• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.025 seconds

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.

New Energy Efficient Clear Channel Assessment for Wireless Network

  • Shin, Soo-Young;Ramachandran, Iyappan;Roy, Sumit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1404-1422
    • /
    • 2011
  • In this paper, a new clear channel assessment (CCA) method: cascaded-CCA, is proposed. The primary motivation for the proposed approach is to integrate the respective advantages of two standard CCA mechanisms, energy detect and preamble detect, to arrive at a new dual threshold CCA family that can provide greater flexibility towards tuning MAC performance. Cascaded-CCA integrates energy efficiency of the energy detector (ED) and the reliability of the preamble detector (PD). The probability of detection/false alarm and power consumption of cascaded-CCA in the CCA modules of IEEE 802.11b are analyzed and compared with ED and PD as an example. The performance of cascaded-CCA is explored via MATLAB simulations that implement the CCA modules and medium access control (MAC) protocol for IEEE 802.11 and IEEE 802.15.4. Simulation results showed that cascaded-CCA improves the energy efficiency significantly compared to ED-only or PD-only CCA. In addition, ED, PD, and cascaded CCA are applied to a cognitive network scenario to validate the effectiveness of the proposed cascaded-CCA.

A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique (ZCN과 N2N 인증 기법을 이용한 패킷 전송에 대한 신뢰성 향상에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2015
  • MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam;Joshi, Pallavi;Raghuvanshi, Ajay Singh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1849-1876
    • /
    • 2022
  • Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

Implementation of Efficient Mobile Monitoring System of the GreenHouse Environment Data (온실 환경 데이터의 효과적인 모바일 모니터링 시스템 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.572-579
    • /
    • 2009
  • A monitoring system needs many parameters to increase devices for monitoring data and to support various services. In particular, monitoring the status of a device in a wireless mobile environment has a difficulty in displaying multi data in a limited screen size, and transfer of the status data of a device into a network is largely related with network traffic. The research aims at designing a control board that collects data in order to effectively manage a greenhouse environment system. Also, the research tries to appropriately operate devices, environment data monitoring, and the control of each device by realizing a multiplexed interface based on a web. Thus, in the case in which a distributed client was a computer, monitoring and control were obtained with a web browser through the Lab VIEW web server of a server or local control module in order to effectively monitor and control according to the status of a user. In the case in which a client was a PDA, application of a wireless mobile considering the scale and data processing capacity of a displayer was connected. As a result of the research, we could confirm a satisfactory outcome from the viewpoint of a human-centered design by supplying adaptability and mobility according to the environment of a user.

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

Development and Verification of Zigbee-Based Monitoring and Control System for Electric Heat Tracing (Electric Heat Tracing을 위한 Zigbee 기반 통합 감시제어 시스템의 개발 및 검증)

  • Park, Sung-Woo;Park, Sun-Eng
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1395-1402
    • /
    • 2015
  • An electric heat tracing system manages the temperature of pipes used in a plant. We propose a Zigbee-based wireless system so called the TESCON(: TEmperature Sensing and CONtrol) to monitor and control the electric heat tracing system in an integrated way. Simulations have been done to analyze the performance of the TESCON system. The performance of the TESCON system is validated by obtaining similar results via testbed operation. We also suggest an extension method of the TESCON system based on the hierarchical tree topology by adopting techniques such as network partition, channel reuse and frame aggregation.

Antenna Selection and Power Control Method for Uniform Circular Array Antennas Beamforming (원형 배열 안테나 빔 형성을 위한 안테나 선택 및 제어 방법)

  • Park, Seongho;Park, Chul;Kim, Hanna;Chung, Jaehak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.1
    • /
    • pp.68-76
    • /
    • 2015
  • This paper proposes the antenna selection scheme and power control algorithms of multiple nodes beamforming when the vehicles equipped with circular array antennas is moving and construct mobile mesh networks. The proposed antenna selection scheme chooses beamforming antenna elements considering antenna radiation gain and allows duplicated antenna selection for multiple adjacent nodes. The proposed power control algorithms maximize SIR for the duplicated antenna selection. The simulation demonstrates that the proposed antenna selection and power control achieve 2.5dB higher SIR gain than that of conventional methods when two nodes are apart from $15^{\circ}$.

A Ubiquitous Home Network System for Managing Environment-Information Sensors using Image Processing (영상 처리를 이용하여 주변 환경 센서를 관리하기 위한 유비쿼터스 홈 네트워크 시스템)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.931-942
    • /
    • 2010
  • A home network provides users with a variety of information services. The kind and quality of the services can be substantially enhanced by utilizing a variety of data from sensors. However, home networks currently limit their potential by focusing on providing multimedia services rather than services utilizing sensor data. Outdoor electronics are frequently made in a form that emphasizes only certain limited functions in contrast to home appliances. Thus, sensors with one or two functions rather than many can be used in outdoor systems and their use will be more economical than using sensor nodes indoors with more complex home appliances. In this study, we chose to work with motion sensors as they have many potential uses, and we selected a parking lot control system with to use the motion sensors. This parking lot control system was implemented and applied as part of a home network. For this purpose, we defined and implemented a protocol to manage the network in a ubiquitous sensor network environment for the wireless home network in this study. Although a network management system in a Ubiquitous Sensor Network (USN) related to this study is being advanced for other projects, the protocol interface and message system have not yet been clearly defined for use in a general purpose network or in an extension into heterogeneous kinds of networks, communication support, etc. Therefore, USN network management should be conducted for management of faults, composition, power, and applications. To verify the performance of the protocol interface designed in this study, we designed and implemented the necessary units (sensor nodes, sensor gateway, and server) for each network section and, with them, proved the validity of this study.

Performance Lmprovements of Self-Similar Traffic Congestion Control of Multiple Time Scale Under in TCP-MT network (TCP-MT 네트워크에서 다중 시간 간격을 이용한 자기유사성 트래픽 혼잡제어 성능개선)

  • Na Ha-Sun;Kim Moon-Hwan;Ra Sang-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1239-1247
    • /
    • 2005
  • It is important to improve TCP performance in Self-similar TCP network where signalling between the same end nodes through bidirectional traffic routes. In wireless link, the traffic limitation pattern occurred in two or more TCP connections is applied into MPEC video control as multi time-interval congestion control. For TCP update variable, we extend TCP and perform as function call, and we study a method of relating TCP with LTS module controlling with the information type that is overcoming the limit of feedback loop determined by RTT. For comparison, we measure the TCP throughput without LTS and verify the fairness by means of meta control. The improved TCP performance is shown by that the number of connections of traffic congestion control increases when RTT increases.