• Title/Summary/Keyword: Node-Threshold

Search Result 162, Processing Time 0.026 seconds

The Threshold Based Cluster Head Replacement Strategy in Sensor Network Environment (센서 네트워크 환경의 임계값 기반 클러스터 헤드 지연 교체 전략)

  • Kook, Joong-Jin;Ahn, Jae-Hoon;Hong, Ji-Man
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.61-69
    • /
    • 2009
  • Most existing clustering protocols have been aimed to provide balancing the residual energy of each node and maximizing life-time of wireless sensor networks. In this paper, we present the threshold based cluster head replacement strategy for clustering protocols in wireless sensor networks. This protocol minimizes the number of cluster head selection by preventing the cluster head replacement up to the threshold of residual energy. Reducing the amount of head selection and replacement cost, the life-time of the entire networks can be extended compared with the existing clustering protocols. Our simulation results show that our protocol outperformed than LEACH in terms of balancing energy consumption and network life-time.

  • PDF

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.

Wearable Approach of ECG Monitoring System for Wireless Tele-Home Care Application

  • Kew, Hsein-Ping;Noh, Yun-Hong;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.337-340
    • /
    • 2009
  • Wireless tele-home-care application gives new possibilities for ECG (electrocardiogram) monitoring system with wearable biomedical sensors. Thus, continuously development of high convenient ECG monitoring system for high-risk cardiac patients is essential. This paper describes to monitor a person's ECG using wearable approach. A wearable belt-type ECG electrode with integrated electronics has been developed and has proven long-term robustness and monitoring of all electrical components. The measured ECG signal is transmitted via an ultra low power consumption wireless sensor node. ECG signals carry a lot clinical information for a cardiologist especially the R-peak detection in ECG. R-peak detection generally uses the threshold value which is fixed thus it bring errors due to motion artifacts and signal size changes. Variable threshold method is used to detect the R-peak which is more accurate and efficient. In order to evaluate the performance analysis, R-peak detection using MIT-BIH databases and Long Term Real-Time ECG is performed in this research. This concept able to allow patient to follow up critical patients from their home and early detecting rarely occurrences of cardiac arrhythmia.

  • PDF

An Enhanced Fuzzy ART Algorithm for The Effective Identifier Recognition From Shipping Container Image (효과적인 운송 컨테이너 영상의 식별자 인식을 위한 개선된 퍼지 ART 알고리즘)

  • 김광백
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.486-492
    • /
    • 2003
  • The vigilance threshold of conventional fuzzy ART algorithm decide whether to permit the mismatch between any input pattern and stored pattern. If the vigilance threshold was large, despite of little difference among input and stored patterns, the input pattern may be classified to new category. On the other hand, if the vigilance threshold was small, the similarity between two patterns may be accepted in spite of lots of difference and the input pattern are classified to category of the stored pattern. Therefore, the vigilance threshold for the image recognition must be experientially set for the good result. Moreover, it may occur in the fuzzy ART algorithm that the information of stored patterns is lost in the weight-adjusting process and the rate of pattern recognition is dropped. In this paper, I proposed the enhanced fuzzy ART algorithm that supports the dynamical setting of the vigilance threshold using the generalized intersection operator of fuzzy logic and the weight value being adaptively set in proportional to the current weight change and the previous weight by reflecting the frequency of the selection of winner node. For the performance evaluation of the proposed method, we applied to the recognition of container identifiers from shipping container images. The experiment showed that the proposed method produced fewer clusters than conventional ART2 and fuzzy ART algorithm. and had tile higher recognition rate.

A Genetic-Algorithm-Based Optimized Clustering for Energy-Efficient Routing in MWSN

  • Sara, Getsy S.;Devi, S. Prasanna;Sridharan, D.
    • ETRI Journal
    • /
    • v.34 no.6
    • /
    • pp.922-931
    • /
    • 2012
  • With the increasing demands for mobile wireless sensor networks in recent years, designing an energy-efficient clustering and routing protocol has become very important. This paper provides an analytical model to evaluate the power consumption of a mobile sensor node. Based on this, a clustering algorithm is designed to optimize the energy efficiency during cluster head formation. A genetic algorithm technique is employed to find the near-optimal threshold for residual energy below which a node has to give up its role of being the cluster head. This clustering algorithm along with a hybrid routing concept is applied as the near-optimal energy-efficient routing technique to increase the overall efficiency of the network. Compared to the mobile low energy adaptive clustering hierarchy protocol, the simulation studies reveal that the energy-efficient routing technique produces a longer network lifetime and achieves better energy efficiency.

A Method of Input Buffer Limit with Restriction of Transit Traffics (Transit Traffic을 조절하도록 하는 입력 버퍼 제한 방법)

  • Song, Myong-Ryol;Park, Seong-Rae;Park, Mig-Non;Lee, Sang-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1170-1173
    • /
    • 1987
  • A network flow control method, input buffer limit technique which can adjusts the transit traffics in a node, is proposed. The transit traffics that occupy node buffers more threshold are decreased. It has better performance than input buffer limit. The proposed flow control is analyzed by queueing model. Numerical results of some example are shown.

  • PDF

Operation Policy for Enhancing Availability of a Web Server against DoS Attacks (서비스 거부 공격에 대응한 웹서버 가용성 향상을 위한 운용 정책 방안)

  • Baik, Nam-Kyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.735-744
    • /
    • 2008
  • This paper proposes a 'secure node' to be robust against network-based DoS attacks. The secure node selectively accepts new sessions based on the Zipf's law while a link is in the overload state. Our scheme calculates a threshold value for overload state, and provides a dynamic service mechanism for enhancing availability of a web server. The simulation results show performance improvement of the proposed scheme in terms of completion/connection ratios.

DCAR: Dynamic Congestion Aware Routing Protocol in Mobile Ad Hoc Networks

  • Kim, Young-Duk;Lee, Sang-Heon;Lee, Dong-Ha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.1
    • /
    • pp.8-13
    • /
    • 2006
  • In mobile ad hoc networks, most of on demand routing protocols such as DSR and AODV do not deal with traffic load during the route discovery procedure. To achieve load balancing in networks, many protocols have been proposed. However, existing load balancing schemes do not consider the remaining available buffer size of the interface queue, which still results in buffer overflows by congestion in a certain node which has the least available buffer size in the route. To solve this problem, we propose a load balancing protocol called Dynamic Congestion Aware Routing Protocol (DCAR) which monitors the remaining buffer length of all nodes in routes and excludes a certain congested node during the route discovery procedure. We also propose two buffer threshold values to select an optimal route selection metric between the traffic load and the minimum hop count. Through simulation study, we compare DCAR with other on demand routing protocols and show that the proposed protocol is more efficient when a network is heavily loaded.

  • PDF

OQMCAR: An enhanced network coding-aware routing algorithm based on queue state and local topology

  • Lu, Cunbo;Xiao, Song;Miao, Yinbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2875-2893
    • /
    • 2015
  • Existing coding aware routing algorithms focused on novel routing metric design that captures the characteristics of network coding. However, in packet coding algorithm, they use opportunistic coding scheme which didn't consider the queue state of the coding node and are equivalent to the conventional store-and-forward method in light traffic load condition because they never delay packets and there are no packets in the output queue of coding node, which results in no coding opportunity. In addition, most of the existing algorithms assume that all flows participating in the network have equal rate. This is unrealistic since multi-rate environments are often appeared. To overcome above problem and expand network coding to light traffic load scenarios, we present an enhanced coding-aware routing algorithm based on queue state and local topology (OQMCAR), which consider the queue state of coding node in packet coding algorithm where the control policy is of threshold-type. OQMCAR is a unified framework to merge single rate case and multiple rate case, including the light traffic load scenarios. Simulations results show that our scheme can achieve higher throughput and lower end-to-end delay than the current mechanisms using COPE-type opportunistic coding policy in different cases.

Effective Destination Decision Policies for Dynamic Load Balancing in Distributed Computer Systems with Star Topology (스타형 분산 컴퓨터 시스템의 동작 부하분산을 위한 효율적인 위치결정 정책)

  • Im, Gyeong-Su;Ha, Seong-Ryong;Kim, Jong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.768-776
    • /
    • 1995
  • In a distributed computer system with star topology, the processing power of central node may be greater than that of peripheral nodes and the job arrival rate of each node may be different. The performance of load balancing may be very different according to the selection of sender criteria and receiver criteria for job transfer. But the optimal decision of sender and receiver criteria is very difficult in heterogeneous distributed computer systems. In this paper we propose effective destination decision policies using dynamic criteria such as mean job response time of a node and estimated response time of a job, instead of fixed threshold for dynamic load balancing.

  • PDF