• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.036 seconds

Remote Navigation and Monitoring System for Mobile Robot Using Smart Phone (스마트 폰을 이용한 모바일로봇의 리모트 주행제어 시스템)

  • Park, Jong-Jin;Choi, Gyoo-Seok;Chun, Chang-Hee;Park, In-Ku;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.207-214
    • /
    • 2011
  • In this paper, using Zigbee-based wireless sensor networks and Lego MindStorms NXT robot, a remote monitoring and navigation system for mobile robot has been developed. Mobile robot can estimate its position using encoder values of its motor, but due to the existing friction and shortage of motor power etc., error occurs. To fix this problem and obtain more accurate position of mobile robot, a ultrasound module on wireless sensor networks has been used in this paper. To overcome disadvantages of ultrasound which include straightforwardness and narrow detection coverage, we rotate moving node attached to mobile robot by $360^{\circ}$ to measure each distance from four fixed nodes. Then location of mobile robot is estimated by triangulation using measured distance values. In addition, images are sent via a network using a USB Web camera to smart phone. On smart phones we can see location of robot, and images around places where robot navigates. And remote monitoring and navigation is possible by just clicking points at the map on smart phones.

Query Processing System for Multi-Dimensional Data in Sensor Networks (센서 네트워크에서 다차원 데이타를 위한 쿼리 처리 시스템)

  • Kim, Jang-Soo;Kim, Jeong-Joon;Kim, Young-Gon;Lee, Chang-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.139-144
    • /
    • 2017
  • As technologies related to sensor network are currently emerging and the use of GeoSensor is increasing along with the development of IoT technology, spatial query processing systems to efficiently process spatial sensor data are being actively studied. However, existing spatial query processing systems do not support a spatial-temporal data type and a spatial-temporal operator for processing spatial-temporal sensor data. Therefore, they are inadequate for processing spatial-temporal sensor data like GeoSensor. Accordingly, this paper developed a spatial-temporal query processing system, for efficient spatial-temporal query processing of spatial-temporal sensor data in a sensor network. Lastly, this paper verified the utility of System through a scenario, and proved that this system's performance is better than existing systems through performance assessment of performance time and memory usage.

Conversion Tools of Spiking Deep Neural Network based on ONNX (ONNX기반 스파이킹 심층 신경망 변환 도구)

  • Park, Sangmin;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.165-170
    • /
    • 2020
  • The spiking neural network operates in a different mechanism than the existing neural network. The existing neural network transfers the output value to the next neuron via an activation function that does not take into account the biological mechanism for the input value to the neuron that makes up the neural network. In addition, there have been good results using deep structures such as VGGNet, ResNet, SSD and YOLO. spiking neural networks, on the other hand, operate more like the biological mechanism of real neurons than the existing activation function, but studies of deep structures using spiking neurons have not been actively conducted compared to in-depth neural networks using conventional neurons. This paper proposes the method of loading an deep neural network model made from existing neurons into a conversion tool and converting it into a spiking deep neural network through the method of replacing an existing neuron with a spiking neuron.

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks

  • Dai, Hua;Yang, Geng;Huang, Haiping;Xiao, Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2111-2131
    • /
    • 2015
  • Tiered wireless sensor network is a network model of flexibility and robustness, which consists of the traditional resource-limited sensor nodes and the resource-abundant storage nodes. In such architecture, collected data from the sensor nodes are periodically submitted to the nearby storage nodes for archive purpose. When a query is requested, storage nodes also process the query and return qualified data as the result to the base station. The role of the storage nodes leads to an attack prone situation and leaves them more vulnerable in a hostile environment. If any of them is compromised, fake data may be injected into and/or qualified data may be discarded. And the base station would receive incorrect answers incurring malfunction to applications. In this paper, an efficient verifiable top-k query processing scheme called EVTQ is proposed, which is capable of verifying the authentication and completeness of the results. Collected data items with the embedded information of ordering and adjacent relationship through a hashed message authentication coding function, which serves as a validation code, are submitted from the sensor nodes to the storage nodes. Any injected or incomplete data in the returned result from a corresponded storage node is detected by the validation code at the base station. For saving communication cost, two optimized solutions that fuse and compress validation codes are presented. Experiments on communication cost show the proposed method is more efficiency than previous works.

AKA-PLA: Enhanced AKA Based on Physical Layer Authentication

  • Yang, Jing;Ji, Xinsheng;Huang, Kaizhi;Yi, Ming;Chen, Yajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3747-3765
    • /
    • 2017
  • Existing authentication mechanisms in cellular mobile communication networks are realized in the upper layer by employing cryptographic techniques. Authentication data are broadcasted over the air in plaintext, enabling attackers to completely eavesdrop on the authentication and get some information about the shared secret key between legitimate nodes. Therefore, reusing the same secret key to authenticate several times results in the secret key's information leakage and high attacking rate. In this paper, we consider the most representative authentication mechanism, Authentication and Key Agreement (AKA), in cellular communication networks and propose an enhanced AKA scheme based on Physical Layer Authentication (AKA-PLA). Authentication responses generated by AKA are no longer transmitted in plaintext but masked by wireless channel characteristics, which are not available to adversaries, to generate physical layer authentication responses by a fault-tolerant hash method. The authenticator sets the threshold according to the authentication requirement and channel condition, further verifies the identity of the requester based on the matching result of the physical layer authentication responses. The performance analyses show that the proposed scheme can achieve lower false alarm rate and missing rate, which are a pair of contradictions, than traditional AKA. Besides, it is well compatible with AKA.

Performance Analysis of 1-2-1 Cooperative Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 1-2-1 협력 프로토콜에 관한 연구)

  • Choi, Dae-Kyu;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.113-119
    • /
    • 2008
  • Conventional 1-1-1 cooperative protocol offers path-loss gain as advantage of multi-hop and spatial diversity which is equivalent to MIMO system. This protocol is enable to get higher reliability and reduction of power consumption than those of the single-hop or multi-hop. But the 1-1-1 cooperative protocol get only the diversity order 2 and limited path-loss reduction gain because this protocol has a single cooperative relay. We propose 1-2-1 cooperative protocol using two cooperative relays R1, R2. The 1-2-1 cooperative protocol can improve path-loss reduction and increase diversity order 3. Moreover, the cooperative relay R2 attains diversity order 2. The signaling method in transmission uses DF (Decode and Forward) or DR (Decode and Reencode) and 1-2-1 DF/DR cooperative protocol are applied to clustering based wireless sensor networks (WSNs). Simulations are performed to evaluate the performance of the protocols under Rayleigh fading channel plus AWGN (Additive White Gaussian Noise).

  • PDF

Resource Allocation Method in High-Rate Wireless Personal Area Networks (고속 무선 PAN에서의 자원 할당 방식)

  • Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.39-45
    • /
    • 2008
  • High-Rate Wireless Personal Area Networks (HR-WPANs) in IEEE 802.15.3 standard use a TIme Devision Multiple Access (TDMA) protocol to support isochronous traffic. Isochronous traffic requires a delay-bounded service. However, the HR-WPAN standard suffers from long access delay and association delay. In this paper, we propose an enhanced MAC protocol for the delay-bounded traffic. This proposed protocol provides a way that a central node is able to collect traffic status on all member nodes. Furthermore, by utilizing the information, a scheduling algorithm is also proposed in order to synchronize the instant of a packet transmission with that of the packet arrival. With the proposed protocol and algorithm, the delay of access and association can be reduced. Performance analysis is carried out and the significant performance enhancement is observed.

  • PDF

Improvement Research of BLE-based System for Monitoring the cause of Breakdown of Automatic Doors (자동문의 고장원인을 모니터링하기 위한 BLE 기반의 시스템 개선연구)

  • Kim, Gi-Doo;Won, Seo-Yeon;Kim, Hie-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.93-102
    • /
    • 2017
  • Recently increasing usage of smartphones makes the Internet of Things (IoT) a leading technology that can collect and share data through sensor networks and wireless communication such as low-power Bluetooth (BLE). BLE-based application can provide operators more precise information on Automatic Door system by remotely diagnosing the system faults through wireless sensor networks and sensors around the Automatic Door. In this paper, a smart device with extended BLE module is implemented which can monitor and Control the system states and faults remotely without on-site diagnostic. while maintaining system integrity so that increase efficiency of time and costs for system management. We can use the results of this research as a basis in evaluating reliability of data between devices, extending communication module in Controller of obsolete Door systems, and establishing centralized monitoring systems in near future with multi-channel Door Controls.

A Study on Seamless Handover Mechanism with Network Virtualization for Wireless Network (WLAN 환경에서 네트워크 가상화를 통한 끊김 없는 핸드오버 매커니즘 연구)

  • Ku, Gi-Jun;Jeong, Ho-Gyoun
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.594-599
    • /
    • 2014
  • The routinized wireless devices such as smart phone have promoted to expand the use of IEEE 802.11 groups. The challenge environments of the wireless network utilizes effectively and user-oriented seamless services that handover is the most desirable issues under the wireless circumstance. In data center software defined network (SDN) has provided the flow routing to reduce costs and complexities. Flow routing has directly offered control for network administrator and has given to reduce delay for users. Under the circumstance of being short of network facilities, SDNs give the virtualization of network environments and to support out of the isolation traffic conditions. It shows that the mechanism of handover makes sure seamless services for higher density of the network infrastructure which is SDN to support network service re-configurable.

A Study on the Firefly-Inspired Distributed Timing Synchronization in Ad Hoc Networks With Packet-Based Communications (패킷 기반 통신을 하는 애드 혹 네트워크에서 반딧불 영감을 받은 분산 타이밍 동기 연구)

  • Yi, Hyo Seok;Kim, Sungjin;Kwon, Dong-Seung;Jang, Sung-Cheol;Kim, Hyeong-Jin;Shin, Won-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.575-583
    • /
    • 2013
  • In ad hoc networks, a distributed timing synchronization is studied using a firefly-inspired approach. We illuminate the exiting synchronization algorithm based on the theory of pulse-coupled oscillators so that the algorithm can be applied to multi-carrier systems through packet-based communications, where nodes communicate over an orthogonal frequency-division multiple access air interface. As our main result, we introduce a new sync-code detector, which optimally designs both the coupling function and the detection threshold when various network parameters such as the number of nodes in the network and network topology are given a priori. Computer simulations are performed to show the convergence to a synchronized state in realistic network environments.