• Title/Summary/Keyword: IEEE 802 15.3

Search Result 278, Processing Time 0.023 seconds

Joint Estimation Methods of Carrier Offset and Low-rank LMMSE Channel Estimation for MB-OFDM System (MB-OFDM 시스템을 위한 Low-rank LMMSE 채널 추정 및 주파수 옵셋 추정 결합 기법)

  • Shin, Sun-Kyung;Nam, Sang-Kyun;Sung, Tae-Kyung;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1296-1302
    • /
    • 2007
  • In this paper, we propose joint estimation methods of carrier offset and channel estimation for MB-OFDM system with low complexity. The proposed methods estimate the channel by using low-rank LMMSE channel estimation which reduces the system complexity by applying the optimal number of rank to evaluate the frequency offset and additionally using the simple algorithm using the auto-correlation property of the estimated channel. We simulate the proposed algorithms under the IEEE 802.15 TG3a UWB channel model.

Performance Analysis of Liner Adaptive Equalizer for HDR-WPAN System (HDR-WPAN 시스템을 위한 선형 적응 등화기 성능분석)

  • Park Ji-Woo;Yun Han-Kyung;Jeong Goo-Cheol;Kim Jea-Young;Oh Chang-Heon
    • Journal of Digital Contents Society
    • /
    • v.5 no.4
    • /
    • pp.295-299
    • /
    • 2004
  • In this paper, we compare and analyze the LMS ard RLS algorithm of IEEE802.15.3(HDR-WPAN) system. The LMS algorithm have two merits that easily embody and not complex, but convergence speed is slow. The RLS algorithm have fast convergence speed, but very complex. When equalization using LMS algorithm, it can achieve adaptive equalization after 250 sample in fading environment, but case of RLS algorithm can achieve adaptive equalization after just 50 sampls. The computer simulation proved that adaptive equalizer to fast equalization and stability of HDR-WPAN system is more effective using RLS algorithm then LMS algorithm.

  • PDF

An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6 (IPv6 기반의 사물인터넷 환경에서 악성 노드의 패킷 유실 공격 탐지 및 우회 기법 분석)

  • Choi, Jaewoo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.655-659
    • /
    • 2016
  • In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.

Performance Analysis for TR-UWB System Exploiting Complex Frequency-Components (복소 주파수 성분 처리를 통한 TR-UWB 시스템의 성능분석)

  • Jang, Dong-Heon;Yang, Hoon-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.253-260
    • /
    • 2009
  • This paper, mathematically analyzes the performance of newly proposed TR-UWB system which the frequency components of a UWB pulse were processed so that the system could be implemented with ADCs of a few MHz sampling rate, and presents the comparison with an existing frequency-domain based TR-UWB system. The comparison is mainly based on the SNR ratio which depends on the mean and the variance of the frequency components. We also shows that the simulation results to support the theoretical analysis where the comparison is made under the IEEE 802.15.3a channel model as well as AWGN channel.

Design and Implementation of a Multi-level Simulation Environment for WSN: Interoperation between an FPGA-based Sensor Node and a NS3 (FPGA 기반 센서 노드와 NS3 연동을 통한 다층 무선 센서 네트워크 모의 환경 설계 및 구현)

  • Seok, Moon Gi;Kim, Tag Gon;Park, Daejin
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.4
    • /
    • pp.43-52
    • /
    • 2016
  • Wireless sensor network (WSN) technology has been implemented using commercial off-the-shelf microcontrollers (MCUs), In this paper, we propose a simulation environment to realize the physical evaluation of FPGA-based node by considering vertically cross-layered WSN in terms of physical node device and network interconnection perspective. The proposed simulation framework emulates the physical FPGA-based sensor nodes to interoperate with the NS3 through the runtime infrastructure (RTI). For the emulation and interoperation of FPGA-based nodes, we extend a vendor-providing FPGA design tool from the host computer and a script to execute the interoperation procedures. The standalone NS-3 is also revised to perform interoperation through the RTI. To resolve the different time-advance mechanisms between the FPGA emulation and event-driven NS3 simulation, the pre-simulation technique is applied to the proposed environment. The proposed environment is applied to IEEE 802.15.4-based low-rate, wireless personal area network communication.

Technology Trend of High Rate Close Proximity Communications (초고속 근접통신 기술동향)

  • Lee, J.S.;Shin, G.C.;Kim, Y.H.;Lee, M.S.;Kim, Y.J.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.5
    • /
    • pp.21-30
    • /
    • 2016
  • 현재 이동/무선통신 환경은 사람과 사람 간의 통신 서비스 형태뿐만 아니라 IoT 통신 서비스로 점차 확대되어가고 있으며, Wi-Fi, Bluetooth 중심의 근거리 무선통신뿐만 아니라 더욱 통신영역이 좁아진 근접통신의 필요성이 대두되고 있다. 이에 따라 근접통신 기술 개발이 지속적으로 이루어지고 있으며, 특히 기기 간의 대용량 데이터 교환이 증가함에 따라 기가급의 속도를 제공하는 초고속 근접통신 기술들이 활발하게 개발되고 있다. IEEE 802에서는 주변 기기들간의 직접(Point-to-Point: P2P) 통신을 지원하는 802.15.3e 초고속 근접통신 기술을 개발하고 있으며, 또한, 802.11ad의 후속 표준으로 개발이 시작된 802.11ay의 Usage Model에도 근접통신이 포함되어 있다. 본고에서는 이러한 초고속 근접통신 기술동향에 대해 기술하고자 한다.

  • PDF

Architectures and Connection Probabilities forWireless Ad Hoc and Hybrid Communication Networks

  • Chen, Jeng-Hong;Lindsey, William C.
    • Journal of Communications and Networks
    • /
    • v.4 no.3
    • /
    • pp.161-169
    • /
    • 2002
  • Ad hoc wireless networks involving large populations of scattered communication nodes will play a key role in the development of low power, high capacity, interactive, multimedia communication networks. Such networks must support arbitrary network connections and provide coverage anywhere and anytime. This paper partitions such arbitrarily connected network architectures into three distinct groups, identifies the associated dual network architectures and counts the number of network architectures assuming there exist N network nodes. Connectivity between network nodes is characterized as a random event. Defining the link availability P as the probability that two arbitrary network nodes in an ad hoc network are directly connected, the network connection probability $ \integral_n$(p) that any two network nodes will be directly or indirectly connected is derived. The network connection probability $ \integral_n$(p) is evaluated and graphically demonstrated as a function of p and N. It is shown that ad hoc wireless networks containing a large number of network nodes possesses the same network connectivity performance as does a fixed network, i.e., for p>0, $lim_{N\to\infty} Integral_n(p)$ = 1. Furthermore, by cooperating with fixed networks, the ad hoc network connection probability is used to derive the global network connection probability for hybrid networks. These probabilities serve to characterize network connectivity performance for users of wireless ad hoc and hybrid networks, e.g., IEEE 802.11, IEEE 802.15, IEEE 1394-95, ETSI BRAN HIPERLAN, Bluetooth, wireless ATM and the world wide web (WWW).

A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks

  • Shon, Tae-Shik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.597-611
    • /
    • 2009
  • With the advent of ubiquitous computing society, many advanced technologies have enabled wireless sensor networks which consist of small sensor nodes. However, the sensor nodes have limited computing resources such as small size memory, low battery life, short transmission range, and low computational capabilities. Thus, decreasing energy consumption is one of the most significant issues in wireless sensor networks. In addition, numerous applications for wireless sensor networks are recently spreading to various fields (health-care, surveillance, location tracking, unmanned monitoring, nuclear reactor control, crop harvesting control, u-city, building automation etc.). For many of them, supporting security functionalities is an indispensable feature. Especially in case wireless sensor networks should provide a sufficient variety of security functions, sensor nodes are required to have more powerful performance and more energy demanding features. In other words, simultaneously providing security features and saving energy faces a trade-off problem. This paper presents a novel energy-efficient security architecture in an IEEE 802.15.4-based wireless sensor network called the Hybrid Adaptive Security (HAS) framework in order to resolve the trade off issue between security and energy. Moreover, we present a performance analysis based on the experimental results and a real implementation model in order to verify the proposed approach.

Location Awareness Method using Vector Matching of RSSI in Low-Rate WPAN (저속 WPAN에서 수신신호세기의 Vector Matching을 이용한 위치 인식 방식)

  • Nam Yoon-Seok;Choi Eun-Chang;Huh Jae-Doo
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.93-104
    • /
    • 2005
  • Recently, RFID/USN is one of fundamental technologies in information and communications networks. Low-Rate WPAN, IEEE802.15.4 is a low-cost communication network that allows wireless connectivity in applications with limited Power and relaxed throughput requirements. Its applications are building automation, personal healthcare, industrial control, consumer electronics, and so on. Some applications require location information. Of course location awareness is useful to improve usability of data Low-Rate WPAN Is regarded as a key specification of the sensor network with the characteristics of wireless communication, computing, energy scavenging, self-networking, and etc. Unfortunately ZigBee alliance propose a lot of applications based on location aware technologies, but the specification and low-rate WPAN devices don't support anything about location-based services. RSSI ( Received Signal Strength indication) is for energy detection to associate, channel selection, and etc. RSSI is used to find the location of a potable device in WLAN. In this paper we studied indoor location awareness using vector matching of RSSI in low-Rate wireless PAN. We analyzed the characteristics of RSSI according to distance and experimented location awareness. We implemented sensor nodes with different shapes and configured the sensor network for the location awareness with 4 fixed nodes and a mobile node. We try to contribute developing location awareness method using RSSI in 3-dimension space.

  • PDF

Advanced ZigBee Baseband Processor with Variable Data Rates for Internet-of-things Applications

  • Hwang, Hyunsu;Jang, Soohyun;Lee, Seongjoo;Jung, Yunho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.1
    • /
    • pp.56-64
    • /
    • 2017
  • In this paper, an advanced ZigBee (AZB) system for internet-of-things (IoT) applications is proposed which can support various data rates from 31.25 Kbps to 2 Mbps, and the implementation results of the AZB baseband processor are presented. Repetition coding for 32-chip direct-sequence spread spectrum (DSSS) symbol is applied for low rates under 250 Kbps to extend the coverage. Convolution coding, puncturing, and interleaving for non-DSSS symbol are performed for high rates from 500 Kbps to 2 Mbps for multi-media services. Simulation results show that the coverage increases at the rate of 51.8-77.3% for various environments compared with IEEE 802.15.4 ZigBee. AZB baseband processor was implemented in 180 nm CMOS process and total gate counts are 260K with the size of $5.8mm^2$.