Energy efficient soft-decision error control in wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

Energy efficient reliable communication over unpredictable wireless medium is a major challenge for resource constrained wireless sensor nodes employed in process/environment control application. In this paper, we suggest the soft decision decoding (SDD) based advanced Forward Error Correction (FEC) scheme for low power distributed sensor nodes. The proposed BCH (Bose-Chaudhuri- Hocquenghem) based adaptive Chase-2 decoding scheme offers attractive energy benefits as compared to harddecision decoding (HDD). The reduced decoding complexity is obtained by limiting the codeword search space and fewer algebraic operations than standard chase-2. The realistic environmental scenario incorporating path loss, Rayleigh fading and additive white Gaussian noise has been considered to investigate the performance of the proposed scheme. A detailed comparative analysis is carried out with HDD of BCH codes using IEEE 802.15.4 compliant widely used MicaZ node parameters. The simulation results indicate that for low power WSN, proposed SDD based adaptive scheme could offer better tradeoff between energy and reliability than HDD schemes.

Original languageEnglish
Title of host publication2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010 - Budapest, Hungary
Duration: 13 Oct 201015 Oct 2010

Publication series

Name2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010

Conference

Conference2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010
Country/TerritoryHungary
CityBudapest
Period13/10/1015/10/10

Keywords

  • BCH
  • Chase-2 algorithm
  • HDD
  • SDD
  • WSN

Fingerprint

Dive into the research topics of 'Energy efficient soft-decision error control in wireless sensor networks'. Together they form a unique fingerprint.

Cite this