• Title/Summary/Keyword: WSN(Wireless sensor network)

Search Result 645, Processing Time 0.028 seconds

Localization for Swarm Robots Using APIT (APIT를 이용한 군집로봇의 위치 측정)

  • Hao, Wu;Km, Jong-Sun;Ra, In-Ho;Joo, Young-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1884-1885
    • /
    • 2011
  • In the wireless sensor network (WSN) environment, the approximate point-in-triangulation (APIT) is a kind of range-free localization algorithm. This algorithm provides high precision, however, the coverage rate is somewhat poor. In this paper, we propose an improved APIT algorithm for the localization of swarm robots, which is based on the received signal strength indicator (RSSI) and the center of gravity (COG) methods.

  • PDF

A Mutual Authentication Method Between Entities of the Same Network in Multiple Wireless Sensor Networks (중첩된 무선 센서 네트워크 환경에서 동일한 네트워크에 속한 구성요소 간의 상호인증 방법)

  • Min, Ho-Kun;Leem, Sang-Seob;Yeh, Hong-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.41-46
    • /
    • 2008
  • 가까운 미래에는 저가의 센서노드가 대량으로 보급되어, 같은 공간에 서로 다른 다양한 무선 센서네트워크(WSN)들이 동시에 존재하는 상황이 보편적일 것으로 예상된다. 본 논문에서는 이러한 환경에서 센서노드나 베이스스테이션이 서로 동일한 네트워크에 속한 것인지 여부를 확인하기 위한 상호인증 문제를 다루고자 한다. 모든 네트워크 구성요소가 동일한 형식의 식별자(Verifier)를 갖는다고 가정할 때, 식별자를 이용하여 각자 자기가 속한 네트워크를 구별하는 방법을 제안한다. 또한 식별자가 갖추어야 할 요건을 제시하고, 이와 같은 요건을 만족하는 식별자의 예를 보인다.

  • PDF

An Efficient Clustering algorithm for Target Tracking in WSNs (무선 센서 네트워크에서 클러스터링을 이용한 효율적인 측위)

  • Rhee, Chung-Sei;Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.65-71
    • /
    • 2016
  • The use of Wireless Sensor Networks in many applications require not only efficient network design but also broad aspects of security, military and health care for hospital. Among many applications of WSNs, target tracking is an essential research area in WSNs. We need to track a target quickly as well as find the lost target in WSNs. In this paper, we propose an efficient target tracking method. We also propose an efficient clustering method and algorithm for target tracking.

Real Time Bridge Condition Monitoring Using Wireless Sensor Network (무선 네트워크를 이용한 실시간 교량 상태 계측)

  • Chae, Myung-Jin;Yoo, Hyun-Seok;Kim, Jeong-Ryeol;Park, Jae-Woo;Cho, Moon-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.194-197
    • /
    • 2006
  • 교량의 고성능화, 고효율화 및 센서기술의 발전에 따라서 최근의 장대교량의 경우 교량에 각종 센서를 부착하여 상태를 실시간으로 교량의 상태를 계측하는 시스템이 개발되어 사용되고 있다. 하지만, 기존의 센서와 데이터 로거를 이용한 계측시스템은 높은 설치비가 요구되며 센서 설치비의 50%이상이 통신케이블에 관련된 비용이다. 본 논문에서는 설치비용 절감과 저렴한 유지관리비용 및 센서의 추가 및 교체가 손쉬운 무선기반의 계측시스템 개발에 관하여 논하고자 한다. 교량의 부재에 부착되어있는 센서들 사이 근거리 무선통신은 ZigBee를 이용한 무선통신네트워크를 구성하였으며, 교량과 교량관리소 사이의 장거리 통신에는 국내 휴대전화에 사용되고 있는 CDMA 통신망을 이용하여 데이터를 전송하는 방식을 취하고 있다.

  • PDF

Networking Support Framework for Wireless Sensor Network Applications (센서네트워크 응용 개발을 위한 네트워킹 지원구조)

  • Choi Suk-Won;Cha Ho-Jung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.184-186
    • /
    • 2006
  • 본 논문에서는 WSN의 개발자론 커널 개발자, 네트워크 응용 개발자로 분리하고 이들이 상호 배타적으로 프로그래밍 할 수 있는 네트워크 구조를 제시한다. 이를 위해 커널을 정적 부분과 동적 부분으로 분류하고 응용에 따라 변경되는 부분을 최소화하면서도, 네트워크 모듈의 재사용성을 높일 수 있는 효율적인 센서 네트워크 프로그래밍 환경을 제공한다. 이를 위해 MAC 프로토콜과 독립적으로 네트워크 알고리즘을 개발 할 수 있는 새로운 계층 구조를 제안한다. 제안하는 네트워크 구조는 상하 독립적 프로그래밍 구조를 제공함으로써 hop-to-hop 통신과 end-to-end 통신의 개발을 별도의 알고리즘으로 할 수 있도록 한다. 유효성을 검증하기 위해 Dynamic Loadable Kernel Module을 지원하는 RETOS 운영 체제를 이용하여 다양한 네트워크 알고리즘 및 응용을 구현한 후, 그 성능을 평가하였다.

  • PDF

CoAP handover procedure for reducing memory load of lightweight IoT device (경량 IoT 디바이스의 메모리 점유율 감소를 위한 CoAP 핸드오버 절차)

  • Ahn, Seyoung;Kim, Teasung;Kim, Jeehyeong;Cho, Sunghyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.135-136
    • /
    • 2018
  • CoAP을 사용하는 IoT 기기는 핸드오버를 시행하는 동안 주기적으로 보내야 하는 메시지를 보내지 않고 메모리에 저장한다. 그로 인한 경량 IoT 기기의 메모리 요구량의 감소를 위한 핸드오버 절차를 제안한다. 제안하는 절차에서는 센서 노드가 핸드오버 이전에 현재 기지국에 미리 핸드오버 요청을 보낸다. 따라서 센서 노드가 이웃한 기지국에게 핸드오버 요청을 했을 때, 이웃한 기지국은 현재 기지국에게 핸드오버 알림을 주지 않는다. 본 연구에서는 시뮬레이션을 통하여 제안하는 핸드오버 절차로 인한 observe 메시지의 메모리 점유율을 50%가량 줄인다.

  • PDF

A Survey on Congestion Control for CoAP over UDP

  • Lim, Chansook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.17-26
    • /
    • 2019
  • The Constrained Application Protocol (CoAP) is a specialized web transfer protocol proposed by the IETF for use in IoT environments. CoAP was designed as a lightweight machine-to-machine protocol for resource constrained environments. Due to the strength of low overhead, the number of CoAP devices is expected to rise rapidly. When CoAP runs over UDP for wireless sensor networks, CoAP needs to support congestion control mechanisms. Since the default CoAP defines a minimal mechanism for congestion control, several schemes to improve the mechanism have been proposed. To keep CoAP lightweight, the majority of the schemes have been focused mainly on how to measure RTT accurately and how to set RTO adaptively according to network conditions, but other approaches such as rate-based congestion control were proposed more recently. In this paper, we survey the literature on congestion control for CoAP and discuss the future research directions.

A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes (오염에 취약한 센서노드들을 위한 주기적인 키갱신 방안)

  • Wang, Gi-Cheol;Kim, Ki-Young;Park, Won-Ju;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.11
    • /
    • pp.67-77
    • /
    • 2007
  • In sensor networks, it is very important to refresh communication keys of sensors in a periodic or on-demand manner. To perform a dynamic key management efficiently, sensor networks usually employ cluster architecture and each CH (Cluster Head) is responsible for key management within its cluster. In cluster-based sensor networks, CHs are likely to be targets of capture attacks, and capture of CHs threatens the survival of network significantly. In this paper, we propose a periodical key refreshment scheme which counteracts against capture of CHs. First, the proposed scheme reduces the threat caused by compromise of CHs by forcing each CH to manage a small number of sensors and changing CH role nodes periodically. Second, the proposed scheme flings attackers into confusion by involving other nodes in a key establishment between BS (Base Station) and a CH. Our numerical analyses showed that the proposed scheme is more secure than other schemes and robust against compromise of CHs.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.

Metadata Design Proposal for Improving the Transmission Quality in Wireless Sensor Network (무선 센서 네트워크에서 전송 품질 개선을 위한 메타데이터 설계 제안)

  • Jeon, Hye-Kyoung;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.193-199
    • /
    • 2014
  • In the application development process is an important task to improve the quality of the data is the principal means for achieving the functional requirements of the wireless sensor network applications because it is the data obtained in the real world. It should be possible to meet the requirements for the quality improvement to those detailed for improving the quality in a short period of time for developing a prototype of an application and low cost. However, development of the existing methods can not be satisfied simultaneously in order to use a consistent abstraction because antinomical relation between ability of description and ease of description. In this paper, we propose a meta-data designed to support the improvement of data quality through abstract modeling language is also used in combination to a multiple of the other.