• Title/Summary/Keyword: 싱크

Search Result 753, Processing Time 0.025 seconds

SB-MAC : Energy efficient Sink node Based MAC protocol for Wireless Sensor Networks (무선 센서 네트워크 에서 에너지 효율적인 싱크노드 기반 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.177-182
    • /
    • 2014
  • In this paper, we propose an energy efficient sink node based MAC protocol for Wireless Sensor Networks (WSNs). The proposed sink node-based MAC (SB-MAC) protocol uses a RB(rapid beacon) frame to save sender's energy consumption and to reduce transmission delay. The RB frame is a modified IEEE 802.15.4 beacon frame. The RB frame contains the length of the sender nodes data. Using this information other nodes except sender and receiver nodes can be stay sleep mode long time to reduce energy consumption. Results have shown that the SB-MAC protocol outperformed other protocols like X-MAC and RI-MAC in terms of packet delivery delay and energy consumption. The SB-MAC protocol is especially energy efficient for the networks with one sink node and many senders.

Detecting Inner Attackers and Colluded nodes in Wireless Sensor Networks Using Hop-depth algorithm (Hop-depth 알고리즘을 이용한 무선 센서 네트워크상에서의 내부공격자 및 공모노드 검출)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.113-121
    • /
    • 2007
  • Commonly, in the Sensor Network that composed with multiple nodes uses Ad-hoc protocol to communicate each other. Each sensed data packets are collected by base node and processed by Host PC. But the Ad-hoc protocol is too vulnerable to Sinkhole attack, where the intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or changes the data passing through it. The Sinkhole attack increases overhead over the network and boosts energy consumption speed to decrease network's life time. Since the other attacks can be easily adopted through sinkhole attack, the countermeasure must be considered carefully. In this paper, we proposed the Hop-depth algorithm that detects intruder in Sinkhole attack and colluded nodes. First, the proposed algorithm makes list of suspected nodes and identifies the real intruder in the suspected node list through the Hop-depth count value. And recalculates colluder's path information to find the real intruder. We evaluated the performance of the proposed algorithm using NS2. We compared and analyzed the success ratio of finding real intruder, false positive ratio, false negative ratio, and energy consumption.

A Method for Constructing Multi-Hop Routing Tree among Cluster Heads in Wireless Sensor Networks (무선 센서 네트워크에서 클러스터 헤드의 멀티 홉 라우팅 트리 구성)

  • Choi, Hyekyeong;Kang, Sang Hyuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.763-770
    • /
    • 2014
  • In traditional routing protocols including LEACH for wireless sensor networks, nodes suffer from unbalanced energy consumption because the nodes require large transmission energy as the distance to the sink node increase. Multi-hop based routing protocols have been studied to address this problem. In existing protocols, each cluster head usually chooses the closest head as a relay node. We propose LEACH-CHT, in which cluster heads choose the path with least energy consumption to send data to the sink node. In our research, each hop, a cluster head selects the least cost path to the sink node. This method solves the looping problem efficiently as well as make it possible that a cluster head excludes other cluster heads placed farther than its location from the path, without additional energy consumption. By balancing the energy consumption among the nodes, our proposed scheme outperforms existing multi-hop schemes by up to 36% in terms of average network lifetime.

A Method of the Grandmaster Selection and the Time Synchronization Using Single TimeSync Frame for Audio/Video Bridging (동기식 이더넷에서 단일 타임싱크 프레임을 이용한 그랜드마스터 결정 및 시간 동기 방법)

  • Kang, Sung-Hwan;Lee, Jung-Won;Kim, Min-Jun;Eom, Jong-Hoon;Kwon, Yong-Sik;Kim, Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.112-119
    • /
    • 2008
  • Today, A matter of concern of home network technology increase. The standard of communication between home network devices are required. IEEE 802.1 AVB(Audio/Video Bridging) specifies transmission method for time-sensitive data between these devices using Ethernet in bridged local area networks. IEEE 802.1 AVB and IEEE 1588 PTP(Precision Time Protocol) have various message type for grandmaster selection and synchronize the devices. These messages bring on complexity protocol. We propose a method that uses Single TimeSync frame in order to the problem. Our proposal is appropriate process complexity and low transmission delay for home network by using the TimeSync frame. Furthermore, after all devices are adjusted to the single TimeSync frame, a resource reservation, a forwarding and queueing rule are needed for a time-sensitive application.

A Study on the Heat Sink with internal structure using Peltier Module in the Forced Convection (강제대류에서 펠티에 소자를 이용한 내부터널 구조를 가지는 히트싱크에 관한 연구)

  • Lee, Min;Kim, Tae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3410-3415
    • /
    • 2014
  • The heat generated by electronic devices can result in performance degradation. Therefore, a heat sink has been used to release the operating heat into the air outside. This study addressed a methodology for a heat sink with an inner tunnel. Under forced convection conditions, the heat transfer characteristics were different so the cooling and heating performances were studied for the heat sink with an inner tunnel. This was evaluated by performing the experimental test examining the heat transfer characteristics related to the variance in time and temperature distribution. In the cooling experiment, the temperature of the A-shape was lower than that of the B-shape, when the voltage was 10 V. These experimental results indicate the optimal cooling effect. In a heating experiment, the temperature of the A-shape was higher than that of the B-shape, when the voltage was 13 V. The experimental results showed that the temperature and efficiency of the A-shape were higher than those of the B-shape.