• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.037 seconds

Design and Implementation of Wireless Protocol for Managing Rooms in a Large Building (대형 건물 객실 관리를 위한 무선 프로토콜 설계 및 구현)

  • Jeong, Woo-Jeong;Choi, Sung-Chul;Jeong, Kyu-Seuck;Kim, Jong-Heon;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.27-36
    • /
    • 2010
  • In wireless networks environment, there are attempts for constructing systems through which we can monitor and control various electronic devices used in large buildings at remoteness by using Zigbee protocol. Since address assignment method of DAA in Zigbee has a depth restriction, we cannot construct a network in large buildings. And also communication failures are frequent in a large network since broadcast storm can be occurred due to frequent broadcasts among a lot of nodes at AODV routing used in Zigbee. In order to solve these problems, in this paper, we propose a novel protocol which has improved the restriction of depth by using a fixed address assignment method, and has enhanced the broadcast occurrence by devising a static routing method to a packet movement between floors. Regardless of entire network, additionally, this was to enable internal communication reliably by composing an independent PAN. Specially, in this paper, we implemented the proposed wireless protocol and proved stability and practicality through experiment appliances of control of devices established in a large building.

Smart Dairy Management System Development Using Biometric/Environmental Sensors and Farm Control Gateway (생체 환경 정보 센싱 모듈 및 농장 제어 게이트웨이를 이용한 스마트 낙농 관리 시스템 개발)

  • Park, Yongju;Moon, Jun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.1
    • /
    • pp.15-20
    • /
    • 2016
  • Recently, the u-IT applications for plants and livestock become larger and control of livestock farm environment has been used important in the field of industry. We implemented wireless sensor networks and farm environment automatic control system for applying to the breeding barn environment by calculating the THI index. First, we gathered environmental information like livestock object temperature, heart rate and momentum. And we also collected the farm environment data including temperature, humidity and illuminance for calculating the THI index. Then we provide accurate control action roof open and electric fan in of intelligent farm to keep the best state automatically by using collected data. We believed this technology can improve industrial competitiveness through the u-IT based smart integrated management system introduction for industry aversion and dairy industries labor shortages due to hard work and old ageing.

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Performance Analysis of WiMedia D-MAC Communications for a Shipboard Wireless Bridge (선내 무선 브릿지용 와이미디어 D-MAC 통신의 성능분석)

  • Hur, Kyeong;Jeong, Min-A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.597-607
    • /
    • 2014
  • An integrated ship area network has functionality of remote control and autonomous management of various sensors and instruments embedded or boarded in a ship. For such environment, a wireless bridge is essential to transmit control and/or managing information to sensors or instruments from a central integrated ship area network station. In this paper, one of reliable schemes of wireless bridge using WiMedia distributed MAC (D-MAC) protocol is proposed to increase a communication reliability. Simulation results show that the proposed wireless bridge using WiMedia D-MAC protocol guarantees reliable communications between 2-hop devices.

Enhanced MAC Scheme to Support QoS Based on Network Detection over Wired-cum-Wireless Network

  • Kim, Moon;Ye, Hwi-Jin;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2006
  • In these days, wireless data services are becoming ubiquitous in our daily life because they offers several fundamental benefits including user mobility, rapid installation, flexibility, and scalability. Moreover, the requests for various multimedia services and the Quality of Service (QoS) support have been one of key issues in wireless data communications. Therefore the research relative to Medium Access Control (MAC) has been progressing rapidly. Especially a number of QoS-aware MAC schemes have been introduced to extend the legacy IEEE 802.11 MAC protocol which has not guaranteed any service differentiation. However, none of those schemes fulfill both QoS features and channel efficiency although these support the service differentiation based on priority. Therefore this paper studies a novel MAC scheme, referred to as Enhanced Distributed Coordination Function with Network Adaptation (EDCF-NA), for enhancements of both QoS and medium efficiency. It uses a smart factor denoted by ACK rate and Network Load Threshold (TH). In this paper, we study how the value of TH has effect on MAC performance and how the use of optimal TH pair improves the overall MAC performance in terms of the QoS, channel utilization, collision rate, and fairness. In addition, we evaluate and compare both the performance of EDCF-NA depending on several pairs of TH and the achievement of various MAC protocols through simulations by using Network Simulator-2 (NS-2).

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Wired/Wireless Combination Network Plan for Realtime Wiress Multimedia Application Service (Realtime Wiress Multimedia Application service를 위한 유/무선 통합 네트워크 설계)

  • Eon, Ki-Boo;Lee, Mung-Hoon;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.109-112
    • /
    • 2005
  • As the degree of use of network is increasing the need for building the basic of the stable network service is being needed a lot. Also the engineers require the traffic control for the best application and management and bandwidth management urgently. To solve these problems, there were no other ways of increasing the bandwidth of lines until now. However, this solution has the limit that the cost is too high and the traffic problem is growing continuously. On this study, it is suggested that through the planning the wired /wireless combination network design offering the service of QoS, Multicast, Mobile, realtime multimedia traffic delay without packet loss will be dealth with.

  • PDF

Yellow-Light TCP: Energy-Saving Protocol for Mobile Data Transmission (Yellow-Light TCP: 모바일 데이터 전송을 위한 에너지 절감형 프로토콜)

  • Choi, Won-Jun;Ramneek, Ramneek;Seok, Woo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.478-490
    • /
    • 2015
  • Abundant data has been generated over the internet as the arrival of information age. To share the information, Wired, wireless network are required to transmit the data. Especially, In the wireless network which is using mobile device based on battery, energy consumption is growing due to uploading, downloading the abundant data on mobile device. In order to solve the problem, This paper addresses the protocol of the modified TCP congestion control that is being used for the most network protocol to save energy.

An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks

  • Liu, Kai;Zhang, Yupeng;Liu, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.778-798
    • /
    • 2014
  • This paper proposes a novel exposed-terminal-eliminated medium access control (ETE-MAC) protocol by combining channel reservation, collision avoidance and concurrent transmissions to improve multi-access performance of the multihop wireless networks. Based on the proposed slot scheduling scheme, each node senses the control channel (CCH) or the data channel (DCH) to accurately determine whether it can send or receive the corresponding packets without collisions. Slot reservation on the CCH can be simultaneously executed with data packet transmissions on the DCH. Therefore, it resolves the hidden-terminal type and the exposed-terminal type problems efficiently, and obtains more spatial reuse of channel resources. Concurrent packet transmissions without extra network overheads are maximized. An analytical model combining Markov model and M/G/1 queuing theory is proposed to analyze its performance. The performance comparison between analysis and simulation shows that the analytical model is highly accurate. Finally, simulation results show that, the proposed protocol obviously outperforms the link-directionality-based dual-channel MAC protocol (DCP) and WiFlex in terms of the network throughput and the average packet delay.