• Title/Summary/Keyword: Sensor node

Search Result 1,927, Processing Time 0.032 seconds

A Power-Efficient MAC Protocol for WBAN

  • Kwak, Kyung-Sup;Ullah, Sana;Kwak, Dae-Han;Lee, Cheol-Hyo;Lee, Hyung-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.131-140
    • /
    • 2009
  • A key challenge for Wireless Body Area Network (WBAN) is to maximize the network lifetime with power-efficient and flexible duty cycling techniques on energy-constraint sensor nodes. In this paper, we propose a novel power-efficient MAC protocol for WBAN that accommodates normal, emergency, and on-demand traffic in a reliable manner. This protocol supports two wakeup mechanisms, a traffic-based wakeup mechanism, which accommodates normal traffic by exploiting the node's traffic patterns, and a wakeup radio mechanism, which accommodates emergency and on-demand traffic by using a wakeup radio. It can be seen that the proposed protocol not only improves the lifetime of WBAN but also provides a reliable method to handle sporadic events. Simulation results show that the proposed protocol outperforms WiseMAC in terms of low-power consumption and delay.

  • PDF

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

Research on Security Model and Requirements for Fog Computing: Survey (포그 컴퓨팅 보안 모델과 보안 요구사항 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.27-32
    • /
    • 2018
  • IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.

Implementation of RF Frequency Synthesizer for IEEE 802.15.4g SUN System (IEEE 802.15.4g SUN 시스템용 RF 주파수 합성기의 구현)

  • Kim, Dong-Shik;Yoon, Won-Sang;Chai, Sang-Hoon;Kang, Ho-Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.57-63
    • /
    • 2016
  • This paper describes implementation of the RF frequency synthesizer with $0.18{\mu}m$ silicon CMOS technology being used as an application of the IEEE802.15.4g SUN sensor node transceiver modules. Design of the each module like VCO, prescaler, 1/N divider, ${\Delta}-{\Sigma}$ modulator, and common circuits of the PLL has been optimized to obtain high speed and low noise performance. Especially, the VCO has been designed with NP core structure and 13 steps cap-bank to get high speed, low noise, and wide band tuning range. The output frequencies of the implemented synthesizer is 1483MHz~2017MHz, the phase noise of the synthesizer is -98.63dBc/Hz at 100KHz offset and -122.05dBc/Hz at 1MHz offset.

Layout optimization of wireless sensor networks for structural health monitoring

  • Jalsan, Khash-Erdene;Soman, Rohan N.;Flouri, Kallirroi;Kyriakides, Marios A.;Feltrin, Glauco;Onoufriou, Toula
    • Smart Structures and Systems
    • /
    • v.14 no.1
    • /
    • pp.39-54
    • /
    • 2014
  • Node layout optimization of structural wireless systems is investigated as a means to prolong the network lifetime without, if possible, compromising information quality of the measurement data. The trade-off between these antagonistic objectives is studied within a multi-objective layout optimization framework. A Genetic Algorithm is adopted to obtain a set of Pareto-optimal solutions from which the end user can select the final layout. The information quality of the measurement data collected from a heterogeneous WSN is quantified from the placement quality indicators of strain and acceleration sensors. The network lifetime or equivalently the network energy consumption is estimated through WSN simulation that provides realistic results by capturing the dynamics of the wireless communication protocols. A layout optimization study of a monitoring system on the Great Belt Bridge is conducted to evaluate the proposed approach. The placement quality of strain gauges and accelerometers is obtained as a ratio of the Modal Clarity Index and Mode Shape Expansion values that are computed from a Finite Element model of the monitored bridge. To estimate the energy consumption of the WSN platform in a realistic scenario, we use a discrete-event simulator with stochastic communication models. Finally, we compare the optimization results with those obtained in a previous work where the network energy consumption is obtained via deterministic communication models.

A Study on UWB Ranging and Positioning Technique using Common Clock (공통 클럭을 이용한 UWB 거리 인지 및 무선 측위 기술 연구)

  • Park, Jae-Wook;Choi, Yong-Sung;Lee, Soon-Woo;Lee, Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1128-1135
    • /
    • 2010
  • A wireless positioning system using ultra-wideband (UWB) for indoor wireless positioning uses ranging data in order to accurately estimate location. Commonly, ranging uses time of arrival (TOA), time difference of arrival (TDOA) based on arrival time. The most fundamental issue in the ranging for wireless positioning is to obtain clock synchronization among the sensor nodes and to correct an error caused by the relative clock offset from each node. In this paper, we propose ranging and positioning technique using common clock in order to solve both clock synchronization and clock offset problems. To verify the performance of proposed, we simulated ranging and positioning in channel model introduced by IEEE 802.15.4a Task Group and then results show that location estimation is unaffected by clock offset.

3D Brain-Endoscopy Using VRML and 2D CT images (VRML을 이용한 3차원 Brain-endoscopy와 2차원 단면 영상)

  • Kim, D.O.;Ahn, J.Y.;Lee, D.H.;Kim, N.K.;Kim, J.H.;Min, B.G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1998 no.11
    • /
    • pp.285-286
    • /
    • 1998
  • Virtual Brain-endoscopy is an effective method to detect lesion in brain. Brain is the most part of the human and is not easy part to operate so that reconstructing in 3D may be very helpful to doctors. In this paper, it is suggested that to increase the reliability, method of matching 3D object with the 2D CT slice. 3D Brain-endoscopy is reconstructed with 35 slices of 2D CT images. There is a plate in 3D brain-endoscopy so as to drag upward or downward to match the relevant 2D CT image. Relevant CT image guides the user to recognize the exact part he or she is investigating. VRML Script is used to make the change in images and PlaneSensor node is used to transmit the y coordinate value with the CT image. The result is test on the PC which has the following spec. 400MHz Clock-speed, 512MB ram, and FireGL 3000 3D accelerator is set up. The VRML file size is 3.83MB. There was no delay in controlling the 3D world and no collision in changing the CT images. This brain-endoscopy can be also put to practical use on medical education through internet.

  • PDF

Traffic Adaptive Transmission Algorithm for Energy Efficiency in WBAN (WBAN 환경에서 에너지 효율을 고려한 트래픽 적응형 전송 알고리즘)

  • Kim, Jinhyuk;Hong, Changki;Choi, Sangbang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.315-327
    • /
    • 2013
  • Wireless Body Area Network (WBAN) is a network around a human body within 3~5m which consists of medical or non-medical device. WBAN has to satisfy many kinds of demands such as low-power, a variety of data rate and a data priority. Especially, it is hard for the nodes for monitoring vital signs to replace battery. Thus energy and channel efficiency is important because the battery power is limited. In this thesis, a novel algorithm for reducing the energy consumption is proposed. The proposed algorithm adjusts transmission period according to traffic. by means of determining transmission period by amount of data, the node can reduce energy consumption. Energy detection is performed in order to guarantee data priority before attempting to transmit. In case of failing to transmit, it is proposed that energy consumption is reduced through avoiding collision by changing priority. The comparison result shows that the proposed algorithm reduces power consumption and increasing maximum channel efficiency by avoiding collision.

Design of a Triple-input Energy Harvesting Circuit with MPPT Control (MPPT 제어기능을 갖는 삼중입력 에너지 하베스팅 회로 설계)

  • Yoon, Eun-Jung;Park, Jong-Tae;Yu, Chong-Gun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.346-349
    • /
    • 2013
  • This paper describes a triple-input energy harvesting circuit using solar, vibration and thermoelectric energy with MPPT(Maximum Power Point Tracking) control. The designed circuit employs MPPT control to harvest maximum power available from a solar cell, PZT vibration element and thermoelectric generator. The harvested energies are simultaneously combined and stored in a storage capacitor, and then managed and transferred into a sensor node by PMU(Power Management Unit). MPPT controls are implemented using the linear relation between the open-circuit voltage of an energy transducer and its MPP(Maximum Power Point) voltage. The proposed circuit is designed in a CMOS 0.18um technology and its functionality has been verified through extensive simulations. The designed chip occupies $945{\mu}m{\times}995{\mu}m$.

  • PDF

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.