• Title/Summary/Keyword: Relay network

Search Result 701, Processing Time 0.024 seconds

An Energy Efficient Interference-aware Routing Protocol for Underwater WSNs

  • Khan, Anwar;Javaid, Nadeem;Ali, Ihsan;Anisi, Mohammad Hossein;Rahman, Atiq Ur;Bhatti, Naeem;Zia, Muhammad;Mahmood, Hasan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4844-4864
    • /
    • 2017
  • Interference-aware routing protocol design for underwater wireless sensor networks (UWSNs) is one of the key strategies in reducing packet loss in the highly hostile underwater environment. The reduced interference causes efficient utilization of the limited battery power of the sensor nodes that, in consequence, prolongs the entire network lifetime. In this paper, we propose an energy-efficient interference-aware routing (EEIAR) protocol for UWSNs. A sender node selects the best relay node in its neighborhood with the lowest depth and the least number of neighbors. Combination of the two routing metrics ensures that data packets are forwarded along the least interference paths to reach the final destination. The proposed work is unique in that it does not require the full dimensional localization information of sensor nodes and the network total depth is segmented to identify source, relay and neighbor nodes. Simulation results reveal better performance of the scheme than the counterparts DBR and EEDBR techniques in terms of energy efficiency, packet delivery ratio and end-to-end delay.

Pre-cluster HEAD Selection Scheme based on Node Distance in Chain-Based Protocol (체인기반 프로토콜에서 노드의 거리에 따른 예비 헤드노드 선출 방법)

  • Kim, Hyun-Duk;Choi, Won-Ik
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1273-1287
    • /
    • 2009
  • PEGASIS, a chain-based protocol, forms chains from sensor nodes so that each node transmits and receives from a neighbor. In this way, only one node (known as a HEAD) is selected from that chain to transmit to the sink. Although PEGASIS is able to balance the workload among all of the nodes by selecting the HEAD node in turn, a considerable amount of energy may be wasted when nodes which are far away from sink node act as the HEAD. In this study, DERP (Distance-based Energy-efficient Routing Protocol) is proposed to address this problem. DERP is a chain-based protocol that improves the greedy-algorithm in PEGASIS by taking into account the distance from the HEAD to the sink node. The main idea of DERP is to adopt a pre-HEAD (P-HD) to distribute the energy load evenly among sensor nodes. In addition, to scale DERP to a large network, it can be extended to a multi-hop clustering protocol by selecting a "relay node" according to the distance between the P-HD and SINK. Analysis and simulation studies of DERP show that it consumes up to 80% less energy, and has less of a transmission delay compared to PEGASIS.

  • PDF

Scalable Overlay Multicast supporting QoS and Reliability (QoS와 신뢰성을 제공하는 확장성 있는 오버레이 멀티캐스트)

  • Rhee, Choon-Sung;Song, Jung-Wook;Choi, Byoung-Uk;Han, Sun-Young
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.767-774
    • /
    • 2006
  • In order to support overlay multicast with scalability and reliability, in this paper, we introduced a new multicast tree construction method and a regional multicast. The architecture we introduce efficiently transmits streaming data to the users from multicast source in an environment in which non-multicast network and multicast network. The new multicast tree construction method enables the connection with a remote relay which is an optimum condition in case there is no relay in subnet. Besides, by defining a new service type to traffic class of IPv6 header, a selective adoption or FEC and a distinctive transmission became possible. In order to verify the effect of the solution we suggested, we embodied an environment which is similar to the actual service environment by a simulator and tested it. The result of the test shows that the proposed method is more efficient than the traditional unicast approach method and the existing overlay multicast.

UWB-based Class 4 Active RFID Protocol for USN Application (USN 응용을 위한 UWB 기반의 Class 4 능동형 RFID 프로토콜)

  • Hong, Sung-Hyun;Zhang, Hong;Chang, Kyung-Hi;Shin, Dong-Beom;Lee, Heyung-Sub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7A
    • /
    • pp.669-681
    • /
    • 2010
  • In this paper, we analyze the active RFID system ISO/IEC 18000-7. In order to apply to USN, which consists active RFID tags and sensor nodes, we propose UWB-based Class 4 active RFID protocol using active RFID relay tag as relay AP. To compare the performance between the existing ISO/IEC 18000-7 system and the proposed system, we introduce sensitivity-based measurement of achieved coverage and system efficiency. Also, we analyze the performance of the proposed system and compare it with that of the existing system through MCL analysis and SLS analysis.

Routing Protocol for Wireless Sensor Network Considering Data Transmission Stability and Load Quantity (선형적 데이터 전달의 안정성과 부하량을 고려한 무선 센서 네트워크 라우팅 프로토콜)

  • Hwang, Min;Cheon, Seung-Hwan;You, Jin-Ho;Kien, Nguyen Trung;Lee, Guee-Sang
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.111-119
    • /
    • 2007
  • Sensor networks are needed for special purposes such as collecting or transmitting information by using sensor devices, for which various routing protocols have been proposed. Among existing protocols, the modified PEGASIS routing technique is known to be effective when applied to cases with directional transmissions of data. However it does not consider recovery from errors or guaranteeing stability in data transmission, while sensor devices performing repetitive relays and controls are prone to errors. In this paper, a double relay routing protocol for Zigbee based sensor networks where data are transfered reliably with a linear direction. The proposed protocol is effective in the sense that it secures the relaible transmission of data with minimal energy consumption based on a directional data transfer. A streetlight control system has been presented as an application of the proposed protocol.

A Study of TCP LINK based Real-Time Secure Communication Research in the Ocean (해상에서 실시간 TCP 링크관절 보안통신 연구)

  • Yoo, Jaewon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.250-253
    • /
    • 2014
  • Due to limited resource, marine communication is severely limited when compared to communications in land. Radio relay facilities, etc. based on a wired network through a long distance communication is possible. In addition, the aircraft is in the air, the ground-based network service based on long-range straight-line distance and elevation (LOS: Line of Sight) communications. On the other hand, the distance in a straight line to the sea, the sea level because communication is limited or through satellite, underwater communications relay equipment installed in the communication scheme has been investigated.. In this paper, using TCP-based real-time joint maritime security communication links were studied. Harsh marine environment, real-time communication that can provide secure communications and propose a LINK joint. In this study, more secure, and convenient communications at sea, a plan was presented to you.

  • PDF

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

An Efficient Dynamic Bandwidth Allocation Algorithm for VoDSL Services (VoDSL 서비스를 위한 효율적인 동적 대역폭 할당 알고리즘)

  • Kim, Hoon;Park, Jong-Dae;Nam, Sang-Sig;Park, Kwang-Chae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.48-58
    • /
    • 2002
  • As internet traffic increases, the problem that it should be efficiently accepted in to the existing voice network in the pending problem importantly to the existing communication corporations. The feature of next generation exchange network is made up of the form of integration network that connect data traffic(internet service. Etc) with the existing voice network and it can be showed with very diverse aspects according to the constitution time of network or the characteristics of business. The progress strategy that develop the existing circuit based communication network into packet-based communication network can be divided into two in a large scale according to the application position These are VoDSL application method(Technology that packetize access network) and softswitch technology application method(after packetizing relay network, packetizing that into the access network). In this paper, we will deduce the desirable technology that can construct packet-based next generation exchange networks in the structure of the existing communication network environment. We will perform the research on a device to offer the necessary core technique VoSDL service with realistic resolutions primarily.

The Implementation of Emergency Light Monitoring System by Intelligent Cluster Surveillance Network (지능형 클러스터 감시망 비상등관리시스템 개발)

  • Choi, Jae-Myeong;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.906-912
    • /
    • 2011
  • In this paper, we structured the intelligent cluster surveillance network which can be managed scattered-the emergency light without communication line. Will not be interfered in location of emergency light and not to be will be able to establish the system. And the surveillance network there is by a destroyer and the communication relay system is born breakdown but the dead zone without condition of emergency light implemented the emergency light management system where the monitoring and management are possible. And we implemented the emergency light surveillance equipment and the emergency light monitoring system. Some experiments were conducted to verify so as to proposed system, and the system processes such as the surveillance network, the status information measurement and initialization were well performed.

A Network Coding for Multi-Hop Ship-to-Ship Communications (다중-홉 선박간 통신을 위한 네트워크 부호화 기법)

  • Do, Thinh Phu;Shin, Dongryul;Lee, Seong Ro;Jeong, Min-A;Kim, Yun Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.566-572
    • /
    • 2014
  • We propose a two-way multi-hop relaying scheme improving the throughput as well as enlarging the coverage for ship-to-ship communications in multi-ship marine networks. The proposed scheme reduces the time slots required for the data exchange by designing data transmission and network coding procedures in a sophisticated way based on two-phase digital network coding. Simulation results show that the proposed two-way multi-hop relaying scheme improves the throughput of the conventional one about 5/3 times.