• Title/Summary/Keyword: Sensor Node Deployment

Search Result 89, Processing Time 0.018 seconds

A Study on the Wireless Sensor Network Routing Method and Fault Node Detection for Production Line (생산라인에 적용을 위한 무선 센서 네트워크 라우팅방식 및 고장노드 검출에 대한 연구)

  • Park, Jeong?Hyeon;Seo, Chang-Jun
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1104-1108
    • /
    • 2018
  • IIoT applies IoT to industrial sites to monitor factors such as production, manufacturing, and safety, and it is a solution that allows the worker to easily manage the site. An important technology element in this IIoT is a technology that collects information on industrial sites and delivers reliable information to managers using sensors. Therefore, general industrial sites use wired network methods such as Ethernet and RS485 to deliver information. However, there are limitations to the problem of infrastructure costs and to the wide range of line constructions in network deployment. Therefore, in this paper, the network of IEEE 802.15.4 Ad-Hoc wireless sensors is deployed on production lines with machine tools. In addition, we describe the routing method considering machine tool layout and sensor node failure detection algorithm.

A Hierarchical Cluster Tree Based Address Assignment Method for Large and Scalable Wireless Sensor Networks (대규모 무선 센서 네트워크를 위한 계층적 클러스터 트리 기반 분산 주소 할당 기법)

  • Park, Jong-Jun;Jeong, Hoon;Hwang, So-Young;Joo, Seong-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1514-1523
    • /
    • 2009
  • It is well known that the current wireless sensor networks addressing methods do not work efficiently in networks more than a few hundred nodes. A standard protocol in ZigBee-Standard feature in ZigBee 2007 gives balanced tree based address assignment method with distributed manner. However, it was limited to cover less than hundreds of sensor nodes due to the wasteful use of available address space, because composed sensor networks usually make an unbalanced tree topology in the real deployment. In this paper, we proposed the hierarchical cluster tree based address assignment method to support large and scalable networks. This method provides unique address for each node with distributed manner and supports hierarchical cluster tree on-demand. Simulation results show that the proposed method reduces orphan nodes due to the address exhaustion and supports larger network with limited address space compared with the ZigBee distributed address assignment method defined in ZigBee-Standard feature in ZigBee 2007.

Time Synchronization with Oceanic Movement Pattern in Underwater Wireless Networks (해수운동의 특성을 활용한 수중 무선 네트워크 시각 동기화)

  • Kim, Sungryul;Park, Seongjin;Yoo, Younghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.486-496
    • /
    • 2013
  • Time synchronization in underwater environment is challenging due to high propagation delay and mobility of sensor nodes. Previous researches do not consider practical issues affecting on the accuracy of time synchronization such as high-channel access delay and relative position between sensor nodes. Also, those protocols using bidirectional message exchange shorten the network lifetime and decrease the network throughput because numerous transmission, reception and unnecessary overhearing can be occurred. Therefore, in our research, we suggest enhanced time synchronization based on features of underwater environment. It controls the instant of transmission by exploiting the feature of an oceanic movement and node deployment. Moreover, the protocol uses more accurate time information by removing channel access delay from the timestamp. The proposed scheme is also practical on the underwater sensor network requiring low-power consumption because the scheme conducts time-synchronization with smaller transmission and reception compared with previous works. Finally, simulation results show that the proposed protocol deceases time error by 2.5ms and 0.56ms compared with TSHL and MU-Sync respectively, reducing energy consumption by 68.4%.

A Routing Method Considering Sensed Data in Wireless Sensor Networks (무선 센서 네트워크에서 데이터 센싱을 고려한 라우팅 기법)

  • Song, Chang-Young;Lee, Sang-Won;Cho, Seong-Soo;Kim, Seong-Ihl;Won, Young-Jin;Kang, June-Gill
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.41-47
    • /
    • 2010
  • It is very important to prolong the lifetime of wireless sensor networks by using their limited energy efficiently, since it is not possible to change or recharge the battery of sensor nodes after deployment. LEACH protocol is a typical routing protocol based on the clustering scheme for the efficient use of limited energy. It is composed of a few clusters, which consist of head nodes and member nodes. Though LEACH starts from the supposition that all nodes have data transferred to a head, there must be some nodes having useless data in actual state. In this paper we propose a power saving scheme by making a member node dormant if previous sensed data and current data is same. We evaluate the performance of the proposed scheme in comparison with original clustering algorithms. Simulation results validate our scheme has better performance in terms of the number of alive nodes as time evolves.

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks (무선 센서 네트워크에서 행위 기반 공격 탐지를 위한 감시 노드의 연결성과 일반 노드의 커버리지 분석)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.27-34
    • /
    • 2013
  • In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.

An Energy-Efficient Algorithm for Solving Coverage Problem and Sensing Big Data in Sparse MANET Environments (희소 모바일 애드 혹 네트워크 환경에서 빅데이터 센싱을 위한 에너지 효율적인 센서 커버리지 알고리즘)

  • Gil, Joon-Min
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.11
    • /
    • pp.463-468
    • /
    • 2017
  • To sense a wide area with mobile nodes, the uniformity of node deployment is a very important issue. In this paper, we consider the coverage problem to sense big data in sparse mobile ad hoc networks. In most existing works on the coverage problem, it has been assumed that the number of nodes is large enough to cover the area in the network. However, the coverage problem in sparse mobile ad hoc networks differs in the sense that a long-distance between nodes should be formed to avoid the overlapping coverage areas. We formulate the sensor coverage problem in sparse mobile ad hoc networks and provide the solution to the problem by a self-organized approach without a central authority. The experimental results show that our approach is more efficient than the existing ones, subject to both of coverage areas and energy consumption.

Plat-Based Key Pre-Distribution Scheme in Sensor Network (센서네트워크에서 평면 그리드 기반의 키 선 분배 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.1-8
    • /
    • 2008
  • The security of wireless sensor networks is a challenging research area where the resources constraints are a bottleneck for any successful security design. Due to their computational feasibility, symmetric key algorithms that require key pre-distribution are more desirable for use in these networks. In the pre-distribution scheme, keys or keying materials are assigned to each node prior deployment to guarantee a secure communication within the entire network. Though several works are introduced on this issue, yet the connectivity and resiliency are imperfectly handled. In this paper, we revisit the grid based key pre-distribution scheme aiming to improve the connectivity, introduce a higher resiliency level, simplify the logic of key establishment and maintain same level of used of resources usage. The core of our modification relies on introducing the novel plat-based polynomial assignment and key establishment mechanism. To demonstrate the advantageous properties of our scheme over the revisited one, details of consumed resources, resulting connectivity, security and comparisons with relevant works are introduced.

Simulation Study of Energy-efficient Routing Algorithm in Hierarchical WSN Environments (계층적 구조의 WSN 환경에서 에너지 효율적인 라우팅 알고리즘의 시뮬레이션 연구)

  • Kang, Moon-Kyoung;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1729-1735
    • /
    • 2009
  • The hierarchical routing could cause a lot of energy consumption for transferring data by assigning hierarchical routes although actual nodes could be located in physically near spots. Also, when Node Failure or Association Error occurs, the Hierarchical routing could waste more energy to deliver the control messages. This paper evaluate performance of SHP(Shortest Hop Routing) algorithm that suggests short-cut routing algorithm using NL(Neighbor List) and Redirect_ACK message to improve problem of hierarchical routing algorithm. We do a computer simulation by the size of network, deployment of sensor nodes, sink position and POS. As a result of simulation, SHP has better performance than Zigbee Hierarchical routing and HiLow.

Experimental Design of AODV Routing Protocol with Maximum Life Time (최대 수명을 갖는 AODV 라우팅 프로토콜 실험 설계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.29-45
    • /
    • 2017
  • Ad hoc sensor network is characterized by decentralized structure and ad hoc deployment. Sensor networks have all basic features of ad hoc network except different degrees such as lower mobility and more stringent energy requirements. Existing protocols provide different tradeoffs among some desirable characteristics such as fault tolerance, distributed computation, robustness, scalability and reliability. wireless protocols suggested so far are very limited, generally focusing on communication to a single base station or on aggregating sensor data. The main reason having such restrictions is due to maximum lifetime to maintain network activities. The network lifetime is an important design metric in ad hoc networks. Since every node does a router role, it is not possible for other nodes to communicate with each other if some nodes do not work due to energy lack. In this paper, we suggest an experimental ad-hoc on-demand distance vector routing protocol to optimize the communication of energy of the network nodes.The load distribution avoids the choice of exhausted nodes at the route selection phase, thus balances the use of energy among nodes and maximizing the network lifetime. In transmission control phase, there is a balance between the choice of a high transmission power that lead to increase in the range of signal transmission thus reducing the number of hops and lower power levels that reduces the interference on the expense of network connectivity.