• Title/Summary/Keyword: Sensor nodes

Search Result 2,025, Processing Time 0.028 seconds

Autonomous smart sensor nodes for global and local damage detection of prestressed concrete bridges based on accelerations and impedance measurements

  • Park, Jae-Hyung;Kim, Jeong-Tae;Hong, Dong-Soo;Mascarenas, David;Lynch, Jerome Peter
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.711-730
    • /
    • 2010
  • This study presents the design of autonomous smart sensor nodes for damage monitoring of tendons and girders in prestressed concrete (PSC) bridges. To achieve the objective, the following approaches are implemented. Firstly, acceleration-based and impedance-based smart sensor nodes are designed for global and local structural health monitoring (SHM). Secondly, global and local SHM methods which are suitable for damage monitoring of tendons and girders in PSC bridges are selected to alarm damage occurrence, to locate damage and to estimate severity of damage. Thirdly, an autonomous SHM scheme is designed for PSC bridges by implementing the selected SHM methods. Operation logics of the SHM methods are programmed based on the concept of the decentralized sensor network. Finally, the performance of the proposed system is experimentally evaluated for a lab-scaled PSC girder model for which a set of damage scenarios are experimentally monitored by the developed smart sensor nodes.

Research Directions for Efficient Query Processing over Sensor Data Streams (센서 데이터 스트림 환경에서 효율적인 질의처리 연구방향)

  • An, Dong-Chan
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.199-204
    • /
    • 2006
  • The sensor network is a wireless network of the sensor nodes which sensing, computation and communication ability. Each sensor nodes create the data items by sensor nodes above one. Like this feature, the sensor network is similar to distributed data base system. The sensor node of the sensor network is restricted from the power and the memory resources is the biggest weak point and is becoming the important research object. In this paper, We try to see efficient sensor data stream management method and efficient query processing method under the restricted sensor network environment.

  • PDF

A Remote Firmware Update Mechanism for a TDMA-based Bidirectional Linear Wireless Sensor Network (양방향 통신을 지원하는 시분할 기반 선형 무선 센서 네트워크를 위한 원격 펌웨어 업데이트 방법)

  • Moon, Jung-Ho;Kim, Dae-Il;Park, Lae-Jeong;Lee, Hyung-Bong;Chung, Tae-Yoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.8
    • /
    • pp.867-875
    • /
    • 2009
  • A wireless sensor network inherently comprises a plurality of sensor nodes widely deployed for sensing environmental information. To add new functions or to correct some faulty functions of an existing wireless sensor network, the firmware for each sensor node needs to be updated. Firmware update would be quite troublesome if it requires the gathering, reprogramming, and redeploy of all of already deployed sensor nodes. Over-the-air programming (OTA) facilitates the firmware update process, thereby allowing convenient maintenance of an already-deployed sensor network. This paper proposes and implements a remote firmware update mechanism for a TDMA-based wireless sensor network, in which the firmware for sensor nodes constituting the TDMA-based sensor network can be easily updated and the update process can be conveniently monitored from a remote site. We verify the validity of the proposed firmware update method via experiments and introduce three wireless sensor networks installed in outdoor sites in which the proposed firmware update mechanism has been exploited.

An u-healthcare system using an wireless sensor node with ECG analysis function by QRS-complex detection (QRS검출에 의한 ECG분석 기능을 갖춘 무선센서노드를 활용한 u-헬스케어 시스템)

  • Lee, Dae-Seok;Bhardwaj, Sachin;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.361-368
    • /
    • 2007
  • Small size real-time ECG signal analysis function by QRS-complex detection was put into sensor nodes. Wireless sensor nodes attached on the patient’s body transmit ECG data continuously in normal u-healthcare system. So there are heavy communication traffics between sensor nodes and gateways. New developed platform for real-time analysis of ECG signals on sensor node can be used as an advanced diagnosis and alarming system for healthcare. Sensor node does not need to transmit ECG data all the time in wireless sensor network and to server PC via gateway. When sensor node detects suspicion or abnormality in ECG, then the ECG data in the network was transmitted to the server PC for further powerful analysis. This system can reduce data packet overload and save some power in wireless sensor network. It can also increase the server performance.

Topology Change Algorithms based on Fluid Flow and Flock Dispersion for Energy-Harvesting Mobile Sensor Networks (에너지 수확 모바일 센서 망을 위한 유체 흐름 및 군집 분산 기반 토폴로지 변환 알고리즘)

  • So, Wonho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.98-106
    • /
    • 2013
  • The duty-cycle synchronization among mobile sensor nodes with energy-harvesting is very important. The nodes should keep their duty-cycle same to others as much as possible because they have to cooperate each other and to consume energy efficiently. The distribution of node position in network affects not only node connectivity but also the active time of synchronized nodes, and it relates to network life-time finally. In this paper, we introduce a network topology change algorithm (TCA) for energy-harvesting mobile sensor networks based on self-synchronized duty-cycling. The algorithm tries to change a network topology into a balanced topology where the mobile sensor nodes are unified according to the density of the number of nodes. For TCA, both fluid flow algorithm and flock dispersion algorithm are proposed and they are evaluated through the simulation in agent based modeling language. TCA is applied to the energy-harvesting mobile sensor networks to improve the synchronization of duty-cycle and to reduce the variation of energy consumption among nodes.

Optimization Routing Protocol based on the Location, and Distance information of Sensor Nodes (센서 노드의 위치와 거리 정보를 기반으로 전송 경로를 최적화하는 라우팅 프로토콜)

  • Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.127-133
    • /
    • 2015
  • In order for location information to deliver the collected information, it needs Sensor Nodes in an environment of Sensor Network. Each sensor sends data to a base station through the process of routing in a wireless sensor network environment. Therefore, Offering accurate location information is very important in a wireless sensor network environment. Most of existed routing methods save all the informations of nodes at the area of 1-hop. In order to save these informations, unnecessary wasted energy and traffics are generated. Routing Protocol proposed in this paper doesn't save node's location information, and doesn't exchange any periodic location information to reduce wasted energy. It includes transmission range of source nodes and nodes with the location information, however it doesn't include any nodes' routing near 1-hope distance.

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Design and Evaluation of Wireless Sensor Node Application for u-Healthcare (u-헬스케어를 위한 무선센서노드 어플리케이션 구현 및 성능 평가)

  • Lee, Dae-Seok;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.518-521
    • /
    • 2007
  • The functional wireless sensor node for u-healthcare application was developed. The developed sensor node can check the abnormality of ECG in some simple software in ROM of microprocess in the sensor node. The ECG signal is one of very important health signal form human body, and wavelike signal which is sampled as a sampling frequency between 100 and 400 Hz for digitalization, so the wireless data dor ECG signal is some heavy in Zigbee communication. Thus the sensor send the ECG signal to other sensor nodes or base station when it find abnormality in ECG signal is key technology to reduce the traffic between sensor nodes in wireless sensor network for u-healthcare, The sensor node does not need to transmit ECG data all time in wireless sensor network and to server. Using these sensor nodes, the healthcare system can dramatically reduce wireless data packet overload, the power consumption of battery in the sensor nodes and thus increase the reliability of the wireless system.

  • PDF

A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks

  • Shon, Tae-Shik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.597-611
    • /
    • 2009
  • With the advent of ubiquitous computing society, many advanced technologies have enabled wireless sensor networks which consist of small sensor nodes. However, the sensor nodes have limited computing resources such as small size memory, low battery life, short transmission range, and low computational capabilities. Thus, decreasing energy consumption is one of the most significant issues in wireless sensor networks. In addition, numerous applications for wireless sensor networks are recently spreading to various fields (health-care, surveillance, location tracking, unmanned monitoring, nuclear reactor control, crop harvesting control, u-city, building automation etc.). For many of them, supporting security functionalities is an indispensable feature. Especially in case wireless sensor networks should provide a sufficient variety of security functions, sensor nodes are required to have more powerful performance and more energy demanding features. In other words, simultaneously providing security features and saving energy faces a trade-off problem. This paper presents a novel energy-efficient security architecture in an IEEE 802.15.4-based wireless sensor network called the Hybrid Adaptive Security (HAS) framework in order to resolve the trade off issue between security and energy. Moreover, we present a performance analysis based on the experimental results and a real implementation model in order to verify the proposed approach.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.