• 제목/요약/키워드: wireless Sensor Networks

검색결과 2,293건 처리시간 0.029초

초고층 건물의 건전성 감시를 위한 변형률 기반 무선 센서 네트워크 기법의 기초적 연구 (Fundamental Research of Strain-based Wireless Sensor Network for Structural Health Monitoring of Highrise building)

  • 정은수;박효선;최석원;차호정
    • 한국방재학회:학술대회논문집
    • /
    • 한국방재학회 2007년도 정기총회 및 학술발표대회
    • /
    • pp.429-432
    • /
    • 2007
  • For smart structure technologies, the interests in wireless sensor networks for structural health monitoring are growing. The wireless sensor networks reduce the installation of the wire embedded in the whole structure and save the costs. But the wireless sensor networks have lots of limits and there are lots of researches and developments of wireless sensor and the network for data process. Most of the researches of wireless sensor network is applying to the civil engineering structure and the researches for the highrise building are required. And strain-based SHM gives the local damage information of the structures which acceleration-based SHM can not. In this paper, concept of wireless sensor network for structural health monitoring of highrise building is suggested. And verifying the feasibility of the strain-based SHM a strain sensor board has developed and tested by experiments.

  • PDF

무선센서네트워크에서의 취약성 및 보안 메카니즘의 분석 (Analyses of Vulnerability and Security Mechanisms in Wireless Sensor Networks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.805-808
    • /
    • 2009
  • Security has become a major concern for many real world applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all these approaches are based on wellknown cryptographic algorithms. At the same time, performance studies have shown that the applicability of sensor networks strongly depends on effective routing decisions or energy aware wireless communication. In this paper, we analyses vulnerability and security mechanisms in wireless sensor networks.

  • PDF

Evaluating an (m, k)-firm Deadline Real-time Stream Based on a Reliable Transport Protocol in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • 제10권2호
    • /
    • pp.129-134
    • /
    • 2012
  • As application-specific requirements for wireless sensor networks emerge, both real-time and reliable communications become major research challenges in wireless sensor networks due to the many constraints on nodes and wireless links. To support these services, several protocols have been proposed. However, since most of them were designed as well as developed for general purpose applications, it is not recommended that they be directly adapted to applications with special requirements. In this paper, we propose a way to extend the current reliable transport protocol to cover a special real-time service, the (m,k)-firm deadline stream, in wireless sensor networks. While the proposed scheme is basically built on the PSFQ protocol for reliability, some features have been newly developed to support the (m,k)-firm stream efficiently. Finally, simulation results are given to demonstrate the feasibility of the proposed scheme in high traffic and with failed links.

디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구 (Transaction Signing-based Authentication Scheme for Protecting Sinkhole Attack in Directed Diffusion based Wireless Sensor Networks)

  • 김태경
    • 디지털산업정보학회논문지
    • /
    • 제6권3호
    • /
    • pp.31-36
    • /
    • 2010
  • In this paper, We propose a transaction signing-based authentication scheme for protecting sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks such as denial of service attacks, selective delivery or data tamper etc. We analyze sinkhole attack methods in directed diffusion based wireless sensor networks. For the purpose of response to attack method, Transaction signing-based authentication scheme is proposed. This scheme can work for those sensor networks which use directed diffusion based wireless sensor networks. The validity of proposed scheme is provided by BAN logic.

Analytic Model of Energy of Router in Wireless Sensor Networks

  • 이동춘
    • 융합보안논문지
    • /
    • 제7권4호
    • /
    • pp.43-50
    • /
    • 2007
  • 센서 노드들의 전기에너지 양은 극히 제한적이고, 밧데리 교체는 무선 센서 망에서는 매우 어렵다. 본 논문은 다른 라우터에서 에너지 손질에 대한 수학적 모델을 제안하며, 직접 Diffusion 기반에 에너지 소비를 근거로 하여 해석한다.

  • PDF

무선 센서 네트워크에서의 에너지 효율 개선을 위한 동적 라우팅 프로토콜 (A Dynamic Routing Protocol for Energy Effectiveness in Wireless Sensor Networks)

  • 오세웅;전성택
    • 한국IT서비스학회지
    • /
    • 제6권1호
    • /
    • pp.141-149
    • /
    • 2007
  • Sensor node's mobility brings new challenges to data dissemination in large sensor networks. Frequent location updates of sensor nodes can lead to both excessive drain of sensor's limited battery supply and increased collisions in wireless transmissions. Conventional studies for routing protocols in wireless sensor networks are not enough to cover energy consumption and migration of sensor nodes. This study proposes a dynamic routing protocol based on the SPIN considering energy consumption and the migration, and also shows the effectiveness of the proposed routing protocol.

Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel

  • Joshi, Gyanendra Prasad;Nam, Seung Yeob;Acharya, Srijana;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.911-923
    • /
    • 2014
  • Ad hoc cognitive radio wireless sensor networks allow secondary wireless sensor nodes to recognize spectrum opportunities and transmit data. Most existing protocols proposed for ad hoc cognitive radio wireless sensor networks require a dedicated common control channel. Allocating one channel just for control packet exchange is a waste of resources for channel-constrained networks. There are very few protocols that do not rely on a common control channel and that exchange channel-negotiation control packets during a pre-allocated time on the data channels. This, however, can require a substantial amount of time to access the channel when an incumbent is present on the channel, where the nodes are intended to negotiate for the data channel. This study examined channel access delay on cognitive radio wireless sensor networks that have no dedicated common control channel.

Wireless sensor networks for long-term structural health monitoring

  • Meyer, Jonas;Bischoff, Reinhard;Feltrin, Glauco;Motavalli, Masoud
    • Smart Structures and Systems
    • /
    • 제6권3호
    • /
    • pp.263-275
    • /
    • 2010
  • In the last decade, wireless sensor networks have emerged as a promising technology that could accelerate progress in the field of structural monitoring. The main advantages of wireless sensor networks compared to conventional monitoring technologies are fast deployment, small interference with the surroundings, self-organization, flexibility and scalability. These features could enable mass application of monitoring systems, even on smaller structures. However, since wireless sensor network nodes are battery powered and data communication is the most energy consuming task, transferring all the acquired raw data through the network would dramatically limit system lifetime. Hence, data reduction has to be achieved at the node level in order to meet the system lifetime requirements of real life applications. The objective of this paper is to discuss some general aspects of data processing and management in monitoring systems based on wireless sensor networks, to present a prototype monitoring system for civil engineering structures, and to illustrate long-term field test results.

무선 센서 네트워크에서 에너지 효율적인 퍼지 기반 적응형 라우팅 알고리즘 및 시뮬레이션 (Fuzzy based Energy-Efficient Adaptive Routing Algorithm for Wireless Sensor Networks)

  • 홍순오;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제14권4호
    • /
    • pp.95-106
    • /
    • 2005
  • Recent advances in wireless sensor networks have led to many routing protocols designed for energy-efficiency in wireless sensor networks. Despite that many routing protocols have been proposed in wireless sensor networks, a single routing protocol cannot be energy-efficient if the environment of the sensor network varies. This paper presents a fuzzy logic based Adaptive Routing (FAR) algorithm that provides energy-efficiency by dynamically changing protocols installed at the sensor nodes. The algorithm changes protocols based on the output of the fuzzy logic which is the fitness level of the protocols for the environment. A simulation is performed to show the usefulness of the proposed algorithm.

  • PDF

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.