Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Review-An Approach for Data Transmission over Heterogeneous Wireless Network  
  Authors : Sapana Nandanwar; Vaishali Sahare
  Cite as:

 

Machine to Machine Communication (M2M) is the automatic exchange of data in a heterogeneous wireless network, including devices or machines, without human interaction. MTC applications aim to provide quality to the machine with, in order to automated every life process. MTC devices are generally spread in a various area and should communicate with each other in various networks. LTE cellular networks are decide to support MTC applications then its offer a large coverage and these are all heterogeneous networks. The advantage of such method is for both MTC application and LTE networks. The most necessary of these problems is the congestion in network which is form However; the MTC applications over LTE networks occur many requirements and causes challenges due to congestion in network. In propose design, long term evolution use heterogeneous network and according to particular network, security will be provided. The security of wireless sensor networks is a challenging problem in the process of data transmission.

 

Published In : IJCSN Journal Volume 4, Issue 1

Date of Publication : February 2015

Pages : 12 - 15

Figures : 01

Tables : 01

Publication Link : Review-An Approach for Data Transmission over Heterogeneous Wireless Network

 

 

 

Sapana Nandanwar : Pursuing M.E 4th sem from G.H. Raisoni college of Engineering and Technology for Women Nagpur, Maharashtra, India.Her research interests are in the area of the Wireless Sensor Network.

 

 

 

 

 

 

 

Machine to Machine Communication

Heterogeneous Network

Wormhole Attack

Security

This paper proposes an approach for data transmission over Heterogeneous wireless network to send a data in particular manner for packet transmission. The system proposed in this paper is able to perform the data transmission in heterogeneous wireless network especially reducing, or completely avoiding congestion issue induced by a considerable number of devices, trying to connect to the network, or send data. This is precisely emphasized in this report. In fact, one of the most important and active research orientations of mobile cellular networks is to get all possible efficient techniques to meet the requirements of M2M applications, so as to take advantages of their benefits, especially the growth market of M2M communications.

 

 

 

 

 

 

 

 

 

[1] Ping Wang, Dong In Kim, “Performance Modeling and Analysis of Heterogeneous Machine Type Communications”, IEEE Transactions on Wireless Communications., vol .13,no 5,pp. 2836-2849, May 2014 [2] K. Naga Divya, K.Sri Vijaya, “A Routing- Driven Elliptic Curve Cryptography based key management scheme for heterogeneous sensor networks” , IEEE Journal on Computer Science and Software Engineering, vol.2, no 9,pp.442-449,September 2012 [3] M.-Y. Cheng, G.-Y. Lin, H.-Y. Wei, A. C.-C. Hsu, “Overload control for machine-type-communications in LTE-Advanced system,” IEEE Commun. Mag., vol. 50, no. 6, pp. 38-45, June 2012. [4] S.-Y. Lien, K.-C. Chen, and Y. Lin, “Toward ubiquitous massive accesses in 3GPP machine-tomachine communications,” IEEE Commun. Mag., vol. 49, no. 4, pp. 66-74, Apr. 2011 . [5] Husain Shahnawaz, Joshi R.C, “Design of Detection Engine for Wormhole Attack in Adhoc Network Environment”, Inter-national Journal of Engineering and Technology (IJET), vol4, no 6,pp. 381-395, Jan 2013. [6] Dr. Esam A. A. A. Hagras, Doaa El-Saied, Dr. Hazem H. Aly“A New Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme for Heterogeneous Wire- less Sensor Networks”,IJSCT,vol 2,issue 2,pp. 19-23,June2011