• Title/Summary/Keyword: Paper-based sensor

Search Result 5,640, Processing Time 0.029 seconds

Development of single walled-carbon nanotubes based pH sensor using ultra-precision spray method (초정밀 스프레이 방법을 이용한 단일벽 탄소나노튜브 pH센서 개발)

  • Kwon, Jae-Hong;Lee, Kyong-Soo;Lee, Yun-Hi;Ju, Byeong-Kwon
    • Journal of Sensor Science and Technology
    • /
    • v.15 no.2
    • /
    • pp.127-133
    • /
    • 2006
  • Recent studies demonstrated the ability of carbon nanotube (CNT) to promote electron transfer reactions of important compounds and to impart higher stability onto electrochemical sensors. CNT-based sensors measured by hydroxyl radical concentration or pH value suggest great promise for biosensors. This paper describes a new method for fabricating a very simple and inexpensive pH sensor compose of single walled-carbon nanotubes (SW-CNTs) using an ultra-precision spray. CNT-based sensor shows pH sensitivity in buffer solution at different pH range. Our experimental results show the sensor responses to pH buffer solution and the conductance of depends on the pH values. These results support application possibility of SW-CNTs based pH sensor for mass production.

A Design of Sybil Attack detection technique using ID-based certificate on Sensor network (센서 네트워크에서 ID기반 인증서를 이용한 Sybil 공격 탐지 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.467-470
    • /
    • 2012
  • This paper proposes a technique of sybil attack detection using an ID-based certificate on sensor network. First, it can solve the broadcast storm problem happening when keys are distributed to sensor nodes. Second, it prevents the replay attack by periodically generating and changing the keys of sensor nodes with Key-chain technique. Third, it authenticates sensor node's ID using hash function. So, it maximizes sensor node's memory usage, reduces communication overhead. Finally it detects Sybil attack through ID-based certificate. Therefore, the proposed technique of Sybil attack detection using ID-based certificate consider simultaneously energy efficiency and stability on sensor network environment, and can trust the provided information through sensor network.

  • PDF

Canonical correlation analysis based fault diagnosis method for structural monitoring sensor networks

  • Huang, Hai-Bin;Yi, Ting-Hua;Li, Hong-Nan
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.1031-1053
    • /
    • 2016
  • The health conditions of in-service civil infrastructures can be evaluated by employing structural health monitoring technology. A reliable health evaluation result depends heavily on the quality of the data collected from the structural monitoring sensor network. Hence, the problem of sensor fault diagnosis has gained considerable attention in recent years. In this paper, an innovative sensor fault diagnosis method that focuses on fault detection and isolation stages has been proposed. The dynamic or auto-regressive characteristic is firstly utilized to build a multivariable statistical model that measures the correlations of the currently collected structural responses and the future possible ones in combination with the canonical correlation analysis. Two different fault detection statistics are then defined based on the above multivariable statistical model for deciding whether a fault or failure occurred in the sensor network. After that, two corresponding fault isolation indices are deduced through the contribution analysis methodology to identify the faulty sensor. Case studies, using a benchmark structure developed for bridge health monitoring, are considered in the research and demonstrate the superiority of the new proposed sensor fault diagnosis method over the traditional principal component analysis-based and the dynamic principal component analysis-based methods.

LSTM-based Model for Effective Sensor Filtering in Sensor Registry System (센서 레지스트리 시스템에서 효율적인 센서 필터링을 위한 LSTM 기반 모델)

  • Chen, Haotian;Jung, Hyunjun;Lee, Sukhoon;On, Byung-Won;Jeong, Dongwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.12-14
    • /
    • 2021
  • A sensor registry system (SRS) provides semantic metadata about a sensor based on location information of a mobile device in order to solve a problem of interoperability between a sensor and a device. However, if the GPS of the mobile device is incorrectly received, the SRS receives incorrect sensor information and has a problem in that it cannot connect with the sensor. This paper proposes a dual collaboration strategy based on geographical embedding and LSTM-based path prediction to improve the probability of successful requests between mobile devices and sensors to address this problem and evaluate with the Monte Carlo approach. Through experiments, it was shown that the proposed method can compensate for location abnormalities and is an effective multicasting mechanism.

  • PDF

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

Localization of Outdoor Wheeled Mobile Robots using Indirect Kalman Filter Based Sensor fusion (간접 칼만 필터 기반의 센서융합을 이용한 실외 주행 이동로봇의 위치 추정)

  • Kwon, Ji-Wook;Park, Mun-Soo;Kim, Tae-Un;Chwa, Dong-Kyoung;Hong, Suk-Kyo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.8
    • /
    • pp.800-808
    • /
    • 2008
  • This paper presents a localization algorithm of the outdoor wheeled mobile robot using the sensor fusion method based on indirect Kalman filter(IKF). The wheeled mobile robot considered with in this paper is approximated to the two wheeled mobile robot. The mobile robot has the IMU and encoder sensor for inertia positioning system and GPS. Because the IMU and encoder sensor have bias errors, divergence of the estimated position from the measured data can occur when the mobile robot moves for a long time. Because of many natural and artificial conditions (i.e. atmosphere or GPS body itself), GPS has the maximum error about $10{\sim}20m$ when the mobile robot moves for a short time. Thus, the fusion algorithm of IMU, encoder sensor and GPS is needed. For the sensor fusion algorithm, we use IKF that estimates the errors of the position of the mobile robot. IKF proposed in this paper can be used other autonomous agents (i.e. UAV, UGV) because IKF in this paper use the position errors of the mobile robot. We can show the stability of the proposed sensor fusion method, using the fact that the covariance of error state of the IKF is bounded. To evaluate the performance of proposed algorithm, simulation and experimental results of IKF for the position(x-axis position, y-axis position, and yaw angle) of the outdoor wheeled mobile robot are presented.

Development of Multi-Sensor Station for u-Surveillance to Collaboration-Based Context Awareness (협업기반 상황인지를 위한 u-Surveillance 다중센서 스테이션 개발)

  • Yoo, Joon-Hyuk;Kim, Hie-Cheol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.8
    • /
    • pp.780-786
    • /
    • 2012
  • Surveillance has become one of promising application areas of wireless sensor networks which allow for pervasive monitoring of concerned environmental phenomena by facilitating context awareness through sensor fusion. Existing systems that depend on a postmortem context analysis of sensor data on a centralized server expose several shortcomings, including a single point of failure, wasteful energy consumption due to unnecessary data transfer as well as deficiency of scalability. As an opposite direction, this paper proposes an energy-efficient distributed context-aware surveillance in which sensor nodes in the wireless sensor network collaborate with neighbors in a distributed manner to analyze and aware surrounding context. We design and implement multi-modal sensor stations for use as sensor nodes in our wireless sensor network implementing our distributed context awareness. This paper presents an initial experimental performance result of our proposed system. Results show that multi-modal sensor performance of our sensor station, a key enabling factor for distributed context awareness, is comparable to each independent sensor setting. They also show that its initial performance of context-awareness is satisfactory for a set of introductory surveillance scenarios in the current interim stage of our ongoing research.

A Distance Estimation Algorithm Based on Multi-Code Ultrasonic Sensor and Received Signal Strength (다중 코드 초음파와 전파 신호 강도를 이용한 거리 측정)

  • Cho, Bong-Su;Kim, Phil-Soo;Moon, Woo-Sung;Baek, Kwang-Ryul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.149-156
    • /
    • 2011
  • This paper reveals a distance estimation algorithm based on multi-code ultrasonic and wireless sensor network. For measuring the distances among the sensor nodes, each ultrasonic transmitter transmits multi-code ultrasonic signal simultaneously. Receivers use cross correlation method to separate the coded signals. The information of measured distances is broadcasted to each sensor node by wireless sensor network. The wireless sensor network measures the distance among the sensor nodes using the received signal strength of the broadcasting. The multi-code ultrasonic have a limitation of measurable distance. And the received signal strength is affected from an environment. This paper measures a distance using ultrasonic and a received signal strength in short range. These measured data are applied to the least square estimation algorithm. By the expansion of the fitting curve, a distance measurement in long range using the received signal strength is compensated. The coupled system reduce the error to an acceptable level.

Mutual Attestation Protocol using Software-based Attestation Scheme in Sensor Network Environments (SWATT 기법을 이용한 센서 노드 간 상호 검증 프로토콜)

  • Heo, Kyung-Soo;Choi, Hyun-Woo;Jang, Hyun-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.9-18
    • /
    • 2008
  • Prevention of attacks being made through program modification in sensor nodes is one of the important security issues. The software-based attestation technology that verifies the running code by checking whether it is modified or not in sensor nodes is being used to solve the attack problem. However, the current software-based attestation techniques are not appropriate in sensor networks because not only they are targeting static networks that member nodes does not move, but also they lacks consideration on the environment that the trusted verifier may not exist. This paper proposes a mutual attestation protocol that is suitable for sensor networks by using SWATT(Software-based ATTestation) technique. In the proposed protocol, sensor nodes periodically notify its membership to neighbor nodes and carry out mutual attestation procedure with neighbor nodes by using SWATT technique. With the proposed protocol, verification device detects the sensor nodes compromised by malicious attacks in the sensor network environments without trusted verifier and the sensor networks can be composed of only the verified nodes.