Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 25
Filter
Add more filters










Publication year range
1.
Heliyon ; 10(1): e23578, 2024 Jan 15.
Article in English | MEDLINE | ID: mdl-38173502

ABSTRACT

Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing cryptographic solutions becomes questionable. Quantum Key Distribution (QKD) is a promising secret key agreement primitive that enables long-awaited practical Information-Theoretical Secure (ITS) communications. The key generation rate, however, is one of the limitations of its widespread application to secure high throughput data flows. This paper addresses the aforementioned limitation by employing perfectly correlated bases selection defined by the output of Pseudo-Random Functions based on the keyed-Hash Message Authentication Code construction. In theory, the proposed variant of the BB84 scheme is ITS, reduces memory requirements, and reduces communication overhead during the post-processing stage. It can benefit QKD networks as a service by increasing capacity and accommodating users with varying security needs.

2.
Sensors (Basel) ; 23(4)2023 Feb 20.
Article in English | MEDLINE | ID: mdl-36850944

ABSTRACT

We examine a general wireless sensor network (WSN) model which incorporates a large number of sensors distributed over a large and complex geographical area. The study proposes solutions for a flexible deployment, low cost and high reliability in a wireless sensor network. To achieve these aims, we propose the application of an unmanned aerial vehicle (UAV) as a flying relay to receive and forward signals that employ nonorthogonal multiple access (NOMA) for a high spectral sharing efficiency. To obtain an optimal number of subclusters and optimal UAV positioning, we apply a sensor clustering method based on K-means unsupervised machine learning in combination with the gap statistic method. The study proposes an algorithm to optimize the trajectory of the UAV, i.e., the centroid-to-next-nearest-centroid (CNNC) path. Because a subcluster containing multiple sensors produces cochannel interference which affects the signal decoding performance at the UAV, we propose a diagonal matrix as a phase-shift framework at the UAV to separate and decode the messages received from the sensors. The study examines the outage probability performance of an individual WSN and provides results based on Monte Carlo simulations and analyses. The investigated results verified the benefits of the K-means algorithm in deploying the WSN.

3.
Sensors (Basel) ; 23(1)2023 Jan 03.
Article in English | MEDLINE | ID: mdl-36617128

ABSTRACT

Outage probability (OP) and potential throughput (PT) of multihop full-duplex (FD) nonorthogonal multiple access (NOMA) systems are addressed in the present paper. More precisely, two metrics are derived in the closed-form expressions under the impact of both imperfect successive interference cancellation (SIC) and imperfect self-interference cancellation. Moreover, to model short transmission distance from the transmit and receive antennae at relays, the near-field path-loss is taken into consideration. Additionally, the impact of the total transmit power on the performance of these metrics is rigorously derived. Furthermore, the mathematical framework of the baseline systems is provided too. Computer-based simulations via the Monte Carlo method are given to verify the accuracy of the proposed framework, confirm our findings, and highlight the benefits of the proposed systems compared with the baseline one.

4.
Sensors (Basel) ; 22(7)2022 Apr 02.
Article in English | MEDLINE | ID: mdl-35408367

ABSTRACT

Due to the mechanical nature of container handling operations, as well as natural factors, container and handling infrastructure suffers various types of damage during use, especially within the tight and enclosed environments of a ship's hull. In this operational environment, it is critical to detect any sort of physical impacts between the vertical cell guides of the ship's hull and the container. Currently, an inspection of impacts and evaluation of any consequences is performed manually, via visual inspection processes. This process is time-consuming and relies on the technical expertise of the personnel involved. In this paper, we propose a five-step impact-detection methodology (IDM), intended to detect only the most significant impact events based on acceleration data. We conducted real measurements in a container terminal using a sensory device placed on the spreader of the quay crane. The proposed solution identified an average of 12.8 container impacts with the vertical cell guides during common handling operations. In addition, the results indicate that the presented IDM can be used to recognize repeated impacts in the same space of each bay of the ship, and can be used as a decision support tool for predictive maintenance systems.


Subject(s)
Ships
5.
Sensors (Basel) ; 21(22)2021 Nov 18.
Article in English | MEDLINE | ID: mdl-34833729

ABSTRACT

In the present paper, we investigate the performance of the simultaneous wireless information and power transfer (SWIPT) based cooperative cognitive radio networks (CCRNs). In particular, the outage probability is derived in the closed-form expressions under the opportunistic partial relay selection. Different from the conventional CRNs in which the transmit power of the secondary transmitters count merely on the aggregate interference measured on the primary networks, the transmit power of the SWIPT-enabled transmitters is also constrained by the harvested energy. As a result, the mathematical framework involves more correlated random variables and, thus, is of higher complexity. Monte Carlo simulations are given to corroborate the accuracy of the mathematical analysis and to shed light on the behavior of the OP with respect to several important parameters, e.g., the transmit power and the number of relays. Our findings illustrate that increasing the transmit power and/or the number of relays is beneficial for the outage probability.


Subject(s)
Algorithms , Computer Communication Networks , Cognition , Monte Carlo Method , Probability
6.
Sensors (Basel) ; 21(17)2021 Aug 24.
Article in English | MEDLINE | ID: mdl-34502582

ABSTRACT

In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outage probability (OP) and secrecy outage probability for dynamic power splitting-based relaying (DPSBR) and static power splitting-based relaying (SPSBR) schemes. Moreover, the lower bound of secrecy outage probability is obtained when the source's transmit power goes to infinity. The Monte Carlo simulations are given to corroborate the correctness of our mathematical analysis. It is observed from simulation results that the proposed DPSBR scheme outperforms the SPSBR-based schemes in terms of OP and SOP under the impact of different parameters on system performance.

7.
Sensors (Basel) ; 21(16)2021 Aug 13.
Article in English | MEDLINE | ID: mdl-34450912

ABSTRACT

This manuscript investigates the system performance of hybrid wireless and power line communication networks for indoor Internet of Things applications. Differentiating itself from the existing literature, the performance of the direct link and dual-hop energy harvesting relay-aided links is analyzed under the condition of indoor fading modeled by log-normal distribution. Moreover, the manuscript presents the analytical expressions of the successful transmission probability of the deployed opportunistic decode-and-forward and amplify-and-forward relay selection scheme, and validates them with Monte Carlo simulations. Moreover, the impact of different system parameters on the successful transmission probability is revealed. For the considered hybrid system, in general, the opportunistic decode-and-forward relaying scheme outperforms the opportunistic amplify-and-forward relaying scheme. As importantly, increasing the source to relay distance and power splitting ratio over certain limits significantly deteriorates the system performance, indicated by the decrease in the successful transmission probability.

8.
Sensors (Basel) ; 21(11)2021 Jun 02.
Article in English | MEDLINE | ID: mdl-34199489

ABSTRACT

Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency. This paper studies the outage performance for a SWIPT-based decode-and-forward (DF) FD relaying network consisting of a single-antenna source S, a two-antenna relay R, and a multi-antenna destination D. Specifically, we propose four protocols, namely static time-switching factor with selection combining (STSF-SC), static time-switching factor with maximal ratio combining (STSF-MRC), optimal dynamic time-switching factor with selection combining (ODTSF-SC), and optimal dynamic time-switching factor with maximal ratio combining (ODTSF-MRC) to fully investigate the outage performance of the proposed system. In particular, the optimal time-switching factor from the ODTSF-SC and ODTSF-MRC methods is designed to maximize the total received data at the destination. In this context, we derive exact closed-formed expressions for all schemes in terms of the outage probability (OP). Finally, the Monte Carlo simulations are conducted to corroborate the theoretical analysis's correctness and the proposed schemes' effectiveness.

9.
Sensors (Basel) ; 21(9)2021 May 02.
Article in English | MEDLINE | ID: mdl-34063234

ABSTRACT

The technologies of the Internet of Things (IoT) have an increasing influence on our daily lives. The expansion of the IoT is associated with the growing number of IoT devices that are connected to the Internet. As the number of connected devices grows, the demand for speed and data volume is also greater. While most IoT network technologies use cloud computing, this solution becomes inefficient for some use-cases. For example, suppose that a company that uses an IoT network with several sensors to collect data within a production hall. The company may require sharing only selected data to the public cloud and responding faster to specific events. In the case of a large amount of data, the off-loading techniques can be utilized to reach higher efficiency. Meeting these requirements is difficult or impossible for solutions adopting cloud computing. The fog computing paradigm addresses these cases by providing data processing closer to end devices. This paper proposes three possible network architectures that adopt fog computing for LoRaWAN because LoRaWAN is already deployed in many locations and offers long-distance communication with low-power consumption. The architecture proposals are further compared in simulations to select the optimal form in terms of total service time. The resulting optimal communication architecture could be deployed to the existing LoRaWAN with minimal cost and effort of the network operator.

10.
Sensors (Basel) ; 21(6)2021 Mar 10.
Article in English | MEDLINE | ID: mdl-33802202

ABSTRACT

Video quality evaluation needs a combined approach that includes subjective and objective metrics, testing, and monitoring of the network. This paper deals with the novel approach of mapping quality of service (QoS) to quality of experience (QoE) using QoE metrics to determine user satisfaction limits, and applying QoS tools to provide the minimum QoE expected by users. Our aim was to connect objective estimations of video quality with the subjective estimations. A comprehensive tool for the estimation of the subjective evaluation is proposed. This new idea is based on the evaluation and marking of video sequences using the sentinel flag derived from spatial information (SI) and temporal information (TI) in individual video frames. The authors of this paper created a video database for quality evaluation, and derived SI and TI from each video sequence for classifying the scenes. Video scenes from the database were evaluated by objective and subjective assessment. Based on the results, a new model for prediction of subjective quality is defined and presented in this paper. This quality is predicted using an artificial neural network based on the objective evaluation and the type of video sequences defined by qualitative parameters such as resolution, compression standard, and bitstream. Furthermore, the authors created an optimum mapping function to define the threshold for the variable bitrate setting based on the flag in the video, determining the type of scene in the proposed model. This function allows one to allocate a bitrate dynamically for a particular segment of the scene and maintains the desired quality. Our proposed model can help video service providers with the increasing the comfort of the end users. The variable bitstream ensures consistent video quality and customer satisfaction, while network resources are used effectively. The proposed model can also predict the appropriate bitrate based on the required quality of video sequences, defined using either objective or subjective assessment.

11.
Sensors (Basel) ; 21(4)2021 Feb 05.
Article in English | MEDLINE | ID: mdl-33562596

ABSTRACT

The article proposes a new switchable coupled relay model for massive MIMO-NOMA networks. The model equips a much greater number of antennas on the coupled relays to dramatically improve capacity and Energy Efficiency (EE). Each relay in a coupled relay is selected and delivered into a single transmission block to serve multiple devices. This paper also plots a new diagram of two transmission blocks which illustrates energy harvesting and signal processing. To optimize the system performance of a massive MIMO-NOMA network, i.e., Outage Probability (OP) and system throughput, this paper deploys a Transmit Antenna Selection (TAS) protocol to select the best received signals from the pre-coding channel matrices. In addition, to achieve better EE, Simultaneously Wireless Information Power Transmit (SWIPT) is implemented. Specifically, this paper derives the novel theoretical analysis in closed-form expressions, i.e., OP, system throughput and EE from a massive MIMO-NOMA network aided by switchable coupled relays. The theoretical results obtained from the closed-form expressions show that a massive MIMO-NOMA network achieves better OP and greater capacity and expends less energy than the MIMO technique. Finally, independent Monte Carlo simulations verified the theoretical results.

12.
Sensors (Basel) ; 21(2)2021 Jan 18.
Article in English | MEDLINE | ID: mdl-33477491

ABSTRACT

Underwater wireless sensor networks are currently seeing broad research in various applications for human benefits. Large numbers of sensor nodes are being deployed in rivers and oceans to monitor the underwater environment. In the paper, we propose an energy-efficient clustering multi-hop routing protocol (EECMR) which can balance the energy consumption of these nodes and increase their network lifetime. The network area is divided into layers with regard to the depth level. The data sensed by the nodes are transmitted to a sink via a multi-hop routing path. The cluster head is selected according to the depth of the node and its residual energy. To transmit data from the node to the sink, the cluster head aggregates the data packet of all cluster members and then forwards them to the upper layer of the sink node. The simulation results show that EECMR is effective in terms of network lifetime and the nodes' energy consumption.

13.
Concurr Comput ; 33(23): e6105, 2021 Dec 10.
Article in English | MEDLINE | ID: mdl-33349746

ABSTRACT

This article describes the methodology and the possibilities of collecting operation data in a mobile network provider. First, the architecture and the principles used in the system are described. The precision analysis of the population commuting in the region and during the pandemic and nonpandemic times. Moreover, several ideas about further utilization of the data will be formulated and described. Finally, a graph-based approach that describes the creation of the community structure between the people and the means of its analysis.

14.
Sensors (Basel) ; 20(3)2020 Feb 07.
Article in English | MEDLINE | ID: mdl-32046172

ABSTRACT

Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e 1 , e 2 from the source node S to User 1 (U 1 ) and User 2 (U 2 ), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U 1 and U 2 . The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U 1 was also compared to the secrecy performance of U 2 . Finally, the simulation results matched the Monte Carlo simulations well.

15.
Sensors (Basel) ; 19(8)2019 Apr 18.
Article in English | MEDLINE | ID: mdl-31003436

ABSTRACT

This article studied the application of multiple protocol switching mechanism (PSM) over cooperating Non-Orthogonal Multiple Access (NOMA) networks to minimize the probability of outage and maximize the system throughput and energy efficiency (EE). This study investigated six scenarios: (1) a cooperative NOMA system with half-duplex (HD) and decode-and-forward (DF) protocols at the relay; (2) a cooperative NOMA system with full-duplex (FD) and DF protocols at the relay; (3) a cooperative NOMA system with HD and amplification amplify-and-forward (AF) with fixed-gain (FG) protocols at the relay; (4) a cooperative NOMA system with HD and amplification AF with variable-gain (VG) protocols at the relay; (5) a cooperative NOMA system with FD and amplification AF with FG protocols at the relay; (6) a cooperative NOMA system with FD and amplification AF with VG protocols at the relay. Based on the results of analysis and simulations, the study determined the transmission scenario for best system performance. This paper also proposed a mechanism to switch between HD/FD and DF/AF with FG/VG protocols in order to improve the quality of service (QoS) for users with a weak conditional channel. This mechanism can be deployed in future 5G wireless network sensors. Finally, EE was also assessed in relation to future green-wireless networks (G-WNs).

16.
Sensors (Basel) ; 19(5)2019 Mar 07.
Article in English | MEDLINE | ID: mdl-30866513

ABSTRACT

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.

17.
Sensors (Basel) ; 19(6)2019 Mar 14.
Article in English | MEDLINE | ID: mdl-30875822

ABSTRACT

In this paper, a cooperative non-orthogonal multiple access (NOMA) system is studied for the Internet-of-Things (IoT) in which a master node intends to serve multiple client nodes. The adaptive transmission strategy is proposed at the relay node, i.e., the relay can be half-duplex (HD) and/or full duplex (FD). In practical terms, numerous low-cost devices are deployed in such IoT systems and it exhibits degraded performance due to hardware imperfections. In particular, the effects of hardware impairments in the NOMA users are investigated. Specifically, the closed-form expressions are derived for the outage probability. Moreover, the ergodic capacity is also analysed. This study also comparatively analyzes the orthogonal multiple access (OMA) and NOMA with HD and/or FD relaying. The numerical results are corroborated through Monte Carlo simulations.

18.
Sensors (Basel) ; 19(3)2019 Feb 12.
Article in English | MEDLINE | ID: mdl-30759775

ABSTRACT

In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access (NOMA). This paper proposes a new scheme to consider secure performance, to be called relay selection NOMA (RS-NOMA). In particular, we consider metrics to evaluate secure performance in such an RS-NOMA system where a base station (master node in IoT) sends confidential messages to two main sensors (so-called NOMA users) under the influence of an external eavesdropper. In the proposed IoT scheme, both two NOMA sensors and an illegal sensor are served with different levels of allocated power at the base station. It is noticed that such RS-NOMA operates in two hop transmission of the relaying system. We formulate the closed-form expressions of secure outage probability (SOP) and the strictly positive secure capacity (SPSC) to examine the secrecy performance under controlling setting parameters such as transmit signal-to-noise ratio (SNR), the number of selected relays, channel gains, and threshold rates. The different performance is illustrated as performing comparisons between NOMA and orthogonal multiple access (OMA). Finally, the advantage of NOMA in secure performance over orthogonal multiple access (OMA) is confirmed both analytically and numerically.

19.
Sensors (Basel) ; 19(3)2019 Feb 01.
Article in English | MEDLINE | ID: mdl-30717155

ABSTRACT

Thanks to the benefits of non-orthogonal multiple access (NOMA) in wireless communications, we evaluate a wireless sensor network deploying NOMA (WSN-NOMA), where the destination can receive two data symbols in a whole transmission process with two time slots. In this work, two relaying protocols, so-called time-switching-based relaying WSN-NOMA (TSR WSN-NOMA) and power-splitting-based relaying WSN-NOMA (PSR WSN-NOMA) are deployed to study energy-harvesting (EH). Regarding the system performance analysis, we obtain the closed-form expressions for the exact and approximate outage probability (OP) in both protocols, and the delay-limited throughput is also evaluated. We then compare the two protocols theoretically, and two optimization problems are formulated to reduce the impact of OP and optimize the data rate. Our numerical and simulation results are provided to prove the theoretical and analytical analysis. Thanks to these results, a great performance gain can be achieved for both TSR WSN-NOMA and PSR WSN-NOMA if optimal values of TS and PS ratios are found. In addition, the optimized TSR WSN-NOMA outperforms that of PSR WSN-NOMA in terms of OP.

20.
Entropy (Basel) ; 21(2)2019 Feb 24.
Article in English | MEDLINE | ID: mdl-33266932

ABSTRACT

In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.

SELECTION OF CITATIONS
SEARCH DETAIL
...