• 제목/요약/키워드: Wireless sensors

검색결과 1,136건 처리시간 0.025초

이동 단말기를 위한 Three-Tier 상황정보 수집 기법 (TTCG : Three-Tier Context Gathering Technique for Mobile Devices)

  • 소수환;김승훈
    • 한국산업정보학회논문지
    • /
    • 제14권1호
    • /
    • pp.64-72
    • /
    • 2009
  • 기존의 센서네트워크의 연구는 센서에서 센싱된 데이터가 무선 센서네트워크를 통해서 효율적으로 정지싱크노드로 전달되는 연구가 주를 이루었다. 최근 이동성을 갖는 싱크노드의 연구가 활발히 진행되고 있지만 정지 싱크노드와 이동 싱크노드가 혼재하는 환경에 대한 연구는 미비한 실정이다. 본 논문에서는 기 구축된 클러스터 기반 다중홉 센서네트워크 환경에서 이동싱크들이 정지 싱크를 이용하여 데이터 수집이 가능한 기법을 제안한다. 이를 위해서 이동싱크들이 기존에 구축되어진 센서네트워크의 정지 싱크를 중심으로 클러스터링 되고 해당 정지 싱크를 이용하여 상황정보 수집이 가능하도록 하였다. 기존에 모바일 싱크를 위해 제안되었던 TTDD 라우팅 프로토콜과 비교하여 수학적 분석을 통해, 이동싱크의 수가 많아지거나 이동싱크의 이동횟수가 많아 질수록 더 우수한 성능을 보임을 확인하였다

센위버 플랫폼 기반의 다중센서 협업을 이용한 모니터링 시스템 개발 (Development of a Monitoring System Based on the Cooperation of Multiple Sensors on SenWeaver Platform)

  • 권차욱;차경애
    • 한국산업정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.91-98
    • /
    • 2010
  • 본 논문에서는 센서네트워크시스템에서 다양한 센서 정보를 협업시켜 주변 환경을 효율적으로 감시하는 모니터링 시스템을 제안한다. 제안한 모니터링 시스템은 카메라, 이동체 및 인체 감지센서를 설치하여 예외시간에 내부 공간으로 침입하는 침입자를 감지하기 위한 목적으로 구현이 되었다. 본 논문에서 제안한 시스템은 센위버 플랫폼 상에서 개발되었으며, 실험한 결과, 다중 센서 정보의 상호보완적 활용으로 보다 효율적인 환경을 감시가 가능함을 알 수 있었다. 또한 센위버 플랫폼의 사용으로 센서 네트워크 구성이 용이하며 다양한 센서의 추가적 설치 및 활용이 가능하다. 또한 영상정보의 분석으로 움직이는 객체에 대한 판별이 가능하게 되어 센서의 동작을 단계적으로 적용시키는 체계적인 모니터링시스템의 구현이 가능함을 보였다.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계 (A Design of Industrial Safety Service using LoRa Gateway Networks)

  • 장문수
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.313-316
    • /
    • 2021
  • 사물인터넷 환경에서는 기본적으로 사물에서 발생되는 데이터를 수집하기 위하여 네트워크 구성이 필수적이다. 다양한 통신 방식으로 사물의 데이터를 처리하고 있으며, 주로 블루투스, WiFi와 같은 무선 통신 방식을 주로 사용하지만, 데이터 서버에 다양한 센서 데이터를 전달하기 위해 유선/무선 통신을 혼합해서 사용하는 경우도 있다. 사물의 데이터를 수집하려면, 센서나 엣지 장치에서 발생되는 센서 데이터를 실시간으로 수집하기 위해 통신 모듈이 탑재되어야 한다. 그리고 데이터베이스로 데이터를 전달하기 위하여 소프트웨어 아키텍처가 구성되어야 한다. 센서에서 발생된 데이터를 실시간으로 데이터 베이스에 저장하고 관리할 수 있으며, 산업안전에 필요한 데이터를 추출하여 산업안전서비스 응용에 활용할 수 있다. 본 논문에서는 사물 데이터 수집을 위하여 LoRa 게이트웨이를 활용하여 네트워크 환경을 구성하였으며, LoRa 모듈로부터 전달되는 사물 데이터를 수집하기 위하여 클라이언트/서버 방식의 데이터 수집 모델을 설계하였다. 데이터 수집과 저장 관리에 필요한 자원을 데이터 누수 없이 확보하기 위하여 실시간으로 데이터 수집이 가능해야 하며, 응용서비스로는 산업안전에 필요한 위치데이터 등을 실시간으로 데이터베이스에 저장 관리할 수 있도록 설계하였다.

  • PDF

'월패드'의 보안 취약 원인에 관한 고찰 (A Study on the Causes of Security Vulnerability in 'Wall Pads')

  • 김상춘;전정훈
    • 융합보안논문지
    • /
    • 제22권2호
    • /
    • pp.59-66
    • /
    • 2022
  • 최근 스마트 홈(smart home) 기술은 홈 오토메이션(home automation)의 편리함으로 큰 호응을 얻으며 발전하고 있다. 특히 스마트 홈은 홈 네트워크(home network)에 여러 IoT(Internet of Things) 및 센서들을 유·무선 네트워크로 연결하여 다양한 서비스를 제공하고 있다. 그리고 스마트 홈 서비스는 월패드(wall pad)를 통해 조명이나 에너지, 환경, 도어 카메라 등을 쉽고 편리하게 제어하고 있다. 그러나 최근 월패드의 해킹사고로 인해 사회적 이슈가 되고 있는 가운데, 개인정보의 유출 및 사생활 침해가 예상된다. 이에 월패드 보안에 대한 실질적인 예방과 대응책 마련이 필요한 실정이다. 따라서 본 연구에서는 월패드와 관련한 취약 원인을 고찰하고 대응 방안을 제안함으로써, 향후 스마트 홈의 대응 기술 개발에 기초 자료로 활용될 수 있을 것으로 기대한다.

PEDOT:PSS 및 PVDF 기반의 유-무기 열전 필름으로 제작된 플렉서블 열전 에너지 하베스터의 발전 성능 평가 (Evaluation of Output Performance of Flexible Thermoelectric Energy Harvester Made of Organic-Inorganic Thermoelectric Films Based on PEDOT:PSS and PVDF Matrix)

  • 나유진;박귀일
    • 한국재료학회지
    • /
    • 제33권7호
    • /
    • pp.295-301
    • /
    • 2023
  • Thermoelectric (TE) energy harvesting, which converts available thermal resources into electrical energy, is attracting significant attention, as it facilitates wireless and self-powered electronics. Recently, as demand for portable/wearable electronic devices and sensors increases, organic-inorganic TE films with polymeric matrix are being studied to realize flexible thermoelectric energy harvesters (f-TEHs). Here, we developed flexible organic-inorganic TE films with p-type Bi0.5Sb1.5Te3 powder and polymeric matrices such as poly(3,4-eethylenedioxythiophene):poly(styrene sulfonate) (PEDOT:PSS) and poly (vinylidene fluoride) (PVDF). The fabricated TE films with a PEDOT:PSS matrix and 1 wt% of multi-walled carbon nanotube (MWCNT) exhibited a power factor value of 3.96 µW·m-1·K-2 which is about 2.8 times higher than that of PVDF-based TE film. We also fabricated f-TEHs using both types of TE films and investigated the TE output performance. The f-TEH made of PEDOT:PSS-based TE films harvested the maximum load voltage of 3.4 mV, with a load current of 17.4 µA, and output power of 15.7 nW at a temperature difference of 25 K, whereas the f-TEH with PVDF-based TE films generated values of 0.6 mV, 3.3 µA, and 0.54 nW. This study will broaden the fields of the research on methods to improve TE efficiency and the development of flexible organic-inorganic TE films and f-TEH.

해양기상부표의 센서 데이터 품질 향상을 위한 프레임워크 개발 (Development of a Framework for Improvement of Sensor Data Quality from Weather Buoys)

  • 이주용;이재영;이지우;신상문;장준혁;한준희
    • 산업경영시스템학회지
    • /
    • 제46권3호
    • /
    • pp.186-197
    • /
    • 2023
  • In this study, we focus on the improvement of data quality transmitted from a weather buoy that guides a route of ships. The buoy has an Internet-of-Thing (IoT) including sensors to collect meteorological data and the buoy's status, and it also has a wireless communication device to send them to the central database in a ground control center and ships nearby. The time interval of data collected by the sensor is irregular, and fault data is often detected. Therefore, this study provides a framework to improve data quality using machine learning models. The normal data pattern is trained by machine learning models, and the trained models detect the fault data from the collected data set of the sensor and adjust them. For determining fault data, interquartile range (IQR) removes the value outside the outlier, and an NGBoost algorithm removes the data above the upper bound and below the lower bound. The removed data is interpolated using NGBoost or long-short term memory (LSTM) algorithm. The performance of the suggested process is evaluated by actual weather buoy data from Korea to improve the quality of 'AIR_TEMPERATURE' data by using other data from the same buoy. The performance of our proposed framework has been validated through computational experiments based on real-world data, confirming its suitability for practical applications in real-world scenarios.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Indoor Positioning Technology Integrating Pedestrian Dead Reckoning and WiFi Fingerprinting Based on EKF with Adaptive Error Covariance

  • Eui Yeon Cho;Jae Uk Kwon;Myeong Seok Chae;Seong Yun Cho;JaeJun Yoo;SeongHun Seo
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권3호
    • /
    • pp.271-280
    • /
    • 2023
  • Pedestrian Dead Reckoning (PDR) methods using initial sensors are being studied to provide the location information of smart device users in indoor environments where satellite signals are not available. PDR can continuously estimate the location of a pedestrian regardless of the walking environment, but has the disadvantage of accumulating errors over time. Unlike this, WiFi signal-based wireless positioning technology does not accumulate errors over time, but can provide positioning information only where infrastructure is installed. It also shows different positioning performance depending on the environment. In this paper, an integrated positioning technology integrating two positioning techniques with different error characteristics is proposed. A technique for correcting the error of PDR was designed by using the location information obtained through WiFi Measurement-based fingerprinting as the measurement of Extended Kalman Filte (EKF). Here, a technique is used to variably calculate the error covariance of the filter measurements using the WiFi Fingerprinting DB and apply it to the filter. The performance of the proposed positioning technology is verified through an experiment. The error characteristics of the PDR and WiFi Fingerprinting techniques are analyzed through the experimental results. In addition, it is confirmed that the PDR error is effectively compensated by adaptively utilizing the WiFi signal to the environment through the EKF to which the adaptive error covariance proposed in this paper is applied.