• Title/Summary/Keyword: Smart Node

Search Result 353, Processing Time 0.032 seconds

Complete decentralized displacement control algorithm

  • Ruiz-Sandoval, M.E.;Morales, E.
    • Smart Structures and Systems
    • /
    • v.11 no.2
    • /
    • pp.163-183
    • /
    • 2013
  • Control systems have been greatly studied in recent years and can be classified as: passive, active, semi-active or hybrid systems. Most forms of control systems have been applied in a centralized manner where all the information is sent to a central node where control the algorithm is then calculated. One of the possible problems of centralized control is the difficulty to scale its application. In this paper, a completely decentralized control algorithm is analytically implemented. The algorithm considers that each of the control systems makes the best decision based solely on the information collected at its location. Semi-active control is used in preference to active control because it has minimal energy consumption, little to no possibility of destabilization, a reduction in the possibility of data saturation, and a reduction in the response time in comparison to centralized control.

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Location-aware Clustering for Efficient Data Gathering in Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 데이터 수집을 위한 위치 기반의 클러스터링)

  • Chang, Hyeong-Jun;Lee, In-Chul;Park, Gwi-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1893-1894
    • /
    • 2008
  • Advances in hardware and wireless network technologies have placed us at the doorstep of a new era where small wireless devices will provide access to information anytime, anywhere as well as actively participate in creating smart environments. In this paper, we propose location-aware clustering method in wireless sensor networks. Previous clustering algorithm assumes that all nodes know its own location by GPS. But, it is unrealistic because of GPS module cost and large energy consumption. So, we operate localization ahead of cluster set-up phase. And Considering node density and geographic information, Cluster Heads are elected uniformly. Moreover, communication between CHs is prolonged network lifetime.

  • PDF

Structural Health Monitoring of Harbor Structures using Imote2-Platformed Smart Wirless Sensor Node (Imote2 플랫폼 기반 스마트 무선센서노드를 이용한 항만구조물 건전성 모니터링)

  • Park, Jae-Hyung;Lee, So-Young;Kim, Jeong-Tae
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2011.04a
    • /
    • pp.307-310
    • /
    • 2011
  • 본 연구에서는 항만 구조물의 구조건전성 모니터링을 위한 Imote2 센서 플랫폼 기반의 스마트 무선센서의 적용성을 평가하였다. 이를 위해 먼저, 고민감도 MEMS 가속도계를 탑재한 Imote2 센서 플랫폼 기반스마트 무선센서를 설계하였다. 둘째, 스마트 무선센서노드의 독자적인 구조 상태 모니터링을 위한 내장소프트웨어를 설계하였다. 마지막으로, 모형 케이슨 구조물의 진동실험을 통해 개발된 스마트 무선센서의 성능을 검증하였다.

  • PDF

Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks (무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜)

  • Choi, Younsung;Chang, Beom-Hwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.71-84
    • /
    • 2019
  • Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

Hybrid acceleration-impedance sensor nodes on Imote2-platform for damage monitoring in steel girder connections

  • Kim, Jeong-Tae;Park, Jae-Hyung;Hong, Dong-Soo;Ho, Duc-Duy
    • Smart Structures and Systems
    • /
    • v.7 no.5
    • /
    • pp.393-416
    • /
    • 2011
  • Hybrid acceleration-impedance sensor nodes on Imote2-platform are designed for damage monitoring in steel girder connections. Thus, the feasibility of the sensor nodes is examined about its performance for vibration-based global monitoring and impedance-based local monitoring in the structural systems. To achieve the objective, the following approaches are implemented. First, a damage monitoring scheme is described in parallel with global vibration-based methods and local impedance-based methods. Second, multi-scale sensor nodes that enable combined acceleration-impedance monitoring are described on the design of hardware components and embedded software to operate. Third, the performances of the multi-scale sensor nodes are experimentally evaluated from damage monitoring in a lab-scaled steel girder with bolted connection joints.

Belief Function Retraction and Tracing Algorithm for Rule Refinement

  • Lee, Gye Sung
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.94-101
    • /
    • 2019
  • Building a stable knowledge base is an important issue in the application of knowledge engineering. In this paper, we present an algorithm for detecting and locating discrepancies in the line of the reasoning process especially when discrepancies occur on belief values. This includes backtracking the rule firing from a goal node of the rule network. Retracting a belief function allows the current belief state to move back to another belief state without the rule firing. It also gives an estimate, called contribution measure, of how much the rule has an impact on the current belief state. Examining the measure leads the expert to locate the possible cause of problem in the rule. For non-monotonic reasoning, the belief retraction method moves the belief state back to the previous state. A tracing algorithm is presented to identify and locate the cause of problem. This also gives repair suggestions for rule refinement.

Reinforcement Learning-based Duty Cycle Interval Control in Wireless Sensor Networks

  • Akter, Shathee;Yoon, Seokhoon
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • One of the distinct features of Wireless Sensor Networks (WSNs) is duty cycling mechanism, which is used to conserve energy and extend the network lifetime. Large duty cycle interval introduces lower energy consumption, meanwhile longer end-to-end (E2E) delay. In this paper, we introduce an energy consumption minimization problem for duty-cycled WSNs. We have applied Q-learning algorithm to obtain the maximum duty cycle interval which supports various delay requirements and given Delay Success ratio (DSR) i.e. the required probability of packets arriving at the sink before given delay bound. Our approach only requires sink to compute Q-leaning which makes it practical to implement. Nodes in the different group have the different duty cycle interval in our proposed method and nodes don't need to know the information of the neighboring node. Performance metrics show that our proposed scheme outperforms existing algorithms in terms of energy efficiency while assuring the required delay bound and DSR.

Design Issues on a Metropolitan WDM Ring Network

  • Lee, Jong-Hyung
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.35-43
    • /
    • 2019
  • A metro ring network using WDM technology requires many issues to be considered even though its transmission distance is shorter and its transmission capacity is lower than a long-haul WDM system. Unlike a long-haul WDM system, which is basically point-to-point configuration, a metro ring network usually equips with capabilty of wavelength reconfiguration. Therefore network performance considering crosstalk within OADM and the network behavior when the ring network is closed should be analyzed before implemented. We discussed some of results analyzed for the issues. Furthermore we proposed a novel method to design a dispersion map for a ring network, and demonstrated the methodology with an exemplary 8-node ring network of 399km circumference.

Associative Interactive play Contents for Infant Imagination

  • Jang, Eun-Jung;Lee, Chankyu;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.126-132
    • /
    • 2019
  • Creative thinking appears even before it is expressed in language, and its existence is revealed through emotion, intuition, image and body feeling before logic or linguistics rules work. In this study, Lego is intended to present experimental child interactive content that is applied with a computer vision based on image processing techniques. In the case of infants, the main purpose of this content is the development of hand muscles and the ability to implement imagination. The purpose of the analysis algorithm of the OpenCV library and the image processing using the 'VVVV' that is implemented as a 'Node' in the midst of perceptual changes in image processing technology that are representative of object recognition, and the objective is to use a webcam to film, recognize, derive results that match the analysis and produce interactive content that is completed by the user participating. Research shows what Lego children have made, and children can create things themselves and develop creativity. Furthermore, we expect to be able to infer a diverse and individualistic person's thinking based on more data.