• Title/Summary/Keyword: Sensor nodes

Search Result 2,025, Processing Time 0.034 seconds

Design and Implement a Gateway Based on Mobile Device and a Web Monitoring System for u-Healthcare Service (u-Healthcare 서비스를 위한 모바일 장치 기반 게이트웨이 및 웹 모니터링 시스템 설계 및 구현)

  • Kim, Ji-Hoon;Lee, Chae-Woo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.3
    • /
    • pp.126-133
    • /
    • 2009
  • There are already many researches providing u-Healthcare service, but they have left problems to be improved. First of all, the transmission range between sensor nodes and the gateway are restricted. Hence, patients feel uncomfortable because of they need to possess or locate closed to a gateway all the time when they aggregates their medical data. Also, the existing systems have not considered life environment that is important to analyze patient's diseases. Moreover, a guardian need to located close to patient or possess a mobile device that monitors a patients' status in real time when they are in outdoor. In this research, we present multi-hop packet transfer algorithm and compilation of life environment which help improve the problem of the existing researches. Likewise, we designed and implemented a medical information database and a real-time web monitoring system that manage patients' personal history and monitor a patients' status in real time. In this paper, we design and implement the u-Healthcare system based on mobile environment and we present a result when we tested our u-Healthcare system in scenario environment.

  • PDF

Indoor Localization in Wireless Sensor Network using LVQ (LVQ를 이용한 무선 센서 네트워크의 실내 위치 인식)

  • Park, Jin-Woo;Jung, Kyung-Kwon;Eom, Ki-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1295-1302
    • /
    • 2010
  • This paper proposed indoor location recognition method based on RSSI(received signal strength indication) using the LVQ network. In order to verify the effectiveness of the proposed method, we performed experiments, and then compared to the conventional triangularity measurement method. In the experiments, we set up the system to the laboratory, divided the 40 section, and installed 6 nodes as a reference node. We obtained the log-normal path loss model of wireless channels, RSSI converted into the distance. The distance values used as the input of LVQ. To learn the LVQ network, we set the target values as section indices. In the experiments, we determined the optimal number of subclass, and confirmed that the success rate of training phase was 96%, test phase was 91%.

Design of an Embedded System for Monitoring Devices of Elders Living Alone (독거노인 모니터링 디바이스를 위한 임베디드 시스템 설계)

  • Moon, Sang-Ook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.833-835
    • /
    • 2010
  • The SPARTAN-3E development kit is equipped with an FPGA which holds 500 thousand logic gates and a bus system platform using MicroBlaze microprocessor system. This kind of embedded systems can be used to gather information from sensor nodes and send over to the main server periodically through the network gateway, using the microprocessor-based embedded system, so that edlers living alone under sensor coverage can send their moving information and can be applied to get help in the event of emergency situations. In this paper, we designed a simple embedded system based on a CPU and flash memories using such FPGAs which can be used to monitor those elderlies living alone. The developed hardware system can be directly combined with the web-based elders-living-alone monitoring system, making the system more efficient.

  • PDF

Design and Implementation of the Gateway Node for the Localization of the Mobile Object in Wireless Sensor Network (무선 센서 네트워크에서 이동 객체의 위치인식을 위한 게이트웨이 노드설계 및 구현)

  • Lee, Joa-Hyoung;Park, Chong-Myung;Jo, Young-Tae;Kwon, Young-Wan;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.7
    • /
    • pp.1314-1320
    • /
    • 2008
  • Recently, LBS(Location Based Service) which provides useful service based on the location of objects or human has drawn the attention of the research community. To provide LBS, many researchers have proposed many localization systems such as Cricket or Ubisense, however, these systems have the limit that it is very hard to perform the complicated computation on these systems because these systems consist of sensor nodes which have very limited computing power. In the paper, we propose a new localization system with the gateway node which has very high computing power and resource which is suitable for the complicated computation needed for localization.

A Node Activation Protocol using Priority-Adaptive Channel Access Scheduling for Wireless Sensor Networks (무선 센서 네트워크를 위한 적응적 우선순위 채널 접근 스케쥴링을 이용한 노드 활성화 프로토콜)

  • Nam, Jaehyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.469-472
    • /
    • 2014
  • S-MAC is hybrids of CSMA and TDMA approaches that use local sleep-wake schedules to coordinate packet exchanges and reduce idle listening. In this method, all the nodes are considered with equal priority which may lead to increased delay during heavy traffic. The method introduced in this paper provides high throughput and small end-to-end delay suitable for applications such as real-time voice streaming and its functionality is independent of underlying synchronization protocol. The novel idea behind our scheme is that it uses the priority concept with (m,k)-firm scheduling in order to achieve its objectives. The performance of our scheme is obtained through simulations for various packet sizes, traffic loads which show significant improvements in packet delivery ratio, and delay compared to existing protocols.

  • PDF

Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN

  • S.Suganthi;D.Usha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.159-167
    • /
    • 2023
  • Objective: • To detect black hole and warm hole attacks in wireless sensor networks. • To give a solution for energy depletion and security breach in wireless sensor networks. • To address the security problem using strategic decision support system. Methods: The proposed stackelberg game is used to make the spirited relations between multi leaders and multi followers. In this game, all cluster heads are acts as leaders, whereas agent nodes are acts as followers. The game is initially modeled as Quadratic Programming and also use backtracking search optimization algorithm for getting threshold value to determine the optimal strategies of both defender and attacker. Findings: To find optimal payoffs of multi leaders and multi followers are based on their utility functions. The attacks are easily detected based on some defined rules and optimum results of the game. Finally, the simulations are executed in matlab and the impacts of detection of black hole and warm hole attacks are also presented in this paper. Novelty: The novelty of this study is to considering the stackelberg game with backtracking search optimization algorithm (BSOA). BSOA is based on iterative process which tries to minimize the objective function. Thus we obtain the better optimization results than the earlier approaches.

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF

Novel Design of 8T Ternary SRAM for Low Power Sensor System

  • Jihyeong Yun;Sunmean Kim
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.3
    • /
    • pp.152-157
    • /
    • 2024
  • In this study, we propose a novel 8T ternary SRAM that can process three logic values (0, 1, and 2) with only two additional transistors, compared with the conventional 6T binary SRAM. The circuit structure consists of positive and negative ternary inverters (PTI and NTI, respectively) with carbon-nanotube field-effect transistors, replacing conventional cross-coupled inverters. In logic '0' or '2,' the proposed SRAM cell operates the same way as conventional binary SRAM. For logic '1,' it works differently as storage nodes on each side retain voltages of VDD/2 and VDD, respectively, using the subthreshold current of two additional transistors. By applying the ternary system, the data capacity increases exponentially as the number of cells increases compared with the 6T binary SRAM, and the proposed design has an 18.87% data density improvement. In addition, the Synopsys HSPICE simulation validates the reduction in static power consumption by 71.4% in the array system. In addition, the static noise margins are above 222 mV, ensuring the stability of the cell operation when VDD is set to 0.9 V.

Radio-disjoint Multipath Routing with Dynamic Guard-band Shifting in Wireless Sensor Networks

  • Sangdae Kim;Kyong Hoon Kim;Cheonyong Kim;Tae-Eung Sung;Ki-Il Kim
    • Journal of Internet Technology
    • /
    • v.21 no.4
    • /
    • pp.977-988
    • /
    • 2020
  • A guard-band is used to prevent collision between paths in multipath routing protocols. However, problems such as traffic congestion, reduced lifetime, and void occurrence arise because existing protocols do not exploit the guard-band during packet transmission, but only transfer packets on the same path. To solve these problems, we propose radio-disjoint multipath routing that consists of guard-band shifting and balanced node selection. The proposed scheme transfers a packet on the constructed path and alternatively, into the guard-band area. In addition, the intermediate node is selected according to link quality and remaining energy, so all of the nodes involving packet transmission can be exploited equally. Through a performance evaluation, we demonstrate that the proposed scheme achieves a higher packet delivery ratio and prolongs the average network lifetime by at least 31% and up to approximately 99% compared with existing routing protocols, under the condition of a 90% link success ratio.

A MAC Protocol for Efficient Burst Data Transmission in Multihop Wireless Sensor Networks (멀티홉 무선 센서 네트워크에서 버스트 데이타의 효율적인 전송을 위한 프로토콜에 관한 연구)

  • Roh, Tae-Ho;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.192-206
    • /
    • 2008
  • Multihop is the main communication style for wireless sensor networks composed of tiny sensor nodes. Until now, most applications have treated the periodic small sized sensing data. Recently, the burst traffic with the transient and continuous nature is increasingly introduced due to the advent of wireless multimedia sensor networks. Therefore, the efficient communication protocol to support this trend is required. In this paper, we propose a novel PIGAB(Packet Interval Gap based on Adaptive Backoff) protocol to efficiently transmit the burst data in multihop wireless sensor networks. The contention-based PIGAB protocol consists of the PIG(Packet Interval Gap) control algorithm in the source node and the MF(MAC-level Forwarding) algorithm in the relay node. The PIGAB is on basis of the newly proposed AB(Adaptive Backoff), CAB(Collision Avoidance Backoff), and UB(Uniform Backoff). These innovative algorithms and schemes can achieve the performance of network by adjusting the gap of every packet interval, recognizing the packet transmission of the hidden node. Through the simulations and experiments, we identify that the proposed PIGAB protocol considerably has the stable throughput and low latency in transmitting the burst data in multihop wireless sensor networks.