• Title/Summary/Keyword: Wireless sensors networks

Search Result 427, Processing Time 0.032 seconds

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

A Study on SSDP protocol based IoT / IoL Device Discovery Algorithm for Energy Harvesting Interworking Smart Home

  • Lee, Jonghyeok;Han, Jungdo;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.7-12
    • /
    • 2018
  • The spread of IoT (Internet of Things) technology that connects objects based on wired / wireless networks is accelerating, and IoT-based smart home technology that constitutes a super connected network connecting sensors and home appliances existing inside and outside the home is getting popular. In addition, demand for alternative energy technologies such as photovoltaic power generation is rapidly increasing due to rapid increase of consumption of energy resources. Recently, small solar power systems for general households as well as large solar power systems for installation in large buildings are being introduced, but they are effectively implemented due to limitations of small solar panels and lack of power management technology. In this paper, we have studied smart home structure and IoT / IoL device discovery algorithm for energy harvesting system based on photovoltaic power generation, It is possible to construct an efficient smart home system for device control.

Context-Aware Reasoning System for Personalized u-City Services (맞춤형 u-City 서비스 제공을 위한 상황인지 추론 시스템)

  • Lee, Chang-Hun;Kim, Ji-Ho;Song, Oh-Young
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.109-116
    • /
    • 2009
  • Recently, there are many researches to realize context-awareness service that recognizes surrounding environments as context and provide the citizens with pervasive convenience based on ubiquitous computing technology. In the u-City, various sensors collect information as context, and citizens will receive various context-awareness service, making use of their wireless and mobile devices and the infrastructures of the u-City. We designed ontology that is useful to structure information of sensor or device that is linked to networks and use OWL (Web Ontology Language) that can express information of mutual relation and partial situation. And we propose a context-aware reasoning system for personalized u-City services based on collected context information and user's intention.

Energy Efficient Resource Allocation with Energy Harvesting in Cognitive Radio Networks (인지 라디오 네트워크에서 에너지 하베스팅을 고려한 에너지 효율적 자원 할당 방안)

  • Lee, Kisong;Lee, Woongsup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1255-1261
    • /
    • 2016
  • Recently, the energy harvesting technology in which energy is collected from the wireless signal which is transmitted by mobile communication devices, has been considered as a novel way to improve the life time of wireless sensors by mitigating the lack of power supply problem. In this paper, we consider the optimal sensing time and power allocation problem for cognitive radio systems, where the energy efficiency of secondary user is maximized while the constraint are satisfied, using the optimization technique. Based on the derived optimal solutions, we also have proposed an iterative resource allocation algorithm in which the optimal power and sensing time allocation can be found without excessive computations. The simulation results confirm that the proposed scheme achieves the optimal performance and it outperforms the conventional resource allocation schemes in terms of energy efficiency while the constraints are guaranteed to be satisfied.

User Context Recognition Based on Indoor and Outdoor Location and Development of User Interface for Visualization (실내 및 실외 위치 기반 사용자 상황인식과 시각화를 위한 사용자 인터페이스 개발)

  • Noh, Hyun-Yong;Oh, Sae-Won;Lee, Jin-Hyung;Park, Chang-Hyun;Hwang, Keum-Sung;Cho, Sung-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.84-89
    • /
    • 2009
  • Personal mobile devices such as mobile phone, PMP and MP3 player have advanced incredibly. Such advance in mobile technology ignites the research related to the life-log to understand the daily life of an user. Since life-log collected by mobile sensors can aid memory of the user, many researches have been conducted. This paper suggests a methodology for user-context recognition and visualization based on the outdoor location by GPS as well as indoor location by wireless-lan. When the GPS sensor does not work well in an indoor location, wireless-lan plays a major role in recognizing the location of an user so that the recognition of user-context become more accurate. In this paper, we have also developed the method for visualization of the life-log based on map and blog interfaces. In the experiments, subjects have collected real data with mobile devices and we have evaluated the performance of the proposed visualization and context recognition method based on the data.

  • PDF

CDASA-CSMA/CA: Contention Differentiated Adaptive Slot Allocation CSMA-CA for Heterogeneous Data in Wireless Body Area Networks

  • Ullah, Fasee;Abdullah, Abdul Hanan;Abdul-Salaam, Gaddafi;Arshad, Marina Md;Masud, Farhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5835-5854
    • /
    • 2017
  • The implementation of IEEE 802.15.6 in Wireless Body Area Network (WBAN) is contention based. Meanwhile, IEEE 802.15.4 MAC provides limited 16 channels in the Superframe structure, making it unfit for N heterogeneous nature of patient's data. Also, the Beacon-enabled Carrier-Sense Multiple Access/Collision-Avoidance (CSMA/CA) scheduling access scheme in WBAN, allocates Contention-free Period (CAP) channels to emergency and non-emergency Biomedical Sensors (BMSs) using contention mechanism, increasing repetition in rounds. This reduces performance of the MAC protocol causing higher data collisions and delay, low data reliability, BMSs packet retransmissions and increased energy consumption. Moreover, it has no traffic differentiation method. This paper proposes a Low-delay Traffic-Aware Medium Access Control (LTA-MAC) protocol to provide sufficient channels with a higher bandwidth, and allocates them individually to non-emergency and emergency data. Also, a Contention Differentiated Adaptive Slot Allocation CSMA-CA (CDASA-CSMA/CA) for scheduling access scheme is proposed to reduce repetition in rounds, and assists in channels allocation to BMSs. Furthermore, an On-demand (OD) slot in the LTA-MAC to resolve the patient's data drops in the CSMA/CA scheme due to exceeding of threshold values in contentions is introduced. Simulation results demonstrate advantages of the proposed schemes over the IEEE 802.15.4 MAC and CSMA/CA scheme in terms of success rate, packet delivery delay, and energy consumption.

An Energy-Efficient Clustering Design Apply Security Method in Ubiquitous Sensor Networks (USN에서 보안을 적용한 에너지 효율적 클러스터링 설계)

  • Nam, Do-Hyun;Min, Hong-Ki
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.205-212
    • /
    • 2007
  • The ubiquitous sensor network consists of micro sensors with wireless communication capabilities. Compared to wired communication, wireless communication is more subject to eavesdropping as well as data variation and manipulation. Accordingly, there must be efforts to secure the information delivered over the sensor network. Providing security to the sensor network, however, requires additional energy consumption, which is an important issue since energy transformation is difficult to implement in a sensor network. This paper proposes a routing mechanism based on the energy-efficient cluster that features security functions capable of safely processing the data acquired from the sensor network. The proposed algorithm reduces energy consumption by fixing the clusters formed at the initial stage and using the pre-distribution scheme so that the cluster and node keys generated and exchanged at the initial stage are not re-generated or re-exchanged. Simulation experiments confirmed that the proposed approach reduces energy consumption compared to implementing security measures to the conventional cluster-based routing mechanism.

  • PDF

Clustering Algorithm for Extending Lifetime of Wireless Sensor Networks (무선 센서 네트워크의 수명연장을 위한 클러스터링 알고리즘)

  • Kim, Sun-Chol;Choi, Seung-Kwon;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.4
    • /
    • pp.77-85
    • /
    • 2015
  • Recently, wireless sensor network(WSN) have been used in various fields to implement ubiquitous computing environment. WSN uses small, low cost and low power sensors in order to collect information from the sensor field. This paper proposes a clustering algorithm for energy efficiency of sensor nodes. The proposed algorithm is based on conventional LEACH, the representative clustering protocol for WSN and it prolongs network and nodes life time using sleep technique and changable transmission mode. The nodes of the proposed algorithm first calculate their clustering participation value based on the distance to the neighbor nodes. The nodes located in high density area will have clustering participation value and it can turn to sleep mode. Besides, proposed algorithm can change transmission method from conventional single-hop transmission to multi-hop transmission according to the energy level of cluster head. Simulation results show that the proposed clustering algorithm outperforms conventional LEACH, especially non-uniformly deployed network.

Reliability Verification of Secured V2X Communication for Cooperative Automated Driving (자율협력주행을 위한 V2X 보안통신의 신뢰성 검증)

  • Jung, Han-gyun;Lim, Ki-taeg;Shin, Dae-kyo;Yoon, Sang-hun;Jin, Seong-keun;Jang, Soo-hyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.391-399
    • /
    • 2018
  • V2X communication is a technology in which a vehicle exchanges information with various entities such as other vehicles, infrastructure, networks, pedestrians, etc. through a wired or wireless network. Recently, V2X communication technology has been steadily developed and recently it has played an important role in autonomous cooperation driving technology combined with autonomous vehicle technology. Autonomous vehicles can utilize the external information received via V2X communication to extend the recognition range of existing sensors and to support more safe and natural autonomous driving. In order to operate these autonomous cooperative vehicles on public roads, the security and reliability of autonomous V2X communication should be verified in advance. In this paper, we present test scenarios and test procedures of secure V2X communication for cooperative automated driving and present verification results.

Implementation of a Wireless Distributed Sensor Network Using Data Fusion Kalman-Consensus Filer (정보 융합 칼만-Consensus 필터를 이용한 분산 센서 네트워크 구현)

  • Song, Jae-Min;Ha, Chan-Sung;Whang, Ji-Hong;Kim, Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.4
    • /
    • pp.243-248
    • /
    • 2013
  • In wireless sensor networks, consensus algorithms for dynamic systems may flexibly usable for their data fusion of a sensor network. In this paper, a distributed data fusion filter is implemented using an average consensus based on distributed sensor data, which is composed of some sensor nodes and a sink node to track the mean values of n sensors' data. The consensus filter resolve the problem of data fusion by a distribution Kalman filtering scheme. We showed that the consensus filter has an optimal convergence to decrease of noise propagation and fast tracking ability for input signals. In order to verify for the results of consensus filtering, we showed the output signals of sensor nodes and their filtering results, and then showed the result of the combined signal and the consensus filtering using zeegbee communication.