• Title/Summary/Keyword: Wireless sensor Networks

Search Result 2,279, Processing Time 0.03 seconds

The data transmission of the of u-lD sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-lD센서네트워크 구성에서의 데이터 전송)

  • Kim Young-kil;Park Ji-hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.242-246
    • /
    • 2005
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. his paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server.

Design and Implementation of Stream Cipher based on SHACAL-2 Superior in the Confidentiality and Integrity (기밀성과 무결성이 우수한 SHACAL-2 기반 스트림 암호 설계 및 구현)

  • Kim, Gil Ho;Cho, Gyeong Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1427-1438
    • /
    • 2013
  • We have developed a 128-bit stream cipher algorithm composed of the 5-stage pipeline, capable of real-time processing, confidentiality and integrity. The developed stream cipher is a stream cipher algorithm that makes the final 128-bit ciphers through a whitening process after making the ASR 277 bit and SHACAL-2 and applying them to the CFB mode. We have verified the hardware performance of the proposed stream cipher algorithm with Modelsim 6.5d and Quartus II 12.0, and the result shows that the hardware runs at 33.34Mhz(4.27Gbps) at worst case. According to the result, the new cipher algorithm has fully satisfied the speed requirement of wireless Internet and sensor networks, and DRM environment. Therefore, the proposed algorithm with satisfaction of both confidentiality and integrity provides a very useful ideas.

NetLogo Extension Module for the Active Participatory Simulations with GoGo Board (고고보드를 이용한 능동적 참여 모의실험을 위한 NetLogo 확장 모듈)

  • Xiong, Hong-Yu;So, Won-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1363-1372
    • /
    • 2011
  • Flooding based routing protocols are usually used to disseminate information in wireless sensor networks. Those approaches, however, require message retransmissions to all nodes and induce huge collision rate and high energy consumption. In this paper, HoGoP (Hop based Gossiping Protocol) in which all nodes consider the number of hops from sink node to them, and decide own gossiping probabilities, is introduced. A node can decide its gossiping probability according to the required average reception percentage and the number of parent nodes which is counted with the difference between its hop and neighbors' ones. Therefore the decision of gossiping probability for network topology is adaptive and this approach achieves higher message reception percentage with low message retransmission than the flooding scheme. Through simulation, we compare the proposed protocol with some previous ones and evaluate its performance in terms of average reception percentage, average forwarding percentage, and forwarding efficiency. In addition, average reception percentage is analyzed according to the application requirement.

A Backtracking Search Framework for Constraint Satisfaction Optimization Problems (제약만족 최적화 문제를 위한 백트래킹 탐색의 구조화)

  • Sohn, Surg-Won
    • The KIPS Transactions:PartA
    • /
    • v.18A no.3
    • /
    • pp.115-122
    • /
    • 2011
  • It is very hard to obtain a general algorithm for solution of all the constraint satisfaction optimization problems. However, if the whole problem is separated into subproblems by characteristics of decision variables, we can assume that an algorithm to obtain solutions of these subproblems is easier. Under the assumption, we propose a problem classifying rule which subdivide the whole problem, and develop backtracking algorithms fit for these subproblems. One of the methods of finding a quick solution is efficiently arrange for any order of the search tree nodes. We choose the cluster head positioning problem in wireless sensor networks in which static characteristics is dominant and interference minimization problem of RFID readers that has hybrid mixture of static and dynamic characteristics. For these problems, we develop optimal variable ordering algorithms, and compare with the conventional methods. As a result of classifying the problem into subproblems, we can realize a backtracking framework for systematic search. We also have shown that developed backtracking algorithms have good performance in their quality.

A SPECK Crypto-Core Supporting Eight Block/Key Sizes (8가지 블록/키 크기를 지원하는 SPECK 암호 코어)

  • Yang, Hyeon-Jun;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.468-474
    • /
    • 2020
  • This paper describes the hardware implementation of SPECK, a lightweight block cipher algorithm developed for the security of applications with limited resources such as IoT and wireless sensor networks. The block cipher SPECK crypto-core supports 8 block/key sizes, and the internal data-path was designed with 16-bit for small gate counts. The final round key to be used for decryption is pre-generated through the key initialization process and stored with the initial key, enabling the encryption/decryption for consecutive blocks. It was also designed to process round operations and key scheduling independently to increase throughput. The hardware operation of the SPECK crypto-core was validated through FPGA verification, and it was implemented with 1,503 slices on the Virtex-5 FPGA device, and the maximum operating frequency was estimated to be 98 MHz. When it was synthesized with a 180 nm process, the maximum operating frequency was estimated to be 163 MHz, and the estimated throughput was in the range of 154 ~ 238 Mbps depending on the block/key sizes.

Design of the Smart Application based on IoT (사물 인터넷 기반 스마트 응용의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.151-155
    • /
    • 2017
  • With the rapid growth of the up-to-date wireless network and Internet technologies, huge and various types of things around us are connected to the Internet and build the hyper-connected society, and lots of smart applications using these technologies are actively developed recently. IoT connects human, things, space, and data with various types of networks to construct the hyper-connected network that can create, collect, share and appling realtime information. Furthermore, most of the smart applications are concentrated on the service that can collect and store realtime contexts using various sensors and cloud technology, and provide intelligence by making inferences and decisions from them nowadays. In this paper, we design a smart application that can accurately control and process the current state of the specific context in realtime by using the state-of-the-art ICT techniques such as various sensors and cloud technologies on the IoT based mobile computing environment.

Planar Type Flexible Piezoelectric Thin Film Energy Harvester Using Laser Lift-off

  • Noh, Myoung-Sub;Kang, Min-Gyu;Yoon, Seok Jin;Kang, Chong-Yun
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2014.02a
    • /
    • pp.489.2-489.2
    • /
    • 2014
  • The planar type flexible piezoelectric energy harvesters (PEH) based on PbZr0.52Ti0.48O3 (PZT) thin films on the flexible substrates are demonstrated to convert mechanical energy to electrical energy. The planar type energy harvesters have been realized, which have an electrode pair on the PZT thin films. The PZT thin films were deposited on double side polished sapphire substrates using conventional RF-magnetron sputtering. The PZT thin films on the sapphire substrates were transferred by PDMS stamp with laser lift-off (LLO) process. KrF excimer laser (wavelength: 248nm) were used for the LLO process. The PDMS stamp was attached to the top of the PZT thin films and the excimer laser induced onto back side of the sapphire substrate to detach the thin films. The detached thin films on the PDMS stamp transferred to adhesive layer coated on the flexible polyimide substrate. Structural properties of the PZT thin films were characterized using X-ray diffraction (XRD) and scanning electron microscopy (SEM). To measure piezoelectric power generation characteristics, Au/Cr inter digital electrode (IDE) was formed on the PZT thin films using the e-beam evaporation. The ferroelectric and piezoelectric properties were measured by a ferroelectric test system (Precision Premier-II) and piezoelectric force microscopy (PFM), respectively. The output signals of the flexible PEHs were evaluated by electrometer (6517A, Keithley). In the result, the transferred PZT thin films showed the ferroelectric and piezoelectric characteristics without electrical degradation and the fabricated flexible PEHs generated an AC-type output power electrical energy during periodically bending and releasing motion. We expect that the flexible PEHs based on laser transferred PZT thin film is able to be applied on self-powered electronic devices in wireless sensor networks technologies. Also, it has a lot of potential for high performance flexible piezoelectric energy harvester.

  • PDF

Design of Low-Power Hybrid LNA with Multi-Input for Mobile Ultrasound System (이동형 초음파시스템에 적합한 다중 입력방식의 저전력 혼성 저잡음 증폭기 설계)

  • Song, Jae-Yeol;Lee, Kyung-Hoon;Park, Sung-Mo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.64-69
    • /
    • 2014
  • Ultrasound system is one of the complex wireless signal processing systems that are widely used in the fields of modern industry such as medical diagnostics, underwater communications, and sensor-networks. Miniaturization of ultrasound system has been raging recently. In this paper, a hybrid LNA that is suitable for miniaturization and mobile diagnostic ultrasound system has been developed. The proposed LNA has low noise figure of less than 5dB, and the feedback resistor is designed to be electrically adjusted in order to attain the impedance-matching for various ultrasound transducers. It supports the whole ultrasound frequencies from 10KHz to 150MHz frequency band and also provides sleep modes. A gain from -18.8 to -29.5 dB is achieved by adjusting each transducer to fit the system character. Power consumption can be reduced up to 90% in similar performance as compared to the existing LNA.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

Transport Performance Analysis of the SDR-based Interworking Networks Using DEVS Methodology (SDR을 포함하는 다종 네트워크의 전달성능 분석을 위한 DEVS 모델링 및 시뮬레이션 연구)

  • Song, Sang-Bok;Lee, Kyou-Ho;Jang, Won-Ick
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.153-158
    • /
    • 2008
  • The technology of Software Defined Radio (SDR) is a possible solution to interwork flexibly between various wireless transport protocols. Ubiquitous network, like u-health service network, includes sensor devices or nodes which do not facilitate all the same transport protocols to access network. As such this may be in such unreachable situations as poverty of all required AP (Access Point)’s, faults or contention in a path of particular protocol communication, etc. This paper presents research results of modeling and simulation to analyze transport performance of multi-protocol ubiquitous network which includes SDR-based interwork nodes and congestion-controlled AP’s. Focusing mainly on dynamics of overall transport performance rather than protocol execution procedures, this paper employs the Zeigler’s DEVS (Discrete Event Systems Specification) methodology and DEVSim++simulation environment to experiment.

  • PDF