• Title/Summary/Keyword: Ad-hoc and sensor networks

Search Result 162, Processing Time 0.034 seconds

Ubiquitous Sensor Network based Localization System for Public Guide Robot (서비스 로봇을 위한 유비쿼터스 센서 네트워크 기반 위치 인식 시스템)

  • Choi, Hyoung-Youn;Park, Jin-Joo;Moon, Young-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1920-1926
    • /
    • 2006
  • With social interest, there hie been a lot of research on the Service Robot but now we are faced with the limitation of single platform. The alternative plan is the Ubiquitous-based Service Robot connected with a Ubiquitous network to overcome this limitation. Systems using RFID(Radio frequency Identification) and supersonic waves appeared for functions such as recognition of surroundings through Ubiquitous Sensor Networks. This was applied to the real robot and we have got good results. However, this has several limitations to applying to low power-based Sensor Network For example, if RFID uses a passive Sensor, the rate of recognition with the distance is limited. In case of supersonic waves, high power is required to drive them. Therefore, we intend to develop RSSI position recognition system on the basis of embodying a Sensor Network Module in this thesis. This RSSI position recognition system only measures RSSI of signals from each sensor nod. then converts them into distances and calculates the position. As a result, we can still use low power-based Sensor Network and overcome the limitation according to distance as planning Ad-Hoc Network.

Adaptable PANID Generation Scheme for Resolving Address Conflict Based on Hash Mechanism in IoT Environment (IoT 환경을 위한 Hash 기반 동적 Zigbee PANID 생성 및 충돌 회피 방안)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2392-2400
    • /
    • 2015
  • Zigbee, which was a representative standard technology for dealing low energy and mesh networks in large deployment area such as smart home, smart building, and massive sensor networks, has been developed and deployed for increasing communication area by using Ad hoc method. It has been originally developed based on IEEE 802.15.4 standard so every node needs 48bit unique address defined by IEEE. However, it is absolutely inefficient to assign an unique address to every communication node where it would be deployed through large-scale network area, e.g., smart lighting and massive sensor networks, because there could be variously multiple companies to deploy network infrastructure and they could have different policy to assign node ID. To prevent the problem, this paper proposes a method of dynamic PANID assignment in overall Personal Coordinators, and also proposes a method for addressing PANID conflict problem which could be derived from dynamic PANID assignment.

Design of a Smart Application Using Ad-Hoc Sensor Networks based on Bluetooth (블루투스기반 애드 혹 센서망을 이용한 스마트 응용 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.243-248
    • /
    • 2013
  • With rapid growth and fast diffusion of smartphone technologies, many users are deeply concerned about the smart applications and many mobile applications converged with various related technologies are rapidly disseminated. Especially, the convergence technologies like mobile apps that can establish the wireless ad hoc network between smartphone and other peripherals and exchange data are appear and progressed continuously. In this paper, we design and implement the smart app using bluetooth based wireless ad hoc sensor network that can connect smartphone with sensors and exchange data for various smart applications. The proposed smart application in this paper collects data obtained from more than 2 multi-sensors in real time and fulfills the decision making function by storing data at the database and analysing it. The smart application designed and implemented in this paper is the healthcare application that can analyze and evaluate the patient's health condition with sensing data from multi-sensors in real time through bluetooth module.

Transmission Performance of Lattice Structure Ad-Hoc Network under Intrusions (침해가 있는 격자구조 애드-혹 네트워크의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.767-772
    • /
    • 2014
  • As temporary network, ad-hoc network has been effected by structures and implemented environments of networks. In this paper, transmission performance of lattice structure ad-hoc network, which is expected to use in sensor network and IoT(Internet of Things), is analyzed in point of intrusions and countermeasure for intrusion is suggested. In this paper, computer simulation based on NS-2 is used for performance analysis, VoIP(Voice over Internet Protocol) as a widely used service is chosen for performance measure. MOS(Mean Opinion Score) and call connection rate is used as performance parameter. As results of performance analysis, it is shown that for MOS, random network is better then lattice network at intrusion environments, but for call connection rate, lattice network is better then random network.

Smoking detection system based on wireless ad-hoc network using Raspberry Pi boards (라즈베리파이를 이용한 무선 애드혹 네트워크 기반의 흡연 모니터링 시스템)

  • Park, Sehum;Kim, Seong Hwan;Ryu, Jong Yul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.65-67
    • /
    • 2018
  • We introduce a system that detects smoking in a specific area. The proposed system is implemented on a wireless ad hoc network consisting of Raspberry Pi boards. It is more economical owing to low-cost device than commercial smoking monitoring system and is scalable than the existing system with single Raspberry Pi. In this paper, the probability density function of carbon monoxide concentration during smoking and non-smoking is approximated as Gauusian distribution, respectively, using data measured from sensors for a long time. Based on this, a maximum likelihood detection technique is adopted to estimate the smoking status by observing the concentration of carbon monoxide. We aim at improving the reliability by estimating the smoking status using the collected values from multiple sensors connected to the ad hoc network.

  • PDF

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

The Method of Reducing the Delay Latency to Improve the Efficiency of Power Consumption in Wireless Sensor Networks

  • Ho, Jang;Son, Jeong-Bong
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.199-204
    • /
    • 2008
  • Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad-hoc method of deployment. Considerable research has been focused at overcoming these deficiencies through faster media accessing, more energy efficient routing, localization algorithms and system design. Our research attempts to provide a method of improvement MAC performance in these issues. We show that traditional carrier-sense multiple access(CSMA) protocols like IEEE 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size, We present more efficient method of a medium access for real-time wireless sensor networks. Proposed MAC protocol is a randomized CSMA protocol, but unlike previous legacy protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports, it carefully decides a fixed-size contention window, non-uniform probability distribution of transmitting in each slot within the window. We show that it can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using widely used simulator ns-2. We, finally show that proposed MAC scheme comes close to meeting bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for real-time wireless sensor networks which is sensitive to latency.

  • PDF

A Study on an Efficient Routing Scheme for using a priority scheme in Wireless Sensor Networks (무선 센서 네트워크 환경에서 우선순위 기법을 이용한 효율적인 경로 설정에 대한 연구)

  • Won, Dae-Ho;Yang, Yeon-Mo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.4
    • /
    • pp.40-46
    • /
    • 2011
  • Wireless Sensor Networks(WSNs) have shown a lot of good outcomes in providing a various functions depending on industrial expectations by deploying ad-hoc networking with helps of light loaded and battery powered sensor nodes. In particular, it is strongly requested to develop an algorithm of cross-layer control between 2-layer and 3-layer to deriver the sensing data from the end node to the sink node on time. In this paper, based on the above observation we have proposed an IEEE802.15.4 based self priority routing scheme under UC Berkely TinyOS platform. The proposed beacon based priority routing (BPR) algorithm scheme utilizes beacon periods in sending message with embedding the high priority data and thus provides high quality of service(QoS) in the given criteria. The performance measures are the packet Throughput, delivery, latency, total energy consumption. Simulation results under TinyOS Simulator(TOSSIM) have shown the proposed scheme outcome the conventional Ad hoc On-Demand Distance Vector(AODV) Routing.

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.