) International Journal of Computer and Network Security, 43
                                                                                                         Vol. 2, No. 3, March 2010

                                                                  therefore terminate their transmissions, and the collision is
                                                                  resolved automatically. If only one of the two receivers can
                                                                  correctly read the frame header, then the sender of the other
                                                                  receiver will, in general, abort its transmissions due to the
                                                                  lack of a legitimate CTS pulse. The collision on is therefore
                                                                  also resolved in such a case. If both receivers can correctly
                                                                  read the frame headers, then each will send back a CTS
                                                                  pulse with the length specified in the MAC headers of their
                                                                  respectively received data frames. If the two initiating
                                                                  senders do not d raw the same CTS length, then the sender
                                                                  that draws the shorter one may not receive a legitimate CTS
                                                                  pulse and thus abort its transmissions. If both senders
                                                                  receive legitimate CTS pulses, then one sender will usually
                                                                  still need to abort its transmissions (since their
                                                                  acknowledgment frames may be interfered with or ca use
                                                                  interference). The collision detection mechanism starts to
                                                                  work in such a case. With pauses of random lengths, lie
                                                                  pulses of the two senders will desynchronize each other over
                                                                  time. A collision is therefore resolved. The above
                                                                  description of collision detection is not restricted to two
                                                                  transmitting nodes that are neighbors. Therefore, two nodes
                                                                  that are hidden terminals to each other still detect each other
                                                                  if they transmit at the same time.

                                                                  5. Results
                                                                  The comparison of MAC protocols CSMA, MACA and
                                                                  IEEE 802.11 has been simulated using Network Simulator
                                                                  Glomosim 2.03. In our simulation each node always has
                                                                  packets to send, and the destination of each packet is
                                                                  randomly drawn among the neighbors of the node. The
     Figure 3. RTS / CTS dialogue IEEE 802.11 MAC                 results for three wireless MAC protocols in terms of
                     HANDSHAKE                                    collision rate and throughput. Figure 3 a, 3 b. Shows the
                                                                  collision rate and throughput simulation graph for CSMA.
   3.7 Collision Avoidance and Detection                          Figure 4 a, 4 b. Shows the collision rate and throughput
This section further explains how the proposed MAC                simulation graph for MACA. Figure 5 a, 5 b. Shows the
protocol achieves collision avoidance and collision               collision rate and throughput simulation graph for IEEE
detection. As in the CSMA case, the protocol considers it a       802.11.The      protocol  IEEE802.11     has    significant
potential colliding situation when a transmitting node            performance gains in terms of node throughput and reduce
detects another transmitting node. For collision avoidance,       the network collisions.
the proposed protocol uses handshake and medium
reservation procedures like those used by traditional wireless
MAC protocols. The difference is that, in the proposed
protocol, these procedures are moved to the control channel
where CTS pulses are used for handshaking and the pulse
relay is used for medium reservation. When the collision
mechanism comes into play and this is the essential
difference between the proposed protocol and other wireless
MAC protocols. To understand how the proposed protocol
resolves collisions, we consider the case where two
neighboring nodes cause collisions. If two neighboring
nodes draw the same back off delays at a contention point
for medium access, then they start to transmit signals in the
data and control channels almost at the same time. If both
receivers of the two senders cannot correctly read the frame
headers due to the resulting collision (that is, the address or
another field in the header does not have a legitimate value),
then neither will send back a CTS pulse. Both senders will                  Figure 3 a. CSMA – Nodes Vs Collision
44                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                         Vol. 2, No. 3, March 2010

     Figure 3 b. CSMA – Nodes Vs Throughput               Figure 5 a. IEEE 802.11 – Nodes Vs Collision

      Figure 4 a. MACA – Nodes Vs Collision

                                                       Figure 5 b. IEEE 802.11 – Nodes Vs Throughput

                                                 6. Conclusion
                                                 From the simulation result, we conclude that, a better
                                                 behavior is obtained when using CSMA instead of MACA
                                                 because of the RTS / CTS messages. The use of RTS packets
                                                 whenever a source has a data packet to send without first
                                                 sensing the channel, results in an increase in packet
                                                 collisions and hence decreased throughput. The collision
                                                 avoidance mechanism incorporated into IEEE 802.11 for the
                                                 transmission of RTS packets aids in the reduction of the
                                                 number      of collision    improves    the     throughput.
                                                 Consequently, more data packets reach their destination. We
                                                 conclude that, the MAC protocol IEEE802.11 has
     Figure 4 b. MACA – Nodes Vs Throughput      significant performance gains in terms of node throughput
                                                 and reduces the network collisions in Mobile Ad Hoc
                                                         (IJCNS) International Journal of Computer and Network Security, 45
                                                                                                    Vol. 2, No. 3, March 2010

References                                                   [15]   J.L. Sobrinho and AS. Krishnakumar, “Real-Time
                                                                    Traffic over the IEEE 802.11 Medium Access Control
[1]    N. Abramson, “The Aloha System- Another                      Layer, ‘ Bell Labs Technical I., pp. 172-187, 1996.
       Alternative for Computer Communications,” Proc.       [16]   X.Yang and N.H. Vaidya, “Priority Scheduling in
       AFIPS Fall Joint Computer Conf.., 1970.                      Wireless Ad Hoc Networks,” Proc. ACM MobiHoc,
[2]    P. Karn, “MACA—A New Channel Access Method                   June 2002.
       for Packet Radio,” Proc. Ninth ARRL Computer          [17]   S. Singh and C.S. Raghavendra, “PAMAS-Power
       Networking Conf, 1990.                                       Aware Multi-Access Protocol with Signaling for Ad
[3]    V. Bharghavan, A, Demers, S. Shenker, and L.                 Hoc Networks,” ACM SIG COMM Computer Comm.
       Zhang, “MACAW:A Medium Access Protocol for                   Rev.. pp. 5-26, 1998.
       Wireless LANs,” Proc. ACM Ann,Conf Applications,      [18]   J.P Monks, V. Bharghavan, and W.W. Hwu, “A
       Technologies, Architectures, and Protocols for               Power-Controlled Multiple Access Protocol for
       Computer Comm.(SIGCOMM ‘94), Aug. 1994.                      Wireless Packet Networks,” Proc. IEEE INFOCOM.
[4]     Z.J. Haas and J. Deng, “Dual Busy Tone Multiple             Apr. 2001.
        Access (DBTMA)-A Multiple Access Control             [19]   P.Jacquet, P.Minet, P.Muhlethaler, and N. Rivierre,
        Scheme for Ad Hoc Networks,” IEEE Trans. Comm.,             ‘‘Priority and Collision Detection with Active
        vol. 50, pp. 975-985, June 2002.                            Signaling — The Channel Access Mechanism of
[5]    CL. Fullmer and J.J. Garcia-Luna-Aceves, “Solutions          HIPERLAN,’’ Wireless Personal Comm., vol. 4, pp.
       to Hidden Terminal Problems in Wireless Networks,”           11-25, Jan. 1997.
       Proc. ACM Ann. Conf Applications, Technologies,       [20]   Y.Thy and K. Chua, “A Capacity Analysis for the
       Architectures, and Protocols for Computer Comm.              IEEE 802.11 MAC Protocol, Wireless Networks,
       (SIGCOMM ‘97), Sept. 1997.                                   vol.7, no.2, pp.159-171, Mar, 2001.
[6]    C.L. Fullmer and J.J. Garcia-Luna-Aceves, “Floor      [21]   T. Rappaport, Wireless Communication: Principles
       Acquisition Multiple Access (FAMA) for Packet—               and Practice .PHI, 1999.
       Radio Networks,” Proc. ACM Ann, Conf
       Applications, Technologies, Architectures, and
       Protocols for Computer Comm.(SIGCOMM ‘95),            Authors Profile
       Sept. 1995.
[7]    F.A, Tobagi and L. Kleinrock, “Packet Switching in                   D.Sivaganesan received his BE degree in
       Radio Channels: Part I—The Hidden Terminal                           Computer Science Engineering in 1999,
       Problem in Carrier Sense Multiple Access and the                     M.Tech degree in Information Technology in
       Busy Tone Solution,” IEEE Trans. Comm.,vol. 23,                      2004.He is currently working as an Assistant
       pp. 1417-1433, 1975.                                                 Professor in the Department of CSE,
[8]    IEEE 802.11 Wireless Local Area Networks,                            Karpagam       College    of    Engineering, groups/802/ 11/, 1999.                      Coimbatore.He is currently pursuing Ph.D.
[9]    C. Wu and V.O.K. Li, “Receiver-Initiated Busy-Tone    His research interest includes Mobile Computing, Mobile
       Multiple Access in Packet Radio Networks,” Proc.      Agents, Web Programming, Object Computing, Simulation
       ACM Ann. Conf Applications, Technologies,             and Microprocessors Based Systems. He has published 10
       Architectures, and Protocols for Computer Comm.       technical papers in International, National Conferences and
       (SIGCOMM ‘87), Aug. 1987.                             Journals.
[10]   Z.J. Haas and J. Deng, “Dual Busy Tone Multiple
        Access (DBTMA)-A Multiple Access Control                              Dr.R.Venkatesan received his PhD
        Scheme for Ad Hoc Networks,” IEEE Trans. Comm.,                       degree in Computer Science and
        vol. 50, pp. 975-985, June 2002.                                      Engineering. He is currently working as
[11]    L. Kleinrock and F.A. Tohagi, “Packet Switching in                    Professor and Head, Department of
        Radio Channels: Part I-Carrier Sense Multiple-                        Information Technology, PSG College of
        Access Modes and Their Throughput-Delay                               Technology, Coimbatore. His research
        Characteristics,” IEEE Trans. Comm., vol. 23, pp.                     interest   includes   Simulation    and
        1400-1416, 1975.                                     Modeling, Software Engineering, Software, Algorithm
[12]    K. Xu, M. Gerla, and S. Bae, “How Effective Is the   Design,   Database      Technology,   Software    Project
        IEEE 802.11 RTS/CTS Handshake in Ad Hoc              Management, Software Process Management. He has
        Networks?” Proc. IEEE Global Telecom, Conf.          published 25 technical papers in International, National
        (GLOBECOM ‘02), Nov. 2002.                           Conferences and Journals.
[13]    V. Kanodia, C. Li, A. Sabharwal, B. Sadeghi, and
        E.Knightly, “Distributed Multi-Hop Scheduling and
        Medium Access with Delay and Throughput
        Constraints,” Proc.ACM MobiCom, July 2001.
[14]    M.Barry, A.T.Campbell, A.Veres, “Distributed
        Control Algorithms for Service Differentiation in
        Wireless Packet Networks,” Proc. IEEE INFOCOM.
        Apr. 2001.
46                                                                     (IJCNS) International Journal of Computer and Network Security,
                                                                                                                  Vol. 2, No. 3, March 2010

Data Encryption technique using Location based key
    dependent Permutation and circular rotation
                                      Prasad Reddy. P.V.G.D*, K.R.Sudha2 , S.Krishna Rao3

                  *   Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam, India,
                               Department of Electrical Engineering, Andhra University, Visakhapatnam, India,
              Department of Computer Science and Systems Engineering, Sir.C.R.Reddy College of Engineering, Eluru,

                                                                          transfer of credit card information, financial details and
Abstract: Wireless delivers data through public channels                  other important documents.
to unspecified clients in mobile distributed systems. In                  The basic goal of most cryptographic system is to transmit
such scenario, a need for Secure Communication arises.                    some data, termed the plaintext, in such a way that it cannot
Secure communication is possible through encryption of                    be decoded by unauthorized agents[5][6][7][8][9]. This is
data. A lot of encryption techniques have evolved over                    done by using a cryptographic key and algorithm to convert
time. However, most of the data encryption techniques are                 the plaintext into encrypted data or cipher text. Only
location-independent. Data encrypted with such                            authorized agents should be able to convert the cipher text
techniques can be decrypted anywhere. The encryption                      back to the plaintext.
technology cannot restrict the location of data decryption.               GPS-based encryption (or geo-encryption) is an innovative
GPS-based encryption (or geo-encryption) is an innovative                 technique that uses GPS-technology to encode location
technique that uses GPS-technology to encode location                     information into the encryption keys to provide location
information into the encryption keys to provide location                  based security[12][13]. GPS-based encryption adds another
based security. In this paper a new technique for Data                    layer of security on top of existing encryption methods by
encryption method using Location based key dependent                      restricting the decryption of a message to a particular
permutation and circular rotation is proposed for mobile                  location. It can be used with both fixed and mobile.
information system.                                                       The terms location-based encryption or geo-encryption are
                                                                          used to refer to any method of encryption in which the
Keywords: Location                 dependent,   circular   rotation,      encrypted information, called cipher text, can be decrypted
Permutation, GPS                                                          only at a specified location. If, someone attempts to decrypt
                                                                          the data at another location, the decryption process fails and
1.    Introduction                                                        reveals no details about the original plaintext information.
                                                                          The device performing the decryption determines its
The dominant trend in telecommunications in recent years                  location using some type of location sensor such as a GPS
is towards mobile communication. The next generation                      receiver. Location-based encryption can be used to ensure
network will extend today’s voice-only mobile networks to                 that data cannot be decrypted outside a particular facility -
multi-service networks, able to carry data and video services             for example, the headquarters of a government agency or
alongside the traditional voice services. Wireless                        corporation or an individual's office or home. Alternatively,
communication is the fastest growing segment of                           it may be used to confine access to a broad geographic
communication industry. Wireless became a commercial                      region. Time as well as space constraints can be placed on
success in early 1980’s with the introduction of cellular                 the decryption location.
                                                                          Adding security to transmissions uses location-based
systems. Today wireless has become a critical business tool
                                                                          encryption to limit the area inside which the intended
and a part of everyday life in most developed countries.
                                                                          recipient can decrypt messages. The latitude/longitude
Applications of wireless range from common appliances that
                                                                          coordinate of node B is used as the key for the data
are used everyday, such as cordless phones, pagers, to high               encryption in LDEA. When the target coordinate is
frequency applications such as cellular phones. The                       determined, using GPS receiver, for data encryption, the
widespread deployment of cellular phones based on the                     ciphertext can only be decrypted at the expected location. A
frequency reuse principle has clearly indicated the need for              toleration distance(TD) is designed to overcome the
mobility and convenience. The concept of mobility in                      inaccuracy and inconsistent problem of GPS receiver. The
application is not only limited to voice transfer over the                sender can also determine the TD and the receiver can
wireless media, but also data transfer in the form of text ,              decrypt the ciphertext within the range of TD. Denning’s
alpha numeric characters and images which include the                     model is effective when the sender of a message knows the
                                                               (IJCNS) International Journal of Computer and Network Security, 47
                                                                                                          Vol. 2, No. 3, March 2010

recipient’s location L and the time that the recipient will be            of the cipher text denoted by X consisting of the
there, and can be applied especially effectively in situations            binary bits of the form x11 x12 x13 ……xn 21…..xn28
where the recipient remains stationary in a well-known                  As the numbers in the first stage of the cipher text are
location.                                                               between 0 to 256 we have bits in every number. Here we
The mobile client transmits a target latitude/longitude                 have 8n 2 binary bits . Thus we divide the string of 8n 2
coordinate and an LDEA key is obtained for data encryption              binary bits into 8 substrings each having n 2 binary bits.
to information server. The client can only decrypt the                  1. The next stage of the cipher we transpose the
ciphertext when the coordinate acquired form GPS receiver                   matrix X consisting of 7 substrings and we
matches with the target coordinate. For improved security, a                interchange the first bit of the substring with k1th
random key (R-key) is incorporated in addition to the LDEA                  bit of the entire string. Similarly the second bit
key. In the present paper the objective is to modify the                    with k2th bit of the entire string. This process is
cipher by introducing the concept of key dependent circular                 continued for all the bits in X to get the final cipher
rotation. In this the bits are rotated depending upon the R-                text.
key after whitening with the LDEA key using the Exclusive               2. The next stage of the cipher we transpose the
– OR operation.                                                             matrix X consisting of 7 substrings. The bits in X
2.     Random     number              generator         using               are rotated left di times where di = ki mod n 2. In the
       quadruple vector                                                     decryption process the bits are rotated di bits right.
For the generation of the random numbers a quadruple
vector is used[7][10]. The quadruple vector T is generated                    3.1 Algorithm
for 44 values i.e for 0-255 ASCII values.
                                                                              Algorithm for Encryption:
T=[0 0 0 0 0 0 0 0 1 1 ……………… 0 0 0 0 1 1 1 1 2
2……………………..                 0 1 2 3 0 1 2 3 0 1
                                                                        1.    read n,K,P,r
                                                                        2.    For i=1 to n
The recurrence matrix[1][2][3] [4]
    0 1 0 
                                                                        3.    p=convert(P);
A = 1 1 0 
                                                                      4.    X=p LDEA key
    0 0 1 
                                                                      5.    C1=Permute(X)
is used to generate the random sequence for the 0-255                   6.    C=Lrotate(C1)
ASCII characters by multiplying r=[A] *[T]                and                          }
considering the values to mod 4. The random sequence                    7.    Write(C)
generated using the formula [40 41 42]*r is generated.[10]              }
                                                                              Algorithm for Decryption:
3.     Development of the cipher                                        {
                                                                        1.     read LDEA-key,R-key,n,C
Consider a plain text represented by P which is represented             2.    for i=1 to n
in the form P=[Pij] where i=1to n and j=1 to n ---1                                     {
Let the key matrix be defined by                                        3.    C1=Rrotate(C)
K=[Kij] where i=1 to n and j=1 to n          ---2                       4.    X=permute(C1)
Let the cipher text be denoted by C=[ Cij] where i=1to n and            5.    p= X LDEA key
j=1 to n corresponding to the plain text (1)                            6.    P=convert(p)
For the sake of convenience the matrices P,K and C are                                  }
represented as                                                          7.    write P;
P=[p1 p2 ……pn2]                                                         }
K=[k1 k2 ……kn2]
C=[c1 c2 ……cn2 ]                                                   4.        Illustration of the cipher
Where in the components are taken row wise from the
corresponding matrices.                                            Encryption :
The process of encryption and decryption are shown
  1. The components of p are first converted into their            The distance between every pair of points in the universe is
        corresponding binary bits in the form                      negligible by virtue of communication facilities. Let us
     p11 p12 p13 p14 p15 p16 p17 p18, p21 ……pn2 1…..pn28           reach each point in the sky. This is the wish of scientists.
     where p11 p12 .... are the corresponding binary bits
     corresponding to p1 p2…..                                     ASCII equivalent
     As the numbers in the plain text are between 0 to 256
     we have bits in every number. Here we have 8n 2 binary        P=[ 84 104 101 32 100 105 115 116 97 110
     bits . Thus we divide the string of 8n 2 binary bits into 8   99 101 32 98 101 116 119 101 101 110 32
     substrings each having n 2 binary bits.                       101 118 101 114 121 32 112 97 105 114 32
  2. The plain text P is whitened by using the Exclusive –         111 102 32 112 111 105 110 116 115 32 105
        or operation with the LDEA key to get the first stage      110 32 116 104 101 32 117 110 105 118 101
                                                                   114 115 101 32 105 115 32 110 101 103 108
48                                                       (IJCNS) International Journal of Computer and Network Security,
                                                                                                    Vol. 2, No. 3, March 2010

105 103    105 98 108 101 32 98 121 32 118                   32 102     97 99 105 108 105 116 105 101 115
105 114    116 117   101 32 111 102 32 99 111                46 76     101 116 32 117 115 32 114 101 97
109 109    117 110 105 99 97 116 105 111 110                 99 104    32 101 97 99 104 32 112 111 105
32 102     97 99 105 108 105 116 105 101 115                 110 116    32 105 110 32 116 104 101 32 115
46 76     101 116 32 117 115 32 114 101 97                   107 121    46 84 104 105 115 32 105 115 32
99 104    32 101 97 99 104 32 112 111 105                    116 104    101 32 119 105 115 104 32 111 102
110 116     32 105 110 32 116 104 101 32 115                 32 115    99 105 101 110 116 105 115 116 115
107 121     46 84 104 105 115 32 105 115 32                  46]
116 104    101 32 119 105 115 104 32 111 102
32 115    99 105 101 110 116 105 115 116 115                 The distance between every pair of points in the universe is
46]                                                          negligible by virtue of communication facilities. Let us
                                                             reach each point in the sky. This is the wish of scientists.
LDEA- key
r1=[ 0 0 1 0 0 0 1 1 ];                                      5.     Cryptanalysis
r2= [1 0 0 1 1 1 1 1 ];
r3= [1 1 1 1 1 1 1 1];                                       If the latitude and longitude coordinate is simply used as the
                                                             key for data encryption; the strength is not strong enough.
X=P xor LDEA key                                             That is the reason why a random key is incorporated into
Permuting with R-key and Rotating right di times where di    LDEA algorithm.
= ki mod 16 and transposing                                  Let us consider the cryptanalysis of the cipher. In this cipher
C=[34 88 14 9 32 120 38 3 101 125 86                         the length of the key is 8n2 binary bits. Hence the key space
87 53 89 95 85 99 94 110 13 58 120 55                        is 28n2 . Due to this fact the cipher cannot be broken by
43 39 104 86 30 33 25 122 69 49 89 111                       Brute force attack.
69 102 124 22 27 121 111 119 102 127 30                      The Cipher cannot be broken with known plain text attack
91 61 99 31 74 77 60 104 55 50 39 105                        as there is no direct relation between the plain text and the
86 94 37 25 122 85 49 89 79 69 100 124                       cipher text even if the longitude and latitude details are
22 19 39 104 118 30 35 25 122 77 107 93                      known.
78 109 52 122 55 19 109 110 118 54 59                        It is noted that the key dependent permutation plays an
27 91 109 123 87 79 109 92 126 53 51 124                     important role in displacing the binary bits at various stages
109 55 114 119 31 75 93 103 92 78 29                         of iteration, and this induces enormous strength to the
48 121 55 67 113 109 119 70                119 28 91         cipher.
29 65 76 76 4 48 48 19 3 61 105 119
118 103 31 90 93 81 13 73 68 116 36 19                                 Avalanche Effect
18 61 105 119 118 103 31 90 93 117 93                        With change in LDEA key from 2334719 to 2334718 the
79 85 116 125 23 83 101 110 118 22 59                        cipher text   would change to
25 91 109]                                                    G=[34 88 14 9 32 120 38 3 37 121 86
Cipher text C =                                              87 37 89 94 85 99 94 110 13 58 120 55
 "Xx& e}VW5Y_Uc^n:x7+'hV-! zE1YoEf|             yowf -[=c   43 103 108 86 30 49 25 123 69 49 89 111
JM<h72'iV^% zU1YOEd|         'hv-# zMk]Nm4z7 mnv6;           69 102 124 22 27 57 107 119 102 111 30
  [m{WOm\~53|m7rwK]                                          90 61 99 31 74 77 60 104 55 50 103 109
g\N 0y7CqmwFw [ ALL 00  =iwvgZ] Q                          86 94 53 25 123 85 49 89 79 69 100 124
IDt$     =iwvgZ] u]OUt} Senv ; [m                            22 19 103 108 118 30                 51 25 123 77 107
Decryption:                                                  93 78 109 52 122 55 19 45 106 118 54
cipher text C=                                               43 27 90 109 123 87 79 109 92 126 53 51
"Xx& e}VW5Y_Uc^n:x7+'hV-! zE1YoEf|             yowf -[=c    60 105 55 114 103 31 74 93 103 92 78 29
JM<h72'iV^% zU1YOEd|         'hv-# zMk]Nm4z7 mnv6;           48 121 55 67 49 105 119 70 103 28 90
  [m{WOm\~53|m7rwK]                                          29 65 76 76         4 48 48 19 3 125 109 119
g\N 0y7CqmwFw [ ALL 00  =iwvgZ] Q                          118 119 31 91 93 81 13 73 68 116 36 19
IDt$     =iwvgZ] u]OUt} Senv ; [m                            18 125 109 119 118 119 31 91 93 117 93 79
After key dependent permuting and circular rotation the      85 116 125 23 83 37 106 118 22                 43 25
ASCII equivalent is                                          90 109]
                                                             The change in the cipher text is 44 bits
P=[ 84 104 101 32 100 105 115 116 97 110
99 101 32 98 101 116 119 101 101 110 32                      6.     Conclusions
101 118 101 114 121 32 112 97 105 114 32
111 102 32 112 111 105 110 116 115 32 105
                                                             In this chapter a cipher is developed using the LDEA key
110 32 116 104 101 32 117 110 105 118 101
                                                             dependent permutation and circular rotation as the primary
114 115 101 32 105 115 32 110 101 103 108
                                                             concept. The cryptanalysis is discussed which indicates that
105 103 105 98 108 101 32 98 121 32 118
                                                             the cipher is strong and cannot be broken by any
105 114 116 117   101 32 111 102 32 99 111
109 109 117 110 105 99 97 116 105 111 110
                                                            (IJCNS) International Journal of Computer and Network Security, 49
                                                                                                       Vol. 2, No. 3, March 2010

cryptanalytic attack since this includes transposition of the   Authors Profile
binary bits of the plain text at every stage.
                                                                                Dr Prasad Reddy P V G D, is a Professor of
7.     Acknowledgements                                                         Computer Engineering with Andhra University,
                                                                                Visakhapatnam, INDIA. He works in the areas of
This work was supported by grants from the All India                            enterprise/distributed technologies, XML based
Council for Technical Education (AICTE) project under                           object models. He is specialized in scalable web
RPS Scheme under file No. F.No.8023/BOR/RID/RPS-                                applications as an enterprise architect. With over
114/2008-09.                                                                    20 Years of experience in filed of IT and teaching,
                                                                                Dr Prasad Reddy has developed a number of
References                                                      products, and completed several industry projects. He is a regular
                                                                speaker in many conferences and contributes technical articles to
[1]   K.R.Sudha, A.Chandra Sekhar and Prasad                    international Journals and Magazines with research areas of
     Reddy.P.V.G.D “Cryptography protection of digital          interest in Software Engineering, Image Processing, Data
     signals using some Recurrence relations” IJCSNS            Engineering , Communications & Bio informatics
     International Journal of Computer Science and
     Network Security, VOL.7 No.5, May 2007 pp 203-207
                                                                                 K.R.Sudha received her B.E. degree in
[2] A.P. Stakhov, ”The ‘‘golden’’ matrices and a new kind                        Electrical Engineering from GITAM, Andhra
     of cryptography”, Chaos, Soltions and Fractals 32 (                         University 1991.She did her M.E in Power
     (2007) pp1138–1146                                                          Systems 1994. She was awarded her Doctorate
[3] A.P. Stakhov. “The golden section and modern harmony                         in Electrical Engineering in 2006 by Andhra
     mathematics. Applications of Fibonacci numbers,”                            University. During 1994-2006, she worked with
     7,Kluwer Academic Publishers; (1998). pp393–99.                             GITAM Engineering College and presently she
[4] A.P. Stakhov. “The golden section in the measurement        is working as     Professor in the department of Electrical
     theory”. Compute Math Appl; 17(1989):pp613–638.            Engineering, Andhra University, Visakhapatnam, India.
[5] Whitfield Diffie And Martin E. Hellman, New
     Directions in Cryptography” IEEE Transactions on
     Information Theory, Vol. -22, No. 6, November 1976
                                                                                      S.Krishna Rao received his M Tech degree in
     ,pp 644-654
                                                                                      Computer Science and Systems Engineering
[6] Whitfield Diffie and Martin E. Hellman “Privacy and                               from Andhra University in 2000.He is
     Authentication: An Introduction     to Cryptography”                             presently working as Associate Professor in the
     PROCEEDINGS OF THE IEEE, VOL. 67, NO. 3,                                         Department of Computer Science and
     MARCH 1979,pp397-427                                                             Engineering in Sir.C.R.Reddy College of
 [7] A. V. N. Krishna, S. N. N. Pandit, A. Vinaya Babu “A       Engineering, Eluru.
     generalized scheme for data encryption technique
     using a randomized matrix key” Journal of Discrete
     Mathematical Sciences & Cryptography Vol. 10
     (2007), No. 1, pp. 73–81
[8] C. E. SHANNON Communication Theory of Secrecy
     Systems The material in this paper appeared in a
     confidential report “A Mathematical Theory of
     Cryptography” dated Sept.1, 1946, which has now
     been declassified.
 [9] E. Shannon, A Mathematical Theory of
     Communication, Bell System Technical Journal 27
     (1948) 379–423, 623–656.
[10] A. Chandra Sekhar , ,K.R.Sudha and Prasad
     Reddy.P.V.G.D “Data Encryption Technique Using
     Random Number Generator” Granular Computing,
     2007. GRC 2007. IEEE International Conference, on
     2-4 Nov. 2007 Page(s):576 – 576
[11] V. Tolety, Load Reduction in Ad Hoc Networks using
     Mobile Servers. Master’s thesis, Colorado School of
     Mines, 1999.
[12]L. Scott, D. Denning, Geo-encryption: Using GPS to
     Enhance Data Security, GPS World, April 1 2003.
[13] Geo-encryption protocol for mobile networks A. Al-
     Fuqaha, O. Al-Ibrahim / Computer Communications
     30 (2007) 2510–25
50                                                              (IJCNS) International Journal of Computer and Network Security,
                                                                                                           Vol. 2, No. 3, March 2010

 Implementation of Watermarking for a Blind Image
        using Wavelet Tree Quantization
                                     S.M.Ramesh1, Dr.A.Shanmugam2 , B.Gomathy3
                                              Senior Lecturer, Dept.of ECE,
                                Bannari Amman Institute of Technology, Erode- 638401, India
                                                        Professor, Dept.of ECE,
                                Bannari Amman Institute of Technology, Erode-638401, India
                                                 Lecturer, Dept.of CSE,
                                Bannari Amman Institute of Technology, Erode- 638401, India

                                                                    mid-frequency to ensure the transparency and robustness of
Abstract:      This paper proposes implementation of
watermarking for a blind image using wavelet tree quantization      the watermarked image. For suggested inserting the
for copyright protection. In such a quantization scheme, there      watermark into the perceptually significant portion of the
exists a large significant difference while embedding a             whole DCT transformed image, wherein a predetermined
watermark bit 1 and a watermark bit 0; it then does not require     range of low frequency components excludes the DC
any original image or watermark during the watermark                component.
extraction. As a result, the watermarked images look lossless in    This watermarking scheme has been shown to be robust
comparison with the original ones, and the proposed method can
effectively resist common image processing attacks; especially
                                                                    against common attacks such as compression, filtering, and
for JPEG compression and low-pass filtering. Moreover, by           cropping. The proposed a watermarking method, in
designing an adaptive threshold value in the extraction process,    accordance with the multi-threshold wavelet coding
our method is more robust for resisting common attacks such as      (MTWC), the successive subband quantization (SSQ) is
median filtering, average filtering, and Gaussian noise.            adopted to search for the significant coefficients. The
Experimental results show that the watermarked image looks          watermark is added by quantizing the significant coefficient
visually identical to the original, and the watermark can be
                                                                    in the significant band by using different weights. The
effectively extracted even after either an unintentional image
processing or intentional image attacks.                            proposed a watermarking method based on the qualified
                                                                    significant wavelet tree (QSWT). The QSWT is derived
  Keywords - Wavelet tree quantization, JPEG compression,           from the embedded zerotree wavelet algorithm (EZW). The
Low-pass filtering, Discrete Wavelet Transform.
                                                                    watermark is embedded in each of the two subbands of the
                                                                    wavelet tree. Several watermarking methods used two sets of
1. Introduction
                                                                    coefficients, one to represent the watermark bit 0, and the
The Internet has popularized tremendously fast in our life in       other to represent the watermark bit 1. According to the
the last decade. Due to the digitalization of documents,            embedded watermark bit, only a set of coefficients are
images, music, videos, etc, people can access and propagate         quantized each time. The proposed a blind watermarking
them easily via the network. The watermarking technique             approach called differential energy watermarking. A set of
has been widely applied to digital contents for copyright           several 8×8 DCT blocks are composed and divided into two
protection, image authentication, proof of ownership, etc.          parts to embed a watermark bit. The high frequency DCT
This technique embeds information so that it is not easily          coefficients in the JPEG/MPEG stream are selectively
perceptible; that is, the viewer cannot see any information         discarded to produce energy differences in the two parts of
embedded in the contents. The issue here is the detection of        the same set.
the existence of watermarks in the digital contents to prove          The wavelet coefficients of the host image are grouped
ownership. The spatial and spectral domains are two                 into wavelet trees, and each watermark bit is embedded
common methods for watermarking. In the spatial domain,             using two trees. One of the two trees is quantized with
the watermark is embedded in the selected areas on the              respect to a quantization index, and both trees exhibit a
texture of the host image. In the spectral domain, since the        large statistical difference between the quantized tree and
spread spectrum communication is robust against many                the unquantized tree; the difference can later be used for
types of interference and jamming, the host image is                watermark extraction. EL [10] improved SHW [11] method
transformed to the frequency domain using methods such as           by adding the Human Visual System (HVS) to effectively
Discrete Cosine Transform (DCT) or Discrete Wavelet                 resist geometric attack. BKL [9] improved SHW [11]
Transform (DWT); then the watermark is embedded in the              method by using four trees to represent two watermark bits
                                                            (IJCNS) International Journal of Computer and Network Security, 51
                                                                                                       Vol. 2, No. 3, March 2010

to improve visual quality. One of the four trees is quantized   difference is greater than the adaptive threshold value;
according to the binary value of the two embedded               otherwise, a watermark bit 0 is extracted. Experimental
watermark bits. But these methods [9-11] cannot effectively     results show that the proposed method is very efficient for
resist the attacks of low-pass filtering for JPEG               resisting various kinds of attacks.
compression. In this paper, propose a blind watermarking
method based on wavelet tree quantization.                      2. Watermarking by Quantization of Wavelet

                                                                   2.1 Wavelet Trees
                                                                  A host image of size n by n is transformed into wavelet
                                                                coefficients using the 4-level discrete wavelet transform
                                                                (DWT).With 4-level decomposition and have 13 frequency
                                                                bands as shown in Fig. 1. The parent-child relationship can
                                                                be connected between these sub nodes to form a wavelet
                                                                tree. If the root consists of more than one node, then an
                                                                image will have many wavelet trees after the DWT. In this
                                                                case, we have 3 sub bands LH4, HL4, and HH4 as roots, and
                                                                the total wavelet trees are 3×(n/24×n/24) after an image of
                                                                size n by n is transformed by a 4-level wavelet transform. A
                                                                higher resolution level (such as level 3 in Fig.1) has more
                                                                significant coefficients than a lower resolution level (such as
                                                                level 2 in Fig.1). As we can see, when n = 512, there are 85
      Figure 1. The watermark embedding procedure.
                                                                coefficients for a wavelet tree constructed from a node in
                                                                LH4 to LH1 following the parent-child relationship. For
  A watermarking technique is denoted as blind if the
                                                                avoiding attacks such as low pass filters, in our proposed
original image is not needed for extraction. In previous
                                                                method we only need the largest two coefficients; these two
research, the watermark embedded in the significant
                                                                coefficients are selected from one coefficient of LH4 and
coefficients was found to be robust. The common issue is the
                                                                four coefficients of the same orientation in the same spatial
use of blind detection to find out whether the extracting
                                                                location in LH3 as shown in Fig. 2.
order is the same as the embedding order. Hence, propose a
watermarking method which embeds a watermark bit in the
                                                                 2.2 The Preprocess
maximum wavelet coefficient of a wavelet tree. The
                                                                  With a four-level DWT and have 13 frequency bands as
proposed method is different from others, which use two
                                                                shown in Fig.1. A higher level subband is more significant
trees or two blocks to embed a watermark bit. We embed the
                                                                than a lower subband. Using the LL4 subband as a root is
watermark by scaling the magnitude of the significant
                                                                not suitable for embedding a watermark, since it is a low
difference between the two largest wavelet coefficients in a
                                                                frequency band that contains important information about
wavelet tree to improve the robustness of the watermarking
                                                                an image and easily causes image distortions. Embedding a
                                                                watermark in the HH4 subband is also not suitable, since the
                                                                subband can easily be eliminated, for example by a lossy
                                                                compression. The LH4 subband is more significant than the
                                                                HL4 subband, hence the LH4 subband has a higher priority
                                                                than the HL4 subband in the selection. A binary watermark
                                                                image W comprised of size Nw (≤ S = n/24×n/24) bits is
                                                                embedded. We represent each watermark bit as 1 or 0, and
                                                                use a 90 pseudorandom function with another seed to shuffle
                                                                Nw bits. According to the watermark bits embedded later, we
                                                                select Nw non-overlapping wavelet trees and compute the
                                                                global average significant difference of the total number of
                                                                the Nw wavelet trees using Eq.(1).

      Figure 2. The watermark extraction procedure.                        1   Nw
                                                                  ε = { ------ ∑ (maxi – seci)}                       (1)
  The trees are so quantized that they exhibit a sufficiently            Nw i = 1
large enough energy difference between a watermark bit 1
and a watermark bit 0, which is then used for watermark            Where ε is the global average significant difference in all
extraction. During extraction, an adaptive threshold value is   Nw wavelet trees; {⋅} is the floor function; maxi is the local
designed. A watermark bit 1 is extracted if the significant     maximum wavelet coefficient of the ith wavelet tree; seci is
52                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

the local second maximum wavelet coefficient of the ith           Otherwise, the embed a watermark bit 0 according to Eq. (7)
wavelet tree, 1≤ i ≤ Nw. If the embedded watermark bit is 1,      as follows:
the local maximum coefficient is not quantized under                 if (seci < 0 ), than maxinew = 0, secinew = 0;
Maximum (ε ,T) Δi ≥ ε and is quantized under Δi <
Maximum (ε ,T) . If the embedded watermark bit is 0, the             otherwise maxinew = seci                     (7)
local maximum coefficient is quantized by setting the local
maximum coefficient = local second maximum coefficient.           Where secinew denotes the new second maximum coefficient
                                                                  in the ith wavelet tree after embedding the watermark bit 0.
                                                                  When embedding a watermark bit 1, the maximum local
 2.3 Watermark Embedding
  Let maxi and seci be the local maximum wavelet                  significant coefficient is quantized and added by an
                                                                  incremental β if Δi < Maximum (ε, T); otherwise (i.e., Δi ≥
coefficient and the local second maximum wavelet
                                                                  Maximum (ε, T)), it is kept the same as before. The reason
coefficient in a wavelet tree; the difference between both of
                                                                  for not quantizing the maximum local significant coefficient
them is named as the local significant difference. The select
                                                                  is that we won’t increase the distortion of the image. Some
a threshold value β as an increment for quantization. The         images having small ε imply that their significant difference
larger the β is, the better robustness but the worse distortion   is not obvious. We need an extra parameter T to improve the
of the watermarked image will be. Each time at embed a            robustness. The larger the T is, the higher probability the
watermark bit and quantize the maximum coefficient in a           maxi is quantized to a larger value; but, in the meanwhile,
wavelet tree.                                                     the more distortion of the image will be as well. For
                                                                  example, let ε =12 and Δi = 13. Suppose T is set to be less
     if (maxi < 0), then maxi = 0                    (2)          than ε, such as T =11, maxi will not be quantized as Δi >ε
                                                                  =12. On the other hand, if T is set to be larger than ε, such
      Δi = maxi − seci,                              (3)          as T =14, maxi will be quantized and increased by β as Δi
                                                                  <T=14. On the contrary, when embedding a watermark bit
   Where Δi denotes the significant difference between the        0, the value of maxi is quantized by decreasing to the local
maximum coefficient and the second maximum coefficient            second maximum seci and hence the new Δi will be equal to
in the ith wavelet tree of Nw. Because some maximum               0. Based on this strategy, there exists a large 91 energy
coefficients in a wavelet tree may be a negative value, and a     difference between embedding watermark bit 1 and
positive value has higher robustness than a negative value        watermark bit 0.
under attacks, it will result in Δi more significant if we
modify the maximum coefficient from a negative value to a         3. Design of Watermark Decoder
positive value. When the Δi is more significant, it will be
more accurate at extracting watermark. To achieve the new         3.1 The Decoder Design
maximum coefficient be positive and to decrease the                 In the proposed method, neither an original image nor an
                                                                  original watermark image is required for the extraction
distortion of watermarked image due to quantization, the
                                                                  process. During the embedding process, embed a watermark
new maximum coefficient is set to a smallest positive value
                                                                  bit 1 by adding an energy β (or β × γ ) to the local maximum
zero here.
                                                                  wavelet coefficient in the wavelet tree, and embed a
   When embed a watermark bit 1, the maxi is quantized by         watermark bit 0 by setting maxi = seci Hence, if the
                                                                  wavelet tree was embedded a watermark bit 0, the local
  maxinew = maxi ,if (Δi ≥ Maximum (ε, T))             (4)        significant difference between the largest two coefficients
                                                                  will be close to zero; otherwise, if the wavelet tree was
  maxinew = maxi + β, if (Δi < Maximum (ε ,T)                     embedded a watermark bit 1, the local significant difference
             and maxi is root)                         (5)        between the largest two coefficients will be greater than β.
                                                                     In order to extract watermark bits correctly and the value
  maxinew = maxi + β × γ , if (Δi < Maximum(ε ,T)                 of y by Eq. (8).
            and maxi is root)                     (6)
                                                                            1      Nw × α
  Where maxinew denotes the new maximum coefficient in               y = --------- ∑ ϕ j                 ------ (8)
the ith wavelet tree after embedding the watermark bit. The              Nw × α j = 1
maxi located at lower resolution level (child node) is less
robust than those located at higher resolution levels (root          Where φ = {max1 - sec1 ,max2 - sec2 ,…..,maxi - seci }, for
node). The reason has been stated in Section II-B.                i=1,2,…,N; the sorted φ is denoted as ϕ (φ) = { ϕ1,ϕ 2 ...ϕ
According to the band sensitivity, the coefficients quantized     Nw }, ϕ1 < ϕ 2 < .... < ϕ Nw ; α is the scale parameter, 0 <
at different resolution level are given different weights. The    α ≤ 1; α is crucial to y and is used to determine how many
quantized coefficient at the lower resolution level is given a    percentages of the significant difference in φ can be used for
heavier weight than that at the higher resolution level.          the average. Hence, α marks the minimal y value for
Hence, if the maxi does not locate at the highest resolution      extracting the watermark. The larger α is, the larger the y
level, we will quantize the maxi by adding γ times of β           will be. Suppose all embedded watermark bits are 1 in the
energy, here γ is a scale parameter and we set γ =1.5.            watermark. This means that the difference between the
                                                               (IJCNS) International Journal of Computer and Network Security, 53
                                                                                                          Vol. 2, No. 3, March 2010

maximum wavelet coefficients and the second maximum                  The peak signal-to-noise ratio (PSNR) to evaluate the
wavelet coefficients for any embedded wavelet tree is greater      quality between the attacked image and the original image.
than β. The value of α should be set as small as possible to       After extracting the watermark, the normalized correlation
avoid extraction errors (see Eq. (9),(10)); the reason for this    coefficient (NC) is computed using the original watermark
is that it can exclude those big significant differences of the    and extracted watermark to judge the existence of the
embedded wavelet trees in Eq. (8). On the other hand, if all       watermark. The value of the NC coefficient is defined as
embedded watermark bits are 0 in the watermark, the value          follows:
of α must be set as large as possible. Therefore, α is sensitive
to the content of the watermark.                                             1     w h -1 w w -1
                                                                   NC = ----------- ∑     ∑ w (i, j) × w ' (i, j)          (11)
3.2 Watermark Extraction                                                wh ×ww i = 0 j = 0
  Following Eqs. (8),(9) and (10), it would be easy to extract
the watermark. If the local significant difference is greater         Where wh and ww are the height and width of the
than or equal to y, where 0 < y ≤ β, then the embedded             watermark. w (i, j) and w' (i, j) are the values of the
watermark bit could be 1; otherwise, the embedded                  coordinate (i, j) in the original watermark and the extracted
watermark bit could be 0. The watermark bit can be                 watermark, respectively. Here w (i, j) is set to 1 if it is a
extracted based on Eq. (9) and (10) as follows:                    watermark bit 1; otherwise, it is set to -1. w' (i, j) is set in
                                                                   the same way. So the value of w(i, j) × w' (i, j) is either -1 or
  watermark bit = 1, if (maxi - seci ) > y        (9)              1.

  watermark bit = 0, otherwise                   (10)                Table 1: Normalized Correlation Coefficients (NC) after
                                                                     Attacks by JPEG Compression with the Quality Factors
                                                                       (QF) 10, 20, 30, 40, 50, 60, 70, 80, 90, AND 100.

                                                                        Quality Factors      Correlation         Extracted
                                                                             (QF)            Coefficients        Watermark

                                                                               10                0.33

                                                                               20                0.65               E

                                                                               30                0.78               ES

                                                                               40                0.82               E A
                   (a)                               (b)                       50                0.89               ES

Figure 3. (a) The original image of Lena of size 512×512.                      60                0.96               ESH
          (b) The original binary watermark of size 32×16.
                                                                               70                 1                 ESHA

                                                                               80                 1                 ESHA

                                                                               90                 1                 ESHA

                                                                              100                 1                 ESHA

                                                                     The Lena (512×512 pixels, 8 bits/pixel) obtained from
                                                                   attacking the Stir mark benchmark and Photo Impact 11
                                                                   software tools to simulate common image attacks. While
                                                                   there is no attack, for the sake of brevity only the Lena
                                                                   image and the binary watermark are shown in Fig. 3. Fig. 4
                                                 ESHA              shows the watermarked image and the extracted result. Pre-
                   (a)                             (b)             determine the scale parameter T at 10, β =7, γ =1.5, and α
                                                                   =0.7. In the following, consider both geometric and
Figure 4. (a) Watermarked Lena with PSNR = 41.88dB                 nongeometric attacks. Nongeometric attacks include JPEG
           (b) The extracted watermark with NC = 1                 compression, low pass filtering, histogram equalization, and
                                                                   sharpening. From Table 1, the proposed method can
                                                                   correctly extract the watermark while the quality factors are
4. Experimental Results
                                                                   greater than 70 and it becomes worse if the quality factor is
54                                                             (IJCNS) International Journal of Computer and Network Security,
                                                                                                          Vol. 2, No. 3, March 2010

decreased. The less the quality factor is, the more vague the        In this paper, propose a wavelet-tree-based blind
extracted watermark is.                                            watermarking method by quantizing the maximum wavelet
                                                                   coefficient in a wavelet tree. Embed a watermark bit by
                                                                   quantizing the maximum wavelet coefficient in a wavelet
                                                                   tree. The trees are so quantized that they exhibit a
4.1 Experiment Analysis                                            sufficiently large enough energy difference between a
   Compare the proposed method with BKL [9], EL [10],              watermark bit 0 and a watermark bit 1, which difference,
and SHW [11] using the Lena image. The watermark                   denoted as significant difference, is then useful for later
consists of 256 bit 1and 256 bit 0. The results are shown in       watermark extraction. During extraction, an adaptive
Table 2. From Table 2, the PSNR of the proposed method is          threshold value is designed. The magnitude of the
better than those of [11]. In this method, it is not so good for   significant difference in a wavelet tree is compared to the
the rotation attacks with degree greater than ± 0.70; but it is    adaptive threshold value. Furthermore, regarding each
far better than the listed methods; especially for low pass        wavelet tree embedded with a watermark bit, we not only
filtering attacks for JPEG compression.                            can embed more bits in an image but can extract the
                                                                   watermark without any need of the original image and
     Table 2: Comparison of the Proposed Method and the            watermark. Moreover by designing an adaptive threshold
                Methods in [9], 10] and [11].                      value in the extraction process. In addition to the copyright
                                                                   protection, the proposed method can also be applied to data
                                                                   hiding and image authentication.
Attacks /    SHW         EL        BKL       Proposed
  NC        PSNR =     PSNR=      PSNR=      Method
            38.2dB     40.6dB     41.54dB    PSNR =
                                                                   [1] D. P. Mukherjee, S. Maitra, and S. T. Acton, "Spatial
 JEPG         NA        0.15        0.17       0.33                    domain digital watermarking of multimedia objects for
 (QF =                                                                 buyer authentication," IEEE Trans. Multimedia, vol. 6,
  10)                                                                  pp. 1-15, Feb. 2004.
                                                                   [2] N. Nikolaidis and I. Pitas, "Robust image watermarking
 JEPG         NA        0.34        0.61       0.65                     in the spatial domain," Signal Processing, vol. 66, pp.
 (QF =                                                                  385-403, 1998.
                                                                   [3] A. K. Mahmood and A. Selin,"Spatially adaptive
                                                                        wavelet thresholding for image
 JEPG        0.15       0.52        0.79       0.78
 (QF =                                                                  watermarking,"presented at Proc.IEEE ICME, Toronto,
  30)                                                                   2006 of Conference.
                                                                   [4] J. R. Hernandez, M. Amado, and F. Perez- Gonzalez,
 JEPG        0.23       0.52        0.83       0.82                     "DCT- omain watermarking techniques for still images:
 (QF =                                                                  detector performance analysis and a new structure,"
  40)                                                                   IEEE Trans.Image Processing, vol. 9, pp.55- 68, Jan.
 JEPG        0.28       0.52        0.89       0.89                [5] L. Sin-Joo and J. Sung-Hwan, "A survey of
 (QF =
                                                                        watermarking techniques applied to multimedia," in
                                                                        Proc. IEEE ISIE 2001, pp. 272-277
 JEPG        0.46       0.59        0.94       0.96                [6] V. M. Potdar, S. Han, and E. Chang,"A survey of digital
 (QF =                                                                  image watermarking techniques,"presented at Proc.
  60)                                                                   IEEE INDIN 2005 of Conference.
                                                                    [7] H. J. Wang, P. C. Su, and C. C. J. Kuo, "Wavelet-based
 JEPG        0.57       0.63        0.97        1                       digital image watermarking," Optics Express,vol.3, pp.
 (QF =                                                                   491- 496, Dec. 1998.
  70)                                                              [8] M. Hsieh, D. Tseng, and Y. Huang, "Hiding digital
                                                                        watermarks using multiresolution wavelet transform,"
 JEPG        0.89       0.71        0.99        1                       IEEE Trans. Ind. Electron., vol. 48, pp. 875-882, Oct.
 (QF =
                                                                    [9] B. K. Lien and W. H. Lin,"A watermarking method
 JEPG          1        0.78         1          1                        based on maximum distance wavelet tree
 (QF =                                                                   quantization," presented at 19th Conf. Computer
  90)                                                                    Vision, Graphics and Image Processing, 2006 of
 JEPG          1        0.88         1          1                  [10] E. Li, H. Liang, and X. Niu,"An integer wavelet based
 (QF =                                                                   multiple logo-watermarking scheme," presented at
  100)                                                                   Proc. IEEE WCICA, 2006 of Conference.
                                                                   [11] S. H. Wang and Y. P. Lin, "Wavelet tree quantization
5. Conclusion                                                             for copyright protection watermarking," IEEE Trans.
                                                                   (IJCNS) International Journal of Computer and Network Security, 55
                                                                                                              Vol. 2, No. 3, March 2010

     Image Processing, vol. 13, pp. 154-165, Feb. 2004.                Guide Award” five times from Tamil Nadu state Government. He
[12] G. C. Langelaar and R. L. Lagendijk, "Optimal                     is also the recipient of “Best Outstanding Fellow Corporate
     differential energy watermarking of DCT encoded                   Member Award” by Institution of Engineers (IE),India -2004 and
     images and video,"IEEE Trans. Image Processing,                   “Jewel of India” Award by International Institute of Education and
                                                                       Management, New Delhi–2004 and “Bharatiya Vidya Bhavan
     vol. 10, pp. 148-158, Jan.2001.
                                                                       National Award for Best Engineering College Principal 2005” by
                                                                       Indian Society for Technical Education (ISTE). “Education
 [13] F. A. P. Petitcolas, Weakness of existing watermark              Excellence Award” by All India Business& Community
      Scheme               1997[online]            Available:          Foundation, New Delhi.
[14] PhotoImpact 11 software,,
      Ulead system, Inc.

Authors Profile

                           S.M.Ramesh received the B.E degree
                           in Electronics and Communication
                           Engineering from National Institute of
                            (Formerly     Regional    Engineering
                           College),    Trichy,    Bharathidhasan
                           University, India in the year 2001 and
                           the M.E, degree in Applied Electronics
                           from RVS College of Engineering and
                           Technology,        Dindugal,     Anna
University, India in the year 2004. From 2004 to 2005, he served
as a Lecturer in the Department of Electronics and Communication
Engineering, Maharaja Engineering College, Coimbatore, India.
From 2005 to 2006, he served as a Lecturer in the Department of
Electronics and Communication Engineering, Nandha Engineering
College, Erode, India. Since June 2006, he served as Senior
Lecturer, in the Department of Electronics and Communication
Engineering, Bannari Amman Institute of Technology,
Sathyamangalam, and Erode, India. He is currently pursuing the
Ph.D. degree in Anna University, Chennai-India, working closely
with Prof. Dr.A.Shanmugam and Prof Dr.R.Harikumar.

                            Dr.A.Shanmugam received the B.E,
                            degree       in      Electronics    and
                            Communication Engineering from PSG
                            College of Technology., Coimbatore,
                            Madras University, India in the year
                            1972 and the M.E, degree in Applied
                            Electronics      from      College    of
                            Engineering, Guindy, Chennai, Madras
                            University, India in the year 1978 and
                            received the Ph.D. in Computer
                            Networks from PSG College of
Technology., Coimbatore, Bharathiyar University, India in the year
1994.From 1972 to 1976, he served as a Testing Engineer at Test
and Development Center, Chennai, India. From 1978 to 1979, he
served as a Lecturer in the Department of Electrical Engineering,
Annamalai University, India. From 1979 to 2002, he served
different level as a Lecturer, Asst.Professor, Professor and Head in
the Department of Electronics and Communication Engineering of
PSG College of Technology, Coimbatore, India. Since April
2004.He assumed charge as the Principal, Bannari Amman
Institute of Technology, Sathyamangalam, Erode, India.

  He works in field of Optical Networks, broad band computer
networks and wireless networks, Signal processing specializing
particularly in inverse problems, sparse representations, and over-
complete transforms.Dr.A.Shanmugam received “Best Project
56                                                                (IJCNS) International Journal of Computer and Network Security,
                                                                                                             Vol. 2, No. 3, March 2010

       A Hierarchical Genetic Algorithm for Topology
       Optimization and Traffic Management in ATM
       Networks Utilizing Bandwidth and Throughput
                                    Alaa Sheta1, Malik Braik2 and Mohammad Salamah3
                                             Taif University, Information Systems Department,
                                             College of Computers and Information Systems,
                                                            Taif, Saudi Arabia
                                 Al-Balqa’ Applied University, Information Technology Department,
                             Prince Abdullah Bin Ghazi Faculty of Science and Information Technology,
                                                           Salt, Jordan
                                             National Education Center for Robotics (NECR),
                                                       King Hussein Foundation,
                                                            Amman, Jordan

                                                                      increasingly used in telecommunications systems for high
Abstract: The Asynchronous Transfer Mode (ATM) network is
expected to become a backbone network for high speed digital          speed multimedia services [2], [3].
multimedia services in distributed environments. This paper           Recently, control flow and management are core concepts of
explores an optimization based hierarchical approach using            the optimal structure of ATM networks; hence, flow control
Genetic Algorithms (GAs) for installing an ATM network with           and management have drawn much attention by the
optimal structure and traffic flow. A Hierarchical Genetic            researchers in telecommunication field. In addition to that
Algorithm (HGA) is used to solve such an optimization problem.        the nodes in the ATM network design must be linked in an
HGA approach can improve the performance of conventional
GA, though it consumes more computation time. Thus, HGA
                                                                      economical way to handle expected traffic and capacity
approach is capable of reducing the overall delay while               constraints [1], [4]. As the models for the design of ATM
increasing the bits transmitted over the network. This will           networks are quite complex, and one of the limiting factors
definitely improve the network performance and meets the              is the requirement of expensive exchange based equipments,
requirements in multimedia service environments. The                  therefore, Genetic Algorithms (GAs) were used to solve such
preliminary results indicate that HGA based ATM network               problems of traffic assignment and topological design of
design can be very efficacious.
                                                                      local area networks [5], [6], flow optimization in survivable
     Keywords: Genetic Algorithms, ATM Network, Flow                  ATM networks [7], and flow assignment in ATM networks
Management.                                                           [8]–[10]. However, many programming models have been
                                                                      developed which deals with telecommunication network
                                                                      planning [11]. In this context, Evolutionary Algorithms
1. Introduction                                                       (EAs) have been frequently applied to telecommunication
There is a rapidly demand for telecommunication networks              services in the last years [9], [12].
to function efficaciously despite obstacles such as disabling          This paper handles an optimal ATM network structure (i.e.
portions of the network, limiting the links capacities, high          topology and link capacities) using Hierarchical Genetic
cabling costs, and so on [1]. Thus, networks must constantly          Algorithms (HGA) [13], [14]. The objectives of the network
able to maintain an acceptable level of performance. Despite          planning are: designing the network structure to carry out
this need, the problem of dynamic redesign of functioning             the estimated traffic, and minimizing the cost of network
networks still received a little attention. Today, with the           [15],[16]. Consequently, we are dealing with flow
intensifying role of using the Internet and networking                assignment and links capacities as complex optimization
technologies, there have been immense advances in using               problems using GAs in two levels, the first GA level deals
the telecommunications services in the present information            with selection the optimal network structure, and the second
society. Asynchronous Transfer Mode (ATM) is one of the               GA level reduces the overall delay while maintain the
most promising networking technologies. ATM was rated to              throughput, this cycle will continues until terminated by
reduce the complexity of the network and improve the                  some condition.
flexibility of traffic performance which has good ability for         The remainder of the paper is organized as follows. In
transmitting many kinds of information, and carry traffic             Section 2 we explain the details of GA levels; each
over all kinds of networks. Furthermore, ATM has been                 alternative level of HGA is described extensively. The case
                                                                (IJCNS) International Journal of Computer and Network Security, 57
                                                                                                           Vol. 2, No. 3, March 2010

study and the schematic diagram of the ATM network are               2.2 GA Level 2
discussed in section 3. In Section 4 we provide an extensive       GA is optimized to find the best value of (fi) such that the
and comprehensive formulation of the use of HGA for                overall delay is minimized. The computed network delay is
solving the ATM design problem. In section 5 we present            then returned to GA Level 1 to be considered as the new
our preliminary results for the ATM network case study.            fittest value. The fitness criterion, in this level, is considered
Finally, in section 6 we offer several concluding remarks and      as the mean time delay. The mean delay is computed as in
address the challenges ahead in the future enhancements.           Equation 3.

2. Hierarchical GA                                                           1 N            fi          N
                                                                       T =      ∑                , θ = ∑ fi                    (3)
The ATM design problem was considered as a parameter                         θ i =1 C
                                                                                        i   − fi      i =1
estimation problem. GAs has been used in a hierarchical
approach to optimize the ATM network. The proposed novel
                                                                   where θ is the total traffic over the network, N is the number
HGA optimization problem is shown in Figure 1. There are           of links. This idea was presented in [16].
two levels were performed to produce an optimal ATM
network design. The two levels are evolved in parallel. The
                                                                   3. Case Study: ATM Network
fitness score of the individuals in each level depends on the
performance of the chromosomes in both levels.                     There are two sets of customers to be considered while
                                                                   planning the ATM network design:
                                                                   1) the user who uses the services through the network. The
                                                                       network should meet the user’s needs in terms of quality
                                                                       of service. The flow assignment and the capacities links
                                                                       are the two main entities affecting the cost of the ATM
                                                                       network. The maximum flow assignment must be tested,
                                                                       and the network should maintain a high capacity.
                                                                    2) the company which will be building the ATM network
                                                                       and maintaining it. The network operation should be as
                                                                       cost effective as possible for both installation and
                                                                       maintenance. Minimizing the total cost is mainly an
                                                                       important matter of selecting the best design of ATM
                                                                   The schematic diagram for the ATM under study with all
                                                                   specified links and capacities is shown in Figure 2.

          Figure 1. Hierarchical GAs in two levels

   2.1 GA Level 1
GA is used to install a new network with a set of network
links which satisfies the constraints demand criterion and
has a minimum delay over the network. In this level, a new
network structure is evolved which has all nodes of the
original network and a subset of its links. The network
configuration must be implemented subject to the constraints
defined in Equations 1 and 2.
                                                                               Figure 2. The ATM Network Topology
    f ≤ C × 95%                                (1)
     i   i
                                                                   This ATM network was presented in [17], [18]. The network
Thus, the maximum flow value (fi) for link (i) in Equation 1       has 7 nodes with 14 links. The links and capacities for each
is restricted not to exceed 95% of the capacity (Ci).              node are presented in Table 1.
                      n                                            Each network link is characterized by a set of attributes;
Throughput ≥ 0.5 ×   ∑      C
                                                (2)                these attributes for a given link (i) form the flow (fi ) and the
                     i =1                                          capacity (Ci ). (fi ) is defined as the effective quantity of
The throughput of the network is allowed not to be less than       information transported by link (i). The capacity (Ci ) is
half the sum of all capacities. We must realize that the           defined as the measure of the maximal quantity of
boundary range of the genes values is based on the link ID of      information that can be transmitted by link (i).
the ATM experiments and the gene redundancy must be
eliminated. A gene duplicate leads to a link duplicate, which
leads to the increase of the network delay.
58                                                              (IJCNS) International Journal of Computer and Network Security,
                                                                                                           Vol. 2, No. 3, March 2010

           Table 1: ATM network capacity of each link              selection method is the fitness assignment. Each individual
                                                                   in the selection pool receives a reproduction probability
     Links                                                         depending on its objective value. This fitness is used for the
                Start Node      End Node     Link Capacity
      ID                                                           selection step afterwards. Stochastic uniform selection
      1             1               4             150              mechanism is considered in this work.
      2             1               6             150              Reproduction: This step increases the number of good
                                                                   chromosomes in the next generation. This scheme
      3             1               3             225
                                                                   determines how the new individuals will be assimilated into
      4             1               2             225
                                                                   the population. Many number of reproduction operators were
      5             2               3             150              presented in the literature [3], [7].
      6             2               6             150              Crossover: This procedure exchanges genes between the
      7             2               5             150              parents. Two chromosomes are randomly selected from the
      8             3               4             150              population as parent chromosomes. Two new chromosomes
                                                                   with the genes from both the parent chromosomes are
      9             3               5             150
                                                                   obtained. A scattered function for the crossover is considered
      10            4               6             150
                                                                   in this work.
      11            6               5             150              Mutation: This step is used to have a new chromosome
      12            5               7             150              which differs from the chromosomes in the population. A
      13            6               7             150              chromosome is randomly selected as the mutated
      14            4               7             150              chromosome. In this paper, the mutation type is Gaussian
                                                                   function with Scale equal 1 and Shrink equal 1.
                                                                   Fitness Evaluation: The fitness function is computed by
4. Problem Formulation
                                                                   using the mean time delay as given in Equation 3. This
The optimization problem of the ATM network is                     fitness is based on a given objective function on level 2
implemented in a hierarchical manner. Two levels of GAs            which is the minimum time delay over the evolved network
are used.                                                          in level 1. Each chromosome in the population is assigned a
• GAs Level 1 is used to select the best network topology          specific value associated with the gene arrangement in order
    and forward it to GA Level 2. The ATM network should           to select the best individuals. Finally, the effectiveness of the
    be effectively connected such that at least half the           proposed algorithm was tested based on the GA utilization.
    network bandwidth is busy.                                     The GA utilization criterion can be computed as given in
• GAs level 2 computes the minimum delay over the                  Equation 4.
    network. In GAs level 2 we determine the (fi) parameters                           f
    for each network link (i).                                         Utilization =    i                            (4)
HGA requires number of steps for the problem formulation                               C
as shown below:                                                    Improving GA utilization in all cases will increase the flow
Encoding Mechanism: This step is used to encode the                assignment of the links for the ATM network. HGA requires
variables of the optimization problem in terms of genes. In        number of tuning parameters in accordance with GA
this work, a table was created for all pairs of links              optimization. We run GA using various population sizes in
combination. The links in the table correspond to the virtual      the two levels of HGA. The corresponding results of the
paths included between pair of nodes. In the proposed              network topology for the various population sizes are shown
algorithm each link is identified by an ID number which is         in Figures 3, 4, 5, 6, 7, 8, 9, 10 and 11.
in accordance to the row number in the table. The proposed
GAs will have 14 genes. Each gene corresponds to a link
and each link has an identified (Ci).
Initialization: This step uses the encoding method to create
a random initial population by randomly generating a
suitable number of chromosomes. In this paper, the
chromosome length equals to the number of links in the
original network.
Number of Populations: Various population sizes were used
while running GA in each level.
Selection Mechanism: Selection schemes helps in
determining the convergence properties of GAs. A selection          Figure 3. Network Topology evolved by Pop. Size L1 = 10
scheme in GAs is known as the process which favorably                                and Pop. Size L2 = 25
selects better individuals in the current population for the
mating pool [19], [20]. The selection method determines
how individuals are chosen for mating. The first step in the
                                                          (IJCNS) International Journal of Computer and Network Security, 59
                                                                                                     Vol. 2, No. 3, March 2010

                                                              Figure 8. Network Topology evolved by Pop. Size L1 = 30
Figure 4. Network Topology evolved by Pop. Size L1 = 10             and Pop. Size L2 = 75. Delay time = 10.7585
      and Pop. Size L2 = 50. Delay time = 11.0223

                                                              Figure 9. Network Topology evolved by Pop. Size L1 = 50
                                                                   and Pop. Size L2 = 25. Delay time = 10.76630
Figure 5. Network Topology evolved by Pop. Size L1 = 10
     and Pop. Size L2 = 75. Delay time = 10.76282

                                                              Figure 10. Network Topology evolved by Pop. Size L1 = 50
                                                                    and Pop. Size L2 = 50. Delay time = 10.7643

Figure 6. Network Topology evolved by Pop. Size L1 = 30
      and Pop. Size L2 = 25. Delay time = 10.8009

                                                              Figure 11. Network Topology evolved by Pop. Size L1 = 30
Figure 7. Network Topology evolved by Pop. Size L1 = 30                        and Pop. Size L2 = 75
      and Pop. Size L2 = 50. Delay time = 10.7581
60                                                                (IJCNS) International Journal of Computer and Network Security,
                                                                                                             Vol. 2, No. 3, March 2010

The HGA related parameters used in the experiments were              was presented to show the performance of the proposed
determined as shown in Table 2.                                      HGA algorithm. Figure 12 shows the convergence process of
                                                                     GAs with various population sizes for both level 1 and level
     Table 2: Parameters evolved for GA-based experiments            2.

  Operator                     Type

  Creation function            random initial with uniform

  Initial range                lower bound is 1 and upper bound
                               is 95% of line capacity

  Selection mechanism          Stochastic uniform

  Crossover type               Scattered function
                               Gaussian function with
  Mutation type                Scale = 1 and Shrink = 1

  Maximum generations          50

5. Experimental Results
From the developed results, the proposed HGA was able to
provide number of ATM network with various topologies.
Having a closer look to each developed structure, we can               Figure 12. The convergence process of GAs with various
find that all evolved network have seven links except one                                 population sizes
network which has 8 links (see Figure 4). This network has
the maximum delay which is expected since the number of              The algorithm converges to the optimal solution at ”high”
links increased. The evolved network were able to achieve            speed and finds a good solution in less than 20 generations
the required criteria which is specified by the designer (i.e.       of running. Moreover, the algorithm reached a solution with
increasing the network throughput to at least 50% of the             the lowest (i.e. optimal) delay in most cases. In some cases,
network capacity and manage the traffic to be with                   the algorithm finds the optimal solution very quickly;
minimum delay). The developed network could be unreliable            however, there are some cases where longer convergence
in some sense because the reduced number of links may                times are observed in order to obtain the optimal solution.
cause a problem if failure occurs in a link. This could be
another objective to investigate in the future. Of course the        6. Conclusions and Future Work
best reliable network will be the fully connected network.           A Hierarchical Genetic Algorithms (HGA) based
This will be, of course, a very expensive network to                 optimization mechanism for Asynchronous Transfer Mode
implement. The computed delay times for various population           (ATM) network has been formulated. Minimizing the total
sizes of the GA in levels 1 and 2 are shown in Table 3.              cost is mainly the purpose of the proposed approach,
                                                                     subsequently; the work addresses the maximum allowable
                                                                     flow assignment in each link while simultaneously keeping
     Table 3: Delay time for various Pop. sizes of GA levels         the overall delay within the minimum acceptable range. It
                                                                     can be inferred from the results obtained that ATM network
       Description    GAs level 1     GAs level 2   Delay time       design using HGA produces good network plans in terms of
       Pop. Size          10              25        10.81690         network throughput and GA utilization. Also, it allows more
       Pop. Size          10              50        11.02230         flexibility in the traffic management, and less complexity of
       Pop. Size          10              75        10.76282         the planning task. It is suggested to improve the current
                                                                     work by adding new issues related to dynamic capacity
       Pop. Size          30              25        10.80090
                                                                     allocation within the network. Additionally, improvement
       Pop. Size          30              50        10.75810
                                                                     can be achieved if using Parallel Genetic Algorithms
       Pop. Size          30              75        10.75850         (PGAs). This way the computation time can be reduced to a
       Pop. Size          50              25        10.76630         reasonable computational effort.
       Pop. Size          50              50        10.76430
       Pop. Size          50              75        10.76006         References
                                                                     [1] L. Painton and J. Campbell, “Genetic algorithms in
It was found that the minimum delay was achieved with                    optimization of system reliability,” IEEE Transactions
population size 30 for GA level 1 and 50 for GA level 2. In              on Reliability, vol. 44, pp. 172–178, 1995.
general, as a common practice, the convergence of the GA
                                                               (IJCNS) International Journal of Computer and Network Security, 61
                                                                                                          Vol. 2, No. 3, March 2010

[2] D. Raychaudhuri and D. Wilson, “ATM–based                          networks: Genetic algorithm and tabu search
     transport architecture for multiservices wireless                 approach,” International Journal of Computer Science,
     personal communication networks,” IEEE Journal On                 vol. 1, no. 3, 2006.
     Selected Areas In Communications, vol. 12, no. 8, pp.        [18] R. Susmi, A. M. Sherry, and B. V. Reddy, “ATM
     1401–1413, 1994.                                                  network planning: A genetic algorithm approach,”
[3] H. El-Madbouly, “Design and bandwidth allocation of                Journal of Theoretical and Applied Information
     embedded ATM networks using genetic algorithm,” In                Technology, vol. 1, pp. 74–79, 2007.
     Proceedings of World Academy of Science,                     [19] D. Thierens and D. E. Goldberg, “Convergence models
     Engineering and Technology, vol. 8, pp. 249–252,                  of genetic algorithm selection schemes,” In PPSN III:
     2005.                                                             Proceedings of the International Conference on
[4] D. W. Coit and A. E. Smith, “Reliability optimization              Evolutionary Computation. The Third Conference on
     of series-parallel systems using genetic algorithm,”              Parallel Problem Solving from Nature. London, UK:
     IEEE Transactions on Reliability, vol. 45, pp. 254–260,           Springer-Verlag, pp. 119– 129, 1994.
     1996.                                                        [20] B. L. Miller and D. E. Goldberg, “Genetic algorithms,
[5] Alaa Sheta, Mohammad Salamah and Malik Braik,”                     selection schemes, and the varying effects of noise,”
     Topology Optimization and Traffic Management in                   Evolutionary Computation. vol. 4, no. 2, pp. 113–131,
     Telecommunication Network Using Hierarchical                      1996.
     Genetic Algorithms”, In the Proceedings of
     ICICIS2009, Ain Shams Univ., Cairo, Egypt, pp. 143-          Authors Profile
     148, March, 2009.
[6] E. lbaum and M. Sidi, “Topological design of local-
     area networks using genetic algorithms,” In                                         Alaa Sheta received his B.E., M.Sc.
     IEEE/ACM Transactions on Networking, vol. 4, pp.
                                                                                         degrees in Electronics and Communication
     766–778, 1996.
[7] K. Walkowiak, “Genetic algorithms for backup virtual                                 Engineering from Faculty of Engineering,
     path routing in survivable ATM networks,” In                                        Cairo University in 1988 and          1994,
     Proceedings of MOSIS 99, vol. 2, pp. 123–130, 1999.
                                                                                         respectively. A. Sheta received his Ph.D.
[8] A. Kasprzak and K. Walkowiak, “Algorithms for flow
     assignment ATM virtual private networks,” In                                        degree    from   the    Computer     Science
     Proceedings Of First Polish-German Teletraffic               Department, School of Information Technology and Engineering,
     Symposium PGTS 2000, vol. 2, pp. 24–26, 2000.
[9] E. Alba, “Parallel evolutionary algorithms in                 George Mason University, Fairfax, VA, USA. His published work
     telecommunications: Two case studies,” In Proceedings        exceeds 70 publications between book chapters, journal papers,
     of the CACIC02, Buenos Aires, Argentina, 2002.               conferences and invited talks. His research interests include
[10] L. He and N. Mort, “Hybrid genetic algorithms for
     telecommunications network back-up routing,” BT              Evolutionary Computation, Computer Networks, Image Processing,
     Technology Journal, vol. 18, no. 4, pp. 42–50, 2000.         Software Reliability and Software Cost Estimation. Currently, Dr.
[11] L. Xian, “Network capacity allocation for traffic with
                                                                  Sheta is a Professor with the College of Computers and Information
     time priorities,” Journal of International Network
     Management, vol. 13, pp. 411–417, 2003.                      Systems and the Director of the Vision and Robotics Laboratory at
[12] C. Rose and R. Yates, “Genetic algorithms and call           Taif University, Taif, Saudi Arabia. He is on leave from the
     admission      to     telecommunications     networks,”
                                                                  Electronics Research Institute (ERI), Giza, Egypt.
     Computers and Operations Research, vol. 23, pp. 9–6,
[13] L. Davis and Coombs, Optimizing networks link sizes                                 Malik Braik received his B.Sc. degree in
     with genetic algorithms. Modeling and Simulation
     Methodology, Knowledge System’s Paradigms,                                          Electrical Engineering from Faculty of
     Amsterdam, The Netherland: Elsevier, 1989.                                          Engineering, Jordan University of Science
[14] S. Pierre and H. H. Hoang, “An artificial intelligence                              and Technology in 2000. Five years later,
     approach for improving computer communication
     network design,” Journal Of Operational Research                                    M. Braik received his M.Sc in Computer
     Society, vol. 41, no. 5, pp. 405–418, 1990.                                         Science from Department of Information
[15] M. Gerla, J. A. S. Monteiro, and R. Pazos, “Topology
                                                                  Technology, Al-Balqa Applied University, Jordan in 2005. His
     design and bandwidth allocation in ATM nets,” IEEE.
     JSAC, vol. 7, no. 8, pp. 1253–1262, 1989.                    research interests focus on Evolutionary Computation, Image
[16] A. Sheta, M. Salamah, H. Turabieh, and H. Heyasat,           Processing, Data Security and Computer Networks. Currently,
     “Selection of appropriate traffic of a computer network
                                                                  Braik is working with the Department of Information Technology,
     with fixed topology using GAs,” International Journal
     of Computer Science, IAENG, vol. 34, no. 1, 2007.            Prince Abdullah Bin Ghazi Faculty of Science and Information
[17] S. Routray, A. Sherry, and B. Reddy, “Bandwidth              Technology, Al-Balqa Applied University, Al-Salt, Jordan.
     optimization through dynamic routing in ATM
62                                                                 (IJCNS) International Journal of Computer and Network Security,
                                                                                                              Vol. 2, No. 3, March 2010

                     Mohammad Salameh received his B.E.
                     degree in Computer Science from Faculty of
                     King Abdullah II School for Information
                     Technology (KASIT), University Of Jordan
                     in 2005, and in 2009 Mohammad received
                     his M.Sc. degree in Computer Science from
Faculty of Graduate Studies and Scientific Research, Al-Balqa`
Applied University in 2009. Mohammad Salameh is a joiner
researcher; his research interest fields are Robotics Design and
Programming, Evolutionary Computation, Computer Networks,
Image Processing. Mohammad is a Robotics Trainer and
Programmer in the National Education Center for Robotics
(NECR), King Hussein Foundation, Amman, Jordan.
                                                                     (IJCNS) International Journal of Computer and Network Security, 63
                                                                                                                Vol. 2, No. 3, March 2010

 Capacity Enhancement of 3G Cellular System using
  Switched Beam Smart Antenna with Windowed
                  Beam former
                            Prof. T. B. Lavate1, Prof. V. K. Kokate2 , Prof. Dr A. M. Sapkal 3
                                    Department of E & T/C, College of Engineering Pune, Maharashtra, India,
                       Department of E & T/C,Indira College of Engineering & Management, Pune, Maharashtra, India,
                                   Department of E & T/C, College of Engineering Pune-5, Maharashtra, India,

Abstract: The 3G cellular networks are being designed to                CDMA all subscribers use same frequency & this creates
provide high bit rate services, multimedia traffic, in addition to      inter-cell & intra-cell co-channel interference. Thus the
voice calls within the limited bandwidth available. The suitable        actual performance of CDMA system is still interference
solution to the bandwidth limitation is the smart antenna. The
                                                                        limited and is affected by adverse channel conditions created
smart antennas at the base station of cellular system have the
interference rejection or signal to interference plus noise             by multipath propagation. It is obvious that the capacity of
improvement capability and in turn to improve the capacity of           CDMA based wireless communication system can be
cellular system. The smart antennas can generally be classified         improved by different interference reduction techniques &
as either switched beam or adaptive array smart antenna.                that can be achieved by using smart antennas such as
However switched beam smart antenna is cheaper to implement             switched beam smart antenna (SBSA) or adaptive array
in many applications and hence investigated here much in                smart antenna . In this paper section 2. describes switched
                                                                        beam smart antenna used to improve the capacity of
      Switched beam smart antenna (SBSA) creates a group of
                                                                        CDMA cellular system.
overlapping beams that together result in omni directional
coverage. SBSA has the interference rejection capability
depending on side lobe level. The simplest way to reduce the side
lobe level and improve the SINR of SBSA is to use non adaptive
                                                                        2. Switched Beam Smart Antenna and its
windowed beam forming functions. In this paper performance of              Array Pattern
linear SBSA has been investigated using MATLAB for various
windowed beam forming functions such as Hamming, Gaussian                    2.1 Concept of SBSA
and Kaiser-Bessel functions. It has been observed that the              Depending upon the various aspects of smart antenna
Kaiser-Bessel weights provide one of which lowest array side
                                                                        technology they are categorized as switched beam smart
lobe levels still maintaining nearly the same beam width as
uniform weights and consequently Kaiser-Bessel function can             antenna and adaptive array smart antenna. Here we
widely be used with SBSA to improve the capacity of 3G cellular         investigate switched beam smart antenna in detail. The
system.                                                                 switched beam smart antenna (SBSA) has multiple fixed
                                                                        beams in different directions & this can be accomplished
  Keywords: SBSA, DS/CDMA, Windowed Beam forming                        using feed network referred to as beam former & most
                                                                        commonly used beam former is Butler matrix. In terms of
1. Introduction                                                         radiation patterns switched beam is an extension of cellular
Nowadays the wireless operators are faced with increasing               sectorization method of splitting a typical cell. That is
capacity demands for both voice & data services. To achieve             switched beam antenna increases the capacity of cellular
this, multiple access techniques such as TDMA & CDMA                    system by creating micro sectors and each micro sector
can be employed. For instance in TDMA based wireless                    contains a pre-determined fixed beam pattern with greatest
communication system (2G systems) the frequency reuse                   sensitivity located in the centre of the beam & less sensitivity
factor is normally greater than 6. That is these systems                elsewhere. The receiver selects the beam that provides
employ the frequency reuse concept which increases their                greatest signal enhancement & interference reduction.
capacity to some extent. But this frequency reuse concept               Actually SBSA enhances receive signals & switch from one
creates the co-channel interference. In CDMA systems the                beam to another as the desired user moves throughout the
frequency reuse factor is 1 which enables it to offer higher            sector. An N beam switched beam antenna generally
capacities & the capacity improvement by CDMA                           provides an N-fold antenna gain and some diversity gain by
technology may be as high as 13 times that of TDMA. But in              combining the received signal from different beams as
64                                                                      (IJCNS) International Journal of Computer and Network Security,
                                                                                                                   Vol. 2, No. 3, March 2010

shown in Fig.1.                                                            as shown in Fig. 2. It is obvious that N element SBSA forms
                                                                           N spatial channels whose input signal is given by

                                                                           S = [S1 S2 S3 ------- SN ]

        Beam-2           B                                                 where Si = √Pi*[1 e-jφi e-j2φi e-j3φi ……. e-j (N-1)φi ] is the
                         e                                                 ith user signal φi=2πd/λ*sinΦ i ; Φi is the ith user angle of
                         m                                                 arrival signal with power Pi. Taking into account an
                                                  Signal output            equation (1) and equation (3) the output of SBSA is
     Interference        f               Beam
     Signal              o               Select
                         r                                                 Y=AHS                                       =          [Y1                 Y2               Y3          ----------YN]
       Beam-3            e                                                 (4)

        Beam-4                                                             If all users are located exactly as өi = Φi; the vector Yi=[0, 0,
                                                                           0, 0, √Pi, 0, 0, --- 0]. But if өi ≠ Φi; , we have to evaluate
           Desired signal Direction                                        the maximum element of each vector to detect active users.

            Figure 1. Switched beam smart antenna.

However these switched beam smart antennas have non                                                            -10
uniform gain with respect to AOA due to scalloping & they

                                                                                 Norm aliz ed power gain(dB)
can also have a problem with locking into the wrong beam
due to multi path fading or interference and provide limited
interference suppression since they can't suppress the                                                         -25

interference if it is in the same beam as the desired signal.                                                  -30
Hence switched beam smart antenna solutions work best in                                                       -35
minimal to moderate co-channel interference scenario.
Further they are often much less complex and are easier to
retro-fit to existing wireless technologies.                                                                   -45

     2.2 Signal model and array pattern of SBSA                                                                  -60        -40         -20             0         20          40        60
The SBSA creates a number of two way spatial channels on
a single conventional channel in frequency, time or code.                     Figure 2. SBSA Array pattern for number of antenna
Each of these spatial channels has the interference rejection                                      elements N = 8.
capabilities of the array depending on side lobe level (γ).The             It is apparent from Fig.2 that the array factor of SBSA has
steering matrix for N element SBSA is given by                             side lobe level γ= -16 dB. The presence of side lobes means
A= [a1 a2 a3 ------- aN ]                                         (1)      the array radiates in untended directions or the side lobes
                                                                           can receive the same signal from multiple angles which may
                                                                           cause fading in communication systems. These harmful side
where ai = [1 e-jΨi e-j2Ψi     e-j3Ψi ……. e-j (N-1)Ψi ] is the             lobes of SBSA can be suppressed by windowing the array
steering vector; Ψi=2πd/λ*sinөi ; өi is the ith reference                  elements also called as array weighting and is discussed in
angle, d is the spacing between the antenna elements. The                  section 3.
matrix A forms the special filters with orthogonal properties
aiH ak =N, if i=k; and aiH ak =0, if i≠k.                                  3. WINDOWED BEAM FORMERS FOR SBSA
   In practice the SBSA creates several simultaneous fixed
beams through the use of equation (1) and Butlar Matrix
theory. With Butlar Matrix for SBSA of N elements the
array factor can be given as
             sin[Nπd/λ (sinө - sinөℓ)]
AF(ө) =                                                            (2)
                Nπd/λ (sinө - sinөℓ)                                                                                 wN/2    w2         w1            w1     w2        wN/2
where sinөℓ = ℓλ/Nd; ℓ= ±1/2, ±3/2, ------- ± (N-1)/2. If
the element spacing is d = λ/2 the beams of SBSA are evenly
distributed over the span of 1800 and using MATLAB 7.0                     Figure 3. N Element linear antenna array with
equation (2) for N=8 is simulated and simulation results are                         weights.
                                                                 (IJCNS) International Journal of Computer and Network Security, 65
                                                                                                            Vol. 2, No. 3, March 2010

The array factor of N element uniform linear array is given
                                                                                                                                       Hamming window
AF(ө) =                                                     (5)
                                                                                                                                       Boxcar window
            N (sinΨ/2)

where Ψ= kdsinө + β, β is the phase shift from element to
element. But such uniform linear array also called Boxcar                               -20
window, exhibits side lobe levels of about γ = -16 db. The
array side lobes can be suppressed by weighting or

                                                                            |A F |d B
windowing the array elements as shown in Figure 3. The                                  -30
array factor of such N linear element windowed array is
given by

 AFn (ө) = Σ wncos((2n-1/2)kdsinө)
To determine the weights wn there are number of useful
window functions that can provide weights for each element                                -90     -60         -30       0        30          60         90
in array viz. Hamming, Gaussian, Kaiser-Bessel functions                                                                θ
etc. By carefully controlling the side lobes in windowed
                                                                    Figure 4. Array factor with Hamming weights for N=8
SBSA arrays,        most interference can be reduced to
insignificant level. But side lobe suppression is achieved at
the expense of main lobe beam width. These windowed non                   3.1.2     Gaussian weight function: The Gaussian
adaptive beam formers have advantages as:                           weights are found by Gaussian function to be

•  Cheaper to implement than adaptive beam forming,                 w (n+1)= exp((-0.5(α (n-N/2)/N/2) 2)
•  No main lobe distortions due to interference,                    (8)
•  Any level of side lobe suppression is possible with correct                where n=0,1,…,N                                      α≥2
   choice of windows.
The disadvantages of windowed beam former are:                      The Gaussian array weights can be determined using the
• Distribution and power of interference affects its                gaussian(N) command in        MATLAB. The normalized
   performance,                                                     gaussian array weights for N=8 and α=2.5 are
• Increase in main lobe beam width (∆).
                                                                     w1=1, w2=0.6766, w3=0.3098 and w4=0.0960.
     3.1 Window weight functions for SBSA
The useful window functions for SBSA are investigated               The Gaussian weighted array factor is plotted in Fig..5
                                                                                                                                 Gaussian window
     3.1.1 Hamming weight function :           The Hamming
                                                                                                                                 Bxcar window
weights are chosen by                                                                 -10

w(n+1)=0.54 -0.46 cos[2πn/(N-1)]                       (7)
             where n = 0, 1, 2, ……. ,N-1.
The hamming array weights can be found using the
                                                                          |A F |d B

hamming(N) command in MATLAB. Array pattern for N=8
elements with normalized Hamming weights for linear array
is plotted in Fig. 4. It is apparent that Hamming weights
provide side lobe suppression γ = -39 db at the expense of
large increase in beam width ∆=2.                                                     -50

    Table 1: Hamming normalized weights for array N=8
                                                                                        -90     -60     -30         0       30        60           90

      Weight types      w1     w2         w3        w4              Figure 5. Array factor with Gaussion weights for N=8
                                                                    It is clear that Gaussian weighted array pattern provides side
                                                                    lobe suppression γ = -48dB with increase in main lobe beam
       Hamming           1    0.673     0.2653    0.0838
                                                                    width ∆=1.85
66                                                                                         (IJCNS) International Journal of Computer and Network Security,
                                                                                                                                      Vol. 2, No. 3, March 2010

        3.1.3 Kaiser-Bessel weight function: The Kaiser                                       lobe beam width (∆=1.2) compared to Hamming and
Bessel weights are determined by                                                              Gaussian weight functions & hence Kaiser Bessel weight
                                                                                              functions are chosen to suppress the side lobes in switched
                                                                                              beam smart antenna. (SBSA)
w (n) =
(9)                                                                                           4.                    Performance analysis of Kaiser-Bessel
                                                                                                                    windowed SBSA and simulation results
                                                                                              We consider the DS/CDMA system model in which the data
                                      where         n= 0,…..,N/2, α>1                         is modulated using BPSK format. The pulse and PN code
                                                                                              amplitudes are all independently and identically distributed
The Kaiser-Bessel normalized weights for N=8 are found                                        random variables. We assume that the PN code length
using the Kaiser(N,α) command in MATLAB .                                                     M=128 & the power of each mobile station is perfectly
                                                                                              controlled by the same base station BS which employs
Table 2: Kaiser-Bessel normalized weights for array                                           switched beam smart antenna.
                                                                                              As shown in [2] the bit error rate (BER) for DS-CDMA,
                   Weight types                w1         w2         w3          w4           1200 sectorized systems is given by
                   Kaiser-Bessel               1      0.8136        0.5136     0.210

The Kaiser-Bessel weighted array factor is plotted in Fig 6                                   Pe = Q                                                                          (10)
using MATLAB; in which γ = -33 db and ∆=1.2.
                                                                                              where Eb(1)/N0 is SINR for user of interest #1, Eb(k)/N0 is the
                                                                                              same for interfering users.
                                                                      Boxcar window           We extended equation (10) to switched beam smart antenna

                                                                                               Pe= Q                                                                          (11)
     |A F |d B


                                                                                              where k1 is the number of interfering users with same PN
                 -40                                                                          code like user #1 affected side lobe, k2 is the number of
                                                                                              interfering users affected main lobe & k3 is like k2 but
                                                                                              affected side lobes.

                 -60                                                                                                                                 120 deg. sect. Antenna
                   -90          -60      -30          0        30         60          90                                                             Boxcar SBSA
                                                      θ                                                              -2                              Kaiser-Bessel SBSA
Figure 6. Array factor with Kaiser-Bessel weights N=8

  Table 3: Important parameters of windowed beams for                                                               10
                                                                                                   Bit Error Rate

               N=8 element linear array
       Window            Beam width        γ
                         (∆)             (db)                                                                       10
       Boxcar              1.0          -16
                       Hamming                        2.0              -38                                           -8

                       Gaussian                      1.85              -48
                       (α = 2.5)
                       Kaiser-Bessel                  1.2              -33                                          10
                                                                                                                           0   2   4   6         8      10        12          14
                       (α = 3.0)                                                                                                        Eb/No dB

                                                                                              Figure 7. The BER performance for DS/CDMA and
Table3. shows that Kaiser-Bessel function provides side lobe                                  switched beam smart antenna for 100 users and N=8
suppression γ = -33dB but with minimum increase in main
                                                                   (IJCNS) International Journal of Computer and Network Security, 67
                                                                                                              Vol. 2, No. 3, March 2010

 For Boxcar (non windowed) SBSA the side lobe level (as               [5]   Md. Bhakar, Vani R. M., P. V. Hunagund, “Smart
shown in fig.2) γ = -16 db. While as Kaiser-Bessel weights                  Antennas Systems: Concepts of Beam steered Array
shown in Table 2 can be selected for SBSA so that its side                  Configurations”, Proceedings of IEEE International
lobe level (as shown in fig.6) can be reduced to γ= -33db.                  symposium on microwaves 2008, Banglore section
Using MATLAB 7.0 equation (10) and equation (11) with                 [6]   David    Cabrera,    Joel   Rodriuez,Adviser:Victor
γ= -16 db. & γ= -33db are simulated.                                        V.Zaharov, “ Switched Beam Smart Antenna BER
                                                                            Performance analysis for 3G CDMA Cellular
That is using equation (10) & (11) the simulation results are               Communication”, Polytechnic University of Puerto
presented in Fig 7. where BER as a function of Eb/N0 and                    Rico.
number of active users = 100 in the service area is plotted.
Fig. 7 presents BER of DS/CDMA system with conventional               Authors Profile
1200 sectored antenna, no windowed SBSA (N=8, γ= -16dB)
& Kaiser Bessel windowed SBSA (N=8, γ = -33dB). As
follows from Fig. 7 for the fixing level of BER, e.g. for 3G                         T.B. Lavate received ME (Microwave)
communication system acceptable BER is        Pe =10-4 , by                          degree in E&T/C in 2002 from Pune
the application of SBSA the number of active users in                                University. He is pursuing his Ph.D. in
conventional CDMA system can be increased up to 1.12                                 College of Engineering, Pune-5 affiliated to
times for no windowed SBSA antenna and up to 1.4 times                               pune university. He has published nine
with Kaiser- Bessel windowed SBSA antenna. i.e Kaiser-                               papers on wireless communication & smart
Bessel windowed SBSA antenna can increase the number of               antenna. He is member of IETE & ISTE.
active users in 3G system significantly without losing of
performance quality.
                                                                                    V. K. Kokate graduated in E & T/C from
                                                                                    University of Pune in 1973 and received his
5. Conclusion                                                                       Masters in E & T/C (Spl: Microwave) from
In this paper the performance analysis of windowed SBSA is                          the University of Pune..
investigated. The relation of BER for DS/CDMA is extended             Presently he is working as H.O.D. of E&TC Engineering
for the case of application of SBSA at base station. As a             Department of Indira College of Engineering, , Pune. having
                                                                      over 35 years experience in teaching and administrative. His
result shows, the application of Kaiser-Bessel windowed
                                                                      fields of interests are Radar, Microwaves, Antennas and
SBSA improves the BER which in turn increases the active
                                                                      EMI & C. He is a Fellow Member of IETE and Member
users in conventional CDMA system significantly & hence
                                                                      of ISTE/IEEE.
SBSA is still an attractive solution to increase the capacity of      In his credit, he has about twenty papers published in
existing 3G cellular wireless communication system.                   International/National repute Conferences/ Journals.

References                                                                            A.M.Sapkal graduated in E&TC from
                                                                                      University of Pune in 1987 and received
[1] L.C.Godara,“Application of antenna arrays to mobile                               his Masters in E & TC (Spl: Microwave)
    communications II: Beamforming & direction of                                     from the University of Pune in 1992 and
    arrival conciderations”, Preceedings of IEEE,volume                               obtained his Ph.D in 2008. Presently he is
    85,issue 8,August 1997, pages 1195-1245.                          working as Professor in Dept. of E &TC Engineering of
[2] T. S. Rappaport,“ Smart antennas for wireless                     College of Engineering, Pune. Having, over 20 years
    communications,” Prentice Hall, India 2005.                       experience in teaching, his fields of interests are power
[3] Frank Gross ,“ Smart antennas for wireless                        electronics, microwaves, and image processing. He is a
    communication,” McGraw-Hill, New York 2005                        member of ISTE, IETE & IEEE.
[4] J. C. Liberti, T. S. Rappaport, “Smart antennas for               In his credit, he has about twenty five papers published in
    wireless communications: IS-95 and Third Generation               National / International repute Conferences/Journals.
    CDMA Applicatons”, Prentice Hall PTR, New Jersey
68                                                               (IJCNS) International Journal of Computer and Network Security,
                                                                                                            Vol. 2, No. 3, March 2010

          DDOM: The Dynamic Data Oriented Model for
                 Image Using Binary Tree
          A.Shahrzad Khashandarag1*, A.Mousavi2, R.Aliabadian3, D. Kheirandish4 and A.Ranjide Rezai5
                               Young Researchers Club of Tabriz, Islamic Azad University Tabriz Branch,
            2                                  3                         4                                 5

                                                                     GIF (Graphics Interchange Format) is an 8-bit-per-pixel
     Abstract: This paper presents a dynamic data oriented
model (DDOM) of image. The ability of model is very fast image       bitmap image format that was introduced by CompuServe in
processing against Data oriented Model that Habibizad and            1987 and has since come into widespread usage on the
cooperators proposed in [8]. In our approach, the Sobel              World Wide Web due to its wide support and portability.
algorithm is used for edge detection of image and histogram
thresholding is used for clustering of image and binary tree is      The format uses a palette of up to 256 distinct colors from
used for anatomy of model. Each node of this tree represents the     the 24-bit RGB color space. GIF images are compressed
feature of image or sub image. By using the presented model in       using the LZW lossless data compression technique to
this paper, tasks as measuring similarity ratio, segmentation,       reduce the file size without degrading the visual quality
clustering … can be done with high desired precision and             [10].
corresponding speed [8].
   Keywords: Data oriented modeling; Image Segmentation;             In computing, JPEG (pronounced JAY-peg) is a commonly
histogram thresholding; Binary Tree.                                 used standard method of compression for photographic
                                                                     images. The name JPEG stands for Joint Photographic
1. Introduction                                                      Experts Group, the name of the committee who created the
Recently many researchers have been studied on data                  standard. The group was organized in 1986, issuing a
structures for image processing tasks. In [1-7] has been             standard in 1992, which was approved in 1994 as ISO
explained the data structures of images. The main idea of            10918-1. The compression method is usually lossy
this paper is to present an optimized and dynamic data               compression, meaning that some visual quality is lost in the
oriented model of image. Dynamic Data Oriented Modeling              process, although there are variations on the standard base
(DDOM) is an approach which models concepts by using                 line JPEG, which are lossless. There is also an interlaced
the data structure. We have introduced dynamic data                  "progressive" format, in which data is compressed in
oriented modeling of image for fast image processing. The            multiple passes of progressively higher detail. This is ideal
Conventional methods use the color of the pixels to model            for large images that will be displayed whilst downloading
the image and try to reduce the size of image (Compression)          over a slow connection, allowing a reasonable preview
[8]. Previous image models are:                                      before all the data has been retrieved [11].

      •   BMP                                                        DOM (Data Oriented Model) proposed by Habibizad and
      •   JPEG                                                       cooperators. This model is design for tasks that are very fast.
                                                                     In the related works section, this model will be explained.
      •   GIF
      •   DOM
                                                                     2. Related Works
.BMP or .DIB (device-independent bitmap) is a bitmapped              In this paper we want to optimize the model of DOM which
graphics format used internally by the Microsoft Windows             the Habibizad and cooperators proposed in [8]. Habibizad
and OS/2 graphics subsystem (GDI), and used commonly as              and cooperators in [8] proposed:
a simple graphics file format on those platforms. This
format is in two parts, Part one, is the data, which indicate
whole image features including width, height, color palette              2.1 Data Oriented Modeling
etc. The second part consists a block of bytes that describes        Habibizad and cooperators suppose that Fig1 is the image
the image, pixel by pixel. Pixels are stored starting in the         for data oriented modeling. Fig. 2 shows ADBT of Fig. 1.
bottom left corner going from left to right and then row by          ADBT is Average-Difference-Binary-Tree-of-Image which
row from the bottom to the top. Each pixel is described              is stored in an array. This ADBT has three levels, numbered
using one or more bytes [9].                                         as 0, 1 and 2. The features of pixels are stored in the leaves.
                                                                     Features of F are obtained by combining features of A and
                                                                     C. In the same way, features of G are obtained from B and
                                                            (IJCNS) International Journal of Computer and Network Security, 69
                                                                                                       Vol. 2, No. 3, March 2010

D. finally features of the entire image, E, are obtained by     Fig. 6 shows segmented of Fig. 5. This segmented image is
combining features of F and G. By putting F and G together,     created with histogram thresholding. Fig. 7 shows the
we can achieve smooth of original image as is shown in Fig.     reverse N for image processing in this model. Fig. 8 shows
3 [8].                                                          ADBT of Fig. 6. This ADBT has three levels, numbered as
                                                                0, 1 and 2. The features of regions are stored in the leaves.
Fig. 4 shows the array, which stores the ADBT of Fig. 2.        Features of L0 are obtained by combining features of R0 and
                                                                R1. In the same way, features of L1 are obtained from R2
                                                                and R3. Finally features of the entire image, L2, are
                                                                obtained by combining features of L0 and L1. By putting L0
                                                                and L1 together, we can achieve smooth of original image
                                                                as is shown in Fig. 9. Fig. 10 shows the ADBT of Fig. 6 that
                 Figure 1. an   I 2 Image [8].                  has been stored in an array.

                                                                In Fig.8 A and B and D have the similar intensity.

                                                                     3.2   Edge detection with Sobel Algorithm
                                                                Edges characterize boundaries and are therefore a problem
                                                                of fundamental importance in image processing. Edges in

            Figure 2. ADBT of an      I2   image [8].

           Figure 3. Smoothed of original image [8].
                                                                                Figure 6. a segmented image.

        Figure 4. ADBT of Fig. 2 stored in an array [8].

For ease of understanding, mentioned steps are described
top to down; but for enhancing speed of making ADBT, it
will be created down to top [8]. After that leaves will be
initialized by values of produced vector. Therefore, count of
leaves is equal to count of pixels of image. Each leaf is
corresponded to a pixel of original image and its A and D
are same as the pixel’s color. For each non-leaf node, A is
equal to average of its children’s A and D is equal to
difference of its children’s A [8].
                                                                        Figure 7. the reverse N for image processing.

3. Our Works

    3.1      Dynamic Data Oriented Modeling
This paper presents a dynamic data oriented model
(DDOM) of image. To illustrate the concept, Fig. 5 shows a
3 3 images, which have nine pixels, labeled A, B, C, D, E, F,
G, H and I respectively.

                                                                                   Figure 8. ADBT of Fig.8

                                                                             Figure 9. Smoothed of original image
                 Figure 5. An instance Image
70                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

         Figure 10. ADBT of Fig. 8 stored in an array

-es are areas with strong intensity contrasts – a jump in
intensity from one pixel to the next. Edge detecting an
image significantly reduces the amount of data and filters
out useless information, while preserving the important
structural properties in an image. There are many ways to
perform edge detection. However, the majority of different
methods may be grouped into two categories, gradient and
Laplacian. The gradient method detects the edges by looking
for the maximum and minimum in the first derivative of the
image. The Laplacian method searches for zero crossings in
the second derivative of the image to find edges [12].

The Sobel operator performs a 2-D spatial gradient
measurement on an image. The Sobel operator is shown in
Fig. 11.
                                                                         Figure 12. Edge detection with Sobel algorithm
Note: G is Gradient and f is Image.
                                                                      4.3    Image Segmentation Algorithm
                                                                 According to the S. Arora and cooperator’s results in article
                                                                 [13], segmentation algorithm is:

                                                                 Following steps describe the proposed algorithm for image

                                                                      1. Repeat step 2–6,               times; where n is the
                 Figure 11. Sobel Operator.                               number of thresholds.
                                                                      2. Range R = [a, b]; initially a = 0 and b = 255.
                                                        (1)           3. Find mean and standard deviation            of all the
                                                        (2)               pixels in R.
                                                                      4. Sub-ranges’ boundaries and are calculated as
                                                                                         and                                  ;
                                                                          where and are free parameters.
                                                                      5. Pixels with intensity values in the interval [       ]
                                                                          and [      ] are assigned threshold values equal to
                                                        (4)               the respective weighted means of their values.
                                                                      6. a = T1 + 1 ; b = T2 − 1 .
                                                                      7. Finally, repeat step         5    with               and
                                                                          with            .
                                                                 In Fig13 shown the result of image segmentation algorithm.
                                                        (6)      Also in Fig14 the result of histogram Lena is shown.

In Fig. 12 Shown the result of Sobel algorithm:
                                                                 4. Conclusion
                                                                 In this paper, a dynamic data oriented model for image is
                                                                 introduced which models image as a binary tree. Each node
                                                                 of this tree represents the feature of image or sub image. By
                                                                 using the presented model in this paper, tasks as measuring
                                                                 similarity ratio, segmentation, clustering … can be done
                                                                 with high desired precision and corresponding speed.
                                                                  (IJCNS) International Journal of Computer and Network Security, 71
                                                                                                             Vol. 2, No. 3, March 2010

                                                                          segmentation through a fast statistical recursive
                                                                          algorithm", pattern recognition letters 29 (2008) 119-
                                                                          125, published by Elsevier.

                                                                     Authors Profile
                                                                                        Asghar Shahrzad Khashandarag received the
                                                                                        B.S. degree in computer engineering from the
                                                                                        Payame Noor University Bonab Branch, Iran, in
                                                                                        2008, and the M.S. degree in computer
                                                                                        engineering from the Islamic Azad University
                                                                                        Tabriz Branch, Iran, in 2009, respectively.
                                                                     From 2008, he works as a researcher with the Young Researchers
                                                                     Club of Tabriz. He has published more than 10 papers in various
                                                                     journals and conference proceeding. His research interests include
 Figure 13. Results: Lena (a) Lena gray, (b) histogram, (c) 2        image processing, signal processing, wireless sensor network.
  level thresholding, (d) 4 level, (e) 6 level and (f) 8 level.
                                                                                      Alireza Mousavi received his B.Sc. in computer
                                                                                      engineering, software Engineering, from
                                                                                      Allameh     Mohaddes      Nouri     University,
                                                                                      Mazandaran, Iran, in 2008, and the M.S. degree
                                                                                      in computer engineering from the Islamic Azad
                                                                                      University Tabriz Branch, Iran, in 2010,
                                                                     respectively. His research interests include image processing,
                                                                     Residue Number systems, wireless sensor network.

                  Figure 14. Result of Histogram                                       Ramin Aliabadian received the B.Sc. degree in
                                                                                       computer engineering from the Shomal
                                                                                       University, Amole, Iran, in 2008, and the M.S.
                                                                                       degree in computer engineering from the Islamic
                                                                                       Azad University Arak Branch, Iran, in 2010,
References                                                                             respectively. His research interests include
[1] Zhiyong Wang, Dagan Feng, and Zheru Chi, “Region-                image processing, computer architecture, computer networks.
       Based Binary Tree Representation For Image
       Classification”, IEEE International Conference on
       Neural Networks & Signal Processing, Nanjing,
       China, 2003.
[2]    Xiaolin Wu, “Image Coding by Adaptive Tree-
       Structured Segmentation”, IEEE Transactions on                                  Davar Kheirandish Taleshmekaeil received
       Information Theory, VOL. 38, NO. 6, 1992.                                       the B.Sc. degree in Computer Hardware
[3]    G.S.Seetharaman, B.Zavidovique, “Image Processing in                            engineering from the Allameh Mohaddes Nouri
       a Tree of Peano Coded Images”, Computer Architecture                            University, Mazandaran, Iran, in 2008, and the
       for Machine Perception, 1997.CAMP’97. Proceeding                                M.S. degree in computer engineering from
       Fourth IEEE International Workshop on.
[4]    M. Kunt, M. Benard, and R. Leonardi, “Recent results                            the Islamic Azad University Tabriz Branch,
       in highcompression image coding”, IEEE Transaction            Tabriz, Iran, in 2010, respectively. His research interests include
       Circuits Syst., vol. CAS- 34, no. 11, pp. 1306-1336,          image processing, computer architecture, computer networks.
       Nov 1987.
[5]    R. Leonardi and M Kunt, “Adaptive split-and-merge for
       image analysis and coding”, Proc. SPIE, vol. 594, 1985.
[6]    G. J. Sullivan and R. L. Baker, “Efficient quadtree
       coding of images and video”, in ICASSP Proc., May                               Ali Ranjide Rezai received the B.Sc. degree in
       1991, pp. 2661-2664.                                                            computer engineering from the Shomal
[7]    J. Vaisey and A. Gersho, “Image compression with                                University Amole, Iran, in 2008, and the M.S.
       variable block size segmentation”, IEEE Trans. Signal
       Processing, vol. SP-40, pp.2040- 2060, Aug. 1992.                               degree in computer engineering from the
[8]    A. Habibizad Navin, A. Sadighi, M. Naghian                                      Islamic Azad University Tabriz Branch, Iran, in
       Fesharaki, M. Mirnia, M. Teshnelab, and R. Keshmiri,                            2010, respectively. His research interests
       "Data Oriented Model of image : as a framework for            include image processing, computer architecture.
       image processing", World Academy of Science,
       Engineering and Technology 34 2007
[13]   S. Arora, J. Acharya , A. Verma, Prasanta K.
       Panigrahi, " Multilevel thresholding for image
72                                                              (IJCNS) International Journal of Computer and Network Security,
                                                                                                           Vol. 2, No. 3, March 2010

       Comprehensive Analysis and Enhancement of
       Steganographic Strategies for Multimedia Data
                Hiding and Authentication
                               Ali Javed, Asim Shahzad, Romana shahzadi, Fahad Khan

                                     Faculty of Telecommunication and Information Engineering
                                     University of Engineering and Technology Taxila Pakistan

Abstract: This research paper focuses on the analysis and           wish to plan an escape from jail.
enhancement of steganographic strategies for multimedia data
hiding authentication. Based on an authentication game
between an image and its authorized receiver, and an opponent,
security of authentication watermarking is measured by the
opponent's inability to launch a successful attack. In this work,
we consider two stages of data hiding mechanism: Hiding the
data in an image along with conditional security and detecting
the hidden data. First we detect whether there exists a hidden
message within the image and then applying the conditional
security mechanism, we extract that hidden message. We
propose a novel security enhancement strategy that results in
efficient and secure LSB-based embedding and verification
phenomenon. Both theoretical analysis and experimental results
are presented. They show that using our approach, protection is                    Figure 1. Stenography Process
achieved without significant increase in image size and color
distortion, and without sacrificing the image or video quality.     However, the prison warden, Ward, can monitor any
                                                                    communication between Alice and Bob, and if he detects any
Keywords: Steganography, LSB, Stego image, Stego key,               hint of “unusual" communications, he throws them both in
payload, Watermarking, Covert Communication                         solitary confinement. Alice and Bob must then transmit their
                                                                    secret plans so that nothing in their communication seems
1. Introduction                                                     unusual" to Ward. There have been many proposed solutions
                                                                    to this problem, ranging from rudimentary schemes using
The word steganography literally means covered writing as           invisible ink to a protocol which is provably secure assuming
derived from Greek. It includes a vast array of methods of          that one-way functions exist.
secret communications that conceal the very existence of the
message. Among these methods are invisible inks, microdots,
character arrangement (other than the cryptographic methods
of permutation and substitution), digital signatures, covert
Channels and spread-spectrum                communications.
Steganography is the art of concealing the existence of
information within seemingly inoffensive carriers.
Steganography can be viewed as parallel to cryptography.
Both have been used throughout recorded history as means to
protect information. At times these two technologies seem to
converge while the objectives of the two differ.
Cryptographic techniques "scramble" messages so if
intercepted, the messages cannot be understood.
Steganography, in an essence, "camouflages" a message to
hide its existence and make it seem "invisible" thus
concealing the fact that a message is being sent altogether.                 Figure 2. General Model of Steganography
An encrypted message may draw suspicion while invisible
messages will not [1]. Steganography refers to the problem of       2. Literature Survey
sending messages hidden in “innocent looking"
communications over a public channel so that an adversary           2.1 Steganography Techniques
eavesdropping on the channel cannot even detect the presence
                                                                    2.1.1 Physical steganography
of the hidden messages. Simmons gave the most popular
                                                                    Steganography has been widely used including recent
formulation of the problem: two prisoners, Alice and Bob[2],
                                                                    historical times and the present day. Possible permutations
                                                                 (IJCNS) International Journal of Computer and Network Security, 73
                                                                                                            Vol. 2, No. 3, March 2010

are endless and known examples include                               • Chaffing and winnowing.
•Hidden messages within wax tablets: in ancient Greece,              • Mimic functions convert one file to have the statistical
people wrote messages on the wood, and then covered it with          profile of another. This can thwart statistical methods that
wax upon which an innocent covering message was written.             help brute-force attacks identify the right solution in a
• Hidden messages on messenger's body: also in ancient               ciphertext-only attack.
Greece. Herodotus tells the story of a message tattooed on a         • Concealed messages in tampered executable files,
slave's shaved head, hidden by the growth of his hair, and           exploiting redundancy in the i386 instruction set.
exposed by shaving his head again. The message allegedly             • Pictures embedded in video material (optionally played at
carried a warning to Greece about Persian invasion plans.            slower or faster speed).
This method has obvious drawbacks such as delayed                    • Injecting imperceptible delays to packets sent over the
transmission while waiting for the slave's hair to grow, and         network from the keyboard. Delays in key presses in some
its one-off use since additional messages requires additional        applications (telnet or remote desktop software) can mean a
slaves. In WWII, the French Resistance sent some messages            delay in packets, and the delays in the packets can be used to
written on the backs of couriers using invisible ink.                encode data.
• Hidden messages on paper written in secret inks, under             •Content-Aware Steganography hides information in the
other messages or on the blank parts of other messages.              semantics a human user assigns to a datagram. These systems
• Messages written in morse code on knitting yarn and then           offer security against a non-human adversary/warden.
knitted into a piece of clothing worn by a courier.                  •Blog-Steganography. Messages are fractionalized and the
• Messages written on the back of postage stamps.                    (encrypted) pieces are added as comments of orphaned web-
                                                                     logs (or pin boards on social network platforms). In this case
2.1.2 Digital steganography
                                                                     the selection of blogs is the symmetric key that sender and
Modern steganography entered the world in 1985 with the advent
                                                                     recipient are using; the carrier of the hidden message is the
of the personal computer applied to classical steganography
problems. Development following that was slow, but has since
                                                                     whole blogosphere.
taken off, going by the number of 'stego' programs available: Over
                                                                     2.2 Types of Steganography
725 digital steganography applications have been identified by the
Steganography Analysis and Research Center.                          Pure Steganography
                                                                     Pure steganography is where you only need to know the
                                                                     technique to be able to read off the message.
                                                                     Private Steganography
                                                                     Private Steganography requires you to know a password as
                                                                     well as the technique.
                                                                     Public steganography
                                                                     Public steganography is like public key cryptography - you
                                                                     have a public and private key and knowledge of the
                                                                     technique. A standard library for pure steganography isn't so
                                                                     smart - because it would allow people to simply try the

                                                                     2.3 Image Steganography
                   Figure 3. Cover Image
                                                                     Steganography is the art of hiding the fact that
Here a cover Image of a tree is shown in fig. 3. By removing
                                                                     communication is taking place, by hiding information in
all but the last 2 bits of each color component, an almost
                                                                     other information. Many different carrier file formats can be
completely black image results. Making the resulting image
                                                                     used, but digital images are the most popular because of their
85 times brighter results in the image below.
                                                                     frequency on the Internet.
                                                                     For hiding secret information in images, there exist a large
                                                                     variety of steganographic techniques some are more complex
                                                                     than others and all of them have respective strong and weak
                                                                     As stated earlier, images are the most popular cover objects
                                                                     used for steganography. In the domain of digital images many
                                                                     different image file formats exist, most of them for specific
                                                                     applications. For these different image file formats, different
                                                                     steganographic algorithms exist.

                                                                     2.4 Image Compression
                    Figure 4. Stego Image                            When working with larger images of greater bit depth, the
                                                                     images tend to become too large to transmit over a standard
Digital steganography techniques include:                            Internet connection. In order to display an image in a
• Concealing messages within the lowest bits of noisy images         reasonable amount of time, techniques must be incorporated
or sound files.                                                      to reduce the image’s file size. These techniques make use of
• Concealing data within encrypted data. The data to be              mathematical formulas to analyze and condense image data,
concealed is first encrypted before being used to overwrite          resulting in smaller file sizes. This process is called
part of a much larger block of encrypted data.
74                                                           (IJCNS) International Journal of Computer and Network Security,
                                                                                                        Vol. 2, No. 3, March 2010

compression. In images there are two types of compression,
Lossy and Lossless. Both methods save storage space, but the
procedures that they implement differ. Lossy compression
creates smaller files by discarding excess image data from the
original image. It removes details that are too small for the
human eye to differentiate, resulting in close approximations
of the original image, although not an exact duplicate. An
example of an image format that uses this compression
technique is JPEG (Joint Photographic Experts Group).
Lossless compression, on the other hand, never removes any
information from the original image, but instead represents
data in mathematical formulas. The original image’s integrity
is maintained and the decompressed image output is bit-by-
bit identical to the original image input. The most popular
image formats that use lossless compression is GIF
(Graphical Interchange Format) and 8-bit BMP (a Microsoft                        Figure 5. Main Flow Diagram
Windows bitmap file).
                                                                 3.2 Text in Image Flow Diagram
2.5 Video Steganography
Since a video can be viewed as a sequence of still images,
video steganography can be viewed simply as an extension of
image steganography. The internet and the World Wide Web
have revolutionaries the way in which digital data is
distributed. The widespread and easy access to multimedia
content has motivated development of technologies for digital
steganography or data hiding, with emphasis on access
control, authentication, and copyright protection.
Steganography deals with information hiding, as opposed to
encryption. Much of the recent work in data hiding is about
copyright protection of multimedia data. This is also referred
to as digital watermarking. Digital watermarking for
copyright protection typically requires very few bits, of the
order of 1% or less of the host data size. These watermarks
could be alpha-numeric characters, or could be multimedia
data as well.
One of the main objectives of this watermarking is to be able
to identify the rightful owners by authenticating the
watermarks. As such, it is desirable that the methods of
embedding and extracting digital watermarks are resistant to
typical signal processing operations, such as compression,
and intentional attacks to remove the watermarks.
While transparent or visible watermarks are acceptable in
many cases, hidden data for control or secure communication
need to be perceptually invisible. The signature message data
is the data that we would like to embed or conceal. The
source data is used to hide the signature data; we often refer
to the source as the host data. After embedding a signature in
to a host, we get the watermarked or embedded data. The
recovered data, also referred to as the reconstructed data, is
the signature that is extracted from the embedded data. [11]
                                                                             Figure 7. Text in Image flow Diagram
3. Proposed Methodology                                          3.3 Image in Image Flow diagram
3.1 Proposed Main Flow Diagram
The proposed methodology in this work is to embed the stego
message into image and video using LSB Technique.
                                                   (IJCNS) International Journal of Computer and Network Security, 75
                                                                                              Vol. 2, No. 3, March 2010

                                                      3.5 LSB Technique
                                                      The most widely used technique to hide data is the usage of
                                                      the LSB- Least Significant Bit technique. Least Significant
                                                      Bit insertion method is a simple approach to embed
                                                      information in a cover file [11]. The LSB is the lowest order
                                                      bit in a binary value. This is an important concept in
                                                      computer data storage and programming that applies to the
                                                      order in which data are organized, stored or transmitted [12].
                                                      Usually, three bits from each pixel can be stored to hide an
                                                      image in the LSBs of each byte of a 24-bit image.
                                                      Consequently, LSB requires that only half of the bits in an
                                                      image be changed when data can be hidden in least and
                                                      second least significant bits and yet the resulting stego-image
                                                      which will be displayed is indistinguishable to the cover
                                                      image to the human visual system [11].
                                                      When using a 24-bit image, a bit of each of the red, green
                                                      and blue color components can be used, since they are each
                                                      represented by a byte. In other words, one can store 3 bits in
                                                      each pixel.
                                                      An 800 × 600 pixel image, can thus store a total amount of
                                                      1,440,000 bits or 180,000 bytes of embedded data [13]. For
                                                      example a grid for 3 pixels of a 24-bit image can be as
                                                      (00101101 00011100 11011100)
         Figure 7. Image in Image flow Diagram        (10100110 11000100 00001100)
                                                      (11010010 10101101 01100011)
3.4 Text in Video Flow Diagram                        When the number 200, which binary representation is
                                                      11001000, is embedded into the least significant bits of this
                                                      part of the image, the resulting grid is as follows:

                                                      (00101101 00011101 11011100)
                                                      (10100110 11000101 00001100)
                                                      (11010010 10101100 01100011)

                                                      Although the number was embedded into the first 8 bytes of
                                                      the grid, only the 3 underlined bits needed to be changed
                                                      according to the embedded message. On average, only half of
                                                      the bits in an image will need to be modified to hide a secret
                                                      message using the maximum cover size [13]. Since there are
                                                      256 possible intensities of each primary color, changing the
                                                      LSB of a pixel results in small changes in the intensity of the
                                                      colors. These changes cannot be perceived by the human eye -
                                                      thus the message is successfully hidden. With a well-chosen
                                                      image, one can even hide the message in the least as well as
                                                      second to least significant bit and still not see the difference.
                                                      In the above example, consecutive bytes of the image data –
                                                      from the first byte to the end of the message – are used to
                                                      embed the information. This approach is very easy to detect
                                                      [14]. A slightly more secure system is for the sender and
                                                      receiver to share a secret key that specifies only certain pixels
                                                      to be changed. Should an adversary suspect that LSB
                                                      steganography has been used, he has no way of knowing
                                                      which pixels to target without the secret key [15].
                                                      In its simplest form, LSB makes use of BMP images, since
                                                      they use lossless compression. Unfortunately to be able to
                                                      hide a secret message inside a BMP file, one would require a
                                                      very large cover image.

            Figure 8. Text in Video Flow Diagram      3.6 Implementation of LSB Technique
                                                      To illustrate implementation of LSB technique, consider the
                                                      following image of parrots showing true colors Palette of the
76                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

Image                                                             resulting difference between the new from the original color
                                                                  value is called the embedding error. Since there are only
                                                                  three LSB’s for each pixel, the total number of bits that can
                                                                  be hidden is only three times the total number of pixels
                                                                  having the dimensions 768x512.

                                                                  4. Simulation and Results
                                                                  Following images were taken and processed by the
                                                                  application of Digital Steganography and the results are as

                                                                  4.1 Procedure for Text in Image hiding
         Figure 9. Parrot (True Color Palette Image)              The procedure is started with opening the image in which
This image is composed of red, green, and blue color              you want to hide the data and then enter the stego message in
channels. The pixel at the top-left corner of the picture has     the specified space. The image is shown in fig.11and the
the values 122, 119, and 92 for its red, green, and blue color    stego message is shown in the text box.
components respectively. In binary, these values may be
written as:

01111010 01110111 01011100

                                                                                     Figure 11. Open Image

                                                                  The stego message is then merged into the original image as
                                                                  shown in fig. 12.

  Figure 10. Red, Green and Blue color channels of Parrot

To hide the character “a” in the image, the LSB (the
rightmost bit) of each of the three 8-bit color values above
will be replaced with the bits that form the binary equivalent
of the character “a” (i.e., 01100001). This replacement
operation is generally called embedding. After embedding,
the color value would now change to:
01111010 1110111 01011101
Since there are only three values, only three of the eight bits                      Figure 12. Merge Text
of the character “a” can fit on this pixel. Therefore the         The stego message is detected on the receiving end as shown
succeeding pixels of this image will also be used. In the three   in fig. 13.
color values shown above, only the last value actually
changed as a result of LSB encoding, which means almost
nothing has changed in the appearance of the image.
Nevertheless, even in case wherein all LSB’s are changed;
most images would still retain their original appearance
because of the fact that the LSB’s represent a very minute
portion (roughly 1/255 or 0.39%) of the whole image. The
                                                              (IJCNS) International Journal of Computer and Network Security, 77
                                                                                                         Vol. 2, No. 3, March 2010

                                                                  mountain on the left is the original image in which the stego
                                                                  image will be embedded.

                      Figure 13. Detect
                                                                                     Figure 16. Open Images
The stego message is finally extracted as shown in the text
box in fig. 14                                                    For merging the stego image in the original image user has to
                                                                  enter the password and then the stego image embeds into the
                                                                  original image.

                     Figure 14. Extract

The difference between the original image and the image                              Figure 17. Merge Image
after insertion of stego message is shown in fig. 15. The two
images look exactly the same which is why image                   On the receiving end the stego image can be recovered by
steganography is so important and useful in hiding data or        entering the password as shown in fig. 18.
sending secret messages

                                                                                   Figure 18. Enter Password

                 Figure 15. View Difference                       The stego image is finally extracted after entering the
                                                                  password as shown in fig. 19

4.2 Procedure for Image in Image stenography
In this phase the stego message is also image. The image of a
cat in fig. 16 is a stego image in this case and the image of a
78                                                          (IJCNS) International Journal of Computer and Network Security,
                                                                                                       Vol. 2, No. 3, March 2010

                 Figure 19. Extract Image

The difference between the original image and the image                            Figure 22. View Frames
after insertion of stego message is shown in fig. 20. The two
images look exactly the same.                                   The stego text is added to be embedded in the video as shown
                                                                in fig. 23

                Figure 20. View Difference

4.3 Procedure for Text in Video stenography
                                                                                     Figure 23. Add Text
In this phase the stego message is embedded in the video, as
you can see in fig. 21 the video is added to enter the stego    The stego text is detected as shown in fig. 24

                                                                                    Figure 24. Detect text
                   Figure 21. Add Video
The frames can be viewed in the fig. 22                         Finally the stego data is extracted on the receiving end as
                                                                shown in fig. 25
                                                                  (IJCNS) International Journal of Computer and Network Security, 79
                                                                                                             Vol. 2, No. 3, March 2010

                                                                      [11] N. F. Johnson, S. Jajodia, “Exploring Steganography: Seeing
                                                                           the Unseen,” IEEE Computer, February 1998, pp.26-34.
                                                                      [12] Julie K. Petersen, The Telecommunications Illustrated
                                                                           Dictionary, CRC Press, 2002, ISBN: 084931173X.
                                                                      [13] Krenn, R., “Steganography and Steganalysis”.
                                                                      [14] Wang, H & Wang, S, “Cyber warfare: Steganography vs.
                                                                           Steganalysis”, Communications of the ACM, 47:10, October
                                                                      [15] Anderson, R.J. & Petitcolas, F.A.P., “On the limits of
                                                                           steganography”, IEEE Journal of selected Areas in
                                                                           Communications, May 1998
                                                                      [16] E. Kawaguchi and R. O. Eason :"Principle and applications of
                                                                           BPCS-Steganography", Proceedings of SPIE: Multimedia
                                                                           Systems and Applications, Vol.3528, pp.464-463, 1998.

                       Figure 25. Extract
                                                                      Author Profile
5. Conclusion
                                                                                           Engr. Ali Javed is serving as a Lecturer in
Thus we conclude that steganographic techniques can be                                     Software Engineering Department at
used for a number of purposes along with the covert                                        University of Engineering & Technology
communication or deniable data storage, Confidential                                       Taxila, Pakistan since September, 2007.
communication, Protection of data alteration, Secret data                                  He has received his MS degree in Computer
storing, Media Database systems, Copyright Protection,                                     Engineering from the University of
Feature Tagging and perhaps most importantly digital                                       Engineering & Technology Taxila, Pakistan
watermarking. A digital watermark is invisible to the eye,            in January, 2010. He has received B.Sc. degree in       Software
undetectable without the appropriate secret key, but contains         Engineering from University of Engineering & Technology Taxila,
                                                                      Pakistan, in September, 2007. His areas of interest are Digital
small ownership identification. A much wider field of
                                                                      Image Processing, Computer vision, Video Summarization,
steganography is digital Steganography allows copyright
                                                                      Machine Learning, Software Design and Software testing.
owners to incorporate into their work identifying information
invisible to human eye, yet protecting against the dangers of
copyright infringement.


[1] Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information
     Hiding: Steganography and Watermarking - Attacks and
     Countermeasures Kluwer Academic Press, Norwrll, MA,
     New York, The Hague, London, 2000.
[2] G. Simmons, \The prisoners problem and the subliminal
     channel," CRYPTO, pp. 51{67, 1983.
[3] C. Kurak, J. McHugh, "A Cautionary Note On Image
     Downgrading," IEEE Eighth Annual Computer Security
     Applications Conference, 1992. pp. 153-159.
[4] Tuomas Aura, "Invisible Communication," EET 1995,.
[5] Warren Zevon, Lawyers, Guns, and Money. Music track
     released in the albums Excitable Boy, 1978; Stand in the Fire,
     1981; A Quiet Normal Life, 1986; Learning to Flinch, 1993.
[6] David Kahn, The Codebreakers, The Macmillan Company.
     New York, NY 1967. [Kurak92] C. Kurak, J. McHugh, "A
     Cautionary Note On Image Downgrading," IEEE Eighth
     Annual Computer Security Applications Conference, 1992.
     pp. 153-159.
[7] Herbert S. Zim, Codes and Secret Writing, William Marrow
     and Company. New York, NY, 1948.
[8] Anderson, R.J. & Petitcolas, F.A.P., “On the limits of
     steganography”, IEEE Journal of selected Areasin
     Communications, May 1998
[9] Owens, M., “A discussion of covert channels and
     steganography”, SANS Institute, 2002
[10] Johnson, N.F. & Jajodia, S., “Steganalysis of Images Created
     Using Current Steganography Software”, Proceedings of the
     2nd Information Hiding Workshop, April 1998
80                                                                   (IJCNS) International Journal of Computer and Network Security,
                                                                                                                Vol. 2, No. 3, March 2010

           Modeling and Simulation of Synchronous Buck
           Converter for PMG in Low Power Applications
                                   R. Bharanikumar1, A. Nirmal Kumar2 and K.T. Maheswari3.
1, 2, 3,
           Department of Electrical and Electronics Engineering, Bannari Amman Institute of Technology, Anna University, Tamil Nadu, India

Abstract: This paper focuses on the design and development of            3. Small Wind Turbine in Battery Charging
synchronous buck converter in low power generation system.
The buck topology suffers from low efficiency at light loads due
to dissipation that does not scale with load current. In this paper
                                                                             The performance limitations of permanent magnet wind
we present a method for improving efficiency in buck converter
                                                                         turbine generators in battery-charging applications are
by reducing gate drive losses. Results of PSIM simulation are
presented.                                                               caused by the poor match of the rotor, generator and load
                                                                         characteristics over most of the operating wind speed range.
  Keywords: Buck Converter, Synchronous Rectification, PMG,              Even the small amount of energy (1kWh) that these batteries
Wind turbine.                                                            store can sufficiently improve the quality of life for such
                                                                         areas, giving people access to electrical lighting, TV/radio,
1. Introduction                                                          and other household conveniences. We placed an optimizing
   Small wind turbines offer a promising alternative for                 direct current DC/DC voltage converter between the rectifier
many remote electrical uses where there is a good wind                   and batteries. We can control the current output of the
resource. The goal of this work is to characterize small wind            synchronous buck converter, which allows us to control the
turbines, wind-diesel hybrid system components and wind-                 power going to the batteries. Battery-charging systems are
hybrid systems and to develop new off-grid applications for              very important in developing countries where rural families
small wind turbines in order to expand the international                 cannot afford a solar-battery home system or other
market for these systems. Projects fall into two                         electricity options. The technical aspects of charging
classifications: applications development and testing.                   numerous 28-V batteries with a small permanent magnet
Testing includes both small turbines and wind-hybrid                     alternator wind turbine suggest that a special battery-
systems. Although the projects that fall under applications              charging station needs to be developed. The major
development and testing are varied, they all focus on the                advantage of a centralized battery-charging station is that it
remote power market and all include small wind turbines as               can bring electric service to a very low-income segment of
the power source.                                                        the population. This performance improvement comes at
                                                                         higher system capital cost; however, the cost per charged
2. Block Diagram                                                         battery of the system with the individual charge controllers
                                                                         is lower because of better performance characteristics.
   A block diagram consists of a rectifier stage , a buck
converter and controller. Many small wind turbine
generators consist of a variable-speed rotor driving a                   4. Permanent Magnet Generator
permanent-magnet synchronous generator. The principal
                                                                            Permanent magnet alternators are the most powerful
application of such wind turbines is battery charging, in
                                                                         and cost-effective solution for building a wind generator.
which the generator is connected through a rectifier to a
                                                                         Their low-rpm performance is excellent, and at high
battery bank. The        wind turbine electrical interface is
                                                                         speeds they can really crank out the current due to their
essentially the same whether the turbine is part of a remote
                                                                         efficiency. They provide an optimal solution for varying-
power supply for                     tele communications, a
                                                                         speed wind turbines, of gearless or single stage gear
stand-alone residential power system or a hybrid village
                                                                         configuration. [5] The evolution of the control design of
power system.
                                                                         PM drives begins with the cost reduction of permanent
                                                                         magnet material and follows the progress of control
                                                                         theory of AC electric machinery. The main difference
                                                                         between PM drives and their earlier developed counter
                                                                         parts lies in the removal of the excitation field circuitry
                                                                         with troublesome brushes and its replacement with
                                                                         permanent magnets. But the application PM disables
                                                                         classical field weakening control, because the magnets
                                                                         produce constant magnetic field intensity. With the cost
                                                                         reduction of rare permanent magnet materials PM
                                                                         machines became very popular in industry due to their

                                                                                         •    Simple structure
                         Figure 1. Block Diagram
                                                             (IJCNS) International Journal of Computer and Network Security, 81
                                                                                                        Vol. 2, No. 3, March 2010

               •   High efficiency                               explained below. The first state corresponds to the case
               •   Robustness                                    when the switch is ON. In this state, the current through the
               •   High torque to size ratio.                    inductor rises, as the source voltage would be greater than
                                                                 the output voltage, whereas the capacitor current may be in
  4.1 Types of Permanent Magnet Generators                       either direction, depending on the inductor current and the
                                                                 load current. When the inductor current rises, the energy
   Modern permanent magnet generators need no separate           stored in it increases. During this state, the inductor
excitation system. They can be gearless or with gearbox and      acquires energy. When the switch is closed the diode is in
are fully controlled with variable speed and reactive power      the off state. In Figure 2 the capacitor is getting charge.
supply. They provide the highest power quality and                  The second state relates to the condition when the switch
efficiency for the end user. They offer three different          is OFF and the diode is ON. In this state, the inductor
concepts of permanent magnet generator technology.               current freewheels through the diode and the inductor
                                                                 supplies energy to the RC network at the output. The energy
     4.1.1. Low Speed Robust Gearless System                     stored in the inductor falls in this state. In this state, the
   In a direct drive application the turbine and the generator   inductor discharges its energy and the capacitor current may
are integrated to form compact and structurally integrated       be in either direction, depending on the inductor current and
unit. The design gives free access to all parts for easy         the load current.
installation and maintenance. The simple and robust low
speed rotor design with no separate excitation or cooling
system results in minimum wear, reduced maintenance
requirements, lower life cycle costs, and a long lifetime.

    4.1.2. Medium Speed Compact and Economical Unit
    This is a very compact slow speed system with the
turbine main bearing and the permanent magnet generator
                                                                           Figure 3. Second Stage of Basic Circuit
integrated to a single-stage gearbox giving high efficiency
with low maintenance needs. It emphasizes the same simple           When the switch is open, the inductor discharges its
and robust low speed rotor design with no separate               energy. When it has discharged all its energy, its current
excitation or cooling system, resulting in less wear, reduced    falls to zero and tends to reverse, but the diode blocks
maintenance requirements, lower life cycle costs, and a long     conduction in the reverse direction. In the third state, both
lifetime.                                                        the diode and the switch are OFF. During this state, the
                                                                 capacitor discharges its energy and the inductor is at rest,
    4.1.3. High Speed Small Power Pack                           with no energy stored in it. The inductor does not acquire
                                                                 energy or discharge energy in this state.
  The system is mechanically similar to the doubly fed type
with even smaller space requirements. Extremely high
power with a small size and typical speed range is from
1000 to 2000 rpm for a 6 or 8 pole generator.

  The following are the key specifications evolved for PMG
  PMG                      AC 3φ, 4-pole machine
  Rated Speed             500 RPM - 3000 RPM                                  Figure 4. Third Stage of Basic Circuit
  Output Power            1.0 - 1.5 kW
  Output voltage           65V                                      Here it is assumed that the source voltage remains
                                                                 constant with no ripple, and the frequency of operation is
                                                                 kept fixed with a fixed duty cycle. When both the input
5. Buck Converter                                                voltage and the output voltage are constant, the current
  Output current           20A
                                                                 through the inductor rises linearly when the switch is ON
                                                                 and it falls linearly when the switch is OFF. Under this
                                                                 condition, the current through the capacitor also varies
                                                                 linearly when it is getting charged or discharged.

                                                                 6. Synchronous Buck Converter
                                                                    The synchronous-rectified buck converter uses current-
                                                                 mode control to regulate the output voltage. This control
                                                                 mode allows the converter to respond to changes in line
      Figure 2. Basic Circuit of Buck Converter                  voltage without delay. Also, you can reduce the output
                                                                 inductance to increase the converter's response to dynamic-
                                                                 load conditions.
  The operation of the buck converter is explained first.
This circuit can operate in any of the three states as
82                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

   Although these features would appear to favor current-         MOSFETs. Under light loads, the control block usually
mode control in applications that require a fast dynamic          turns the lower MOSFET off to emulate a diode.
response, this control method has some disadvantages. For            Synchronous rectification with discrete MOSFETs causes
example, it tends to be sensitive to noise in the control loop.   variable switching delays because of the variations in gate
Also, current-mode control method requires two feedback           charge and threshold voltage from one MOSFET to another.
loops: a current inner loop and a voltage outer loop, thus        Standard control circuits compensate for these variations by
complicating the design. Finally, the controller uses a           delaying the turn-on drive of the lower MOSFET until after
current-sensing resistor in series with the output inductor.      the gate voltage of the upper MOSFET falls below a
This current-sensing resistance typically dissipates as much      threshold. This delay creates a dead time in which neither
power as do the MOSFETs, further reducing the current-            MOSFET conducts. The dead time eliminates the possibility
mode converter's efficiency. Voltage-mode control is              of a destructive shoot-through condition in which both
attractive for low-voltage buck converters because, it            MOSFETs conduct simultaneously. Standard designs use
involves a single control loop, exhibits good noise immunity      the same method to delay the turn-on of the upper device. A
and allows a wide range for the PWM duty-cycle ratio. Also,       typical design delays discrete MOSFET conduction with a
voltage-mode converters do not require a resistor for sensing     60-nsec dead time and limits converter switching frequency
current. However, the transfer function of standard voltage-      to 300 kHz.
mode buck converters that use Schottky diodes changes from
no load to full load, making it difficult to achieve fast           6.1 Conventional Vs Synchronous Buck Converter
response to large dynamic loads. The voltage drop of a
MOSFET is much less than that of a Schottky diode,                   The comparison of efficiency between a synchronous
which                                                             rectifier with a parallel Schottky diode and that of a
improves the efficiency of buck converters using                  Schottky diode alone is shown in Figure 6.
synchronous rectification. Synchronous rectification
increases the efficiency of a buck converter by replacing the
Schottky diode with a low-side NMOSFET. The resultant
voltage drop across the MOSFET is smaller than the
forward voltage drop of the Schottky diode. A more
comprehensive comparison includes the switching losses for
both the MOSFET and the Schottky diode. However, at
typical operating frequencies and voltages, a buck
regulator's switching losses are usually small in comparison
with the conduction losses. The low-side MOSFET conducts
current in its third quadrant during the off times of the high-
side MOSFET. This synchronous switch operates in the
                                                                                    Figure 6. Efficiency Graph
third quadrant, because the current flows from the source to
the drain, which results in a negative bias across the switch.
A positive voltage at the gate of the device still enhances the   7. Test Results
channel.                                                            7.1Generator Testing Details

                                                                    7.1.1. G ENERATOR SPEED VS GENERATOR OUTPUT

                                                                     The table shows various readings of generator speed and
                                                                  their corresponding output voltages. It can be seen from the
                                                                  table the generator output voltage of 51.1 volts is obtained
                                                                  for the maximum speed of 1900 rpm.

                                                                              Table 1: Speed and generator voltage
            Figure 5. Synchronous Buck Converter                                Generator speed        Generator o/p
   As Figure 5 shows, conventional synchronous-rectified                           in rpm               voltage
buck converters partition the PWM-control and                                                            in Volts
synchronous-drive functions into a single IC that drives                              900                  19.2
discrete MOSFETs. The control and driver circuits                                     1200                 26.33
synchronize the timing of both MOSFETs with the                                       1350                 29.41
switching frequency. The upper MOSFET conducts to                                     1700                  46.2
transfer energy from the input, and the lower MOSFET                                  1900                  51.1
conducts to circulate inductor current. The synchronous
PWM control block regulates the output voltage by
                                                                    The following graph has been drawn for the generator
modulating the conduction intervals of the upper and lower
                                                                  speed versus generator output voltage. Generator speed is
                                                            (IJCNS) International Journal of Computer and Network Security, 83
                                                                                                       Vol. 2, No. 3, March 2010

taken in x axis and generator output voltage is taken in y-                                             1200                    4.10
axis.                                                                                                   1350                    4.62
                                                                                                        1700                    5.81
                                                                                                        1900                    6.50

                                                                  The following graph has been drawn for the generator
                                                                speed versus wind velocity. Generator speed is taken in x
                                                                axis and wind velocity is taken in y axis.

                                                                        Generator Speed in
   Figure 7. Generator Speed Vs Generator Output Voltage

    7.1.2. Generator Output Voltage Vs Wind Velocity                                         1000

   The table shows various readings of wind velocity and                                      500

their corresponding output voltages. It can be seen from the
table the generator output voltage of 51.1 volts is obtained                                        0            2       4      6      8
for the maximum wind velocity of 6.5 m/s.
                                                                                                               Wind Velocity in m /s

                                                                        Figure 9. Generator Speed Vs Wind Velocity
             Table 2: Voltage with wind velocity
             Generator output       Wind velocity
             voltage in volts         in m/s
                                                                8. Simulation Results
                    19.2                3.07
                   26.33                4.10               Electronic circuit design requires accurate methods for evaluating
                   29.41                4.62                    circuit performance. Because of enormous complexity of
                    46.2                5.81                    modern integrated circuits, computer aided circuit analysis
                                                                is essential and can provide information about circuit
                    51.1                6.50
                                                                performance that is almost impossible to obtain with
                                                                laboratory prototype measurements. PSIM is a general-
  The following graph has been drawn for the wind velocity purpose circuit program that simulates electronic circuits.
versus generator output voltage. Wind velocity is taken in x- PSIM can perform various analyses of electronic circuits:
axis and in y axis generator output voltage is taken. The the operating points of transistors, a time domain response,
generated voltage is maximum when the wind velocity is a small signal frequency response, and so, on. Simulation
between 6 and 12 m/s.                                           work was done for all the circuits and results are attached.

                                                                  8.1Simulated Circuit Diagram

      Figure 8. Generator Output voltage Vs Wind Velocity

    7.1.3. Generator Speed Vs Wind Velocity

   The table shows various readings of generator speed and
their corresponding wind velocity. It can be seen from the
table the wind velocity of 6.5 m/s is obtained for the
maximum speed of 1900 rpm.

          Table 3: Speed with wind velocity
            Generator speed in      Wind velocity in
                 rpm                    m/s
                   900                   3.07
84                                                            (IJCNS) International Journal of Computer and Network Security,
                                                                                                         Vol. 2, No. 3, March 2010

             Figure 10. Simulated Circuit Diagram                    of IEEE Power Electronics Conference. pp. 787-791,
                                                                 [6]    A.B. Raju, K.Chatterjee and B.G. Fernandes, “A
   The figure shows the simulated circuit diagram. The               Simple Power Point Tracker for Grid connected
Synchronous buck converter operate in current program                Variable Speed Wind Energy Conversion System with
mode control .The unit is a PI controlled device that controls       reduced Switch Count Power Converters”,       IEEE
the power level at which the converter operates. The unit is         conference on Power Electronic specillists,2003. pp
primarily designed to operate from the three-phase                   456-462.
alternating current output of the wind turbine. The
following graph shows the PSIM simulation results for the
output voltage from the synchronous buck converter.              Authors Profile

                                                                                          Bharanikumar.R was born in Tamilnadu,
                                                                                          India, on May 30, 1977. He received the
                                                                                          B.E degree in Electrical and Electronics
                                                                                          Engineering from Bharathiar University, in
                                                                                          1998. He received his M.E Power
                                                                                          Electronics and Drives from College of
                                                                                          Engineering Guindy Anna University in
                                                                                          2002. He has 9 yrs of teaching experience.
                                                                                          Currently he is working as Asst. Professor
                                                                                          in EEE department, Bannari Amman
                                                                 Institute of Technology, Sathyamangalam, TamilNadu, India
     Figure 11. Output result of Synchronous buck converter      Currently he is doing research in the field of power converter for
                                                                 special machines; vector controlled based synchronous machine
                                                                 drives, converters for wind energy conversion systems.
9. Conclusion
   Synchronous rectification is possible with all commonly                               A.Nirmal Kumar was born in the year
used converter topologies. It is achieved by simply adding a                             1951. He completed his PG and UG in
                                                                                         Electrical Engineering from Kerala and
MOSFET in parallel with the free-wheeling diode. As a
                                                                                         Calicut University respectively. He
result of this addition, the efficiency will improve                                     completed PhD in Power Electronics in the
significantly. A simple to operate and robust wind-electric                              year 1992 from P.S.G. College of
battery-charging station has been developed and tested.                                  Technology,       Coimbatore           under
Future work for the applications development and testing                                 Bharathiar University. He was with
team will include continued testing of commercial or near                                N.S.S. College of Engineering for nearly
commercial products for the remote electrification market.       28 years in various posts            before       joining    Bannari
                                                                 Amman Institute of Technology, Sathyamangalam, TamilNadu,
                                                                 India in the year 2004. He is a recipient of Institution of Engineers
                                                                 Gold Medal in the year 1989. His current research areas include
References                                                       Power converters for Wind Energy Conversion System and
                                                                 Controller for Induction motor drives.
[1] Monica Chinchilla, Santiago Arnaltes, Juan Carlos
    Burgos, “Control of Permanent-Magnet Generators
    Applied to Variable-Speed Wind-Energy Systems                               Maheswari .K.T was born in Tamilnadu
    connected to the Grid”, IEEE Transactions on Energy                         India, on Dec 20, 1980. She received her B.E
    Conversion, vol. 21, no. 1, pp.130-135, , March 2006.                       Degree in Electrical and Electronics
[2] F. Z. Peng, “Z-Source inverter,” IEEE Trans. Ind                            Engineering     from     Erode    Sengunthar
                                                                                Engineering College, Erode, Bharathiyar
    Applicat.,vol. 39, pp.504–510, Mar./Apr. 2003.
                                                                                University. Currently she is pursuing M.E in
[3] F. Z. Peng, M. Shen, and Z. Qian, “Maximum boost                            Power Electronics and Drives at Bannari
    control of the z- source inverter,” IEEE Transaction on                     Amman Institute of Technology, affiliated to
    Power Electronics. vol.20, no.4, pp833-838 July2005.     Anna University. Her field of interest    includes PMG and
[4] Shigeo Morimoto, Hideaki Nakayama, Masayuki Sanada, Power converters.
    Yoji Takeda, “Sensorless Output Maximization Control
     For Variable-Speed Wind Generation System using
    IPMSG” , IEEE Transactions on Industrial Applications
    2003, pp.1464-1471
[5] Tomonobu Senjyu, Sathoshi Tamaki , Naomitusu
    Urasaki, Katsumi Uezato Toshihisa Funabashi, Hideki
    Fujita “Wind Velocity and             PositionSensorless
    Operation for PMSG Wing Generator”, Proceedings

Shared By: