الفهرس | Only 14 pages are availabe for public view |
Abstract The fire in some building damages the building itself partly or entirely while the radiation leakage can damage the country partly or entirely. Therefore, the security should be built carefully in the countries. The objective of this thesis is the design of Wireless Sensor Network (WSN) having the ability to monitor the radiation leakage. The first problem discussed in this work deals with routing problem. A proposed routing protocol named by Long Lifetime Hierarchical Routing Protocol (LL-HRP) is presented to enhance WSN lifetime. LL-HRP is compared with the other routing protocols using some metrics which are Network clustering, energy consumption, number of lived nodes, number of lost sensed data, and the throughput. The comparison shows that LL-HRP succeeds in remedying the routing protocols drawbacks and enhancing both WSN lifetime and performance in comparison with the other protocols. WSN is composed of huge numbers of sensor nodes. These sensor nodes are deployed randomly around a Base Station (BS). Therefore, the localization of these sensor nodes in WSN is very important in the nuclear plants to locate the radiation leakage problem accurately. This thesis introduces a proposed sensor nodes localization method named by Free-Cost Localization Method (FCLM). FCLM ignores the use of anchor nodes in comparison with the other methods. The use of anchor nodes increases WSN cost due to installation of additional modules in some of the sensor nodes. In addition, FCLM specifies the coordinates of the sensor nodes in WSN area depending on distances estimation only in comparison with the other methods which require the angel estimation beside distance estimation. The active hacker of WSN in the nuclear plants means that this hacker is the devil himself or no mind person because of radiation leakage dangerous. The V data security is discussed by analyzing the different forms of the hackers. The analysis shows that the hackers can be faced by two approaches which are the key-updating and the frequency modulation. The key-updating approach is used in the authentication stage and the data transfer stage. The modulation technique approach is used to face the jamming threat. The proposed key management scheme is named by Key-Updating Authentication Protocol (KUAP). The proposed image encryption algorithm is named by New Image Encryption Algorithm for WSN (NEA-WSN). Moreover, this thesis introduces a proposed audio encryption algorithm named by Proposed Audio Encryption Algorithm (PAEA). The two proposed jamming defensive techniques are named by Inhomogeneous Carriers Modulation Technique (ICMT) and Hybrid Frequency Modulation with Amplitude Modulation (FM-AM), respectively. The jamming threat problem guides us to introduce an enhanced detection technique, named by Enhanced Jamming Detection Technique (EJDT), and a proposed jamming localization method named by Disturber Localization Method (DLM). In addition, the thesis introduces two merging techniques used to merge the audio samples and the image pixels in one signal. The merging techniques enhance the performance of the communication systems from many directions such as bandwidth utilization. The two merging techniques are named by Image and Audio Interpenetration Technique (IAIT) and Image and Audio Merging Technique (IAMT). Finally, the comparative study between the proposed techniques with the other techniques shows the success of the proposed techniques in the achievement of security requirements of each discussed threats type in the nuclear plants. The last objective of the thesis is the data compression. The image is used as data. Thus, the thesis introduces five proposed image compression algorithms in comparison with the other image compression algorithms. These proposed algorithms are named by Zonal-DCT Image Compression Algorithm (Z-ICA) Enhanced Joint Photographic Experts group 2000 (En-JPEG2000), Hybrid DWT with Zonal-DCT (DWT-Zonal) Image Compression Algorithm, Haar Wavelet Image Compression Algorithm (HW-JPEG2000), and Low Energy Image Compression Algorithm (LE-LICA). These proposed algorithms are enhancements in the quantization stage which has been shown in JPEG and JPEG2000. The tradeoff between the reconstructed image quality and the energy consumption is the main point of image algorithm design in WSN. The comparison results differentiate between the algorithms performance using some metrics such as energy consumption and Peak Signal-to-Noise Ratio (PSNR). The simulation results show the superiority of LE-LICA than the others. And also, the results show that LE-LICA is a proposed lossless image compression algorithm. |