3 research outputs found

    Physical layer security and energy efficiency over different error correcting codes in wireless sensor networks

    Get PDF
    Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far from being secured or efficient. WSNs are vulnerable to malicious attacks and utilize too much power. At the same time, there is a significant increment of the security threats due to the growth of the several applications that employ wireless sensor networks. Therefore, introducing physical layer security is considered to be a promising solution to mitigate the threats. This paper evaluates popular coding techniques like Reed solomon (RS) techniques and scrambled error correcting codes specifically in terms of security gap. The difference between the signal to nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is defined as the security gap. We investigate the security gap, energy efficiency, and bit error rate between RS and scrambled t-error correcting codes for wireless sensor networks. Lastly, energy efficiency in RS and Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of the simulation emphasize that RS technique achieves similar security gap as scrambled error correcting codes. However, the analysis concludes that the computational complexities of the RS is less compared to the scrambled error correcting codes. We also found that BCH code is more energy-efficient than RS

    5G NOMA user grouping using discrete particle swarm optimization approach

    Get PDF
    Non-orthogonal multiple access (NOMA) technology meets the increasing demand for high-seed cellular networks such as 5G by offering more users to be accommodated at once in accessing the cellular and wireless network. Moreover, the current demand of cellular networks for enhanced user fairness, greater spectrum efficiency and improved sum capacity further increase the need for NOMA improvement. However, the incurred interference in implementing NOMA user grouping constitutes one of the major barriers in achieving high throughput in NOMA systems. Therefore, this paper presents a computationally lower user grouping approach based on discrete particle swarm intelligence in finding the best user-pairing for 5G NOMA networks and beyond. A discrete particle swarm optimization (DPSO) algorithm is designed and proposed as a promising scheme in performing the user-grouping mechanism. The performance of this proposed approach is measured and demonstrated to have comparable result against the existing state-of-the art approach

    Performance analysis of physical layer security over different error correcting codes in wireless sensor networks

    No full text
    Nowadays wireless sensor networks are becoming very important part in our daily life as it is adopted in various applications. However wireless sensor networks are vulnerable to many attacks such as denial of service. Therefore, the number of security threats has increased dramatically due to the increase in the number of applications adopted wireless sensor networks. Physical layer security is considered to be more robust than upper layers security. In this paper we address the problem of evaluating popular techniques (Reed Solomon techniques and scrambled error correcting) in term of security gap which is the difference between the signal to noise ratio of the legitimate receiver and the signal to noise ratio of the eavesdropper. Our work compare scrambled t- error correcting codes with Reed Solomon using bit error rate and security gap. Experiments and analysis showed that Reed Solomon has almost the same security gap as scrambled error correcting codes which requires more computational power than Reed Solomo
    corecore