• Title/Summary/Keyword: number of nodes

Search Result 2,162, Processing Time 0.034 seconds

A Greedy Algorithm for Minimum Power Broadcast in Wireless Networks (무선 네트워크에서 최소전력 브로드캐스트를 위한 탐욕 알고리즘)

  • Lee, Dong-ho;Jang, Kil-woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.641-644
    • /
    • 2016
  • Unlike wired networks, broadcasting in wireless networks can transmit data at once to several nodes with a single transmission. For omnidirectional broadcast to a node in wireless networks, all adjacent nodes receive the data at the same time. In this paper, we propose a greedy algorithm to solve the minimum power broadcasting problem of minimizing the total transmit power on broadcasting in wireless networks. We apply two matrices to the proposed algorithm: one is a distance matrix that represents the distance between each node, the other is an adjacency matrix having the number of adjacency nodes. Among the nodes that receive the data, a node that has the greatest number of the adjacent node transmits data to neighbor preferential. We compare the performance of the proposed algorithm with random method through computer simulation in terms of transmitting power of nodes. Experiment results show that the proposed algorithm outperforms better than the random method.

  • PDF

Detection of False Data Injection Attacks in Wireless Sensor Networks (무선 센서 네트워크에서 위조 데이터 주입 공격의 탐지)

  • Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2009
  • Since wireless sensor networks are deployed in open environments, an attacker can physically capture some sensor nodes. Using information of compromised nodes, an attacker can launch false data injection attacks that report nonexistent events. False data can cause false alarms and draining the limited energy resources of the forwarding nodes. In order to detect and discard such false data during the forwarding process, various security solutions have been proposed. But since they are prevention-based solutions that involve additional operations, they would be energy-inefficient if the corresponding attacks are not launched. In this paper, we propose a detection method that can detect false data injection attacks without extra overheads. The proposed method is designed based on the signature of false data injection attacks that has been derived through simulation. The proposed method detects the attacks based on the number of reporting nodes, the correctness of the reports, and the variation in the number of the nodes for each event. We show the proposed method can detect a large portion of attacks through simulation.

The Influence of Nitrogen and Soil Moisture Content on Yield Components of Soybeans (질소 및 토양수분이 대두의 수량형질에 미치는 영향)

  • Yeon-Kyu Park
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.15
    • /
    • pp.69-75
    • /
    • 1974
  • This experiment was conducted to investigate the influence of different amount of nitrogen and deficiency of soil moisture on yield components of soybean. Soybean were seeded on 1/2000a wagner pot. Deficiency of soil moisture was treated at each growth atage of soybean. 1.In case of deficiencyt of soil moisture at the flowering time in the plot of non-nitrogen(NO D3), the growth duration of soybean was shortened about three to four days. 2. The leaf area was greatly affected by the influence of both treatments till 49days after germinating. 3.The increase of stem height, stem doameter,number of branches and lengeh of the branches came to an end about 70 days after seeding. These growing condition of tje soybean were lowest the plot of No D$_1$,in which the frowth of the soybeans were poor at the early stage. 4.The number of pods was not increased by the increase of fertilizing nitrogenous fertilizer. The number of pods was much decreased by the influence of soil mousture deiciency, and under this condition, the proportion of main stem pods and two or three grain pods was high. 5.The 3rd and 4h nodes and the 10th to 12th nodes from bottom had more pods than the other nodes had, but of the plants had grown well, they had more pods on the 3rd and 4th nodes, but if the plants had grown poorly, they had more pods on the 10th to 12th nodes. 6.The content of protein in the soybean was low at the plit of N。D$_4$which had not heavy weight of 100 grains, and the content of oil in the soybean was low in the plot in which each plant had a small number of grains.

  • PDF

Clinical Application of Endoscopic Inguinal Lymph Node Resection after Lipolysis and Liposuction for Vulvar Cancer

  • Wu, Qiang;Zhao, Yi-Bing;Sun, Zhi-Hua;Ni, Jing;Wu, Yu-Zhong;Shao, Heng-Hua;Qu, Jun-Wei;Huang, Xin-En
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.12
    • /
    • pp.7121-7126
    • /
    • 2013
  • Aim: To examine lymph nodes obtained after lipolysis and liposuction of subcutaneous fat of the inguinal region of female vulvar cancer patients to explore the feasibility of clinical application. Methods: The field of operation was on the basis of the range of the conventional resection of inguinal lymph nodes. We injected lipolysis liquid fanwise, started liposuction after 15-20 minutes; then the subcutaneous fatty tissue was sucked out clearly by suction tube. We selected the first puncture holes located on 2-3 cm part below anterior superior spine, the others respectively being located 3cm and 6cm below the first for puncturing into the skin, imbedding a trocar to intorduce $CO_2$ gas and the specular body, and excise the lymph nodes by ultrasonic scalpel. The surgical field chamber was set with negative pressure drainage and was pressured with a soft saline bag after surgery. Results: A lacuna emerged from subcutaneous of the inguinal region after lipolysis and liposuction, with a wide fascia easily exposed at the bottom where lymph nodes could be readily excised. The number of lymph nodes of ten patients excised within the inguinal region on each side was 4-18. The excised average number of lymph nodes was 11 when we had mature technology. Conclusion: Most of adipose tissue was removed after lipolysis and liposuction of subcutaneous tissue of inguinal region, so that the included lymph nodes were exposed and easy to excise by endoscope. This surgery avoided the large incision of regular surgery of inguinal region, the results indicating that this approach is feasible and safe for used as an alternative technology.

A Backup Node Based Fault-tolerance Scheme for Coverage Preserving in Wireless Sensor Networks (무선 센서 네트워크에서의 감지범위 보존을 위한 백업 노드 기반 결함 허용 기법)

  • Hahn, Joo-Sun;Ha, Rhan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.339-350
    • /
    • 2009
  • In wireless sensor networks, the limited battery resources of sensor nodes have a direct impact on network lifetime. To reduce unnecessary power consumption, it is often the case that only a minimum number of sensor nodes operate in active mode while the others are kept in sleep mode. In such a case, however, the network service can be easily unreliable if any active node is unable to perform its sensing or communication function because of an unexpected failure. Thus, for achieving reliable sensing, it is important to maintain the sensing level even when some sensor nodes fail. In this paper, we propose a new fault-tolerance scheme, called FCP(Fault-tolerant Coverage Preserving), that gives an efficient way to handle the degradation of the sensing level caused by sensor node failures. In the proposed FCP scheme, a set of backup nodes are pre-designated for each active node to be used to replace the active node in case of its failure. Experimental results show that the FCP scheme provides enhanced performance with reduced overhead in terms of sensing coverage preserving, the number of backup nodes and the amount of control messages. On the average, the percentage of coverage preserving is improved by 87.2% while the additional number of backup nodes and the additional amount of control messages are reduced by 57.6% and 99.5%, respectively, compared with previous fault-tolerance schemes.

A Tunable Transmitter - Tunable Receiver Algorithm for Accessing the Multichannel Slotted-Ring WDM Metropolitan Network under Self-Similar Traffic

  • Sombatsakulkit, Ekanun;Sa-Ngiamsak, Wisitsak;Sittichevapak, Suvepol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.777-781
    • /
    • 2004
  • This paper presents an algorithm for multichannel slotted-ring topology medium access protocol (MAC) using in wavelength division multiplexing (WDM) networks. In multichannel ring, there are two main previously proposed architectures: Tunable Transmitter - Fixed Receiver (TTFR) and Fixed Transmitter - Tunable Receivers (FTTR). With TTFR, nodes can only receive packets on a fixed wavelength and can send packets on any wavelengths related to destination of packets. Disadvantage of this architecture is required as many wavelengths as there are nodes in the network. This is clearly a scalability limitation. In contrast, FTTR architecture has advantage that the number of nodes can be much larger than the number of wavelength. Source nodes send packet on a fixed channel (or wavelength) and destination nodes can received packets on any wavelength. If there are fewer wavelengths than there are nodes in the network, the nodes will also have to share all the wavelengths available for transmission. However the fixed wavelength approach of TTFR and FTTR bring low network utilization. Because source node with waiting data have to wait for an incoming empty slot on corresponding wavelength. Therefore this paper presents Tunable Transmitter - Tunable Receiver (TTTR) approach, in which the transmitting node can send a packet over any wavelengths and the receiving node can receive a packet from any wavelengths. Moreover, the self-similar distributed input traffic is used for evaluation of the performance of the proposed algorithm. The self-similar traffic performs better performance over long duration than short duration of the Poison distribution. In order to increase bandwidth efficiency, the Destination Stripping approach is used to mark the slot which has already reached the desired destination as an empty slot immediately at the destination node, so the slot does not need to go back to the source node to be marked as an empty slot as in the Source Stripping approach. MATLAB simulator is used to evaluate performance of FTTR, TTFR, and TTTR over 4 and 16 nodes ring network. From the simulation result, it is clear that the proposed algorithm overcomes higher network utilization and average throughput per node, and reduces the average queuing delay. With future works, mathematical analysis of those algorithms will be the main research topic.

  • PDF

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Sequential localization with Beacon Nodes along the Seashore for Marine Monitoring Sensor Network (해안에 설치된 비콘 노드를 이용한 해양 모니터링 센서의 순차적인 위치 파악)

  • Kim, Chung-San;Kim, Eun-Chan;Kim, Ki-Seon;Choi, Young-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.269-277
    • /
    • 2007
  • Wireless sensor network system is expected to get high attention in research for now and future owing to the advanced hardware development technology and its various applicabilities. Among variety of sensor network systems, the seashore and marine sensor network, which are extended to get sampling of marine resources, environmental monitoring to prevent disaster and to be applied to the area of sea route guidance. For these marine applications to be available, however, the provision of precise location information of every sensor nodes is essential. In this paper, the sequential localization algorithm for obtaining the location information of marine sensor nodes. The sequential localization is done with the utilization of a small number of beacon nodes along the seashore and gets the location of nodes by controling the sequences of localization and also minimizes the error accumulation. The key idea of this algorithm for localization is that the localization priority of each sensor nodes is determined by the number of reference nodes' information. This sequential algorithm shows the improved error performance and also provide the increased coverage of marine sensor network by enabling the maximum localization of sensor nodes as possible.

  • PDF

Fixed node reduction technique using relative coordinate estimation algorithm (상대좌표 추정 알고리즘을 이용한 고정노드 저감기법)

  • Cho, Hyun-Jong;Kim, Jong-Su;Lee, Sung-Geun;Kim, Jeong-Woo;Seo, Dong-Hoan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.2
    • /
    • pp.220-226
    • /
    • 2013
  • Recently, with the rapid development of factory automation and logistics system, a few workers were able to manage the broad workplace such as large vessels and warehouse. To estimate the exact location of these workers in the conventional wireless indoor localization systems, three or more fixed nodes are generally used to recognize the location of a mobile node consisting of a single node. However, these methods are inefficient in terms of node deployment because the broad workplace requires a lot of fixed nodes compared to workers(mobile nodes). Therefore, to efficiently deploy fixed nodes in these environments that need a few workers, this paper presents a novel estimation algorithm which can reduce the number of fixed nodes by efficiently recognizing the relative coordinates of two fixed nodes through a mobile node composed of three nodes. Also, to minimize the distance errors between mobile node and fixed node, rounding estimation(RE) technique is proposed. Experimental results show that the error rate of localization is improved, by using proposed RE technique, 90.9% compared to conventional trilateration in the free space. In addition, despite the number of fixed nodes can be reduced by up to 50% in the indoor free space, the proposed estimation algorithm recognizes precise location which has average error of 0.15m.

A Performance Analysis of Distributed Storage Codes for RGG/WSN (RGG/WSN을 위한 분산 저장 부호의 성능 분석)

  • Cheong, Ho-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.462-468
    • /
    • 2017
  • In this paper IoT/WSN(Internet of Things/Wireless Sensor Network) has been modeled with a random geometric graph. And a performance of the decentralized code for the efficient storage of data which is generated from WSN has been analyzed. WSN with n=100 or 200 has been modeled as a random geometric graph and has been simulated for their performance analysis. When the number of the total nodes of WSN is n=100 or 200, the successful decoding probability as decoding ratio ${\eta}$ depends more on the number of source nodes k rather than the number of nodes n. Especially, from the simulation results we can see that the successful decoding rate depends greatly on k value than n value and the successful decoding rate was above 70% when $${\eta}{\leq_-}2.0$$. We showed that the number of operations of BP(belief propagation) decoding scheme increased exponentially with k value from the simulation of the number of operations as a ${\eta}$. This is probably because the length of the LT code becomes longer as the number of source nodes increases and thus the decoding computation amount increases greatly.