• Title/Summary/Keyword: node deployment

Search Result 147, Processing Time 0.022 seconds

A Multi-path QoS Routing Protocol for the OFDM-TDMA Mesh Networks (OFDM-TDMA 메쉬 네트워크를 위한 다중경로 QoS 라우팅 프로토콜)

  • Choi, Jungwook;Lee, Hyukjoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.1
    • /
    • pp.57-67
    • /
    • 2015
  • A large amount of work has been done in the areas of routing, MAC, QoS, capacity, location service, cooperative communication, fault tolerance, mobility models and various applications of mesh networks thanks to their merits of cost-effective way of deployment and flexibility in extending wireline services. Although multi-path routing protocols have been proposed to be used to provide QoS and fault-tolerance, there has not been any significant results discussed that support both in the literature to our best knowledge as they are often required in military and public safety applications. In this paper, we present a novel routing protocol for a mesh network based on the OFDM-TDMA collision-free MAC that discovers and maintains multiple paths that allows retransmitting and forwarding packets that have been blocked due to a link failure using an alternative next-hop node such that the delay-capacity tradeoff is reduced and the reliability is enhanced. Simulation results show that the proposed protocol performs well in terms of both the QoS and delivery ratio.

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks (무선 센서 네트워크에서 행위 기반 공격 탐지를 위한 감시 노드의 연결성과 일반 노드의 커버리지 분석)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.27-34
    • /
    • 2013
  • In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.

Real-Time Soil Humidity Monitoring Based on Sensor Network Using IoT (IoT를 사용한 센서 네트워크 기반의 실시간 토양 습도 모니터링)

  • Kim, Kyeong Heon;Kim, Hee-Dong
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.5
    • /
    • pp.459-465
    • /
    • 2022
  • This paper reports a method to use a wireless sensor network deployed in the field to real-time monitor soil moisture, warning when the moisture level reaches a specific value, and wirelessly controlling an additional device (LED or water supply system, etc.). In addition, we report all processes related to wireless irrigation system, including field deployment of sensors, real-time monitoring using a smartphone, data calibration, and control of additional devices deployed in the field by smartphone. A commercially available open-source Internet of Things (IoT) platform, NodeMCU, was used, which was combined with a 9V battery, LED and soil humidity sensor to be integrated into a portable prototype. The IoT-based soil humidity sensor prototype deployed in the field was installed next to a tree for on-site demonstration for the measurement of soil humidity in real-time for about 30 hours, and the measured data was successfully transmitted to a smartphone via Wifi. The measurement data were automatically transmitted via e-mail in the form of a text file, stored on the web, followed by analyses and calibrations. The user can check the humidity of the soil real-time through a personal smartphone. When the humidity of a soil reached a specific value, an additional device, an LED device, placed in the field was successfully controlled through the smartphone. This LED can be easily replaced by other electronic devices such as water supplies, which can also be controlled by smartphones. These results show that farmers can not only monitor the condition of the field real-time through a sensor monitoring system manufactured simply at a low cost but also control additional devices such as irrigation facilities from a distance, thereby reducing unnecessary energy consumption and helping improve agricultural productivity.

A Mesh Router Placement Scheme for Minimizing Interference in Indoor Wireless Mesh Networks (실내 무선 메쉬 네트워크에서의 간섭 최소화를 위한 메쉬 라우터 배치 기법)

  • Lee, Sang-Hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.421-426
    • /
    • 2010
  • Due to the ease of deployment and the extended coverage, wireless mesh networks (WMNs) are gaining popularity and research focus. For example, the routing protocols that enhance the throughput on the WMNs and the link quality measurement schemes are among the popular research topics. However, most of these works assume that the locations of the mesh routers are predetermined. Since the operators in an Indoor mesh network can determine the locations of the mesh routers by themselves, it is essential to the WMN performance for the mesh routers to be initially placed by considering the performance issues. In this paper, we propose a mesh router placement scheme based on genetic algorithms by considering the characteristics of WMNs such as interference and topology. There have been many related works that solve similar problems such as base station placement in cellular networks and gateway node selection in WMNs. However, none of them actually considers the interference to the mesh clients from non-associated mesh routers in determining the locations of the mesh routers. By simulations, we show that the proposed scheme improves the performance by 30-40% compared to the random selection scheme.

Experimental Design of AODV Routing Protocol with Maximum Life Time (최대 수명을 갖는 AODV 라우팅 프로토콜 실험 설계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.29-45
    • /
    • 2017
  • Ad hoc sensor network is characterized by decentralized structure and ad hoc deployment. Sensor networks have all basic features of ad hoc network except different degrees such as lower mobility and more stringent energy requirements. Existing protocols provide different tradeoffs among some desirable characteristics such as fault tolerance, distributed computation, robustness, scalability and reliability. wireless protocols suggested so far are very limited, generally focusing on communication to a single base station or on aggregating sensor data. The main reason having such restrictions is due to maximum lifetime to maintain network activities. The network lifetime is an important design metric in ad hoc networks. Since every node does a router role, it is not possible for other nodes to communicate with each other if some nodes do not work due to energy lack. In this paper, we suggest an experimental ad-hoc on-demand distance vector routing protocol to optimize the communication of energy of the network nodes.The load distribution avoids the choice of exhausted nodes at the route selection phase, thus balances the use of energy among nodes and maximizing the network lifetime. In transmission control phase, there is a balance between the choice of a high transmission power that lead to increase in the range of signal transmission thus reducing the number of hops and lower power levels that reduces the interference on the expense of network connectivity.

A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds (VANET 기반 클라우드 환경에서 안전과 프라이버시를 고려한 경로추적 및 철회 기법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.795-807
    • /
    • 2014
  • Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towards the deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-based clouds due to the advancements in the automobile and communication technologies. Security and privacy have always been the challenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues are orthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specific VANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.

Visibility Analysis of Iridium Communication for SNIPE Nano-Satellite (SNIPE 초소형위성용 Iridium 통신 모듈의 가시성 분석)

  • Cho, Dong-Hyun;Kim, Hongrae;Kim, Hae-Dong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.2
    • /
    • pp.127-135
    • /
    • 2022
  • Compared to the continuous increase of domestic nano-satellite development cases, the initial communication success rate is relatively low. In a situation where communication cases of LEO satellites using commercial satellite communication networks are increasing recently. In this situation, the SNIPE project developed by the KASI(Korea Astronomy and Space Science Institute), KARI(Korea Aerospace Research Institute), and Yonsei University apply an Iridium module for communication test to the SNIPE nano-satellites. Therefore, in this paper, the visibility analysis of the iridium module on the SNIPE satellite was analyzed under considering the orbital and communication environment of the iridium satellite constellation and the attitude control mode. In the case of LEO satellites, the communication possibility was limited due to the relatively small iridium communication coverage for high altitude and the high doppler shift considered in the iridium communication network. For this reason, in this paper, it could be simulated that there was a more performance difference according to the difference in relative RAAN(Right Ascension of Ascending Node) angle with the Iridium constellation. Finally, by checking the visibility of communication module under the tumbling situation that occurred during the initial deployment of the nano-satellite, the possibility of using the iridium communication technology was analyzed.