• Title/Summary/Keyword: Sensor nodes

Search Result 2,025, Processing Time 0.033 seconds

T2PC: Temperature-aware Transmission Power Control Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 온도인지형 전송파워 제어 기법)

  • Lee, Jung-Wook;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.403-408
    • /
    • 2010
  • The sensor nodes can be installed in the environment in which the temperature change is considerable, such as desert, urban, and data center. Particularly, because the output power becomes less than the targeted power if a temperature is increasing, link quality is degraded and packet losses are occurred. In order to compensate the temperature changes, existing schemes detect the change of the link quality between nodes and control transmission power through a series of feedback process. However, these approaches can cause heavy overhead by additional control packets. In this paper, we propose the T2PC(Temperature-aware Transmission Power Control) to keep up the link quality despite temperature variation. At each node, T2PC compensates the attenuated link quality by controlling the transmission power based on the local temperature measurement. In addition, the packet reception ratio can be improved with less control packets than ones required in existing transmission power control methods based on the feedback control.

An Energy Efficient Communication Protocol using Location Information in Wireless Sensor Networks (무선 센서 망에서 위치 정보를 이용한 에너지 효율적인 통신 프로토콜)

  • Jin, Min-Sook;Park, Ho-Sung;Lee, Eui-Sin;Kim, Tae-Hee;Lee, Jeong-Cheol;Kim, Sang-Ha
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.322-329
    • /
    • 2009
  • Many researches in wireless sensor networks have used a geographic routing to effectively disseminate data between sinks and sources. To know the location information, the geographic routing has proposed two manners. A sink-initiated and a source-initiated are flooding to disseminate its location information in WSN. However, these two manners have two problems. Firstly, whenever they move, they flood their location information. Secondly, their location information is disseminated unnecessary nodes besides nodes which send and receive data in actually. Therefore, this paper proposes a protocol that can solve the two problems and disseminate effectively data between few sinks and few sources. The proposed protocol exploits a location information manager that manages location information of the sinks and the sources. We also compare the performance of the proposed protocol with the existing protocols through a simulation.

Efficient Flash Memory Access Power Reduction Techniques for IoT-Driven Rare-Event Logging Application (IoT 기반 간헐적 이벤트 로깅 응용에 최적화된 효율적 플래시 메모리 전력 소모 감소기법)

  • Kwon, Jisu;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.2
    • /
    • pp.87-96
    • /
    • 2019
  • Low power issue is one of the most critical problems in the Internet of Things (IoT), which are powered by battery. To solve this problem, various approaches have been presented so far. In this paper, we propose a method to reduce the power consumption by reducing the numbers of accesses into the flash memory consuming a large amount of power for on-chip software execution. Our approach is based on using cooperative logging structure to distribute the sampling overhead in single sensor node to adjacent nodes in case of rare-event applications. The proposed algorithm to identify event occurrence is newly introduced with negative feedback method by observing difference between past data and recent data coming from the sensor. When an event with need of flash access is determined, the proposed approach only allows access to write the sampled data in flash memory. The proposed event detection algorithm (EDA) result in 30% reduction of power consumption compared to the conventional flash write scheme for all cases of event. The sampled data from the sensor is first traced into the random access memory (RAM), and write access to the flash memory is delayed until the page buffer of the on-chip flash memory controller in the micro controller unit (MCU) is full of the numbers of the traced data, thereby reducing the frequency of accessing flash memory. This technique additionally reduces power consumption by 40% compared to flash-write all data. By sharing the sampling information via LoRa channel, the overhead in sampling data is distributed, to reduce the sampling load on each node, so that the 66% reduction of total power consumption is achieved in several IoT edge nodes by removing the sampling operation of duplicated data.

Modified Back-Off Algorithm to Improve Fairness for Slotted ALOHA Sensor Networks (슬롯화된 ALOHA 센서 네트워크에서 공평성 향상을 위한 변형된 백오프 알고리즘)

  • Lee, Jong-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.581-588
    • /
    • 2019
  • In this paper, I propose an modified back-off algorithm to improve the fairness for slotted ALOHA sensor networks. In hierarchical networks, the performance degradation of a specific node can cause degradation of the overall network performance in case the data transmitted by lower nodes is needed to be synthesized and processed by an upper node. Therefore it is important to ensure the fairness of transmission performance to all nodes. The proposed scheme choose a back-off time of a node considering the previous transmission results as well as the current transmission result. Moreover a node that failed to transmit consecutively is given gradually shorter back-off time but a node that is success to transmit consecutively is given gradually longer back-off time. Through simulations, I compare and analyze the performance of the proposed scheme with the binary exponential back-off algorithm(BEB). The results show that the proposed scheme reduces the throughput slightly compared to BEB but improves the fairness significantly.

Design of Variable Timeslot for Hybrid MAC (하이브리드 MAC을 위한 가변 타임슬롯 설계)

  • Ryu, Jeong-Kyu;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.613-619
    • /
    • 2020
  • Hybrid media access control (MAC) is used in internet of things (IoT) network, because of communication feature concern with data capacity and communication interval between gateway and sensor nodes and the cost efficiency. Hybrid MAC consists of TDMA and CSMA generally. The distance between gateway and sensor node is openly changed in marine IoT network. Therefore, it is needed to control the period of timeslot of hybrid MAC used in marine IoT network. In this paper, the design rule of TDMA timeslot with the variable period depending on communication distance was proposed. It was confirmed from the analysis that 72 times communication between gateway and sensor nodes is possible in LoRa network by using the proposed TDMA variable timeslot scheme.

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks (센서 네트워크에서 클러스터 신뢰도 기반 정적 여과 확률 조절 기법)

  • Hur, Suh-Mahn;Seo, Hee-Suk;Lee, Dong-Young;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.161-171
    • /
    • 2010
  • Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.

A MAC Protocol based on Hi.erarchical Virtual Clusters (계층적 가상 클러스터 기반 MAC 프로토콜)

  • Back, Doo-Sung;Pyun, Ki-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.93-102
    • /
    • 2009
  • Environmental monitoring applications measure temporature, humidity, and pollution degrees of large areas periodically and are essential for ubiquitous society. In this paper, we propose a sensor network MAC protocol that is applicable to environmental monitoring applications. The proposing MAC protocol has scalability by constructing multiple groups of sensor nodes as in SMAC protocol. Differently from SMAC protocol, however, ours have hierarchical structure between adjacent groups. Data transmission schedules are efficient since lower groups are synchronized to higher groups. Thus. the end-to-end delays and energy consumption can be reduced due to sequential transmission schedules. But since the nodes within the same group are synchronized to themselves. they have good adaptability and scalability compared to existing hierarchical approaches such as DMAC. We show by simulations that the proposing MAC protocol is superior to SMAC for environmental monitoring applications.

Retransmission with Transmission Quantity Allocation for Energy Harvesting Wireless Sensor Networks

  • Gun-Hee Kim;Ikjune Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.175-182
    • /
    • 2024
  • In wireless sensor networks, batteries limit lifespan, and heavy data transmission around the sink causes the hotspot problem. To address this, data collection amounts are allocated to child nodes to limit transmission. However, this approach has issues with nodes far from the sink having excessive energy and failing to transmit the allocated amount due to data transmission errors. This paper proposes a method to prevent sensor data loss through error recovery via retransmission. The method ensures that each node's retransmission volume stays within its allocated data amount and energy limits, using excess energy for error recovery. Simulations show that this technique effectively recovers data transmission errors, collects data, minimizes energy depletion around the sink, and increases data collection rates.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

An Indoor Localization Algorithm of UWB and INS Fusion based on Hypothesis Testing

  • Long Cheng;Yuanyuan Shi;Chen Cui;Yuqing Zhou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1317-1340
    • /
    • 2024
  • With the rapid development of information technology, people's demands on precise indoor positioning are increasing. Wireless sensor network, as the most commonly used indoor positioning sensor, performs a vital part for precise indoor positioning. However, in indoor positioning, obstacles and other uncontrollable factors make the localization precision not very accurate. Ultra-wide band (UWB) can achieve high precision centimeter-level positioning capability. Inertial navigation system (INS), which is a totally independent system of guidance, has high positioning accuracy. The combination of UWB and INS can not only decrease the impact of non-line-of-sight (NLOS) on localization, but also solve the accumulated error problem of inertial navigation system. In the paper, a fused UWB and INS positioning method is presented. The UWB data is firstly clustered using the Fuzzy C-means (FCM). And the Z hypothesis testing is proposed to determine whether there is a NLOS distance on a link where a beacon node is located. If there is, then the beacon node is removed, and conversely used to localize the mobile node using Least Squares localization. When the number of remaining beacon nodes is less than three, a robust extended Kalman filter with M-estimation would be utilized for localizing mobile nodes. The UWB is merged with the INS data by using the extended Kalman filter to acquire the final location estimate. Simulation and experimental results indicate that the proposed method has superior localization precision in comparison with the current algorithms.