Advanced Wireless Communication and Sensor Networks: Applications and Simulations

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Features: Covers technologies supporting advanced wireless communication system, sensor networks and the conceptual development of the subject. Discusses advanced data gathering and sharing/ distributed sensing techniques with its business applicability. Includes numerous worked-out mathematical equations/formulas, and essential principles including figures, illustrations, algorithms, and flow charts are included in the book. Provides pervasive background knowledge including both wireless communications and wireless sensor networks Covers wireless networks as well as sensor network models in detailed. This is aimed at graduate students, researchers and academicians working in the field of computer science, wireless communication technology, and advanced wireless sensor networks.

Author(s): Ashish Bagwari, Geetam Singh Tomar, Jyotshana Bagwari, Jorge Luis Victória Barbosa, Musti K.S. Sastry
Publisher: CRC Press/Chapman & Hall
Year: 2023

Language: German
Pages: 354
City: Boca Raton

Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Acknowledgments
Editor Biographies
List of Contributors
Part I Advanced Wireless Communication: Overview, Challenges, and Security Issues
1 Wireless Communication: Overview and Fundamentals
1.1 Introduction
1.2 Basic Outline of Communication Systems
1.3 Wireless Technologies
1.3.1 Wi-Fi 802.11
1.3.2 Bluetooth
1.3.3 WiMax 802.16
1.3.4 Radio-Frequency ID (RFID)
1.4 Signaling and Fading
1.5 Concluding Remarks
References
2 Introduction to Wireless Communication and Its Applications
2.1 Introduction
2.2 5G
2.3 Dual Band
2.4 Frequency Below 6 GHz
2.4.1 Advantages of Sub-6 GHz
2.5 Speed of 5G
2.6 Comparison of 5G Technology With Other Generations
2.7 Microstrip Patch Antenna for 5G
2.8 Simulation Results and Analysis
2.8.1 Gain
2.8.2 Voltage Standing Wave Ratio (VSWR)
2.8.3 Far Field for Antenna
2.8.4 Radiation Pattern
2.8.5 Rectangular Shaped Antenna Design (Simulation Results)
2.9 Conclusion and Future Work
Acknowledgments
References
3 Power and Information Transfer Using IoT With NOMA-Based GA-LPTS FBMC for Advanced Wireless and Sensor Networks
3.1 Introduction
3.2 Problems in the Existing Systems
3.2.1 Peak to Average Power Ratio
3.2.2 Power Spectral Density (PSD)
3.2.3 Signal to Noise Ratio
3.2.4 Spectral Efficiency
3.2.5 Computational Complexity
3.3 Related Works
3.4 Proposed Scheme
3.4.1 Downlink Phase
3.4.1.1 Information Receiver
3.4.1.2 Energy Receiver
3.4.2 Uplink Phase
3.5 Proposed NOMA Based Genetic Algorithm in Layered PTS FBMC–OQAM Scheme
3.5.1 Genetic Algorithm in Layered PTS
3.6 Simulation Results and Analysis
3.6.1 Comparison of PAPR
3.6.2 Comparison of Spectral Efficiency
3.6.3 Computational Complexity
3.6.4 Golden Section Search Method (Convergence Curve)
3.6.5 Performance of the Optimized Resource Allocation Scheme
3.7 Conclusion and Future Work
Acknowledgements
References
4 5G-NR Wideband MIMO Antenna Design Using Stepped Radiators for Wireless Communication
4.1 Introduction
4.2 MIMO Antenna Design and Results
4.3 Conclusion
4.4 Future Scope
References
5 Advanced Wireless Communication and Sensor Networks: Applications and Simulations
5.1 Introduction
5.2 Problems in Wireless Sensor Networks
5.2.1 Lack of Electrical Energy
5.2.2 Lack of Technological Support to Help Patients and Doctors
5.2.3 Poor Use of Resources in Agriculture
5.3 WSN Applications
5.3.1 Energy
5.3.2 E-Health
5.3.3 Buildings
5.3.4 Military
5.3.5 Industrial Detection
5.3.6 Agriculture
5.4 Simulators for Analysis Prior to Actual Deployment of a WSN
5.5 Conclusions
References
6 Advanced Wireless Communication: Technology Overview, Challenges, and Security Issues
6.1 Introduction to Wireless Communication Networks
6.2 Overview of Generations in Wireless Communication
6.3 OFDM
6.4 Motivation and Need
6.5 Challenges in Wireless Communications
6.5.1 Privacy, Secrecy, and Security
6.5.2 Communication Infrastructure
6.5.3 Wireless Energy and Power Transfer
6.5.4 Spectrum Utilization
6.5.5 Modulation and Coding
6.6 Conclusion and Future Work
Acknowledgments
References
Part II Advanced Wireless Sensor Networks: Architecture, Consensus, and Future Trends
7 Advanced Wireless Sensor Networks: Introduction and Challenges
7.1 Introduction
7.2 Flashback to Sensor Network Childhood
7.2.1 Transitions in WSN Technology
7.3 Characteristics of WSN
7.4 Fundamental Architecture
7.4.1 The Sensing Sub-System
7.4.1.1 Data-Centric Architectures
7.4.1.2 Hierarchical Architectures
7.4.1.3 Location-Based Architectures
7.4.1.4 Mobility-Based Architectures
7.4.1.5 QoS-Based Architectures
7.4.1.6 Network Flow Architecture
7.4.1.7 Multipath-Based Architectures
7.4.1.8 Heterogeneity-Based Architectures
7.5 Applications Where Advanced WSN Is Applied
7.5.1 Structural Health Monitoring
7.5.2 Traffic Control
7.5.3 Telemedicine
7.5.4 5G Communication (Radio Nodes)
7.5.5 Pipeline Monitoring
7.5.6 Precision Agriculture
7.6 Conclusion
References
8 Wireless Sensor Networks: Routing Protocols and Cross-Layer Solutions
8.1 Introduction
8.1.1 Technical Challenges in Cross-Layer Design
8.1.2 Problem Statement
8.1.3 Network Terminology
8.2 Literature Review
8.3 Materials and Methods
8.4 Proposed Scheme
8.4.1 Cross-Layer Designing-Routing Scheme
8.4.1.1 Architecture and Building Blocks
8.4.1.2 Energy Efficiency in Cross-Layer Techniques
8.5 Simulation Results
8.5.1 Multiple Access Schemes
8.5.2 Pooling in Multiple Access Schemes
8.5.3 Routing, Energy Efficiency, and Network Lifetime
8.5.3.1 Congestion Control in Wireless Networks
8.5.3.2 Cross-Layer Design and Optimization
8.5.3.3 The Need for a General Framework for Cross-Layer Design in Wireless Systems
8.6 Conclusion
References
9 Social Impacts of Technology With the Emergence of IoT, 5G, and Artificial Intelligence
9.1 Introduction
9.2 Recent Studies On the Social Impact of Technology
9.3 Integration of IoT With 5G
9.3.1 Role of Artificial Intelligence in Future Technology
9.3.2 Model to Integrate IoT, 5G, and Artificial Intelligence
9.4 Future Impacts of Technology
9.4.1 Personal Privacy Impact of IoT
9.4.2 Impact of Wearable IoT and 5G Devices
9.4.2.1 Control of Smart Sensors
9.4.2.2 Improved Patient Care
9.4.2.3 More Accurate Diagnosis of Health Problems
9.4.3 Economic Impacts of IoT and 5G
9.4.4 Social Impact On Human Life
9.5 Discussion and Analysis
9.6 Conclusion
References
Part III Advanced Wireless Sensor Networks: Power, Data Gathering Techniques, and Security
10 Power Management Strategies in Wireless Sensor Networks
10.1 Introduction
10.2 Requirements and Characteristics of WSNs
10.3 Related Work
10.4 Difficulties in WSNs
10.4.1 Power Management
10.4.2 Security
10.4.3 Data Aggregation
10.5 Causes of Energy Wastage in WSNs
10.6 Power Gating
10.7 Leakage Gating and WSNs
10.8 Techniques of Power Matching
10.9 Different Types of Power Sources
10.10 Power Modes in DRAM
10.11 Power Management Strategy
10.12 Dynamic Duty Cycle Scheduling Scheme
10.12.1 Static Power Saving
10.12.2 Dynamic Power Management
10.12.2.1 Sleeping Policy
10.12.2.2 Awakening Policy
10.13 Conclusion and Future Work
References
11 Power Management in Wireless Sensor Networks
11.1 Aim of this Study
11.2 Introduction
11.2.1 About Wireless Sensor Networks
11.2.2 Types of Wireless Sensor Network
11.2.3 About the Sensor Node and Its Architecture
11.3 Power Consumption in WSNs
11.3.1 About Power Consumption
11.3.2 Measurements of Power Consumption
11.3.2.1 Power Consumption at Node Level
11.3.2.2 Power Consumption at Network Level
11.3.2.3 Power Consumption at Software Level
11.4 Sources of Power Waste
11.5 Power Management in WSNs
11.5.1 About Power Management
11.5.2 Power Management Approaches
11.5.2.1 Management at Node Level
11.5.2.2 Management at Network Level
11.5.2.3 Management at Software Level
11.6 Power Conservation Techniques in WSNs
11.6.1 About Power Conservation
11.6.2 Challenges in Power Conservation
11.6.2.1 Energy Dissipation
11.6.2.2 Quality of Service
11.6.2.3 Transmission Mode
11.6.3 Different Power Conservation Techniques
11.6.3.1 Efficient Node Deployment
11.6.3.2 Data Reduction
11.6.3.3 Duty Cycling
11.6.3.4 Mobility Based Power Conservation
11.6.3.5 Power Efficient Routing Protocol
11.6.4 Analysis of Power Efficient Routing Protocol
11.6.4.1 Network Parameters
11.6.4.2 Simulation Results
11.7 Conclusion and Future Work
References
12 Wireless Sensor Networks: Power Management
12.1 Introduction
12.2 Wireless Sensor Network
12.2.1 Requirements for Implementing a WSN
12.3 Energy Harvesting Methods for Sensor Nodes
12.3.1 Electric Batteries
12.3.2 Rechargeable Batteries
12.3.3 Energy Harvesting
12.3.4 Hybrid Energy Harvesting (HEH)
12.4 Analysis of Power Consumption in Wireless Sensor Networks
12.5 Energy Management
12.6 Node Architecture
12.7 Conclusions
References
13 Security Enabling for IoT and Wireless Sensor Network Based Data Communication
13.1 Introduction
13.2 IoT and Wireless Sensor Network Based Embedded System
13.3 Data Security for IoT and Wireless Sensor Networks
13.3.1 Importance of Data Security
13.3.2 Data Security for Internet of Things (IoT)
13.3.3 Different Methods of Data Security
13.3.4 Role of Cryptography for Data Security
13.3.5 Types of Data Attacks for IoT Based Devices
13.3.6 Literature Solutions for Secure IoT Data Communication
13.3.7 Data Security Goals for IoT Devices
13.4 Security Issues in the Architecture of IoT and WSN
13.5 Proposed Model for Security of IoT Devices
13.6 Benefits of the Proposed Solution
13.7 Conclusion and Future Work
References
14 Wireless Sensor Network Security
14.1 Introduction
14.2 Security in Wireless Sensor Networks
14.2.1 Primary Security Objectives
14.2.1.1 Confidentiality
14.2.1.2 Authentication
14.2.1.3 Integrity
14.2.1.4 Availability
14.2.2 Secondary Security Objectives
14.2.2.1 Data Freshness
14.2.2.2 Traceability
14.2.2.3 Secure Location
14.3 Security Attacks On WSNs
14.3.1 Based On the Attacker’s Capability
14.3.1.1 Internal and External Attacks
14.3.1.2 Active and Passive Attacks
14.3.2 Based On the Protocol Stack
14.3.2.1 Physical Layer
14.3.2.2 Link Layer
14.3.2.3 Network Layer
14.3.2.4 Transport Layer
14.3.2.5 Application Layer
14.4 WSN Monitoring Systems
14.4.1 Indoor Environmental Monitoring
14.4.2 Outdoor Environmental Monitoring
14.4.3 Monitoring in Agriculture
14.4.4 Health Monitoring
14.5 Security Mechanisms for Sensor Networks
14.6 Wireless Security Protocol
14.6.1 WEP
14.6.2 WPA
14.6.3 WPA2
14.6.4 WPA3
14.7 Attacks Against TCP/IP Networks
14.7.1 Network Listeners
14.7.2 IP Fragmentation
14.7.3 Denial of Service Attacks
14.7.4 Footprinting
14.7.5 Fingerprinting
There Are Two Methods of Fingerprinting: Active and Passive. Active Fingerprinting Involves Analyzing the Server’s Response When TCP and UDP Packets Are Sent to It. This Method Allows for More Extensive and Detailed Information to Be Acquired, But It Is E
14.8 TCP/IP Network Security
14.8.1 Generic Vulnerabilities
14.8.2 Network Security Scanners
14.8.3 VPN
14.8.4 Firewall
14.9 Existing Solutions
14.9.1 Data Encryption Standard (DES)
14.9.2 Node-Level Security Solution
14.10 Conclusions
References
Part IV Advanced Wireless Sensor Networks: Applications, Opportunities, Challenges, and Simulation Results
15 Advanced Wireless Sensor Networks: Applications and Challenges
15.1 Introduction
15.2 WSNs’ Possibilities for Use
15.2.1 Applications for the Military
15.2.2 Monitoring the Health of the Structure
15.2.3 Monitoring of the Environment
15.2.4 Monitoring of Medical Care
15.2.5 At-Home Apps
15.2.6 Commercial Uses
15.3 Various Kinds of Mobile Networks
15.3.1 WPAN
15.3.2 WLAN
15.3.3 WMAN
15.3.4 WWAN
15.3.5 WGAN
15.4 Classification of Wireless Sensor Networks
15.5 The IEEE 802.15.4 Expertise
15.6 Design Challenges in WSNs
15.6.1 Scalability
15.6.2 Culpability Tolerance
15.6.3 Cost of Production
15.6.4 Hardware Limitations
15.6.5 The Transmission Media
15.6.6 Energy
15.6.7 Harsh Environment Conditions
15.6.8 Self-Management
15.6.9 Heterogeneity
15.6.10 Redundant Data
15.6.11 Event-Driven Challenge
15.6.12 Quality of Service (QoS)
15.6.13 Deployment
15.6.14 Localization
15.6.15 The Consumption of Power
15.7 Conclusion
15.8 Conclusion and Future Scope
Acknowledgments
References
16 A Novel Heuristic for Maximizing Lifetime of Target Coverage in Wireless Sensor Networks
16.1 Introduction
16.2 Problem Formulation
16.3 Proposed Heuristic
16.4 Mathematical Validation
16.5 Simulation Results and Analysis
16.5.1 Scenario 1
16.5.2 Scenario 2
16.5.3 Scenario 3
16.5.4 Scenario 4
16.5.5 Scenario 5
16.6 Conclusion and Future Work
References
17 Network Recovery in Dense and Emergency Areas Using a Temporary Base Station and an Unmanned Aerial Vehicle
17.1 Introduction
17.2 Problems in the Disaster Area
17.2.1 Classification of the Disaster Area
17.2.2 Communication Network Partially Or Fully Damaged
17.3 Related Work
17.3.1 Internet of Things (IoT)
17.3.2 Unmanned Aerial Vehicle Assisted Communication
17.3.3 Motivation and Contribution
17.4 Proposed System Model
17.4.1 Dense Area
17.4.2 Area Spectral Efficiency (ASE) for Dense Area
17.4.3 Emergency Area
17.4.4 Area Spectral Efficiency for Emergency Area
17.5 Simulation Results and Discussions
17.6 Conclusion and Future Work
Acknowledgment
References
18 Wireless Sensor Networks With the Internet of Things
18.1 Introduction
18.2 WSN Methodology
18.3 Architecture of WSN With IoT
18.4 Applications of WSN With IoT
18.4.1 Military Application
18.4.2 Environmental Application
18.4.3 Agricultural Application
18.4.4 Health Application
18.4.5 Infrastructure Monitoring Application
18.4.6 WSNs for Power Engineering Systems
18.5 Advantages of WSN With IoT
18.5.1 Effective in Harsh Environments
18.5.2 Data Collection Process in WSN
18.5.3 Long-Distance Communication
18.5.4 Protecting Hardware and Data Assets
18.6 Challenges of WSN With IoT
18.6.1 Real-Time Monitoring
18.6.2 Security and Safety
18.6.3 Quality of Service
18.6.4 Configuration
18.6.5 Availability
18.6.6 Data Integrity
18.6.7 Scalability
18.6.8 Power Consumption
18.6.9 Communication
18.7 Conclusion and Future Work
Acknowledgments
References
19 Wireless Sensor Networks for Energy, E-Health, Building Maintenance and Agriculture Areas, and Simulation Results
19.1 Introduction
19.2 Related Works
19.2.1 Various Attacks On Wireless Sensor Networks
19.2.2 Solutions to Overcome Attacks On WSNs
19.3 Materials and Methods
19.3.1 Proposed Model
19.3.1.1 Security Technologies Applied in the Model
19.3.1.2 Wireless Sensor Network in Agriculture Protection Model Proposed
19.3.1.3 Preparation for Model Implementation
19.3.1.4 Protection of the Sensor Node Message in the Process of Transmission
19.3.1.5 Verification of the Content of the Protected Message in the Process of Reception
19.4 Characteristics of the Model
19.5 Proposed Model Simulation Results and Discussions
19.6 Results and Discussions
19.7 Conclusion
Acknowledgements
References
20 A Survey On Opportunities and Challenges for Next Generation Wireless Sensor Networks
20.1 Introduction
20.2 Growth of Wireless Sensor Networks
20.2.1 Progress
20.2.2 Architectural View
20.2.2.1 Layered Network Architecture
20.2.2.2 Clustered Network Architecture
20.3 Next Generation Networks: IoT
20.3.1 Architecture
20.3.2 Challenges
20.3.2.1 Security
20.3.2.2 Platform
20.3.2.3 Interoperability and Standardization
20.3.2.4 Data Storage and Analytics
20.3.2.5 IoT Sensors and Devices
20.4 Next Generation Networks: Smart Grid
20.4.1 Remote System Monitoring
20.4.1.1 What Is a Smart Grid?
20.4.1.2 What Makes Up a Smart Grid?
20.4.1.3 The Current Smart Grid Market
20.4.1.4 Why Do We Need Smart Grids?
20.4.1.5 Reaping Rewards
20.4.1.6 The Future Is Now
20.5 Green Communication
20.5.1 Energy Monitoring
20.5.2 Algorithmic View
20.5.2.1 MAC Protocols for EH-WSNs
20.5.2.2 Transmission Schemes Classification
20.5.2.3 Routing Protocols for EH-WSNs
20.5.2.4 Schemes Based On Optimization of Battery Operation
20.5.2.5 Link Quality Measurements
20.6 Interference Measurements
20.7 Consummation
Acknowledgments
References
21 Various Simulation Tools for Wireless Sensor Networks
21.1 Introduction
21.2 Network Structure
21.3 Various Simulation Tools for Wireless Sensor Networks
21.3.1 NS-2/NS-3
21.3.2 OMNET++
21.3.3 J-Sim
21.3.4 JiST/SWANS
21.3.5 GloMoSim
21.3.6 SHAWN
21.3.7 OPNET Network Simulator
21.3.8 SENSE
21.3.9 VisualSense
21.3.10 TOSSIM
21.3.11 EmStar
21.3.11.1 EmSim/EmCee
21.3.11.2 EmView/EmProxy
21.3.11.3 EmRun
21.3.12 NetSim
21.3.13 ATEMU
21.3.14 PiccSim
21.4 Conclusion and Future Work
Acknowledgments
References
Index