scholarly journals Performance Analysis of Multihop Relaying Caching for Internet of Things under Nakagami Channels

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Baofeng Ji ◽  
Bingbing Xing ◽  
Kang Song ◽  
Chunguo Li ◽  
Hong Wen ◽  
...  

Performance analysis is studied in this paper for the wireless transmissions in Internet of Things (IoT) system, where both the direct link and the multihop relaying caching wireless transmission from the source node to the destination node are taken into the consideration. The key feature is the Nakagami channels of the wireless channel from the source node to the destination node, which results in the difficulty of the theoretical analysis over the system performance. To tackle this difficulty, the probability distribution function (PDF) of the received signal-to-noise ratio (SNR) at the destination node is derived by exploiting the function and integral properties. Then, the outage probability and bit error rate (BER) of the whole wireless IoT system are derived in the analytical expression without any approximation. Numerical simulations demonstrate the accuracy of the derived theoretical analysis for this system.

2014 ◽  
Vol 536-537 ◽  
pp. 771-775
Author(s):  
Ming Kai Yue ◽  
Jia Hao Deng

The wireless channel model, which was suitable with the complex environment of battlefield, was built by analyzing the digital image of wireless transmission channel, the transmission characteristics and the fading type. The error correction of coding for the compressed code stream of image was carried out specifically with Turbo code, and the Simulink simulation model was designed. The system simulation analysis was carried out for the performance parameters that affect the Turbo code and the BER performance of as-built wireless channel model. The results showed that the Turbo code is a kind of error correction one, which is anti-fading and strong interference among codes. It can not only reach higher peak signal to noise ratio, but also transmit more steadily and more reliably in the changeable channel environment under noise interference. Furthermore, the turbo can be applied for code correction and controlling.


Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


Author(s):  
Xueli Wang ◽  
Yufeng Zhang ◽  
Hongxin Zhang ◽  
Xiaofeng Wei ◽  
Guangyuan Wang

Abstract For wireless transmission, radio-frequency device anti-cloning has become a major security issue. Radio-frequency distinct native attribute (RF-DNA) fingerprint is a developing technology to find the difference among RF devices and identify them. Comparing with previous research, (1) this paper proposed that mean (μ) feature should be added into RF-DNA fingerprint. Thus, totally four statistics (mean, standard deviation, skewness, and kurtosis) were calculated on instantaneous amplitude, phase, and frequency generated by Hilbert transform. (2) We first proposed using the logistic regression (LR) and support vector machine (SVM) to recognize such extracted fingerprint at different signal-to-noise ratio (SNR) environment. We compared their performance with traditional multiple discriminant analysis (MDA). (3) In addition, this paper also proposed to extract three sub-features (amplitude, phase, and frequency) separately to recognize extracted fingerprint under MDA. In order to make our results more universal, additive white Gaussian noise was adopted to simulate the real environment. The results show that (1) mean feature conducts an improvement in the classification accuracy, especially in low SNR environment. (2) MDA and SVM could successfully identify these RF devices, and the classification accuracy could reach 94%. Although the classification accuracy of LR is 89.2%, it could get the probability of each class. After adding a different noise, the recognition accuracy is more than 80% when SNR≥5 dB using MDA or SVM. (3) Frequency feature has more discriminant information. Phase and amplitude play an auxiliary but also pivotal role in classification recognition.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


Sign in / Sign up

Export Citation Format

Share Document