An adaptable physical layer for wireless sensor networks

Author(s):  
D.J.P. Crutchley ◽  
P.N. Green
2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Shujie Yang ◽  
Tao Huang ◽  
Jianfeng Guan ◽  
Yongping Xiong ◽  
Mu Wang

Network virtualization has become pervasive and is used in many applications. Through the combination of network virtualization and wireless sensor networks, it can greatly improve the multiple applications of traditional wireless sensor networks. However, because of the dynamic reconfiguration of topologies in the physical layer of virtualized sensor networks (VSNs), it requires a mechanism to guarantee the accuracy of estimate values by sensors. In this paper, we focus on the distributed Kalman filter algorithm with dynamic topologies to support this requirement. As one strategy of distributed Kalman filter algorithms, diffusion Kalman filter algorithm has a better performance on the state estimation. However, the existing diffusion Kalman filter algorithms all focus on the fixed topologies. Considering the dynamic topologies in the physical layer of VSNs mentioned above, we present a diffusion Kalman filter algorithm with dynamic topologies (DKFdt). Then, we emphatically derive the theoretical expressions of the mean and mean-square performance. From the expressions, the feasibility of the algorithm is verified. Finally, simulations confirm that the proposed algorithm achieves a greatly improved performance as compared with a noncooperative manner.


Author(s):  
Mohammed Ahmed Magzoub ◽  
Azlan Abd Aziz ◽  
Mohammed Ahmed Salem ◽  
Hadhrami Ab Ghani ◽  
Azlina Abdul Aziz ◽  
...  

Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far from being secured or efficient. WSNs are vulnerable to malicious attacks and utilize too much power. At the same time, there is a significant increment of the security threats due to the growth of the several applications that employ wireless sensor networks. Therefore, introducing physical layer security is considered to be a promising solution to mitigate the threats. This paper evaluates popular coding techniques like Reed solomon (RS) techniques and scrambled error correcting codes specifically in terms of security gap. The difference between the signal to nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is defined as the security gap. We investigate the security gap, energy efficiency, and bit error rate between RS and scrambled t-error correcting codes for wireless sensor networks. Lastly, energy efficiency in RS and Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of the simulation emphasize that RS technique achieves similar security gap as scrambled error correcting codes. However, the analysis concludes that the computational complexities of the RS is less compared to the scrambled error correcting codes. We also found that BCH code is more energy-efficient than RS.


Sign in / Sign up

Export Citation Format

Share Document