• Title/Summary/Keyword: Node location

Search Result 711, Processing Time 0.022 seconds

A Study on UWB Ranging and Positioning Technique using Common Clock (공통 클럭을 이용한 UWB 거리 인지 및 무선 측위 기술 연구)

  • Park, Jae-Wook;Choi, Yong-Sung;Lee, Soon-Woo;Lee, Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1128-1135
    • /
    • 2010
  • A wireless positioning system using ultra-wideband (UWB) for indoor wireless positioning uses ranging data in order to accurately estimate location. Commonly, ranging uses time of arrival (TOA), time difference of arrival (TDOA) based on arrival time. The most fundamental issue in the ranging for wireless positioning is to obtain clock synchronization among the sensor nodes and to correct an error caused by the relative clock offset from each node. In this paper, we propose ranging and positioning technique using common clock in order to solve both clock synchronization and clock offset problems. To verify the performance of proposed, we simulated ranging and positioning in channel model introduced by IEEE 802.15.4a Task Group and then results show that location estimation is unaffected by clock offset.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.

A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink (이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법)

  • Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.53-64
    • /
    • 2005
  • Previous secure routing protocols for wireless sensor networks assume that a sink is static. In many cases, however, a sink operated by man or vehicle is moving. A mobile sink creates a lot of technical problems such as reconfiguration of routing path exposure of sink location. and selection of secure access point node, which are not considered by many previous researches. In this paper, we propose a new secure routing scheme for solving such problems using hi-directional hash chain and delegation nodes of grid structure. This scheme provides a secure routing path and prevents attacker from recognizing the location of a mobile sink in sensor networks. This new method reduces the resource requirements compared to the cashed routing schemes. Simulation results also show that the system is secure and efficient enough.

Proposal of Optimized Neural Network-Based Wireless Sensor Node Location Algorithm (최적화된 신경망 기반 무선 센서 노드위치 알고리즘 제안)

  • Guan, Bo;Qu, Hongxiang;Yang, Fengjian;Li, Hongliang;Yang-Kwon, Jeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1129-1136
    • /
    • 2022
  • This study leads to the shortcoming that the RSSI distance measurement method is easily affected by the external environment and the position error is large, leading to the problem of optimizing the distance values measured by the RSSI distance measurement nodes in this three-dimensional configuration environment. We proposed the CA-PSO-BP algorithm, which is an improved version of the CA-PSO algorithm. The proposed algorithm allows setting unknown nodes in WSN 3D space. In addition, since CA-PSO was applied to the BP neural network, it was possible to shorten the learning time of the BP network and improve the convergence speed of the algorithm through learning. Through the algorithm proposed in this study, it was proved that the precision of the network location can be increased significantly (15%), and significant results were obtained.

GPS Accuracy Revision Using RSSI and AoA in Wireless Sensor Network (무선 센서 네트워크에서 RSSI와 AoA를 활용한 GPS 정밀도 향상 방안)

  • Cho, Hae-Min;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.889-896
    • /
    • 2022
  • Data required in a wireless sensor network environment requires more accurate figures as technology advances and its complexity increases. However, in the case of operating a large number of sensor nodes in a large area, the balance between the power consumed and the data quality that can be acquired accordingly should be considered for that purpose. In particular, in complex, densely populated urban areas or military operations with specific goals, location data requires increasingly detailed and high accuracy over a wide range. In this paper, we propose a method of mounting a Global Positioning System(: GPS) only on some of the sensor nodes deployed in the wireless sensor network and improving the error of GPS location data measured on that sensor node through Angle of Arrival(: AoA) and Received Signal Strength Indicator(: RSSI).

Fast XML Encoding Scheme Using Reuse of Deleted Nodes (삭제된 노드의 재사용을 이용한 Fast XML 인코딩 기법)

  • Hye-Kyeong Ko
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.835-843
    • /
    • 2023
  • Given the structure of XML data, path and tree pattern matching algorithms play an important role in XML query processing. To facilitate decisions or relationships between nodes, nodes in an XML tree are typically labeled in a way that can quickly establish an ancestor-descendant on relationship between two nodes. However, these techniques have the disadvantage of re-labeling existing nodes or recalculating certain values if insertion occurs due to sequential updates. Therefore, in current labeling techniques, the cost of updating labels is very high. In this paper, we propose a new labeling technique called Fast XML encoding, which supports the update of order-sensitive XML documents without re-labeling or recalculation. It also controls the length of the label by reusing deleted labels at the same location in the XML tree. The proposed reuse algorithm can reduce the length of the label when all deleted labels are inserted in the same location. The proposed technique in the experimental results can efficiently handle order-sensitive queries and updates.

Adjuvant Radiotherapy Following Radical Hysterectomy and Bilateral Pelvic Lymph Node Dissection for the Uterine Cervical Cancer : Prognostic Factors and Failure Patterns (근칙적 절제술과 술후 방사선치료를 시행한 자궁경부암 환자의 치료성적, 예루인자와 실패양상)

  • Choi, Doo-Ho
    • Radiation Oncology Journal
    • /
    • v.15 no.4
    • /
    • pp.357-367
    • /
    • 1997
  • Purpose : To identify variable prognostic factors and analyse failure patterns in the uterine cervix cancer after radical operation and adjuvant radio-therapy, a retrospective analysis was undertaken. Materals and Methods : I analysed one hundred and twenty four patients with uterine cervix cancer, FIGO stage IB, IIA and IIB, treated with radical hysterectomy and pelvic lymph node dissection followed by adjuvant radio-therapy between May 1985 and May 1994. Minimum follow up period was 24 months. All of them were treated with full dose external radiotherapy with linear accelerator and/or high dese rate intracavitary radiation. Results : Overall 5 year survival rate and relapse free survival rate were $75.4\%,\;73.5\%$, respectively. Significant prognostic factors by relapse free survival were wall involvement thickness, lymph node location and number, parametrium involvement, tumor size, stage, uterine body involvement, vaginal resection margin involvement. By multivariate analysis, lymph node matastasis. tumor size and vaginal resection margin involvement were significant prognostic factos. Treatment related failure were 33 cases. Locoregional failure were more likely in the stage IIB, lymph node positive or vaginal resection margin positive patients whereas distant failures were relatively more frequent in stage IB, IIA and lymph node, vaginal resection negative patients. In stage IIB, 5 year relapse free survival rate was only $56\%$ and nine of twenty two patients recurred. Conculsion : Postoperative radiotherapy results are good for patients with relatively low risk factor. But the results are poor for patients with multiple, high risk factors or stage IIB. To control recurrence for patients with high risk factors, postoperative adjuvant radiotherapy is not sufficient treatment method. To raise control rate adding other methods such as radiosensitizing agent or chemotherapy is necessary and prospectively randomized study is needed for evaluation of postoperative radiotherapy efficacy and /or other methods. And it is reasonable to treat primary radical radiotherapy for patients with stage IIB cervical cancer instead of radical operation and adjuvant radiotherapy and/or chemotherapy regimen.

  • PDF

Energy-Efficient Mobility Management Schemes in HMIPv6 (HMIPv6환경에서 에너지 효율적인 이동성 관리 기법)

  • Yang Sun Ok;Kim SungSuk;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.615-624
    • /
    • 2005
  • In Mobile IP, several types of messages - binding update, binding request and binding acknowledgement - are used to support user mobility. It is necessary to exchange those messages frequently for seamless mobility but it incurs both the increase of network overhead and poor usage of mobile node battery power Thus, we need a mechanism that the server detects users location and also copes with the problems effectively, which is our main concern in this paper Each user records all moving logs locally and periodically makes out profile based on them in HMIPv6. By using profile, estimated resident time can be computed whenever he enters an area and the time is set up as the binding update message lifetime. Of course, the more correct lifetime nay be obtained IP arrival time as well as average resident time Is considered in profile. Through extensive experiments, we measure the bandwidth usage for binding update messages by comparing the proposed schemes with that in HMIPv6. From the results, Gain gets over $80\%$ when mobile node stays more than 13 minutes in a subnet. Namely, we come to know that our schemes improve network usage and energy usage in mobile node by decreasing the number of messages while they also manage users locations like that in HMIPv6.

3D Node Deployment and Network Configuration Methods for Improvement of Node Coverage and Network Connectivity (커버리지와 네트워크 연결성 향상을 위한 3차원 공간 노드 배치 및 망 구성 방법)

  • Kim, Yong-Hyun;Kim, Lee-Hyeong;Ahn, Mirim;Chung, Kwangsue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.778-786
    • /
    • 2012
  • Sensors that are used on wireless sensor networks can be divided into two types: directional sensors, such as PIR, image, and electromagnetic sensors; and non-directional sensors, such as seismic, acoustic and magnetic sensors. In order to guarantee the line-of-sight of a directional sensor, the installation location of the sensor must be higher than ground level. Among non-directional sensors, seismic sensors should be installed on the ground in order to ensure the maximal performance. As a result, seismic sensors may have network connectivity problems due to communication failure. In this paper, we propose a 3D node deployment method to maximize the coverage and the network connectivity considering the sensor-specific properties. The proposed method is for non-directional sensors to be placed on the ground, while the directional sensor is installed above the ground, using trees or poles, to maximize the coverage. As a result, through the topology that the detection data from non-directional sensors are transmitted to the directional sensor, we can maximize the network connectivity. Simulation results show that our strategy improves sensor coverage and network connectivity.