• Title/Summary/Keyword: Wireless-power communication networks

Search Result 419, Processing Time 0.031 seconds

A Study on the Development of Zigbee Wireless Image Transmission and Monitoring System (지그비 무선 이미지 전송 및 모니터링 시스템 개발에 대한 연구)

  • Roh, Jae-sung;Kim, Sang-il;Oh, Kyu-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.631-634
    • /
    • 2009
  • Recent advances in wireless communication, electronics, MEMS device, sensor and battery technology have made it possible to manufacture low-cost, low-power, multi-function tiny sensor nodes. A large number of tiny sensor nodes form sensor network through wireless communication. Sensor networks represent a significant improvement over traditional sensors, research on Zigbee wireless image transmission has been a topic in industrial and scientific fields. In this paper, we design a Zigbee wireless image sensor node and multimedia monitoring server system. It consists of embedded processor, memory, CMOS image sensor, image acquisition and processing unit, Zigbee RF module, power supply unit and remote monitoring server system. In the future, we will further improve our Zigbee wireless image sensor node and monitoring server system. Besides, energy-efficient Zigbee wireless image transmission protocol and interworking with mobile network will be our work focus.

  • PDF

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem

  • Gupta, Daya;De, Asok;Chatterjee, Kakali
    • Journal of Information Processing Systems
    • /
    • v.8 no.1
    • /
    • pp.145-158
    • /
    • 2012
  • Hyperelliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. We can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA due to the algebraic structure of Hyperelliptic Curve. This paper explores various possible attacks to the discrete logarithm in the Jacobian of a Hyperelliptic Curve (HEC) and addition and doubling of the divisor using explicit formula to speed up the scalar multiplication. Our aim is to develop a cryptosystem that can sign and authenticate documents and encrypt / decrypt messages efficiently for constrained devices in wireless networks. The performance of our proposed cryptosystem is comparable with that of ECC and the security analysis shows that it can resist the major attacks in wireless networks.

Performance Evaluation of a New Cooperative MAC Protocol with a Helper Node Selection Scheme in Ad Hoc Networks

  • Jang, Jaeshin
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.199-207
    • /
    • 2014
  • A new cooperative MAC protocol called the busy tone cooperative medium access control (BT-COMAC) protocol is proposed to overcome the drawbacks and maximize the advantages of existing schemes. This scheme uses a new metric called decibel power to decide an appropriate helper node. Using received power strength is more efficient in selecting an appropriate helper node, especially in a densely populated network, than the effective transmission rates used in conventional schemes. All communication nodes in a communication service area are assumed to move independently. Two performance metrics are used: System throughput and channel access delay. A performance evaluation of the BT-COMAC protocol is conducted using a computer simulation over a slow fading wireless channel, and its performance results are compared with those of four existing schemes. The numerical results show that the BT-COMAC protocol improves the system throughput by approximately 15% as compared to the best existing scheme.

Implementation of IEEE 802.15.4 Protocol Stack on the Texas Instrument CC2530 (텍사스 인스트루먼트의 CC2530 상에 IEEE 802.15.4 프로토콜 스택 구현)

  • Kim, Byung-Soon
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.353-358
    • /
    • 2012
  • Wireless sensor networks consist of resource constraint devices which typically send data measured by sensors attached to the end devices towards a coordinator. The most often used medium access control protocol used in wireless sensor networks is the standard IEEE 802.15.4, where it is wireless standard introduced for low power, low cost wireless communication with moderate data rates. In this paper, we present implementation of both the IEEE 802.15.4 protocol stack and UART interface on the TI CC2530. We show that data via UART of our implemented IEEE 802.15.4 board are transmitted correctly in terms of captured frames.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Rapid-to-deploy reconfigurable wireless structural monitoring systems using extended-range wireless sensors

  • Kim, Junhee;Swartz, R. Andrew;Lynch, Jerome P.;Lee, Jong-Jae;Lee, Chang-Geun
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.505-524
    • /
    • 2010
  • Wireless structural monitoring systems consist of networks of wireless sensors installed to record the loading environment and corresponding response of large-scale civil structures. Wireless monitoring systems are desirable because they eliminate the need for costly and labor intensive installation of coaxial wiring in a structure. However, another advantageous characteristic of wireless sensors is their installation modularity. For example, wireless sensors can be easily and rapidly removed and reinstalled in new locations on a structure if the need arises. In this study, the reconfiguration of a rapid-to-deploy wireless structural monitoring system is proposed for monitoring short- and medium-span highway bridges. Narada wireless sensor nodes using power amplified radios are adopted to achieve long communication ranges. A network of twenty Narada wireless sensors is installed on the Yeondae Bridge (Korea) to measure the global response of the bridge to controlled truck loadings. To attain acceleration measurements in a large number of locations on the bridge, the wireless monitoring system is installed three times, with each installation concentrating sensors in one localized area of the bridge. Analysis of measurement data after installation of the three monitoring system configurations leads to reliable estimation of the bridge modal properties, including mode shapes.

Joint Uplink and Downlink Resource Allocation in Data and Energy Integrated Communication Networks

  • Yu, Qin;Lv, Kesi;Hu, Jie;Yang, Kun;Hong, Xuemin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3012-3028
    • /
    • 2017
  • In this paper, we propose a joint power control strategy for both the uplink and downlink transmission by considering the energy requirements of the user equipments' uplink data transmissions in data and energy integrated communication networks (DEINs). In DEINs, the base station (BS) adopts the power splitting (PS) aided simultaneous wireless information and power transfer (SWIPT) technique in the downlink (DL) transmissions, while the user equipments (UEs) carry out their own uplink (UL) transmissions by exploiting the energy harvested during the BS's DL transmissions. In our DEIN model, there are M UEs served by the BS in order to fulfil both of their DL and UL transmissions. The orthogonal frequency division multiple access (OFDMA) technique is adopted for supporting the simultaneous transmissions of multiple UEs. Furthermore, a transmission frame is divided into N time slots in the medium access control (MAC) layer. The mathematical model is established for maximizing the sum-throughput of the UEs' DL transmissions and for ensuring their fairness during a single transmission frame T, respectively. In order to achieve these goals, in each transmission frame T, we optimally allocate the BS's power for each subcarrier and the PS factor for each UE during a specific time slot. The original optimisation problems are transformed into convex forms, which can be perfectly solved by convex optimisation theories. Our numerical results compare the optimal results by conceiving the objective of maximising the sum-throughput and those by conceiving the objective of maximising the fair-throughput. Furthermore, our numerical results also reveal the inherent tradeoff between the DL and the UL transmissions.

A Low Power Lifelog Management Scheme Based on User Movement Behaviors in Wireless Networks (무선 네트워크 환경에서 사용자 이동행위 기반 저전력 라이프로그 관리기법)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.157-165
    • /
    • 2015
  • With the ever-improving performance of smartphone cameras and the universal dissemination of cloud services, users can now record and store the events in their daily lives more easily and conveniently. The advent of lifelogging technology has been changing the uses as well as the paradigm of internet services, and emphasizing the importance of services being personalization. As the amount of lifelog data becomes vast, it requires an efficient way to manage and store such vast information. In this paper, we propose an low power lifelog management scheme based on user movement behaviors in wireless networks. In order to reduce the power consumption of a smartphone, in our proposal, frequency of data collection and transfer can be dynamically adjusted based on a user's movement pattern. The analytical results show that our approach achieves better performance than that of the existing lifelog management scheme.

Joint User Scheduling and Power Control Considering Both Signal and Interference for Multi-Cell Networks (다중 셀 상향링크 네트워크에서 신호와 간섭을 동시에 고려하는 전력 제어 및 사용자 스케쥴링)

  • Cho, Moon-Je;Jung, Bang Chul;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.477-483
    • /
    • 2016
  • In this paper, we propose a distributed user scheduling with interference-aware power control (IAPC) to maximize signal to generating interference plus noise ratio (SGINR) in uplink multi-cell networks. Assuming that the channel reciprocity time-division duplexing (TDD) system is used, the channel state information (CSI) can be obtained at each user from pilot signals from other BSs. In the proposed scheduling, to be specific, each user reduces the transmit power if its generating interference to other BSs is larger than a predetermined threshold. Each BS selects the user with the largest SGINR among users. Simulation results show that the proposed technique significantly outperforms the existing user scheduling algorithms. It is worth noting that the proposed technique operates with distributed manner without information exchange among cells. Hence, it can be easily applied to the practical wireless systems like 3GPP LTE without significant modifications of the specification.

On Generating Backbone Based on Energy and Connectivity for WSNs (무선 센서네트워크에서 노드의 에너지와 연결성을 고려한 클러스터 기반의 백본 생성 알고리즘)

  • Shin, In-Young;Kim, Moon-Seong;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.41-47
    • /
    • 2009
  • Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless sensor networks. However, the backbone nodes will need extra functionality and therefore consume more energy compared to the other nodes. The power consumption imbalance among sensor nodes may cause a network partition and failures where the transmission from some sensors to the sink node could be blocked. Hence optimal construction of the backbone is one of the pivotal problems in sensor network applications and can drastically affect the network's communication energy dissipation. In this paper a distributed algorithm is proposed to generate backbone trees through robust multi-hop clusters in wireless sensor networks. The main objective is to form a properly designed backbone through multi-hop clusters by considering energy level and degree of each node. Our improved cluster head selection method ensures that energy is consumed evenly among the nodes in the network, thereby increasing the network lifetime. Comprehensive computer simulations have indicated that the newly proposed scheme gives approximately 10.36% and 24.05% improvements in the performances related to the residual energy level and the degree of the cluster heads respectively and also prolongs the network lifetime.

  • PDF