• Title/Summary/Keyword: IEEE 802.15.4a

Search Result 549, Processing Time 0.027 seconds

A Study on Broadband Integrated Modem LAN Switching Technology of Environment Facility (환경 시설물의 광대역 통합모뎀 근거리 통신망 스위칭 기술 연구)

  • Cho, Juphil;Shin, Jaekwon;Yoon, Kyounghwa;Lee, Junghoon
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.87-90
    • /
    • 2014
  • Recently, environment facilities are able to manage real-time data collection and record management through integrated broadband modem LAN switching technology. Therefore, it need more stable and efficient facility management. So, we required practical use of environmental facilities convergence based on broadband integrated modem. In this paper, we proposed an integrated broadband modem LAN switching technology which can applicable to the environment facility. Also, we presented integrated broadband modem of design plan and communication system. And it received data inside of environment facility using the two communication methods(IEEE802.11x and IEEE802.15.4x). Then, our proposed integrated broadband modem LAN switching technology will prioritize processing data when emergency happen through collecting data, analysis data and processing. Lastly, we proved usefulness by experiment and simulation analysis.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

The Probability Based Ordered Media Access (IEEE 802-15.4에서 우선순위 IFS를 이용한 확률기반 매체 접근 방법)

  • Jean, Young-Ho;Kim, Jeong-Ah;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.321-323
    • /
    • 2006
  • The IEEE 802.15.4 uses a CSMA/CA algorithm on access of media. The CSMA/CA algorithm does Random Backoff before the data is transmitted to avoid collisions. The random backoff is a kind of unavoidable delays and introduces the side effect of energy consumptions. To cope with those problems we propose a new media access algorithm, the Priority Based Ordered Media Access (PBOMA) algorithm, which uses different IFSs. The PBOMA algorithm uses Sampling Rate and Beacon Interval to get a different access probability(or IFS). The access probability is higher, the IFS is shorter. Note that The transfer of urgent data uses tone signal to transmit it immediately. The proposed algorithm is expected to reduce the energy consumptions and the delay.

  • PDF

A Gateway Protocol Architecture for Zigbee Based Wireless Sensor Network Interconnecting TCP/IP Networks

  • Qiu, Peng;Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.176-180
    • /
    • 2009
  • This paper investigates protocol architecture for a web-sensor gateway interconnecting internet and wireless sensor network, in which Zigbee sensors are connected over the IEEE802.15.4 communication protocol standard. The web-sensor gateway is to deliver data between TCP/IP and Zigbee/IEEE802.15.4 protocols, transparently. Since the gateway provides a means to remotely control and aggregate sensor data over the internet, it needs to be designed in the view point of users and in their convenience. In accordance, the common gateway interface technology satisfying users on the web browser to efficiently manage and query the sensors in the wireless sensor networks, ubiquitously, is also introduced. Finally, a simulation prototype for the web-sensor gateway is proposed and verified using OPNET simulation tool.

  • PDF

A Scheme of efficient Bandwidth Guarantee for Multiple Video Transmission of IEEE 802.11e HCCA (다수 동영상 전송을 위한 IEEE 802.11e HCCA의 효과적인 대역폭 보장기법)

  • Kim, Young-Hwan;Suk, Jung-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8A
    • /
    • pp.820-827
    • /
    • 2010
  • In these days, video applications for special purposes such as video conference systems among multiple users and video surveillance systems require multiple video connections and QoS guarantee. The video systems employ IEEE 802.11 Wireless LAN devices to support broadband wireless interfaces and easy internet accesses for cheaper prices. However, according to the current IEEE 802.11e HCCA standard, if more than three video sessions are established in WSTA services, some of them must share the TXOP because the available number of TSIDs for video transmission is two. In order to resolve the problem, we devised a method which can establish up to 15 video sessions by slightly modifying the frame structure while maintaining the compatibility with current standard. Our method is implemented on the NCTUns 4.0 network simulator, and evaluated not only numerically in terms of throughput, delay, and PSNR, but also experimentally in the sense of real video clips that are used as input to our simulation. The results showed that our method sufficiently guarantees the transmission bandwidth requested by each video session.

Dual Addressing Scheme in IPv6 over IEEE 802.15.4 Wireless Sensor Networks

  • Yang, Soo-Young;Park, Sung-Jin;Lee, Eun-Ju;Ryu, Jae-Hong;Kim, Bong-Soo;Kim, Hyung-Seok
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.674-684
    • /
    • 2008
  • This paper proposes a dual addressing scheme (DAS) for IPv6 over IEEE 802.15.4 wireless sensor networks (WSN). DAS combines a global unicast address to cope with association link changes and node mobility, and it links local addresses to lighten the overhead of the system to save energy and resources. This paper describes DAS address formats, address autoconfiguration, and address translation tables in the gateway. A detailed description of DAS is provided through examples. Simulations are performed to demonstrate the performance improvements of the DAS compared with the IPv6-based WSN, which uses the conventional single address.

  • PDF

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

Public Key based LR-WPAN Security Algorithm (공개키 방식의 LR-WPAN 보안 알고리즘)

  • Kim, Jin-Cheol;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.54-67
    • /
    • 2006
  • Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.

Contention/Collision Mitigation Scheme in IEEE 802.15.4 Mesh Sensor Networks (IEEE 802.15.4 메쉬 센서 네트워크에서의 경쟁 및 충돌 완화 기법)

  • Lee, Hyo Ryun;Jung, Kyoung-Hak;Suh, Young-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.683-691
    • /
    • 2013
  • This paper address a new scheme that alleviates the packet collision problem caused by contentions among nearby coordinators (CNs) in IEEE 802.15.4 meshed sensor networks. In existing studies, the number of retransmissions is reduced by adjusting the proper backoff period (BP) of sensor nodes, or unnecessary energy consumption is diminished by increasing channel utilization efficiently based on traffic load. In contrast, the proposed scheme avoids contentions among nearby CNs, thereby it enhances the energy efficiency of sensor nodes. To achieve this, the proposed scheme separates the starting points of CNs' contention periods and reduces contentions and collisions among overlapping CNs. According to our simulation results, the proposed scheme shows improved performance in terms of energy consumption, throughput, the number of collisions, and average delay for all conditions.

Implementation of ZigBee Home Control System (ZigBee 스펙에 의한 가전 제어 구현)

  • Park, Woo-Chool;Kim, Young-Ho;Kim, Dae-Whan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.228-230
    • /
    • 2004
  • ZigBee Alliance is a network designed for low-cost and very low-power short-range wireless communications. The ZigBee Alliance is a consortium formed by several leading semiconductor and industrial manufactures, and end users. One of the tasks of this organization is the definition of the networking support and applications profiles that will use IEEE Std 802.15.4-compliant transceivers. In the case of IEEE Std 802.15.4, the ZigBee Alliance is an organization that has led the development of the upper layers, through the definition of application profiles. We have implemented ZigBee home control system, however we have not fully implemented. Because of the ZigBee is not perfectly standarded. We will have to implement according to ZigBee Specifications.

  • PDF