Low Complexity Processor Designs for Energy-Efficient Security and Error Correction in Wireless Sensor Networks

Author(s):  
J. H. Kong ◽  
J. J. Ong ◽  
L.-M. Ang ◽  
K. P. Seng

This chapter presents low complexity processor designs for energy-efficient security and error correction for implementation on wireless sensor networks (WSN). WSN nodes have limited resources in terms of hardware, memory, and battery life span. Small area hardware designs for encryption and error-correction modules are the most preferred approach to meet the stringent design area requirement. This chapter describes Minimal Instruction Set Computer (MISC) processor designs with a compact architecture and simple hardware components. The MISC is able to make use of a small area of the FPGA and provides a processor platform for security and error correction operations. In this chapter, two example applications, which are the Advance Encryption Standard (AES) and Reed Solomon (RS) algorithms, were implemented onto MISC. The MISC hardware architecture for AES and RS were designed and verified using the Handel-C hardware description language and implemented on a Xilinx Spartan-3 FPGA.

Author(s):  
Mark S. Leeson ◽  
Sahil Patel

Underwater Wireless Sensor Networks (UWSNs) are used in applications such as mineral exploration and environmental monitoring, and must offer reliability and energy efficiency. These are related to each other in the sense that the former requires error-correction which in turn requires energy, consuming battery life in an environment where battery replacement and recharging are difficult. This chapter thus addresses the energy efficiency of three suitable error correction methods for UWSNs, namely Automatic Repeat Request (ARQ), Forward Error Correction (FEC) and Network Coding (NC). The performance of the schemes as a function of transmission distance is determined for various packet sizes by using models of attenuation and noise that represent the underwater environment. ARQ offers the lowest efficiency and NC the highest but there is a distance at which FEC becomes the best option rather than NC suggesting a hybrid FEC/NC method.


2013 ◽  
Vol 2013 ◽  
pp. 1-12 ◽  
Author(s):  
Mohamed Ismail ◽  
Imran Ahmed ◽  
Justin Coon

Wireless sensor networks are used in many diverse application scenarios that require the network designer to trade off different factors. Two such factors of importance in many wireless sensor networks are communication reliability and battery life. This paper describes an efficient, low complexity, high throughput channel decoder suited to decoding low-density parity-check (LDPC) codes. LDPC codes have demonstrated excellent error-correcting ability such that a number of recent wireless standards have opted for their inclusion. Hardware realisation of practical LDPC decoders is a challenging area especially when power efficient solutions are needed. Implementation details are given for an LDPC decoding algorithm, termed adaptive threshold bit flipping (ATBF), designed for low complexity and low power operation. The ATBF decoder was implemented in 90 nm CMOS at 0.9 V using a standard cell design flow and was shown to operate at 250 MHz achieving a throughput of 252 Gb/s/iteration. The decoder area was 0.72 mm2 with a power consumption of 33.14 mW and a very small energy/decoded bit figure of 1.3 pJ.


2021 ◽  
Vol 11 (4) ◽  
pp. 4082-4095
Author(s):  
G. Chenna Kesava Reddy ◽  
Dr.A.A. Ansari ◽  
Dr.S. China Venkateswarlu

Energy efficiency is a significant issue in portable wireless networks since the battery life of versatile terminals is restricted. Protection of battery power has been tended to utilizing numerous procedures. Wireless sensor networks (WSNs), framed by various little gadgets fit for detecting, processing, and wireless correspondence are arising as a progressive innovation, with applications in different territories. The novel highlights of wireless sensor networks have carried new difficulties and issues to the field of conveyed and communitarian data preparing. In the light of the importance of reducing operating consumpt and maintaining cellular network profitability, energy efficiency in cell networks has received a crucial consideration from both scholars and the business, despite the fact that these networks are “green communication.” Since the base station is the most important energy buyer in the business, efforts have been undertaken to review the use of the base station and to identify ways to energy efficiency improvements. The trade-offs between energy utilization and throughput, under nearby just as under helpful detecting, are portrayed. The Energy efficient tradeoffs have been arranged dependent on every convention layer and examined its effect in the organization energy efficiency.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3096-3103

Wireless sensor networks (WSNs) consist of sensor nodes, which act as source and link nodes through which the data forward to sink node. However, the nodes in network have limited computation complexity, transmission capability and restricted battery life. Several routing protocols are available to improve the performance of network but very few concentrates on security issues. The performance of routing and security protocol in WSN affect due to unreliable low power links, insecure communication, threats, and resource limitations which limits the design of an efficient routing and security algorithm in wireless sensor networks. In this paper, we propose a secure energy efficient routing protocol with effective data collection and key management in dynamic WSN. The routing protocol prolongs network lifetime and minimizes energy consumption. The routing protocol implement with A* algorithm and security improve with EECLDSA (Enhanced Elliptic Curve Logic Discrete Algorithm). The combined Secure Energy Efficient Network Priority Routing (SEENPR) apply for effective data collection and key management in WSNs. SEENPR uses k-means algorithm to improve cluster head (CH) selection using Euclidean distance. The SEENPR implement in testbed to evaluate performance with respect to security and key management.


Sign in / Sign up

Export Citation Format

Share Document