Skip to main content
Top

2021 | OriginalPaper | Chapter

Green ICT Communication, Networking and Data Processing

Authors : M. Adimoolam, A. John, N. M. Balamurugan, T. Ananth Kumar

Published in: Green Computing in Smart Cities: Simulation and Techniques

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Green ICT is the Green Information Technology or Green computing and it is required for keeping the Harmless Green Environment even when people are using Electronic computable and storage devices for various purposes tremendously. Finally, the green computing is about reducing the energy usage in communication, networking and, data processing devices and various servers. The communication, networking and data processing devices are the major components which use high energy for its operation. So here comes the time to choose green energy efficient devices for communication, networking and data processing. The application area like video surveillance communication, clustering networks spends lots of energy to do its work. Again, to add up secure communication, it is spending considerably more energy for encryption and decryption processing. The Wireless Sensor Network (WSN) is aided with tremendous technological growth and it is widely used in many applications like Border Monitoring System (BMS), Forest Monitoring System (FMS), Ocean Monitoring System (OMS), Critical Response System (CRS), etc. Generally, in all the surveillance systems the sensor nodes capture the data and send them to the Storage Node (SN) for further processing. The foremost challenges faced by all these WSN applications are formulating Green Communication and Networking (an efficient clustering technique) to handle the group of the sensor nodes and also to ensure secured data transmission. These adverse consequences lead to the challenges which are high energy consumption, more bandwidth utilization, wastage of memory in SNs and unsecured data transmission (challenge to the Green environment). The main objective of this chapter is to provide solutions to the challenges listed above thereby assuring the Green environment suitable (efficient, effective and secured) data transmission, networking and data processing in the WSN applications. This chapter includes choosing a Green energy efficient clustering technique, providing good cryptography algorithm and eliminating redundant data. There are so many clustering techniques adapted in WSN such as Low Energy Adaptive Clustering Hierarchy (LEACH), Hierarchical Clustering Control (HCC), Energy Efficient Unequal Clustering (EEUC), Power Efficient and Adaptive Clustering (PEACH), and Scalable Energy Efficient Clustering Hierarchy Protocol (SEECH) clustering techniques. The applications mainly focused are BMS and FMS to reduce the energy. The impact of the clustering parameters is studied in detail and based on this study the LEACH clustering technique is used to fulfill the needs of a good cluster. The clustering parameter values used in LEACH are: clustering type is dynamic, Cluster Head (CH) count is variable, CH selection is randomized, CH mobility is fixed and finally the CH hop distance is one hop distance. The performance of LEACH is studied. Also, it is compared with EEUC, HCC, and PEACH clustering techniques. To address the challenge of secured data transmission in the WSN the cryptographic algorithms are studied. The Private Key Cryptography algorithms such as the Data Encryption Standard (DES), Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), Triple DES and Blowfish algorithms are implemented and compared. The cryptographic algorithms are compared with the data size ranging from 20 KB to 100 KB and the experimental results show that the Blowfish algorithm takes comparatively less time for encryption and decryption processes in WSN data transmission and it is very much suitable for green computing environment. The other biggest challenge in WSN is data redundancy as the sensor node captures the video data and sends it continuously to the SN without eliminating the redundant data. This causes more energy consumption and bandwidth utilization in data transmission and may not be advisable for green environment, also more storage space is wasted in SN. The literature review shows that in most of the WSN applications the redundant data are handled only at the SN. But this chapter works a novel algorithm called, Green environment suitable Intelligent Duplicate Check Algorithm (IDCA) is proposed to make the sensor node intelligent by not transmitting the redundant data. So, the sensor node is made intelligent to identify the redundant data in the system before data transmission. To implement this proposed IDCA, the surveillance video data set is taken from different sources. The OpenCV package in python is used to execute this algorithm. Thus, this chapter provides energy efficient and secured data transmission model for WSN applications by using the LEACH clustering technique to form clustered WSN with blowfish cryptographic algorithm for secured data transmission and also making the WSN’s sensor nodes intelligent with a novel IDCA.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Muni Venkateswarlu K, Kandasamy A, Chandrasekaran K (2016) An energy-efficient clustering algorithm for edge-based wireless sensor networks. Procedia Comput Sci 89:7–16CrossRef Muni Venkateswarlu K, Kandasamy A, Chandrasekaran K (2016) An energy-efficient clustering algorithm for edge-based wireless sensor networks. Procedia Comput Sci 89:7–16CrossRef
2.
go back to reference Li C, Ye M, Chen G, Wu J (2005) An energy efficient unequal clustering mechanism for wireless sensor networks. In: IEEE international conference on mobile adhoc and sensor systems conference, Washington, USA, pp 604–611 Li C, Ye M, Chen G, Wu J (2005) An energy efficient unequal clustering mechanism for wireless sensor networks. In: IEEE international conference on mobile adhoc and sensor systems conference, Washington, USA, pp 604–611
3.
go back to reference Guiloufi ABF, Nasri N, Kachouri A (2016) An energy-efficient unequal clustering algorithm using sierpinski triangle for WSNs. Wirel Pers Commun 88(3):449–465CrossRef Guiloufi ABF, Nasri N, Kachouri A (2016) An energy-efficient unequal clustering algorithm using sierpinski triangle for WSNs. Wirel Pers Commun 88(3):449–465CrossRef
4.
go back to reference Banerjee S, Khuller S (2001) A clustering scheme for hierarchical control in multi-hop wireless networks. In: Proceedings of twentieth annual joint conference of the IEEE computer and communications societies, vol 2, pp 1028–1037 Banerjee S, Khuller S (2001) A clustering scheme for hierarchical control in multi-hop wireless networks. In: Proceedings of twentieth annual joint conference of the IEEE computer and communications societies, vol 2, pp 1028–1037
5.
go back to reference Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–669CrossRef Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–669CrossRef
6.
go back to reference Asaduzzaman, Kong HY (2010) Energy efficient cooperative LEACH protocol for wireless sensor networks. J Commun Netw 12(4):358–365 Asaduzzaman, Kong HY (2010) Energy efficient cooperative LEACH protocol for wireless sensor networks. J Commun Netw 12(4):358–365
7.
go back to reference Sohn I, Lee J-H, Lee SH (2016) Low energy adaptive clustering hierarchy using affinity propagation for wireless sensor networks. IEEE Commun Lett 20(3):558–561CrossRef Sohn I, Lee J-H, Lee SH (2016) Low energy adaptive clustering hierarchy using affinity propagation for wireless sensor networks. IEEE Commun Lett 20(3):558–561CrossRef
8.
go back to reference Lee J-S, Kao T-Y (2016) An improved three layer low energy adaptive clustering hierarchy for wireless sensor networks. IEEE Int Things J 3(6):951–958 Lee J-S, Kao T-Y (2016) An improved three layer low energy adaptive clustering hierarchy for wireless sensor networks. IEEE Int Things J 3(6):951–958
9.
go back to reference Bahbahani MS, Alsusa E (2018) A cooperative clustering protocol with duty cycling for energy harvesting enabled wireless sensor networks. IEEE Trans Wirel Commun 17(1):1–11CrossRef Bahbahani MS, Alsusa E (2018) A cooperative clustering protocol with duty cycling for energy harvesting enabled wireless sensor networks. IEEE Trans Wirel Commun 17(1):1–11CrossRef
10.
go back to reference Yi S, Heo J, Cho Y, Hong J (2007) PEACH: power efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Comput Commun 30(14):2842–2852CrossRef Yi S, Heo J, Cho Y, Hong J (2007) PEACH: power efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Comput Commun 30(14):2842–2852CrossRef
11.
go back to reference Adimoolam M, Sugumaran M, Rajesh RS (2018) A novel efficient clustering and secure data transmission model for spatiotemporal data in WSN. Int J Pure Appl Math 118(8):117–125 Adimoolam M, Sugumaran M, Rajesh RS (2018) A novel efficient clustering and secure data transmission model for spatiotemporal data in WSN. Int J Pure Appl Math 118(8):117–125
12.
go back to reference Kirkpatrick MS, Ghinita G, Bertino E (2012) Privacy-preserving enforcement of spatially aware RBAC. IEEE Trans Dependable Secur Comput 9(5):627–640 Kirkpatrick MS, Ghinita G, Bertino E (2012) Privacy-preserving enforcement of spatially aware RBAC. IEEE Trans Dependable Secur Comput 9(5):627–640
13.
go back to reference Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inf Forensics Secur 5(2):255–268CrossRef Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inf Forensics Secur 5(2):255–268CrossRef
14.
go back to reference Kim J, Nepal S (2016) A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage. Springer J Data Sci Eng 1(3):149–160 Kim J, Nepal S (2016) A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage. Springer J Data Sci Eng 1(3):149–160
15.
go back to reference Ding X, Yang Y, Deng RH (2011) Database access pattern protection without full-shuffles. IEEE Trans Inf Forensics Secur 6(1):189–201CrossRef Ding X, Yang Y, Deng RH (2011) Database access pattern protection without full-shuffles. IEEE Trans Inf Forensics Secur 6(1):189–201CrossRef
16.
go back to reference Ray I, Belyaev K, Strizhov M, Mulamba D, Rajaram M (2013) Secure logging as a service - delegating log management to the cloud. IEEE Syst J 7(2):323–334CrossRef Ray I, Belyaev K, Strizhov M, Mulamba D, Rajaram M (2013) Secure logging as a service - delegating log management to the cloud. IEEE Syst J 7(2):323–334CrossRef
17.
go back to reference William S (2013) Cryptography and network security principles and practice, 6th edn. Pearson Education, India William S (2013) Cryptography and network security principles and practice, 6th edn. Pearson Education, India
18.
go back to reference Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl 3(2):44–56 Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl 3(2):44–56
19.
go back to reference Adimoolam M, Sugumaran M, Rajesh RS (2018) Efficient encryption algorithm for video data storage. Int J Inf Comput Sci 5(10):41–49 Adimoolam M, Sugumaran M, Rajesh RS (2018) Efficient encryption algorithm for video data storage. Int J Inf Comput Sci 5(10):41–49
20.
go back to reference Bruce S (2008) Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. Wiley, New York, pp 461–465 Bruce S (2008) Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. Wiley, New York, pp 461–465
21.
go back to reference Tanenbaum AS, Wetherall DJ (2011) Computer networks, 5th edn. Prentice Hall, Upper Saddle River Tanenbaum AS, Wetherall DJ (2011) Computer networks, 5th edn. Prentice Hall, Upper Saddle River
22.
go back to reference Andy S, Haikal A (2017) Simple duplicate frame detection of MJPEG codec for video forensic. In: International conferences on information technology, information systems and electrical engineering, pp 321–324 Andy S, Haikal A (2017) Simple duplicate frame detection of MJPEG codec for video forensic. In: International conferences on information technology, information systems and electrical engineering, pp 321–324
23.
go back to reference Chiu C-Y, Tsai T-H, Liou Y-C, Han G-W, Chang H-S (2014) Near-duplicate subsequence matching between the continuous stream and large video dataset. IEEE Trans Multimed 16(7):1952–1962CrossRef Chiu C-Y, Tsai T-H, Liou Y-C, Han G-W, Chang H-S (2014) Near-duplicate subsequence matching between the continuous stream and large video dataset. IEEE Trans Multimed 16(7):1952–1962CrossRef
24.
go back to reference Wang H, Tian T, Ma M, Jun W (2017) Joint compression of near-duplicate videos. IEEE Trans Multimed 19(5):908–920CrossRef Wang H, Tian T, Ma M, Jun W (2017) Joint compression of near-duplicate videos. IEEE Trans Multimed 19(5):908–920CrossRef
25.
go back to reference Chou C-L, Chen H-T, Lee S-Y (2015) Pattern-based near-duplicate video retrieval and localization on web-scale videos. IEEE Trans Multimed 17(3):382–395CrossRef Chou C-L, Chen H-T, Lee S-Y (2015) Pattern-based near-duplicate video retrieval and localization on web-scale videos. IEEE Trans Multimed 17(3):382–395CrossRef
26.
go back to reference Scotti G, Marcenaro L, Coelho C, Selvaggi F, Regazzoni CS (2005) Dual camera intelligent sensor for high definition 360 degrees surveillance. IEEE Proc Vis Image Signal Process 152(2):250–257CrossRef Scotti G, Marcenaro L, Coelho C, Selvaggi F, Regazzoni CS (2005) Dual camera intelligent sensor for high definition 360 degrees surveillance. IEEE Proc Vis Image Signal Process 152(2):250–257CrossRef
27.
go back to reference Weitao X, Shen Y, Bergmann N, Wen H (2017) Sensor-assisted multi-view face recognition system on smart glass. IEEE Trans Mobile Comput 17(1):197–210 Weitao X, Shen Y, Bergmann N, Wen H (2017) Sensor-assisted multi-view face recognition system on smart glass. IEEE Trans Mobile Comput 17(1):197–210
28.
go back to reference Liu W, Zhang M, Luo Z, Cai Y (2017) An ensemble deep learning method for vehicle type classification on visual traffic surveillance sensors. IEEE Access 5:24417–24425CrossRef Liu W, Zhang M, Luo Z, Cai Y (2017) An ensemble deep learning method for vehicle type classification on visual traffic surveillance sensors. IEEE Access 5:24417–24425CrossRef
29.
go back to reference Fan C-T, Wang Y-K, Huang C-R (2017) Heterogeneous information fusion and visualization for a large-scale intelligent video surveillance system. IEEE Trans Syst Man Cybern Syst 47(4):1–12CrossRef Fan C-T, Wang Y-K, Huang C-R (2017) Heterogeneous information fusion and visualization for a large-scale intelligent video surveillance system. IEEE Trans Syst Man Cybern Syst 47(4):1–12CrossRef
30.
go back to reference Civelek M, Yazici A (2017) Automated moving object classification in wireless multimedia sensor networks. IEEE Sens J 17(4):1116–1131 Civelek M, Yazici A (2017) Automated moving object classification in wireless multimedia sensor networks. IEEE Sens J 17(4):1116–1131
31.
go back to reference Sasirekha S, Swamynathan S (2017) Cluster-chain mobile agent routing algorithm for efficient data aggregation in wireless sensor network. J Commun Netw 19(4):392–401 Sasirekha S, Swamynathan S (2017) Cluster-chain mobile agent routing algorithm for efficient data aggregation in wireless sensor network. J Commun Netw 19(4):392–401
32.
go back to reference Aghdasi HS, Abbaspour M, Moghadam ME, Samei Y (2008) An energy-efficient and high-quality video transmission architecture in wireless video-based sensor networks. Open Access Sens 8(8):4529–4559 Aghdasi HS, Abbaspour M, Moghadam ME, Samei Y (2008) An energy-efficient and high-quality video transmission architecture in wireless video-based sensor networks. Open Access Sens 8(8):4529–4559
33.
go back to reference Dien MEE, Youssif AAA, Ghalwash AZ (2016) Energy efficient and QoS aware framework for video transmission over wireless sensor networks. Wirel Sens Netw Sci Res 8(3):25–36 Dien MEE, Youssif AAA, Ghalwash AZ (2016) Energy efficient and QoS aware framework for video transmission over wireless sensor networks. Wirel Sens Netw Sci Res 8(3):25–36
34.
go back to reference Maulidin M, Mahmuddin M, Kamarudin LM (2016) Evaluation of video transmission of Mac protocols in wireless sensor network. J Telecommun Electr Comput Eng 8(10):189–192 Maulidin M, Mahmuddin M, Kamarudin LM (2016) Evaluation of video transmission of Mac protocols in wireless sensor network. J Telecommun Electr Comput Eng 8(10):189–192
35.
go back to reference Adimoolam M, Sugumaran M, Rajesh RS (2018) A novel efficient redundancy free data communication model for intelligent surveillance system in WSN. J Adv Res Dyn Control Syst 10(3):743–754 Adimoolam M, Sugumaran M, Rajesh RS (2018) A novel efficient redundancy free data communication model for intelligent surveillance system in WSN. J Adv Res Dyn Control Syst 10(3):743–754
Metadata
Title
Green ICT Communication, Networking and Data Processing
Authors
M. Adimoolam
A. John
N. M. Balamurugan
T. Ananth Kumar
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-48141-4_6