40,446 research outputs found

    Smart Grid based Wireless Communication in 5G Network for Monitoring and Control Systems in Renewable Energy Management

    Get PDF
    Wireless networks are becoming ubiquitous and as the cost of equipment decreases and performance increases, it becomes both economically and technologically feasible to deploy wireless networks in power systems and industrial environments for a wide range of applications. They have advantage of providing diverse controlling features through a unified communication platform. Application of such networks in the smart grid/industrial environments is under active research and expected to become an integral part of the power system. This research propose novel technique smart grid communication in wireless 5G networks for monitoring and controlling management. Here the smart grid designing has been done based on wireless communication networks. The smart grid network for renewable energy has been controlled using Stackelberg equilibrium based SCADA (supervisory control and data acquisition) method. The control method based collected data has been monitored for detection of malicious activities in the network using supervised radial basis fuzzy systems. The experimental analysis has been carried out based on control system and network malicious activities. Here the control system based parameters analysed are Scalability of 65%, QoS of 71%, Power consumption of 41%, Network Efficiency of 92%. Then machine learning based malicious activities detection in terms of accuarcy of 96%, network security of 88%, throughput of 94%, Network delay of 41%. Proposed method supports interoperability of multiple types of inverters, is scalable and flexible, and transmits data over a secure communication channel

    Wireless sensor network for health monitoring

    Get PDF
    Wireless Sensor Network (WSN) is becoming a significant enabling technology for a wide variety of applications. Recent advances in WSN have facilitated the realization of pervasive health monitoring for both homecare and hospital environments. Current technological advances in sensors, power-efficient integrated circuits, and wireless communication have allowed the development of miniature, lightweight, low-cost, and smart physiological sensor nodes. These nodes are capable of sensing, processing, and communicating one or more vital signs. Furthermore, they can be used in wireless personal area networks (WPANs) or wireless body sensor networks (WBSNs) for health monitoring. Many studies were performed and/or are under way in order to develop flexible, reliable, secure, real-time, and power-efficient WBSNs suitable for healthcare applications. To efficiently control and monitor a patient’s status as well as to reduce the cost of power and maintenance, IEEE 802.15.4/ZigBee, a communication standard for low-power wireless communication, is developed as a new efficient technology in health monitoring systems. The main contribution of this dissertation is to provide a modeling, analysis, and design framework for WSN health monitoring systems. This dissertation describes the applications of wireless sensor networks in the healthcare area and discusses the related issues and challenges. The main goal of this study is to evaluate the acceptance of the current wireless standard for enabling WSNs for healthcare monitoring in real environment. Its focus is on IEEE 802.15.4/ZigBee protocols combined with hardware and software platforms. Especially, it focuses on Carrier Sense Multiple Access with Collision Avoidance mechanism (CSMA/CA) algorithms for reliable communication in multiple accessing networks. The performance analysis metrics are established through measured data and mathematical analysis. This dissertation evaluates the network performance of the IEEE 802.15.4 unslotted CSMA/CA mechanism for different parameter settings through analytical modeling and simulation. For this protocol, a Markov chain model is used to derive the analytical expression of normalized packet transmission, reliability, channel access delay, and energy consumption. This model is used to describe the stochastic behavior of random access and deterministic behavior of IEEE 802.15.4 CSMA/CA. By using it, the different aspects of health monitoring can be analyzed. The sound transmission of heart beat with other smaller data packet transmission is studied. The obtained theoretical analysis and simulation results can be used to estimate and design the high performance health monitoring systems

    New non-orthogonal transmission schemes for achieving highly efficient, reliable, and secure multi-user communications

    Get PDF
    Next-generation wireless communication paradigms demand poperties such as high reliability, low power consumption, and enhanced security. Also, the ever-increasing demand for better wireless services has led to the continuous improvement and emergence of various wireless networks such as 5G and beyond networks. Beyond 5G communication systems (i.e., 6G) are envisioned to utilize technologies such as artificial intelligence, ultra-dense small cells, reconfigurable antennas, distributed networks, multi-band and full-duplex communications, as well as novel non-orthogonal multiple access methods. In this work, we first revisit and review the various current non-orthogonal multiple access (NOMA) techniques available in the literature and proposed by both academia and industry. Then, we discuss their strengths and weaknesses in different application areas. To address the limitations of the existing NOMA schemes, we develop and propose novel NOMA communication paradigms designed for achieving highly efficient, reliable, and secure multi-user communications using superimposed auxiliary signals and pre-coded matrices methods. The new proposed NOMA systems are motivated by the many limitations faced by current NOMA-based systems. For instance, power-domain NOMA is not included in release 17 of 3GPP as a work item. This is due to its performance degradation, resulting from successive interference cancellation (SIC) and channel estimation errors. The efficiency and novelty of the proposed models are presented via mathematical analysis and validated by Monte Carlo simulations.This work was supported in part by the Scientific and Technological Research Council of Turkey (TUBITAK), under project grant No. 119E392

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper
    • …
    corecore