• Title/Summary/Keyword: Intrusion Sensor

Search Result 93, Processing Time 0.025 seconds

Design and Implementation of Optimal Smart Home Security Monitoring System (최적의 스마트 홈 시큐리티 모니터링 시스템 설계 및 구현)

  • Lee, Hyoung-Ro;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.197-202
    • /
    • 2016
  • In this paper, we propose optimal smart home security monitoring system. Proposeed optimal smart home security system using the three types of ultrasonic sensors were tested to obtain reliable data. and Using Raspberry Pi3, the smart home security system was implemented. In addition, It was verified through experiments optimal efficiency with a small amount compared to the conventional sensor of the home security system by the two ultrasonic sensors located in the optimal position. It was able to use two ultrasonic sensors to determine whether the intruder's highly efficient and reliable intrusion, and connect the servo motor at the bottom of the camera so you can shoot adjusted to the attacker's location to shoot the intruder's image. In addition, by using a Web server and stored the recorded image and two ultrasonic sensor data and provide a Web page for a user to monitor at all remote locations.

A Study on Pseudo-random Number Generator with Fixed Length Tap unrelated to the variable sensing nodes for IoT Environments (IoT 환경에서 가변 센싱 노드들에 무관한 고정 길이 탭을 가지는 의사 난수 발생기에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.676-682
    • /
    • 2018
  • As the IoT world including WSNs develops, the number of sensor systems that sense information according to the environment based on the principle of IoT is increasing. In order to perform security for each sensor system in such a complicated environment, the security modules must be varied. These problems make hardware/software implementation difficult when considering the system efficiency and hacking/cracking. Therefore, to solve this problem, this paper proposes a pseudorandom number generator (FLT: Pseudo-random Number Generator with Fixed Length Tap unrelated to the variable sensing nodes) with a fixed-length tap that generates a pseudorandom number with a constant period, irrespective of the number of sensing nodes, and has the purpose of detecting anomalies. The proposed FLT-LFSR architecture allows the security level and overall data formatting to be kept constant for hardware/software implementations in an IoT environment. Therefore, the proposed FLT-LFSR architecture emphasizes the scalability of the network, regardless of the ease of implementation of the sensor system and the number of sensing nodes.

Spatial and Temporal Aspects of Phytoplankton Blooms in Complex Ecosystems Off the Korean Coast from Satellite Ocean Color Observations

  • Ahn, Yu-Hwan;Shanmugam, Palanisamy;Chang, Kyung-Il;Moon, Jeong-Eon;Ryu, Joo-Hyung
    • Ocean Science Journal
    • /
    • v.40 no.2
    • /
    • pp.67-78
    • /
    • 2005
  • Complex physical, chemical and biological interactions off the Korean coast created several striking patterns in the phytoplankton blooms, which became conspicuous during the measurements of ocean color from space. This study concentrated on analyzing the spatial and temporal aspects of phytoplankton chlorophyll variability in these areas using an integrated dataset from a Sea-viewing Wide Field-of-view Sensor (SeaWiFS), Advanced Very High Resolution (AVHRR) sensor, and Conductivity Temperature Depth (CTD) sensor. The results showed that chlorophyll concentrations were elevated in coastal and open ocean regions, with strong summer and fall blooms, which appeared to spread out in most of the enclosed bays and neighboring waters due to certain oceanographic processes. The chlorophyll concentration was observed to range between 3 and $54\;mg\;m^{-3}$ inside Jin-hae Bay and adjacent coastal bays and 0.5 and $8\;mg\;m^{-3}$ in the southeast sea offshore waters, this gradual decrease towards oceanic waters suggested physical transports of phytoplankton blooms from the shallow shelves to slope waters through the influence of the Tsushima Warm Current (TWC) along the Tsushima Strait. Horizontal distribution of potential temperature $(\theta)$ and salinity (S) of water off the southeastern coast exhibited cold and low saline surface water $(\theta and warm and high saline subsurface water $({\theta}>12^{\circ}C; S>34.4)$ at 75dBar, corroborating TWC intrusion along the Tsushima Strait. An eastward branch of this current was called the East Korean Warm Current (EKWC), tracked with the help of CTD data and satellite-derived sea surface temperature, which often influenced the dynamics of mesoscale anticyclonic eddy fields off the Korean east coast during the summer season. The process of such mesoscale anticyclonic eddy features might have produced interior upwelling that could have shoaled and steepened the nutricline, enhancing phytoplankton population by advection or diffusion of nutrients in the vicinity of Ulleungdo in the East Sea.

Secure route determination method to prevent sinkhole attacks in INSENS based wireless sensor networks (INSENS 기반의 무선 센서 네트워크에서 싱크홀 공격을 방어하기 위한 강화된 경로 설정 기법)

  • Song, Kyu-Hyun;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.4
    • /
    • pp.267-272
    • /
    • 2016
  • Wireless sensor networks (WSNs) are vulnerable to external intrusions due to the wireless communication characteristics and limited hardware resources. Thus, the attacker can cause sinkhole attack while intruding the network. INSENS is proposed for preventing the sinkhole attack. INSENS uses the three symmetric keys in order to prevent such sinkhole attacks. However, the sinkhole attack occurs again, even in the presence of INSENS, through the compromised node because INSENS does not consider the node being compromised. In this paper, we propose a method to counter the sinkhole attack by considering the compromised node, based on the neighboring nodes' information. The goals of the proposed method are i) network reliability improvement and ii) energy conservation through effective prevention of the sinkhole attack by detecting compromised nodes. The experimental results demonstrate that the proposed method can save up to, on average, 19.90% of energy while increasing up to, on average, 71.50%, the report reliability against internal sinkhole attacks in comparison to INSENS.

Performance Evaluation of Wireless Sensor Networks in the Subway Station of Workroom (지하철 역사내 무선 센서네트워크 환경구축을 위한 무선 스펙트럼 분석 및 전송시험에 관한 연구)

  • An, Tea-Ki;Kim, Gab-Young;Yang, Se-Hyun;Choi, Gab-Bong;Sim, Bo-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3220-3226
    • /
    • 2011
  • In order to monitor internal risk factors such as fire, terror, etc. on the subway station, the surveillance systems using CCTV and various kinds of sensors have been implemented and recently, introduction of surveillance systems using an advanced IT technology, sensor network technology is tried on several areas. Since 2007, Korean government has made an effort to develop the intelligent surveillance and monitoring system, which can monitor fire, intrusion, passenger congestion, health-state of structure, etc., by using wireless sensor network technology and intelligent video analytic technique. For that purpose, this study carried out field wireless communication environment test on Chungmuro Station of Seoul Metro on the basis of ZigBee that is considered as a representative wireless sensor network before field application of the intelligent integrated surveillance system being developed, arranged and analyzed and ZigBee based wireless communication environment test results on the platform and waiting room of Chungmuro Station on this paper. Results of wireless spectrum analysis on the platform and waiting room showed that there is no radio frequency overlapped with that of ZigBee based sensor network and no frequency interference with adjacent frequencies separated 10MHz or more. As results of wireless data transmission test using ZigBee showed that data transmission is influenced by multi-path fading effect from the number and flow rate of passengers on the platform or the waiting room rather than effects from entrance and exit of the train to/from the platform, it should be considered when implementing the intelligent integrated surveillance system on the station.

Clustering Algorithm for Efficient Energy Consumption in Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 에너지 사용을 위한 클러스터링 알고리즘)

  • Na, Sung-Won;Choi, Seung-Kwon;Lee, Tae-Woo;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.49-59
    • /
    • 2014
  • Recently, wireless sensor networks(WSNs) are widely used for intrusion detection and ecology, environment, atmosphere, industry, traffic, fire monitoring. In this paper, an energy efficient clustering algorithm is proposed. The proposed algorithm forms clusters uniformly by selecting cluster head that optimally located based on receiving power. Besides, proposed algorithm can induce uniform energy consumption regardless of location of nodes by multi-hop transmission and MST formation with limited maximum depth. Through the above, proposed algorithm elongates network life time, reduces energy consumption of nodes and induces fair energy consumption compared to conventional LEACH and HEED. The results of simulation show that the proposed clustering algorithm elongates network life time through fair energy consumption.

A Collaborative decision making for distributed detection system (분산 탐지 시스템을 위한 협업적 의사 결정)

  • Farooqi, Ashfaq Hussain;Jin, Wang;Khan, Farrukh Aslam;Lee, Sung-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.115-117
    • /
    • 2011
  • Intrusion detection systems (IDS) are supposed to be an efficient safety measure against inside attacks. In purely distributed IDS approach, IDS agent is installed in every node. It checks abnormal behavior of neighboring nodes locally. It collects the data that it receives from nodes in its radio range. Sensor nodes audit that data and generate alerts for abnormal activity. Here, there are two ways of taking decision. First, it can take decision individually and second, it can communicate with its neighbor to find the status of the claimed compromised nodes. In this paper, we propose a collaborative decision making scheme for purely distributed detection system. The proposed scheme is light weight compared to consensus based validation methodology. It provides a better scheme to find intrusions by interacting with other nodes.

Verticality 3D Monitoring System for the Large Circular Steel Pipe (대형 원형강관 수직도 모니터링을 위한 3D 모니터링 시스템)

  • Koo, Sungmin;Park, Haeyoung;Oh, Myounghak;Baek, Seungjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.870-877
    • /
    • 2020
  • A suction bucket foundation, especially useful at depths of more than 20m, is a method of construction. The method first places an empty upturned bucket at the target site. Then, the bucket is installed by sucking water or air into it to create negative pressure. For stability, it is crucial to secure the verticality of the bucket. However, inclination by the bucket may occur due to sea-bottom conditions. In general, a repeated intrusion-pulling method is used for securing verticality. However, it takes a long time to complete the job. In this paper, we propose a real-time suction bucket verticality monitoring system. Specifically, the system consists of a sensor unit that collects raw verticality data, a controller that processes the data and wirelessly transmits the information, and a display unit that shows verticality information of a circular steel pipe. The system is implemented using an inclination sensor and an embedded controller. Experimental results show that the proposed system can efficiently measure roll/pitch information with a 0.028% margin of error. Furthermore, we show that the system properly operates in a suction bucket-based model experiment.

A Study on the Energy Efficient Data Aggregation Method for the Customized Application of Underwater Wireless Sensor Networks (특정 응용을 위한 수중센서네트워크에서 에너지 효율적인 데이터통합 방법 연구)

  • Kim, Sung-Un;Park, Seon-Yeong;Yu, Hyung-Cik
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1438-1449
    • /
    • 2011
  • UWSNs(Underwater Wireless Sensor Networks) need effective modeling fitted to the customized type of application and its covering area. In particular it requires an energy efficient data aggregation method for such customized application. In this paper, we envisage the application oriented model for monitoring the pollution or intrusion detection over a given underwater area. The suggested model is based on the honeycomb array of hexagonal prisms. In this model, the purpose of data aggregation is that the head node of each layer(cluster) receives just one event data arrived firstly and transfer this and its position data to the base station effectively in the manner of energy efficiency and simplicity without duplication. Here if we apply the existent data aggregation methods to this kind of application, the result is far from energy efficiency due to the complexity of the data aggregation process based on the shortest path or multicast tree. In this paper we propose three energy efficient and simple data aggregation methods in the domain of cluster and three in the domain of inter-cluster respectively. Based on the comparative performance analysis of the possible combination pairs in the two domains, we derive the best energy efficient data aggregation method for the suggested application.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.