• Title/Summary/Keyword: active sensor networks

Search Result 90, Processing Time 0.042 seconds

A Study on the memory management techniques using Sensing Data Filtering of Wireless sensor nodes (무선센서노드의 센싱 데이터 필터링을 사용한 메모리 관리 기법에 대한 연구)

  • Kang, Yeon-I;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1633-1639
    • /
    • 2010
  • Recently Wireless sensor networks have been used for many purposes and is active for this study. The various methods to reduce energy consumption, which are actively being studied Wireless sensor network to reduce energy consumption, leading to improve transport efficiency, Cluster can be viewed using the research methods. Cluster method researches consists of a sensor node to the cluster and in among those they take out the Cluster head node and Cluster head node is having collects sensing information of circumferential nodes sensing to sink node transmits. Selected as cluster head sensor nodes so a lot of the energy consumption is used as a cluster head sensor nodes is lose a shorter life span have to be replaced by another sensor node. In this paper, to complement the disadvantages of a cluster-mesh method, proposes to manage memory efficiently about filtering method for sensing data. Filtering method to store the same data sensing unlike traditional methods of data filtering system sensing first sent directly by the hashing algorithm to calculate the hash table to store addresses and Sensing to store data on the calculated address in a manner to avoid duplication occurred later, and sensing data is not duplicated by filtering data to be stored in the hash table is a way.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

Beacon transmission scheduling for energy efficient routing in Zigbee sensor networks (지그비 센서 네트워크에서의 에너지 효율적 라우팅을 고려한 비콘 전송 스케줄링 기법)

  • Lee, Yoo-Jin;Ahn, Se-Young;Nam, Heung-Woo;An, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.625-630
    • /
    • 2006
  • Zigbee 센서 네트워크에서는 multihop 전송을 위하여 tree topology와 beacon-enabled 네트워크 구성을 갖는다. 이러한 multihop beaconing 네트워크의 목적은 routing 노드들에게 Sleep할 기회를 주어 파워의 소모를 줄이고자 하는 데 있다. 파워의 소모를 줄이고 beacon 전송시의 충돌을 방지하기 위하여 beacon 전송 스케줄링이 필요한데 본 논문은 multihop을 지원하고 에너지 효율에 효과적인 beacon 전송 스케줄링 알고리즘과 이를 바탕으로 에너지 효율적인 라우팅 기법을 제안한다. 본 제안은 Zigbee coordinator의 beacon interval(BI)이 결정되면 네트워크 내의 beacon을 전송하는 모든 노드들은 Zigbee coordinator의 BI를 알고 모든 노드의 superframe duration(SD)은 동일하다고 가정한다. 이러한 가정하에서 beacon을 전송하는 노드들이 Zigbee coordinator의 BI 구간 중 항상 정해진 시간에 자신의 beacon을 전송한다면 beacon의 충돌을 막을 수 있음을 보여 준다. 또한 노드들이 서로의 beacon 전송 시간을 알 수 있기 때문에 목적지 노드의 beacon을 tracking하지 않고도 목적지 노드가 active 되는 시점에 패킷을 전송하면 에너지 측면에서 좀 더 효율적인 라우팅 기반을 제공한다는 것을 보여 준다.

  • PDF

The comparative analysis of the MAC Protocol in wireless sensor networks (무선 센서 네트워크에서의 MAC 프로토콜 비교 분석)

  • Lee, Sang-Hun;Lee, Jong-Yong;Park, Jae-Sung;Kim, Jin-Su
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.195-200
    • /
    • 2009
  • 무선 센서 네트워크에서의 통신은 여러 계층으로 나뉘어 각 계층별 역할을 수행하므로 무선통신이 가능할 수 있다. 센서 네트워크에서의 통신계층 중 하나인 MAC(Medium Access Control)계층은 데이터의 에러, 흐름을 제어하고 자원을 관리하기 위해서 사용되며 MAC Protocol을 사용하여 센서 노드간의 통신을 보장한다. 전통적인 MAC Protocol은 패킷 처리율의 최대화, 지연의 최소화 및 공평성 제공이 주된 목적으로 설계된 된다. 무선 센서 네트워크에서 MAC 프로토콜은 응용에 따라 차이는 있으나 대부분 많은 센서 노드들로 구성된다. 또한 멀티 홉 통신을 하기 때문에 센서 장치의 제한된 배터리 수명으로 인해 소모되는 에너지를 최소화 하여 네트워크 에너지의 효율성을 높이는 것이 가장 큰 목적이다. 본 논문에서는 에너지 효율성 측면을 강조하기 위해서 MAC프로토콜의 문제점을 알아보고 그 중에서 최우선적으로 요구되는 에너지 효율성에 대해서 S-MAC, T-MAC의 비교와 T-MAC의 확률값을 변경에 따른 어느 경우가 가장 효율적인지 active time을 통하여 알아보았다.

  • PDF

Energy Efficient MAC Protocols based on S-MAC for Wireless Sensor Networks (무선 센서 네트워크에서의 S-MAC 기반의 에너지 효율적인 MAC 프로토콜)

  • Park, Jae-Hong;Lew, Kyeung-Seek;Kim, Yong-Deak
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.2 s.314
    • /
    • pp.19-24
    • /
    • 2007
  • In this paper, we deal with suggestion of energy efficient MAC protocol. The scheme(I-MAC) makes the active duty-cycle duration based on by utilizing data frequency. Data frequency is made by checking a check bit of Link layer. By being studies on NS-2 simulation environments, the proposed scheme was proved to be improved in terms of energy efficiency of 50 % and to be similar to throughput of S-MAC on every time interval.

Implementation of saccadic eye movement system with saliency map model (Saliency map 모델을 갖는 도약 안구 시각 시스템의 구현)

  • Cho, Jun-Ki;Lee, Min-Ho;Shin, Jang-Kyoo;Koh, Kwang-Sik
    • Journal of Sensor Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.52-61
    • /
    • 2001
  • We propose a new saccadic eye movement system with visual selective attention. Saliency map models generate the scan pathways in a natural scene, of which the output makes an attended location. Saccadic eye movement model is used for producing the target trajectories to move the attended locations very rapidly. To categorize human saccadic eye movement, saccadic eye movement model was divided into three parts, each of which was then individually modeled using different neural networks to reflect a principal functionality of brain structures related with the saccadic eye movement in our brain. Based on the proposed saliency map models and the saccadic eye movement model, an active vision system using a CCD type camera and BLDC motor was developed and demonstrated with experimental results.

  • PDF

NetLogo Extension Module for the Active Participatory Simulations with GoGo Board (고고보드를 이용한 능동적 참여 모의실험을 위한 NetLogo 확장 모듈)

  • Xiong, Hong-Yu;So, Won-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1363-1372
    • /
    • 2011
  • Flooding based routing protocols are usually used to disseminate information in wireless sensor networks. Those approaches, however, require message retransmissions to all nodes and induce huge collision rate and high energy consumption. In this paper, HoGoP (Hop based Gossiping Protocol) in which all nodes consider the number of hops from sink node to them, and decide own gossiping probabilities, is introduced. A node can decide its gossiping probability according to the required average reception percentage and the number of parent nodes which is counted with the difference between its hop and neighbors' ones. Therefore the decision of gossiping probability for network topology is adaptive and this approach achieves higher message reception percentage with low message retransmission than the flooding scheme. Through simulation, we compare the proposed protocol with some previous ones and evaluate its performance in terms of average reception percentage, average forwarding percentage, and forwarding efficiency. In addition, average reception percentage is analyzed according to the application requirement.

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

Development and Application of the High Speed Weigh-in-motion for Overweight Enforcement (고속축하중측정시스템 개발과 과적단속시스템 적용방안 연구)

  • Kwon, Soon-Min;Suh, Young-Chan
    • International Journal of Highway Engineering
    • /
    • v.11 no.4
    • /
    • pp.69-78
    • /
    • 2009
  • Korea has achieved significant economic growth with building the Gyeongbu Expressway. As the number of new road construction projects has decreased, it becomes more important to maintain optimal status of the current road networks. One of the best ways to accomplish it is weight enforcement as active control measure of traffic load. This study is to develop High-speed Weigh-in-motion System in order to enhance efficiency of weight enforcement, and to analyze patterns of overloaded trucks on highways through the system. Furthermore, it is to review possibilities of developing overweight control system with application of the HS-WIM system. The HS-WIM system developed by this study consists of two sets of an axle load sensor, a loop sensor and a wandering sensor on each lane. A wandering sensor detects whether a travelling vehicle is off the lane or not with the function of checking the location of tire imprint. The sensor of the WIM system has better function of classifying types of vehicles than other existing systems by detecting wheel distance and tire type such as single or dual tire. As a result, its measurement errors regarding 12 types of vehicle classification are very low, which is an advantage of the sensor. The verification tests of the system under all conditions showed that the mean measurement errors of axle weight and gross axle weight were within 15 percent and 7 percent respectively. According to the WIM rate standard of the COST-323, the WIM system of this study is ranked at B(10). It means the system is appropriate for the purpose of design, maintenance and valuation of road infrastructure. The WIM system in testing a 5-axle cargo truck, the most frequently overloaded vehicle among 12 types of vehicles, is ranked at A(5) which means the system is available to control overloaded vehicles. In this case, the measurement errors of axle load and gross axle load were within 8 percent and 5 percent respectively. Weight analysis of all types of vehicles on highways showed that the most frequently overloaded vehicles were type 5, 6, 7 and 12 among 12 vehicle types. As a result, it is necessary to use more effective overweight enforcement system for vehicles which are seriously overloaded due to their lift axles. Traffic volume data depending upon vehicle types is basic information for road design and construction, maintenance, analysis of traffic flow, road policies as well as research.

  • PDF