318 research outputs found

    Relay selection methods for maximizing the lifetime of wireless sensor networks

    No full text
    Combined analytical and fuzzy techniques are proposed for improving the battery lifetime, performance, as well as energy efficiency of wireless sensor networks (WSNs) with the aid of efficient relay selection methods. We determine the best relay selection method by striking an appealing performance versus network lifetime trade-off. Furthermore, the beneficial regions of cooperation are determined considering asymmetric traffic scenarios, where relaying provides energy saving

    A Survey On Cooperative Diversity And Its Applications In Various Wireless Networks

    Full text link

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Emerging Communications for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are deployed in a rapidly increasing number of arenas, with uses ranging from healthcare monitoring to industrial and environmental safety, as well as new ubiquitous computing devices that are becoming ever more pervasive in our interconnected society. This book presents a range of exciting developments in software communication technologies including some novel applications, such as in high altitude systems, ground heat exchangers and body sensor networks. Authors from leading institutions on four continents present their latest findings in the spirit of exchanging information and stimulating discussion in the WSN community worldwide

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Game theory based Ad-hoc On Demand Distance Vector Routing Protocol to Extend the Wireless Sensor Networks Life Time

    Get PDF
    This paper proposes a solution to increase the energy life time of wireless sensor networks (WSNs) via a concept of game theory enabled ad-hoc on demand distance vector (AODV) routing algorithm. Game theory is an optimal promising candidate for decision making in a wireless networking scenario to find the optimal path for data packets transfer between source node and destination node, where combination with the AODV routing algorithm, a procedure of game theory enabled AODV (GTEAODV) is developed and proposed in this research paper. The developed and proposed methodology is validated through simulation in NS2 environment and the results show an improvement in energy life time of the order of 30-35% in comparison to the existing routing methodology which uses co-operative routing techniques among the nodes in WSN. Further, the throughput of game theory enabled adhoc on demand routing is also highly improved in comparison to existing traditional approaches though obtained results. Though, game theory approach is an existing approach concatenation of it with AODV can provide increased network performance which is significant as portrayed in research results shown in the paper. Hence, by virtue of providing enhanced energy life time and data security through the nature of the algorithm, the proposed GTEAODV algorithm can be employed in defence applications for secure data transmission and reception for forthcoming deployment of 5G systems which are blossoming in world wide scenario

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116

    Optimising lower layers of the protocol stack to improve communication performance in a wireless temperature sensor network

    Get PDF
    The function of wireless sensor networks is to monitor events or gather information and report the information to a sink node, a central location or a base station. It is a requirement that the information is transmitted through the network efficiently. Wireless communication is the main activity that consumes energy in wireless sensor networks through idle listening, overhearing, interference and collision. It becomes essential to limit energy usage while maintaining communication between the sensor nodes and the sink node as the nodes die after the battery has been exhausted. Thus, conserving energy in a wireless sensor network is of utmost importance. Numerous methods to decrease energy expenditure and extend the lifetime of the network have been proposed. Researchers have devised methods to efficiently utilise the limited energy available for wireless sensor networks by optimising the design parameters and protocols. Cross-layer optimisation is an approach that has been employed to improve wireless communication. The essence of cross-layer scheme is to optimise the exchange and control of data between two or more layers to improve efficiency. The number of transmissions is therefore a vital element in evaluating overall energy usage. In this dissertation, a Markov Chain model was employed to analyse the tuning of two layers of the protocol stack, namely the Physical Layer (PHY) and Media Access Control layer (MAC), to find possible energy gains. The study was conducted utilising the IEEE 802.11 channel, SensorMAC (SMAC) and Slotted-Aloha (S-Aloha) medium access protocols in a star topology Wireless Temperature Sensor Network (WTSN). The research explored the prospective energy gains that could be realised through optimizing the Forward Error Correction (FEC) rate. Different Reed Solomon codes were analysed to explore the effect of protocol tuning on energy efficiency, namely transmission power, modulation method, and channel access. The case where no FEC code was used and analysed as the control condition. A MATLAB simulation model was used to identify the statistics of collisions, overall packets transmitted, as well as the total number of slots used during the transmission phase. The bit error probability results computed analytically were utilised in the simulation model to measure the probability of successful transmitting data in the physical layer. The analytical values and the simulation results were compared to corroborate the correctness of the models. The results indicate that energy gains can be accomplished by the suggested layer tuning approach.Electrical and Mining EngineeringM. Tech. (Electrical Engineering
    corecore