• Title/Summary/Keyword: 무선 컴퓨팅

Search Result 760, Processing Time 0.025 seconds

On-demand Geographic Routing Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 On-demand 위치 기반 라우팅 프로토콜)

  • Lee, Eui-Sin;Park, Soo-Chang;Jin, Min-Sook;Park, Ho-Sung;Kim, Tae-Hee;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.7
    • /
    • pp.495-499
    • /
    • 2009
  • An underlying assumption in geographic routing protocols, periodic position exchange among neighbors has two problems: (1) unnecessary energy consumptions of nodes in regions without data delivery and (2) position invalidation of neighbors in forwarding data. Hence, this paper proposes an on-demand geographic routing protocol in mobile wireless sensor networks. The proposed protocol make a sender acquire position information of only necessary neighbors to reduce energy consumption in data forwarding time and determine an optimal node among them as a receiver for relaying data to a destination by considering their mobility. Simulation results show that the proposed protocol is more efficient than an existing geographic routing protocol.

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

The Development of Mobile Grid System and Performance Evaluation (모바일 그리드 시스템의 개발 및 성능평가)

  • Kim Tae-Kyung;Kim Hee-Seung;Lee Hyun-Joo;Chung Tai-Myung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.581-588
    • /
    • 2005
  • The performance of mobile devices and wireless networks is improved rapidly and Mobility management skills such as Mobile IP and ad-hoc technology were developed. So the requirement of processing the distributed computing is highly increased in any place and any time or in the state of movement. Therefore we studied the mobile grid system to process the distributed applications properly in wireless networks. In addition to typical computational resources, Mobile Grid brings new resources such as sensor, mobile devices or other wireless devices to distributed computing for the purpose of resource-sharing. In this paper, we design and implement the mobile grid system in wireless lan network environment for the providing the grid service. Also, we evaluate the performance of mobile grid system using the processing the distributed applications in implemented mobile grid environments.

Development of Real Time Monitoring System based on Context-awareness for Wireless Sensor Networks (무선 센서네트워크에서 상황인식기반 실시간 감시시스템 개발)

  • Jo, Kyoung-Jin;Kim, Hee-Dae;Lee, Hyun-Jo;Sim, Chun-Bo;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.101-111
    • /
    • 2011
  • Due to recent development in wireless communication technologies and mobile information devices, the services on ubiquitous computing technology without time and place restriction have been spotlighted. Moreover, the interest of the Wireless Sensor Networks (WSNs) and context-awareness technologies have largely been escalating and their technologies utilization is active in the various applications such as healthcare, farm management and so on. However, the direct adaption of the existing context-awareness technique to the WSN technology has several drawbacks as follows. First, such systems waste precious energy of sensor nodes, due to unnecessary data transmissions. Secondly, since the existing work was designed to support only specific applications, it is required to implement a new context-awareness application for a specific purpose. Therefore, we, in this paper, propose a new real-time monitoring system based on context-awareness in WSNs. Our system not only enhances energy efficiency by reducing data transmissions by doing context-awareness on a sensor node, but also is scalable in terms of supporting new context-awareness functionalities through modularization.

Energy-aware Reed-Solomon Scheme for Improving Data Reliability in Solar-powered Wireless Sensor Networks (태양 에너지 기반 무선 센서 네트워크의 데이터 신뢰성 향상을 위한 에너지 적응형 Reed-Solomon 기법)

  • Jung, Jongwug;Kang, Minjae;Noh, Dong Kun;Cho, Sang Hoon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.122-127
    • /
    • 2017
  • The data link layer operates reliable internode communication in the OSI reference model. Generally, the forward error correction (FEC) method is used in the data link layer of the wireless sensor network (WSN) environment that has a high frequency of errors. However, the FEC method consumes a significant amount of energy due to its high error correction rate, which negatively affects the networks' lifespan. In contrast with battery-based technology, energy is regularly recharged in the solar-powered WSN to meet higher energy needs than required for basic operation of existing nodes. By efficiently utilizing this surplus energy, the proposed energy-aware FEC method can reduce the data loss rate with no decrement of the network lifetime. The method employs a trade-off relationship between the energy and data loss rate by adjusting the parity length in the FEC method to the energy state in each node. The performance of the proposed scheme was verified through a simulation.

Disjointed Multipath using Energy Efficient Face Routing in Wireless Sensor Networks (무선 센서 망에서 에너지 효율적인 페이스 라우팅을 활용한 분리된 다중 경로 방안)

  • Cho, Hyunchong;Kim, Cheonyong;Kim, Sangdae;Oh, Seungmin;Kim, Sang-Ha
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.116-121
    • /
    • 2017
  • In wireless sensor networks, the multipath prefers energy efficient routing method due to the characteristic of low-power sensor which uses geographic method to transmit data packet through information of the neighbor nodes. However, when multipath meets the routing fail area called hole area, path overlap problem can occur, resulting in failed maintenance of disjoint multipath. To solve this problem, multipath research studies have been performed to exploit the modeling and detouring method in routing fail area by keeping the disjoint multipath. However, in an energy point of view, additional method like modeling can lead to a lot of energy consumption of sensor node. Moreover, lots of energy consumption of sensor node can shorten the life span of sensor network. In this study, we proposed an energy efficient geographic routing by keeping the disjoint multipath in routing fail area. The proposed scheme exploited the face routing using the geographic recovery method without additional method like modeling.

Design and Implementation of a Mobile System for Exploiting the Internet Product Information Effectively (인터넷 상품정보의 효과적 제공을 위한 모바일 시스템의 설계 및 구현)

  • Ha Sangho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.493-498
    • /
    • 2005
  • With the advances of wireless technologies and mobile computing, m-commerce is being realized for several mobile devices such as PDAs and mobile phones. Currently, service contents in m-commerce are usually newly written to meet specific characteristics of the target mobile devices, thus requiring formidable efforts. Therefore, we should exploit the Internet product information currently being provided for e-commerce. However, bringing the Internet product to mobile devices is far from straightforward due to the many limitations of mobile devices such as little memory, small displays, low processing speeds, and so forth. In this paper, we first suggest a new model to effectively adapt the Internet product information for mobile phones. We then suggest a mobile system to implement the model. We then design and implement the system. Finally, we give experiments on the system.

An Operation Scheme of Local Sink in Geographic Routing for Wireless Sensor Networks (무선 센서 네트워크를 위한 위치 기반 라우팅에서 로컬 싱크 운영 기법)

  • Lee, Eui-Sin;Park, Soo-Chang;Jin, Min-Sook;Park, Ho-Sung;Kim, Tae-Hee;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.201-205
    • /
    • 2009
  • This paper addresses issues to efficiently collect and aggregate data of sources within a local and adjacent region in geographic routing for wireless sensor networks. We first introduce the concept of a local sink which collects and aggregates data form source nodes in the region and delivers the aggregated data to a global sink. We also design a model to determine an optimal location of the local sink and propose a mechanism to collect data through the local sink. Simulation results show that the proposed mechanism with the local sink is more efficient in terms of the energy and the data delivery ratio than the existing mechanism without the local sink in a geographic routing.

Implementation & Performance Analysis of Virtual Storage System Based on iSCSI Protocol in Wireless Networks (iSCSI 기반의 무선 네트워크 연결형 가상 저장장치 드라이버 구현 및 성능 분석)

  • Choi Sae-bom;Lim Hyotaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6A
    • /
    • pp.517-525
    • /
    • 2005
  • iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard ethernet switch and router for this kind of access, it can not only be applied to ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, focusing on this applicability, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the iSCSI initiator driver, which was originally designed for wired networks. Additionally, its potential with a wireless network is also evaluated.