S. Ghavami, Mahmood Mohassel Feghhi, B. Abolhassani
In this paper bit error rate (BER) performance is analyzed for multiple input-multiple output (MIMO) communications systems using antenna selection in the transmitter, maximal ratio combining (MRC) and linear de-correlating detector (LDD) in the receiver in wide band code division multiple access (WCDMA) downlink channels with correlated Nakagami fading. The MRC maximizes signal to noise ratio of the received signal, then the LDD cancels out multiple access interference (MAI). Theoretical results are validated using computer simulations. Moreover, a pilot based estimation method is proposed to jointly estimate the channel gains and the rows of the LDD operator. Simulation results show that using this proposed method, diversity order is maintained in the receiver. Furthermore, our analysis shows the spectral efficiency degradation due to the pilot based strategy is negligible.
{"title":"Performance Analysis of Downlink MIMO WCDMA Systems Using Antenna Selection in Transmitter and MRC Plus LDD in Receiver over Correlated Nakagami-Fading Channels","authors":"S. Ghavami, Mahmood Mohassel Feghhi, B. Abolhassani","doi":"10.4236/wsn.2010.27067","DOIUrl":"https://doi.org/10.4236/wsn.2010.27067","url":null,"abstract":"In this paper bit error rate (BER) performance is analyzed for multiple input-multiple output (MIMO) communications systems using antenna selection in the transmitter, maximal ratio combining (MRC) and linear de-correlating detector (LDD) in the receiver in wide band code division multiple access (WCDMA) downlink channels with correlated Nakagami fading. The MRC maximizes signal to noise ratio of the received signal, then the LDD cancels out multiple access interference (MAI). Theoretical results are validated using computer simulations. Moreover, a pilot based estimation method is proposed to jointly estimate the channel gains and the rows of the LDD operator. Simulation results show that using this proposed method, diversity order is maintained in the receiver. Furthermore, our analysis shows the spectral efficiency degradation due to the pilot based strategy is negligible.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses an accurate distributed algorithm for diffusive source localization while maintaining the low energy consumption of sensor nodes in wireless sensor networks. In this algorithm, the sensor selection scheme based on the information utility measure is used. To update the estimation in each selected node, a neighborhood radius equal to the communication range of the sensor nodes is defined and all sensors located in the neighborhood circle, whose radius is equal to the neighborhood radius and the selected node is its centre, collaborate their information. To decrease the energy consumption, the neighborhood radius is reduced gradually based on the error covariance value of the estimation. In addition, this paper includes a new method for the initial point calculation which is important in the recursive methods used for distributed algorithms in wireless sensor networks. Numerical examples are used to study the performance of the algorithms. Simulation results show the accuracy of the new algorithm becomes better while its energy consumption is low enough.
{"title":"Information-Driven Collaborative Processing for Diffusive Source Estimation in Wireless Sensor Networks","authors":"Hossein Khonsari, M. Kahaei","doi":"10.4236/wsn.2010.27068","DOIUrl":"https://doi.org/10.4236/wsn.2010.27068","url":null,"abstract":"This paper discusses an accurate distributed algorithm for diffusive source localization while maintaining the low energy consumption of sensor nodes in wireless sensor networks. In this algorithm, the sensor selection scheme based on the information utility measure is used. To update the estimation in each selected node, a neighborhood radius equal to the communication range of the sensor nodes is defined and all sensors located in the neighborhood circle, whose radius is equal to the neighborhood radius and the selected node is its centre, collaborate their information. To decrease the energy consumption, the neighborhood radius is reduced gradually based on the error covariance value of the estimation. In addition, this paper includes a new method for the initial point calculation which is important in the recursive methods used for distributed algorithms in wireless sensor networks. Numerical examples are used to study the performance of the algorithms. Simulation results show the accuracy of the new algorithm becomes better while its energy consumption is low enough.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The energy industry and in particular the Oil Refineries are extremely important elements in Iraq’s infrastructure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the whole economy. It can also cause serious damage to the environment and even losses of human lives. The security of information systems and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a major part of infrastructure protection strategy. This paper describes an attempt to use several security procedures to design a secure, robust system for the SCADA and DCS systems currently in use in the North Oil Refinery in the city of Baiji located in northern Iraq.
{"title":"Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries","authors":"M. K. Mahmood, F. Al-Naima","doi":"10.4236/wsn.2010.27064","DOIUrl":"https://doi.org/10.4236/wsn.2010.27064","url":null,"abstract":"The energy industry and in particular the Oil Refineries are extremely important elements in Iraq’s infrastructure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the whole economy. It can also cause serious damage to the environment and even losses of human lives. The security of information systems and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a major part of infrastructure protection strategy. This paper describes an attempt to use several security procedures to design a secure, robust system for the SCADA and DCS systems currently in use in the North Oil Refinery in the city of Baiji located in northern Iraq.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Chen
Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, we take into account the unique data aggregation communication paradigm of WSNs and model the problem of link loss rates inference as a Maximum-Likelihood Estimation problem. And we propose an inference algorithm based on the standard Expectation-Maximization (EM) techniques. Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.
{"title":"Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm","authors":"Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Chen","doi":"10.4236/wsn.201027063","DOIUrl":"https://doi.org/10.4236/wsn.201027063","url":null,"abstract":"Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, we take into account the unique data aggregation communication paradigm of WSNs and model the problem of link loss rates inference as a Maximum-Likelihood Estimation problem. And we propose an inference algorithm based on the standard Expectation-Maximization (EM) techniques. Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.
{"title":"Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks","authors":"Chao-Ying Huang, Guoli Wang","doi":"10.4236/wsn.201027065","DOIUrl":"https://doi.org/10.4236/wsn.201027065","url":null,"abstract":"This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hannan Xiao, Ying Zhang, J. Malcolm, B. Christianson, K. Chua
Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing TCP performance in multihop wireless networks is proposed, which considers packet buffering, contention of nodes for access to the wireless channel, and spatial reuse of the wireless channel. Markov chain modelling is applied to analyze this system model. Analytical results show that when the number of hops that the TCP session crosses is ?xed, the TCP throughput is independent of the TCP congestion window size. When the number of hops increases from one, the TCP throughput decreases ?rst, and then stabilizes when the number of hops becomes large. The analysis is validated by comparing the numerical and simulation results.
{"title":"Modelling and Analysis of TCP Performance in Wireless Multihop Networks","authors":"Hannan Xiao, Ying Zhang, J. Malcolm, B. Christianson, K. Chua","doi":"10.4236/wsn.201027061","DOIUrl":"https://doi.org/10.4236/wsn.201027061","url":null,"abstract":"Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing TCP performance in multihop wireless networks is proposed, which considers packet buffering, contention of nodes for access to the wireless channel, and spatial reuse of the wireless channel. Markov chain modelling is applied to analyze this system model. Analytical results show that when the number of hops that the TCP session crosses is ?xed, the TCP throughput is independent of the TCP congestion window size. When the number of hops increases from one, the TCP throughput decreases ?rst, and then stabilizes when the number of hops becomes large. The analysis is validated by comparing the numerical and simulation results.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.
{"title":"Classification and Review of Security Schemes in Mobile Computing","authors":"Sathish A. P. Kumar","doi":"10.4236/wsn.2010.26054","DOIUrl":"https://doi.org/10.4236/wsn.2010.26054","url":null,"abstract":"In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks.
{"title":"Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study","authors":"S. Tarannum","doi":"10.4236/wsn.2010.26060","DOIUrl":"https://doi.org/10.4236/wsn.2010.26060","url":null,"abstract":"A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Measurement and reconstruction of wireless pulses is an important scheme in wireless ultra wide band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this work we describe an exponential sampling filter (ESF) for measurement and reconstruction of UWB pulses. The ESF is constructed from parallel filters, which has exponentially descending impulse response. A pole cancellation filter was used to extract the amplitudes and time locations of the UWB pulses from sequentially measured samples of the ESF output. We show that the amplitudes and time locations of p sequential UWB pulses can be recovered from the measurement of at least 2p samples from the ESF output. For perfect reconstruction the number of parallel filters in ESP should be 2p. We study the robustness of the method against noise and discuss the applications of the method.
{"title":"Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter","authors":"J. Olkkonen, H. Olkkonen","doi":"10.4236/wsn.2010.26057","DOIUrl":"https://doi.org/10.4236/wsn.2010.26057","url":null,"abstract":"Measurement and reconstruction of wireless pulses is an important scheme in wireless ultra wide band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this work we describe an exponential sampling filter (ESF) for measurement and reconstruction of UWB pulses. The ESF is constructed from parallel filters, which has exponentially descending impulse response. A pole cancellation filter was used to extract the amplitudes and time locations of the UWB pulses from sequentially measured samples of the ESF output. We show that the amplitudes and time locations of p sequential UWB pulses can be recovered from the measurement of at least 2p samples from the ESF output. For perfect reconstruction the number of parallel filters in ESP should be 2p. We study the robustness of the method against noise and discuss the applications of the method.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many researchers from different backgrounds have found interesting research challenges that arise from the physical constraints and envisaged applications in Wireless Sensor Networks (WSNs). The WSN community that has formed over the years is divided into two sub-communities: the systems sub-community and the theory sub-community. However, there seems to be no connection between the two. Algorithms developed from a theoretic perspective are rarely implemented on real hardwares. In this paper we identify the most important reasons why these algorithms are disregarded by the systems sub-community, and provide pointers to remedy the lack of connection.
{"title":"Practical Considerations for Wireless Sensor Network Algorithms","authors":"G. Halkes, K. Langendoen","doi":"10.4236/wsn.2010.26055","DOIUrl":"https://doi.org/10.4236/wsn.2010.26055","url":null,"abstract":"Many researchers from different backgrounds have found interesting research challenges that arise from the physical constraints and envisaged applications in Wireless Sensor Networks (WSNs). The WSN community that has formed over the years is divided into two sub-communities: the systems sub-community and the theory sub-community. However, there seems to be no connection between the two. Algorithms developed from a theoretic perspective are rarely implemented on real hardwares. In this paper we identify the most important reasons why these algorithms are disregarded by the systems sub-community, and provide pointers to remedy the lack of connection.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}