Skip to main content

Green ICT Communication, Networking and Data Processing

  • Chapter
  • First Online:
Green Computing in Smart Cities: Simulation and Techniques

Part of the book series: Green Energy and Technology ((GREEN))

Abstract

Green ICT is the Green Information Technology or Green computing and it is required for keeping the Harmless Green Environment even when people are using Electronic computable and storage devices for various purposes tremendously. Finally, the green computing is about reducing the energy usage in communication, networking and, data processing devices and various servers. The communication, networking and data processing devices are the major components which use high energy for its operation. So here comes the time to choose green energy efficient devices for communication, networking and data processing. The application area like video surveillance communication, clustering networks spends lots of energy to do its work. Again, to add up secure communication, it is spending considerably more energy for encryption and decryption processing. The Wireless Sensor Network (WSN) is aided with tremendous technological growth and it is widely used in many applications like Border Monitoring System (BMS), Forest Monitoring System (FMS), Ocean Monitoring System (OMS), Critical Response System (CRS), etc. Generally, in all the surveillance systems the sensor nodes capture the data and send them to the Storage Node (SN) for further processing. The foremost challenges faced by all these WSN applications are formulating Green Communication and Networking (an efficient clustering technique) to handle the group of the sensor nodes and also to ensure secured data transmission. These adverse consequences lead to the challenges which are high energy consumption, more bandwidth utilization, wastage of memory in SNs and unsecured data transmission (challenge to the Green environment). The main objective of this chapter is to provide solutions to the challenges listed above thereby assuring the Green environment suitable (efficient, effective and secured) data transmission, networking and data processing in the WSN applications. This chapter includes choosing a Green energy efficient clustering technique, providing good cryptography algorithm and eliminating redundant data. There are so many clustering techniques adapted in WSN such as Low Energy Adaptive Clustering Hierarchy (LEACH), Hierarchical Clustering Control (HCC), Energy Efficient Unequal Clustering (EEUC), Power Efficient and Adaptive Clustering (PEACH), and Scalable Energy Efficient Clustering Hierarchy Protocol (SEECH) clustering techniques. The applications mainly focused are BMS and FMS to reduce the energy. The impact of the clustering parameters is studied in detail and based on this study the LEACH clustering technique is used to fulfill the needs of a good cluster. The clustering parameter values used in LEACH are: clustering type is dynamic, Cluster Head (CH) count is variable, CH selection is randomized, CH mobility is fixed and finally the CH hop distance is one hop distance. The performance of LEACH is studied. Also, it is compared with EEUC, HCC, and PEACH clustering techniques. To address the challenge of secured data transmission in the WSN the cryptographic algorithms are studied. The Private Key Cryptography algorithms such as the Data Encryption Standard (DES), Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), Triple DES and Blowfish algorithms are implemented and compared. The cryptographic algorithms are compared with the data size ranging from 20 KB to 100 KB and the experimental results show that the Blowfish algorithm takes comparatively less time for encryption and decryption processes in WSN data transmission and it is very much suitable for green computing environment. The other biggest challenge in WSN is data redundancy as the sensor node captures the video data and sends it continuously to the SN without eliminating the redundant data. This causes more energy consumption and bandwidth utilization in data transmission and may not be advisable for green environment, also more storage space is wasted in SN. The literature review shows that in most of the WSN applications the redundant data are handled only at the SN. But this chapter works a novel algorithm called, Green environment suitable Intelligent Duplicate Check Algorithm (IDCA) is proposed to make the sensor node intelligent by not transmitting the redundant data. So, the sensor node is made intelligent to identify the redundant data in the system before data transmission. To implement this proposed IDCA, the surveillance video data set is taken from different sources. The OpenCV package in python is used to execute this algorithm. Thus, this chapter provides energy efficient and secured data transmission model for WSN applications by using the LEACH clustering technique to form clustered WSN with blowfish cryptographic algorithm for secured data transmission and also making the WSN’s sensor nodes intelligent with a novel IDCA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Muni Venkateswarlu K, Kandasamy A, Chandrasekaran K (2016) An energy-efficient clustering algorithm for edge-based wireless sensor networks. Procedia Comput Sci 89:7–16

    Article  Google Scholar 

  2. Li C, Ye M, Chen G, Wu J (2005) An energy efficient unequal clustering mechanism for wireless sensor networks. In: IEEE international conference on mobile adhoc and sensor systems conference, Washington, USA, pp 604–611

    Google Scholar 

  3. Guiloufi ABF, Nasri N, Kachouri A (2016) An energy-efficient unequal clustering algorithm using sierpinski triangle for WSNs. Wirel Pers Commun 88(3):449–465

    Article  Google Scholar 

  4. Banerjee S, Khuller S (2001) A clustering scheme for hierarchical control in multi-hop wireless networks. In: Proceedings of twentieth annual joint conference of the IEEE computer and communications societies, vol 2, pp 1028–1037

    Google Scholar 

  5. Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–669

    Article  Google Scholar 

  6. Asaduzzaman, Kong HY (2010) Energy efficient cooperative LEACH protocol for wireless sensor networks. J Commun Netw 12(4):358–365

    Google Scholar 

  7. Sohn I, Lee J-H, Lee SH (2016) Low energy adaptive clustering hierarchy using affinity propagation for wireless sensor networks. IEEE Commun Lett 20(3):558–561

    Article  Google Scholar 

  8. Lee J-S, Kao T-Y (2016) An improved three layer low energy adaptive clustering hierarchy for wireless sensor networks. IEEE Int Things J 3(6):951–958

    Google Scholar 

  9. Bahbahani MS, Alsusa E (2018) A cooperative clustering protocol with duty cycling for energy harvesting enabled wireless sensor networks. IEEE Trans Wirel Commun 17(1):1–11

    Article  Google Scholar 

  10. Yi S, Heo J, Cho Y, Hong J (2007) PEACH: power efficient and adaptive clustering hierarchy protocol for wireless sensor networks. Comput Commun 30(14):2842–2852

    Article  Google Scholar 

  11. Adimoolam M, Sugumaran M, Rajesh RS (2018) A novel efficient clustering and secure data transmission model for spatiotemporal data in WSN. Int J Pure Appl Math 118(8):117–125

    Google Scholar 

  12. Kirkpatrick MS, Ghinita G, Bertino E (2012) Privacy-preserving enforcement of spatially aware RBAC. IEEE Trans Dependable Secur Comput 9(5):627–640

    Google Scholar 

  13. Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inf Forensics Secur 5(2):255–268

    Article  Google Scholar 

  14. Kim J, Nepal S (2016) A cryptographically enforced access control with a flexible user revocation on untrusted cloud storage. Springer J Data Sci Eng 1(3):149–160

    Google Scholar 

  15. Ding X, Yang Y, Deng RH (2011) Database access pattern protection without full-shuffles. IEEE Trans Inf Forensics Secur 6(1):189–201

    Article  Google Scholar 

  16. Ray I, Belyaev K, Strizhov M, Mulamba D, Rajaram M (2013) Secure logging as a service - delegating log management to the cloud. IEEE Syst J 7(2):323–334

    Article  Google Scholar 

  17. William S (2013) Cryptography and network security principles and practice, 6th edn. Pearson Education, India

    Google Scholar 

  18. Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl 3(2):44–56

    Google Scholar 

  19. Adimoolam M, Sugumaran M, Rajesh RS (2018) Efficient encryption algorithm for video data storage. Int J Inf Comput Sci 5(10):41–49

    Google Scholar 

  20. Bruce S (2008) Applied cryptography: protocols, algorithms, and source code in C, 2nd edn. Wiley, New York, pp 461–465

    Google Scholar 

  21. Tanenbaum AS, Wetherall DJ (2011) Computer networks, 5th edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  22. Andy S, Haikal A (2017) Simple duplicate frame detection of MJPEG codec for video forensic. In: International conferences on information technology, information systems and electrical engineering, pp 321–324

    Google Scholar 

  23. Chiu C-Y, Tsai T-H, Liou Y-C, Han G-W, Chang H-S (2014) Near-duplicate subsequence matching between the continuous stream and large video dataset. IEEE Trans Multimed 16(7):1952–1962

    Article  Google Scholar 

  24. Wang H, Tian T, Ma M, Jun W (2017) Joint compression of near-duplicate videos. IEEE Trans Multimed 19(5):908–920

    Article  Google Scholar 

  25. Chou C-L, Chen H-T, Lee S-Y (2015) Pattern-based near-duplicate video retrieval and localization on web-scale videos. IEEE Trans Multimed 17(3):382–395

    Article  Google Scholar 

  26. Scotti G, Marcenaro L, Coelho C, Selvaggi F, Regazzoni CS (2005) Dual camera intelligent sensor for high definition 360 degrees surveillance. IEEE Proc Vis Image Signal Process 152(2):250–257

    Article  Google Scholar 

  27. Weitao X, Shen Y, Bergmann N, Wen H (2017) Sensor-assisted multi-view face recognition system on smart glass. IEEE Trans Mobile Comput 17(1):197–210

    Google Scholar 

  28. Liu W, Zhang M, Luo Z, Cai Y (2017) An ensemble deep learning method for vehicle type classification on visual traffic surveillance sensors. IEEE Access 5:24417–24425

    Article  Google Scholar 

  29. Fan C-T, Wang Y-K, Huang C-R (2017) Heterogeneous information fusion and visualization for a large-scale intelligent video surveillance system. IEEE Trans Syst Man Cybern Syst 47(4):1–12

    Article  Google Scholar 

  30. Civelek M, Yazici A (2017) Automated moving object classification in wireless multimedia sensor networks. IEEE Sens J 17(4):1116–1131

    Google Scholar 

  31. Sasirekha S, Swamynathan S (2017) Cluster-chain mobile agent routing algorithm for efficient data aggregation in wireless sensor network. J Commun Netw 19(4):392–401

    Google Scholar 

  32. Aghdasi HS, Abbaspour M, Moghadam ME, Samei Y (2008) An energy-efficient and high-quality video transmission architecture in wireless video-based sensor networks. Open Access Sens 8(8):4529–4559

    Google Scholar 

  33. Dien MEE, Youssif AAA, Ghalwash AZ (2016) Energy efficient and QoS aware framework for video transmission over wireless sensor networks. Wirel Sens Netw Sci Res 8(3):25–36

    Google Scholar 

  34. Maulidin M, Mahmuddin M, Kamarudin LM (2016) Evaluation of video transmission of Mac protocols in wireless sensor network. J Telecommun Electr Comput Eng 8(10):189–192

    Google Scholar 

  35. Adimoolam M, Sugumaran M, Rajesh RS (2018) A novel efficient redundancy free data communication model for intelligent surveillance system in WSN. J Adv Res Dyn Control Syst 10(3):743–754

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. John .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Adimoolam, M., John, A., Balamurugan, N.M., Ananth Kumar, T. (2021). Green ICT Communication, Networking and Data Processing. In: Balusamy, B., Chilamkurti, N., Kadry, S. (eds) Green Computing in Smart Cities: Simulation and Techniques. Green Energy and Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-48141-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-48141-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-48140-7

  • Online ISBN: 978-3-030-48141-4

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics