• Title/Summary/Keyword: Smart sensor nodes

Search Result 127, Processing Time 0.027 seconds

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.2
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

EL-SEP: Improved L-SEP by adding Single-hop layer

  • LEE, WooSuk;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.50-56
    • /
    • 2017
  • Wireless sensor nodes have limited energy, so it is important to optimize energy consumption to preserve network lifetime. Various protocols have been proposed for this purpose. LEACH protocol and SEP are the representative protocols. These protocols become less effective as the Sensor Field becomes wider. To improve this, MR-SEP and L-SEP were proposed. These protocols increase the energy efficiency by dividing the Sensor Field into layers and reducing the transmission distance. However, when dividing a layer, there are cases where it is divided inefficiently, and a node within a certain range from a Base Station has a better transmission efficiency than a direct transmission method using a cluster method. In this paper, we propose a Single-hop layer for L-SEP to improve inefficient layer division and near node transmission efficiency. When the larger the Sensor Field, the better the performance of the proposed method by up to 87%. The larger the sensor field, the more efficient the proposed method is over the conventional method. That is, the proposed method is suitable for the wide Sensor Field.

Spatio-temporal protocol for power-efficient acquisition wireless sensors based SHM

  • Bogdanovic, Nikola;Ampeliotis, Dimitris;Berberidis, Kostas;Casciat, Fabio;Plata-Chaves, Jorge
    • Smart Structures and Systems
    • /
    • v.14 no.1
    • /
    • pp.1-16
    • /
    • 2014
  • In this work, we address the so-called sensor reachback problem for Wireless Sensor Networks, which consists in collecting the measurements acquired by a large number of sensor nodes into a sink node which has major computational and power capabilities. Focused on applications such as Structural Health Monitoring, we propose a cooperative communication protocol that exploits the spatio-temporal correlations of the sensor measurements in order to save energy when transmitting the information to the sink node in a non-stationary environment. In addition to cooperative communications, the protocol is based on two well-studied adaptive filtering techniques, Least Mean Squares and Recursive Least Squares, which trade off computational complexity and reduction in the number of transmissions to the sink node. Finally, experiments with real acceleration measurements, obtained from the Canton Tower in China, are included to show the effectiveness of the proposed method.

System identification of a cable-stayed bridge using vibration responses measured by a wireless sensor network

  • Kim, Jeong-Tae;Ho, Duc-Duy;Nguyen, Khac-Duy;Hong, Dong-Soo;Shin, Sung Woo;Yun, Chung-Bang;Shinozuka, Masanobu
    • Smart Structures and Systems
    • /
    • v.11 no.5
    • /
    • pp.533-553
    • /
    • 2013
  • In this paper, system identification of a cable-stayed bridge in Korea, the Hwamyung Bridge, is performed using vibration responses measured by a wireless sensor system. First, an acceleration based-wireless sensor system is employed for the structural health monitoring of the bridge, and wireless sensor nodes are deployed on a deck, a pylon and several selected cables. Second, modal parameters of the bridge are obtained both from measured vibration responses and finite element (FE) analysis. Frequency domain decomposition and stochastic subspace identification methods are used to obtain the modal parameters from the measured vibration responses. The FE model of the bridge is established using commercial FE software package. Third, structural properties of the bridge are updated using a modal sensitivity-based method. The updating work improves the accuracy of the FE model so that structural behaviors of the bridge can be represented better using the updated FE model. Finally, cable forces of the selected cables are also identified and compared with both design and lift-off test values.

Development of an IoT Platform for Ocean Observation Buoys

  • Kim, Si Moon;Lee, Un Hyun;Kwon, Hyuk Jin;Kim, Joon-Young;Kim, Jeongchang
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.2
    • /
    • pp.109-116
    • /
    • 2017
  • In this paper, we propose an Internet of Things (IoT) platform for ocean observation buoys. The proposed system consists of various sensor modules, a gateway, and a remote monitoring site. In order to integrate sensor modules with various communications interfaces, we propose a controller area network (CAN)-based sensor data packet and a protocol for the gateway. The proposed scheme supports the registration and management of sensor modules so as to make it easier for the buoy system to manage various sensor modules. Also, in order to extend communication coverage between ocean observation buoys and the monitoring site, we implement a multi-hop relay network based on a mesh network that can provide greater communication coverage than conventional buoy systems. In addition, we verify the operation of the implemented multi-hop relay network by measuring the received signal strength indication between buoy nodes and by observing the collected data from the deployed buoy systems via our monitoring site.

Experimental validation of a multi-level damage localization technique with distributed computation

  • Yan, Guirong;Guo, Weijun;Dyke, Shirley J.;Hackmann, Gregory;Lu, Chenyang
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.561-578
    • /
    • 2010
  • This study proposes a multi-level damage localization strategy to achieve an effective damage detection system for civil infrastructure systems based on wireless sensors. The proposed system is designed for use of distributed computation in a wireless sensor network (WSN). Modal identification is achieved using the frequency-domain decomposition (FDD) method and the peak-picking technique. The ASH (angle-between-string-and-horizon) and AS (axial strain) flexibility-based methods are employed for identifying and localizing damage. Fundamentally, the multi-level damage localization strategy does not activate all of the sensor nodes in the network at once. Instead, relatively few sensors are used to perform coarse-grained damage localization; if damage is detected, only those sensors in the potentially damaged regions are incrementally added to the network to perform finer-grained damage localization. In this way, many nodes are able to remain asleep for part or all of the multi-level interrogations, and thus the total energy cost is reduced considerably. In addition, a novel distributed computing strategy is also proposed to reduce the energy consumed in a sensor node, which distributes modal identification and damage detection tasks across a WSN and only allows small amount of useful intermediate results to be transmitted wirelessly. Computations are first performed on each leaf node independently, and the aggregated information is transmitted to one cluster head in each cluster. A second stage of computations are performed on each cluster head, and the identified operational deflection shapes and natural frequencies are transmitted to the base station of the WSN. The damage indicators are extracted at the base station. The proposed strategy yields a WSN-based SHM system which can effectively and automatically identify and localize damage, and is efficient in energy usage. The proposed strategy is validated using two illustrative numerical simulations and experimental validation is performed using a cantilevered beam.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

An Implementation of the management support service for agricultural environment using Smart Devices (스마트 디바이스 기반의 농업환경관리 지원 서비스)

  • Kang, H.J.;Lee, J.W.;Kang, S.S.
    • Smart Media Journal
    • /
    • v.1 no.1
    • /
    • pp.42-47
    • /
    • 2012
  • With the development of RFID and USN technology, kinds of services are appeared and industrialized to maximize management, maintenance and efficiency of production. In the agricultural field, it is important to increase productivity and quality of food by managing growth environment of plants. In this paper, to apply IT technology to agriculture, we present a mobile service application called WiSEMobile which support growers to monitor and manage the information in the field from remote sites. By using the service with mobile devices, farmers can monitor the change of environment with data from sensor nodes, manage and exchange kinds of data gathered by farmers in the field.

  • PDF

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam;Joshi, Pallavi;Raghuvanshi, Ajay Singh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1849-1876
    • /
    • 2022
  • Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm

  • Kang, You-Sung;Choi, Doo-Ho;Chung, Byung-Ho;Cho, Hyun-Sook;Han, Dong-Guk
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.556-563
    • /
    • 2009
  • A side channel analysis is a very efficient attack against small devices such as smart cards and wireless sensor nodes. In this paper, we propose an efficient key detection method using a peak selection algorithm in order to find the advanced encryption standard secret key from electromagnetic signals. The proposed method is applied to a correlation electromagnetic analysis (CEMA) attack against a wireless sensor node. Our approach results in increase in the correlation coefficient in comparison with the general CEMA. The experimental results show that the proposed method can efficiently and reliably uncover the entire 128-bit key with a small number of traces, whereas some extant methods can reveal only partial subkeys by using a large number of traces in the same conditions.