• Title/Summary/Keyword: Wireless-power communication networks

Search Result 419, Processing Time 0.024 seconds

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

A New Physical Layer Transmission Scheme for LPI and High Throughput in the Cooperative SC-FDMA System

  • Li, Yingshan;Wu, Chao;Sun, Dongyan;Xia, Junli;Ryu, Heung-Gyoon
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.457-463
    • /
    • 2013
  • In recent days, cooperative diversity and communication security become important research issues for wireless communications. In this paper, to achieve low probability of interception (LPI) and high throughput in the cooperative single-carrier frequency division multiple access (SC-FDMA) system, a new physical layer transmission scheme is proposed, where a new encryption algorithm is applied and adaptive modulation is further considered based on channel state information (CSI). By doing so, neither relay node nor eavesdropper can intercept the information signals transmitted from user terminal (UT). Simulation results show above new physical layer transmission scheme brings in high transmission safety and secrecy rate. Furthermore, by applying adaptive modulation and coding (AMC) technique according to CSI, transmission throughput can be increased significantly. Additionally, low peak-to-average power ratio (PAPR) characteristic can still be remained due to the uniform distribution of random coefficients used for encryption algorithm.

A Study on a Visible Light Communication using LED in Under-water Environment (LED조명을 이용한 수중환경에서의 VLC 연구)

  • Jung, Hui-Sok;Yang, Yeon-Mo;Huh, Kyung-Moo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.5
    • /
    • pp.1-6
    • /
    • 2011
  • LED(Light Emitting Diode) components have advantages of longer lifetime, lower power consumption and easy-to-control, compare to normal lamp and fluorescent light, according to the development of recent technologies. Thus, lots of illuminations which utilize LED components could be used. Recently, Visible Light Communication(VLC) which is a part of communication technologies, utilizing high speed response characteristic of LED components, started receiving public attention. In case of VLC, there is no need of frequency allocation due to no use of radio, but also no interference exists during data transmission, much different in ISM((Industrial Scientific Medical band). This is the reason why a lot of research results about VLC are becoming issued. In this paper, a survey of feasibility for using VLC utilizing an original LED illumination for underwater applications has been done and a primitive possibility of its application has been examined.

Heterogeneous Interface Decision Engine and Architecture for Constructing Low Power Home Networks (저전력의 홈 네트워크 구축을 위한 이기종 인터페이스 결정 엔진 및 아키텍처)

  • Bae, Puleum;Jo, Yeong-Myeong;Moon, Eui-Kyum;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.313-324
    • /
    • 2015
  • In this paper, in order to support the construction of a smart home environment of low power consumption, we propose a heterogeneous interface determination engine and architecture. Technology of "smart home" is in the spotlight according to the development of IT technology nowadays. Smart homes are configured with multiple sub-networks, and each sub-network is formed by the smart devices using various communication interfaces. Thus, in the smart home environment, interlocking technology between heterogeneous interfaces is essentially required for supporting communication between different networks. Further, each communication interface is a difference in power consumption, and home smart devices are often operated in 24 hours, especially smart phones and other wireless devices are sensitive to power consumption. Therefore, in order to build a energy efficient home network, It is important to select the appropriate interface to handle traffic depending on the situation. In this paper, we propose "The Heterogeneous Interface Decision Engine and Architecture for constructing of Low Power Home Network," and analyze the performance of the proposed method and verify the validity through experiments on the test bed.

An Efficient Power Allocation Algorithm in OFDM-based Wireless Sensor Networks using Reserve Power (OFDM 기반 무선 센서 네트워크에서의 Reserve Power를 이용한 효율적인 파워 할당 알고리즘)

  • Kim, Byung-Ho;Oh, Seoung-Youl;Kim, Chee-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1251-1258
    • /
    • 2010
  • Orthogonal Frequency Division Multiplexing (OFDM) has been investigated as promising technology for future broadband communication. In this paper, we propose a power allocation algorithm for a frequency selective fading channel. However, many investigated algorithms that perform high computation overhead are not appropriate for sensor network systems due to hardware limitations. The proposed algorithm significantly reduces computational overhead and satisfies the power budget. Throughput of the algorithm is comparable to the optimum solution. Simulation results support the claim stated.

Design of Border Surveillance and Control System Based on Wireless Sensor Network (WSN 기반 국경 감시 및 제어 시스템 설계)

  • Hwang, Bo Ram;An, Sun Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.11-14
    • /
    • 2015
  • WSN (Wireless Sensor Network) based on low-power is one of the core technologies in the ubiquitous society. In this paper, we present a border surveillance and control system in WSN environment. The system consists of static sensor node, mobile sensor node, static gateway, mobile gateway, server and mobile application. Mobile applications are divided into user mode and manager mode. So users monitor border surveillance through mobile phone and get information of border network environment without time and space constraints. In manager mode, for the flexible operation of nodes, manager can update to the software remotely and adjust the position of the mobile node. And also we implement a suitable multi-hop routing protocol for scalable low-power sensor nodes and confirm that the system operates well in WSN environment.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Solar-CTP : An Enhanced CTP for Solar-Powered Wireless Sensor Networks Using a Mobile Sink (Solar-CTP : 모바일 싱크 기반 태양 에너지 수집형 무선 센서 네트워크를 위한 향상된 CTP)

  • Cheong, Seok Hyun;Kang, Minjae;Noh, Dong Kun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.4
    • /
    • pp.77-82
    • /
    • 2020
  • Wireless sensor networks (WSNs) suffer from not only a short lifetime due to limited energy but also an energy imbalance between nodes close to the sink and others. In order to fundamentally solve the short lifetime, recent studies utilize the environmental energy such as solar power. Additionally, WSNs using mobile sinks are being studied to address the energy imbalance problem. This paper proposes an improved CTP (Collection Tree Protocol) scheme which uses these two approaches simultaneously. Basically, it is based on a CTP scheme which is a very popular data collection strategy designed for the typical battery-based WSNs with a fixed sink. Therefore, we tailored it for solar-powered WSNs with a mobile sink. Performance verification confirms that our scheme reduces the number of blackout nodes significantly compared to the typical CTP, thus increases the amount of data collected by the sink.

A Delta-based Data Aggregation Scheme for Enhancing the Correctness of Data Aggregation in Wireless Sensor Networks (무선 센서 네트워크에서 데이터 수집의 정확성 향상을 위한 Delta 기반의 데이터 병합기법)

  • Kim, Byun-Gon;Yu, Tae-Young;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.840-845
    • /
    • 2007
  • In a wireless sensor network, a middleware used to support efficient processing and fast delivering of sensing data should handle the data loss problem at an intermediate sensor node caused by unexpected sudden data burst. In his paper, it proposes a Delta-Average method for enhancing the efficiency of data aggregation and correctness where the sensed data should be delivered only with the limited computing power and energy resource. With the proposed method, unnecessary data transfer of the duplicate data is eliminated and data correctness is enhanced by using the proposed averaging and data differentiating scheme when an instantaneous data burst is occurred. Finally, with the TOSSTM simulation results on TinyDB, we verify that the correctness of the transferred data is enhanced.

Design Study for Power Integrity in Mobile Devices (모바일 기기의 전원 무결성을 위한 설계 연구)

  • Sa, Gi-Dong;Lim, Yeong-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.927-934
    • /
    • 2019
  • Recently, mobile devices have evolved into small computers with various functions according to user requirements. Careful attention must be paid to the design of the power supply network for the stable operation of the application processor (AP), the wireless communication modem, the high performance camera, and the various interfaces of the mobile device to implement various functions of the mobile device. In this paper, we analyzed and verified the method of optimizing the design parameters such as the position, capacity, and number of decoupling capacitors to meet the target impedance required by the driver IC chip to ensure the stability of the power supply network of mobile devices that should be designed as wiring type due to mounting density limitation. The proposed wired power supply network design method can be applied to various applications including high-speed signal transmission line in addition to mobile applications.