• Title/Summary/Keyword: Sensor Network Protocols

Search Result 385, Processing Time 0.028 seconds

Discrete-Event Based Packet Simulation for Sensor Network Routing Protocols (분산이벤트 기반 센서네트워크 패킷 라우팅 프로토클 시뮬레이션)

  • Chung, Kyung-Yul;Lee, Hoo-Rock;Choi, Dae-Seok;Kim, Yong-Sik;Lee, Soo-Tae;Rhyu, Keel-Soo
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.79-81
    • /
    • 2006
  • Simulation and physical implementation are both valuable tools in evaluating sensor network routing protocols, but neither alone is sufficient. In this paper, we present the implementation and analysis of sensor routing protocols on the discrete-event simulation system that allows existing nesC codes of sensor network routing protocols to be used to create a physical implementation of the same protocol. We have evaluated the Surge function of TinyOS through example implementations in the Ptolemy II of the unmodified codes and Direct-diffusion routing protocols using VIPTOS simulation models.

  • PDF

Cluster Head Chain Routing Protocol suitable for Wireless Sensor Networks in Nuclear Power Plants (원전 무선 센서 네트워크에 적합한 클러스터 헤드 체인 라우팅 프로토콜)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2020
  • Nuclear power plants have a lower cost of power generation, and they are more eco-friendly than other power generation plants. Also, we need to prepare nuclear plant accidents because of their severe damage. In the event of a safety accident, such as a radiation leak, by applying a wireless sensor network to a nuclear power plant, many sensor nodes can be used to monitor radiation and transmit information to an external base station to appropriately respond to the accident. However, applying a wireless sensor network to nuclear power plants requires routing protocols that consider the sensor network size and bypass obstacles such as plant buildings. In general, the hierarchical-based routing protocols are efficient in energy consumption. In this study, we look into the problems that may occur if hierarchical-based routing protocols are applied to nuclear power plants and propose improved routing protocols to solve these problems. Simulation results show that the proposed routing protocol is more effective in energy consumption than the existing LEACH protocol.

LEACH Protocol based WSN Protocol using Fuzzy

  • Kwon, Oh Seok;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.6 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • A wireless sensor network is a network in which nodes equipped with sensors capable of collecting data from the real world are configured wirelessly. Because the sensor nodes are configured wirelessly, they have limited power such as batteries. If the battery of the sensor node is exhausted, the node is no longer usable. If more than a certain number of nodes die, the network will not function. There are many wireless sensor network protocols to improve energy efficiency, among which LEACH Protocol is a typical example. The LEACH protocol is a cluster-based protocol that divides sensor space into clusters and transmits and receives data between nodes. Therefore, depending on how the cluster is structured, the shape of the energy cow may decrease or increase. We compare the network lifetimes of the existing LEACH protocols and the three types of protocols that have been improved using fuzzy methods for cluster selection.

Fuzzy based Energy-Efficient Adaptive Routing Algorithm for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 퍼지 기반 적응형 라우팅 알고리즘 및 시뮬레이션)

  • Hong, Soon-Oh;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.95-106
    • /
    • 2005
  • Recent advances in wireless sensor networks have led to many routing protocols designed for energy-efficiency in wireless sensor networks. Despite that many routing protocols have been proposed in wireless sensor networks, a single routing protocol cannot be energy-efficient if the environment of the sensor network varies. This paper presents a fuzzy logic based Adaptive Routing (FAR) algorithm that provides energy-efficiency by dynamically changing protocols installed at the sensor nodes. The algorithm changes protocols based on the output of the fuzzy logic which is the fitness level of the protocols for the environment. A simulation is performed to show the usefulness of the proposed algorithm.

  • PDF

Simulation for sensor network packet routing protocols based on distributed-event (분산이벤트 기반 센서네트워크 패킷 라우팅 프로토콜 시뮬레이션)

  • Chung, Kyung-Yul;Lim, Byung-Ju;Lee, Hoo-Rock;Rhyu, Keel-Soo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.418-424
    • /
    • 2013
  • Both simulation and physical implementation are valuable tasks in sensor network routing protocols. In this paper, we propose an efficient underground utilities monitoring method within several constraints using wireless sensor network. First, in order to physically implement protocol of network which is applied, the distributed event-based simulation, which applies an existing nesC codes of sensor network routing protocols, is implemented and analyzed. Also, we have performed the simulation and analyzed the execution results for application model of routing protocols for monitoring underground utilities in the VIPTOS(Visual Ptolemy and TinyOS) environments which combine TOSSIM and Ptolemy II based on distributed event.

Efficient Non-Cryptographic Protocols for Public key Authentication in Wireless Sensor Network (WSN에서의 협력적인 공개키 인증 프로토콜)

  • Mohaisen, Abedelaziz;Maeng, Young-Jae;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.101-108
    • /
    • 2007
  • We follow the promising recent results of deploying the public key cryptography in sensor networks. Recent results have shown that the public key algorithms are computationally feasible on the typical sensor nodes. However, once the public key cryptography is brought to the sensor network, security services such like key authentication will be critically required. In this paper we investigate the public key authentication problem in the sensor network and provide several authentication protocols. Our protocols are mainly based on the non-solvable overhearing in the wireless environment and a distributed voting mechanism. To show the value of our protocols, we provide an extensive analysis of the used resources and the resulting security level. As well, we compare our work with other existing works. For further benefit of our protocols, we list several additional applications in the sensor network where our protocols provide a sufficient authentication under the constrained resources.

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

Performance Comparison between Hierarchical Routing Protocols applying New Performance Evaluation Items (성능 비교 항목들을 적용한 계층형 라우팅 프로토콜간의 성능비교)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.51-57
    • /
    • 2020
  • WSN is a wirelessly configured network of sensor nodes with limited power such as batteries. If the sensor node's battery is exhausted, the node is no longer available. Therefore, if the network is to be used for a long time, energy consumption should be minimized. There are many Wireless Sensor Network Protocols to improve energy efficiency, including Cluster-based and chain-based Protocols. This paper seeks to examine the performance evaluation of routing protocols studied separately for the improvement of performance in wireless sensor network. The criteria for comparison were selected as the LEACH protocol, a representative hierarchical routing protocol, and the comparison targets considered CHEF and FLCFP and LEACH-DFL routing protocols with Fuzzy Logic. Various criteria for performance comparison were presented in this paper, and the performance was compared through simulation of each protocol. The purpose is to present a reference point for comparing the performance of other protocols through the performance comparison of CHEF, FLCFP, and LEACH-DFL, protocols with LEACH and Fuzzy Logic, and to provide additional design methods for improving the performance of protocols.

A Survey on Communication Protocols for Wireless Sensor Networks

  • Jang, Ingook;Pyeon, Dohoo;Kim, Sunwoo;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.231-241
    • /
    • 2013
  • Improvements in wireless sensor network (WSN) technology have resulted in a large number of applications. WSNs have been mainly used for monitoring applications, but they are also applicable to target tracking, health care, and monitoring with multimedia data. Nodes are generally deployed in environments where the exhausted batteries of sensor nodes are difficult to charge or replace. The primary goal of communication protocols in WSNs is to maximize energy efficiency in order to prolong network lifetime. In this paper, various medium access control (MAC) protocols for synchronous/asynchronous and single/multi-channel WSNs are investigated. Single-channel MAC protocols are categorized into synchronous and asynchronous approaches, and the advantages and disadvantages of each protocol are presented. The different features required in multi-channel WSNs compared to single-channel WSNs are also investigated, and surveys on multi-channel MAC protocols proposed for WSNs are provided. Then, existing broadcast schemes in such MAC protocols and efficient multi-hop broadcast protocols proposed for WSNs are provided. The limitations and challenges in many communication protocols according to this survey are pointed out, which will help future researches on the design of communication protocols for WSNs.

Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management

  • Ge, Yujia;Nan, Yurong;Chen, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1419-1436
    • /
    • 2020
  • For an energy harvesting sensor network, when the network lifetime is not the only primary goal, maximizing the network performance under environmental energy harvesting becomes a more critical issue. However, clustering protocols that aim at providing maximum information throughput have not been thoroughly explored in Energy Harvesting Wireless Sensor Networks (EH-WSNs). In this paper, clustering protocols are studied for maximizing the data transmission in the whole network. Based on a long short-term memory (LSTM) energy predictor and node energy consumption and supplement models, an uneven clustering protocol is proposed where the cluster head selection and cluster size control are thoroughly designed for this purpose. Simulations and results verify that the proposed scheme can outperform some classic schemes by having more data packets received by the cluster heads (CHs) and the base station (BS) under these energy constraints. The outcomes of this paper also provide some insights for choosing clustering routing protocols in EH-WSNs, by exploiting the factors such as uneven clustering size, number of clusters, multiple CHs, multihop routing strategy, and energy supplementing period.