Daniela Dragomirescu 1, 2

Similar documents
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm

SOPC Co-Design Platform for UWB System in Wireless Sensor Network Context

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation

STUDY OF RECONFIGURABLE MOSTLY DIGITAL RADIO FOR MANET

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Multiple access techniques

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group <

Aerospace Structure Health Monitoring using Wireless Sensors Network

Content. Basics of UWB Technologies - Utilization of Wide Spectrum - History and Recent Trend of UWB UWB

Content. Basics of UWB Technologies - Utilization of Wide Spectrum - History and Recent Trend of UWB UWB

Narrow Band Interference (NBI) Mitigation Technique for TH-PPM UWB Systems in IEEE a Channel Using Wavelet Packet Transform

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Dynamic Channel Bonding in Multicarrier Wireless Networks

IST Mobile & Wireless Communications Summit 2006, June , Mykonos, Greece.

Power limits fulfilment and MUI reduction based on pulse shaping in UWB networks

Wireless Channel Modeling (Modeling, Simulation, and Mitigation)

Ultra-Wideband Impulse Radio for Tactical Ad Hoc Communication Networks

Project: IEEE P Working Group for Wireless Personal Area Networks N

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication

ICT 5305 Mobile Communications. Lecture - 3 April Dr. Hossen Asiful Mustafa

Performance Analysis of Different Ultra Wideband Modulation Schemes in the Presence of Multipath

Analyzing Pulse Position Modulation Time Hopping UWB in IEEE UWB Channel

On the Multi-User Interference Study for Ultra Wideband Communication Systems in AWGN and Modified Saleh-Valenzuela Channel

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference

Joint communication, ranging, and positioning in low data-rate UWB networks

DS-UWB signal generator for RAKE receiver with optimize selection of pulse width

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)

Introduction to Ultra Wideband

Applied to Wireless Sensor Networks. Objectives

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Detection and direction-finding of spread spectrum signals using correlation and narrowband interference rejection

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation

UMRR: A 24GHz Medium Range Radar Platform

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to publication record in Explore Bristol Research PDF-document

A High-Precision Ultra Wideband Impulse Radio Physical Layer Model for Network Simulation

UWB Channel Modeling

Partial overlapping channels are not damaging

Channel Modeling ETI 085

Performance Evaluation of a UWB Channel Model with Antipodal, Orthogonal and DPSK Modulation Scheme

Cognitive Ultra Wideband Radio

ZigBee Propagation Testing

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

IEEE Broadband Wireless Access Working Group <

Chapter 3. System Theory and Technologies. 3.1 Physical Layer. ... How to transport digital symbols...?

Ad hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl

MANAGING IMPULSIVE INTERFERENCE IN IMPULSE RADIO UWB NETWORKS

AN IMPROVED WINDOW BLOCK CORRELATION ALGORITHM FOR CODE TRACKING IN W-CDMA

PERFORMANCE OF POWER DECENTRALIZED DETECTION IN WIRELESS SENSOR SYSTEM WITH DS-CDMA

Designing Ultra-Wide Bandwidth (UWB) Receivers for Multi-User Interference Environments

Project: IEEE P Working Group for Wireless Personal Area Networks N

PLANNING AND DESIGN OF FRONT-END FILTERS

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Computational Complexity of Multiuser. Receivers in DS-CDMA Systems. Syed Rizvi. Department of Electrical & Computer Engineering

Performance of LTE Linear MIMO Detectors: Achievable Data Rates and Complexity

On the performance of Turbo Codes over UWB channels at low SNR

Performance of RAKE receiver over different UWB channel

EITN85, FREDRIK TUFVESSON, JOHAN KÅREDAL ELECTRICAL AND INFORMATION TECHNOLOGY. Why do we need UWB channel models?

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

UWB Technology for WSN Applications

Chapter 2 Channel Equalization

Channel-based Optimization of Transmit-Receive Parameters for Accurate Ranging in UWB Sensor Networks

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

The UMRR-S: A High-Performance 24GHz Multi Mode Automotive Radar Sensor for Comfort and Safety Applications

Ternary Zero Correlation Zone Sequences for Multiple Code UWB

C th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011) April 26 28, 2011, National Telecommunication Institute, Egypt

Wireless Sensor Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS)

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS

Quick Introduction to Communication Systems

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

DATE: June 14, 2007 TO: FROM: SUBJECT:

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

The Radio Channel. COS 463: Wireless Networks Lecture 14 Kyle Jamieson. [Parts adapted from I. Darwazeh, A. Goldsmith, T. Rappaport, P.

Department of Electronic Engineering FINAL YEAR PROJECT REPORT

A Multicarrier CDMA Based Low Probability of Intercept Network

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Applying Time-Reversal Technique for MU MIMO UWB Communication Systems

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance

Getting Started Guide

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

ULTRA WIDE BAND(UWB) Embedded Systems Programming

Chapter 4 Radio Communication Basics

Software Defined Radio Forum Contribution

MIMO-Based Vehicle Positioning System for Vehicular Networks

Spread Spectrum: Definition

Performance of Impulse-Train-Modulated Ultra- Wideband Systems

COPYRIGHTED MATERIAL INTRODUCTION

ECE 630: Statistical Communication Theory

Optimal receiver for Space Time Spreading across a Time Hopping PPM over Ultra Wideband Saleh- Valenzuela MIMO Channel

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells

Frequency Hopped Spread Spectrum

M2M massive wireless access: challenges, research issues, and ways forward

3.6 Intersymbol interference. 1 Your site here

Transcription:

PERFORMANCE EVALUATION OF IMPULSE RADIO ULTRA WIDE BAND WIRELESS SENSOR NETWORKS Aubin Lecointre, 2 alecoint@laas.r Abdoulaye Berthe, 2 aberthe@laas.r Daniela Dragomirescu, 2 daniela@laas.r Jacques Turbert 3 acques.turbert@dga. deense.gouv.r Robert. Plana, 2 plana@laas.r CNRS; LAAS; 7 avenue du colonel Roche, F-3077 Toulouse, France 2 University o Toulouse; UPS, INSA, INP, ISAE; LAAS; F-3000 Toulouse, France 3 Direction générale de l armement CELAR/TEC La Roche Marguerite BP 5759 3574 BRUZ CEDEX France. ABSTRACT This paper presents a perormance evaluation o Wireless Sensor Networs (WSN) based on Impulse Radio Ultra Wideband (IR-UWB) over a new simulation platorm developed or this purpose. The simulation platorm is built on an existing networ simulator: Global Mobile Inormation System Simulator (GloMoSim). It mainly ocuses on the accurately modeling o IR-UWB PHYsical (PHY) and Medium Access Control (MAC) layer. Pulse collision is modeled according to the used time hopping sequence (THS) and the pulse propagation delay in order to increase the simulation idelity. It also includes a detection and identiication application based on a new sensing channel and new sensor device models. The proposed architecture is generic so it can be reused or any simulation platorm. The perormance evaluation is based on one o the typical WSN applications: local area protection, where sensor nodes are densely scattered in an access regulated area in order to detect, identiy and report non authorized accesses to a base station or analysis. Two networs topologies using dierent protocol stacs are investigated. Their perormance evaluation is presented in terms o reliability and latency.. INTRODUCTION Wireless Sensor Networs can be deined as systems composed o several autonomous nodes lined together by a dedicated wireless lin []. The nodes architecture may include a microprocessor, several sensor and actuator modules and also a radio communication module on a single board. WSNs support a large range o applications: monitoring, local area control, actory and house automation and tactical applications [-3]. The case study presented in this paper studies a local area protection system. It is a ind o remote detection and identiication application, in which sensor nodes are densely scattered in the protected area to detect or sense intrusion events, generated by intruder nodes presence in their vicinity, in order to report it to a base station or analysis. This can be used to reinorce homeland or military troop s security in a tactical application. The intrinsic constraints when setting up such systems are power eiciency, reliability, latency, simplicity, and small size [-3]. IR-UWB is a good candidate to satisy the mentioned constraints because o its interesting characteristics which are low radiated power, simple circuitry, localization ability, high multipath resolution and multiuser access capabilities using Time Hopping (TH) [4-5]. The goal o this paper is to analyze and propose an eicient WSN architecture based on IR-UWB and validate it using engineering simulation. As an alternative MAC- PHY, layer or 802.5.4a based WSN, several IR-UWB MAC-PHY models have been proposed [6-]. These models can be divided into two categories: the irst one insists on the PHY layer characterization [6-8]. The second one integrates this characterization into the networ simulator [9-2]. None o them uses the real pulse propagation delay. Instead, they use a uniormly distributed random value to approximate it. This can be tolerated or the irst type o models as they aim to provide a Bit Error Rate versus Signal and Intererence to Noise Ratio (BER/SINR) depending on the number o active users. However, when modeling at the networ simulator, such approximation can be avoided, as the pulse propagation delay and the number o active users is available. Indeed, the second type o model does not completely meet the WSN simulation requirements as it does not include sensing and sensor channel models. This paper presents an overview o a new developed simulation platorm or IR-UWB that taes into account the previous mentioned aspects. It also presents a comprehensive perormance evaluation o WSNs that has been conducted using this platorm. The perormance evaluation compares distributed MAC protocol or IR-UWB to 802.5.4 Uncoordinated Access. The networ perormance is evaluated using a detection and identiication application and also Constant Bit Rate (CBR) traic. CBR is included or comparison purposes as it is mainly the used model to simulate WSN traic. o 7

The remainder o this paper will be organized as ollows. Section 2 gives an overview o the developed simulation platorm. Section 3 presents the perormance evaluation scenario and their numerical analysis results analysis and inally Section 4 concludes. 2. SIMULATION PLATFORM OVERVIEW We developed a WSN simulator based on IR-UWB in our previous wor [3]. The platorm development is based on a hardware prototype [5]. It mainly ocuses on the IR-UWB PHY and MAC layer accuracy modeling. The PHY layer behavior is modeled by taing into account the pulse collision according to the pulse propagation delay. Slotted and UnSlotted MAC protocols or IR-UWB are modeled. A remote detection and identiication application is also included. Receiver 2.. Physical Layer Model Transmitter 2 Figure : Collision illustration IR-UWB signals are transmitted in orm o very short pulses with low duty cycle (igure ). The medium is divided into rames and each rame is shared in N h chips. The rame and chip duration are T and T c, respectively. The transmitted symbol can be repeated ollowing a pseudo random sequence to avoid catastrophic collision under multiuser access conditions [7-8]. Using the Time Hopping Binary Pulse Amplitude Modulation (TH- BPAM) scheme or example, the th user transmitted ( signal s ) () t can be expressed as [7-8] s where ( ) () t E. x ( t. T c. T ), Transmitter τ T τ 2 = τ - T c = + = c () E is the transmitted pulse energy; x () t denotes the basic pulse shape and { c } represents the th component o the pseudo random Time Hopping Sequence. The received signal r ( t) when only one user is present can be expressed as ( t) A. S ( t ) n( t), r = τ + (2) () t = A. E. x ( t. T c. T ) + n(), t + = r τ (3) where represents the pulse propagation delay and n ( t) is Additive White Gaussian Noise (AWGN) with N 0 2 power density and A represents the attenuation the signal experiences during propagation [7-8]. It depends on the considered channel model in terms o path loss, multipath, shadowing. In a multi user scenario where N u users are active, the received signal is expressed as r = N u = () t = A. S ( t ) + n(), t r τ (4) N u = 2 () t = A. S ( t ) + A. S ( t τ ) + n(), t c τ (5) where τ represents the delay associated to the propagation and asynchronism between clocs [7-8]. A represents the attenuation o the th user s signal (= represents the signal o the user interest). This ormulation can be used to characterize the TH-IR-UWB PHY layer in a multi user scenario and directly reports to the networ simulator [9-2]; however the used propagation delay does not represent the real propagation delay or the real deployment coniguration. The used Bit Error Rate (BER) versus the Signal to Intererence and Noise Ratio (SINR) is also based on a perect power control assumption which is not always realistic. GLOMOSIM Framewor Our wor IR-UWB WSN Simulator over GLOMOSIM Application Transport Networ MAC Physical Development o the IR-UWB PHY layer modeling: -- BER/SINR derivation rom BER/SNR -2- Multi users intererence model Figure 2: Simulation Methodology Overview Instead o characterizing BER versus SINR o concurrent transmissions out o the networ simulator in a multi user scenario and report it on the networ simulator, 2 o 7

our model is based on a two steps characterization process. We irst perorm an extensive Matlab/Simulin simulation to obtain the relationship between the BER and the SNR: E b N 0 in a single user scenario. The BER versus SNR or IR-UWB can also be derived rom point to point lin measurement in the targeted environment. The multi user intererence characterization is reported to the networ simulator PHY layer model or more accuracy. This constitutes the second characterization step in our model (igure 2). In this step we model the pulse intererence according to the pulses real propagation delay, during the concurrent transmission, instead o using Gaussian approximation to emulate the multi user intererence. Indeed, Gaussian approximation to evaluate multi user intererence has been proven to be unrealistic [8]. Moreover, our new scheme avoids an a priori assumption about the propagation delay τ, the number o active users N u and the perect power control ability as they are available during the simulation. The propagation delay is computed according to the node position, the pulse velocity and the occupied bandwidth [3]. The number o active users depends on the number o concurrent transmission being perormed. The received power is evaluated according to the used channel model (Free Space, Rice or Rayleigh channel model). The multiuser access intererence is computed and added to the receiver bacground noise n () t on a chip per chip basis. This technique outperorms the model proposed in [9] in terms o accuracy. Indeed, in [9], the pulse propagation delay o concurrent transmission using the same or dierent THS is mainly modeled at the irst characterization stage using a Gaussian approximation [8]. Note that the reception THS at a particular receiver depends on its local view o the medium rame structure (Figure ). So it may vary depending on the node position and the central requency o the occupied bandwidth. The th component o the reception time hopping sequence o the th user at a particular receiver can be expressed as = ( Tc. c + τ ) mod T. (6) The reception THSs are computed and stored in an intererence matrix M (Figure 3). We use an intererence vector S to store the SINR o the signal pulses o the user o interest. For each received pulse, the SINR is dynamically updated. The pulses that interere with the user o interest (user ) are the reception sequence th elements deined by the interering matrix content such as: T c + τ mod T = T. c + τ mod T (7) ( ) ( ). c. c = (8) Doing the parallel between the previous equations and the received power P o the concurrent reception, the received signal or the user o interest can be expressed as N u N 0 Prx = P + P +, (9) = 2 2 where P represents the received power o pulses located in the same rame. P =, i P = (0) 0, otherwise So the SINR vector S can be obtained as ollow where the th component is deined as : P S =. N u () N 0 + P I = i-th active user I = N u J = + S 2 + 2 2 = 2 Intererence Matrix : M : THS or each active user J-th component o the Time Hopping Sequence Possible interering user s pulse or SINR evaluation Ns N s + Ns Intererence Vector : S : SINR or the user S N s Ns + Ns S Ns J = N s User o interest : User User User + Figure 3: Multi user intererence illustration using an intererence matrix This model is based on a single user reception model. However, multi user reception is possible once the preambles are well acquired, which means that the reception THS do not interere. In this particular case the SINR vector S has to be replaced by an SINR matrix as we are interested in decoding every receiving signal. The presented methodology is generic, thus it can be used or any multiuser access scheme: Frequency Hopping Spread Spectrum (FHSS) as well as Direct Sequence Spread Spectrum (DSSS) or example. 2.2. MAC layer model We modeled distributed Medium Access Control protocols or IR-UWB [4]: UnSlotted and Slotted MAC model. These are simple ALOHA [3] [5] lie protocols 3 o 7

with parameterized reliability and slot size. Their perormances are evaluated and presented in the Section 3. 2.3 Sensor and sensing channel model Detailed modeling o the sensor device is a ey eature to obtain an accurate WSN simulation ramewor, as it has an impact on the networ perormance [6-7]. Our model is based on mechanic wave propagation. To set it up, we irst characterize the sensor device and sensing channel by considering their important parameters: sampling rate, sensing range, missed detection rate. We use this characterization to mimic the sensor node behavior on the networ simulator. The sensing range is modeled using a probabilistic detection range instead o ull disc coverage. The signal propagation is modeled by a two ray ground relection path loss and a Ricean ading multipath channel model. Missed detections are modeled using adustable parameters. The principle is summarized as ollows: The targeted nodes periodically generate a signal at the sampling rate o the sensor device. This signal is sensed by the sensor node. According to its sensitivity, it detects or not the presence o an intruder. The two deined thresholds represent the device sensitivity and its detection threshold or correct detection (igure 4). Furthermore, the signal generated by two or more targeted nodes may collide at the sensor device input, thus leading to missed detection. The presence o an intruder or a targeted node may not always be notiied by the sensor device because o the additional attenuation due to multipath losses, thus leading to missed detection. Sensor P r d Sensing channel Sensor Intruder P r : Received power Rx threshold Rx sensitivity Detection range Uncertainty range E/R distance : d Figure 4: Sensor and sensing channel This generic method can be used to represent many ind o sensor device behavior, ater adusting the mentioned parameters. An example o a sensor device which can be modeled ollowing the mentioned technique is a binary acoustic sensor present in the Mica Mote hardware. This ind o device provides one bit inormation regarding the presence or absence o an intruder node in its vicinity without 00% reliability [8]. 3. PERFORMANCE EVALUATION In this section, we present the perormance evaluation o an example o WSN applications, the local area protection application, which is ust a case study as our proposed architecture is generic and reusable. Remote detection and identiication perormance is evaluated in the context o low cost and low power WSN architectures. The conigurations used at the MAC and PHY layer are: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) MAC layer over an Oset Quadrature Phase Shit Keying (OQPSK) PHY and UnSlotted and Slotted MAC protocols over an IR-UWB PHY. The presented simulation results are based on a Uniorm Pulse Train Spacing multi user access [7]. The relevant simulation parameters are summarized in Table. Two models are mainly considered. Table : Simulation parameters Parameter TH-IR-UWB OQPSK Bandwidth (MHz) 00 2 Frequency (GHz) 0.8 2.45 Throughput(Mbps) 0.25 Capture Model ber based ber based Antenna Height (m) 0.45 0.03 Antenna Gain (db) 3 3 Noise Figure (db) 5 0 Temperature (K) 270 270 Sensitivity (dbm) -85-96 RX-Threshold (dbm) -80-85 TX-Power (dbm) -24.38 7 3.. First simulation scenario The irst one is a simple star topology in which CBR source to sin transmission is used to evaluate the networ perormances using static routing tables. Figure 5 depicts the irst simulation scenario in which our router nodes are placed around a base station. Four others nodes are placed in their vicinity to mimic the sensor nodes behavior. Each o them generates CBR 4 o 7

traic. The networ perormance is evaluated under dierent traic load condition. Traic is because when using the Slotted protocol, nodes must wait or the slot ront beore starting a transmission. The same experiment was conducted with the CSMA/CA over OQPSK without the Request To Send/Clear To Send RTS/CTS handshae. Here, the pacet delivery ratio was 50.% and the obtained average end to end delay was 7.58 E-03. This is mainly due to the losses induced by pacet collision and the relatively low data rate (250bps). Base Station Sensor Figure 5: Scenario illustration The perormance metrics evaluated in the irst scenario are: The pacet delivery ratio which expresses the ratio between the number o CBR application byte sent by the source and the number o received bytes at the destination. The average end to end delay which expresses the mean delay time rom the source node to the destination. In this section the simulation results are presented and analyzed. Figure 6 presents the variation o the pacet delivery ratio as the number o retransmission increases rom 0 to 6. Unexpectedly, the results show that 00% pacet delivery ratio is obtained with UnSlotted protocol with 4 retransmissions whereas it is obtained in Slotted with 6 retransmissions. Figure 6: Pacet Delivery Ratio In act, when employing the Slotted protocol, repeated code collisions seem oten to occur because o the relative synchronization between nodes. s always wait or the new slot ront. This can be resolved by adding a random delay beore starting the new transmission. Figure 7 compares the average end to end delay as the number o retransmission increases in Slotted and UnSlotted protocol. It can be seen that the UnSlotted protocol has lower latency than the Slotted protocol. This Figure 7: Average End to End Delay In this irst set o experiments, the traic load has been varied rom 0. pacet/second to 80 pacets per second. This did not aect the evaluated perormance. 3.2. Second simulation scenario The second model consists o a complete WSN system where sensor nodes are scattered in the protected area in order to detect, authenticate and trac the intruder nodes. In this scenario, detection and authentication pacets are sent to the sin node using a reactive multi hop ad hoc routing protocol: Ad hoc On Demand Distance Vector (AODV). Figure 8 depicts the second scenario where 60 sensor nodes are placed around a base station to detect and eventually authenticate intruders. In this scenario, intruder nodes may be mobile, thus enabling tracing. Two types o nodes have been considered: Unauthorized and authorized nodes. Authorized nodes are able to respond to authentication request generated by the sensor devices. The perormance metrics evaluated in the second scenario are: The system reliability in terms o detection which expresses the ratio between the generated event and the notiied event to the base station. The system reliability in terms o authentication which expresses the ratio between the authentication request and the notiied responses to the base station. 5 o 7

The detection latency which expresses the delay between an intrusion and its notiication to the base station. the routing protocol overhead in light traic condition. With traic load above 0.2 pacets per second the eect o the routing protocol overhead disappears, as the established paths are requently used. Unauthorized Intruder Authorized Sensor Base Station Figure 8: Scenario 2 illustration The irst experiment o the second scenario consists on a peer to peer CBR traic with dierent traic loads, ive CBR applications are used between nodes located at dierent sides o the protected area. Figure 0: Pacet Delivery Ratio Figure and 2 are plotted using our developed sensing and sensor channel model with 95% reliability. Their variation is quite similar to the CBR traic one. However, the detection and authentication rate which are lined to the pacet delivery ratio are not the same. This demonstrates the inaccuracy o approximating WSN application with CBR traic as already proven in [8]. Figure 9: Average End to End delay Figure 9 depicts the average end to end delay variation depending on the traic load. The high value o the average end to end delay with 0. pacets per second is due to the route establishment delay, caused by the routes TTL (Time To Live). In act, in the AODV routing protocol, the routes need to be reconstructed i they last a certain time. So under light traic conditions, almost every transmitted pacet creates a route establishment overhead. Figure 0 represents the pacet delivery ratio in dierent traic condition. As expected, the pacet delivery ratio drops as the traic grows. The low pacet delivery ratio with 0. pacets per second is also due to Figure : Detection and Authentication Rate Figure 2: Detection and Authentication Latency 6 o 7

4. CONCLUSION In this paper, we presented a WSN simulation architecture or TH-IR-UWB MAC and PHY layers. The proposed simulator accurately deals with the IR-UWB speciicities. It proposes a new scheme to accurately model the multiuser access with Time Hopping Impulse Modulation on a networ simulator. Furthermore, the proposed multi user intererence modeling scheme can be reused or all Code Division Multiple Access (CDMA) techniques. This new scheme uses the time chip-scale division or evaluating in real time the SINR o the PHY lin. For increasing accuracy the real pulse propagation delay is used. Thus it allows a more accurate multi user intererence and pulse collision model. The presented simulator includes sensor and sensing channel models based on mechanic wave propagation and a detection and identiication application. This scheme has been implemented using the networ simulator GloMoSim. Using the developed platorm, several experiments have been conducted; they demonstrate the ability or IR-UWB to match the WSN constraints in term o reliability and latency. The perormance evaluation shows that Unslotted MAC is more eicient than Slotted MAC or IR-UWB. It demonstrates that using Unslotted MAC with IR-UWB PHY is 50% more reliable and more latency eicient than the CSMA MAC or OQPSK PHY. Our uture wor will include tracing algorithm perormance evaluation based on IR-UWB positioning capabilities, as well as low cost and low power sensor node hardware architecture prototyping based on IR- UWB. In addition an improvement o the sensing an channel model has to be proposed or enabling not only binary sensor modeling. Thans to the high scalability o GloMoSim, these IR-UWB PHY and MAC improvements can be used or WSN architecture evaluation and optimization. REFERENCES [] F. Ayildiz, W. Su, Y. Sanarasubramaniam and E. Cayirci, A Survey on Sensor Networs Communications Magazine, IEEE Aug 2002. pp 02-4. [2] K. Holger, Protocols and Architectures or Wireless Sensor Networs. Willey, 2007. [3] R. Verdone, D. Dardari, G. Mazzini, and Andrea Conti, Wireless Sensor and Actuator Networs, Technologies, Analysis and design Academic Press 2008. [4] I. Oppermann, M. Hamalainen and J. Linatti, UWB Theory and Applications: Theory and Applications John Wiley and Sons. 2004. [5] A. Lecointre, D. Dragomirescu, and R. Plana, System Architecture Modelling o an UWB Receiver or Wireless Sensor Networs S. Vassiliadis et al. (Eds.): SAMOS 2007, vol. 4599, Oct 2007. pp 408-420. [6] M.G. D. Benedetto, L. D. Nardis, M. Jun and G. Giancola Uncoordinated Wireless Baseborn Medium Access or UWB Communication Networs Mobile Networs and Application, Vol. 0(5), Oct 2007. pp 663-674. [7] R. A. Scholtz Multiple Access with Time Hopping Impulse Modulation, (Invited paper) MILCOM 93. Bedord, MA, Oct. -4, 993. [8] G. Durisi and G. Romano, On the validity o Gaussian approximation to characterize the multiuser capacity o UWB-TH-PPM, IEEE UWBST, Aug 2002. pp 57-6. [9] R. Merz, J. Widmer, J.Y. Leboudec and B. Radunovic A Joint PHY-MAC Architecture or Low-Radiated Power TH-UWB Wireless Ad-hoc Networs Vol. 5(5) John Wiley and Sons. Aug 2005. pp 567-580. [0] G. Giancola and M. G. D. Benedetto, A collisionbased model or multi user intererence in impulse radio UWB networs IEEE ISCAS2005. May 2005. pp 49-52. [] N. J. August, W. Chung, and D. S. Ha, Distributed MAC Protocols or UWB Ad Hoc and Sensor Networs Radio and Wireless symposium, IEEE, Location, January 2006. pp 5-54. [2] H-X. Tan, R. K. Patro, M-C Chan, P-Y Kong, and C- K. Tham, Perormance evaluation o Slotted-Aloha over TH-UWB, International Conerence on Ultra Wideband Communication, IEEE, July 2006. [3] A. Berthe, A. Lecointre, D. Dragomirescu, and R. Plana, Simulation Platorm or Wireless Sensor Networ Based On Impulse Radio ultra wideband International Conerence on Networing, IEEE, March 2009. [4] R. Jurda, P. Baldi and C. V. Lopes, U-MAC: A proactive and adaptative UWB medium access control protocol, Wireless Communications and Mobile Computing, Wiley 2005. [5] F. Kheiri, B. Dewbeery, A. Jacson and L. L. Joiner, Impulse Ultrawideband Ad-Hoc Tracing and Communication Networ, IEEE MILCOM 2008. [6] L. P. Clare, E. H. Jennings, and Jay L. Gao Perormance Evaluation Modeling o Networed Sensor, Aerospace Conerence, IEEE, March 2003. pp 33-322 [7] Wooyoung Kim, Kirill Mechitov, Jeung-Yoon Choi and Soo Ham, On Target Tracing with Binary Proximity Sensors, Inormation Processing in Sensor Networs, IEEE, April 2005. [8] M. Varshney, and R. Bagrodia, Detailed Models or Sensor Networ Simulations and their Impact on Networ Perormance, MSWiM 04, October 2004, pp. -0. 7 o 7