{"title":"Distortion analysis of underwater acoustic sensor networks","authors":"A. Stefanov","doi":"10.1109/NTMS.2015.7266487","DOIUrl":null,"url":null,"abstract":"The paper studies the distortion performance of multihop underwater acoustic sensor networks. The network is composed of bottom mounted sensors and the sensor to sensor links experience Ricean fading. The distortion is evaluated for the case when there is interference from other sensors in the network. The focus is on the sustainable number of hops in the network for a maximum allowed (target) route distortion requirement. Numerical examples are provided that illustrate the results of the analysis and the regions where the network operation is limited, namely, the coverage-limited region and the interference-limited region.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2015.7266487","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The paper studies the distortion performance of multihop underwater acoustic sensor networks. The network is composed of bottom mounted sensors and the sensor to sensor links experience Ricean fading. The distortion is evaluated for the case when there is interference from other sensors in the network. The focus is on the sustainable number of hops in the network for a maximum allowed (target) route distortion requirement. Numerical examples are provided that illustrate the results of the analysis and the regions where the network operation is limited, namely, the coverage-limited region and the interference-limited region.