• Title/Summary/Keyword: Wireless Network Management

Search Result 1,168, Processing Time 0.027 seconds

A Design and Implementation of Multimedia Pest Prediction Management System using Wireless Sensor Network (무선 센서 네트워크를 이용한 멀티미디어 병해충 예측 관리 시스템 설계 및 구현)

  • Lim, Eun-Cheon;Shin, Chang-Sun;Sim, Chun-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.27-35
    • /
    • 2007
  • The majority of farm managers growing the garden products in greenhouse concern massively about the diagnosis and prevention of the breeding and extermination for pests. especially, the managing problem for pests turns up as main issue. In the paper, we first build a wireless sensor network with soil and environment sensors such as illumination, temperature and humidity. And then we design and implement multimedia pest predication and management system which is able to predict and manage various pest of garden products in greenhouse. The proposed system can support the database with information about the pests by building up wireless sensor network in greenhouse compared with existing high-priced PLC device as well as collect various environment information from soil, the interior of greenhouse, and the exterior of greenhouse. To verify the good capability of our system, we implemented several GUI interface corresponding desktop. web, and PDA mobile platform based on real greenhouse model. Finally, we can confirm that our system work well prediction and management of pest of garden products in greenhouse based on several platforms.

  • PDF

An Integrated Architecture for Location-Based Mobile Commerce Service in Ubiquitous Environment (유비쿼터스 환경의 위치 기반 모바일 전자상거래 서비스 통합 구조에 관한 연구)

  • Lee, Min-Suk;Lee, Hun-Ll;Lee, Mi-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.97-109
    • /
    • 2005
  • The internet and wireless communication technologies are creating ubiquitous environments in which various services are expected anytime and anywhere. Many hardware facilities have been developed and system structures are suggested for mobile services to realize a ubiquitous computing environment with appropriate quality. But these applications are not designed in the consideration of the general capabilities to perform user's wireless and mobile communication/transaction. Consequently, different needs from users are not sufficiently satisfied yet. In this study, we suggest structure of the emerging network system for mobile commerce that provides users with seamless and ubiquitous environments using location information which exploit context-aware technology.

  • PDF

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Wireless safety monitoring of a water pipeline construction site using LoRa communication

  • Lee, Sahyeon;Gil, Sang-Kyun;Cho, Soojin;Shin, Sung Woo;Sim, Sung-Han
    • Smart Structures and Systems
    • /
    • v.30 no.5
    • /
    • pp.433-446
    • /
    • 2022
  • Despite efforts to reduce unexpected accidents at confined construction sites, choking accidents continue to occur. Because of the poorly ventilated atmosphere, particularly in long, confined underground spaces, workers are subject to dangerous working conditions despite the use of artificial ventilation. Moreover, the traditional monitoring methods of using portable gas detectors place safety inspectors in direct contact with hazardous conditions. In this study, a long-range (LoRa)-based wireless safety monitoring system that features the network organization, fault-tolerant, power management, and a graphical user interface (GUI) was developed for underground construction sites. The LoRa wireless data communication system was adopted to detect hazardous gases and oxygen deficiency within a confined underground space with adjustable communication range and low power consumption. Fault tolerance based on the mapping information of the entire wireless sensor network was particularly implemented to ensure the reliable operation of the monitoring system. Moreover, a sleep mode was implemented for the efficient power management. The GUI was also developed to control the entire safety-monitoring system and to manage the measured data. The developed safety-monitoring system was validated in an indoor testing and at two full-scale water pipeline construction sites.

Data Collection Management for Wireless Sensor Networks Using Drones with Wireless Power Transfer

  • Ikjune Yoon;Dong Kun Noh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.121-128
    • /
    • 2023
  • To increase the lifetime of the network in wireless sensor networks, energy harvesting from the surrounding environment or wireless power transfer is being used. In addition, to reduce the energy imbalance and increase the amount of data gathered, a method using mobile sink nodes that visit sensor nodes to gather data has been used. In this paper, we propose a technique to reduce the load on the relay node and collect a lot of data evenly in this environment. In the proposed scheme, sensor nodes construct Minimum Depth Trees (MDTs) considering the network environment and energy, and allocate the data collection amount. Simulation results show that the proposed technique effectively suppresses energy depletion and collects more data compared to existing techniques.

A Hybrid Key Management Scheme in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 하이브리드 키 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1413-1421
    • /
    • 2011
  • A next generation military communication system called Tactical Information Communication Network(TICN) is designed to advance into large capacity, high speed, and long distance wireless relay transmission. To support mobility in battlefield, the application of Ad-hoc networking technology to its wireless communication is being considered. In Ad-hoc network, the key management technique is very important to ensure the confidentiality, integrity, and authentication. In this paper, we propose a new hybrid key management scheme considering the hierarchical characteristics of the tactical ad-hoc such as TICN. For upper layer with sufficient energy and computation capability, we apply PKI based key management scheme. For lower layer with restricted resources, we propose a new key management scheme using the location-based authentication to ensure the energy efficiency.

Research on Wireless Sensor Network System Design for Safety Management of Marine Structures (선박 및 해양 구조물의 안전 관리를 위한 무선 센서 네트워크 시스템 설계에 관한 연구)

  • Han, Young-Soo;Lee, Kyung-Ho;Choi, Si-Young;Kim, Chung-Hyun
    • Journal of Ocean Engineering and Technology
    • /
    • v.23 no.6
    • /
    • pp.136-145
    • /
    • 2009
  • There are two purposes for the marine structures used for fossil fuel: transporting huge amounts of crude oil and petroleum products and producing petroleum resources on the ocean in an isolated operational environment. Both types of structures are exposed to dangerous situations by sea conditions. Such marine structures are greatly affected by ocean climate conditions and its changes. Because of such ocean climate changes, it has been necessary to monitor marine structures. This research discusses the difficulties with adopting a new methodology based on a ubiquitous sensor network and develops an optimized sensor network management system design for a marine structure.

Common Resource Management and Network Simulator in Heterogeneous Network Environment (다중 네트워크 환경 하에서의 공통 자원 관리 기법 및 네트워크 시뮬레이터 응용)

  • Kim, Jae-Hoon
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.113-126
    • /
    • 2009
  • By the newly emerging network access technology, we face the new heterogeneous network environment. Focusing on the co-existence of multiple access network technology and the complex service needs of users, the wireless service operators should present the stable service quality for every user. For this, the service operators should build the new operation framework which combine the pre-established network and newly adopted one. Our problem is finding the optimal heterogeneous network operation framework. We suggest market-based marginal cost function for evaluating the relative value of resource of each network and develop the whole new heterogeneous network operation framework. To test the applicability of developed operation framework, we build large-scale JAVA simulator. By this development, we can easily test the new network environment in practical engineering field.

Study of Information Maintenance Components in Wireless Network Environment based on Sensors (센서기반 무선 네트워크 환경에서 정보 유지관리에 관한 구성요소 연구)

  • Lee, Hyun-Chang;Xu, Chen-Lin;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2640-2644
    • /
    • 2014
  • With the development of technology, wireless sensor networks (WSN) are wireless networks of consisting a large number of small and low-cost sensors. Wireless sensor networks facilitate collaboration to achieve the perception of information collection, processing and transmission tasks in deployment area. They have various purposes such as military, disaster relief, medical rescue, environmental monitoring, precision farming and manufacturing industry etc. Therefore, technologies for data maintaining technologies in sensor network environment is one of essential parts of sensor networks. In this paper, we present the essential particulars about data management technology at wireless sensor network environments and propound the issues. Further, we could organize and develop a systematic approach in solving the issues.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.