amazon

Friday, July 31, 2015

Optimum Power Allocation in Sensor Networks for Active Radar Applications

Optimum Power Allocation in Sensor Networks for Active Radar                            Applications
Abstract:
*    We investigate the power allocation problem in distributed sensor networks that are used for target object classification. In the classification process, the absence, the presence, or the type of a target object is observed by the sensor nodes independently.
*    Since these local observations are noisy and thus unreliable, they are fused together as a single reliable observation at a fusion center.
*    The fusion center uses the best linear unbiased estimator in order to accurately estimate the reflection coefficient of target objects.
*    We utilize the average deviation between the estimated and the actual reflection coefficient as a metric for defining the objective function.
*    First, we demonstrate that the corresponding optimization of the power allocation leads to a signomial program which is in general quite hard to solve.
*    Nonetheless, by using the proposed system model, fusion rule and objective function, we are able to optimize the power allocation analytically and can hence present a closed-form solution. Since the power consumption of the entire network may be limited in various aspects, three different cases of power constraints are discussed and compared with each other.
*     







Architecture:











Existing System:

*    In general, the objective is to maximize the overall classification probability, however, a direct solution to the allocation problem does not exist, since no analytical expression for the overall classification probability is available.
*    we will see later that only a single feasible stationary point exists.

Disadvantages:
                           However, they still suffer inherent shortcomings such as limited radio coverage, poor system reliability, and lack of security and privacy.




Proposed System:
*    First, we demonstrate that the corresponding optimization of the power allocation leads to a signomial program which is in general quite hard to solve.
*    Nonetheless, by using the proposed system model, fusion rule and objective function, we are able to optimize the power allocation analytically and can hence present a closed-form solution.
*    Since the power consumption of the entire network may be limited in various aspects, three different cases of power constraints are discussed and compared with each other.
*    In addition, a sensitivity analysis of the optimal power allocation with respect to perfect and imperfect parameter knowledge is worked out.

*    proposed system is the first region in which 2 g 2 g holds, while a system operation in the third region, for which 2 g  2 g holds, should be avoided

*    Advantages:

                        In addition, some advanced attacks, such as traffic analysis and flow tracing, can also be launched by a malicious adversary to compromise users’ privacy, including source anonymity and traffic secrecy.








Modules:

1.     Analytical power allocation.
2.     energy-efficient optimization.
3.     Threat models.
4.     distributed target classification.
5.     network resource management.
6.     information fusion.
7.     information fusion

1.     Analytical power allocation:

*    we investigate the power allocation problem in distributed sensor networks that are used for active radar applications.
*    the power allocation problem for distributed wireless sensor networks, which perform object detection and classification, is only treated for ultra-wide bandwidth (UWB) technology.
*    For active radar systems an optimal solution to the power allocation problem is only known for high signal-to-noise ratios (SNRs), see.
*    This limits the usability of this criterion for solving the power allocation problem.
*    power allocation scheme is still an open problem in order to improve the overall classification probability.
*    we present the analytical solution of the power allocation problem for the case where the average transmission power of each SN is limited by the output power-range limitation Pmax 2 R+. Finally, we extend the power allocation problem to the case where both constraints simultaneously hold and present the corresponding optimal solution.





2.     energy-efficient optimization:

*    Note that the sum-power constraint Ptot is a reasonable approach to compare energy-efficient radar systems.
              
*    In order to save energy, the value of Ptot should be as small as possible, which means that a single SN or only a few SNs are active.

*    Hence, if the number ~K of active SNs is satisfactory in order to accurately estimate all important parameters of the target, then the best energy-aware value of Ptot is equal to ~K Pmax.
3.     Threat models:

*    We consider the following two attack models.
*    Outside Attacker: An outside attacker can be considered as a global passive eavesdropper who has the ability to observe all network links. An outside attacker can examine the tags and message content, and thus link outgoing packets with incoming packets.
*    Further, even if end-to-end encryption is applied to messages at a higher layer, it is still possible for a global outside attacker to trace packets by analyzing and comparing the message cipher text.

*    Inside attacker: An inside attacker may compromise several intermediate nodes. Link-to -link encryption is vulnerable to inside attackers since they may already have obtained the decryption keys and thus the message plaintext can be easily recovered.

*    Both inside and outside attackers may perform more advanced traffic analysis/flow tracing techniques, including size correlation, time correlation, and message content correlation.




4.     Enhanced Privacy against traffic analysis and flow tracing:
                               
*    In the classification process, the absence, the presence, or the type of a target object is observed by the sensor nodes independently.
*     the power allocation problem for distributed wireless sensor networks, which perform object detection and classification, is only treated for ultra-wide bandwidth (UWB) technology.
*     The main difficulty for optimizing the power consumption is associated with finding a closed-form equation for the overall classification probability. The sensing task and its corresponding communication task for a single classification process are performed in consecutive time slots.
*    we are able to separate the power allocation problem from the classification problem and optimize both independently.

5.network resource management:

*    Since the power consumption of the entire network may be limited in various aspects, three different cases of power constraints are discussed and compared with each other Currently,
*    distributed detection is rather discussed in the context of wireless sensor networks, where the sensor units may also be radar nodes a network of amplify-and-forward SNs.
*    Based on a simple system model, we apply a linear fusion rule and utilize the average deviation between the estimated and the actual reflection coefficient as a metric for defining the objective function.



Algorithm:
                  Homomorphic encryption algorithm.

We will take the the encryption method when necessary. Note that the computational overhead is counted independent of the underlying network coding framework. Actually, the scalar multiplicatively can be deduced from the addictively, since 𝐸(𝑥 𝑡) = 𝐸(Σ𝑡𝑖=1 𝑥). Where the addition on plaintext can be achieved by performing a multiplicative operation on the corresponding cipher text, i.e., 𝐸(𝑥1 + 𝑥2) = 𝐸(𝑥1) 𝐸(𝑥2). Further, the following two equations can be easily derived:
              𝐸(𝑥 𝑡) = 𝐸𝑡(𝑥) 𝐸(Σ𝑖 𝑥𝑖 𝑡𝑖) =Π𝑖 𝐸𝑡𝑖 (𝑥𝑖)


SYSTEM SPECIFICATION
Hardware Requirements:

v System         :   Pentium IV 2.4 GHz.
v Hard Disk      :   40 GB.
v Floppy Drive :   1.44 Mb.
v Monitor         :   14’ Colour Monitor.
v Mouse           :   Optical Mouse.
v Ram                     :   512 Mb.

Software Requirements:

v Operating system :   Windows 7 Ultimate.
v Coding Language :   ASP.Net with C#
v Front-End            : Visual Studio 2010 Professional.
v Data Base            :   SQL Server 2008.


Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks




Mobile Data Gathering with Load Balanced Clustering and Dual Data
Uploading in Wireless Sensor Networks



Abstract:

In this paper, a three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-DDU. The objective is to achieve good scalability, long network lifetime and low data collection latency.

At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster
heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy- saving inter-cluster communications. Through intercluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data





to SenCar in each time by utilizing multi-user multiple-input and multiple-
output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-DDU scheme. The results show that when each cluster has at most two cluster heads, LBC-DDU achieves over 50% energy saving per node and 60% energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20% shorter data collection time compared to traditional mobile data gathering.







Existing System:

Sensors are generally densely deployed and randomly scattered over a sensing field and left unattended after being deployed, which makes it difficult to recharge or replace their batteries. After sensors form into autonomous organizations, those sensors near the data sink typically deplete their batteries much faster than others due to more relaying traffic. When sensors around the data sink deplete their energy, network connectivity and coverage may not be guaranteed.

Due to these constraints, it is crucial to design an energy-efficient data collection scheme that consumes energy uniformly across the sensing field to achieve long network lifetime. Furthermore, as sensing data in some applications are time-sensitive, data collection may be required to be performed within a specified time frame. Therefore, an efficient, large-scale





data collection scheme should aim at good scalability, long network
lifetime and low data latency.

Proposed System:

First, we propose a distributed algorithm to organize sensors into clusters, where each cluster has multiple cluster heads. In contrast to clustering techniques proposed in previous works, our algorithm balances the load of intra-cluster aggregation and enables dual data uploading between multiple cluster heads and the mobile collector.

Second, multiple cluster heads within a cluster can collaborate with each other to perform energy-efficient inter cluster transmissions. Different from other hierarchical schemes, in our algorithm, cluster heads do not relay
data packets from other clusters, which effectively alleviates the burden of
each cluster head.

Instead, forwarding paths among clusters are only used to route small- sized identification (ID) information of cluster heads to the mobile collector for optimizing the data collection tour.

Third, we deploy a mobile collector with two antennas (called SenCar in this paper) to allow concurrent uploading from two cluster heads by using MU-MIMO communication.

Hardware Requirements:



•       System              : Pentium IV 2.4 GHz.

•       Hard Disk        : 40 GB.

•       Floppy Drive   : 1.44 Mb.

•       Monitor            : 15 VGA Colour.





•       Mouse               : Logitech.

•       RAM                 : 256 Mb.




Software Requirements:


•       Operating system    : - Windows XP.

•       Front End                  : - JSP

•       Back End                   : - SQL Server




Software Requirements:


•       Operating system    : - Windows XP.

•       Front End                  : - .Net


•       Back End                   : - SQL Server