• Title/Summary/Keyword: Sensor nodes

Search Result 2,025, Processing Time 0.035 seconds

A Proposed Scheme for Channel and Timeslot Co-Scheduling Data Aggregation in MWSNs: An Algorithm Design (MWSN에서 채널 및 타임 슬롯 공동 스케줄링 데이터 집계를 위한 제안 계획 : 알고리즘 설계)

  • Vo, Vi Van;Kim, Moonseong;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2020.05a
    • /
    • pp.44-46
    • /
    • 2020
  • Aggregating data with an optimal delay, which is a critical problem in Wireless Sensor Networks applications, is proven as NP-hard. In this paper, we focus on optimizing the aggregation delay by presenting an idea for channel and timeslot co-scheduling data aggregation in MWSNs. The proposed scheme, which names Break and Join, maximizes the number of sensor nodes to be scheduled in a working period, so that the overall number of working periods and data collection delay are reduced.

Efficient Security Mechanism using Light-weight Data Origin Authentication in Sensor Networks (경량화 데이터 origin 인증을 통한 효율적인 센서 네트워크 보안에 관한 연구)

  • Park, Min-Ho;Lee, Chung-Keun;Son, Ju-Hyung;Seo, Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.717-723
    • /
    • 2007
  • There are many weaknesses in sensor networks due to hardware limitation of sensor nodes besides the vulnerabilities of a wireless channel. In order to provide sensor networks with security, we should find out the approaches different from ones in existing wireless networks; the security mechanism in sensor network should be light-weighted and not degrade network performance. Sowe proposed a novel data origin authentication satisfying both of being light-weighted and maintaining network performance by using Unique Random Sequence Code. This scheme uses a challenge-response authentication consisting of a query code and a response code. In this paper, we show how to make a Unique Random Sequence Code and how to use it for data origin authentication.

Target Path Detection Algorithm Using Activation Time Lag of PDR Sensors Based on USN (USN기반 PDR 센서의 검출 시간차를 이용한 표적 경로 검출 알고리즘)

  • Lee, Jaeil;Lee, Chong Hyun;Bae, Jinho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.179-186
    • /
    • 2015
  • This paper proposes the target path detection algorithm using statistical characteristics of an activated time lag along a moving path of target from a neighboring sensor in PDR(Pulse Doppler Radar) sensor node environment based on USN(Ubiquitous Sensor Network) with a limitation detecting only an existence of moving target. In the proposed algorithm, detection and non-detection time lag obtained from the experimental data are used. The experimental data are through repetitive action of each 500 times about three path scenarios such as passing in between two sensors, moving parallel to two sensors, and turning through two sensors. From this experiments, error detection percentages of three path scenarios are 5.67%, 5.83%, and 7.17%, respectively. They show that the proposed algorithm can exactly detect a target path using the limited PDR sensor nodes.

A Low-Energy Ultra-Wideband Internet-of-Things Radio System for Multi-Standard Smart-Home Energy Management

  • Khajenasiri, Iman;Zhu, Peng;Verhelst, Marian;Gielen, Georges
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.5
    • /
    • pp.354-365
    • /
    • 2015
  • This work presents an Internet of Things (IoT) system for home energy management based on a custom-designed Impulse Radio Ultra-Wideband (IR-UWB) transceiver that targets a generic and multi-standard control system. This control system enables the interoperability of heterogeneous devices: it integrates various sensor nodes based on ZigBee, EnOcean and UWB in the same middleware by utilizing an ad-hoc layer as an interface between the hardware and software. The paper presents as a first the design of the IR-UWB transceiver for a portable sensor node integrated with the middleware layer, and also describes the receiver connected to the control system. The custom-designed low-power transmitter on the sensor node is fabricated with 130 nm CMOS technology. It generates a signal with a 1.1 ns pulse width while consuming $39{\mu}W$ at 1 Mbps. The UWB sensor node with a temperature measurement capability consumes 5.31 mW, which is lower than the power level of state-of-the-art solutions for smart-home applications. The UWB hardware and software layers necessary to interface with the control system are verified in over-the-air measurements in an actual office environment. With the implementation of the presented sensor node and its integration in the energy management system, we demonstrate achievement of the broad flexibility demanded for IoT.

A Strong Anonymity Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 강한 익명성 지원 구조)

  • Lee, Jung-Hyun;Kim, Tae-Yeon;Cho, Gi-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.139-148
    • /
    • 2010
  • In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.

A Study of Intrusion Detection Scheme based on Software-Defined Networking in Wireless Sensor Networks (무선 센서 네트워크에서 소프트웨어 정의 네트워킹 기법을 사용한 침입 탐지 기법에 대한 연구)

  • Kang, Yong-Hyeog;Kim, Moon Jeong;Han, Moonseog
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.51-57
    • /
    • 2017
  • A wireless sensor network is composed of many resource constrained sensor nodes. These networks are attacked by malicious attacks like DDoS and routing attacks. In this paper, we propose the intrusion detection and prevention system using convergence of software-defined networking and security technology in wireless sensor networks. Our proposed scheme detects various intrusions in a central server by accumulating log messages of OpenFlow switch through SDN controller and prevents the intrusions by configuring OpenFlow switch. In order to validate our proposed scheme, we show it can detect and prevent some malicious attacks in wireless sensor networks.

Development of Real Time Monitoring System based on Context-awareness for Wireless Sensor Networks (무선 센서네트워크에서 상황인식기반 실시간 감시시스템 개발)

  • Jo, Kyoung-Jin;Kim, Hee-Dae;Lee, Hyun-Jo;Sim, Chun-Bo;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.101-111
    • /
    • 2011
  • Due to recent development in wireless communication technologies and mobile information devices, the services on ubiquitous computing technology without time and place restriction have been spotlighted. Moreover, the interest of the Wireless Sensor Networks (WSNs) and context-awareness technologies have largely been escalating and their technologies utilization is active in the various applications such as healthcare, farm management and so on. However, the direct adaption of the existing context-awareness technique to the WSN technology has several drawbacks as follows. First, such systems waste precious energy of sensor nodes, due to unnecessary data transmissions. Secondly, since the existing work was designed to support only specific applications, it is required to implement a new context-awareness application for a specific purpose. Therefore, we, in this paper, propose a new real-time monitoring system based on context-awareness in WSNs. Our system not only enhances energy efficiency by reducing data transmissions by doing context-awareness on a sensor node, but also is scalable in terms of supporting new context-awareness functionalities through modularization.

Efficient Security Mechanism using Light-weight Data Origin Authentication in Sensor Networks (경량화 데이터 Origin 인증을 통한 효율적인 센서 네트워크 보안에 관한 연구)

  • Park, Min-Ho;Lee, Chung-Keun;Son, Ju-Hyung;Seo, Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.402-408
    • /
    • 2007
  • There are many weaknesses in sensor networks due to hardware limitation of sensor nodes besides the vulnerabilities of a wireless channel. In order to provide sensor networks with security, we should find out the approaches different from ones in existing wireless networks; the security mechanism in sensor network should be light-weighted and not degrade network performance. Sowe proposed a novel data origin authentication satisfying both of being light-weighted and maintaining network performance by using Unique Random Sequence Code. This scheme uses a challenge-response authentication consisting of a query code and a response code. In this paper, we show how to make a Unique Random Sequence Code and how to use it for data origin authentication.

VRML Database Access for 3D Real-time Data Visualization in MiWiTM Thermal Wireless Sensor Network (마이와이 표준의 열 센서망의 3차원 실시간 자료 시각화를 위한 가상 현실 모델링 언어 데이터베이스 액세스)

  • Wan, Xue-Fen;Yang, Yi;Cui, Jian;Zheng, Tao;Ma, Li
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.164-170
    • /
    • 2012
  • A Virtual Reality Modeling Language (VRML) database access in remote virtual reality control platform for dyeing enterprise $MiWi^{TM}$ thermal sensor network is presented in this paper. The VRML-ASP framework is introduced for 3D real-time data plotting in this application. The activities of thermal sensor nodes and sensor area are analyzed. The database access framework is optimized for $MiWi^{TM}$ wireless sensor networks. The experimental results show that VRML-ASP database access framework could be a reliable and competitive data-manage candidate for targeted virtual reality remote industrial visualization application.

Active Rule System Based on User's Emotional Margin for Power Saving Control (절전제어를 위한 사용자 감성마진 적용 능동규칙시스템)

  • Lee, Yonsik;Jang, Minseok;Kang, Sunkyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.119-124
    • /
    • 2014
  • In this paper, we propose the active rule system applying with emotional margin for power saving control. The proposed system in this paper is a part of the system which derives smart power saving by adjusting the illuminance using active rules within compromising the user's emotion. For this, we set the specific range of standard illuminance and the lower bound of user's emotional margin of illuminance based on measurements and analysis, and use these data in design of active rules. And then, we design and implement the active rule system using mobile agent. The mobile agent in the proposed system migrates to the destination sensor nodes, acquires and transmits sensor data according to the purpose and needs through the active rules, and directly executes the actions corresponding to the optional events(changed sensor data and/or time etc.). And then, we show the potential applicability of the proposed active rule system in various active sensor network applications through the interaction with the rule base and mobile sensor network middleware system.