Distributed and Iterative Processing for Wireless Sensor Networks with Multiple Local Fusion Centres
Lead Research Organisation:
Swansea University
Department Name: College of Engineering
Abstract
Wireless sensor networks (WSNs) are becoming popular as wireless sensor nodes are matured with advanced sensor and wireless communication technologies. In general, sensor nodes are capable of sensing, computing, and communicating. Therefore sensor networks are widely used in military battlefield surveillance. However, at the same time, as most sensor nodes are battery-powered, some functions may not be fully utilized and limited by certain constraints. To overcome power constraints of sensor nodes, the use of multiple local fusion centers (LFCs) could be effective, which allows building the WSN in a layered manner. A LFC will collect information from closely located sensor nodes. Thus, sensor nodes can save power. To share measured information for better estimation, the LFCs in a WSN are connected through a certain wireless mesh network. In this proposed project, we aim at developing i) distributed estimation methods at a local fusion; ii) iterative cooperation communication mechanisms between LFCs; and iii) performance analysis to optimize the performance with constraints.
Publications
Choi J
(2012)
On Multiple Access Using H-ARQ with SIC Techniques for Wireless Ad Hoc Networks
in Wireless Personal Communications
Choi J
(2012)
Rate Allocation for Multipath Routing in Wireless Multihop Networks with Security Constraints Based on Erasure Channel Modeling
in IEEE Transactions on Communications
Hyoungsuk Jeon
(2011)
Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR
in IEEE Transactions on Information Theory
Hyoungsuk Jeon
(2010)
Channel-Aware Energy Efficient Transmission Strategies for Large Wireless Sensor Networks
in IEEE Signal Processing Letters
Jeon H
(2013)
Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks
in IEEE Transactions on Information Forensics and Security
Description | There are various sources for security from the nature. In particular, surrounding environments of sensors or devices can be exploited to improve the security. These sources can help IoT devices more secure when they send data back to networks. |
Exploitation Route | Cybersecurity industry has focused on conventional cryptography-based approaches. For IoT devices, such approaches may need to be modified and integrated with physical layer security techniques. |
Sectors | Aerospace, Defence and Marine,Construction,Digital/Communication/Information Technologies (including Software),Manufacturing, including Industrial Biotechology,Retail |
Description | The Internet of Things (IoT) has attracted a lot of attention and the connectivity for devices of limited capabilities are to be supported. This brings some challenges, e.g., security for devices of limited computing power. Our research for physical layer security can help secure IoT by providing lightweight encryption together with some features of physical layer security that has been used for sensors. |
First Year Of Impact | 2015 |
Sector | Aerospace, Defence and Marine,Construction,Digital/Communication/Information Technologies (including Software),Electronics,Energy,Environment,Healthcare,Manufacturing, including Industrial Biotechology,Retail |
Impact Types | Economic |