• Title/Summary/Keyword: WSN.

Search Result 888, Processing Time 0.023 seconds

Coastal and Marine Environment Monitoring System using Flooding Routing Protocol (플러딩 라우팅 프로토콜을 이용한 연안.해양 환경모니터링 시스템)

  • Yoo, Jae-Ho;Lee, Seung-Chul;Kim, Jong-Jin;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.180-183
    • /
    • 2011
  • Recently, environmental problems have been deteriorating rapidly. Therefore, there is an urgent need to establish policies and research in the conservation of the global environment. Many researchers are studied in environment systems to prevent and reduce pollution of water, air and soil actively. In this paper, several parameters such as temperature, humidity, illumination, barometric pressure, dew point, water quality data, and air conditions are collected and transmitted thorough wireless sensor network. The field server is located in the coastal and marine area so that any abrupt changes can be detected quickly. In addition, WSN based flooding routing protocol for efficient data transmission is designed to support and monitor information of climate and marin factors.

  • PDF

DL-LEACH: Hierarchical Dual-Hop Routing Protocol for Wireless Sensor Network (DL-LEACH : 무선 센서 네트워크를 위한 계층형 멀티 홉 라우팅 프로토콜)

  • Lee, Chang-Hee;Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.139-145
    • /
    • 2015
  • This paper proposes to increase the node energy effienciecy, which rapidly drops during the transmission of LEACH (Low Energy Adaptive Clustering Hierachy), using the method of DL-LEACH (Dual-hop Layered LEACH). By introducing dual-hop method in the data transmission, the proposed single-hop method for short-range transmission and multi-hop transmission method between the cluster heads for remote transmission was introduce. By introducing a partial multi-hop method in the data transmission, a single-hop method for short range transmission method between the cluster heads for remote transmission was introduces. In the proposed DL-LEACH, the energy consumption of cluster head for remote transmission reduces and increases the energy efficiency of sensor node by reducing the transmission distance and simplifying the transmission routine for short-range transmission. As compared the general LEACH, it was adapted to a wider sensor field.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (노드간 에너지 소비를 효율적으로 분산시킨 PRML 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Nam-Kyu;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.774-784
    • /
    • 2009
  • A wireless sensor network consisting of a large number of nodes with limited battery power should minimize energy consumption at each node to prolong the network lifetime. To improve the sensitivity of wireless sensor networks, an efficient scheduling algorithm and energy management technology for minimizing the energy consumption at each node is desired. ill this paper, we propose energy-aware routing mechanism for maximum lifetime and to optimize the solution quality for sensor network maintenance and to relay node from its adjacent cluster heads according to the node"s residual energy and its distance to the base station. Proposed protocol may minimize the energy consumption at each node, thus prolong the lifetime of the system regardless of where the sink is located outside or inside the cluster. Simulation results of proposed scheme show that our mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime. To verify propriety using NS-2, proposed scheme constructs sensor networks adapt to current model and evaluate consumption of total energy, energy consumption of cluster head, average energy dissipation over varying network areas with HEED and LEACH-C.

A Study on an Efficient Routing Algorithm for Wireless Sensor Network (무선 센서네트워크에서 효율적인 라우팅 알고리즘에 관한 연구)

  • Kim, Byoung-Chan;Yim, Jae-Hong;Choi, Hong-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.887-898
    • /
    • 2009
  • Conventional routing protocols proposed for wireless sensor networks (WSNs) cannot fully accommodate the characteristics of WSNs. In particular, although it is possible to largely obtain benefits in the solution of energy consumption and global identification problems through applying position information, there are few protocols that actively apply such position information. In the case of geographical and energy aware routing (GEAR) that is a typical algorithm, which uses position information, it does not fully represent the characteristics of WSNs because it is limited to forward query messages and assumed as fixed network environments. The routing protocols proposed in this paper defines the direction of data, which is routed based on the position information of individual and target nodes, in which each node configures its next hop based on this direction and routes signals. Because it performs data-centric routing using position information, it does not require certain global identifications in order to verify individual nodes and is able to avoid unnecessary energy consumption due to the forwarding of packets by defining its direction.

An Hierarchical Key Management Scheme for Assure Data Integrity in Wireless Sensor Network (WSN에서 데이터 무결성을 보장하는 계층적인 키 관리 기법)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.281-292
    • /
    • 2008
  • A main application of sensor networks are to monitor and to send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power from each sensor, intermediate network nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate network nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. From simulation study, we compare the amount of the energy consumption overhead, the time of key transmission and the ratio of of key process between the proposed method and LHA-SP. The simulation result of proposed protocol is low 3.5% a lord of energy consumption than LHA-SP, the time of key transmission and the ration of key process is get improved result of each 0.3% and 0.6% than LHA-SP.

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

Design and Implementation of the Localization System Using Distance Identification Code in Wireless Sensor Network (무선 센서네트워크에서 거리 식별코드를 이용한 위치인식시스템 설계 및 구현)

  • Choi, Chang-Yong;Lee, Dong-Myung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8A
    • /
    • pp.575-582
    • /
    • 2009
  • The localization algorithm(LAtu) using the IDentification Code($C_{ID}$) is suggested in RSS(Received Signal Strength) based Wireless Sensor Network(WSN), and the localization system using the suggested algorithm is designed and implemented in this paper. In addition to this, the performance of ranging correction quality and localization error of the localization system(System(LAtu)) that is developed using the LAtu is analyzed and compared with that of the localization system(System(LAieee)) using the channel model of IEEE 802.15.4 standard(LAieee) by the actual experimentation. From the experimentation, the ranging correction quality is analyzed that the LAtu is highly better than the channel model of LAieee about 34% under the distance between the moving module and the beacon module($D_{MM-BM}$) is 2m, and is also a few better than that of the LAieee about average 5% under the $D_{MM-BM}$ is above 5m. The localization error quality of the System(LAtu) is lower than that of the System(LAieee)) about 1cm under the lecture room and 4cm in the large lecture room.

Modified LEACH Protocol improving the Stabilization of Topology in Metal Obstacle Environment (금속 장애물 환경에서 토폴로지 안정성을 개선한 변형 LEACH 프로토콜)

  • Yi, Ki-One;Lee, Jae-Kee;Kwark, Gwang-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1349-1358
    • /
    • 2009
  • Because of the limitation of supporting power, the current WSN(Wireless Sensor Network) Technologies whose one of the core attributes is low power consumption are the best solution for shipping container networking in stack environment such as on vessel. So it is effective to use the Wireless Sensor Network Technology. In this case, many nodes join in the network through a sink node because there are difficulties to get big money and efforts to set up a lot of sink node. It needs clustering-based proactive protocol to manage many nodes. But it shows low reliability because they have effect on radio frequency in metal obstacle environments(interference, distortion, reflection, and etc) like the intelligent container. In this paper, we proposed an improved Modified LEACH Protocol for stableness radio frequency environment. In the proposed protocol, we tried to join the network and derived stable topology composition after the measuring of link quality. Finally, we verified that the proposed protocol is composing more stable topology than previously protocol in metal obstacle environment.

An Efficient Search Algorithm for Shorten Routing Path in ZigBee Networks (ZigBee 네트워크에서 효율적인 단축 경로 검색 알고리즘)

  • Kim, Doo-Hyun;Cho, Sung-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1535-1541
    • /
    • 2009
  • In this paper, we suggest an efficient path searching algorithm that reduces the hop count when each node sends a data in ZigBee networks. As the hop count reduces, the network traffic is also reduces and leads to less energy consumption. This enables the sensor network live longer with limited node power. The proposed path searching algorithm consists of two sub-algorithms. One for upstream process and the other for downstream process. When a node selects its proper routing path, the node not only uses the information of the parent and child node, but it also uses the neighbor nodes for each node. In the simulation, we changed various network environment factors such as network parameters, number of nodes, and number of neighbor nodes and observed their performances. We compare the performance to the previous ZigBee Tree routing algorithm with separate two algorithms, the upstream and the downstream, and then compare the performance when all two algorithms are applied.

Efficient Anomaly Detection Through Confidence Interval Estimation Based on Time Series Analysis (시계열 분석 기반 신뢰구간 추정을 통한 효율적인 이상감지)

  • Kim, Yeong-Ju;Heo, You-Kyung;Park, Jin-Gwan;Jeong, Min-A
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.708-715
    • /
    • 2014
  • In this paper, we suggest a method of realtime confidence interval estimation to detect abnormal states of sensor data. For realtime confidence interval estimation, the mean square errors of the exponential smoothing method and moving average method, two of the time series analysis method, where compared, and the moving average method with less errors was applied. When the sensor data passes the bounds of the confidence interval estimation, the administrator is notified through alarming. As the suggested method is for realtime anomaly detection in a ship, an Android terminal was adopted for better communication between the wireless sensor network and users. For safe navigation, an administrator can make decisions promptly and accurately upon emergency situation in a ship by referring to the anomaly detection information through realtime confidence interval estimation.