• Title/Summary/Keyword: Ubiquitous Sensor Networks(USN)

Search Result 127, Processing Time 0.025 seconds

Construction of Wireless Sensor Network for Intelligent Home (지능형 홈을 위한 무선 센서 네트워크 구성)

  • Whang Se-Hee;Jang In-Hun;Sim Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.695-700
    • /
    • 2005
  • In the sensor network, a lot of sensor nodes are scattered sparsely and organizes a united communication network between each node. After that, environmental information around each sensor node are gathered and analyzed. Because each node operates under resource constraint, the efficiency and hardware specification of a node should be maximized. There exist technical constraints until now but recent technical progress in IC fabrication and wireless network enables to construct a tiny embedded system, which has the properties of low cost, low power consumption, multi functions. Wireless sensor network becomes a modern research field with technical improvements, is studied in numerous laboratories, and is called as diverse different project names - Wireless Integrated Network Sensors (WINS), Mobile Ad hoc NETwork (MANET), Ubiquitous Sensor Network (USN). TinyOS is one of leading project and is widely used. In this paper, we suggest a sensor network, which uses TinyOS platforms and aims for context awareness in a home environment.

A Energy-Efficient Cluster Header Election Algorithm in Ubiquitous Sensor Networks (USN에서 에너지 효율성을 고려한 효과적인 클러스터 헤더 선출 알고리즘)

  • Hur, Tai-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.197-203
    • /
    • 2011
  • In this paper, a new cluster configuration process is proposed. The energy consumption of sensor nodes is reduced by configuring the initial setup process only once with keeping the initial cluster. Selecting the highest power consumed node of the member nodes within the cluster to the header of next round can distribute power consumption of all nodes in the cluster evenly. With this proposed way, the lifetime of the USN is increased by the reduced energy consumption of all nodes in the cluster. Also, evenly distributed power consumptions of sensors are designed to improve the energy hole problem. The effectiveness of the proposed algorithms is confirmed through simulations.

A Study on Reader and Tag Sensing Rate of Location Detection Using RFID (RFID를 이용한 이동체의 위치 결정에서 리더 태그간 인식율 연구)

  • Jeon, Sung-Hee
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.33-34
    • /
    • 2007
  • LBS has many issues of wireless sensor networks and mobile communication parts. Location tracking or location sensing will be the opening of ubiquitous society's a big challenge and the beginning of infinite ubiquitous society's a chance. The purpose of this paper is study of sensing rate per reader antenna's placement and tag location and placement using RFID as location reference point with many advantages for location detection.

  • PDF

A Scheme to Categorize Ubiquitous Sensor Network Services and Their Practical Issues (유비쿼터스 센서네트워크 서비스 분류 기법 및 상용화 이슈)

  • Eun, Seongbae;So, Sun Sup;Chae, Yigeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.202-208
    • /
    • 2007
  • Recently, a lot of research have been studied to apply wireless sensor networks to USN applications. The characteristics of USN applications is that they are varied according to the sort of sensors and sensing objects. They includes military applications, water pollusion monitoring, intelligent traffic system, farm, logistics, location position applications, and so on. There is no traditional method to classify these applications. In this paper, we propose a taxonomy scheme to classify USN applications. The criteria is based on 3 properties, the criticalness of services, the mobility of sensing entity, and the mobility of sensed objects, to classify them into 8 groups. We also describe the technical issues and related works in them. Our taxonomy can make USN applications to be easily understood and memorized.

  • PDF

Design and Performance Analysis of a new MAC Protocol for Providing Real-time Traffic Information using USN (USN 기반 실시간 주행 상황 정보 제공을 위한 MAC 설계 및 성능 분석)

  • Park, Man-Kyu;So, Sang-Ho;Lee, Jae-Yong;Lim, Jae-Han;Son, Myung-Hee;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.5
    • /
    • pp.38-48
    • /
    • 2007
  • In ubiquitous environment, sensor networks that sense and transmit surrounding data without human intervention will become more important. If sensors are installed for detecting vehicles and measuring their speed in the road and that real-time information is given to drivers, it will be very effective for enhancing safety and controlling traffic in the road. In this paper, we proposed a new reliable and real-time sensor MAC protocol between AP and sensor nodes in order to provide real-time traffic flow information based on ubiquitous sensor networks. The proposed MAC allocates one TDMA slot for each sensor node on the IEEE 802.15.4 based channel structure, introduces relayed communication for distant sensors, and adopts a frame structure that supports retransmission for the case of errors. In addition, the proposed MAC synchronizes with AP by using beacon and adopts a hybrid tracking mode that supports economic power consumption according to various traffic situations, We implemented a simulator for the proposed MAC by using sim++ and evaluated various performances. The simulation results show that the proposed MAC reduces the power consumption and reveals excellent performance in real-time application systems.

Model-based Integrated Development Tool for the Development of Applications in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 응용 프로그램 개발을 위한 모델 기반 통합 개발 도구)

  • Chong, Ki-Won;Kim, Ju-Il;Lee, Woo-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.442-453
    • /
    • 2007
  • A model-based integrated development tool for the development of USN application programs is proposed in this paper. The proposed tool has been implemented as a plug-in for Eclipse platform. The tool consists of Graphical User Interface, Modeler, Configuration Information Generator, Validity Checker, Source Code Generator and Templates Storage. Developers can implement USN applications from models of sensor networks using the tool. The developer can implement USN applications by automatic generation of execution code of each node in the sensor network after he/she designs a model of the sensor network. The configuration information of each node is automatically generated from the validated USN model. Then, the execution code is automatically generated using the configuration information and the predefined templates. Through the tool of this paper, developers can easily implement valid USN applications even if they do not know the details of low-level information. Also, a large number of application programs can be generated at once because application programs are generated from sensor network model instead of models of applications. Accordingly, the development effort of USN applications will be decreased and developers can consistently construct USN applications from USN models using the proposed tool.

Detection of Malicious Node using Timestamp in USN Adapted Diffie-Hellman Algorithm (Diffie-Hellman 알고리즘이 적용된 USN에서 타임스탬프를 이용한 악의적인 노드 검출)

  • Han, Seung-Jin;Choi, Jun-Hyeog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.115-122
    • /
    • 2009
  • In this paper, we proposed scheme that we use a difference of timestamp in time in Ubiquitous environments as we use the Diffie-Hellman method that OTP was applied to when it deliver a key between nodes, and can detect a malicious node at these papers. Existing methods attempted the malicious node detection in the ways that used correct synchronization or directed antenna in time. We propose an intermediate malicious node detection way at these papers without an directed antenna addition or the Trusted Third Party (TTP) as we apply the OTP which used timestamp to a Diffie-Hellman method, and we verify safety regarding this. A way to propose at these papers is easily the way how application is possible in Ubiquitous environment.

Sensor Node Control Algorithm Based on TinyOS (TinyOS 기반의 센서 노드 제어 알고리즘)

  • Boo, Jun-Pil;Yang, Hyeon-Gyu;Kim, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • Recently, there is developing various ubiquitous application services using sensor networks based on TinyOS represented the operating system of sensor node. These sensor networks perform the collection and the transmission of sensing data from sensor node to get the context information. In this paper, we proposes the sensor node control algorithm which converts a sensor node to sleep, active, power off mode according to monitoring result of the voltage state of sensor node. Also, we designs and implement the sensor control module on server, sink, sensor node of sensor networks using this algorithm. It designs a sensor voltage control module of sensor node, data receive and display module of USN server using a java language and TinyOS. And, it checks the voltage state of sensor node, and it changes one of the sleep or power off modes in case of high voltage loss. Accordingly, we effectively use the power of sensor nodes as changing control modes of sensor nodes.

  • PDF

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

IDs Assignment of Hybrid Method for Efficient and Secure USN (Ubiquitous Sensor Networks) (효율적인 안전한 유비쿼터스 센서 네트워크를 위한 하이브리드 방식의 아이디 할당)

  • Sung, Soon-Hwa
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.15-25
    • /
    • 2008
  • Due to the differences between a mobile ad-hoc network and a sensor network, the pre-existing autoconfiguration for a mobile ad-hoc network cannot be simply applied to a sensor network. But. a mechanism is still necessary to assign locally unique addresses to sensor nodes efficiently. This paper proposes a hybrid IDs assignment scheme of local area sensor networks. The IDs assignment scheme of hybrid method combines a proactive IDs assignment with a reactive IDs assignment scheme. The proposed scheme considers efficient communication using reactive IDs assignment, and security for potential attacks using zone-based self-organized clustering with Byzantine Agreement in sensor networks. Thus, this paper has solved the shortage of security due to minimizing network traffic and the problem of repairing the network from the effects of an aberrant node in sensor networks.

  • PDF