• Title/Summary/Keyword: IEEE802.15.4e

Search Result 55, Processing Time 0.036 seconds

TLSA: A Two Level Scheduling Algorithm for Multiple packets Arrival in TSCH Networks

  • Asuti, Manjunath G.;Basarkod, Prabhugoud I.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3201-3223
    • /
    • 2020
  • Wireless communication has become the promising technology in the recent times because of its applications in Internet of Things( IoT) devices. The IEEE 802.15.4e has become the key technology for IoT devices which utilizes the Time-Slotted Channel Hopping (TSCH) networks for the communication between the devices. In this paper, we develop a Two Level Scheduling Algorithm (TLSA) for scheduling multiple packets with different arrival rate at the source nodes in a TSCH networks based on the link activated by a centralized scheduler. TLSA is developed by considering three types of links in a network such as link i with packets arrival type 1, link j with packets arrival type 2, link k with packets arrival type 3. For the data packets arrival, two stages in a network is considered.At the first stage, the packets are considered to be of higher priority.At the second stage, the packets are considered to be of lower priority.We introduce level 1 schedule for the packets at stage 1 and level 2 schedule for the packets at stage 2 respectively. Finally, the TLSA is validated with the two different energy functions i.e., y = eax - 1 and y = 0.5x2 using MATLAB 2017a software for the computation of average and worst ratios of the two levels.

Performance Evaluation of Distributed Cooperative MAC Protocol Algorithm for Enhancing Multimedia QoS of WiMedia Communication Network (와이미디어 통신네트워크의 멀티미디어 QoS 개선을 위한 분산협력방식 MAC 프로토콜 성능분석)

  • Kim, Jin-Woo;Lee, Yeon-Woo;Lee, Seong-Ro
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.4
    • /
    • pp.516-525
    • /
    • 2012
  • In this paper, an efficient technique for enhancing the QoS of multimedia service for an WiMedia network applying distributed cooperative medium access (D-MAC) protocol is proposed. D-MAC protocol has been proposed to support high-rate Wireless Personal Area Networks (HR-WPANs) by the WiMedia Alliance. Unlike the centralized IEEE 802.15.3 MAC, the D-MAC UWB specified by WiMedia supports all devices to be self-organized and removes the SOP (Simultaneous Operating Piconet) problem, i.e., packet collisions between overlapped piconets in the centralized IEEE 802.15.3 MAC. However the WiMedia D-MAC can't prevent reduce the throughput degradation occurred by mobile nodes with low data rate. Therefore, a distributed cooperative MAC protocol for multi-hop UWB network is proposed in this paper. The proposed technique can intelligently select the transmission path with higher data rate to provide real-time multimedia services with minimum delay, thus enhances QoS of multimedia service.

An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6 (IPv6 기반의 사물인터넷 환경에서 악성 노드의 패킷 유실 공격 탐지 및 우회 기법 분석)

  • Choi, Jaewoo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.655-659
    • /
    • 2016
  • In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.

Architectures and Connection Probabilities forWireless Ad Hoc and Hybrid Communication Networks

  • Chen, Jeng-Hong;Lindsey, William C.
    • Journal of Communications and Networks
    • /
    • v.4 no.3
    • /
    • pp.161-169
    • /
    • 2002
  • Ad hoc wireless networks involving large populations of scattered communication nodes will play a key role in the development of low power, high capacity, interactive, multimedia communication networks. Such networks must support arbitrary network connections and provide coverage anywhere and anytime. This paper partitions such arbitrarily connected network architectures into three distinct groups, identifies the associated dual network architectures and counts the number of network architectures assuming there exist N network nodes. Connectivity between network nodes is characterized as a random event. Defining the link availability P as the probability that two arbitrary network nodes in an ad hoc network are directly connected, the network connection probability $ \integral_n$(p) that any two network nodes will be directly or indirectly connected is derived. The network connection probability $ \integral_n$(p) is evaluated and graphically demonstrated as a function of p and N. It is shown that ad hoc wireless networks containing a large number of network nodes possesses the same network connectivity performance as does a fixed network, i.e., for p>0, $lim_{N\to\infty} Integral_n(p)$ = 1. Furthermore, by cooperating with fixed networks, the ad hoc network connection probability is used to derive the global network connection probability for hybrid networks. These probabilities serve to characterize network connectivity performance for users of wireless ad hoc and hybrid networks, e.g., IEEE 802.11, IEEE 802.15, IEEE 1394-95, ETSI BRAN HIPERLAN, Bluetooth, wireless ATM and the world wide web (WWW).

Real-time Water Monitoring System for Small Water Supply Facility using High Reliable Wireless Sensor Network (고신뢰 무선센서네트워크를 이용한 실시간 수질 모니터링 시스템)

  • Kang, Hoyong;Jang, Youn-Seon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.331-341
    • /
    • 2015
  • In this paper, real-time water quality monitoring system of small water supply facilities based on IEEE 802.15.4e-2012 DSME MAC and IEEE 802.15.4g-2012 PHY standard is presented, which is capable to acquire for highly reliable water quality information in the wide outdoor areas for effective water quality management of small water quality facilities is distributed in the long distance and remote areas. Previously, Long distance transmission is difficult in most water quality sensor module is using RS-485 protocol. But with this system, even in harsh outdoor environment, it is possible to establish a radio wave sensor in a wide area network, and not only water quality sensor shall be connected to the wireless system, but also wireless integrated management system shall provide more effective way of management of the numerous small water supply facilities spread throughout the community, so that the administrator can remotely monitor the data of water turbidity, pH, residual chlorine in the water-supply, water-level, and generate alarm to cope with risks. The management of small water facilities is done by residents will be very effective to notice water quality information of small water facilities to residents.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Design of the Energy Efficient Virtual Backbone Construction in the Zigbee Network (지그비 네트워크에서 효율적인 에너지 관리를 위한 가상 백본 설계)

  • Kim, Bo-Nam;Lee, Jin-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2413-2418
    • /
    • 2007
  • IN wireless sensor networks (WSNs), one challenging issue is to In wireless sensor networks (WSNs), one challenging issue is to construct a virtual backbone in a distributed and localized way while considering energy limitation. Dominating set has been used extensively as core or virtual backbone in WSNs for the purposes like routing and message broadcast. To ensure network performance, a good dominating set construction protocols should be simple and avoid introducing extra message. In addition, the resulting dominating set should be small, connected, and take into account the energy level at each node. This paper studies efficient and simple virtual backbone construction protocol using defer time in IEEE 802.15.4- based WSNs (e.g. Zigbee). The efficiency of our proposed protocol is confirmed through simulation results.

Adaptable PANID Generation Scheme for Resolving Address Conflict Based on Hash Mechanism in IoT Environment (IoT 환경을 위한 Hash 기반 동적 Zigbee PANID 생성 및 충돌 회피 방안)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2392-2400
    • /
    • 2015
  • Zigbee, which was a representative standard technology for dealing low energy and mesh networks in large deployment area such as smart home, smart building, and massive sensor networks, has been developed and deployed for increasing communication area by using Ad hoc method. It has been originally developed based on IEEE 802.15.4 standard so every node needs 48bit unique address defined by IEEE. However, it is absolutely inefficient to assign an unique address to every communication node where it would be deployed through large-scale network area, e.g., smart lighting and massive sensor networks, because there could be variously multiple companies to deploy network infrastructure and they could have different policy to assign node ID. To prevent the problem, this paper proposes a method of dynamic PANID assignment in overall Personal Coordinators, and also proposes a method for addressing PANID conflict problem which could be derived from dynamic PANID assignment.

Study on Intelligent Service Gateweay platform designed for IoT (IoT서비스플랫폼을 위한 지능형 Gateway 설계에 관한 연구)

  • Lee, So-Haeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.244-247
    • /
    • 2016
  • Internet of Things spotlighted by the recent growth of the country: the interest in (IoT Internet pf Things) is being maximized. According to the scale of the 2013 Machina Research 2022 yireundago IoT market it is predicting about $ 1.2 trillion. Also the number of IoT devices connected simultaneously to the 2020 worldwide reached about 2.1 billion, and is expected to require about 200 million communications link. Many of these devices in order to manage and operate them efficiently IEEE 802.15.4e, D2D, Beacon, supporting protocols such as Zigbee gateway and network Connectivity to the urgent need for a proactive response to M2M -based operating convert it to a standard protocol being. This paper supports a variety of devices with different protocols and propose the design of intelligent Gateway with integrated features to manage operations.

  • PDF

Performance Analysis of HDR-WPAN System with MIMO Techniques (MIMO 기법을 적용한 HDR-WPAN 시스템의 성능분석)

  • Han Deog-Su;Kang Chul-Gyu;Oh Chang-Heon;Cho Sung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1502-1509
    • /
    • 2006
  • In this paper, we proposed reliability and capacity enhancement methods for IEEE 802.15.3 HDR-WPAN (High Data Rate-Wireless Personal Area Network) system which is currently getting an interest in home network technology adopting a MIMO technique. We also analyzed performance or the proposed system through a computer simulation. The HDR-WPAN system using V-BLAST algorithm, transmitting the different signal vector to each other's sub-channel, can get the transmission speed of more than 110Mbps using two Tx/Px antenna without bandwidth expansion in TCM-64QAM mode. Also the proposed system has reliability of 104 at $E_b/N_0=35dB$ under the Rayleigh fading channel in case of two Tx/Rx antenna with MMSE algorithm. The HDR-WPAN system adopting V-BLAST method has its drawback which is very complicated to determine the decision-ordering at the receiver. But, the proposed system enhances the transmission capacity and reliability without extra bandwidth expansion by sending data streams to multiple antennas.