• Title/Summary/Keyword: 중계 노드

Search Result 199, Processing Time 0.025 seconds

A Study on the Implementation of Zigbee Sensor Node for Building USN Using only Transmission of Fire Sensing Data (화재감지데이터 전송용 USN망 구축을 위한 지그비 센서노드 구현)

  • Cheon, Dong-Jin;Jung, Do-Young;Kwak, Dong-Kurl
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.75-81
    • /
    • 2009
  • In this paper, USN of wireless communication with easy to install and effectiveness with variety information gathering has been proposed as a alternative of wired-based line for transmission of fire sensing data. But, The sensor node using USN should be considered for wireless transmission range and reliability of information. In this study, the zigbee protocol sensor node was implemented and then tested transmission range of sensor node as 10m interval using voltage information of DC 3V & 5V. Here, maximum transmission distance was confirmed 90m inside-outside. When used mesh routing relay node, distance was not limited. In USN network building, when fire sensing data transmitted, the sensing data same between direct sensing data from sensor and collecting data at USN. Therefore, was confirmed reliability for transmission range and information of proposed zigbee sensor node.

A Multi-hop Cooperative Transmission Protocol in Mobile Ad-hoc Wireless Networks (모바일 애드혹 무선 네트워크에서 멀티 홉 협력 전송 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.17-22
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol over Rayleigh fading channels. In the proposed protocol, the multi-hop cooperative transmission is used to improve the system performance. Due to broadcast nature, we do not limit the receiving node to be only the next node, but the destination and all the nodes between the transmitting node and the destination. The proposed protocol can hence save the average transmit power, compared with multi-hop direct transmission protocol due to the skipped transmissions from some intermediate nodes or chosen relays. The proposed scheme is implemented and evaluated in mobile ad-hoc wireless networks.

MAC Protocol considering Data Urgency for EH-WSN (EH-WSN에서 데이터의 긴급성을 고려한 MAC프로토콜)

  • Park, Gwanho;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.304-305
    • /
    • 2019
  • Wireless sensor networks are used in various applications due to the flexibility of network. In particular, the energy harvesting wireless sensor network (EH-WSN) has been introduced to solve the power limitation problem, and the application range of the sensor network is further expanded. In order to transmit the sensed data to the destination node, the MAC protocol considering the power of the nodes has been studied. The power situation and the urgency of the data are important elements of data transmission, and a medium access control protocol that comprehensively considers data urgency and power of nodes is required. In this paper, we propose a medium access control protocol which can select relay nodes according to power situation and urgency of data.

  • PDF

A Study on Fake Data Filtering Method of CCN (콘텐츠 중심 네트워킹 환경에서의 Fake Data Filtering Method 연구)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.155-163
    • /
    • 2014
  • To enhance network efficiency, content-centric networking (CCN) proposes that intermediated network nodes on a content-delivery path temporally cache transmitted contents. Then if an intermediated node receives a content request message (Interest) for previously cached content, the node directly transmits the cached content as a response message (Data) to requestors and finishes the transmission of the received Interest. Since Interest is performed by intermediated network nodes, it is possible to efficiently transmit contents and to effectively solve a network congestion problem caused around contents sources. For that, CCN utilizes both content store to temporarily cache content and pending Interest table (PIT) to record Interest incoming Face. However, it has mentioned the possibility of denial service attack using both the limitation of PIT resource and fake Interests. In this paper, we briefly describe the presented PIT flooding attack utilizing fake Interest. Then we introduce new attack possibility using fake Data and propose a countermeasure for the proposed attack. Also we evaluate the performance of our proposal.

A Connection Setup Scheme to Mobile Sink in Sensor Networks (센서 네트워크에서 이동싱크로의 연결설정 방안)

  • Park, Sang-Joon;Lee, Jong-Chan;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.1
    • /
    • pp.9-16
    • /
    • 2008
  • The sink mobility can request frequent routing change in sensor networks. By active mobility a sink can gather needed information easily so that the network availability will be higher. However, instead static sink system, the connection between sensor nodes and a mobile sink can be changed continuously. That is, the rerouting should be implemented caused by the routing alteration. It is two connection setups for the mobile sink system: the connection from sink to sensor nodes and the connection from sensor nodes to sink. However, sensor nodes actually have many functional limitations. Hence, the low cost scheme will be needed for the connection setup from sensor nodes to the mobile sink. In this paper, we propose an agent scheme to the connection setup from sensor nodes to the mobile sink. The agent scheme provides the reliable setup scheme to the connection by using an agent sector.

  • PDF

An Energy-Efficient Data-Centric Routing Algorithm for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 데이터 중심 라우팅 알고리즘)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2187-2192
    • /
    • 2016
  • A data-centric routing protocol considering a data aggregation technique at relay nodes is required to increase the lifetime of wireless sensor networks. An energy-efficient data-centric routing algorithm is proposed by considering a tradeoff between acquisition time and energy consumption in the wireless sensor network. First, the proposed routing scheme decides the sink node among all sensor nodes in order to minimize the maximum distance between them. Then, the proposed routing extends its tree structure in a way to minimize the link cost between the connected nodes for reducing energy consumption while minimizing the maximum distance between sensor nodes and a sink node for rapid information gathering. Simulation results show that the proposed data-centric routing algorithm has short information acquisition time and low energy consumption; thus, it achieves high energy efficiency in the wireless sensor network compared to conventional routing algorithms.

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

A Routing-Tree Construction Algorithm for Energy Efficiency in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성을 고려한 라우팅 트리 구축 알고리즘)

  • Kim, Yul-Sang;Kim, Hyoun-Soo;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.731-736
    • /
    • 2009
  • In wireless sensor network, many sensor nodes are distributed in the field. They communicate the sensing data each other and forward it to sink. Routing protocols, which define the delivery methods of sending data, affect to the lifetime of sensor network. This paper proposes RTAF that is a routing-tree construction algorithm of sensor nodes by a single flooding process in wireless sensor network. A routing tree is constructed by selecting a parent node using the forward-direction flooding packet and gathering children nodes using the reverse-direction flooding packet. In this process, a node with much energy becomes the parent node. And the routing tree is periodically reconstructed in order to distribute the loads of parent nodes. The proposed algorithm compared performance with Modified-LEACH using NS2 network simulation tool. The simulation result shows that the proposed algorithm constructs a routing-tree faster and reduced 40-80% in routing-tree construction packet.

Development of Position Awareness Algorithm Using Improved Trilateration Measurement Method (개선된 삼변측량법을 이용한 위치인지 알고리즘 개발)

  • Sohn, Jong-Hoon;Hwang, Gi-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.473-480
    • /
    • 2013
  • In this paper, location recognition algorithm is developed to improve the accuracy using improve Trilateration. The location recognition algorithm is first calculate the location refer to the measured signal power. Error can be occurred when measure distance with arranged node in specific location. If the distance data is received from node (receiver, coordinator), Node selected for location calculation is defined through section. If the distance data is received from node (receiver, coordinator), Node selected for location calculation is defined through section. Second, we apply algorithm of section filtering. If there are 4 sections in node, we consider 1 section to 6 location recognition coordinates. A special characteristic drawback of RF is that the actual distance is actually farther than the calculated received distance data. This is error is incurred when the signal strength increases. We reduce the location recognition error by applying an improved algorithm as secondary after filtering primary through section filtering.

A Grid Based Routing Scheme Considering Node Connectivities in MANET Environments (MANET 환경에서 노드의 연결성을 고려한 그리드 기반 라우팅 기법)

  • Yoon, Soo-Yong;Kim, Jae-Gu;Lim, Jongtae;Lee, Seok-Hee;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.16-27
    • /
    • 2014
  • In this paper, we propose an efficient grid based routing scheme using the location information in order to reduce the routing cost in mobile ad-hoc networks. In our proposed scheme, all nodes can be a candidate to forward messages to the specified destination node and reduce the management cost of head nodes because they do not exist. The intermediate nodes determine the next hop relaying messages on the basis of location relations between a node and a grid zone. The proposed scheme explores the routing path considering the direction of a node using the coordinate of a grid zone and neighbor node information. It also maintains the routing path considering connectivities among the nodes. In order to show the superiority of the proposed routing scheme, we compare it with the existing grid based routing scheme in terms of the overhead of message, the success rate of transmission.