Estimation and tracking of multiple moving objects in a dynamic
In industrial applications, the real time communications among the spatially distributed sensors should satisfy reliability requirements and strict security. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. When the secrecy capacity gets fades, then it is known that transmitted data is intercepted. In the event of applying optimal sensor scheduling scheme a sensor with highest secrecy capacity is choosen and the data is transmitted. In this paper various types of scheduling are studied. Keywords-Real-Time scheduling, optimal sensor scheduling, secrecy capacity, Intercepted I. INTRODUCTIONWireless sensor networks were initially motivated by the military for battlefield surveillance, and now are further developed for various industrial applications such as the assembly line monitoring and manufacturing automation for the sake of improving the factory efficiency, reliability, and productivity which are referred to as the industrial WSN's. In industrial applications, the realtime communications among the spatially distributed sensors should satisfy strict security and reliability requirements. Moreover, in industrial environments, metallic frictions, engine vibrations, the machinery obstacles and certainly adversely affect the wireless transmissions performance. In industrial WSNs the broadcast nature of radio propagation,both authorized and unauthorized users access the wireless medium, leading WSNs to be more vulnerable to the eavesdropping attack than wired sensor networks, where communicating nodes are physically connected using wire cables and a nodes without connection is unable to access for illegal activities. To be specific, as long as an eavesdropper hides in the industrial WSNs, the legal wireless transmissions among the sensors can be r overheard by the eavesdropper readily, which may decode its tapped transmissions and violate the confidentiality of the sensors information communication. Therefore, it is importance to investigate the protection of industrial WSNs against the eavesdropping attack. To overcome this by the use of sensor scheduling to improve the physical-layer security of industrial WSNs against the eavesdropping attack and proposed an optimal sensor scheduling scheme, aiming at maximizing the secrecy capacity of wireless transmissions from sensors to the sink.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.