• Title/Summary/Keyword: industrial control networks

Search Result 218, Processing Time 0.034 seconds

A Study on an Efficient Routing Scheme for using a priority scheme in Wireless Sensor Networks (무선 센서 네트워크 환경에서 우선순위 기법을 이용한 효율적인 경로 설정에 대한 연구)

  • Won, Dae-Ho;Yang, Yeon-Mo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.4
    • /
    • pp.40-46
    • /
    • 2011
  • Wireless Sensor Networks(WSNs) have shown a lot of good outcomes in providing a various functions depending on industrial expectations by deploying ad-hoc networking with helps of light loaded and battery powered sensor nodes. In particular, it is strongly requested to develop an algorithm of cross-layer control between 2-layer and 3-layer to deriver the sensing data from the end node to the sink node on time. In this paper, based on the above observation we have proposed an IEEE802.15.4 based self priority routing scheme under UC Berkely TinyOS platform. The proposed beacon based priority routing (BPR) algorithm scheme utilizes beacon periods in sending message with embedding the high priority data and thus provides high quality of service(QoS) in the given criteria. The performance measures are the packet Throughput, delivery, latency, total energy consumption. Simulation results under TinyOS Simulator(TOSSIM) have shown the proposed scheme outcome the conventional Ad hoc On-Demand Distance Vector(AODV) Routing.

An improved LEACH-C routing protocol considering the distance between the cluster head and the base station (클러스터 헤드와 기지국간의 거리를 고려한 향상된 LEACH-C 라우팅 프로토콜)

  • Kim, TaeHyeon;Park, Sea Young;Kwon, Oh Seok;Lee, Jong-Yong;Jung, Kye-Dong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.373-377
    • /
    • 2022
  • Wireless sensor networks are being used in various fields. Wireless sensor networks are applied in many areas, such as security, military detection, environmental management, industrial control, and home automation. There is a problem about the limit of energy that the sensor network basically has. In this paper, we propose the LEACH-CCBD (Low Energy Adaptive Clustering hierarchy - Centrailized with Cluster and Basestation Distance) algorithm that uses energy efficiently by improving network transmission based on LEACH-C among the representative routing protocols. The LEACH-CCBD algorithm is a method of assigning a cluster head to a cluster head by comparing the sum of the distance from the member node to the cluster distance and the distance from the cluster node to the base station with respect to the membership of the member nodes in the cluster when configuring the cluster. The proposed LEACH-CCBD used Matlab simulation to confirm the performance results for each protocol. As a result of the experiment, as the lifetime of the network increased, it was shown to be superior to the LEACH and LEACH-C algorithms.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network (온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향)

  • Moon, Yun Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.294-301
    • /
    • 2017
  • Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

Fault state detection and remaining useful life prediction in AC powered solenoid operated valves based on traditional machine learning and deep neural networks

  • Utah, M.N.;Jung, J.C.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.9
    • /
    • pp.1998-2008
    • /
    • 2020
  • Solenoid operated valves (SOV) play important roles in industrial process to control the flow of fluids. Solenoid valves can be found in so many industries as well as the nuclear plant. The ability to be able to detect the presence of faults and predicting the remaining useful life (RUL) of the SOV is important in maintenance planning and also prevent unexpected interruptions in the flow of process fluids. This paper proposes a fault diagnosis method for the alternating current (AC) powered SOV. Previous research work have been focused on direct current (DC) powered SOV where the current waveform or vibrations are monitored. There are many features hidden in the AC waveform that require further signal analysis. The analysis of the AC powered SOV waveform was done in the time and frequency domain. A total of sixteen features were obtained and these were used to classify the different operating modes of the SOV by applying a machine learning technique for classification. Also, a deep neural network (DNN) was developed for the prediction of RUL based on the failure modes of the SOV. The results of this paper can be used to improve on the condition based monitoring of the SOV.

Location Awareness Method using Vector Matching of RSSI in Low-Rate WPAN (저속 WPAN에서 수신신호세기의 Vector Matching을 이용한 위치 인식 방식)

  • Nam Yoon-Seok;Choi Eun-Chang;Huh Jae-Doo
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.93-104
    • /
    • 2005
  • Recently, RFID/USN is one of fundamental technologies in information and communications networks. Low-Rate WPAN, IEEE802.15.4 is a low-cost communication network that allows wireless connectivity in applications with limited Power and relaxed throughput requirements. Its applications are building automation, personal healthcare, industrial control, consumer electronics, and so on. Some applications require location information. Of course location awareness is useful to improve usability of data Low-Rate WPAN Is regarded as a key specification of the sensor network with the characteristics of wireless communication, computing, energy scavenging, self-networking, and etc. Unfortunately ZigBee alliance propose a lot of applications based on location aware technologies, but the specification and low-rate WPAN devices don't support anything about location-based services. RSSI ( Received Signal Strength indication) is for energy detection to associate, channel selection, and etc. RSSI is used to find the location of a potable device in WLAN. In this paper we studied indoor location awareness using vector matching of RSSI in low-Rate wireless PAN. We analyzed the characteristics of RSSI according to distance and experimented location awareness. We implemented sensor nodes with different shapes and configured the sensor network for the location awareness with 4 fixed nodes and a mobile node. We try to contribute developing location awareness method using RSSI in 3-dimension space.

  • PDF

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

The comparative analysis of the MAC Protocol in wireless sensor networks (무선 센서 네트워크에서의 MAC 프로토콜 비교 분석)

  • Lee, Sang-Hun;Lee, Jong-Yong;Park, Jae-Sung;Kim, Jin-Su
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.195-200
    • /
    • 2009
  • 무선 센서 네트워크에서의 통신은 여러 계층으로 나뉘어 각 계층별 역할을 수행하므로 무선통신이 가능할 수 있다. 센서 네트워크에서의 통신계층 중 하나인 MAC(Medium Access Control)계층은 데이터의 에러, 흐름을 제어하고 자원을 관리하기 위해서 사용되며 MAC Protocol을 사용하여 센서 노드간의 통신을 보장한다. 전통적인 MAC Protocol은 패킷 처리율의 최대화, 지연의 최소화 및 공평성 제공이 주된 목적으로 설계된 된다. 무선 센서 네트워크에서 MAC 프로토콜은 응용에 따라 차이는 있으나 대부분 많은 센서 노드들로 구성된다. 또한 멀티 홉 통신을 하기 때문에 센서 장치의 제한된 배터리 수명으로 인해 소모되는 에너지를 최소화 하여 네트워크 에너지의 효율성을 높이는 것이 가장 큰 목적이다. 본 논문에서는 에너지 효율성 측면을 강조하기 위해서 MAC프로토콜의 문제점을 알아보고 그 중에서 최우선적으로 요구되는 에너지 효율성에 대해서 S-MAC, T-MAC의 비교와 T-MAC의 확률값을 변경에 따른 어느 경우가 가장 효율적인지 active time을 통하여 알아보았다.

  • PDF

Protocol Design for Wavelength Routing in Optical Ring Access Networks (광링액세스네트워크에서의 파장 라우팅을 위한 프로토콜 설계)

  • Lee, Sang-Wha
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.2382-2392
    • /
    • 2014
  • In this paper, a new data frame structure for wavelength routing in optical ring access network(ORAN) is designed and the functions of each field in the frame are defined. In addition, the IP packet transmission to the network layer corresponding to the newly proposed structure of the protocol stack is newly presented. Tha data transmission protocol design techniques of ORAN was proposed. IP packet and broadcasting packet transmission within the sub-network, and the IP packet transmission to other sub-network was shown through the process illustration. In the process, the encapsulation and framing process of the wavelength information to routing has been described in detail. And each step takes place in a packet transfer process is demonstrated. A ring type optical access network protocol is not yet research field. ORAN data transfer protocol to send/receive module structure of a subscriber node and a control node of the two rings which analyzed the results are shown. The high-speed Internet solution is proposed that by using wavelength routing the packet transport protocol for ORAN is designed.

A Study on Development of STACO Model to Predict Bead Height in Tandem GMA Welding Process (탄템 GMA 용접공정의 표면비드높이 예측을 위한 STACO모델 개발에 관한 연구)

  • Lee, Jongpyo;Kim, IllSoo;Park, Minho;Park, Cheolkyun;Kang, Bongyong;Shim, Jiyeon
    • Journal of Welding and Joining
    • /
    • v.32 no.6
    • /
    • pp.8-13
    • /
    • 2014
  • One of the main challenges of the automatic arc welding process which has been widely used in various constructions such as steel structures, bridges, autos, motorcycles, construction machinery, ships, offshore structures, pressure vessels, and pipelines is to create specific welding knowledge and techniques with high quality and productivity of the production-based industry. Commercially available automated arc welding systems use simple control techniques that focus on linear system models with a small subset of the larger set of welding parameters, thereby limiting the number of applications that can be automated. However, the correlations of welding parameters and bead geometry as welding quality have mostly been linked by a trial and error method to adjust the welding parameters. In addition, the systematic correlation between these parameters have not been identified yet. To solve such problems, a new or modified models to determine the welding parameters for tandem GMA (Gas Metal Arc) welding process is required. In this study, A new predictive model called STACO model, has been proposed. Based on the experimental results, STACO model was developed with the help of a standard statistical package program, MINITAB software and MATLAB software. Cross-comparative analysis has been applied to verify the reliability of the developed model.