Journal of information and communication convergence engineering, 2020
Speed enforcement is one of the major challenges in traffic safety. The increasing number of acci... more Speed enforcement is one of the major challenges in traffic safety. The increasing number of accidents and fatalities has led governments to respond by implementing an intelligent control system. For example, the Korean government implemented a speed camera system for maintaining road safety. However, many drivers still engage in speeding behavior in blackspot areas where speed cameras are not provided. Therefore, we propose a methodology to analyze the combined accident and speeding data to offer recommendations to maintain traffic safety. We investigate three factors: "section," "existing speed camera location," and "over speeding data." To interpret the results, we used the QGIS tool for visualizing the spatial distribution of the incidents. Finally, we provide four recommendations based on the three aforementioned factors: "investigate with experts," "no action," "install fixed speed cameras," and "deploy mobile speed cameras."
Journal of information and communication convergence engineering
In wireless sensor networks, sensor nodes are often deployed in large numbers in places that are ... more In wireless sensor networks, sensor nodes are often deployed in large numbers in places that are difficult for humans to access. However, the energy of the sensor node is limited. Therefore, one of the most important considerations when designing routing protocols in wireless sensor networks is minimizing the energy consumption of each sensor node. When the energy of a wireless sensor node is exhausted, the node can no longer be used. Various protocols are being designed to minimize energy consumption and maintain long-term network life. Therefore, we proposed KOCED, an optimal cluster K-means algorithm that considers the distances between cluster centers, nodes, and residual energies. I would like to perform a performance evaluation on the KOCED protocol. This is a study for energy efficiency and validation. The purpose of this study is to present performance evaluation factors by comparing the K-means algorithm and the K-medoids algorithm, one of the recently introduced machine learning techniques, with the KOCED protocol.
As blockchain technology has the potential to revolutionize trust models and business processes a... more As blockchain technology has the potential to revolutionize trust models and business processes across industries, applications are expected to be endless. However, this technology is still in the early stage, and the scalability caused by the accumulation of transaction data due to the increase of blocks is emerging as a serious problem. In this paper, we propose various alternatives to solve the scalability problem.
Replacing or recharging batteries in the sensor nodes of a wireless sensor network (WSN) is a sig... more Replacing or recharging batteries in the sensor nodes of a wireless sensor network (WSN) is a significant challenge. Therefore, efficient power utilization by sensors is a critical requirement, and it is closely related to the life span of the network. Once a sensor node consumes all its energy, it will no longer function properly. Therefore, various protocols have been proposed to minimize the energy consumption of sensors and thus prolong the network operation. Recently, clustering algorithms combined with artificial intelligence have been proposed for this purpose. In particular, various protocols employ the K-means clustering algorithm, which is a machine learning method. The number of clustering configurations required by the K-means clustering algorithm is greater than that required by the hierarchical algorithm. Further, the selection of the cluster heads considers only the residual energy of the nodes without accounting for the transmission distance to the base station. In terms of energy consumption, the residual energy of each node, the transmission distance, the cluster head location, and the central relative position within the cluster should be considered simultaneously. In this paper, we propose the KOCED (K-means with Optimal clustering for WSN considering Centrality, Energy, and Distance) protocol, which considers the residual energy of nodes as well as the distances to the central point of the cluster and the base station. A performance comparison shows that the KOCED protocol outperforms the LEACH protocol by 259% (223 rounds) for first node dead (FND) and 164% (280 rounds) with 80% alive nodes.
Plain film X-ray scanners are indispensable for medical diagnostics and clinical procedures. This... more Plain film X-ray scanners are indispensable for medical diagnostics and clinical procedures. This type of device typically produces two radiographic images of the human spine, including the anteroposterior and lateral views. However, these two photographs presented perspectives that were distinct. The proposed procedure consists of three fundamental steps. For automated cropping, the grayscale lumbar input image was initially projected vertically using its vertical pattern. Then, Delaunay triangulation was performed with the SURF features serving as the triangle nodes. The posture area of the vertebrae was calculated by utilizing the edge density of each node. The proposed method provided an automated estimation of the position of the human lumbar vertebrae, thereby decreasing the radiologist’s workload, computing time, and complexity in a variety of bone-clinical applications. Numerous applications can be supported by the results of the proposed method, including the segmentation o...
Container platforms ease the deployment of applications and respond to failures. The advantages o... more Container platforms ease the deployment of applications and respond to failures. The advantages of container platforms have promoted their use in information services. However, the use of container platforms is accompanied by associated security risks. For instance, malware uploaded by users can leak important information, and malicious operators can cause unauthorized modifications to important files to create service errors. These security threats degrade the quality of information services and reduce their reliability. To overcome these issues, important container files should be protected by file-access control functions. However, legacy file-access control techniques, such as umask and SecureOS, do not support container platforms. To address this problem, we propose a novel kernel-based architecture in this study to control access to container files. The proposed container file-access control architecture comprises three components. The functionality and performance of the prop...
International Journal of Control and Automation, 2015
The most important factor within the wireless sensor network is to have effective network usage a... more The most important factor within the wireless sensor network is to have effective network usage and increasing the lifetime of the individual nodes in order to operate the wireless network more efficiently. Many routing protocols have been developed for this purpose. One of these is the LEACH protocol presented by Wendi Heinzelman, which is especially well known as a simple and efficient clustering based routing protocol. However, because LEACH protocol in an irregular network results in a drop in efficiency of the total data throughput, the stability of the cluster is declined. Therefore, to increase the stability of the cluster head, this paper proposes a stochastic cluster head selection method for improving the LEACH protocol. To this end, it proposes a SH-LEACH(Stochastic Cluster Head Selection Method-LEACH) that it is combined with the HEED and LEACH protocol and the proposed algorithm is verified through the simulation.
Obfuscation and cryptography technologies are applied to malware to make the detection of malware... more Obfuscation and cryptography technologies are applied to malware to make the detection of malware through intrusion prevention systems (IPSs), intrusion detection systems (IDSs), and antiviruses difficult. To address this problem, the security requirements for post-detection and proper response are presented, with emphasis on the real-time file access monitoring function. However, current operating systems provide only file access control techniques, such as SELinux (version 2.6, Red Hat, Raleigh, NC, USA) and AppArmor (version 2.5, Immunix, Portland, OR, USA), to protect system files and do not provide real-time file access monitoring. Thus, the service manager or data owner cannot determine real-time unauthorized modification and leakage of important files by malware. In this paper, a structure to monitor user access to important files in real time is proposed. The proposed structure has five components, with a kernel module interrelated to the application process. With this struc...
Control and development systems such as air traffic control systems, road traffic systems, and Ko... more Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control 키워드 융합보안, 융합인증, 데이터 정규화, 통합관제 한국정보통신학회 2017 추계종합학술대회
Indonesian Journal of Electrical Engineering and Computer Science, 2019
A Wireless Sensor Network is a wirelessly configured Sensor Node with limited power such as a bat... more A Wireless Sensor Network is a wirelessly configured Sensor Node with limited power such as a battery. There are many Wireless Sensor Network Protocols to increase energy efficiency, among which LEACH Protocol and SEP are typical. The LEACH Protocol is mainly used for homogeneous sensor networks with the same initial energy, and SEP is used for heterogeneous sensor networks with different initial energies. In the case of SEP-E, another heterogeneous sensor with different initial energy is added. SEP and SEP-E provide a higher probability of Cluster Head election for node types with more energy than Normal Nodes. Since the current residual energy of the node is not confirmed, even if the energy is low, the Cluster Head may be elected because of the node type. In this paper, considering the residual energy of a node when a Cluster Head is elected, we increase the probability of electing a Cluster Head with more residual energy. Cluster Head consumes a lot of energy. A node with a lot ...
International Journal of Multimedia and Ubiquitous Engineering, 2016
In this paper, the ML-LEACH routing protocol for the improvement of the performance of in wireles... more In this paper, the ML-LEACH routing protocol for the improvement of the performance of in wireless sensor networks is studied. ML-LEACH is derived from LEACH routing protocols. ML-LEACH is a Multi-Hop Layer. ML-LEACH is proposed to compensate for a phenomenon that the energy consumption of the protocols of the sharp drop in the disadvantage of a wide sensor field of LEACH routing protocol. ML-LEACH routing protocol is set up in the environment in accordance with the specific number of Layer and a node in a wireless sensor network and its performance is compared. The simulation MATLAB is used to let derives the number of Layer and the number of cluster heads.
Since it is very difficult to replace or recharge the batteries of the sensor nodes in the wirele... more Since it is very difficult to replace or recharge the batteries of the sensor nodes in the wireless sensor network (WSN), efficient use of the batteries of the sensor nodes is a very important issue. This has a deep relationship with the lifetime of the network. If the node's energy is exhausted, the node is no longer available. If a certain number of nodes (50% or 80%) in a network consumes energy completely, the whole network will not work. Therefore, various protocols have been proposed to maintain the network for a long time by minimizing energy consumption. In recent years, a protocol using a K-means clustering algorithm, one of machine learning techniques, has been proposed. A KCED protocol is proposed in consideration of residual energy of a node, a cluster center, and a distance to a base station in order to improve a problem of a protocol using K-average gung zipper algorithm such as cluster center consideration.
Journal of the Korea Institute of Information and Communication Engineering, 2014
To minimize low latency and improve the processing speed of the stock trading system, various tec... more To minimize low latency and improve the processing speed of the stock trading system, various technologies have been introduced. However, expensive network equipment has limitation for improving speed of trading system. Also, it is true that there is not much advantage by introducing those kind of systems. In this paper, we propose a low-Latency SPT(Safe Proper Time) scheme for overcoming the stock trading system in a cloud. The proposed method minimizes the CPI in order to reduce the CPU overhead that is based on the understanding of the kernel. and this approach satisfies the data timeliness.
In case of APT attacks, the update server is being used as a means of dissemination, the update p... more In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.
Wireless body area networks (WBANs) are an important application in wireless sensor networks (WSN... more Wireless body area networks (WBANs) are an important application in wireless sensor networks (WSNs). Specifically, in healthcare monitoring systems, it is important to screen the patient’s biometric signals. For example, the elderlies’ vital signs, such as ECG (Electrocardiogram), blood pressure, heart rate, and blood glucose, can be used as measures of their well-being and are all critically important for remote elderly care in tracking their physical and cognitive capabilities. Therefore, WBANs require higher energy efficiency and data transmission. This paper proposes a cluster-based routing protocol which is suitable for WBANs while analyzing energy efficiency issue in data transmission. Considering the importance of sensor nodes in a specific environment for improving the network’s lifetime, the protocol based on the LEACH (low energy adaptive clustering hierarchy) algorithm is proposed. Due to its avoidance of long-distance transmission, the clustering technique is an efficien...
Journal of the Korea Institute of Information and Communication Engineering
Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In par... more Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In particular, in addition to a network failure, such as leakage of personal information and damage of the communication charge in the case of zombie smartphone is infected, is expected damages of various users. In this study, we extract the zombie smartphone's phenomena and features that appear while the zombie service is running and introduce a corresponding technique to prevent zombie smartphone.
International Journal of Distributed Sensor Networks, 2014
Sensor Networks can perceive the extensive area by applying many sensor nodes because the size of... more Sensor Networks can perceive the extensive area by applying many sensor nodes because the size of sensor nodes is relatively small and cheap. Sensor nodes can transfer multi-hop data to sink nodes which are far away than sending and receiving distance. Generally sensor nodes are composed of a large size so it is difficult that much capacity is loaded on nodes. Many routing methods are proposed in order to raise energy efficiency in sensor networks field. There is a routing method based on structure as a composing method of network by cluster. Cluster technology consisting and maintaining network topology based on cluster is mostly studied in routing protocol. There are demerits that LEACH, EACHS shall be rest energy of all nodes and HEED does not guarantee the number of cluster head. Proposed energy efficiency of selected cluster head guarantees the number of cluster head which is a demerit of HEED and minimizes the node of DEAD.
Journal of information and communication convergence engineering, 2020
Speed enforcement is one of the major challenges in traffic safety. The increasing number of acci... more Speed enforcement is one of the major challenges in traffic safety. The increasing number of accidents and fatalities has led governments to respond by implementing an intelligent control system. For example, the Korean government implemented a speed camera system for maintaining road safety. However, many drivers still engage in speeding behavior in blackspot areas where speed cameras are not provided. Therefore, we propose a methodology to analyze the combined accident and speeding data to offer recommendations to maintain traffic safety. We investigate three factors: "section," "existing speed camera location," and "over speeding data." To interpret the results, we used the QGIS tool for visualizing the spatial distribution of the incidents. Finally, we provide four recommendations based on the three aforementioned factors: "investigate with experts," "no action," "install fixed speed cameras," and "deploy mobile speed cameras."
Journal of information and communication convergence engineering
In wireless sensor networks, sensor nodes are often deployed in large numbers in places that are ... more In wireless sensor networks, sensor nodes are often deployed in large numbers in places that are difficult for humans to access. However, the energy of the sensor node is limited. Therefore, one of the most important considerations when designing routing protocols in wireless sensor networks is minimizing the energy consumption of each sensor node. When the energy of a wireless sensor node is exhausted, the node can no longer be used. Various protocols are being designed to minimize energy consumption and maintain long-term network life. Therefore, we proposed KOCED, an optimal cluster K-means algorithm that considers the distances between cluster centers, nodes, and residual energies. I would like to perform a performance evaluation on the KOCED protocol. This is a study for energy efficiency and validation. The purpose of this study is to present performance evaluation factors by comparing the K-means algorithm and the K-medoids algorithm, one of the recently introduced machine learning techniques, with the KOCED protocol.
As blockchain technology has the potential to revolutionize trust models and business processes a... more As blockchain technology has the potential to revolutionize trust models and business processes across industries, applications are expected to be endless. However, this technology is still in the early stage, and the scalability caused by the accumulation of transaction data due to the increase of blocks is emerging as a serious problem. In this paper, we propose various alternatives to solve the scalability problem.
Replacing or recharging batteries in the sensor nodes of a wireless sensor network (WSN) is a sig... more Replacing or recharging batteries in the sensor nodes of a wireless sensor network (WSN) is a significant challenge. Therefore, efficient power utilization by sensors is a critical requirement, and it is closely related to the life span of the network. Once a sensor node consumes all its energy, it will no longer function properly. Therefore, various protocols have been proposed to minimize the energy consumption of sensors and thus prolong the network operation. Recently, clustering algorithms combined with artificial intelligence have been proposed for this purpose. In particular, various protocols employ the K-means clustering algorithm, which is a machine learning method. The number of clustering configurations required by the K-means clustering algorithm is greater than that required by the hierarchical algorithm. Further, the selection of the cluster heads considers only the residual energy of the nodes without accounting for the transmission distance to the base station. In terms of energy consumption, the residual energy of each node, the transmission distance, the cluster head location, and the central relative position within the cluster should be considered simultaneously. In this paper, we propose the KOCED (K-means with Optimal clustering for WSN considering Centrality, Energy, and Distance) protocol, which considers the residual energy of nodes as well as the distances to the central point of the cluster and the base station. A performance comparison shows that the KOCED protocol outperforms the LEACH protocol by 259% (223 rounds) for first node dead (FND) and 164% (280 rounds) with 80% alive nodes.
Plain film X-ray scanners are indispensable for medical diagnostics and clinical procedures. This... more Plain film X-ray scanners are indispensable for medical diagnostics and clinical procedures. This type of device typically produces two radiographic images of the human spine, including the anteroposterior and lateral views. However, these two photographs presented perspectives that were distinct. The proposed procedure consists of three fundamental steps. For automated cropping, the grayscale lumbar input image was initially projected vertically using its vertical pattern. Then, Delaunay triangulation was performed with the SURF features serving as the triangle nodes. The posture area of the vertebrae was calculated by utilizing the edge density of each node. The proposed method provided an automated estimation of the position of the human lumbar vertebrae, thereby decreasing the radiologist’s workload, computing time, and complexity in a variety of bone-clinical applications. Numerous applications can be supported by the results of the proposed method, including the segmentation o...
Container platforms ease the deployment of applications and respond to failures. The advantages o... more Container platforms ease the deployment of applications and respond to failures. The advantages of container platforms have promoted their use in information services. However, the use of container platforms is accompanied by associated security risks. For instance, malware uploaded by users can leak important information, and malicious operators can cause unauthorized modifications to important files to create service errors. These security threats degrade the quality of information services and reduce their reliability. To overcome these issues, important container files should be protected by file-access control functions. However, legacy file-access control techniques, such as umask and SecureOS, do not support container platforms. To address this problem, we propose a novel kernel-based architecture in this study to control access to container files. The proposed container file-access control architecture comprises three components. The functionality and performance of the prop...
International Journal of Control and Automation, 2015
The most important factor within the wireless sensor network is to have effective network usage a... more The most important factor within the wireless sensor network is to have effective network usage and increasing the lifetime of the individual nodes in order to operate the wireless network more efficiently. Many routing protocols have been developed for this purpose. One of these is the LEACH protocol presented by Wendi Heinzelman, which is especially well known as a simple and efficient clustering based routing protocol. However, because LEACH protocol in an irregular network results in a drop in efficiency of the total data throughput, the stability of the cluster is declined. Therefore, to increase the stability of the cluster head, this paper proposes a stochastic cluster head selection method for improving the LEACH protocol. To this end, it proposes a SH-LEACH(Stochastic Cluster Head Selection Method-LEACH) that it is combined with the HEED and LEACH protocol and the proposed algorithm is verified through the simulation.
Obfuscation and cryptography technologies are applied to malware to make the detection of malware... more Obfuscation and cryptography technologies are applied to malware to make the detection of malware through intrusion prevention systems (IPSs), intrusion detection systems (IDSs), and antiviruses difficult. To address this problem, the security requirements for post-detection and proper response are presented, with emphasis on the real-time file access monitoring function. However, current operating systems provide only file access control techniques, such as SELinux (version 2.6, Red Hat, Raleigh, NC, USA) and AppArmor (version 2.5, Immunix, Portland, OR, USA), to protect system files and do not provide real-time file access monitoring. Thus, the service manager or data owner cannot determine real-time unauthorized modification and leakage of important files by malware. In this paper, a structure to monitor user access to important files in real time is proposed. The proposed structure has five components, with a kernel module interrelated to the application process. With this struc...
Control and development systems such as air traffic control systems, road traffic systems, and Ko... more Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control 키워드 융합보안, 융합인증, 데이터 정규화, 통합관제 한국정보통신학회 2017 추계종합학술대회
Indonesian Journal of Electrical Engineering and Computer Science, 2019
A Wireless Sensor Network is a wirelessly configured Sensor Node with limited power such as a bat... more A Wireless Sensor Network is a wirelessly configured Sensor Node with limited power such as a battery. There are many Wireless Sensor Network Protocols to increase energy efficiency, among which LEACH Protocol and SEP are typical. The LEACH Protocol is mainly used for homogeneous sensor networks with the same initial energy, and SEP is used for heterogeneous sensor networks with different initial energies. In the case of SEP-E, another heterogeneous sensor with different initial energy is added. SEP and SEP-E provide a higher probability of Cluster Head election for node types with more energy than Normal Nodes. Since the current residual energy of the node is not confirmed, even if the energy is low, the Cluster Head may be elected because of the node type. In this paper, considering the residual energy of a node when a Cluster Head is elected, we increase the probability of electing a Cluster Head with more residual energy. Cluster Head consumes a lot of energy. A node with a lot ...
International Journal of Multimedia and Ubiquitous Engineering, 2016
In this paper, the ML-LEACH routing protocol for the improvement of the performance of in wireles... more In this paper, the ML-LEACH routing protocol for the improvement of the performance of in wireless sensor networks is studied. ML-LEACH is derived from LEACH routing protocols. ML-LEACH is a Multi-Hop Layer. ML-LEACH is proposed to compensate for a phenomenon that the energy consumption of the protocols of the sharp drop in the disadvantage of a wide sensor field of LEACH routing protocol. ML-LEACH routing protocol is set up in the environment in accordance with the specific number of Layer and a node in a wireless sensor network and its performance is compared. The simulation MATLAB is used to let derives the number of Layer and the number of cluster heads.
Since it is very difficult to replace or recharge the batteries of the sensor nodes in the wirele... more Since it is very difficult to replace or recharge the batteries of the sensor nodes in the wireless sensor network (WSN), efficient use of the batteries of the sensor nodes is a very important issue. This has a deep relationship with the lifetime of the network. If the node's energy is exhausted, the node is no longer available. If a certain number of nodes (50% or 80%) in a network consumes energy completely, the whole network will not work. Therefore, various protocols have been proposed to maintain the network for a long time by minimizing energy consumption. In recent years, a protocol using a K-means clustering algorithm, one of machine learning techniques, has been proposed. A KCED protocol is proposed in consideration of residual energy of a node, a cluster center, and a distance to a base station in order to improve a problem of a protocol using K-average gung zipper algorithm such as cluster center consideration.
Journal of the Korea Institute of Information and Communication Engineering, 2014
To minimize low latency and improve the processing speed of the stock trading system, various tec... more To minimize low latency and improve the processing speed of the stock trading system, various technologies have been introduced. However, expensive network equipment has limitation for improving speed of trading system. Also, it is true that there is not much advantage by introducing those kind of systems. In this paper, we propose a low-Latency SPT(Safe Proper Time) scheme for overcoming the stock trading system in a cloud. The proposed method minimizes the CPI in order to reduce the CPU overhead that is based on the understanding of the kernel. and this approach satisfies the data timeliness.
In case of APT attacks, the update server is being used as a means of dissemination, the update p... more In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.
Wireless body area networks (WBANs) are an important application in wireless sensor networks (WSN... more Wireless body area networks (WBANs) are an important application in wireless sensor networks (WSNs). Specifically, in healthcare monitoring systems, it is important to screen the patient’s biometric signals. For example, the elderlies’ vital signs, such as ECG (Electrocardiogram), blood pressure, heart rate, and blood glucose, can be used as measures of their well-being and are all critically important for remote elderly care in tracking their physical and cognitive capabilities. Therefore, WBANs require higher energy efficiency and data transmission. This paper proposes a cluster-based routing protocol which is suitable for WBANs while analyzing energy efficiency issue in data transmission. Considering the importance of sensor nodes in a specific environment for improving the network’s lifetime, the protocol based on the LEACH (low energy adaptive clustering hierarchy) algorithm is proposed. Due to its avoidance of long-distance transmission, the clustering technique is an efficien...
Journal of the Korea Institute of Information and Communication Engineering
Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In par... more Malicious network attacks such as DDoS has no clear measures, the damage is also enormous. In particular, in addition to a network failure, such as leakage of personal information and damage of the communication charge in the case of zombie smartphone is infected, is expected damages of various users. In this study, we extract the zombie smartphone's phenomena and features that appear while the zombie service is running and introduce a corresponding technique to prevent zombie smartphone.
International Journal of Distributed Sensor Networks, 2014
Sensor Networks can perceive the extensive area by applying many sensor nodes because the size of... more Sensor Networks can perceive the extensive area by applying many sensor nodes because the size of sensor nodes is relatively small and cheap. Sensor nodes can transfer multi-hop data to sink nodes which are far away than sending and receiving distance. Generally sensor nodes are composed of a large size so it is difficult that much capacity is loaded on nodes. Many routing methods are proposed in order to raise energy efficiency in sensor networks field. There is a routing method based on structure as a composing method of network by cluster. Cluster technology consisting and maintaining network topology based on cluster is mostly studied in routing protocol. There are demerits that LEACH, EACHS shall be rest energy of all nodes and HEED does not guarantee the number of cluster head. Proposed energy efficiency of selected cluster head guarantees the number of cluster head which is a demerit of HEED and minimizes the node of DEAD.
Uploads
Papers by Daesung Lee