Current Issue : October-December Volume : 2024 Issue Number : 4 Articles : 5 Articles
A distributed state observer is designed for state estimation and tracking of mobile robots amidst dynamic environments and occlusions within distributed LiDAR sensor networks. The proposed novel framework enhances three-dimensional bounding box detection and tracking utilizing a consensus-based information filter and a region of interest for state estimation of mobile robots. The framework enables the identification of the input to the dynamic process using remote sensing, enhancing the state prediction accuracy for low-visibility and occlusion scenarios in dynamic scenes. Experimental evaluations in indoor settings confirm the effectiveness of the framework in terms of accuracy and computational efficiency. These results highlight the benefit of integrating stationary LiDAR sensors’ state estimates into a switching consensus information filter to enhance the reliability of tracking and to reduce estimation error in the sense of mean square and covariance....
This paper proposed a model to estimate sensor spacing and a new deployment geometry and evaluates the performance of an ultrasonic sensor array according to the deployment geometry. The proposed spacing estimation model is based on the probability of false detection alarms, the aperture angle, and the sensor range. A design technique has been proposed for elliptical deployment geometry, giving expressions for its parameters to help designers of experimental prototypes to reduce errors related to sensor disposition. A practical method for calibrating ultrasonic sensors has been designed to reduce measurement errors. An experiment was conducted, and the data were analysed using a statistical significance test. An evaluation of the performance of an ultrasonic sensor array with linear and circular deployment geometry with and without our method was done and then compared to our proposed deployment geometry which was combined with the proposed method. The result of the statistical significance test shows that elliptical deployment geometry combined with the suggested strategy works better than circular and linear geometry. This applies to performance such as linear correlation, RMSE, MAPE, and standard deviation. These results show the importance of the choice of deployment geometry for application....
Optimal maintenance decision for a sensor network aims to intelligently determine the optimal repair time. The accuracy of the optimal maintenance decision method directly affects the reliability and safety of the sensor network. This paper develops a new optimal maintenance decision method based on belief rule base considering attribute correlation (BRB-c), which is designed to address three challenges: the lack of observation data, complex system mechanisms, and characteristic correlation. This method consists of two sections: the health state assessment model and the health state prediction model. Firstly, the former is accomplished through a BRB-c-based health assessment model that considers characteristic correlation. Subsequently, based on the current health state, a Wiener process is used to predict the health state of the sensor network. After predicting the health state, experts are then required to establish the minimum threshold, which in turn determines the optimal maintenance time. To demonstrate the proposed method is effective, a case study for the wireless sensor network (WSN) of oil storage tank was conducted. The experimental data were collected from an actual storage tank sensor network in Hainan Province, China. The experimental results validate the accuracy of the developed optimal maintenance decision model, confirming its capability to efficiently predict the optimal maintenance time....
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to decode sensitive data from the source without authorization. To achieve secure communication, we employ destination-assisted jamming to prevent the untrusted relay from decoding sensitive data while serving as a useful energy source. We derive the interception probability (IP), connection outage probability (COP), and effective secrecy throughput (EST) in closed form for time switching relaying (TSR) strategy. Subsequently, we conduct an asymptotic analysis in the high signal-to-noise ratio (SNR) regime to provide practical insights into how various system parameters affect security, reliability, and efficiency, including time switching factor and the level of hardware impairments. Our findings demonstrate that the presence of hardware impairments improves security performance but compromises reliability performance, which does more harm than good....
In wireless sensor networks (WSNs), sensor nodes are randomly distributed to transmit sensed data packets to the base station periodically. These sensor nodes, because of constrained battery power and storage space, cannot utilize conventional security measures. The widely held challenging issues for the network layer of WSNs are the packet-dropping attacks, mainly sinkhole and wormhole attacks, which focus on the routing pattern of the protocol. This thesis presents an improved version of the second level of the guard to the system, intrusion detection systems (IDSs), to limit the hostile impact of these attacks in a Low Energy Adaptive Clustering Hierarchy (LEACH) environment. The proposed system named multipath intrusion detection system (MIDS) integrates an IDs with ad hoc on-demand Multipath Distance Vector (AOMDV) protocol. The IDS agent uses the number of packets transmitted and received to calculate intrusion ratio (IR), which helps to mitigate sinkhole attacks and from AOMDV protocol round trip time (RTT) is computed by taking the difference between route request and route reply time to mitigate wormhole attack. MATLAB simulation results show that this cooperative model is an effective technique due to the higher packet delivery ratio (PDR), throughput, and detection accuracy. The proposed MIDS algorithm is proven to be more efficient when compared with an existing LEACH-based IDS system and MS-LEACH in terms of overall energy consumption, lifetime, and throughput of the network....
Loading....