Open Access Open Access  Restricted Access Subscription or Fee Access

WSN ZigBee Based Performance

M. A. M. El-Bendary, M. A. E. El-Tokhy

Abstract


The Wireless Personal Area Networks (WPANs) technologies are merged to implement the Wireless Sensor Network (WSN). The ZigBee technology is the most one is utilized for WSN implementing. The mobility of Wireless Sensor Networks is one of the future features of this network in different applications. This paper studies the WSN performance based on the ZigBee network. Also, it presents powerful data randomizing tool based on chaotic Baker map encryption tool. The mobility capability of WSN is considered. There are many scenarios are presented to evaluate the presented technique using many different metrics. The computer experiments simulation results reveal that the superiority of the presented technique over the traditional techniques.

 


Keywords


Mobile WSN, Data Randomization, Chaotic Interleaving, Burst Error, Fading Channels

Full Text:

PDF

References


ZigBee Alliance, available at http://www.zigbee.org/,2009.

The Wi-Fi Alliance, available at http://www.wi-fi.org/,2009.

B. Kai, and P. Yong, “Performance Study on ZigBee-Based Wireless Personal Area Networks for Real-Time Health monitoring”, ETRI Journal, Volume 28, No. 4, Aug. 2006.

Jin-Shyan Lee, Yu-Wei Su, and Chung-Chou Shen,“ A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, The 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON), Nov. 5-8, 2007, Taipei, Taiwan.

W. Guo and M. Zhou,“An emerging technology for improved building automation control”, IEEE International Conference on Systems, man and Cybernetics, 2009. SMC 2009, pp.337-342, Oct. 2009.

B. Sidhu, H. Singh, and A. Chhabra,“Emerging Wireless Standards - WiFi, ZigBeeand WiMAX s”, World Academy of Science, Engineering and Technology 25 2007.

S. Vafi, and T. Wysocki,“Performance of convolutional interleavers with different spacing parameters in turbo codes,” Proc. 6th Australian Workshop on Communications Theory, 2005, pp. 8-12.

G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, “Image Transmission over IEEE 802.15.4 and ZigBee Networks,” IEEE ISCAS May 2005, Kobe Japan.

L. Ozarow, S. Shamai, and A.D. Wyner,“Information theoretic considerations for cellar mobile radio,” IEEE Trans. Veh. Tech., vol. 43, pp, 359-378, 1994.

Emad N. Farag, Mohamed I Elmasry, Mixed Signal VLSI Wireless Design Circuits and System, 1st Edition, Kluwer Academic Publishers, 1999.

H. S. Kim and H. K. Lee, “Modified Beacon-Enabled IEEE-802.15.4 MAC for lower latency”, Mitsubishi Electric Research laboratories, 2009, 201 Broadway, Cmbridge, Massachusetts 02139.

T. S. Rappaport, “Wireless Communications”, Prentice Hall 1996.

S. H. Lee and E. K. Joo, , “The Effect of Block Interleaving in an LDPC-Turbo Concatenated Code”, ETRI Journal, Volume 28, Number 5, October 2006

S. Vafi, T. A. Wysocki, “Application of convolutional interleavers in turbo codes with unequal error protection”, JTIT, Journal of Telecommunication and Information technology, Jan. 2006.

G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, “Error Protection for Progressive Image Transmission Over Memoryless and Fading Channels”, IEEE Transactions on Communications, Vol. 46, No. 12, Dec. 1998.

A. N. Lemma, J. Aprea, W. Oomen, and L. V. de Kerkhof, “A Temporal Domain Audio Watermarking Technique”, IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 1088-1097, 2003.

W. Li, X. Xue, and P. Lu, “Localized Audio Watermarking Technique Robust Against Time-Scale Modification”, IEEE Transactions on Multimedia, Vol. 8, No. 1, pp. 60-69, 2006.

[16] G. Voyatzis and I. Pitas,“Chaotic Watermarks for Embedding in the Spatial Digital Image Domain,” Proc. IEEE Int. Conference Image Processing, Vol. 2, pp. 432-436, Oct. 1998.

R. Liu and T. Tan, “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Transactions On Multimedia, Vol. 4, No. 1, pp. 121-128, MARCH 2002.

Z. Liu and A. Inoue, “Audio Watermarking Techniques Using Sinusoidal Patterns Based on Pseudorandom Sequences”, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 13, No. 8, pp. 801-812, 2003.

M. A. M. Mohamed, A. Abou El-Azm, N. El-Fishwy, M. A. R. El-Tokhy, F. E. Abd El-Samie,“Optimization of Bluetooth Packet Format for Efficient Performance,” Progress in Electromagnetic Research M, Vol. 1, 101-110, 2008.

W. C. Jakes,“ Microwave Mobile Communications,” New York, John Wiley & SonsInc. ISBN 0-471-43720-4, 1-Feb. 1975.

Aldrich,“Correlations Genuine and Spurious in Pearson and Yule,” Statistical Science 10: 364-376. hppt://www.jstor.org/stable/2246135.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.