• Title/Summary/Keyword: wsn

Search Result 891, Processing Time 0.026 seconds

Performance Analysis of IEEE 802.15.4/ZigBee System in Various Channel Environments (다양한 채널 환경에서 IEEE 802.15.4/ZigBee 시스템의 성능 분석)

  • Moon, Sangmi;Kim, Bora;Malik, Saransh;Kim, Youngil;Yeo, Kunmin;Kim, Daejin;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.22-32
    • /
    • 2013
  • Wireless Sensor Network(WSN) has attracted great interest recently and the necessity of ZigBee has appeared to standardize and apply the upper layer specification based on the IEEE 802.15.4 standard specification in industrial field. Currently, there are many studies about the IEEE 802.15.4/ZigBee communication channel. And it is subject of interest to analyze the performance in various channel environments. In this paper, we propose channel models through the analysis of the IEEE 802.15.4 radio wave propagation characteristics in various channel environments. Also, we have analyzed the performance of the IEEE 802.15.4/ZigBee for the standard of physical layer of 2.4GHz band in each channel environments.

A Study on Land Warrior System Design Based on IEEE 802.15.4 (IEEE 802.15.4 기반의 미래병사체계 시스템 설계에 관한 연구)

  • Heo, Jun;Lee, Sang-Jin;Choi, Yong-Hoon;Choi, Hyo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.71-80
    • /
    • 2012
  • In this paper, applications that require low-speed data rate on personal area network to operate the Land Warrior system is proposed. These applications can refer to WSN(wireless sensor network) technology. However, this technology is not suitable to support various data transmission rate. A suitable CSMA/CA algorithm for Land Warrior System in order to solve these existing system problems is proposed. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of Land Warrior system model and CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.

Environment Adaptive WBAN Routing based on Residual energy (에너지량에 기반한 환경 적응 WBAN 라우팅 알고리즘)

  • Kim, Wee-Yeon;Kim, Dae-Young;Shin, Sang-Bae;Cho, Jin-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.89-99
    • /
    • 2011
  • In this paper, we propose an routing algorithm for ultra low power and high reliable transmission in WBAN environment. This algorithm is to minimize energy consumption and to maximize the life and reliability for medical devices. Also, this algorithm is not only medical devices but also non-medical devices is to minimize energy consumption and to maximize the life of device. The combination of the distance from the previous node and residual energy calculates weight. The calculated weight is used to calculate the weight of full path by cumulative weights. The full path to the smallest of the weights are set to the path. Also this algorithm is able to select another path to avoid the error path by determining the link status between nodes, when occurs link error and congestion. In this paper, we show that WSN routing algorithm based on shortest hop count routing algorithm and EAR routing algorithm compared to ensure high reliability and low power characteristic of WBAN to be verified through simulations.

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

Reliable Data Transfer using Path-Reliability and Implicit ACK on Wireless Sensor Network (무선 센서 네트워크에서 경로별 신뢰도와 묵시적 ACK를 사용한 신뢰성 보장 전송기법)

  • Lee, Ga-Won;Lee, Jun-Hyuk;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.17-30
    • /
    • 2010
  • Many applications in Wireless Sensor Networks require collecting all data without loss from nodes. End-to-End data retransmission, which is used in the Internet for reliable transport, becomes very inefficient in Wireless Sensor Networks, since wireless communication, and constrained resources pose new challenges. We look at factors affecting reliability, and search for efficient combinations of the possible options. This paper proposes an efficient Overhearing based reliable transfer protocol in Wireless Sensor Networks by introducing Selective and implicit Acknowledgement. Finally, it is clarified that the proposed scheme is efficient for reliable data transfer in WSN.

Study on Wireless Acquisition of Vibration Signals (진동신호 무선 수집에 대한 연구)

  • Lee, Sunpyo
    • Journal of Sensor Science and Technology
    • /
    • v.27 no.4
    • /
    • pp.254-258
    • /
    • 2018
  • A Wi-Fi signal network (WSN) system is introduced in this paper. This system consists of several data-transmitting sensor modules and a data-receiving server. Each sensor module and the server contain a unique intranet IP address. A piezoelectric accelerometer with a bandwidth of 12 kHz, a 24-bit analog-digital converter with a sampling rate of 15.625 kS/s, a 32-bit microprocessor unit, and a 1-Mbps Wi-Fi module are used in the data-transmitting sensor module. A 300-Mbps router and a PC are used in the server. The system is verified using an accelerometer calibrator. The voltage output from the sensor is converted into 24-bit digital data and transmitted via the Wi-Fi module. These data are received by a Wi-Fi router connected to a PC. The input frequencies of the accelerometer calibrator (320 Hz, 640 Hz, and 1280 Hz) are used in the data transfer verification. The received data are compared to the data retrieved directly from the analog-to-digital converter used in the sensor module. The comparison shows that the developed system represents the original data considerably well. Theoretically, the system can acquire vibration signals from 600 sensor modules at an accelerometer bandwidth of 15.625 kHz. However, delay exists owing to software processes, multiplexing between sensor modules, and the use of non-real time operating system. Hence, it is recommended that this system may be used to acquire vibration signals with up to 10 kHz, which is approximately 70% of the theoretical maximum speed of the system. The system can be upgraded using parts with higher performance

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.

Implementation of Personalized Mobile Agent System using Agilla in Ubiquitous Sensor Network (USN환경에서 Agilla를 이용한 개인화된 모바일 에이전트 시스템 구현)

  • Kim, Gang-Seok;Lee, Dong-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.203-210
    • /
    • 2011
  • The current sensor network analyzes the data collected by the sensing of fixed sensor nodes and provides a service. However, this method cannot actively handle the state and the change in the position of people, 'the target for sensing and the change in the environment', including home automation, building automation and real-time road & weather information, and healthcare environment, etc. To support a dynamic situation which is appropriate for an individual in this diverse environment, it is necessary to provide actively differentiated specific information according to the movement of people and the changes in the environment. In this study, a individualized sensor mobile agent middleware which provides the individualized information (the location of fire incidence and the trace for the path of spread), has been realized through the sensor network environment constructed by the installation of wireless sensor nodes mounted with mobile agent middlewares in buildings.

A Period Adaptive Wakeup Technique based on Receive Prediction for WSN (무선 센서 네트워크를 위한 수신 예측 기반 주기 적응적 웨이크업 기법)

  • Lee, Kyung-Hoon;Lee, Hak-Jai;Kim, Young-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.11
    • /
    • pp.1265-1270
    • /
    • 2015
  • For the sensor node or collection node operating with a battery in a wireless sensor network, MAC protocols with improved energy efficiency are important performance factors. In this paper, in order to improve the restrictive capability in accordance with the fixed activity period of the duty cycle technology in the MAC protocol for wireless sensor networks, we propose a periodic adaptive wakeup technique based on receive prediction. The proposed technique is through a performance evaluation using the CC2500 RF transceiver and C8051F330 microcontroller based wireless node, to analyze the minimum active period. As a result, it was confirmed that it is possible to improve energy efficiency by adaptively changing the sleep period in accordance with the change of period.

Two-Phase Localization Algorithm in Wireless Sensor Networks (무선 센서 네트워크에서의 2단계 위치 추정 알고리즘)

  • Song Ha-Ju;Kim Sook-Yeon;Kwon Oh-Heum
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.172-188
    • /
    • 2006
  • Sensor localization is one of the fundamental problems in wireless sensor networks. Previous localization algorithms can be classified into two categories, the GGB (Global Geometry-Based) approaches and the LGB (Local Geometry-Based). In the GGB approaches, there are a fixed set of reference nodes of which the coordinates are pre-determined. Other nodes determine their positions based on the distances from the fixed reference nodes. In the LGB approaches, meanwhile, the reference node set is not fixed, but grows up dynamically. Most GGB algorithms assume that the nodes are deployed in a convex shape area. They fail if either nodes are in a concave shape area or there are obstacles that block the communications between nodes. Meanwhile, the LGB approach is vulnerable to the errors in the distance estimations. In this paper, we propose new localization algorithms to cope with those two limits. The key technique employed in our algorithms is to determine, in a fully distributed fashion, if a node is in the line-of-sight from another. Based on the technique, we present two localization algorithms, one for anchor-based, another for anchor-free localization, and compare them with the previous algorithms.

  • PDF