• Title/Summary/Keyword: 무선 센서 망

Search Result 256, Processing Time 0.025 seconds

Energy-efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks (무선 센서 네트워크에서 라우팅 홀을 우회하기 위한 에너지 효율적 데이타 전달 프로토콜)

  • Ye, Tian;Yu, Fucai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.321-325
    • /
    • 2008
  • Void areas(holes) as an inevitable phenomenon exist in geographic routing of wireless sensor networks, because the unpredictable and harsh nature application environment or uneven energy consumption. Most of the existing schemes for the issue tend to construct a static detour path to bypass a hole. The static detour path may lead to uneven energy consumption of the nodes on the perimeter of the hole; thus it may enlarge the hole. At the same time, traffic would concentrate on the peripheral node of the hole; thus the nodes on the perimeter of the hole tend to be depleted quietly. In previous work, we have proposed a hole geometric model to reduce the energy consumption and packet collisions of the nodes on the hole boundary. This scheme, however, still has the static detour path problem. Therefore, we extend the previous work by constructing a dynamic detour path hole geometric model for wireless sensor networks in this paper. The location of hole detour anchors is dynamically shifted according to Gaussian function, just generating dynamic hole detour paths.

The Analysis of Security in Wirless Sensor Netwroks (무선네트워크에서의 보안기술 분석)

  • Byun, Byung-Kil;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.569-572
    • /
    • 2005
  • A generation to have felt convenience of a network by a development of Internet is pressing for realization of a wireless network. However, security of wireless network must begin with an attack to be good at all expectations. especially considred from L1 layer to L7 layer. Wireless Network weaker than wire because smuggle through various sensor terminal and invasion of radio waves netwwork Wireless network recognizes a security proposal of physical, network application layer, and is going to discuss a security development point of wiress network from now on.

  • PDF

A Study of Integrated Wireless Air Quality Monitoring Sensor Node using Multi-Hop Tree Routing Algoritm (멀티흡 트리 라우팅 알고리듬을 적용한 무선 통합 공기질 측정 센서노드에 관한 연구)

  • Kwon, Jong-Won;Koo, Sang-Jun;Kang, Sang-Hyuk;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.542-543
    • /
    • 2008
  • 기존의 지그비 기반의 유비쿼터스 센서 네트워크 기술을 적용한 각종 모니터링 어플리케이션들은 노드 수가 증가함에 따라 라우팅 오버헤드 및 종단간의 지연 등 네트워크 성능에 부정적인 영향을 주는 네트워크 효율성에 대한 문제점을 많이 보이고 있다. 본 논문에서 이런 문제점을 해결하기 위해 지그비 기술을 이용하여 멀티흡을 지원하는 트리 라우팅 알고리듬을 적용한 유비쿼터스 지하철역 공기질 모니터링을 위한 무선 통합 공기질 측정 센서노드를 설계하고 실제 지하철역 현장에서 성능평가를 수행하였다. 본 연구결과는 지하 환경에서 신뢰성있는 센서 네트워크를 구축하고 차후 광대역 통합 네트워크망과 연동을 통해 다양한 서비스 사업의 기반이 될 것으로 판단된다.

  • PDF

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Method for Power control of Wired and Wireless linkage Sensor Network for Low-power Wireless network (저전력 무선 네트워크를 위한 유무선 연동 센서 네트워크의 전력 제어 방법)

  • Lee, Kyung-Sook;Kim, Hyun-Deok
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.27-34
    • /
    • 2012
  • In this paper, using a new low-power consumption method for ZigBee device, which consume low-power using an output power control algorithm through RSSI monitoring as interlocking wireless network using ZigBee which has advantages of a low-power consumption, a low-cost, a compatibility and a draft international standardization enacted by IEEE and ZigBee Alliance, with wired network using built coaxial cable to overcome the disadvantage of the existing wireless sensor network, is proposed. Effectiveness of the output power control algorithm through RSSI monitoring has been verified by experimentation for more optimized low-power consumption.

A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence (스마트 센서 기술 융합을 통한 망 생존성 강화에 관한 연구)

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.269-276
    • /
    • 2016
  • Public Safty-LTE(Long Term Evolution) is being deployed in the direction of reducing cost by using both of municipal network and commercial network. However, LTE Network is difficult to ensure the survivability during the information communication infrastructure failures. In addition, it is vulnerable in communication coverage of inside buildings and underground. In this study, we propose to implement effectively the network survivability technique through the convergence to the proven technology. As the advent of the IoT Age, smart sensors which are embedded in the environment and the things will be able to provide a useful infrastructure for ensuring the network survivability. Based on the feature of the smart sensor, we designed the sink node architecture to guarantee the network survivability in disaster situation through the convergence of the small cell technology and extension of wireless network coverage technology. The computing power inherent in the environment is a valuable resource that can be utilized in the disaster situation.

KOCED performance evaluation in the wide field of wireless sensor network (무선센서망 내 KOCED 라우팅 프로토콜 광역분야 성능평가)

  • Kim, TaeHyeon;Park, Sea Young;Yun, Dai Yeol;Lee, Jong-Yong;Jung, Kye-Dong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.379-384
    • /
    • 2022
  • In a wireless sensor network, a large number of sensor nodes are deployed in an environment where direct access is difficult. It is difficult to supply power, such as replacing the battery or recharging it. It is very important to use the energy with the sensor node. Therefore, an important consideration to increase the lifetime of the network is to minimize the energy consumption of each sensor node. If the energy of the wireless sensor node is exhausted and discharged, it cannot function as a sensor node. Therefore, it is a method proposed in various protocols to minimize the energy consumption of nodes and maintain the network for a long time. We consider the center point and residual energy of the cluster, and the plot point and K-means (WSN suggests optimal clustering). We want to evaluate the performance of the KOCED protocol. We compare protocols to which the K-means algorithm, one of the latest machine learning methods, is applied, and present performance evaluation factors.

A Bridge Management System Using Wireless Sensor Networks (무선 센서망을 이용한 교량 관리 시스템)

  • Park, Chan-Heum;Kim, Young-Rag;Kim, Geum-Deok;Park, Hee-Joo;Kim, Chong-Gun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.824-832
    • /
    • 2010
  • In construction structure management, the effects of investigation by the professional manager is dependent on the cost, the inspection periods and methods. Therefore, effective and automated maintenance system for the target structure is required. Although some bridge monitoring systems are operating using wire based networks, the performance is not good enough to show sufficient ability as integrated bridge management system. In this paper, we design and implement an integrated bridge management system based on sensor networks. Two expert modules for bridge management and the integrated system management are provided. Moreover, web-based monitoring system is also designed for users at anywhere. The results show that the system is effective and readily available.

A Design and Implementation of modified ZigBee using the Directed-Messaging for Energy Efficiency Improvement (에너지 효율성 향상을 위하여 방향성 메시징을 사용하는 수정된 지그비의 설계 및 구현)

  • Khil, A-Ra
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.99-105
    • /
    • 2012
  • ZigBee is the low power, low cost and low data rate wireless personal area network(LR-WPAN) standard. The Directed-Messaging is the protocol which improves the energy efficiency through reducing the redundant message transmission by transmitting messages with directional information toward the specified sub-network area in wireless sensor network using broadcasting. In this paper, we design and implement the experimental grid sensor network using ZigBee modified by the Directed-Messaging for the energy efficiency improvement. The experimental sensor network in this paper is configured with Nano24 supporting the ADV message and the routing management module modified to use the directional information. The energy efficiency improvement of the experimental sensor-network by evaluating the experimental results according to transmitting ADV message.