• 제목/요약/키워드: Low-power protocol communication

Search Result 172, Processing Time 0.03 seconds

Performance analysis of CSMA based MAC protocols for underwater communications (수중 통신에 적합한 CSMA기반 매체접근제어 프로토콜 연구)

  • Song, Min-Je;Jang, Youn-Seon
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1068-1072
    • /
    • 2018
  • In underwater communications, there are many challenges due to energy limitations, long propagation delay, low data rate, and high power loss, unlike terrestrial RF communications. Especially, the propagation delay of underwater acoustic channel is five orders of magnitude higher than in electro-magnetic terrestrial channels due to the low speed of sound(1,500m/s). Thus, the MAC protocols for terrestrial communications are not suitable for underwater network. In this paper, we studied the considerations for MAC protocol in underwater acoustic channel. Here, we concentrated on CSMA based MAC protocols. From the results, we confirmed that the number of control packets has an important effect on the performance in underwater environment. These results would be useful in designing MAC protocols for underwater acoustic communications.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

A Solar Cell based Power Production and Supply Complying with the Active and Sleep Modes of Sensor MAC Protocols (솔라셀 작동 모드와 센서 MAC 프로토콜의 Active 및 Sleep 모드를 고려한 전력 생산 및 공급 제어)

  • Lee, Seung-Yong;Lee, Woong;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.423-432
    • /
    • 2012
  • We design a control circuit that can switch input power between a rechargeable battery and a sensor communication device (mote) depending on the operating state of a solar cell as well as the active and sleep mode of a sensor MAC protocol. A mote that simply combines a solarcell and a rechargeable battery may die if there is not sunlight long. A battery is recharged if sunlight is sufficient and a device is in a sleep mode, and it supplies power if sunlight is low and the mote is in an active mode. A mote can switch its input power between solar cell and battery depending on the output level of a solar cell. During this switching, a mote may lose its state information due to the reset of a microprocessor by the transient power-off. A capacitor is used to cope with this phenomenon and also supplies power to a mote during a sleep mode. Experimental results show that the solar cell based mote operates in a very stable manner against the lack of sunlight long.

A Study on Design and Analysis of Module Control Method for Extended Use of Rechargeable Batteries in Mobile Devices (모바일 장치의 충전식 배터리 사용 연장을 위한 모듈 제어 방법 설계와 해석 연구)

  • Dohyeong Kim;jihoon Ryu;JinPyo Jo;JeongHo Kim
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.34-44
    • /
    • 2024
  • This paper proposes a dynamic clock supply control algorithm and a system load power stabilization algorithm that minimizes the power consumption of the sensing system, which accounts for the largest percentage of power consumption in mobile devices, to extend the usage time of the rechargeable battery mounted on the mobile device. The dynamic clock supply control algorithm can reduce the power consumed by the sensing system by configuring a circuit to cut off the power of the sensing system and by recognizing the state of low sensor change and adjusting the measurement cycle. The system load power stabilization algorithm is an algorithm that controls the power of the surrounding module according to the power consumption state, and when it requires a lot of power, it controls the clock supply to stabilize the operation. The experimental results confirmed that applying only the dynamic clock supply control algorithm reduces the power consumed by the sensing system by 17%, and applying only the system load power stabilization algorithm reduces power consumption by 9.3%, enabling it to operate stably in situations that require a lot of power such as image processing. When both algorithms were applied, the power consumption of the battery was reduced by 67% compared to before applying the algorithm. Through this, the reliability of the proposed method was confirmed.

  • PDF

Development of Wireless Data Transmission System for LPWA-based Industrial Sites (LPWA 기반 산업현장의 무선 데이터 전송 시스템 개발)

  • Kwon, Hyuk;Cho, Kyoung-Woo;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.37-42
    • /
    • 2018
  • Recently, there have been many studies on the IoT environment in which the sensors attached to the equipment automatically transmit and process the site information in real time through the network to control the equipment. The core of such a system is a network for data transmission and reception, and a wired network with wide transmission distance is a priority. However, in the case of a wired network, there is a problem that the time and cost consumed to configure the communication is higher than that of the wireless. In this paper, we propose LPWA - based wireless data transmission system using LPWA and BLE communication to solve this problem. The proposed system collects data from equipment through BLE and transmits data to the server using LPWA. Experimental results show that the spreading factor of maximum length of LPWA is 8, and the minimum length is 9.

Delay time Analysis of Asynchronous RIT Mode MAC in Wi-SUN (Wi-SUN에서 비동기 RIT모드 MAC의 지연시간 분석)

  • Dongwon Kim;Mi-Hee Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.65-70
    • /
    • 2024
  • In recent years, research on smart factory wireless mobile communication technology that wirelessly remotely controls utilities is being actively conducted. The Wi-SUN (Wireless Smart Utility Network) Alliance proposed a Wi-SUN protocol structure suitable for building a platform such as a smart factory as a new wireless communication standardization standard based on EEE802.15.4g/e. It analyzes the performance of the IEEE802.15.4e Receiver Initiated Transmission(RIT) Mode Media Access Control (MAC) in terms of throughput and latency, and looks at considerations for efficient operation. RIT mode shows that as the check interval becomes longer, delay time and throughput decrease. It was shown that as the traffic load increases, if the RIT check interval is shortened, the delay time can be shortened and throughput can be increased. RIT mode has the advantage of low power consumption and has neutral characteristics between IEEE802.15.4 and CSL mode in terms of delay time and throughput.

Low-power 6LoWPAN Protocol Design (저 전력 6LoWPAN 프로토콜 설계)

  • Kim, Chang-Hoon;Kim, Il-Hyu;Cha, Jung-Woo;Nam, In-Gil;Lee, Chae-Wook
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.274-280
    • /
    • 2011
  • Due to their rapid growth and new paradigm applications, wireless sensor networks(WSNs) are morphing into low power personal area networks(LoWPANs), which are envisioned to grow radically. The fragmentation and reassembly of IP data packet is one of the most important function in the 6LoWPAN based communication between Internet and wireless sensor network. However, since the 6LoWPAN data unit size is 102 byte for IPv6 MTU size is 1200 byte, it increases the number of fragmentation and reassembly. In order to reduce the number of fragmentation and reassembly, this paper presents a new scheme that can be applicable to 6LoWPAN. When a fragmented packet header is constructed, we can have more space for data. This is because we use 8-bits routing table ill instead of 16-bits or 54-bits MAC address to decide the destination node. Analysis shows that our design has roughly 7% or 22% less transmission number of fragmented packets, depending on MAC address size(16-bits or 54-bits), compared with the previously proposed scheme in RFC4944. The reduced fragmented packet transmission means a low power consumption since the packet transmission is the very high power function in wireless sensor networks. Therefore the presented fragmented transmission scheme is well suited for low-power wireless sensor networks.