720 research outputs found

    An antenna switching based NOMA scheme for IEEE 802.15.4 concurrent transmission

    No full text
    This paper introduces a Non-Orthogonal Multiple Access (NOMA) scheme to support concurrent transmission of multiple IEEE 802.15.4 packets. Unlike collision avoidance Multiple Access Control (MAC), concurrent transmission supports Concurrent-MAC (C-MAC) where packet collision is allowed. The communication latency can be reduced by C-MAC because a user can transmit immediately without waiting for the completion of other users’ transmission. The big challenge of concurrent transmission is that error free demodulation of multiple collided packets hardly can be achieved due to severe Multiple Access Interference (MAI). To improve the demodulation performance with MAI presented, we introduce an architecture with multiple switching antennas sharing a single analog transceiver to capture spatial character of different users. Successive Interference Cancellation (SIC) algorithm is designed to separate collided packets by utilizing the spatial character. Simulation shows that at least five users can transmit concurrently to the SIC receiver equipped with eight antennas without sacrificing Packet Error Rate

    Wake-up receiver based ultra-low-power WBAN

    Get PDF

    Performance evaluation of wake-up radio based wireless body area network

    Get PDF
    Abstract. The last decade has been really ambitious in new research and development techniques to reduce energy consumption especially in wireless sensor networks (WSNs). Sensor nodes are usually battery-powered and thus have very limited lifetime. Energy efficiency has been the most important aspect to discuss when talking about wireless body area network (WBAN) in particular, since it is the bottleneck of these networks. Medium access control (MAC) protocols hold the vital position to determine the energy efficiency of a WBAN, which is a key design issue for battery operated sensor nodes. The wake-up radio (WUR) based MAC and physical layer (PHY) have been evaluated in this research work in order to contribute to the energy efficient solutions development. WUR is an on-demand approach in which the node is woken up by the wake-up signal (WUS). A WUS switches a node from sleep mode to wake up mode to start signal transmission and reception. The WUS is transmitted or received by a secondary radio transceiver, which operates on very low power. The energy benefit of using WUR is compared with conventional duty-cycling approach. As the protocol defines the nodes in WUR based network do not waste energy on idle listening and are only awakened when there is a request for communication, therefore, energy consumption is extremely low. The performance of WUR based MAC protocol has been evaluated for both physical layer (PHY) and MAC for transmission of WUS and data. The probabilities of miss detection, false alarm and detection error rates are calculated for PHY and the probabilities of collision and successful data transmission for channel access method Aloha is evaluated. The results are obtained to compute and compare the total energy consumption of WUR based network with duty cycling. The results prove that the WUR based networks have significant potential to improve energy efficiency, in comparison to conventional duty cycling approach especially, in the case of low data-reporting rate applications. The duty cycle approach is better than WUR approach when sufficiently low duty cycle is combined with highly frequent communication between the network nodes

    An efficient ultra-wideband digital transceiver for wireless applications on the field-programmable gate array platform

    Get PDF
    The ultra-wideband (UWB) technology is a promising short-range communication technology for most wireless applications. The UWB works at higher frequencies and is affected by interferences with the same frequency standards. This manuscript has designed an efficient and low-cost implementation of IEEE 802.15.4a-based UWB-digital transceiver (DTR). The design module contains UWB transmitter (TX), channel, and UWB-receiver (RX) units. Convolutional encoding and modulation units like burst position modulation and binary phase-shift keying modulation are used to construct the UWB-TX. The synchronization and Viterbi decoder units are used to recover the original data bits and are affected by noise in UWB-RX. The UWB-DTR is synthesized using Xilinx ISE® environment with Verilog hardware description language (HDL) and implemented on Artix-7 field-programmable gate array (FPGA). The UWB-DTR utilizes less than 2% (slices and look-up table/LUTs), operates at 268 MHz, and consumes 91 mW of total power on FPGA. The transceiver achieves a 6.86 Mbps data rate, which meets the IEEE 802.15.4a standard. The UWB-DTR module obtains the bit error rate (BER) of 2×10-4 by transmitting 105 data bits. The UWB-DTR module is compared with similar physical layer (PHY) transceivers with improvements in chip area (slices), power, data rate, and BER. 

    Duty-cycled Wake-up Schemes for Ultra-low Power Wireless Communications

    Get PDF
    In sensor network applications with low traffic intensity, idle channel listening is one of the main sources of energy waste.The use of a dedicated low-power wake-up receiver (WRx) which utilizes duty-cycled channel listening can significantlyreduce idle listening energy cost. In this thesis such a scheme is introduced and it is called DCW-MAC, an acronym forduty-cycled wake-up receiver based medium access control.We develop the concept in several steps, starting with an investigation into the properties of these schemes under idealizedconditions. This analysis show that DCW-MAC has the potential to significantly reduce energy costs, compared to twoestablished reference schemes based only on low-power wake up receivers or duty-cycled listening. Findings motivatefurther investigations and more detailed analysis of energy consumption. We do this in two separate steps, first concentratingon the energy required to transmit wake-up beacons and later include all energy costs in the analysis. The more completeanalysis makes it possible to optimize wake-up beacons and other DCW-MAC parameters, such as sleep and listen intervals,for minimal energy consumption. This shows how characteristics of the wake-up receiver influence how much, and if, energycan be saved and what the resulting average communication delays are. Being an analysis based on closed form expressions,rather than simulations, we can derive and verify good approximations of optimal energy consumption and resulting averagedelays, making it possible to quickly evaluate how a different wake-up receiver characteristic influences what is possible toachieve in different scenarios.In addition to the direct optimizations of the DCW-MAC scheme, we also provide a proof-of-concept in 65 nm CMOS,showing that the digital base-band needed to implement DCW-MAC has negligible energy consumption compared to manylow-power analog front-ends in literature. We also propose a a simple frame-work for comparing the relative merits ofanalog front-ends for wake-up receivers, where we use the experiences gained about DCW-MAC energy consumption toprovide a simple relation between wake-up receiver/analog front-end properties and energy consumption for wide ranges ofscenario parameters. Using this tool it is possible to compare analog front-ends used in duty-cycled wake-up schemes, evenif they are originally designed for different scenarios.In all, the thesis presents a new wake-up receiver scheme for low-power wireless sensor networks and provide a comprehensiveanalysis of many of its important properties

    Quality-of-Service-Adequate Wireless Receiver Design

    Get PDF

    Quality-of-Service-Adequate Wireless Receiver Design

    Get PDF

    Wake-up Receiver Based Ultra-Low-Power WBAN

    Full text link

    Intrusion detection system for wireless sensor network

    Get PDF
    A Wireless Sensor Network (WSN) is a group of sensor nodes, they monitor a certain environmental information (sound, temperature, motion, pressure, light, etc.), and transmit the information to the base station. Its important to protect the data while information transmitted into the wireless environment. Data can be protected by using cryptographic scheme. a number of attacks can be possible on WSN because of its broadcasting nature, resource restrictions, and remote area of deployment. cryptograpic security can secure network from outside attacks, but fails to protect from inside attack. so we need a second line of defence like Intrusion Detection System.This goal is achieved. PIR motion sensor transmits a signal to base station and the base station trigger an alert message whenever an intruder found into the room. Temperature sensor sends a signal whenever the temperature of room is cross a certain threshold. And light sensor sends a signal whenever intensity of light is cross certain threshold. The attacker node is used to attack on nodes. If IDS found the malicious activity which is done by attacker node, it generates an alert message with the victim nodes information. So we can change the nodes information. As base station is connected to the computer so WSN nodes can be controlled by computer
    corecore