• Title/Summary/Keyword: Sensor node system

Search Result 659, Processing Time 0.03 seconds

$M^2$ MAC: MAC protocol for Real Time Robot Control System based on Underwater Acoustic Communication ($M^2$ MAC(Message Merging): 수중음파통신 기반의 실시간 로봇 제어 시스템을 위한 MAC 프로토콜)

  • Kim, Yung-Pyo;Park, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.88-96
    • /
    • 2011
  • Underwater acoustic communication is applicable in various areas, such as ocean data collection, undersea exploration and development, tactical surveillance, etc. Thus, robot control system construction used for underwater-robot like AUV or ROV is essential in these areas. In this paper, we propose the Message Merging MAC($M^2$-MAC) protocol, which is suitable for real time robot control system, considering energy efficiency in important parts of underwater acoustic sensor network constitution. In this proposed MAC protocol, gateway node receives the data from robot nodes according to the time slots that were allotted previously. And messages delivered from base-station are generated to one MAC frame by buffering process. Finally, generated MAC frames are broadcasted to all robot nodes in the cluster. Our suggested MAC protocol can also be hybrid MAC protocol, which is successful blend of contention based and contention-free based protocol through relevant procedure with Maintenance&Sleep (M&S) period, when new nodes join and leave as an orphan. We propose mathematical analysis model concerned about End-to-End delay and energy consumption, which is important factor in constructing real-time robot control system. We also verify the excellence of performance according to comparison of existing MAC protocols with our scheme.

Water-well Management Data Modeling using UML 2.0 based in u-GIS Environment (u-GIS 환경에서 UML 2.0을 활용한 지하수 관리 데이터 모델링)

  • Jung, Se-Hoon;Kim, Kyung-Jong;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.523-531
    • /
    • 2011
  • Many of the wells which were constructed to use ground water resource are abandoned and not managed efficiently after its use. And a variety of heavy metals and organic compounds are released from the abandoned wells and this can cause ground water pollution. Therefore in this paper implemented to monitor locational information drill holes and underground water sensing information on real time basis using u-GIS environment to combined ubiquitous sensor node and GIS technology to improve these problems. In addition, this system suggests using system by UML 2.0 by analyzing variety requirement of user and between system internal modules interaction and data flow. It provides graphical user interfaces (GUI) to system users to monitor water-well related property information and its managements for each water-well at remote site by variety platform by GIS map and web environment and mobile device based on smart phone.

Implementation of the wearable PTT measurement system for health monitoring during daily life (일상생활 건강 모니터링을 위한 착용형 PTT 측정 시스템의 구현)

  • Ye, Soo-Young;Noh, Yun-Hong;Jeong, Do-Un
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.220-226
    • /
    • 2011
  • Device of the ECG and pulse signal was made to measure PTT signal using non-invasive method and possible to wearable. PTT alterations were observed according to position change using implemented system.It was needed to ECG and pulse to detect the PTT, used the photoplethymorgraphy appeared to change the blood volume. And also wireless sensor node which was able to Zigbee compatibility was used to transfer the detected ECG and pulse signal to PC. Noise was removed from transit data and algorithm was applied to calculate the PTT. After the evaluation of both the conventional measuring systems and the proposed photoplethymography measuring system, a highly effective and efficient formation and distribution sequences were found within the proposed photoplethymography measuring system.

A Hardwired Location-Aware Engine based on Weighted Maximum Likelihood Estimation for IoT Network (IoT Network에서 위치 인식을 위한 가중치 방식의 최대우도방법을 이용한 하드웨어 위치인식엔진 개발 연구)

  • Kim, Dong-Sun;Park, Hyun-moon;Hwang, Tae-ho;Won, Tae-ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.32-40
    • /
    • 2016
  • IEEE 802.15.4 is the one of the protocols for radio communication in a personal area network. Because of low cost and low power communication for IoT communication, it requires the highest optimization level in the implementation. Recently, the studies of location aware algorithm based on IEEE802.15.4 standard has been achieved. Location estimation is performed basically in equal consideration of reference node information and blind node information. However, an error is not calculated in this algorithm despite the fact that the coordinates of the estimated location of the blind node include an error. In this paper, we enhanced a conventual maximum likelihood estimation using weighted coefficient and implement the hardwired location aware engine for small code size and low power consumption. On the field test using test-beds, the suggested hardware based location awareness method results better accuracy by 10 percents and reduces both calculation and memory access by 30 percents, which improves the systems power consumption.

Protocol implementation for simultaneous signal continuation acquisition of industrial plant machine condition in wireless sensor networks (산업플랜트 기계상태 동시신호 연속취득을 위한 무선센서 네트워크프로토콜 구현)

  • Lee, Hoo-Rock;Chung, Kyung-Yul;Rhyu, Keel-Soo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.7
    • /
    • pp.760-764
    • /
    • 2015
  • Wireless sensors, installed on machinery, and Time Division Multiple Access (TDMA) transmission make an ideal system for monitoring machine conditions in industrial plants because there is no need for electronic wiring. However, there has not yet been a successful field application of such a system, capable of continuously transmitting data at sample rates greater than 100 Hz. In this research, a TDMA network protocol capable of acquiring data from multiple sensors at sample rates greater than 100 Hz was developed for field application. The protocol was implemented in a single cluster-star topology network, and the system was evaluated based on the node number and transmission distance. Network simulator 2 (ns-2) was used for a real field simulation. Non-TDMA and TDMA protocol cases were compared using four sensor nodes. In the cases of 20-s and 40-s transmission times, there was little difference between the reception rates of the non-TDMA and TDMA systems. However, the difference was much greater when using a 60-s transmission time.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

The Improvement of Disaster Safety Network using ICT Devices (ICT 기기를 활용한 재난안전통신망 강화 방안)

  • Hong, Sung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.194-199
    • /
    • 2019
  • Natural disasters destroy decades of human effort and investments, thereby placing new demands on society for reconstruction and rehabilitation. In most case, the natural phenomena triggering the disasters are beyond human control. In order to solve the problems that the information resources can not be shared among disaster management sectors and their work is hard to be coordinated in city, an idea of application of ubiquitous sense network and ICT technology to model the architecture of the disaster prevention system based on the analysis of characteristics of disasters. The proposed algorithm simulated that it is possible to locate the terminal by linking the direction angle and the estimated position that can be confirmed at the time of stopping, even if the movement direction of the terminal does not move in a certain direction with only a smaller number of mobile base stations. We also confirmed that the proposed algorithms analyzed through simulation are more efficient than existing algorithms.

A Body-Area Localization Technique for WUSB over WBAN Communication (WUSB over WBAN 통신을 위한 신체 영역 위치 인식 기술)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.499-505
    • /
    • 2016
  • In this Paper, we propose a body-area localization technique based on WUSB (Wireless USB) over WBAN (Wireless Body Area Networks) protocol required for wearable computer systems. The proposed localization algorithm is executed on the basis of WUSB over WBAN protocol at each sensor node comprising peripherals of a wearable computer system. To increase the accuracy of input information through various body motions in wearable computer systems, a new localization technique with high precision must be developed. To achieve the goal, This paper proposes a combined TDoA/FDoA/AoA (Time Of Arrival/Time Difference Of Arrival/Angle Of Arrival) localization technique with more than four WUSB over WBAN devices to estimate body-area location accurately. The combined TDoA/FDoA/AoA technique reduces 10mm in location estimation errors comparing with a combined TDoA/FDoA technique. This performance enhancement in location error reduction can be ignored at other systems but is meaningful results in body-area localization-based communications.