• Title/Summary/Keyword: Wireless-power communication networks

Search Result 419, Processing Time 0.024 seconds

A Study on the Effective WTLS System Implementation using Low-Computation (낮은 계산량을 이용한 효율적인 WTLS 시스템 구현에 관한 연구)

  • 정우열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.138-143
    • /
    • 2003
  • With information communications and network environments merged wire/wireless networks are generalized. In this viewpoint, WAP is used by communication protocol for the data communication in the field of wireless environment. WTLS developed for the secure communications optimize TLS adapted wireless environment in the TCP/IP internet protocol. But WTLS denote WAP security problem, end-to-end problem, and power consumption, etc. Therefore in this paper we proposed WTLS cryptographic algorithm eliminated WTLS disadvantages. Proposed algorithm solved power consumption, calculated complexity, and security problems because it is not unique but hybrid form.

  • PDF

A Transmit Power Control Method for Low-Power Communication in 802.11b Infrastructure Networks (IEEE 802.11b Infrastructure 환경에서 저전력 통신을 위한 전송 전력 제어 기법)

  • Kwon Do Han;Jung Hee Lock;Park Chang Yun;Jung Chung ll
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.180-189
    • /
    • 2005
  • This paper describes a transmission power control method for power saving in 802.11b wireless LANs. We have first explored how much effects reducing transmission power has on communication performance. Then we propose a power control algorithm, whose approach is similar to that of TCP congestion control, determining an appropriate transmission power level by monitoring the retransmission rate. We have implemented an utility software on a Linux-based system and made several experiments to validate the proposed method. The results show that it is possible to save energy consumption by controlling transmission power without sacrificing communication performance.

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.676-682
    • /
    • 2011
  • Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.

Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access

  • Xu, Ding;Feng, Zhiyong;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1777-1791
    • /
    • 2012
  • This paper considers a downlink cognitive radio (CR) network where one secondary user (SU) and one primary user (PU) share the same base station (BS). The spectrum of interest is divided into a set of independent, orthogonal subchannels. The communication of the PU is of high priority and the quality of service (QoS) is guaranteed by the minimum rate constraint. On the other hand, the communication of the SU is of low priority and the SU opportunistically accesses the subchannels that were previously discarded by the PU during power allocation. The BS assigns fractions ?? and 1 ?? of the total available transmit power to the PU and the SU respectively. Two power allocation schemes with opportunistic subchannel access are proposed, in which the optimal values of ??'s are also obtained. The objective of one scheme is to maximize the rate of the SU, and the objective of the other scheme is to maximize the sum rate of the SU and the PU, both under the PU minimum rate constraint and the total transmit power constraint. Extensive simulation results are obtained to verify the effectiveness of the proposed schemes.

PRESSURE BASED ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS: A SURVEY

  • Khasawneh, Ahmad;Bin Abd Latiff, Muhammad Shafie;Chizari, Hassan;Tariq, MoeenUddin;Bamatraf, Abdullah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.504-527
    • /
    • 2015
  • Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks. Nevertheless, there are different characteristics among them such as low battery power, limited bandwidth and high variable propagation delay. One of the common major problems in UWSNs is determining an efficient and reliable routing between the source node and the destination node. Therefore, researchers tend to design efficient protocols with consideration of the different characteristics of underwater communication. Furthermore, many routing protocols have been proposed and these protocols may be classified as location-based and location-free routing protocols. Pressure-based routing protocols are a subcategory of the location-free routing protocols. This paper focuses on reviewing the pressure-based routing protocols that may further be classified into non-void avoidance protocols and void avoidance protocols. Moreover, non-void avoidance protocols have been classified into single factor based and multi factor based routing protocols. Finally, this paper provides a comparison between these protocols based on their features, performance and simulation parameters and the paper concludes with some future works on which further study can be conducted.

Comparative Analysis of Routing Protocols for Wireless Sensor Networks (무선 센서 네트워크의 라우팅 프로토콜 비교 분석)

  • Gautam, Navin;Pyun, Jae-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.373-376
    • /
    • 2008
  • Wireless sensor networks consist of thousands of sensor nodes that have low power, low footprint and low computational capacities. So the burning issues in the design and deployment of these sensor nodes in the practical application areas include the energy conservation and network lifetime. Efficient routing schemes can help reduce the energy consumption and thus increase the network lifetime. This paper deals with the comparative analysis of popular routing protocols such as LEACH, LEACH-C, MTE, and PEGASIS. The protocols are compared by using performance me tries such as system lifetime, the time for first node death, and total system energy.

  • PDF

A Multi-hop Cooperative Transmission Protocol in Mobile Ad-hoc Wireless Networks (모바일 애드혹 무선 네트워크에서 멀티 홉 협력 전송 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.17-22
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol over Rayleigh fading channels. In the proposed protocol, the multi-hop cooperative transmission is used to improve the system performance. Due to broadcast nature, we do not limit the receiving node to be only the next node, but the destination and all the nodes between the transmitting node and the destination. The proposed protocol can hence save the average transmit power, compared with multi-hop direct transmission protocol due to the skipped transmissions from some intermediate nodes or chosen relays. The proposed scheme is implemented and evaluated in mobile ad-hoc wireless networks.

QoE-aware Energy Efficiency Maximization Based Joint User Access Selection and Power Allocation for Heterogeneous Network

  • Ji, Shiyu;Tang, Liangrui;Xu, Chen;Du, Shimo;Zhu, Jiajia;Hu, Hailin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4680-4697
    • /
    • 2017
  • In future, since the user experience plays a more and more important role in the development of today's communication systems, quality of experience (QoE) becomes a widely used metric, which reflects the subjective experience of end users for wireless service. In addition, the energy efficiency is an increasingly important problem with the explosive growth in the amount of wireless terminals and nodes. Hence, a QoE-aware energy efficiency maximization based joint user access selection and power allocation approach is proposed to solve the problem. We transform the joint allocation process to an optimization of energy efficiency by establishing an energy efficiency model, and then the optimization problem is solved by chaotic clone immune algorithm (CCIA). Numerical simulation results indicate that the proposed algorithm can efficiently and reliably improve the QoE and ensure high energy efficiency of networks.

Porting of Z-Stack and Implementation of UART on the TI CC2530 (TI CC2530 상의 Z-Stack 이식 및 UART 구현)

  • Kim, Byungsoon
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.525-530
    • /
    • 2012
  • Wireless sensor networks consist of resource constraint devices which typically send data measured by sensors attached to the end devices towards a coordinator. One of the best solution for wireless sensor networks is ZigBee, where it is wireless standard introduced for low power, low cost wireless communication with moderate data rates. In this paper, we present porting of Z-Stack and implementation of UART on the TI CC2530. We show that our implemented board works correctly in terms of transmitting and receiving data via serial port.

On the Interference of Ultra Wide Band Systems on Point to Point Links and Fixed Wireless Access Systems

  • Giuliano, Romeo;Guidoni, Gianluca;Mazzenga, Franco
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.163-172
    • /
    • 2004
  • Ultra Wide Bandwidth (UWB) spread-spectrum techniques will playa key role in short range wireless connectivity supporting high bit rates availability and low power consumption. UWB can be used in the design of wireless local and personal area networks providing advanced integrated multimedia services to nomadic users within hot-spot areas. Thus the assessment of the possible interference caused by UWB devices on already existing narrowband and wideband systems is fundamental to ensure nonconflicting coexistence and, therefore, to guarantee acceptance of UWB technology worldwide. In this paper, we study the coexistence issues between an indoor UWB-based system (hot-spot) and outdoor point to point (PP) links and Fixed Wireless Access (FWA) systems operating in the 3.5 - 5.0 GHz frequency range. We consider a realistic UWB master/slave system architecture and we show through computer simulation, that in all practical cases UWB system can coexist with PP and FWA without causing any dangerous interference.