• Title/Summary/Keyword: Wireless Application Protocol

Search Result 333, Processing Time 0.029 seconds

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.

Max-Win based Routing(MWR) Protocol for Maritime Communication Networks with Multiple Wireless Media (다중무선매체 해상통신망을 위한 최대승수기반 경로배정 프로토콜)

  • Son, Joo-Young;Mun, Seong-Mi
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1159-1164
    • /
    • 2010
  • The current maritime data communications mainly depend on radio and satellite which have restrictions on data rate and cost. That leads to needs of novel relatively-high-speed data communication systems at sea just like on land. This paper proposes a routing protocol (MWR) for newly designed model of ship-to-ship communication networks at sea. The MWR protocol finds out an optimal route by selecting an optimal network for each specific application from overlapped networks of available wireless media at sea.

A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜)

  • Kim, Hye Yun;Kim, Seong Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

The Design of Java-based WAP Stack (자바 기반의 WAP 스택 설계)

  • 이준규;김동호;김상경;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.487-489
    • /
    • 2001
  • 인터넷과 무선 이동통신 등이 보편화되면서 두 기술을 접목한 WAP(Wireless Application Protocol)[1]이 등장하였으며, 다수의 사용자 요구를 동시에 효율적으로 처리하면서 다양한 문서 단말기로부터 요청을 신속하게 처리할 수 있는 WAP 게이트웨이(gateway)에 대한 연구가 여러 연구 그룹에서 수행되고 있다. WAP 스택은 이러한 연구 중의 가장 기본적인 기술이다. 본 논문에서는 Java의 기본적인 서비스인 멀티쓰레드를 이용하고, 컨테이너 유효 리소스의 효율적 관리를 위해 접속 풀링(connection pooling) 기능을 적용하여 UDP(User Datagram Protocol)[4], WTP(Wireless Transaction Protocol)[2], WSP(Wireless Session Protocol)[3] 계층을 설계한다. 설계 방법론은 UML(Unified Modeling Language)을 사용한다.

Implementation of the wireless headset using Bluetooth (블루투스를 이용한 무선 헤드셋 구현)

  • 이병로
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1138-1145
    • /
    • 2003
  • The Bluetooth wireless technology is the new short-range RF transmission standard for low-power, low-cost, short-range radio links between mobile devices and electric product. The technology can eliminate the confusion of cables, connectors and protocols confounding communications between devices. Mobile phones, pagers, laptops, PDAs, digital cameras and more, all now have a common structure for communicating across their product platforms. In this paper, we present the Bluetooth protocol stack and headset profiles for the communication between mobile phone and headset. And then, we construct application software which is embedded in the device that operates an application over the Bluetooth protocol stack Next we implement wireless headset using MSP430, not real time operating system.

Design of BACnet/Zigbee Intrated System (BACnet/Zigbee 통합 시스템의 설계)

  • Kim, Se-Hwan;Park, Dong-Kyu;Hong, Seung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.6
    • /
    • pp.1063-1068
    • /
    • 2008
  • BACnet(Building Automation and Control Networks) is a standard data communication protocol specifically designed for building automation and control systems, BACnet provides six options for data link layer protocols and these six data link layer options can be applied with various wired transmission media. Recently wireless technology prevails in automation area. ZigBee is an IEEE 802.15.4 based standard communication protocol for low-rate wireless personal area networks. In this study, we propose a BACnet over ZigBee model that adopts ZigBee communication channel as a wireless data link layer protocol in a BACnet-based communication network system. The technology proposed in this paper can expand the BACnet application using the advantages of wired and wireless integrated network solution.

Energy Efficient Routing Protocol in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율적인 라우팅 프로토콜)

  • 손병락;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.2
    • /
    • pp.65-73
    • /
    • 2004
  • By the progress of communication and hardware technology, It is possible to organize wireless sensor nodes using the tiny sensor in recently. It is a critical aspect to minimize energy consumption for long-term lively sensor because wireless sensor nodes are associated with the available resources. The wireless sensor network is restricted in communication, exhaustion of power, and computation but it is very similar an Ad-Hoc network. Each sensor node products a few data and application layer of each sensor has slow transmitting feature. Unlike Ad-hoc, which is usually source or sink, base station of the each senor nodes works as sink and the other nodes except sink node works as source. Generally, wireless sensor network keep staying fixed state and observing circumstances continuously after setting up. It doesnt fit for the wireless sensor networks under functioning of existing ad-hoc networks because original Ad-Hoc network routing protocol couldnt operate for wireless sensor network features. This thesis propose the effective routing protocol way in the filed of the expanded routing protocol based on tree with considering on the characteristic of wireless sensor networks pattern.

  • PDF

TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network

  • Yang, Yuan;Zhen, Fu;Lee, Tae-Seok;Park, Myong-Soon
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.39-43
    • /
    • 2006
  • In this paper, we proposed TASL-MAC, a medium-access control (MAC) protocol for wireless sensor networks. In wireless sensor networks, sensor nodes are usually deployed in a special environment, are assigned with long-term work, and are supported by a limited battery. As such, reducing the energy consumption becomes the primary concern with regard to wireless sensor networks. At the same time, reducing the latency in multi-hop data transmission is also very important. In the existing research, sensor nodes are expected to be switched to the sleep mode in order to reduce energy consumption. However, the existing proposals tended to assign the sensors with a fixed Sleep/Listening schedule, which causes unnecessary idle listening problems and conspicuous transmission latency due to the diversity of the traffic-load in the network. TASL-MAC is designed to dynamically adjust the duty listening time based on traffic load. This protocol enables the node with a proper data transfer rate to satisfy the application's requirements. Meanwhile, it can lead to much greater power efficiency by prolonging the nodes' sleeping time when the traffic. We evaluate our implementation of TASL-MAC in NS-2. The evaluation result indicates that our proposal could explicitly reduce packet delivery latency, and that it could also significantly prolong the lifetime of the entire network when traffic is low.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.