• Title/Summary/Keyword: wireless protocol

Search Result 2,679, Processing Time 0.029 seconds

An Efficient Clustering Protocol with Mode Selection (모드 선택을 이용한 효율적 클러스터링 프로토콜)

  • Aries, Kusdaryono;Lee, Young Han;Lee, Kyoung Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.925-928
    • /
    • 2010
  • Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way since the energy is limited. The clustering algorithm is a technique used to reduce energy consumption. It can improve the scalability and lifetime of wireless sensor network. In this paper, we introduce a clustering protocol with mode selection (CPMS) for wireless sensor networks. Our scheme improves the performance of BCDCP (Base Station Controlled Dynamic Clustering Protocol) and BIDRP (Base Station Initiated Dynamic Routing Protocol) routing protocol. In CPMS, the base station constructs clusters and makes the head node with highest residual energy send data to base station. Furthermore, we can save the energy of head nodes using modes selection method. The simulation results show that CPMS achieves longer lifetime and more data messages transmissions than current important clustering protocol in wireless sensor networks.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Adaptive Range-Based Collision Avoidance MAC Protocol in Wireless Full-duplex Ad Hoc Networks

  • Song, Yu;Qi, Wangdong;Cheng, Wenchi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3000-3022
    • /
    • 2019
  • Full-duplex (FD) technologies enable wireless nodes to simultaneously transmit and receive signal using the same frequency-band. The FD modes could improve their physical layer throughputs. However, in the wireless ad hoc networks, the FD communications also produce new interference risks. On the one hand, the interference ranges (IRs) of the nodes are enlarged when they work in the FD mode. On the other hand, for each FD pair, the FD communication may cause the potential hidden terminal problems to appear around the both sides. In this paper, to avoid the interference risks, we first model the IR of each node when it works in the FD mode, and then analyze the conditions to be satisfied among the transmission ranges (TRs), carrier-sensing ranges (CSRs), and IRs of the FD pair. Furthermore, in the media access control (MAC) layer, we propose a specific method and protocol for collision avoidance. Based on the modified Omnet++ simulator, we conduct the simulations to validate and evaluate the proposed FD MAC protocol, showing that it can reduce the collisions effectively. When the hidden terminal problem is serious, compared with the existing typical FD MAC protocol, our protocol can increase the system throughput by 80%~90%.

Standardization Trends and Local Policy for Wireless Internet (무선인터넷 표준화 동향 및 국내 정책 방향)

  • Kim, Sung-Han;Park, Wung;Kim, Young-Tae;Park, Ki-Shik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.571-574
    • /
    • 2001
  • Wireless Internet is capable of transmitting data for voice, text and video by wireless network, and recently wireless internet industry is one of the most widely issued. And, Operators, device manufacturers and contents providers are busy in developing technology and standardization. In this paper, we focus on the trends of standardization for wireless internet to enhance the industry and to have a competition compared to other countries. Lastly, we analysed the government's policy for wireless internet.

  • PDF

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Wireless Sensor Network Protocol based on LEACH Protocol using Fuzzy (Fuzzy를 적용한 LEACH Protocol 기반 무선 센서 네트워크 프로토콜)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.115-121
    • /
    • 2017
  • A wireless sensor network is a network in which nodes equipped with sensors capable of collecting data from the real world are configured wirelessly. Because the sensor nodes are configured wirelessly, they have limited power such as batteries. If the battery of the sensor node is exhausted, the node is no longer usable. If more than a certain number of nodes die, the network will not function. There are many wireless sensor network protocols to improve energy efficiency, among which LEACH Protocol is a typical example. The LEACH protocol is a cluster-based protocol that divides sensor space into clusters and transmits and receives data between nodes. Therefore, depending on how the cluster is structured, the shape of the energy cow may decrease or increase. We compare the network lifetimes of the existing LEACH protocols and the three types of protocols that have been improved using fuzzy methods for cluster selection.

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks

  • Zhao, Liquan;Chen, Nan
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.500-517
    • /
    • 2017
  • In this paper, an improved zone-based routing protocol for heterogeneous wireless sensor networks is proposed. The proposed protocol has fixed the sized zone according to the distance from the base station and used a dynamic clustering technique for advanced nodes to select a cluster head with maximum residual energy to transmit the data. In addition, we select an optimal route with minimum energy consumption for normal nodes and conserve energy by state transition throughout data transmission. Simulation results indicated that the proposed protocol performed better than the other algorithm by reducing energy consumption and providing a longer network lifetime and better throughput of data packets.

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

  • Chen, Tien-Ho;Shih, Wei-Kuan
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.704-712
    • /
    • 2010
  • Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.

A Robust Transport Protocol Based on Intra-Cluster Node Density for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 내 노드 밀도 기반 트랜스포트 프로토콜)

  • Baek, Cheolheon;Moh, Sangman
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.6
    • /
    • pp.381-390
    • /
    • 2015
  • The efficient design of a transport protocol contributes to energy conservation as well as performance improvement in wireless sensor networks (WSNs). In this paper, a node-density-aware transport protocol (NDTP) for intra-cluster transmissions in WSNs for monitoring physical attributes is proposed, which takes node density into account to mitigate congestion in intra-cluster transmissions. In the proposed NDTP, the maximum active time and queue length of cluster heads are restricted to reduce energy consumption. This is mainly because cluster heads do more works and consume more energy than normal sensor nodes. According to the performance evaluation results, the proposed NDTP outperforms the conventional protocol remarkably in terms of network lifetime, congestion frequency, and packet error rate.

A Weather Monitoring System for Local Area Using an Energy-balanced Hybrid WSN Protocol (에너지 균등 하이브리드 WSN 프로토콜 기반 국지 기상 관측 시스템)

  • Lee, Hyung-Bong;Chung, Tae-Yun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.4
    • /
    • pp.193-203
    • /
    • 2014
  • This paper implements a weather monitoring system based on wireless sensor network. The wireless sensor network protocol proposed in this paper adopts a TDMA styled MAC. The protocol is designed to balance the energy consumption among sensor nodes. Other purposes of the protocol are to avoid the hidden terminal problem in 2-hop star topology, and to allow a CSMA styled communication in a given time slot to support emergent messages. Also, this paper develops the hardware of sensor node, gateway and electric generator based on solar and windy energy. The test results on the implemented system show that the time slot of each node is shifted in circular manner to balance the waiting time for transmission, and the reliability of wireless communication is over 99%.