Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 3
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Wireless Sensor Network (WSN) technology has grown in importance in recent years. All WSN implementations need secure data transmission between sensor nodes and base stations. Sensor node attacks introduce new threats to the WSN. As a result, an appropriate Intrusion Detection System (IDS) is required in WSN for defending against security attacks and detecting attacks on sensor nodes. In this study, we use the Routing Protocol for Low Power and Lossy Networks (RPL) for addressing security services in WSN by identifying IDS with a network size of more or less 20 nodes and introducing 10% malicious nodes. The method described above is used on Cooja in the VMware virtual machine Workstation with the InstantContiki2.7 operating system. To track the movement of nodes, find network attacks, and spot dropped packets during IDS in WSN, an algorithm is implemented in the Network Simulator (NS2) using the Ad-hoc On-Demand Distance Vector (AODV) protocol in the Linux operating system.
Go to article

Authors and Affiliations

Joseph Kipongo
1
Theo G. Swart
1
Ebenezer Esenogho
1 2

  1. Center for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South Africa
  2. Department of Electrical and Electronic Engineering, University of Botswana, Gaborone, Botswana
Download PDF Download RIS Download Bibtex

Abstract

Channel coding provides numerous advantages to digital communications. One of such advantages is error correcting capabilities. This, however, comes at the expense of coding rate, which is a function of the codebook’s cardinality |C| or number of coded information bits and the codeword length M. In order to achieve high coding rate, we hereby report a channel coding approach that is capable of error correction under power line communications (PLC) channel conditions, with permutation coding as the coding scheme of choice. The approach adopts the technique of unequal error correction for binary codes, but with the exception that non-binary permutation codes are employed here. As such, certain parts of the information bits are coded with permutation symbols, while transmitting other parts uncoded. Comparisons with other conventional permutation codes are presented, with the proposed scheme exhibiting a relatively competitive performance in terms of symbol error rate.
Go to article

Authors and Affiliations

Kehinde Ogunyanda
1
Theo G. Swart
1
Opeyemi O. Ogunyanda
1

  1. Center for Telecommunications, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg, South Africa
Download PDF Download RIS Download Bibtex

Abstract

Arriving at a good combination of coding and modulation schemes that can achieve good error correction constitutes a challenge in digital communication systems. In this work, we explore the combination of permutation coding (PC) and pulse amplitude modulation (PAM) for mitigating channel errors in the presence of background noise and jitter. Since PAM is characterised with bi-polar constellations, Euclidean distance is a good choice for predicting the performance of such coded modulation setup. In order to address certain challenges facing PCs, we therefore introduce injections in the coding system, together with a modified form of PAM system. This modification entails constraining the PAM constellations to the size of the codeword’s symbol. The results obtained demonstrate the strength of the modified coded PAM system over the conventional PC coded PAM system.

Go to article

Authors and Affiliations

Opeyemi O. Ogunyanda
Thokozani Shongwe
Theo G. Swart

This page uses 'cookies'. Learn more