Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (58)

Search Parameters:
Keywords = Physical Layer (PHY)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 662 KiB  
Article
Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array
by Xuehan Wu, Huaizong Shao, Jingran Lin, Ye Pan and Weijie Xiong
Entropy 2025, 27(4), 401; https://doi.org/10.3390/e27040401 - 9 Apr 2025
Cited by 1 | Viewed by 454
Abstract
Physical-layer (PHY) security is widely used as an effective method for ensuring secure wireless communications. However, when the legitimate user (LU) and the eavesdropper (Eve) are in close proximity, the channel coupling can significantly degrade the secure performance of PHY. Frequency diverse array [...] Read more.
Physical-layer (PHY) security is widely used as an effective method for ensuring secure wireless communications. However, when the legitimate user (LU) and the eavesdropper (Eve) are in close proximity, the channel coupling can significantly degrade the secure performance of PHY. Frequency diverse array (FDA) technique addresses channel coupling issues by introducing frequency offsets among array elements. However, FDA’s ability to secure communication relies mainly on frequency domain characteristics, lacking the spatial degrees of freedom. The recently proposed movable antenna (MA) technology serves as an effective approach to overcome this limitation. It offers the flexibility to adjust antenna positions dynamically, thereby further decoupling the channels between LU and Eve. In this paper, we propose a novel MA-FDA approach, which offers a comprehensive solution for enhancing PHY security. We aim to maximize the achievable secrecy rate through the joint optimization of all antenna positions at the base station (BS), FDA frequency offsets, and beamformer, subject to the predefined regions for antenna positions, frequency offsets range, and energy constraints. To solve this non-convex optimization problem, which involves highly coupled variables, the alternating optimization (AO) method is employed to cyclically update the parameters, with the projected gradient ascent (PGA) method and block successive upper-bound minimization (BSUM) method being employed to tackle the challenging subproblems. Simulation results demonstrate that the MA-FDA approach can achieve a higher secrecy rate compared to the conventional phased array (PA) or fixed-position antenna (FPA) schemes. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

40 pages, 1010 KiB  
Review
Survey on 5G Physical Layer Security Threats and Countermeasures
by Michal Harvanek, Jan Bolcek, Jan Kufa, Ladislav Polak, Marek Simka and Roman Marsalek
Sensors 2024, 24(17), 5523; https://doi.org/10.3390/s24175523 - 26 Aug 2024
Cited by 8 | Viewed by 5583
Abstract
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the [...] Read more.
With the expansion of wireless mobile networks into both the daily lives of individuals as well as into the widely developing market of connected devices, communication is an increasingly attractive target for attackers. As the complexity of mobile cellular systems grows and the respective countermeasures are implemented to secure data transmissions, the attacks have become increasingly sophisticated on the one hand, but at the same time the system complexity can open up expanded opportunities for security and privacy breaches. After an in-depth summary of possible entry points to attacks to mobile networks, this paper first briefly reviews the basic principles of the physical layer implementation of 4G/5G systems, then gives an overview of possible attacks from a physical layer perspective. It also provides an overview of the software frameworks and hardware tool-software defined radios currently in use for experimenting with 4G/5G mobile networks, and it discusses their basic capabilities. In the final part, the paper summarizes the currently most promising families of techniques to detect illegitimate base stations—the machine-learning-based, localization-based, and behavior-based methods. Full article
Show Figures

Figure 1

22 pages, 601 KiB  
Article
Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems
by Changjian Qin, Mu Niu, Pinchang Zhang and Ji He
Drones 2024, 8(8), 358; https://doi.org/10.3390/drones8080358 - 30 Jul 2024
Cited by 3 | Viewed by 1276
Abstract
Reconfigurable Intelligent Surface (RIS)-assisted Unmanned Aerial Vehicle (UAV) communications face a critical security threat from impersonation attacks, where adversaries impersonate legitimate entities to infiltrate networks to obtain private data or unauthorized access. To combat such security threats, this paper proposes a novel physical [...] Read more.
Reconfigurable Intelligent Surface (RIS)-assisted Unmanned Aerial Vehicle (UAV) communications face a critical security threat from impersonation attacks, where adversaries impersonate legitimate entities to infiltrate networks to obtain private data or unauthorized access. To combat such security threats, this paper proposes a novel physical layer (PHY-layer) authentication scheme for validating UAV identity in RIS-enabled UAV wireless networks. Considering that most existing works focus on traditional communication systems such as IoT and millimeter wave multiple-input multiple-output (MIMO) systems, there is currently no mature PHY-layer authentication scheme to serve RIS-UAV communication systems. To this end, our scheme leverages the unique characteristics of cascaded channels related to RIS to verify the legitimacy of UAV transmitting signals to the base station (BS). To be more precise, we first use the least squares estimate method and coordinate a descent-based algorithm to extract the cascaded channel feature. Next, we explore a quantizer to quantize the fluctuations of the channel gain that are related to the extracted channel feature. The 1-bit quantizer’s output findings are exploited to generate the authentication decision criteria, which are then tested using a binary hypothesis. The statistical signal processing technique is utilized to obtain the analytical formulations for detection and false alarm probabilities. We also conduct a computational complexity analysis of the proposed scheme. Finally, the numerical results validate the effectiveness of the proposed performance metric models and show that our detection performance can reach over 90% accuracy at a low signal-to-noise ratio (e.g., −8 dB), with a 10% improvement in detection accuracy compared with existing schemes. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

25 pages, 3289 KiB  
Article
Software-Defined Radio Implementation of a LoRa Transceiver
by João Pedro de Omena Simas, Daniel Gaetano Riviello and Roberto Garello
Sensors 2024, 24(15), 4825; https://doi.org/10.3390/s24154825 - 25 Jul 2024
Viewed by 2348
Abstract
The number of applications of low-power wide-area networks (LPWANs) has been growing quite considerably in the past few years and so has the number of protocol stacks. Despite this fact, there is still no fully open LPWAN protocol stack available to the public, [...] Read more.
The number of applications of low-power wide-area networks (LPWANs) has been growing quite considerably in the past few years and so has the number of protocol stacks. Despite this fact, there is still no fully open LPWAN protocol stack available to the public, which limits the flexibility and ease of integration of the existing ones. The closest to being fully open is LoRa; however, only its medium access control (MAC) layer, known as LoRaWAN, is open and its physical and logical link control layers, also known as LoRa PHY, are still only partially understood. In this paper, the essential missing aspects of LoRa PHY are not only reverse engineered, but also, a new design of the transceiver and its sub-components are proposed and implemented in a modular and flexible way using GNU Radio. Finally, some examples of applications of both the transceiver and its components, which are made to be run in a simple setup by using cheap and widely available off-the-shelf hardware, are given to show how the library can be used and extended. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

23 pages, 5653 KiB  
Article
LoRa Technology Propagation Models for IoT Network Planning in the Amazon Regions
by Wirlan G. Lima, Andreia V. R. Lopes, Caio M. M. Cardoso, Jasmine P. L. Araújo, Miércio C. A. Neto, Maria E. L. Tostes, Andréia A. Nascimento, Mauricio Rodriguez and Fabrício J. B. Barros
Sensors 2024, 24(5), 1621; https://doi.org/10.3390/s24051621 - 1 Mar 2024
Cited by 14 | Viewed by 4017
Abstract
Designing and deploying telecommunications and broadcasting networks in the challenging terrain of the Amazon region pose significant obstacles due to its unique morphological characteristics. Within low-power wide-area networks (LPWANs), this research study introduces a comprehensive approach to modeling large-scale propagation loss channels specific [...] Read more.
Designing and deploying telecommunications and broadcasting networks in the challenging terrain of the Amazon region pose significant obstacles due to its unique morphological characteristics. Within low-power wide-area networks (LPWANs), this research study introduces a comprehensive approach to modeling large-scale propagation loss channels specific to the LoRaWAN protocol operating at 915 MHz. The objective of this study is to facilitate the planning of Internet of Things (IoT) networks in riverside communities while accounting for the mobility of end nodes. We conducted extensive measurement campaigns along the banks of Universidade Federal do Pará, capturing received signal strength indication (RSSI), signal-to-noise ratio (SNR), and geolocated point data across various spreading factors. We fitted the empirical close-in (CI) and floating intercept (FI) propagation models for uplink path loss prediction and compared them with the Okumura–Hata model. We also present a new model for path loss with dense vegetation. Furthermore, we calculated received packet rate statistics between communication links to assess channel quality for the LoRa physical layer (PHY). Remarkably, both CI and FI models exhibited similar behaviors, with the newly proposed model demonstrating enhanced accuracy in estimating radio loss within densely vegetated scenarios, boasting lower root mean square error (RMSE) values than the Okumura–Hata model, particularly for spreading factor 9 (SF9). The radius coverage threshold, accounting for node mobility, was 945 m. This comprehensive analysis contributes valuable insights for the effective deployment and optimization of LoRa-based IoT networks in the intricate environmental conditions of the Amazon region. Full article
(This article belongs to the Special Issue The Internet of Things: Sensing Applications and Developments)
Show Figures

Figure 1

22 pages, 5833 KiB  
Article
Software Platform for the Comprehensive Testing of Transmission Protocols Developed in GNU Radio
by Mihai Petru Stef and Zsolt Alfred Polgar
Information 2024, 15(1), 62; https://doi.org/10.3390/info15010062 - 20 Jan 2024
Cited by 2 | Viewed by 2506
Abstract
With the constant growth of software-defined radio (SDR) technologies in fields related to wireless communications, the need for efficient ways of testing and evaluating the physical-layer (PHY) protocols developed for these technologies in real-life traffic scenarios has become more critical. This paper proposes [...] Read more.
With the constant growth of software-defined radio (SDR) technologies in fields related to wireless communications, the need for efficient ways of testing and evaluating the physical-layer (PHY) protocols developed for these technologies in real-life traffic scenarios has become more critical. This paper proposes a software testbed that enhances the creation of network environments that allow GNU radio applications to be fed with test traffic in a simple way and through an interoperable interface. This makes the use of any traffic generator possible—existing ones or one that is custom-built—to evaluate a GNU radio application. In addition, this paper proposes an efficient way to collect PHY-specific monitoring data to improve the performance of the critical components of the message delivery path by employing the protocol buffers library. This study considers the entire testing and evaluation ecosystem and demonstrates how PHY-specific monitoring information is collected, handled, stored, and processed as time series to allow complex visualization and real-time monitoring. Full article
(This article belongs to the Special Issue Advances in Telecommunication Networks and Wireless Technology)
Show Figures

Figure 1

21 pages, 3451 KiB  
Article
Improving the Reliability of Long-Range Communication against Interference for Non-Line-of-Sight Conditions in Industrial Internet of Things Applications
by Boubaker Abdallah, Sabrine Khriji, Rym Chéour, Charbel Lahoud, Klaus Moessner and Olfa Kanoun
Appl. Sci. 2024, 14(2), 868; https://doi.org/10.3390/app14020868 - 19 Jan 2024
Cited by 18 | Viewed by 5325
Abstract
LoRa technology, renowned for its low-power, long-range capabilities in IoT applications, faces challenges in real-world scenarios, including fading channels, interference, and environmental obstacles. This paper aims to study the reliability of LoRa in Non-Line-of-Sight (NLoS) conditions and in noisy and mobile environments for [...] Read more.
LoRa technology, renowned for its low-power, long-range capabilities in IoT applications, faces challenges in real-world scenarios, including fading channels, interference, and environmental obstacles. This paper aims to study the reliability of LoRa in Non-Line-of-Sight (NLoS) conditions and in noisy and mobile environments for Industrial IoT (IIoT) applications. Experimental measurements consider factors like vegetation and infrastructure, introducing mobility to replicate NLoS conditions. Utilizing an open-source LoRa Physical Layer (PHY) Software-Defined Radio (SDR) prototype developed with GNU Radio, we assess communication reliability through metrics such as Block Error Rate (BLER), Signal-to-Noise-Interference-plus-Noise Ratio (SINR), and data rate. The study reveals the estimated overall reliability of the LoRa signal at 90.23%, emphasizing specific configuration details. This work contributes to the broader field of LoRa communication, encompassing hardware, software, protocols, and management, enhancing our understanding of LoRa’s dependability in challenging IIoT environments. Full article
(This article belongs to the Special Issue Signal Processing and Communication for Wireless Sensor Network)
Show Figures

Figure 1

26 pages, 11764 KiB  
Article
Beacon Success Rate versus Gateway Density in Sub-GHz Sensor Networks
by Başak Can, Bora Karaoğlu, Srikar Potta, Franklin Zhang, Artur Balanuta, Muhammed Faruk Gencel, Uttam Bhat, Johnny Huang, Pooja Patankar, Shruti Makharia, Radhakrishnan Suryanarayanan, Arvind Kandhalu and Vinay Sagar Krishnamurthy Vijaya Shankar
Sensors 2023, 23(23), 9530; https://doi.org/10.3390/s23239530 - 30 Nov 2023
Viewed by 1730
Abstract
Multiple Gateways (GWs) provide network connectivity to Internet of Things (IoT) sensors in a Wide Area Network (WAN). The End Nodes (ENs) can connect to any GW by discovering and acquiring its periodic beacons. This provides GW diversity, improving coverage area. However, simultaneous [...] Read more.
Multiple Gateways (GWs) provide network connectivity to Internet of Things (IoT) sensors in a Wide Area Network (WAN). The End Nodes (ENs) can connect to any GW by discovering and acquiring its periodic beacons. This provides GW diversity, improving coverage area. However, simultaneous periodic beacon transmissions among nearby GWs lead to interference and collisions. In this study, the impact of such intra-network interference is analyzed to determine the maximum number of GWs that can coexist. The paper presents a new collision model that considers the combined effects of the Medium Access Control (MAC) and Physical (PHY) layers. The model takes into account the partial overlap durations and relative power of all colliding events. It also illustrates the relationship between the collisions and the resulting packet loss rates. A performance evaluation is presented using a combination of analytical and simulation methods, with the former validating the simulation results. The system models are developed from experimental data obtained from field measurements. Numerical results are provided with Gaussian Frequency Shift Keying (GFSK) modulation. This paper provides guidance on selecting GFSK modulation parameters for low bit-rate and narrow-bandwidth IoT applications. The analysis and simulation results show that larger beacon intervals and frequency hopping help in reducing beacon loss rates, at the cost of larger beacon acquisition latency. On the flip side, the gateway discovery latency reduces with increasing GW density, thanks to an abundance of beacons. Full article
(This article belongs to the Special Issue Internet of Mobile Things and Wireless Sensor Networks)
Show Figures

Figure 1

17 pages, 1823 KiB  
Article
Design and Implementation of an MIPI A-PHY Retransmission Layer for Automotive Applications
by Sang-ung Shin, Jin-Ku Kang and Yongwoo Kim
Electronics 2023, 12(20), 4243; https://doi.org/10.3390/electronics12204243 - 13 Oct 2023
Viewed by 4013
Abstract
Recently, with the development of automobile technologies such as advanced driver assistance systems (ADASs), the performance and number of cameras and displays required for a vehicle have significantly increased. Therefore, the need for in-vehicle high-speed data transmission has increased, but there is difficulty [...] Read more.
Recently, with the development of automobile technologies such as advanced driver assistance systems (ADASs), the performance and number of cameras and displays required for a vehicle have significantly increased. Therefore, the need for in-vehicle high-speed data transmission has increased, but there is difficulty in handling the required high-speed data transmission in existing in-vehicle networks. The MIPI A-PHY interface for automobiles has been proposed as a new standard to solve this issue. To ensure data transmission in noisy automotive environments, the A-PHY interface contains an added retransmission (RTS) layer within the new physical layer. In this paper, we propose and design in detail the structure of an RTS layer presented in the standard A-PHY interface. The proposed RTS layer was designed to satisfy the RTS specification of the MIPI A-PHY standard and was verified through simulations. Moreover, the A-PHY SerDes environment was configured in an FPGA using a Xilinx KC705 FPGA development board and an FPGA Mezzanine Card (FMC) loopback module, and RTS layer operation was verified through the process of transmitting video data to the A-Packet. The A-PHY interface with the RTS layer designed on the FPGA uses 3924 LUTs, 2019 registers, and 132 block memories and operates at a maximum speed of 200 MHz. In addition, as a result of designing the A-PHY interface as an ASIC implementation using the Synopsys SAED 28 nm process, the number of logic gates is 25 K, the chip area is 0.40 mm2, and the maximum operating speed is 200 MHz. Full article
(This article belongs to the Special Issue Real-Time Control of Embedded Systems)
Show Figures

Figure 1

20 pages, 736 KiB  
Article
Design and Performance Analysis of Hardware Realization of 3GPP Physical Layer for 5G Cell Search
by Khalid Lodhi, Jayant Chhillar, Sumit J. Darak and Divisha Sharma
Chips 2023, 2(4), 223-242; https://doi.org/10.3390/chips2040014 - 7 Oct 2023
Viewed by 2738
Abstract
5G Cell Search (CS) is the first step for user equipment (UE) to initiate communication with the 5G node B (gNB) every time it is powered ON. In cellular networks, CS is accomplished via synchronization signals (SS) broadcasted by gNB. 5G 3rd generation [...] Read more.
5G Cell Search (CS) is the first step for user equipment (UE) to initiate communication with the 5G node B (gNB) every time it is powered ON. In cellular networks, CS is accomplished via synchronization signals (SS) broadcasted by gNB. 5G 3rd generation partnership project (3GPP) specifications offer a detailed discussion on the SS generation at gNB, but a limited understanding of their blind search and detection is available. Unlike 4G, 5G SS may not be transmitted at the center of carrier frequency, and their frequency location is unknown to UE. In this work, we demonstrate the 5G CS by designing 3GPP compatible hardware realization of the physical layer (PHY) of the gNB transmitter and UE receiver. The proposed SS detection explores a novel down-sampling approach resulting in a 60% reduction in on-chip memory and 50% lower search time. Via detailed performance analysis, we analyze the functional correctness, computational complexity, and latency of the proposed approach for different word lengths, signal-to-noise ratio (SNR), and down-sampling factors. We demonstrate end-to-end 5G CS using GNU Radio-based RFNoC framework on the USRP-FPGA platform and achieve 66% faster SS search compared to software. The 3GPP compatibility and demonstration on hardware strengthen the commercial significance of the proposed work. Full article
Show Figures

Figure 1

17 pages, 3823 KiB  
Article
The Concept regarding Vehicular Communications Based on Visible Light Communication and the IoT
by Eduard Zadobrischi
Electronics 2023, 12(6), 1359; https://doi.org/10.3390/electronics12061359 - 12 Mar 2023
Cited by 9 | Viewed by 3309
Abstract
The most controversial technology—visible light communication—is becoming increasingly promising in the field of wireless networks, being ideal for many indoor and outdoor applications. This article proposes VLC methods and architectures capable of providing high security in vehicles and in their communications with the [...] Read more.
The most controversial technology—visible light communication—is becoming increasingly promising in the field of wireless networks, being ideal for many indoor and outdoor applications. This article proposes VLC methods and architectures capable of providing high security in vehicles and in their communications with the environment or other cars in traffic. The architectures proposed involve the inclusion of ambient lighting equipment and systems and indoor and outdoor lighting systems, such as headlights, traffic lights, and stoplights. Securing data within vehicular networks and validating them through multiple layers of filtering at the level of the physical PHY layer would drastically strengthen the position of VLC. They are the only source of information through which direct contact is maintained with the other entities in the network. The evaluations and proposals presented here are highly viable and deserve future consideration in light of the results obtained in the practical steps carried out in the research process. Full article
(This article belongs to the Special Issue Security and Privacy for Modern Wireless Communication Systems)
Show Figures

Figure 1

13 pages, 1413 KiB  
Article
Performance Analysis of IEEE 802.11p MAC with Considering Capture Effect under Nakagami-m Fading Channel in VANETs
by Yang Wang, Jianghong Shi and Lingyu Chen
Entropy 2023, 25(2), 218; https://doi.org/10.3390/e25020218 - 22 Jan 2023
Cited by 5 | Viewed by 2090
Abstract
Vehicular ad hoc networks (VANETs) have recently drawn a large amount of attention because of their enormous potential in road safety improvement and traffic management as well as infotainment service support. As the standard of medium access control (MAC) and physical (PHY) layers [...] Read more.
Vehicular ad hoc networks (VANETs) have recently drawn a large amount of attention because of their enormous potential in road safety improvement and traffic management as well as infotainment service support. As the standard of medium access control (MAC) and physical (PHY) layers for VANETs, IEEE 802.11p has been proposed for more than a decade. Though performance analyses of IEEE 802.11p MAC have been performed, the existing analytical methods still need to be improved. In this paper, to assess the saturated throughput and the average packet delay of IEEE 802.11p MAC in VANETs, a two-dimensional (2-D) Markov model is introduced by considering the capture effect under Nakagami-m fading channel. Moreover, the closed-form expressions of successful transmission, collided transmission, saturated throughput, and average packet delay are carefully derived. Finally, the simulation results are demonstrated to verify the accuracy of the proposed analytical model, which also proves that this analytical model is more precise than the existing ones in terms of saturated throughput and average packet delay. Full article
(This article belongs to the Special Issue Wireless Sensor Networks and Their Applications)
Show Figures

Figure 1

15 pages, 943 KiB  
Article
A Methodology for Abstracting the Physical Layer of Direct V2X Communications Technologies
by Zhuofei Wu, Stefania Bartoletti, Vincent Martinez and Alessandro Bazzi
Sensors 2022, 22(23), 9330; https://doi.org/10.3390/s22239330 - 30 Nov 2022
Cited by 6 | Viewed by 2693
Abstract
Recent advancements in vehicle-to-everything (V2X) communications have greatly increased the flexibility of the physical (PHY) and medium access control (MAC) layers. This increases the complexity when investigating the system from a network perspective to evaluate the performance of the supported applications. Such flexibility, [...] Read more.
Recent advancements in vehicle-to-everything (V2X) communications have greatly increased the flexibility of the physical (PHY) and medium access control (MAC) layers. This increases the complexity when investigating the system from a network perspective to evaluate the performance of the supported applications. Such flexibility, in fact, needs to be taken into account through a cross-layer approach, which might lead to challenging evaluation processes. As an accurate simulation of the signals appears unfeasible, a typical solution is to rely on simple models for incorporating the PHY layer of the supported technologies based on off-line measurements or accurate link-level simulations. Such data are, however, limited to a subset of possible configurations, and extending them to others is costly when not even impossible. The goal of this paper is to develop a new approach for modeling the PHY layer of V2X communications that can be extended to a wide range of configurations without leading to extensive measurement or simulation campaigns at the link layer. In particular, given a scenario and starting from results in terms of the packet error rate (PER) vs. signal-to-interference-plus-noise ratio (SINR) related to a subset of possible configurations, we first approximated the curves with step functions characterized by a given SINR threshold, and we then derived one parameter, called implementation loss, that was used to obtain the SINR threshold and evaluate the network performance under any configuration in the same scenario. The proposed methodology, leading to a good trade-off among the complexity, generality, and accuracy of the performance evaluation process, was validated through extensive simulations with both IEEE 802.11p and LTE-V2X sidelink technologies in various scenarios. The results first show that the curves can be effectively approximated by using an SINR threshold, with a value corresponding to 0.5 PER, and then demonstrate that the network-level outputs derived from the proposed approach are very close to those obtained with complete curves, despite not being restricted to a few possible configurations. Full article
(This article belongs to the Special Issue Feature Papers in Vehicular Sensing)
Show Figures

Figure 1

25 pages, 1947 KiB  
Article
A Fast and Accurate Approximation of IEEE 802.11 Physical Layer Models for Network Simulators
by Diego Javier Reinoso-Chisaguano, Xavier Alejandro Flores Cabezas, Juan Pablo Astudillo León, Martha Cecilia Paredes Paredes, Pablo Anibal Lupera Morillo and Luis F. Urquiza-Aguiar
Electronics 2022, 11(23), 3900; https://doi.org/10.3390/electronics11233900 - 25 Nov 2022
Viewed by 2192
Abstract
Network simulators are used for the research and development of several types of networks. However, one of the limitations of these simulators is the usage of simplified theoretical models of the Packet Error Rate (PER) at the Physical Layer (PHY) of the IEEE [...] Read more.
Network simulators are used for the research and development of several types of networks. However, one of the limitations of these simulators is the usage of simplified theoretical models of the Packet Error Rate (PER) at the Physical Layer (PHY) of the IEEE 802.11 family of wireless standards. Although the simplified PHY model can significantly reduce the simulation time, the resulting PER can differ considerably from other more realistic results. In this work, we first study several PER theoretical models. Then, we propose a curve fitting algorithm, which is able to obtain a fast and accurate approximation of other PER models. The curve fitting algorithm uses simulated data as input and outputs the coefficients of a simple model that offers a very accurate approximation of the original PER. Finally, we implemented this approximation in the ns-3 network simulator, thus obtaining high realism since now we can select several theoretical PER models or even a more realistic scenario with the effect of the high Peak-to-Average Power Ratio (PAPR) in the signal. The ns-3 results show how the selection of the PER model at the PHY can significantly impact the Packet Loss Rate (PLR) of a scenario composed of a linear chain of several nodes, one of the simplest multi-hop scenarios. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

11 pages, 541 KiB  
Article
Cross-Layer Optimization-Based Asymmetric Medical Video Transmission in IoT Systems
by Yu Wang, Weijia Han, Xiao Ma, Qiuzhi Wang and Fengsen Chen
Symmetry 2022, 14(11), 2455; https://doi.org/10.3390/sym14112455 - 19 Nov 2022
Cited by 1 | Viewed by 1652
Abstract
At present, Internet of Things (IoT) networks are attracting much attention since they provide emerging opportunities and applications. In IoT networks, the asymmetric and symmetric studies on medical and biomedical video transmissions have become an interesting topic in both academic and industrial communities. [...] Read more.
At present, Internet of Things (IoT) networks are attracting much attention since they provide emerging opportunities and applications. In IoT networks, the asymmetric and symmetric studies on medical and biomedical video transmissions have become an interesting topic in both academic and industrial communities. Especially, the transmission process shows the characteristics of asymmetry: the symmetric video-encoding and -decoding processes become asymmetric (affected by modulation and demodulation) once a transmission error occurs. In such an asymmetric condition, the quality of service (QoS) of such video transmissions is impacted by many different factors across the physical (PHY-), medium access control (MAC-), and application (APP-) layers. To address this, we propose a cross-layer optimization-based strategy for asymmetric medical video transmission in IoT systems. The proposed strategy jointly utilizes the video-coding structure in the APP- layer, the power control and channel allocation in the MAC- layer, and the modulation and coding schemes in the PHY- layer. To obtain the optimum configuration efficiently, the proposed strategy is formulated and proofed by a quasi-convex problem. Consequently, the proposed strategy could not only outperform the classical algorithms in terms of resource utilization but also improve the video quality under the resource-limited network efficiently. Full article
Show Figures

Figure 1

Back to TopTop