The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Industrial environments are typically characterised by high levels of interference. Therefore, standards for industrial wireless sensor networks (WirelessHART, ISA 100.11a, and IEEE 802.15.4e) have defined a time division and multichannel-based mode of operation, in which time slots and channel pairs are assigned to links representing communication between nodes. In IEEE 802.15.4e this mode of operation...
Aimed at the inapplicability of LEACH protocol for large-scale sensor network and uneven energy consumption, a Distributed Self-organizing Clustering Routing protocol (DSCR) for large-scale sensor network is proposed. Based on clustering, the network routing is divided into two levels: parent cluster and cluster. The cluster structure is formed by the back-off mechanism related to the residual energy...
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the...
We propose a wireless power transfer (WPT) based underlay spectrum sharing scheme, where a primary user (PU) needs to harvest wireless energy from an access point (AP) and then transmit its data to AP using the harvested energy. In the same area, a secondary transmitter (ST) intends to communicate with a secondary receiver (SR). The secondary data can be transmitted along with the WPT, which can on...
Cross Technology Interference (CTI) is a prevalent phenomenon in the 2.4 GHz unlicensed spectrum causing packet losses and increased channel contention. In particular, WiFi interference is a severe problem for low-power wireless networks causing a significant degradation of the overall performance. We propose here a proactive approach based on WiFi interference modeling for accurately predicting transmission...
Wi-Fi enabled hand-held devices have quickly occupied the consumer market as a result of the remarkable customer acceptance of IEEE 802.11 standard. In this regard, the demand of high throughput introduces high throughput standards such as IEEE 802.11ac. It supports Dynamic Bandwidth Channel Access (DBCA), where a wireless station selects channel bandwidth dynamically based on the availability of...
Industrial applications demand for ease of deployment, reliability and low-power in wireless networks, leading to standards like IEEE802.15.4, which include time synchronized channel hopping mechanisms. Yet, scheduling of transmissions on timeslots and channels falls outside the scope of current standards. Given the application requirements above, distributed (rather than centralized) scheduling has...
We consider the scheduling problem for Aggregated ConvergeCast in wireless sensor networks with a physical interference model. Previous work consists of either heuristics without performance guarantees, or approximation algorithms which do not perform well in practice. We propose here a first scalable mathematical SINR (Signal to Interference plus Noise Ratio) model that outputs an optimal Aggregated...
High density deployment of wireless sensor networks in a same monitoring area may result in strong channel interference from different networks. In order to address the interference of co-channel or adjacent channels, we investigate the problem of channel allocation to improve the system performance for multiple wireless sensor networks. In this study, we first derive a channel interference model...
Radio-on-demand wireless sensor networks (WSN) are expected to be expanded the lifetime of sensor nodes because the receiver effectively utilizes the sleep/wake-up control function. The multi-carrier code division multiple access (MC-CDMA) using modified pseudo orthogonal M-sequence sets (MPOMS) codes have been proposed for radio-on-demand WSN systems. In this paper, the rigorous communication success...
Novel human gesture recognition and classification technique is suggested and experimentally studied. Suggested strategy is based on exploiting the interactions of human gestures with high-frequency electromagnetic field. Extracting of classification features contained in the wireless radio signal modulated by human gestures is proposed by utilizing bispectrum-based processing of the signal envelope...
The technical development towards the full vision of the Internet of Things (IoT) will affect the area of Electromagnetic Compatibility (EMC) in a number of ways. IoT may even be the most challenging issue for the EMC area since it was born about 100 years ago. In this paper, some of these new challenges are highlighted and discussed. The methodology in achieving EMC has to be further developed in...
Wireless powered communications is a promising technology for next-generation low-powered sensor networks such as the Internet of Things. This paper deals with backscatter communications in sensor networks, an ideal technology for low-powered battery-less devices. However, in contrast to conventional communications, backscattering suffers from collisions due to multiple concurrent transmissions and...
The steadily growing use of license-free frequency bands requires reliable coexistence management for deterministic medium utilization. For interference avoidance, proper wireless interference identification (WII) is essential. In this work we propose the first WII approach based upon deep convolutional neural networks (CNNs). The CNN naively learns its features through self-optimization during an...
By analyzing the interference detection and avoidance technology, we find most detection approaches, only according to received signal strength indicator or packet error rate (PER) judge whether the network is interfered by WiFi, which however is not accurate. Therefore, an interference detection approach based on link quality indication and packet error rate(PER) is presented in this paper, which...
The paper presents an exhaustive visualization of different problems encountered in efficient utilization of spectrum for advanced wireless communication. It is a well known fact that there is a crisis for available radio spectrum due to incredible expansion and advancement of the communication systems and technologies. But in reality, there is no shortage of available spectrum but only lack of advance...
With the increasing development of industrial wireless technologies and standards, the scarce spectrum in the industrial, scientific, and medical (ISM) band has been extremely overcrowded, which can be mitigated by harvesting more spectrum in licensed bands with the emerging cognitive radio technology. In industrial cognitive radio networks (ICRNs), security is one of the most important problems....
In wireless communication, heterogeneous technologies such as WiFi, ZigBee and BlueTooth operate in the same ISM band.With the exponential growth in the number of wireless devices, the ISM band becomes more and more crowded. These heterogeneous devices have to compete with each other to access spectrum resources, generating cross-technology interference (CTI). Since CTI may destroy wireless communication,...
We consider the problem of reliable and minimal delay transmission in a wireless sensor network that uses time division in order to schedule its node-to-node communication in time-bounded manner. We propose an algorithm that uses the message acknowledgment method and solves this problem. We show bounds for its expected value of message delivery time. Moreover, our algorithm is based on simple state...
Predictable wireless networking is a basis for real-time cyber-physical-human (CPH) systems such as those in augmented reality, connected and automated vehicles, and industrial automation, and a fundamental problem in predictable wireless networking is predictable control of intra-network interference in the presence of dynamics and uncertainties. We present the Physical-Ratio-K (PRK) wireless interference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.