3 research outputs found
Physical layer security and energy efficiency over different error correcting codes in wireless sensor networks
Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far from being secured or efficient. WSNs are vulnerable to malicious attacks and utilize too much power. At the same time, there is a significant increment of the security threats due to the growth of the several applications that employ wireless sensor networks. Therefore, introducing physical layer security is considered to be a promising solution to mitigate the threats. This paper evaluates popular coding techniques like Reed solomon (RS) techniques and scrambled error correcting codes specifically in terms of security gap. The difference between the signal to nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is defined as the security gap. We investigate the security gap, energy efficiency, and bit error rate between RS and scrambled t-error correcting codes for wireless sensor networks. Lastly, energy efficiency in RS and Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of the simulation emphasize that RS technique achieves similar security gap as scrambled error correcting codes. However, the analysis concludes that the computational complexities of the RS is less compared to the scrambled error correcting codes. We also found that BCH code is more energy-efficient than RS
5G NOMA user grouping using discrete particle swarm optimization approach
Non-orthogonal multiple access (NOMA) technology meets the increasing demand for high-seed cellular networks such as 5G by offering more users to be accommodated at once in accessing the cellular and wireless network. Moreover, the current demand of cellular networks for enhanced user fairness, greater spectrum efficiency and improved sum capacity further increase the need for NOMA improvement. However, the incurred interference in implementing NOMA user grouping constitutes one of the major barriers in achieving high throughput in NOMA systems. Therefore, this paper presents a computationally lower user grouping approach based on discrete particle swarm intelligence in finding the best user-pairing for 5G NOMA networks and beyond. A discrete particle swarm optimization (DPSO) algorithm is designed and proposed as a promising scheme in performing the user-grouping mechanism. The performance of this proposed approach is measured and demonstrated to have comparable result against the existing state-of-the art approach
Performance analysis of physical layer security over different error correcting codes in wireless sensor networks
Nowadays wireless sensor networks are becoming
very important part in our daily life as it is adopted in various
applications. However wireless sensor networks are vulnerable to
many attacks such as denial of service. Therefore, the number of
security threats has increased dramatically due to the increase in
the number of applications adopted wireless sensor networks.
Physical layer security is considered to be more robust than
upper layers security. In this paper we address the problem of
evaluating popular techniques (Reed Solomon techniques and
scrambled error correcting) in term of security gap which is the
difference between the signal to noise ratio of the legitimate
receiver and the signal to noise ratio of the eavesdropper. Our
work compare scrambled t- error correcting codes with Reed
Solomon using bit error rate and security gap. Experiments and
analysis showed that Reed Solomon has almost the same security
gap as scrambled error correcting codes which requires more
computational power than Reed Solomo