• Title/Summary/Keyword: Node Management

Search Result 1,124, Processing Time 0.033 seconds

Wireless Sensor Node Location Management By Regression Analysis of RSSI (RSSI 측정값의 회귀분석을 이용한 무선센서노드의 위치관리)

  • Choi, Jun-Young;Kim, Hyun-Joong;Yang, Hyun-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.308-311
    • /
    • 2008
  • One of the key technical elements of wireless sensor network (WSN) is location management of sensor nodes. Typical node location management methods use GPS, ultrasonic sensors or RSSI. In this paper we propose a new location management method which adopts regression analysis of RSSI measurement to improve the accuracy of sensor node position estimation. We also evaluated the performance of proposed method by comparing the experimental results with existing scheme. According to the results, our proposed method showed better accuracy than existing location management scheme using RSSI and Firis' equation.

  • PDF

Mobility Management Method for Constrained Sensor Nodes in WoT Environment (WoT 환경에서 제한된 센서 노드의 이동성 관리 방법)

  • Chun, Seung-Man;Ge, Shu-Yuan;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.11-20
    • /
    • 2014
  • For Web-based applications in IoT environment, IETF CoRE WG has standardizing the CoAP. One of limitations of CoAP is that CoAP standard does not consider the mobility management of the CoAP sensor node. In this paper, we propose the mobility management protocol of CoAP sensor node by considering the characteristics of the constrained network. The proposed mobility management protocol supports for Web client to be transmitted the sensing data from CoAP node reliably while the CoAP sensor moves into different wireless networks. To do this, we designed the architecture with the separate IP address management of CoAP sensor node and presented the mobility management protocol, which includes the holding and binding mode, in order to provide the reliable transmission. Finally, the numerical analysis and simulation with NS2 tool have been done for the performance evaluation in terms of the handover latency and packet loss with comparing the proposed mobility management protocol with other the existing mobility management protocols. The performance result shows that the proposed mobility management can provide the transmission of sensing data without the packet loss comparing with the existing mobility management protocol reliably.

MAC Performance Enhancement by Efficient Hidden Node Detection in Infrastructure Mode IEEE 802.11 Wireless LANs (Infrastructure Mode IEEE 802.11 무선랜 시스템에서 효율적인 은닉 단말 발견 방법을 통한 MAC 성능 개선)

  • Choi, Woo-Yong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.34 no.2
    • /
    • pp.246-254
    • /
    • 2008
  • In this paper, a new efficient hidden node detection method is proposed to decide whether the RTS/CTS mechanism is necessary to resolve the hidden node problem for the data transmission of each node in infrastructure mode IEEE 802.11 wireless LANs. The nodes, for which the RTS/CTS mechanism is found to be not necessary by the hidden node detection method, can transmit their data frames without performing the RTS/CTS exchange. Only the nodes, for which the RTS/CTS mechanism is found to be necessary by the hidden node detection method, perform the RTS/CTS exchange before their data frame transmissions.

Performance monitoring and fault node identification method for real-time ATM network management system (실시간 ATM 망 관리 시스템 구현을 위한 성능 감시와 고장 노드 식별 방안)

  • 최용훈;이길흥;송운섭;이준호;이재용;이상배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1311-1322
    • /
    • 1997
  • Performance management of ATM network is urgently required because a different quality of service should be guaranteed on each connection. A lot of performance measurement data increase the burden on agent systems and on managment stations. In this paper, an effective OAM-based performance monitoring and faulty node identification technique is proposed. A proposed VP Selection Algorithm reduces management-related traffic and when the indication of hard or soft failure state is detected, failed node is identified by Fault Identification Rule.

  • PDF

Design and Implementation on High Efficient EPMS(Energy-Power Management System) for USN Sensor Node Using Self-Charging Module (자가 충전 모듈을 이용한 USN 센서노드용 고효율 에너지 전력관리 시스템 구현 및 검증)

  • Kim, Hyun-Woong;Park, Hee-Jeong;Lim, Se-Mi;Oh, Jong-Hwa;Roh, Hyoung-Hwan;Park, Jun-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.124-130
    • /
    • 2011
  • In this paper, We design and implementation of Self-Charging Module for charging to battery which obtaining the environment inergy such as solar energy. The power chared battery through the charging module send to sensor node. And implementation of System Activation Module(SAM) based on ID system and Dynamic Power Management Module(DPM) with SPO(Self Power Off). This system consume power only communication between the sensor nodes. We verification this system by implementing the high efficiency poweer management system.

A Study on the Zone-Key based Secure Routing Scheme in MANET (MANET에서 영역-키 기반 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok;Kim, Young Sun
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.33-39
    • /
    • 2020
  • In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.

A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment (유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Shin, Seung-Ho;Park, Sang-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.6
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Implementation and Performance of Energy-efficient Node Management in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적 노드 관리 기능 구현 및 성능평가)

  • Ji, Kyoung-Bok;Kim, Sang-Kyung;Kim, Chang-Hwa
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.123-131
    • /
    • 2008
  • Many researches have been actively performed to increase energy efficiency in wireless sensor networks. In these researches communication has been the most important target for reducing energy consumption. In fact, in most cases, the frequencies of communication and sensing in a sensor node affect its energy consumption. Therefore, sensing period and transmission period need to be controlled to increase energy efficiency. This paper proposes on energy efficient and restricted query flooding mechanism using service discovery. Further, we implement node management system based on the mechanism and evaluate its performance.

  • PDF

Sensor Node Circuit with Solar Energy Harvesting (빛 에너지 수확을 이용한 센서 노드 회로)

  • Seo, Dong-hyeon;Jo, Yong-min;Woo, Dae-keon;Yoon, Eun-jung;Yu, Chong-gun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.371-374
    • /
    • 2013
  • In this paper, a sensor node circuit using solar energy harvesting is proposed. PMU(Power Management Unit) manages the energy converted from a solar cell. In order to supply a constant voltage to the sensor node, an LDO (Low Drop Out Regulator) is used. The LDO drives a temperature sensor and a SAR ADC(Successive Approximate Register Analog-to-Digital Converter). The circuit has been designed in 0.35um CMOS process.

  • PDF

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.