-
Extend the lifetime of wireless sensor networks by modifying cluster-based data collection
Authors:
Nahid Ebrahimi,
Ali Taghavirashidizadeh,
Seyyed Saeed Hosseini
Abstract:
Wireless sensor networks have significant potential to increase our ability to view and control the physical environment, but the issue of power consumption in these networks has become an important parameter in their reliability and since in many applications of networks. Wireless sensor needs to guarantee end-to-end quality parameters, support for quality of service in these networks is of utmos…
▽ More
Wireless sensor networks have significant potential to increase our ability to view and control the physical environment, but the issue of power consumption in these networks has become an important parameter in their reliability and since in many applications of networks. Wireless sensor needs to guarantee end-to-end quality parameters, support for quality of service in these networks is of utmost importance. In wireless sensor networks, one of the most important issues is the lifetime of each network, which is directly related to the energy consumption of the network sensors. Increasing network lifetime is one of the most challenging requirements in these types of networks. This paper presents a clustering approach to reduce power consumption in wireless sensor networks, which is the most effective method for scalability and energy consumption reduction in sensor networks. The simulation results show that the proposed algorithm can reduce the energy consumption of the wireless sensor network and dramatically increase the lifetime of the network.
△ Less
Submitted 16 July, 2022;
originally announced July 2022.
-
ML-Aided Collision Recovery for UHF-RFID Systems
Authors:
Talha Akyildiz,
Raymond Ku,
Nicholas Harder,
Najme Ebrahimi,
Hessam Mahdavifar
Abstract:
We propose a collision recovery algorithm with the aid of machine learning (ML-aided) for passive Ultra High Frequency (UHF) Radio Frequency Identification (RFID) systems. The proposed method aims at recovering the tags under collision to improve the system performance. We first estimate the number of tags from the collided signal by utilizing machine learning tools and show that the number of col…
▽ More
We propose a collision recovery algorithm with the aid of machine learning (ML-aided) for passive Ultra High Frequency (UHF) Radio Frequency Identification (RFID) systems. The proposed method aims at recovering the tags under collision to improve the system performance. We first estimate the number of tags from the collided signal by utilizing machine learning tools and show that the number of colliding tags can be estimated with high accuracy. Second, we employ a simple yet effective deep learning model to find the experienced channel coefficients. The proposed method allows the reader to separate each tag's signal from the received one by applying maximum likelihood decoding. We perform simulations to illustrate that the use of deep learning is highly beneficial and demonstrate that the proposed approach boosts the throughput performance of the standard framed slotted ALOHA (FSA) protocol from 0.368 to 1.837, where the receiver is equipped with a single antenna and capable of decoding up to 4 tags.
△ Less
Submitted 2 May, 2022; v1 submitted 22 February, 2022;
originally announced February 2022.
-
Probability Link Models with Symmetric Information Divergence
Authors:
Majid Asadi,
Karthik Devarajan,
Nader Ebrahimi,
Ehsan Soofi,
Lauren Spirko-Burns
Abstract:
This paper introduces link functions for transforming one probability distribution to another such that the Kullback-Leibler and Rényi divergences between the two distributions are symmetric. Two general classes of link models are proposed. The first model links two survival functions and is applicable to models such as the proportional odds and change point, which are used in survival analysis an…
▽ More
This paper introduces link functions for transforming one probability distribution to another such that the Kullback-Leibler and Rényi divergences between the two distributions are symmetric. Two general classes of link models are proposed. The first model links two survival functions and is applicable to models such as the proportional odds and change point, which are used in survival analysis and reliability modeling. A prototype application involving the proportional odds model demonstrates advantages of symmetric divergence measures over asymmetric measures for assessing the efficacy of features and for model averaging purposes. The advantages include providing unique ranks for models and unique information weights for model averaging with one-half as much computation requirement of asymmetric divergences. The second model links two cumulative probability distribution functions. This model produces a generalized location model which are continuous counterparts of the binary probability models such as probit and logit models. Examples include the generalized probit and logit models which have appeared in the survival analysis literature, and a generalized Laplace model and a generalized Student-$t$ model, which are survival time models corresponding to the respective binary probability models. Lastly, extensions to symmetric divergence between survival functions and conditions for copula dependence information are presented.
△ Less
Submitted 10 August, 2020;
originally announced August 2020.
-
Simultaneous Interference-Data Transmission for Secret Key Generation in Distributed IoT Sensor Networks
Authors:
Najme Ebrahimi,
Hun-seok Kim,
D Blaauw
Abstract:
Internet of Things (IoT) networks for smart sensor nodes in the next generation of smart wireless sensing systems require a distributed security scheme to prevent the passive (eavesdrop**) or active (jamming and interference) attacks from untrusted sensor nodes. This paper concerns advancing the security of the IoT system to address their vulnerability to being attacked or compromised by the adv…
▽ More
Internet of Things (IoT) networks for smart sensor nodes in the next generation of smart wireless sensing systems require a distributed security scheme to prevent the passive (eavesdrop**) or active (jamming and interference) attacks from untrusted sensor nodes. This paper concerns advancing the security of the IoT system to address their vulnerability to being attacked or compromised by the advancement of future supercomputers. In this work, a novel embedded architecture has been designed and implemented for a distributed IoT network that utilizes a master-slave full-duplex communication to exchange the random and continuous modulated phase shift as the secret key to be used in higher-layer encryptions.
△ Less
Submitted 29 October, 2019;
originally announced October 2019.
-
Secret Key Generation via Pulse-Coupled Synchronization
Authors:
Hessam Mahdavifar,
Najme Ebrahimi
Abstract:
A novel framework for sharing common randomness and generating secret keys in wireless networks is considered. In particular, a network of users equipped with pulse oscillators (POs) and coupling mechanisms in between is considered. Such mechanisms exist in synchronized biological and natural systems, and have been exploited to provide synchronization in distributed networks. We show that naturall…
▽ More
A novel framework for sharing common randomness and generating secret keys in wireless networks is considered. In particular, a network of users equipped with pulse oscillators (POs) and coupling mechanisms in between is considered. Such mechanisms exist in synchronized biological and natural systems, and have been exploited to provide synchronization in distributed networks. We show that naturally-existing initial random phase differences between the POs in the network can be utilized to provide almost identical common randomness to the users. This randomness is extracted from the synchronization time in the network. Bounds on the entropy of such randomness are derived for a two-user system and a conjecture is made for a general $n$-user system. Then, a three-terminal scenario is considered including two legitimate users and a passive eavesdropper, referred to as Eve. Since in a practical setting Eve receives pulses with propagation delays, she can not identify the exact synchronization time. A simplified model is then considered for Eve's receiver and then a bound on the rate of secret key generation is derived. Also, it is shown, under certain conditions, that the proposed protocol is resilient to an active jammer equipped with a similar pulse generation mechanism.
△ Less
Submitted 27 October, 2019;
originally announced October 2019.