amazon

Friday, July 31, 2015

Optimum Power Allocation in Sensor Networks for Active Radar Applications

Optimum Power Allocation in Sensor Networks for Active Radar                            Applications
Abstract:
*    We investigate the power allocation problem in distributed sensor networks that are used for target object classification. In the classification process, the absence, the presence, or the type of a target object is observed by the sensor nodes independently.
*    Since these local observations are noisy and thus unreliable, they are fused together as a single reliable observation at a fusion center.
*    The fusion center uses the best linear unbiased estimator in order to accurately estimate the reflection coefficient of target objects.
*    We utilize the average deviation between the estimated and the actual reflection coefficient as a metric for defining the objective function.
*    First, we demonstrate that the corresponding optimization of the power allocation leads to a signomial program which is in general quite hard to solve.
*    Nonetheless, by using the proposed system model, fusion rule and objective function, we are able to optimize the power allocation analytically and can hence present a closed-form solution. Since the power consumption of the entire network may be limited in various aspects, three different cases of power constraints are discussed and compared with each other.
*     







Architecture:











Existing System:

*    In general, the objective is to maximize the overall classification probability, however, a direct solution to the allocation problem does not exist, since no analytical expression for the overall classification probability is available.
*    we will see later that only a single feasible stationary point exists.

Disadvantages:
                           However, they still suffer inherent shortcomings such as limited radio coverage, poor system reliability, and lack of security and privacy.




Proposed System:
*    First, we demonstrate that the corresponding optimization of the power allocation leads to a signomial program which is in general quite hard to solve.
*    Nonetheless, by using the proposed system model, fusion rule and objective function, we are able to optimize the power allocation analytically and can hence present a closed-form solution.
*    Since the power consumption of the entire network may be limited in various aspects, three different cases of power constraints are discussed and compared with each other.
*    In addition, a sensitivity analysis of the optimal power allocation with respect to perfect and imperfect parameter knowledge is worked out.

*    proposed system is the first region in which 2 g 2 g holds, while a system operation in the third region, for which 2 g  2 g holds, should be avoided

*    Advantages:

                        In addition, some advanced attacks, such as traffic analysis and flow tracing, can also be launched by a malicious adversary to compromise users’ privacy, including source anonymity and traffic secrecy.








Modules:

1.     Analytical power allocation.
2.     energy-efficient optimization.
3.     Threat models.
4.     distributed target classification.
5.     network resource management.
6.     information fusion.
7.     information fusion

1.     Analytical power allocation:

*    we investigate the power allocation problem in distributed sensor networks that are used for active radar applications.
*    the power allocation problem for distributed wireless sensor networks, which perform object detection and classification, is only treated for ultra-wide bandwidth (UWB) technology.
*    For active radar systems an optimal solution to the power allocation problem is only known for high signal-to-noise ratios (SNRs), see.
*    This limits the usability of this criterion for solving the power allocation problem.
*    power allocation scheme is still an open problem in order to improve the overall classification probability.
*    we present the analytical solution of the power allocation problem for the case where the average transmission power of each SN is limited by the output power-range limitation Pmax 2 R+. Finally, we extend the power allocation problem to the case where both constraints simultaneously hold and present the corresponding optimal solution.





2.     energy-efficient optimization:

*    Note that the sum-power constraint Ptot is a reasonable approach to compare energy-efficient radar systems.
              
*    In order to save energy, the value of Ptot should be as small as possible, which means that a single SN or only a few SNs are active.

*    Hence, if the number ~K of active SNs is satisfactory in order to accurately estimate all important parameters of the target, then the best energy-aware value of Ptot is equal to ~K Pmax.
3.     Threat models:

*    We consider the following two attack models.
*    Outside Attacker: An outside attacker can be considered as a global passive eavesdropper who has the ability to observe all network links. An outside attacker can examine the tags and message content, and thus link outgoing packets with incoming packets.
*    Further, even if end-to-end encryption is applied to messages at a higher layer, it is still possible for a global outside attacker to trace packets by analyzing and comparing the message cipher text.

*    Inside attacker: An inside attacker may compromise several intermediate nodes. Link-to -link encryption is vulnerable to inside attackers since they may already have obtained the decryption keys and thus the message plaintext can be easily recovered.

*    Both inside and outside attackers may perform more advanced traffic analysis/flow tracing techniques, including size correlation, time correlation, and message content correlation.




4.     Enhanced Privacy against traffic analysis and flow tracing:
                               
*    In the classification process, the absence, the presence, or the type of a target object is observed by the sensor nodes independently.
*     the power allocation problem for distributed wireless sensor networks, which perform object detection and classification, is only treated for ultra-wide bandwidth (UWB) technology.
*     The main difficulty for optimizing the power consumption is associated with finding a closed-form equation for the overall classification probability. The sensing task and its corresponding communication task for a single classification process are performed in consecutive time slots.
*    we are able to separate the power allocation problem from the classification problem and optimize both independently.

5.network resource management:

*    Since the power consumption of the entire network may be limited in various aspects, three different cases of power constraints are discussed and compared with each other Currently,
*    distributed detection is rather discussed in the context of wireless sensor networks, where the sensor units may also be radar nodes a network of amplify-and-forward SNs.
*    Based on a simple system model, we apply a linear fusion rule and utilize the average deviation between the estimated and the actual reflection coefficient as a metric for defining the objective function.



Algorithm:
                  Homomorphic encryption algorithm.

We will take the the encryption method when necessary. Note that the computational overhead is counted independent of the underlying network coding framework. Actually, the scalar multiplicatively can be deduced from the addictively, since 𝐸(𝑥 𝑡) = 𝐸(Σ𝑡𝑖=1 𝑥). Where the addition on plaintext can be achieved by performing a multiplicative operation on the corresponding cipher text, i.e., 𝐸(𝑥1 + 𝑥2) = 𝐸(𝑥1) 𝐸(𝑥2). Further, the following two equations can be easily derived:
              𝐸(𝑥 𝑡) = 𝐸𝑡(𝑥) 𝐸(Σ𝑖 𝑥𝑖 𝑡𝑖) =Π𝑖 𝐸𝑡𝑖 (𝑥𝑖)


SYSTEM SPECIFICATION
Hardware Requirements:

v System         :   Pentium IV 2.4 GHz.
v Hard Disk      :   40 GB.
v Floppy Drive :   1.44 Mb.
v Monitor         :   14’ Colour Monitor.
v Mouse           :   Optical Mouse.
v Ram                     :   512 Mb.

Software Requirements:

v Operating system :   Windows 7 Ultimate.
v Coding Language :   ASP.Net with C#
v Front-End            : Visual Studio 2010 Professional.
v Data Base            :   SQL Server 2008.


No comments:

Post a Comment