• Title/Summary/Keyword: Wireless sensors networks

Search Result 427, Processing Time 0.031 seconds

Organizing the Smart Devices' Set for Control of Periodic Sensing Data in Internet of Things (사물인터넷에서 주기적 센싱 데이터 제어를 위한 스마트 디바이스 집합 구성 방안)

  • Sung, Yoon-young;Woo, Hyun-je;Lee, Mee-jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.758-767
    • /
    • 2017
  • IoT paradigm which makes a information without direct intervention of a human and interworks with other objects, humans and systems is attracting attention. It will be expected the number of smart devices equipped with sensors and wireless communication capabilities is reached to about 260 billion by 2020. With the vast amount of sending data generated from rapidly increasing number of smart devices, it will bring up the traffic growth over internet and congestion in wireless networks. In this paper, we utilize the smart device as a sink node to collect and forward the sensing data periodically in IoT and propose a heuristic algorithm for a selection of sink nodes' set with each sink node satisfies the QoS its applications because a selection of optimal sink nodes' set is NP-hard problem. The complexity of proposed heuristic algorithm is $O(m^3)$ and faster than the optimal algorithm.

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.

Collision Avoidance Transmission Method Using Sensor Values in Wireless Sensor Network (무선 센서 네트워크에서 센서 값의 분포를 이용한 충돌 회피 전송방법)

  • An, Jong-min;Kang, Ji-woong;Chung, Jea-hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.604-611
    • /
    • 2017
  • In wireless sensor networks, an energy efficient operation is important since the energy of the sensors is limited. This paper proposes an energy efficient method that reduces a packet generation with Matrix Completion method where sensor value matrix has low-rank and decreases a collision rate and an overhead by transmitting only sensor ID to a time slot corresponding to the sensor value. Computer simulations demonstrates that the proposed method shows 17% of transmission failure and 73% of the packet generation compared to a conventional CSMA/CS. Delay time of transmitting information of the proposed method exhibits 22% of the CSMA/CA and the MSE error after reconstructing sensor values by Singular Value Thresholding(SVT) in Fusion Center is 87% of the CSMA/CA.

LoRa LPWAN Sensor Network for Real-Time Monitoring and It's Control Method (실시간 모니터링을 위한 LoRa LPWAN 기반의 센서네트워크 시스템과 그 제어방법)

  • Kim, Jong-Hoon;Park, Won-Joo;Park, Jin-Oh;Park, Sang-Hyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.31 no.6
    • /
    • pp.359-366
    • /
    • 2018
  • Social infrastructure facilities that have been under construction since the country's high-growth period are undergoing rapid aging, and safety assessments of large structures such as bridge tunnels, which can be directly linked to large-scale casualties in the event of an accident, are necessary. Wireless smart sensor networks that improve SHM(Structural Health Monitoring) based on existing wire sensors are difficult to construct economical and efficient system due to short signal reach. The LPWAN, Low Power Wide Area Network, is becoming popular with the Internet of Things and it is possible to construct economical and efficient SHM by applying it to structural health monitoring. This study examines the applicability of LoRa LPWAN to structural health monitoring and proposes a channel usage pre-planning based LoRa network operation method that can efficiently utilize bandwidth while resolving conflicts between channels caused by using license - exempt communication band.

The Efficient Ship Wireless Sensor Network Using Drone (드론을 활용한 효율적인 선박 센서 네트워크)

  • Hong, Sung-Hwa;Kim, Byoung-Kug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.122-127
    • /
    • 2022
  • Currently, the drone is considered as a mobile base station of USN as a method to act as a base station using USN in existing LTE-M and LTE networks for data transmission in unmanned ships. Therefore, the drone, which is a mobile base station, is a sink node equipped with an LTE modem or a short-range communication modem, and can collect safety information of ship operation from the sensor node and transmit the safety information to the ship or transmit the information between the ships. As, if a short-range network is formed by using drones, it will form a communication network around unmanned ships and will be advantageous for collecting information using security and environmental sensors. In this paper, we propose a method to transmit environmental sensor data and to utilize communication between ships using drones to secure the surrounding information necessary for AI operation of unmanned ships in the future.

Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network

  • Shyam Sundar S;R.S. Bhuvaneswaran;SaiRamesh L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2214-2229
    • /
    • 2024
  • Wireless sensor network (WSN) consists of large number of sensor nodes that are deployed in geographical locations to collect sensed information, process data and communicate it to the control station for further processing. Due the unfriendly environment where the sensors are deployed, there exist many possibilities of malicious nodes which performs malicious activities in the network. Therefore, the security threats affect performance and life time of sensor networks, whereas various security aspects are there to address security issues in WSN namely Cryptography, Trust Management, Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS). However, IDS detect the malicious activities and produce an alarm. These malicious activities exploit vulnerabilities in the network layer and affect all layers in the network. Existing feature selection methods such as filter-based methods are not considering the redundancy of the selected features and wrapper method has high risk of overfitting the classification of intrusion. Due to overfitting, the classification algorithm fails to detect the intrusion in better manner. The main objective of this paper is to provide the efficient feature selection algorithm which was suitable for any type classification algorithm to detect the intrusion in an effective manner. This paper, the security of the network is addressed by proposing Feature Selection Algorithm using Chi Squared with Ensemble Method (FSChE). The proposed scheme employs the combination of decision tree along with the random forest classification algorithm to form ensemble classifier. The experimental results justify the feasibility of the proposed scheme in terms of attack detection, packet delivery ratio and time analysis by employing NSL KDD cup data Set. The obtained results shows that the proposed ensemble method increases the overall performance by 10% to 25% with respect to mentioned parameters.

An Analysis on the Deployment Methods for Smart Monitoring Systems (스마트 모니터링 시스템의 배치 방식 분석)

  • Heo, No-Jeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.55-62
    • /
    • 2010
  • Monitoring systems are able to report certain events at region of interest(ROI) and to take an appropriate action. From industrial product line full of robots to fire detection, intrusion detection, smart grid application, environmental pollution alarm system, monitoring system has widely used in diverse industry sector. Recently, due to advance of wireless communication technology and availability of low cost sensors, intelligent and/or smart monitoring systems such as sensor networks has been developed. Several deployment methods are introduced to meet various monitoring needs and deployment performance criteria are also summarized to be used to identify weak point and be useful at designing monitoring systems. Both efficiency during deployment and usefulness after the deployment should be assessed. Efficiency factors during deployment are elapsed time, energy required, deployment cost, safety, sensor node failure rate, scalability. Usefulness factors after deployment are ROI coverage, connectivity, uniformity, target density similarity, energy consumption rate per unit time and so on.

A Security Design for a Smart Power Grid Field Test based-on Power IT Systems (전력 IT 기반스마트 파워그리드 실증 보안 체계 설계)

  • Lee, Myung-Hoon;Bae, Si-Hwa;Son, Sung-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2497-2506
    • /
    • 2010
  • Smart power grid is targeting to improve grid operation by integrating existing power IT technologies in the jeju smart grid field test. Real-time two-way communication and interoperability in power grid are essential to smart power grid. Adopting smart grid will increase security vulnerabilities in power grid by increasing the number of wireless sensors and the chances of the external exposure of communication networks. In addition, hackers can cause chaos in the power grid system with eavesdropping and forgery attacks in communication networks. Smart power grid is one of the most important systems in deploying smart grid, and it is important to design security system systematically since smart grid can be seriously damaged when problem occurs. In this paper, local and global smart grid security standard and security vulnerabilities in power grid are reviewed, and 2 level smart grid service model is proposed.

On the Design of ToA Based RSS Compensation Scheme for Distance Measurement in WSNs (ToA 기반 RSS 보정 센서노드 거리 측정 방법)

  • Han, Hyeun-Jin;Kwon, Tae-Wook
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.615-620
    • /
    • 2009
  • Nowadays, wireless infrastructures such as sensor networks are widely used in many different areas. In case of sensor networks, the wirelessly connected sensors can execute different kind of tasks in a diversity of environments, and one of the most important parameter for a successful execution of such tasks is the location information of each node. As to localization problems in WSNs, there are ToA (Timer of Arrival), RSS (Received Signal Strength), AoA (Angle of Arrival), etc. In this paper, we propose a modification of existing ToA and RSS based methods, adding a weighted average scheme to measure more precisely the distance between nodes. The comparison experiments with the traditional ToA method show that the average error value of proposed method is reduced by 0.1 cm in indoor environment ($5m{\times}7m$) and 0.6cm in outdoor environment ($10{\times}10m$).

A Context-based Adaptive Multimedia Streaming Scheme in IoT Environments (IoT 환경에서 컨텍스트 기반 적응적 멀티미디어 스트리밍 기법)

  • Seong, Chaemin;Hong, Seongjun;Lim, Kyungshik
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1166-1178
    • /
    • 2016
  • In Internet of Things (IoT) environments, billions of interconnected devices and multimedia sensors generate a huge amount of multimedia traffic. Since the environment are in general deployed as a server-centric architecture wireless sensor networks could be bottlenecks between IoT gateways and IoT devices. The bottleneck causes high power consumption of the device and triggers very heavy network overload by transmission of sensing data. The deterioration could decrease the quality of multimedia streaming service due to delay, loss, and waste of device power. Thus, in this paper, we propose a context-based adaptive multimedia streaming scheme to support enhanced QoS and low power consumption in IoT environments. The goal of the scheme is to increase quality score per voltage of the streaming service, given an adaptation algorithm with context that are classified network and hardware such as throughput, RTT, and CPU usage. From the both context, the quality score per voltage is used in the comparison of a only network context-based adaptive multimedia streaming scheme, a fixed multimedia streaming and our scheme. As a result, we achieves a high improvement that means the quality score per voltage is increased up to about 4, especially in case of resolution change.