• Title/Summary/Keyword: cluster-head

Search Result 430, Processing Time 0.026 seconds

QA-MAC: QoS-Aware MAC Protocol for Wireless Sensor Networks

  • Kim, Seong-Cheol;Park, Hyun-Joo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.223-227
    • /
    • 2010
  • In this paper, we present a QoS-aware MAC protocol (QA-MAC) for cluster based wireless sensor networks (WSNs). QA-MAC is a TDMA-based scheduling protocol that minimizes the energy consumption in multi-hop WSNs and provides Quality of Service (QoS). A dynamic scheduling algorithm according to the number of member nodes, node traffics, and traffic priorities is suggested. The selected cluster head allocates time slots for all member nodes in the first TDMA schedule period of each round. During the second schedule period in each round, the cluster head makes a schedule for all data transmission. The proposed QA-MAC (QoS-Aware MAC) could save energy, reduce transmission delay, and support QoS.

Improvement of CH selection of WSN Protocol

  • Lee, WooSuk;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.6 no.3
    • /
    • pp.53-58
    • /
    • 2017
  • A WSN (Wireless Sensor Network) is a network that is composed of wireless sensor nodes. There is no restriction on the place where it can be installed because it is composed wirelessly. Instead, sensor nodes have limited energy. Therefore, to use the network for a long time, energy consumption should be minimized. Several protocols have been proposed to minimize energy consumption, and the typical protocol is the LEACH protocol. The LEACH protocol is a cluster-based protocol that minimizes energy consumption by dividing the sensor field into clusters. Depending on how you organize the clusters of sensor field, network lifetimes may increase or decrease. In this paper, we will improve the network lifetime by improving the cluster head selection method in LEACH Protocol.

Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM (Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

Fuzzy Logic Approach to Zone-Based Stable Cluster Head Election Protocol-Enhanced for Wireless Sensor Networks

  • Mary, S.A. Sahaaya Arul;Gnanadurai, Jasmine Beulah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1692-1711
    • /
    • 2016
  • Energy is a scarce resource in wireless sensor networks (WSNs). A variety of clustering protocols for WSNs, such as the zone-based stable election protocol-enhanced (ZSEP-E), have been developed for energy optimization. The ZSEP-E is a heterogeneous zone-based clustering protocol that focuses on unbalanced energy consumption with parallel formation of clusters in zones and election of cluster heads (CHs). Most ZSEP-E research has assumed probabilistic election of CHs in the zones by considering the maximum residual energy of nodes. However, studies of the diverse CH election parameters are lacking. We investigated the performance of the ZSEP-E in such scenarios using a fuzzy logic approach based on three descriptors, i.e., energy, density, and the distance from the node to the base station. We proposed an efficient ZSEP-E scheme to adapt and elect CHs in zones using fuzzy variables and evaluated its performance for different energy levels in the zones.

Clustering Algorithm of Hierarchical Structures in Large-Scale Wireless Sensor and Actuator Networks

  • Quang, Pham Tran Anh;Kim, Dong-Seong
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.473-481
    • /
    • 2015
  • In this study, we propose a clustering algorithm to enhance the performance of wireless sensor and actuator networks (WSANs). In each cluster, a multi-level hierarchical structure can be applied to reduce energy consumption. In addition to the cluster head, some nodes can be selected as intermediate nodes (INs). Each IN manages a subcluster that includes its neighbors. INs aggregate data from members in its subcluster, then send them to the cluster head. The selection of intermediate nodes aiming to optimize energy consumption can be considered high computational complexity mixed-integer linear programming. Therefore, a heuristic lowest energy path searching algorithm is proposed to reduce computational time. Moreover, a channel assignment scheme for subclusters is proposed to minimize interference between neighboring subclusters, thereby increasing aggregated throughput. Simulation results confirm that the proposed scheme can prolong network lifetime in WSANs.

Analysis of Human Head Shapes in the United States

  • Lee, Jin-Hee;Hwang Shin, Su-Jeong;Istook, Cynthia L.
    • International Journal of Human Ecology
    • /
    • v.7 no.1
    • /
    • pp.77-83
    • /
    • 2006
  • The ability to customize garments for fit in the apparel industry is directly tied to the availability of comprehensive and accurate sets of anthropometrical data for each consumer. The data for apparel sizing systems is available from three major standard/ research organizations: ASTM (American Society for Testing and Materials), ISO (International Standard Organization), and NCHS (National Center for Health Statistics). However, these standards ignore various head shapes and are outdated for the development future head products. This creates a data gap an ever changing multi-cultural society such as the United Sates. Although major government and industry safety organizations recognize the importance of safety for head products, few studies were found to support their reasoning. The purpose of this study is to provide accurate head dimension data for developing safety head products by analyzing various head shapes in the United Sates which includes various ethnic backgrounds. This study was carried out on 105 males in the United States. Factor analysis, cluster analysis, Moreover, Duncan analysis were all used for analyzing various head shapes.

Analysis of Head shape of college students for the Headgears (두건류 제작을 위한 남성의 두부 형태 분석)

  • 이진희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.1
    • /
    • pp.182-188
    • /
    • 2004
  • The purpose of the study was to provide scientific and accurate data of head shape for men. This study was carried out on 214 men and Factor analysis, Cluster analysis, Duncan analysis with 15 variables were performed using the data. A 3D scanner was used for visual results of head shape. The results were as follows. First, through factor analysis of the variables, three factors were extracted upon factor scores. The first factor described thickness part, and second factor described width parts and the third factor described vertical length parts. Four clusters represented characteristics of men's head types. Type 1 had a larger head thickness, type 2 had a smaller thickness and smaller width. type 4 had a generally larger head. In the distribution of the four clusters, type 1 was distributed 34%. Type 4 was distributed 23%. According to the results, type 1 of the more thick and narrow head was dominant among head types of men.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Cluster Formation Scheme with Remaining Energy Level of Sensor Nodes in Wireless Sensor Networks (무선 센서 네트워크에서 잔여 에너지 레벨을 이용한 클러스터 형성 기법)

  • Jang, Kyung-Soo;Kangm, Jeong-Jin;Kouh, Hoon-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.49-54
    • /
    • 2009
  • Sensor nodes in wireless sensor networks operate in distributed environments with limited resources and sensing capabilities. Especially, a sensor node has a small energy. After the sensor nodes are distributed in some area, it is not accessible to the area. AIso, a battery of sensor node cannot change. One of the hot issues in wireless sensor networks maximizes the network lifetime through minimizing the energy dissipation of sensor nodes. In LEACH, the cluster head is elected based on a kind of probability method without considering remaining energy of sensor node. In this paper, we propose a cluster formation scheme that the network elect the node, which has higher energy level than average energy level of overall sensor network, as cluster head node. We show the superiority of our scheme through computer simulation.

  • PDF