Information fusion strategies and performance bounds in packet-drop networks

نویسندگان

  • Alessandro Chiuso
  • Luca Schenato
چکیده

In this paper we discuss suboptimal distributed estimation schemes for stable stochastic discrete time linear systems under the assumptions that (i) distributed sensors have computation capabilities, (ii) the communication between the sensors and the estimation center is subject to random packet loss, and (iii) there is no communication between sensors. We consider strategies which are based on raw measurement fusion (MF) as well as on fusing local estimates, such as local Kalman filters or other pre-processing rules. We show that the optimal mean square estimation error that can be achieved under packet loss, referred as infinite bandwidth filter (IBF), cannot be reached using a limited bandwidth channel; we also compare these strategies under specific noise regimes. We also propose novel mathematical tools to derive analytical upper and lower bounds for the expected estimation error covariance of the MF and the IBF strategies assuming identical sensors. The theoretical findings are complemented with simulation results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure QoS-Aware Data Fusion to Prevent Node Misbehavior in Wireless Sensor Networks

Wireless Sensor Networks(WSNs) are composed of tiny devices with limited computation and energy capacities. Data fusion is an essential technique to achieve power efficiency in sensor nodes. Some nodes misbehave by increasing the defer time which obstruct the data fusion process. In this paper, an efficient Secured Quality of Service(QoS)-Aware Data Fusion(SQDF) for distributed Wireless Sensor ...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

PHY- and MAC-aware Resource Allocation and Packet Scheduling for Single-Cell OFDMA Packet Networks

Radio resource management mechanisms such as PHY-centric Radio Resource Allocation and MAC-centric Packet Scheduling are expected to play a substantial role in the performance of future OFDMA-based wireless networks. Inevitably, efficient resource allocation strategies have to exploit information laying in different OSI layers, allowing for a cross-layer design. In the literature adaptive alloc...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Automatica

دوره 47  شماره 

صفحات  -

تاریخ انتشار 2011