14 research outputs found

    Enhancement of the duty cycle cooperative medium access control for wireless body area networks

    Get PDF
    This paper presents a novel energy-efficient and reliable connection to enhance the transmission of data over a shared medium for wireless body area networks (WBAN). We propose a novel protocol of two master nodes-based cooperative protocol. In the proposed protocol, two master nodes were considered, that is, the belt master node and the outer body master node. The master nodes work cooperatively to avoid the retransmission process by sensors due to fading and collision, reducing the bit error rate (BER), which results in a reduction of the duty cycle and average transmission power. In addition, we have also presented a mathematical model of the duty cycle with the proposed protocol for the WBAN. The results show that the proposed cooperative protocol reduced the BER by a factor of 4. The average transmission power is reduced by a factor of 0.21 and this shows the potential of the proposed technique to be used in future wearable wireless sensors and systems

    Distributed consensus algorithm for events detection in cyber-physical systems

    Get PDF
    In the harsh environmental conditions of cyber-physical systems (CPSs), the consensus problem seems to be one of the central topics that affect the performance of consensus-based applications, such as events detection, estimation, tracking, blockchain, etc. In this paper, we investigate the events detection based on consensus problem of CPS by means of compressed sensing (CS) for applications such as attack detection, industrial process monitoring, automatic alert system, and prediction for potentially dangerous events in CPS. The edge devices in a CPS are able to calculate a log-likelihood ratio (LLR) from local observation for one or more events via a consensus approach to iteratively optimize the consensus LLRs for the whole CPS system. The information-exchange topologies are considered as a collection of jointly connected networks and an iterative distributed consensus algorithm is proposed to optimize the LLRs to form a global optimal decision. Each active device in the CPS first detects the local region and obtains a local LLR, which then exchanges with its active neighbors. Compressed data collection is enforced by a reliable cluster partitioning scheme, which conserves sensing energy and prolongs network lifetime. Then the LLR estimations are improved iteratively until a global optimum is reached. The proposed distributed consensus algorithm can converge fast and hence improve the reliability with lower transmission burden and computation costs in CPS. Simulation results demonstrated the effectiveness of the proposed approach

    Estudi bibliomètric any 2016. EETAC

    Get PDF
    El present document recull les publicacions indexades a la base de dades Scopus durant el període comprès entre el mesos de gener a desembre de l’any 2016, escrits per autors pertanyents a l’EETAC. Es presenten les dades recollides segons la font on s’ha publicat, els autors que han publicat, i el tipus de document publicat. S’hi inclou un annex amb la llista de totes les referències bibliogràfiques publicades.Postprint (author's final draft

    Compressive Sensing with Low-Power Transfer and Accurate Reconstruction of EEG Signals

    Get PDF
    Tele-monitoring of EEG in WBAN is essential as EEG is the most powerful physiological parameters to diagnose any neurological disorder. Generally, EEG signal needs to record for longer periods which results in a large volume of data leading to huge storage and communication bandwidth requirements in WBAN. Moreover, WBAN sensor nodes are battery operated which consumes lots of energy. The aim of this research is, therefore, low power transmission of EEG signal over WBAN and its accurate reconstruction at the receiver to enable continuous online-monitoring of EEG and real time feedback to the patients from the medical experts. To reduce data rate and consequently reduce power consumption, compressive sensing (CS) may be employed prior to transmission. Nonetheless, for EEG signals, the accuracy of reconstruction of the signal with CS depends on a suitable dictionary in which the signal is sparse. As the EEG signal is not sparse in either time or frequency domain, identifying an appropriate dictionary is paramount. There are a plethora of choices for the dictionary to be used. Wavelet bases are of interest due to the availability of associated systems and methods. However, the attributes of wavelet bases that can lead to good quality of reconstruction are not well understood. For the first time in this study, it is demonstrated that in selecting wavelet dictionaries, the incoherence with the sensing matrix and the number of vanishing moments of the dictionary should be considered at the same time. In this research, a framework is proposed for the selection of an appropriate wavelet dictionary for EEG signal which is used in tandem with sparse binary matrix (SBM) as the sensing matrix and ST-SBL method as the reconstruction algorithm. Beylkin (highly incoherent with SBM and relatively high number of vanishing moments) is identified as the best dictionary to be used amongst the dictionaries are evaluated in this thesis. The power requirements for the proposed framework are also quantified using a power model. The outcomes will assist to realize the computational complexity and online implementation requirements of CS for transmitting EEG in WBAN. The proposed approach facilitates the energy savings budget well into the microwatts range, ensuring a significant savings of battery life and overall system’s power. The study is intended to create a strong base for the use of EEG in the high-accuracy and low-power based biomedical applications in WBAN

    On Research Challenges in Hybrid Medium Access Control Protocols for IEEE 802.15.6 WBANs

    Get PDF
    IEEE 802.15.6 is a Wireless Body Area Network (WBAN) standard proposed to facilitate the exponentially growing interest in the field of health monitoring. This standard is flexible and outlines multiple basic Medium Access Control (MAC) protocols that are contention based and collision free to meet the WBAN Quality of Service (QoS) challenges. Typically, current research trends in WBAN MAC focus on designing a hybrid MAC that is a combination of basic MAC protocols. In this paper, we provide a first detailed survey of existing hybrid MAC protocols based on IEEE 802.15.6 which would be useful for the related research community. Firstly, the paper lists the design challenges of a WBAN MAC. Secondly, it highlights the significance of hybrid MAC protocols in meeting the design challenges while comparing them to standard MAC protocols. Thirdly, a critical and thorough comparison of existing hybrid MAC protocols is presented in terms of network QoS and WBAN specific parameters. Lastly, we identify key open research areas that are often neglected in hybrid MAC design and further propose some possible directions for future research

    Estudi bibliomètric any 2015. EETAC

    Get PDF
    El present document recull les publicacions indexades a la base de dades Scopus durant el període comprès entre el mesos de gener a desembre de l’any 2015, escrits per autors pertanyents a l’EETAC. Es presenten les dades recollides segons la font on s’ha publicat, els autors que han publicat, i el tipus de document publicat. S’hi inclou un annex amb la llista de totes les referències bibliogràfiques publicades.Postprint (published version

    Cooperative energy harvesting-adaptive MAC protocol for WBANs

    Get PDF
    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard.Peer ReviewedPostprint (published version

    Characterisation and performance analysis of random linear network coding for reliable and secure communication

    Get PDF
    In this thesis, we develop theoretical frameworks to characterize the performance of Random Linear Network Coding (RLNC), and propose novel communication schemes for the achievement of both reliability and security in wireless networks. In particular, (i) we present an analytical model to evaluate the performance of practical RLNC schemes suitable for low-complexity receivers, prioritized (i.e., layered) coding and multi-hop communications, (ii) investigate the performance of RLNC in relay assisted networks and propose a new cross-layer RLNC-aided cooperative scheme for reliable communication, (iii) characterize the secrecy feature of RLNC and propose a new physical-application layer security technique for the purpose of achieving security and reliability in multi-hope communications. At first, we investigate random block matrices and derive mathematical expressions for the enumeration of full-rank matrices that contain blocks of random entries arranged in a diagonal, lower-triangular or tri-diagonal structure. The derived expressions are then used to model the probability that a receiver will successfully decode a source message or layers of a service, when RLNC based on non-overlapping, expanding or sliding generations is employed. Moreover, the design parameters of these schemes allow to adjust the desired decoding performance. Next, we evaluate the performance of Random Linear Network Coded Cooperation (RLNCC) in relay assisted networks, and propose a cross-layer cooperative scheme which combines the emerging Non-Orthogonal Multiple Access (NOMA) technique and RLNCC. In this regard, we first consider the multiple-access relay channel in a setting where two source nodes transmit packets to a destination node, both directly and via a relay node. Secondly, we consider a multi-source multi-relay network, in which relay nodes employ RLNC on source packets and generate coded packets. For each network, we build our analysis on fundamental probability expressions for random matrices over finite fields and we derive theoretical expressions of the probability that the destination node will successfully decode the source packets. Finally, we consider a multi-relay network comprising of two groups of source nodes, where each group transmits packets to its own designated destination node over single-hop links and via a cluster of relay nodes shared by both groups. In an effort to boost reliability without sacrificing throughput, a scheme is proposed whereby packets at the relay nodes are combined using two methods; packets delivered by different groups are mixed using non-orthogonal multiple access principles, while packets originating from the same group are mixed using RLNC. An analytical framework that characterizes the performance of the proposed scheme is developed, and benchmarked against a counterpart scheme that is based on orthogonal multiple access. Finally, we quantify and characterize the intrinsic security feature of RLNC and design a joint physical-application layer security technique. For this purpose, we first consider a network comprising a transmitter, which employs RLNC to encode a message, a legitimate receiver, and a passive eavesdropper. Closed-form analytical expressions are derived to evaluate the intercept probability of RLNC, and a resource allocation model is presented to further minimize the intercept probability. Afterward, we propose a joint RLNC and opportunistic relaying scheme in a multi relay network to transmit confi- dential data to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper’s channel state information or the possibility to pair the selected relay with a jammer node that intentionally generates interference. For each case, expressions of the probability that a coded packet will not be decoded by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully decoding the confidential data. We observe that the field size over which RLNC is performed at the application layer as well as the adopted modulation and coding scheme at the physical layer can be modified to fine-tune the trade-off between security and reliability

    Integration of body sensor networks and vehicular ad-hoc networks for traffic safety

    Get PDF
    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.Peer ReviewedPostprint (author's final draft
    corecore