• Title/Summary/Keyword: Underwater Sensor Network

Search Result 99, Processing Time 0.043 seconds

Machine Learning-based MCS Prediction Models for Link Adaptation in Underwater Networks (수중 네트워크의 링크 적응을 위한 기계 학습 기반 MCS 예측 모델 적용 방안)

  • Byun, JungHun;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.1-7
    • /
    • 2020
  • This paper proposes a link adaptation method for Underwater Internet of Things (IoT), which reduces power consumption of sensor nodes and improves the throughput of network in underwater IoT network. Adaptive Modulation and Coding (AMC) technique is one of link adaptation methods. AMC uses the strong correlation between Signal Noise Rate (SNR) and Bit Error Rate (BER), but it is difficult to apply in underwater IoT as it is. Therefore, we propose the machine learning based AMC technique for underwater environments. The proposed Modulation Coding and Scheme (MCS) prediction model predicts transmission method to achieve target BER value in underwater channel environment. It is realistically difficult to apply the predicted transmission method in real underwater communication in reality. Thus, this paper uses the high accuracy BER prediction model to measure the performance of MCS prediction model. Consequently, the proposed AMC technique confirmed the applicability of machine learning by increase the probability of communication success.

Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks (수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점)

  • Shin, DongHyun;Lee, Seung-Jun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1940-1950
    • /
    • 2017
  • The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

Analysis of the Cryptographic Algorithms's Performance on Various Devices Suitable for Underwater Communication (수중통신에 활용가능한 다양한 플랫폼에서의 암호 알고리즘 성능비교)

  • Yun, Chae-Won;Lee, Jae-Hoon;Yi, Okyeon;Shin, Su-Young;Park, Soo-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.3
    • /
    • pp.71-78
    • /
    • 2016
  • Recently, The interest about underwater acoustic communication is increase such as marine resources, disaster prevention, weather prediction, and so on. Because the underwater acoustic communication uses a water as media, the underwater acoustic communication has a lot of restrictions. Although the underwater acoustic communication is hard, it is important to consider the security. In this paper, we estimate the performance of cryptographic algorithms(AES, ARIA, and LEA) on a various devices, available in underwater acoustic communication, and analysis the results. This result will be provide effective data confidentiality for underwater communication.

Developing a new MAC Protocol for Multi-hop Underwater Acoustic Sensor Networks (다중 홉 수중 음향 센서네트워크를 위한 MAC 프로토콜 설계)

  • Lim, Chansook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.97-103
    • /
    • 2008
  • T-Lohi, a MAC protocol for underwater acoustic sensor networks, has been designed to support dense networks consisting of short-range acoustic modems. However when T-Lohi is applied to large networks in which multi-hop routing is necessary, it suffers a lot of packet collisions due to the hidden terminal problem. To combat this problem, we propose a new MAC protocol which employs RTS/CTS handshaking. To our knowledge, this protocol is the first to adopt both a tone-based approach and RTS/CTS handshaking for dense underwater acoustic sensor networks. Simulation results show that this new protocol drastically reduces packet collisions while achieving good network utilization.

  • PDF

Development of Sensorless Hydraulic Servo System for Underwater Harbor Construction (수중항만공사용 로봇의 센서리스 유압 서보 시스템 개발)

  • Kim, T.S.;Kim, C.H.;Park, K.W.;Lee, M.K.
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.708-713
    • /
    • 2004
  • This research develops a sensorless hydraulic servo system of Parallel-Typed robot for harbour construction. Purpose of the robot is to mechanize the construction, which is accomplished through a joystick's operating by a stoneworker (or diver). The robot is attached on the end of an excavator as its attachment or transported by a crane to reach the desired place. The embedded compact controller is installed on the robot body and controlled by wireless telecommunication. For underwater work, it is necessary to waterproof the robot and its sensors. Especially, a sensor waterproof is a main drawback for the underwater robot. This leads us to develop a hydraulic robot position controller using an observer which gives the position information without any position sensor. We design a neural network to identify the displacement change according to the command voltage to servo valve. To verify the sensorless controller, this paper presents the performance of the sensorless control for which the position is given by the observer comparing with that of the sensor control for which the position is measured by LVDT sensors.

  • PDF

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.

Experimental Results of Single Carrier Digital Modulation for Underwater Sensor Networks (수중 센서네트워크 구현을 위한 단일 반송파 디지털 변조기법의 실험적 고찰)

  • Kim, Se-Young;Han, Jeong-Woo;Kim, Ki-Man
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.33-40
    • /
    • 2011
  • In this paper, underwater acoustic communication experiment was carried out to test a performance of single carrier digital modulation schemes. The communication experiment was performed at real sea and tested modulation schemes are ASK, FSK with non-coherent detection and QPSK with coherent detection. A modulated image data was transmitted with data rates of 600bps~3Kbps. From the results of BER of the demodulated signal, ASK and FSK show the achievable BER of $10^{-3}{\sim}10^{-4}$ without compensation techniques and QPSK show that of $10^{-4}$ with linear equalizer.

An Energy and Coverage Efficient Clustering Method for Wireless Sensor Network (무선 센서 네트워크를 위한 효율적인 에너지와 커버리지 클러스터링 방법)

  • Gong, Ji;Zhang, Kai;Kim, Seung-Hae;Cho, Gi-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.261-262
    • /
    • 2008
  • Due to technological advances, the manufacturing of small and low cost of sensors becomes technically and economically feasible. In recent years, an increasing interest in using Wireless Sensor Network (WSN) in various applications, including large scale environment monitoring, battle field surveillance, security management and location tracking. In these applications, hundreds of sensor nodes are left to be unattended to report monitored data to users. Since sensor nodes are placed randomly and sometimes are deployed in underwater. It is impossible to replace batteries often when batteries run out. Therefore, reducing energy consumption is the most important design consideration for sensor networks.

  • PDF

Step-wised Out-test Mechanism for Underwater Acoustic Networks (수중 음파 통신 네트워크를 위한 Step-wised Out-test 메커니즘)

  • Ibragimov, Mukhridinkhon;Yun, Nam-Yeol;Shin, Soo-Young;Namgung, Jung-Il;Kim, Changhwa;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.106-114
    • /
    • 2015
  • Despite a series of various developments in underwater acoustic sensor networks, there are still occasions of loss of connection over the network. Because sufficient amounts of drawbacks causing disconnections posed particularly in the middle of connection over the network emerge in the ocean environment, there is a need of new testing mechanism for underwater acoustic networks. In this paper, we proposed to investigate the most vital parts of the network deployment whether they function well in order, without any failure so as to identify where exactly communication process problems and failures are. We introduce step-wised out-test mechanism for UWASNS and accomplished the mechanism by implementing experiments and rigorously checked all the underwater devices utilizing out-test function. Experimental results and out-test function are evinced by implementing, in order to explain our system and conclude with possible future improvements.

Medium Access Control Using Channel Reservation Scheme in Underwater Acoustic Sensor Networks (해양센서네트워크에서 채널예약방식을 이용한 매체접근제어)

  • Jang, Kil-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.955-963
    • /
    • 2009
  • In this paper, we propose a medium access control(MAC) protocol for reducing the energy efficiency and for improving the transmission efficiency in underwater acoustic sensor networks. In underwater environment, the transmission delay is longer and bandwidth is smaller than terrestrial environment. Considering these points, we propose a new MAC protocol to enhance throughput and to manage efficiently the energy of nodes. The proposed protocol operates as a channel reservation scheme to decrease data collisions, and uses a mechanism to control the hidden node problem and the exposed node problem occurred in ad hoc networks. The proposed protocol consists of the slotted based transmission frame and reduces data collisions between nodes by putting separately the reservation period in the transmission frame. In addition, it is able to solve the hidden node problem and the exposed node problem by reservation information between nodes. We carry out the simulation to evaluate the proposed protocol in terms of the average energy consumption, the ratio of collision, throughput, and the average transmission delay, and compare the proposed protocol to a traditional MAC protocol in the underwater environment. The simulation results show that the proposed protocol outperforms the traditional protocol under a various of network parameters.