Analysis of Internet of Things (IoT) Networks Using Extrinsic Information Transfer (EXIT) Chart

Author(s):  
Fransisca Margaret PASALBESSY ◽  
Khoirul ANWAR
Author(s):  
Izabella Lokshina

This paper examines turbo codes that are currently introduced in many international standards, including the UMTS standard for third generation personal communications and the ETSI DVB-T standard for Terrestrial Digital Video Broadcasting. The convergence properties of the iterative decoding process associated with a given turbo-coding scheme are estimated using the analysis technique based on so-called extrinsic information transfer (EXIT) chart. This approach provides a possibility to anticipate the bit error rate (BER) of a turbo code system using only the EXIT chart. It is shown that EXIT charts are powerful tools to analyze and optimize the convergence behavior of iterative systems utilizing the turbo principle. The idea is to consider the associated SISO stages as information processors that map input a priori LLR’s onto output extrinsic LLR’s, the information content being obviously assumed to increase from input to output, and introduce them to the design of turbo systems without the reliance on extensive simulation. Compared with the other methods for generating EXIT functions, the suggested approach provides insight into the iterative behavior of linear turbo systems with substantial reduction in numerical complexity.


Author(s):  
Izabella Lokshina

This paper examines turbo codes that are currently introduced in many international standards, including the UMTS standard for third generation personal communications and the ETSI DVB-T standard for Terrestrial Digital Video Broadcasting. The convergence properties of the iterative decoding process associated with a given turbo-coding scheme are estimated using the analysis technique based on so-called extrinsic information transfer (EXIT) chart. This approach provides a possibility to anticipate the bit error rate (BER) of a turbo code system using only the EXIT chart. It is shown that EXIT charts are powerful tools to analyze and optimize the convergence behavior of iterative systems utilizing the turbo principle. The idea is to consider the associated SISO stages as information processors that map input a priori LLR’s onto output extrinsic LLR’s, the information content being obviously assumed to increase from input to output, and introduce them to the design of turbo systems without the reliance on extensive simulation. Compared with the other methods for generating EXIT functions, the suggested approach provides insight into the iterative behavior of linear turbo systems with substantial reduction in numerical complexity.


Author(s):  
Ahmed Haffane ◽  
Abdelhafid Hasni ◽  
Mustapha Khelifi ◽  
Boufeldja Kadri

In this paper, the performance of the Unpunctured Turbo Trellis-Coded Modulation (UTTCM) over Additive White Gaussian Noise (AWGN) channel is analyzed using the non-binary extrinsic information transfer (EXIT) chart. The exchange of the extrinsic information between the decoder components is tracked, allowing the generation of an EXIT chart, which is a powerful tool for analyzing the convergence behavior of iterative decoding and prediction of convergence position. The Simulation results are compared with the turbo cliff positions on the BER curves.


2018 ◽  
Vol 2018 ◽  
pp. 1-6
Author(s):  
Zhenzhen Liu ◽  
Kai Niu ◽  
Chao Dong ◽  
Jiaru Lin

In this paper, a three-dimensional polar code (3D-PC) scheme is proposed to improve the error floor performance of parallel concatenated systematic polar code (PCSPC). The proposed 3D-PC is constructed by serially concatenating the PCSPC with a rate-1 third dimension, where only a fraction λ of parity bits of PCSPC are extracted to participate in the subsequent encoding. It takes full advantage of the characteristics of parallel concatenation and serial concatenation. In addition, the convergence behavior of 3D-PC is analyzed by the extrinsic information transfer (EXIT) chart. The convergence loss between PCSPC λ=0 and different λ provides the reference for choosing the value of λ for 3D-PC. Finally, the simulation results confirm that the proposed 3D-PC scheme lowers the error floor.


2021 ◽  
pp. 133-149
Author(s):  
Maryna Kolisnyk

The subject of study in the paper is the analysis of technologies, architectures, vulnerabilities and cyberattacks, communication patterns of smart objects, messaging models, and Internet of Things (IoT) / Web of Things (WoT) protocols for solving applied problems of critical and non-critical systems. The goal is to develop a method for selecting messaging models and application-level protocols in non-critical and critical multi-level IoT/WoT systems, provided that the type of access to intelligent objects is initially determined by the initial data, as well as analysis of vulnerabilities and attacks using these protocols. Objectives: to formalize the procedure for choosing communication protocols for IoT/WoT systems; analyze possible vulnerabilities of communication protocols; develop a method for selecting communication protocols for given initial data, depending on the selected type of communication template for smart objects; check practically the proposed method. The methods of research are methods of system analysis. The following results were obtained. The analysis of the features of communication protocols is conducted by comparing the main interrelated characteristics of IoT/WoT, the results of which are presented in the form of a table. A method has been developed for selecting communication protocols, depending on the selected type of communication template. The analysis of possible vulnerabilities of communication protocols and possible attacks using these protocols is conducted. The author has tested the method using the example of a corporate system (Smart House) based on the WoT concept. Findings. The scientific novelty of the results obtained is as follows: the analysis conducted in the paper shows that currently there is no unified approach to the choice of a messaging model and application-level protocols for building IoT/WoT, depending on the selected type of communication template for smart objects. The method for selecting communication protocols for the given conditions (for each IoT system its interaction pattern will correspond, depending on which components interact with each other), improved by the authors of the paper, makes it possible to simplify the task of using separate protocols for given IoT systems, considering vulnerabilities of protocols.


2018 ◽  
Vol 54 (1) ◽  
pp. 61-73
Author(s):  
Mladen Jardas ◽  
Čedomir Dundović ◽  
Marko Gulić ◽  
Katarina Ivanić

The new technology greatly affects the way of production, consumption, communication, service delivery and ultimately on the entire supply chain. All stakeholders in the business process must invest in new knowledge and develop new business models to adapt to the changing business environment. Connecting devices over internet (Internet of things) and stakeholders’ synergy open up opportunities for new market achievements as well as for the improvement of business processes both in the supply chain and in ports. The development of information technologies has an impact on the reduction of errors, costs, time of information transfer and transport, inventory reduction and thus on better customization. There should be no weak links in the supply chain, which is especially related to the port and port processes that are the basis of the supply chain network. The port is the core of all activities of the supply chain and is also a place where supply and demand meet.


2017 ◽  
Vol 11 (3) ◽  
pp. 301-311 ◽  
Author(s):  
Volker Skwarek

Purpose This paper aims to describe a method for Internet-of-Things-devices to achieve industrial grade reliability for information transfer from wireless sensor systems to production systems using blockchain technologies. Design/methodology/approach An increased security and reliability of submitted data within the sensor network could be achieved on an application level. Therefore, a lightweight, high-level communication protocol based on blockchain principles was designed. Findings Blockchain mechanisms can secure the wireless communication of Internet-of-Things-devices in a lightweight and scalable manner. Originality/value The innovation of this research is the successful application of general blockchain mechanisms to increase security of a wireless sensor system without binding to a dedicated blockchain technology.


Sign in / Sign up

Export Citation Format

Share Document