• Title/Summary/Keyword: Mobile sensor network

Search Result 680, Processing Time 0.023 seconds

Communication Protocol for Mobile Sensor Networks (이동 센서 네트워크를 위한 통신 프로토콜)

  • Kim, Hyoung-Jin;Kim, Lae-Young;Song, Joo-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.395-398
    • /
    • 2006
  • 최근 Robomote, Robotic Sensor Agents(RSA)와 같은 이동 센서의 등장으로 인해 이동 센서네트워크(MSN: Mobile Sensor Network)에 대한 연구가 활발히 진행되고 있다. 하지만 기존의 이동 센서네트워크에 대한 연구는 주로 기존의 고정 센서네트워크(SSN: Stationary Sensor Network)에서 발생하는 문제점인 coverage hole을 해결하는데 초점을 맞추고 있다. 이러한 연구들에서는 이동 센서들에게 부여된 이동 능력을 최대한 활용하지 못하는 단점을 안고 있다. 이를 해결하기 위해 이동 센서에게 지속적인 이동성을 부여함으로써 고정 센서네트워크에 비해 더 넓은 영역을 센싱하도록 제안한 연구가 있으나, 그 연구가 아직 초기 단계로써 이동 센서의 지속적인 이동으로 인한 싱크 노드로의 통신 경로 설정 및 데이터 전송 문제에 대해서는 논하고 있지 않다. 이에 본 논문에서는 지속적인 이동성을 갖는 이동 센서로 구성된 이동 센서네트워크 환경에서 효율적으로 경로 설정 및 데이터 전송을 가능하게 하는 통신 프로토콜을 제안한다. 제안하는 프로토콜에서는 이동 센서와 함께 고정 센서를 배치함으로써 고정 센서가 이동 센서를 대신하여 싱크 노드로 센싱 데이터를 전송하도록 한다. 시뮬레이션을 이용한 성능 평가를 통해 제안한 통신 프로토콜이 기존의 고정 센서네트워크에 비해 센싱 영역 성능에서 우수함을 보여준다.

  • PDF

The Underwater UUV Docking with 3D RF Signal Attenuation based Localization (UUV의 수중 도킹을 위한 전자기파 신호 기반의 위치인식 센서 개발)

  • Kwak, Kyungmin;Park, Daegil;Chung, Wan Kyun;Kim, Jinhyun
    • Journal of Sensor Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.199-203
    • /
    • 2017
  • In this paper, we developed an underwater localization system for underwater robot docking using the electromagnetic wave attenuation model. Electromagnetic waves are generally known to be impossible to use in water environment. However, according to the conclusions of the previous studies on the attenuation characteristics in underwater, the attenuation pattern is uniform and its model was accurately proposed and verified in 3-dimensional space via the omnidirectional antenna. In this paper, a docking structure and localization sensor system are developed for a widely used cone type docking mechanism. First, we fabricated electromagnetic wave range sensor transmit modules. And a mobile sensor node is equipped with unmanned underwater vehicle(UUV)s. The mobile node senses the four different signal strength (RSS: Received Signal Strength) from fixed nodes, and the obtained RSS data are transformed to each distance information using the 3-Dimensional EM wave attenuation model. Then, the relative localization between the docking area and underwater robot can be achieved according to optimization algorithm. Finally, experimental results show the feasibility of the proposed localization system for the docking induction by comparing the errors in the actual position of the mobile node and the theoretical position through the model.

An Adaptive FEC Code Control Algorithm for Mobile Wireless Sensor Networks

  • Ahn Jong-Suk;Hong Seung-Wook;Heidemann John
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.489-498
    • /
    • 2005
  • For better performance over a noisy channel, mobile wireless networks transmit packets with forward error correction (FEC) code to recover corrupt bits without retransmission. The static determination of the FEC code size, however, degrades their performance since the evaluation of the underlying channel state is hardly accurate and even widely varied. Our measurements over a wireless sensor network, for example, show that the average bit error rate (BER) per second or per minute continuously changes from 0 up to $10^{-3}$. Under this environment, wireless networks waste their bandwidth since they can't deterministically select the appropriate size of FEC code matching to the fluctuating channel BER. This paper proposes an adaptive FEC technique called adaptive FEC code control (AFECCC), which dynamically tunes the amount of FEC code per packet based on the arrival of acknowl­edgement packets without any specific information such as signal to noise ratio (SNR) or BER from receivers. Our simulation experiments indicate that AFECCC performs better than any static FEC algorithm and some conventional dynamic hybrid FEC/ARQ algorithms when wireless channels are modeled with two-state Markov chain, chaotic map, and traces collected from real sensor networks. Finally, AFECCC implemented in sensor motes achieves better performance than any static FEC algorithm.

Mobile Sensor Relocation to Prolong the Lifetime of Wireless Sensor Networks (무선 센서망의 수명 연장을 위한 센서 재배치)

  • Yoo, Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.338-348
    • /
    • 2009
  • The Wireless Sensor Network (WSN) has recently attracted considerable attention due to the low price and ease to deploy it. In particular, in a hostile or harsh regions where sensors cannot be deployed manually, WSNs can be established just by dropping sensors from the air. In this case, however, most likely sensors are not placed at optimal positions, although the location of sensors does have a drastic impact on the WSN performance. Moreover, randomized deployment algorithm can leave holes in terms of coverage in the sensing area. This paper proposes a sensor relocation scheme where mobile sensors move to patch up the holes by appropriate coverage. Simulation results show that the proposed algorithm outperforms prior existing schemes in terms of coverage and lifespan of WSNs.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Study on Query Type and Data Structure for Mobile Meteorological Services

  • Choi, Jin-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.457-460
    • /
    • 2011
  • For the mobile meteorological services, sensed data should be gathered at a server from various clients like as Ubiquitous Sensor Network, mobile phone or public traffic vehicle by wireless network. The gathered data at server have huge volume and increase continuously. Therefore, a special query method and data structure should be considered. This paper studies on all possible query type on the data and processing steps for the mobile meteorological services. Some query spaces will be discussed. After that, this paper proposes effective data structure for the sensed data to support the query types.

A study of data harvest in distributed sensor networks (분산 센서 네트워크에서 데이터 수집에 대한 연구)

  • Park, Sangjoon;Lee, Jongchan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3421-3425
    • /
    • 2015
  • In sensor networks, sensor nodes are usually distributed to manage the networks in continuous unique area, however as by the network property nodes can be located in several areas. The data gathering of distributed nodes to several areas can be different with current continuous area. Hence, the distributed networks can be differently managed to the current continuous networks. In this paper, we describe the data gathering of sensor nodes in distributed sensor areas. It is possible that sensor nodes cannot instantly connect the mobile sink, and the node operation should be considered. The real time data sending to the instant connection scheme of mobile sink can be implemented, but the property of mobile sink should be considered for the sink connection of distributed areas. In this paper, we analyze the proposed scheme by the simulation results. The simulation results show that the overall lifetime to the periodic data gathering method is longer than the threshold method.

The Analysis of Security in Wirless Sensor Netwroks (무선네트워크에서의 보안기술 분석)

  • Byun, Byung-Kil;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.569-572
    • /
    • 2005
  • A generation to have felt convenience of a network by a development of Internet is pressing for realization of a wireless network. However, security of wireless network must begin with an attack to be good at all expectations. especially considred from L1 layer to L7 layer. Wireless Network weaker than wire because smuggle through various sensor terminal and invasion of radio waves netwwork Wireless network recognizes a security proposal of physical, network application layer, and is going to discuss a security development point of wiress network from now on.

  • PDF

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Location Awareness Method using Vector Matching of RSSI in Low-Rate WPAN (저속 WPAN에서 수신신호세기의 Vector Matching을 이용한 위치 인식 방식)

  • Nam Yoon-Seok;Choi Eun-Chang;Huh Jae-Doo
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.93-104
    • /
    • 2005
  • Recently, RFID/USN is one of fundamental technologies in information and communications networks. Low-Rate WPAN, IEEE802.15.4 is a low-cost communication network that allows wireless connectivity in applications with limited Power and relaxed throughput requirements. Its applications are building automation, personal healthcare, industrial control, consumer electronics, and so on. Some applications require location information. Of course location awareness is useful to improve usability of data Low-Rate WPAN Is regarded as a key specification of the sensor network with the characteristics of wireless communication, computing, energy scavenging, self-networking, and etc. Unfortunately ZigBee alliance propose a lot of applications based on location aware technologies, but the specification and low-rate WPAN devices don't support anything about location-based services. RSSI ( Received Signal Strength indication) is for energy detection to associate, channel selection, and etc. RSSI is used to find the location of a potable device in WLAN. In this paper we studied indoor location awareness using vector matching of RSSI in low-Rate wireless PAN. We analyzed the characteristics of RSSI according to distance and experimented location awareness. We implemented sensor nodes with different shapes and configured the sensor network for the location awareness with 4 fixed nodes and a mobile node. We try to contribute developing location awareness method using RSSI in 3-dimension space.

  • PDF