• Title/Summary/Keyword: Distributed sensor

Search Result 793, Processing Time 0.027 seconds

A study on Public Key Authentication using Polynomial Secret Sharing in WSN (무선센서네트워크에서 다항식 비밀분산을 이용한 공개키 인증방식에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2479-2487
    • /
    • 2009
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. This paper proposes a new concept of public key-based authentication using Polynomial Secret Sharing that can be effectively applied to sensor networks and a detection of malicious node using the hash function. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t,n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability.

Sensor Nodes Localization for Temperature Distribution Measurement System

  • Ohyama, Shinji;Alasiry, Ali Husein;Takayama, Junya;Kobayashi, Akira
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1781-1786
    • /
    • 2005
  • In sensor network systems, all the nodes are interconnected and the positional information of each sensor is essential. To measure the temperature, position detection and communication functions are required. Many sensor nodes are distributed to a measurement field, and these sensors have three main functions: they measure the distance to the other nodes, the data of which are used to determine the position of each node; they communicate with other nodes; and they measure the temperature of each node. A novel range measurement method using the difference between light and sound propagation speed is proposed. The experimental results show the temperature distribution as measured with the aid of the determined positions. The positions of every node were calculated with a PC program. Eight nodes were manufactured and their fundamental functions were tested. The results of the range measurement method, which takes relatively accurate measurements, contribute significantly to the accuracy of the position determination. Future studies will focus on 3-D position determination and on the architecture of appropriate sensors and actuators.

  • PDF

A Study on WSN based Low Power Fire Prevention System (무선 센서 네트워크 기반 저전력 화재방재 시스템을 위한 전송 프로토콜 연구)

  • Kim, Young-Hyuk;Lim, Il-Kwon;Li, Qi Gui;Kim, Myung-Jin;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.535-538
    • /
    • 2010
  • In this paper, this study goal is development for WSN-based fire prevention systems of using temperature/humidity Sensor. So, distributed sensor nodes structural and packet transfer characteristics study for fire monitoring. Battery-operated wireless sensor networks is data transfer manner of multi-hop. WSN fire prevention system need to sensor nodes management and energy consumption of efficient adjust for sustained action. Thus, study with efficient energy consumption the normal WSN environment is not, characteristics for WSN fire prevention environment.

  • PDF

An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks

  • Kim, Jin Myoung;Lee, Hae Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2518-2533
    • /
    • 2020
  • In wireless sensor networks, adversaries may physically capture sensor nodes on the fields, and use them to launch false positive attacks (FPAs). FPAs could be conducted by injecting forged or old sensing reports, which would represent non-existent events on the fields, with the goal of disorientating the base stations and/or reducing the limited energy resources of sensor nodes on the fields. Researchers have proposed various mitigation methods against FPAs, including the statistical en-route filtering scheme (SEF). Most of these methods are based on key pre-distribution schemes and can efficiently filter injected false reports out at relay nodes through the verification of in-transit reports using the pre-distributed keys. However, their filtering power may decrease as time goes by since adversaries would attempt to capture additional nodes as many as possible. In this paper, we propose an adaptive key distribution method that could maintain the security power of SEF in WSNs under such circumstances. The proposed method makes, if necessary, BS update or re-distribute keys, which are used to endorse and verify reports, with the consideration of the filtering power and energy efficiency. Our experimental results show that the proposed method is more effective, compared to SEF, against FPAs in terms of security level and energy saving.

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.123-144
    • /
    • 2014
  • Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial requirements for the design of an information extraction protocol for any sensor network application. However, most existing software agent based information extraction protocols are incapable of satisfying these requirements because of static agent itineraries and large agent sizes. This paper proposes an Information Extraction protocol based on Multiple software Agents with Dynamic Itineraries (IEMADI), where multiple software agents are dispatched in parallel to perform tasks based on the query assigned to them. IEMADI decides the itinerary for an agent dynamically at each hop using local information. Through mathematical analysis and simulation, we compare the performance of IEMADI with a well known static itinerary based protocol with respect to energy consumption and response time. The results show that IEMADI provides better performance than the static itinerary based protocols.

Design and Implementation of Cloud-based Data Management System for Large-scale USN (대규모 USN을 위한 클라우드기반 데이터 관리 시스템 설계 및 구현)

  • Kim, Kyong-Og;Jeong, Kyong-Jin;Park, Kyoung-Wook;Kim, Jong-Chan;Jang, Moon-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.352-354
    • /
    • 2010
  • Recently, the efficient management system for large-scale sensor data has been required due to the increasing deployment of large-scale sensor networks. In previous studies, sensor data was managed by distributed database system which built in a single server or a grid server. Thus, it has disadvantages such as low scalability, and high cost of building or managing the system. In this paper, we propose a cloud-based sensor data management system with low cast, high scalability, and efficiency. The proposed system can be work with the application of a variety of platforms, because processed results are provided through REST-based web service.

  • PDF

Temperature Compensation of a Strain Sensing Signal from a Fiber Optic Brillouin Optical Time Domain Analysis Sensor

  • Kwon, Il-Bum;Kim, Chi-Yeop;Cho, Seok-Beom;Lee, Jung-Ju
    • Journal of the Optical Society of Korea
    • /
    • v.7 no.2
    • /
    • pp.106-112
    • /
    • 2003
  • In order to do continuous health monitoring of large structures, it is necessary that the distributed sensing of strain and temperature of the structures be measured. So, we present the temperature compensation of a signal from a fiber optic BOTDA (Brillouin Optical Time Domain Analysis) sensor. A fiber optic BOTDA sensor has good performance of strain measurement. However, the signal of a fiber optic BOTDA sensor is influenced by strain and temperature. Therefore, we applied an optical fiber on the beam as follows: one part of the fiber, which is sensitive to the strain and the temperature, is bonded on the surface of the beam and another part of the fiber, which is only sensitive to the temperature, is located nearby the strain sensing fiber. Therefore, the strains can be determined from the strain sensing fiber while compensating for the temperature from the temperature sensing fiber. These measured strains were compared with the strains from electrical strain gages. After temperature compensation, it was concluded that the strains from the fiber optic BOTDA sensor had good coincidence with those values of the conventional electrical strain gages.

Realtime Wireless Sensor Line Protocol for Forest Fire Monitoring System (실시간 센서 네트워크 프로토콜을 이용한 산불 모니터링 시스템의 구현)

  • Kim, Jae-Ho;Lee, Sang-Shin;Ahn, Il-Yeup;Kim, Tae-Hyun;Won, Kwang-Ho;Kim, Seong-Dong
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1031-1034
    • /
    • 2005
  • This paper introduces a novel sensor network protocol, R-WSLP(Realtime Wireless Sensor Line Protocol), which has extremely low latency characteristic in large-scale WSN. R-WSLP is proposed to implement realtime forest fire monitoring system. We propose Distributed TDMA method for the multiple channel access and Time Synchronized Forwarding Mechanism instead of routing technique to achieve low latency network. Also, R-WSLP provides extremely low power operation which we accomplished by reducing idle listening. In our experimentation, we get successful results at the forest fire monitoring system with our protocol.

  • PDF

PID Force Control of a miniature robot Gripper (PID 제어기에 의한 소형 로봇용 그리퍼의 힘 제어)

  • 홍동표
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.8 no.2
    • /
    • pp.44-49
    • /
    • 1999
  • This paper is concerned with the theoretical and experimental study on the force conrtrol of a miniature robotic gripper. The gripper is an uniform flexible cantilever equipped with a distributed set of compact force sensor. As an actuator piezoelectric acturator, piezoelectric acturator is fixed with cupper plate at which the beam is clamped. The mathematical model of the assembled electro-mechaincal system is developed. The force sensor is described by a set of concentrated mass-spring system. The formulated equations of motion are applied to he study of a control problem where the gripper is commanded to grip an object The usefulness of the PID control technique is verified by experiment.

  • PDF

Evaluating Modified IKONOS RPC Using Pseudo GCP Data Set and Sequential Solution

  • Bang, Ki-In;Jeong, Soo;Kim, Kyung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.82-87
    • /
    • 2002
  • RFM is the sensor model of IKONOS imagery for end-users. IKONOS imagery vendors provide RPC (Rational Polynomial Coefficients), Ration Function Model coefficients for IKONOS, for end-users with imagery. So it is possible that end-users obtain geospatial information in their IKONOS imagery without additional any effort. But there are requirements still fur rigorous 3D positions on RPC user. Provided RPC can not satisfy user and company to generate precision 3D terrain model. In IKONOS imagery, physical sensor modeling is difficult because IKONOS vendors do not provide satellite ephemeris data and abstract sensor modeling requires many GCP well distributed in the whole image as well as other satellite imagery. Therefore RPC modification is better choice. If a few GCP are available, RPC can be modified by method which is introduced in this paper. Study on evaluation modified RPC in IKONOS reports reasonable result. Pseudo GCP generated with vendor's RPC and additional GCP make it possible through sequential solution.

  • PDF