• Title/Summary/Keyword: 데이터 수집 프로토콜

Search Result 311, Processing Time 0.031 seconds

Implementation of Flooding Routing Protocol for Field sever using Weather Monitoring System (국지기상 모니터링용 필드서버를 위한 플러딩 라우팅 프로토콜의 구현)

  • Yoo, Jae-Ho;Lee, Seung-Chul;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.233-240
    • /
    • 2011
  • A field server was developed by using ubiquitous sensor network technology to monitor the abrupt weather variation in local or mountain area. The data transmissions between deployed field servers in local terrain are very important technology in disaster prevention monitoring system. Weather related information such as temperature, humidity, illumination, atmospheric pressure, dew point and meteorological data are collected from the designated field at a regular interval. The received information from the multiple sensors located at the sensor field is used flooding routing protocol transmission techniques and the sensing data is transferred to gateway through multi-hop method. Telosb sensor node are programmed by nesC language in TinyOS platform to monitor the weather parameters of the local terrain.

Secure Data Transaction Protocol for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 프라이버시 보호를 위한 안전한 데이터 전송 프로토콜)

  • Go, Woong;Kwak, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1701-1710
    • /
    • 2012
  • Recently, it has been found that it is important to use a smart grid to reduce greenhouse-gas emissions worldwide. A smart grid is a digitally enabled electrical grid that gathers, distributes, and acts on information regarding the behavior of all participants (suppliers and consumers) to improve the efficiency, importance, reliability, economics, and sustainability of electricity services. The smart grid technology uses two-way communication, where users can monitor and limit the electricity consumption of their home appliances in real time. Likewise, power companies can monitor and limit the electricity consumption of home appliances for stabilization of the electricity supply. However, if information regarding the measured electricity consumption of a user is leaked, serious privacy issues may arise, as such information may be used as a source of data mining of the electricity consumption patterns or life cycles of home residents. In this paper, we propose a data transaction protocol for privacy protection in a smart grid. In addition, a power company cannot decrypt an encrypted home appliance ID without the user's password.

Large Scale Failure Adaptive Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 대규모 장애 적응적 라우팅 프로토콜)

  • Lee, Joa-Hyoung;Seon, Ju-Ho;Jung, In-Bum
    • The KIPS Transactions:PartA
    • /
    • v.16A no.1
    • /
    • pp.17-26
    • /
    • 2009
  • Large-scale wireless sensor network are expected to play an increasingly important role for the data collection in harmful area. However, the physical fragility of sensor node makes reliable routing in harmful area a challenging problem. Since several sensor nodes in harmful area could be damaged all at once, the network should have the availability to recover routing from node failures in large area. Many routing protocols take accounts of failure recovery of single node but it is very hard these protocols to recover routing from large scale failures. In this paper, we propose a routing protocol, which we refer to as LSFA, to recover network fast from failures in large area. LSFA detects the failure by counting the packet loss from parent node and in case of failure detection LSFAdecreases the routing interval to notify the failure to the neighbor nodes. Our experimental results indicate clearly that LSFA could recover large area failures fast with less packets than previous protocols.

A Method to Support Mobile Sink Node in a Hierarchical Routing Protocol of Wireless Sensor Networks (무선 센서 네트워크를 위한 계층적 라우팅 프로토콜에서의 이동 싱크 노드 지원 방안)

  • Kim, Dae-Young;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1B
    • /
    • pp.48-57
    • /
    • 2008
  • Wireless sensor networks are composed of a lot of sensor nodes and they are used to monitor environments. Since many studies on wireless sensor networks have considered a stationary sink node, they cannot provide fully ubiquitous applications based on a mobile sink node. In those applications, routing paths for a mobile sink node should be updated while a sink node moves in order to deliver sensor data without data loss. In this paper, we propose a method to continuously update routing paths for a mobile sink node which can be extended on hierarchical multi-hop routing protocols in wireless sensor networks. The efficiency of the proposed scheme has been validated through comparing existing method using a location based routing protocol by extensive computer simulation.

Modeling and Simulation of LEACH Protocol to Analyze DEVS Kernel-models in Sensor Networks

  • Nam, Su Man;Kim, Hwa Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.97-103
    • /
    • 2020
  • Wireless sensor networks collect and analyze sensing data in a variety of environments without human intervention. The sensor network changes its lifetime depending on routing protocols initially installed. In addition, it is difficult to modify the routing path during operating the network because sensors must consume a lot of energy resource. It is important to measure the network performance through simulation before building the sensor network into the real field. This paper proposes a WSN model for a low-energy adaptive clustering hierarchy protocol using DEVS kernel models. The proposed model is implemented with the sub models (i.e. broadcast model and controlled model) of the kernel model. Experimental results indicate that the broadcast model based WSN model showed lower CPU resource usage and higher message delivery than the broadcast model.

Design and Implementation of Mobile RFID Middleware Modules for the Mobile Environments (모바일 환경을 위한 모바일 RFID 미들웨어 모듈 설계 및 구현)

  • Park, Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.10-18
    • /
    • 2008
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement a mobile RFID middleware system that supports the mobile handset environment for real-time based processing of the necessary data in the mobile environment. The proposed mobile RFID middleware system includes a mobile reader interface that collects the tag data, a mobile filtering engine that processes the tag data into more meaningful data that is sent to the application interface, and finally the mobile application interface that supports the m-SOAP application access protocol for interfacing with existing mobile applications. The filtering speed of the newly-developed middleware engine was found to be suitable for the characteristics of mobile handsets.

드론 보안에 적용된 암호 기술 현황

  • Cho, Seong-Min;Seo, Seung-Hyun
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.11-19
    • /
    • 2020
  • 드론은 군용에서부터, 공공 관제 및 모니터링, 촬영 및 취미, 배송 서비스에 이르기까지 다양하게 활용되고 있다. 그러나 드론에 내장된 센서 값 조작이나 수집 데이터 누출, 통신 내용 도감청 및 GPS 신호 조작 등의 보안 취약점을 이용한 공격은 드론을 포획하거나 추락시키고 중요한 데이터를 탈취하는 등 심각한 문제를 야기할 수 있다. 이러한 보안 취약점을 해결하기 위해 드론 전용 난수 생성기와 통신보호를 위한 암호프로토콜, 화이트박스 암호를 통한 정보보호 및 신호 인증을 통한 GPS 스푸핑 탑지 기법 등 안전한 드론 보안 메커니즘이 활발히 연구되고 있다. 이에 본 논문에서는 드론 시스템의 구성 요소별 보안 위협 요소를 살펴보고, 보안 위협 사례를 공격 유형별로 분석한다. 또한 이러한 보안 위협들에 대응하기 위해 드론에 적용된 암호 기술 현황에 대해 살펴본다.

An Authentication Protocol of RFID Security Using Simplified EPC (EPC 단순화를 이용한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.11a
    • /
    • pp.36-38
    • /
    • 2008
  • 현재 RFID 기술은 물류. 유통등 다양한 산업 분야에서 이를 활용하기 위한 연구들이 활발히 진행되고 있다. 그러나 RFID 시스템은 구조상 무선으로 동작 되는 불안정한 구간이 있으며 이 구간 사이의 EPC 데이터를 수집, Filtering, 분석, 해킹공격 등으로 보안상 취약한 부분으로 노출되어 있으며, 이 분야의 연구가 활발히 진행 중이다. 본 논문은 EPCIS를 위한 RFID 간소화 및 성능 향상 방안을 제안한다. 제안을 바탕으로 구현 할 때 EPC 태그의 불필요 데이터 수신을 하지 않음으로 신뢰성은 향상되며 데이터베이스의 저장 공간의 사용을 줄이고 EPCIS를 구현할 수 있는 시스템 이다.

  • PDF

Biological data transmission performance of virtual cattle feedlot sensor network (가상센서네트워크를 이용한 사육장 생체데이터 전송성능에 관한 연구)

  • Kang, Hyun-Joong;Ju, Hui-Dong;Lee, Meong-Hun;Yoe, Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1134-1141
    • /
    • 2008
  • As sensor network technologies developed, the sphere field of application is escalated unfortunately, the applicable size is smaller than the actual quantity of cattle in feedlot. In this paper, we simulated and evaluated biological data transmission performance of virtual cattle feedlot. Deducted conclusions show us a more efficient cattle control scenario is required and effective routing protocol design and modification are needed.

Development of User Behavioral Statistics System Using DNS Protocols (DNS 프로토콜을 활용한 사용자 행위 모니터링 시스템 개발)

  • Ahn, Pyeong-Ju;Jeong, Dong-Hyun;Jung, Sang-Hoon;Jang, Jae-Won;Seok, Ji-Won;Lee, Kyung-Moon
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.468-471
    • /
    • 2020
  • 본 연구에서는 사용자의 접속 기록을 상세하게 모니터링할 수 있는 DNS 패킷 기반 분석과 사용자별 프로세스 분석 기법을 융합한 네트워크 모니터링 시스템 설계를 제안한다. 네트워크 패킷 수집을 위한 탭 장비와 사용자 디바이스에 플러그인 형태 프로그램 설치를 통하여 어떤 프로세스에서 패킷이 발생하였는지 분석이 가능하다. 이를 통해 네트워크 증설을 위한 데이터 확보, 악성 패킷 분류를 위한 데이터로의 사용 등 다양한 방법으로 활용할 수 있는 확장형 도메인 모니터링 시스템을 제안한다.