Performance and Detection of M-ary Frequency Shift Keying in Triple Layer Wireless Sensor Network
نویسندگان
چکیده
This paper proposes an innovative triple layer Wireless Sensor Network (WSN) system, which monitors M-ary events like temperature, pressure, humidity, etc. with the help of geographically distributed sensors. The sensors convey signals to the fusion centre using M-ary Frequency Shift Keying (MFSK) modulation scheme over independent Rayleigh fading channels. At the fusion centre, detection takes place with the help of Selection Combining (SC) diversity scheme, which assures a simple and economical receiver circuitry. With the aid of various simulations, the performance and efficacy of the system has been analyzed by varying modulation levels, number of local sensors and probability of correct detection by the sensors. The study endeavors to prove that triple layer WSN system is an economical and dependable system capable of correct detection of M-ary events by integrating frequency diversity together with antenna diversity.
منابع مشابه
Effect of Underwater Ambient Noise on Quadraphase Phase-shift Keying Acoustic Sensor Network Links in Extremely Low Frequency Band
This study evaluates the impact of underwater ambient noise using seven real noise samples; Dolphin, Rain, Ferry, Sonar, Bubbles, Lightning, and Outboard Motor in three frequency ranges in extremely low frequency (ELF) band. The ELF band is the most significant bandwidth for underwater long-range communication. ELF band which is extended from 3 to 3000 Hz clearly, faces bandwidth limitation. Me...
متن کاملMulti-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms
Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1208.1885 شماره
صفحات -
تاریخ انتشار 2012