• Title/Summary/Keyword: Wireless Sensor

Search Result 4,231, Processing Time 0.033 seconds

Multi-Line Data Gathering Scheme for Efficient Operation of a Mobile Sink in Solar-Powered Wireless Sensor Networks (태양 에너지 수집형 무선 센서 네트워크에서 모바일 싱크의 효율적 운용을 위한 멀티라인 데이터 수집 기법)

  • Lee, Seungwoo;Kang, Minjae;Son, Youngjae;Gil, Gun Wook;Cheong, Seok Hyun;Bae, Ha Neul;Noh, Dong Kun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.135-138
    • /
    • 2020
  • 무선 센서 네트워크에서 모바일 싱크의 도입은 기존의 고정된 위치의 싱크를 사용하는 WSN에서 발생하는, 싱크 주변 노드들과 외곽 노드들 간의 에너지 불균형 문제(에너지 핫스팟 문제)를 어느 정도 해결할 수 있게 하였다. 그러나 모바일 싱크의 에너지 제약으로 인해 싱크가 모든 노드를 방문하여 데이터를 수집할 수 없기 때문에, 앵커(또는 헤드)라고 불리는 특정 노드에서 데이터를 모으고, 모바일 싱크는 이러한 앵커 노드들만을 방문하는 방법이 널리 사용되고 있다. 최근 연구에서는 모바일 싱크가 보다 효율적으로 에너지 불균형 문제를 해결하기 위하여 모바일 싱크 이동 경로 및 앵커 노드 선정 최적화 방법이 활발히 연구되고 있다. 본 연구에서는 태양 에너지 기반 센서 네트워크를 위한 영역 기반 앵커 선정 기법 및 모바일 싱크 이동 경로 선택 기법을 제안한다. 제안 기법은 각 노드가 수집하는 태양 에너지의 활용을 최대화하고, 에너지 핫스팟 문제를 완화하기 위해 두 개의 라인(영역)을 설정하고 이 라인을 따라 앵커 노드가 선정된다. 모바일 싱크는 데이터 수집을 위해 이 두 라인을 왕복 이동 경로로 택하여 라인 내의 앵커 노드를 방문한다. 실험을 통해 제안 기법이 기존 기법보다 에너지 불균형 문제가 완화되어 노드의 정전 시간이 줄어들고, 이에 따라 모바일 싱크에서 수집되는 데이터의 양이 증가하는 것을 확인하였다.

  • PDF

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Edge Computing Model based on Federated Learning for COVID-19 Clinical Outcome Prediction in the 5G Era

  • Ruochen Huang;Zhiyuan Wei;Wei Feng;Yong Li;Changwei Zhang;Chen Qiu;Mingkai Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.826-842
    • /
    • 2024
  • As 5G and AI continue to develop, there has been a significant surge in the healthcare industry. The COVID-19 pandemic has posed immense challenges to the global health system. This study proposes an FL-supported edge computing model based on federated learning (FL) for predicting clinical outcomes of COVID-19 patients during hospitalization. The model aims to address the challenges posed by the pandemic, such as the need for sophisticated predictive models, privacy concerns, and the non-IID nature of COVID-19 data. The model utilizes the FATE framework, known for its privacy-preserving technologies, to enhance predictive precision while ensuring data privacy and effectively managing data heterogeneity. The model's ability to generalize across diverse datasets and its adaptability in real-world clinical settings are highlighted by the use of SHAP values, which streamline the training process by identifying influential features, thus reducing computational overhead without compromising predictive precision. The study demonstrates that the proposed model achieves comparable precision to specific machine learning models when dataset sizes are identical and surpasses traditional models when larger training data volumes are employed. The model's performance is further improved when trained on datasets from diverse nodes, leading to superior generalization and overall performance, especially in scenarios with insufficient node features. The integration of FL with edge computing contributes significantly to the reliable prediction of COVID-19 patient outcomes with greater privacy. The research contributes to healthcare technology by providing a practical solution for early intervention and personalized treatment plans, leading to improved patient outcomes and efficient resource allocation during public health crises.

Fabrication of Portable Self-Powered Wireless Data Transmitting and Receiving System for User Environment Monitoring (사용자 환경 모니터링을 위한 소형 자가발전 무선 데이터 송수신 시스템 개발)

  • Jang, Sunmin;Cho, Sumin;Joung, Yoonsu;Kim, Jaehyoung;Kim, Hyeonsu;Jang, Dayeon;Ra, Yoonsang;Lee, Donghan;La, Moonwoo;Choi, Dongwhi
    • Korean Chemical Engineering Research
    • /
    • v.60 no.2
    • /
    • pp.249-254
    • /
    • 2022
  • With the rapid advance of the semiconductor and Information and communication technologies, remote environment monitoring technology, which can detect and analyze surrounding environmental conditions with various types of sensors and wireless communication technologies, is also drawing attention. However, since the conventional remote environmental monitoring systems require external power supplies, it causes time and space limitations on comfortable usage. In this study, we proposed the concept of the self-powered remote environmental monitoring system by supplying the power with the levitation-electromagnetic generator (L-EMG), which is rationally designed to effectively harvest biomechanical energy in consideration of the mechanical characteristics of biomechanical energy. In this regard, the proposed L-EMG is designed to effectively respond to the external vibration with the movable center magnet considering the mechanical characteristics of the biomechanical energy, such as relatively low-frequency and high amplitude of vibration. Hence the L-EMG based on the fragile force equilibrium can generate high-quality electrical energy to supply power. Additionally, the environmental detective sensor and wireless transmission module are composed of the micro control unit (MCU) to minimize the required power for electronic device operation by applying the sleep mode, resulting in the extension of operation time. Finally, in order to maximize user convenience, a mobile phone application was built to enable easy monitoring of the surrounding environment. Thus, the proposed concept not only verifies the possibility of establishing the self-powered remote environmental monitoring system using biomechanical energy but further suggests a design guideline.

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

A Study of Monitoring and Operation for PEM Water Electrolysis and PEM Fuel Cell Through the Convergence of IoT in Smart Energy Campus Microgrid (스마트에너지캠퍼스 마이크로그리드에서 사물인터넷 융합 PEM 전기분해와 PEM 연료전지 모니터링 및 운영 연구)

  • Chang, Hui Il;Thapa, Prakash
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.13-21
    • /
    • 2016
  • In this paper we are trying to explain the effect of temperature on polymer membrane exchange water electrolysis (PEMWE) and polymer membrane exchange fuel cell (PEMFC) simultaneously. A comprehensive studying approach is proposed and applied to a 50Watt PEM fuel cell system in the laboratory. The monitoring process is carried out through wireless LoRa node and gateway network concept. In this experiment, temperature sensor measure the temperature level of electrolyzer, fuel cell stack and $H_2$ storage tank and transmitted the measured value of data to the management control unit (MCU) through the individual node and gateway of each PEMWE and PEMFC. In MCU we can monitor the temperature and its effect on the performance of the fuel cell system and control it to keep the lower heating value to increase the efficiency of the fuel cell system. And we also proposed a mathematical model and operation algorithm for PEMWE and PEMFC. In this model, PEMWE gives higher efficiency at lower heating level where as PEMFC gives higher efficiency at higher heating value. In order to increase the performance of the fuel cell system, we are going to monitor, communicate and control the temperature and pressure of PEMWE and PEMFC by installing these systems in a building of university which is located in the southern part of Korea.

A Study on Real-Time Sports Activity Classification & Monitoring Using a Tri-axial Accelerometer (가속도 센서를 이용한 실시간 스포츠 동작 분류.모니터링에 관한 연구)

  • Kang, Dong-Won;Choi, Jin-Seung;Tack, Gye-Rae
    • Korean Journal of Applied Biomechanics
    • /
    • v.18 no.2
    • /
    • pp.59-64
    • /
    • 2008
  • D. W. KANG, J. S. CHOI, and G. R. TACK, A Study on Real-Time Sports Activity Classification & Monitoring Using a Tri-axial Accelerometer. Korean Jouranl of Sport Biomechanics, Vol. 18, No. 2, pp. 59-64, 2008. This study was conducted to study the real-time sports activity classification and monitoring using single waist mounted tri-axial accelerometer. This monitoring system detects events of sports activities such as walking, running, cycling, transitions between movements, resting and emergency event of falls. Accelerometer module was developed small and easily attachable on waist using wireless communication system which does not constrain sports activities. The sensor signal was transferred to PC and each movement pattern was classified using the developed algorithm in real-time environment. To evaluate proposed algorithm, experiment was performed with several sports activities such as walking, running, cycling movement for 100sec each and falls, transition movements(sit to stand, lie to stand, stand to sit, lie to sit, stand to lie and sit to lie) for 20 times each with 5 healthy subjects. The results showed that successful detection rate of the system for all activities was 95.4%. In this study, through sports activity monitoring. it was possible to classify accurate sports activities and to notify emergency event such as falls. For further study, the accurate energy consumption algorithm for each sports activity is under development.

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.