摘要:
A method, apparatus and system for displaying topology information of a wireless sensor network includes a plurality of sensor nodes. The method typically includes: receiving node information collected and extracted from the sensor nodes; comparing the received node information with stored node information; computing, when the received node information is unequal to the stored node information, visualization information on a sensor node whose information is not present in the stored node information; and displaying the sensor nodes on concentric circles using the visualization information.
摘要:
A method and apparatus for communicating with a target device in a personal area network (PAN), when a multi-function remote controller (MRC) is outside the coverage area of the target device. The apparatus includes a proxy device which automatically forms a virtual PAN by setting up a pairing link with the target device to control the target device. Accordingly, a user may continuously control the target device irrespective of the location of the MRC.
摘要:
A system, method, and apparatus are provided for establishing a wireless network connection between a mobile terminal and an electronic apparatus by using a near field communication network. At least one electronic apparatus is connected to the near field communication network. A mobile terminal is connected to the near field communication network, exchanges information with the at least one electronic apparatus for a wireless communication network connection through the connected near field communication network, and establishes the wireless communication network connection with the at least one electronic apparatus based on the exchanged information.
摘要:
A method and apparatus for communicating with a target device in a personal area network (PAN), when a multi-function remote controller (MRC) is outside the coverage area of the target device. The apparatus includes a proxy device which automatically forms a virtual PAN by setting up a pairing link with the target device to control the target device. Accordingly, a user may continuously control the target device irrespective of the location of the MRC.
摘要:
Heterogeneous protocol stacks are used in an approach including analyzing a destination network ID of data received by a shared, lower layer protocol stack, a data type field value, and/or whether any of the upper layer protocol stacks support broadcasting. An upper layer protocol stack is selected based on the results of the analysis. The received data is transmitted to the selected upper layer protocol stack. Accordingly, heterogeneous protocol stacks may be realized in one chip.
摘要:
An apparatus and method for providing data packet security in a wireless sensor network including a plurality of sensor nodes. The apparatus includes a memory unit for storing a plurality of node characteristic information and a plurality of settable security status information, each of the node characteristic information corresponding to at least one of the settable security status information; and a control unit for examining the node characteristic information of the control unit, if a data packet generation request is made, detecting the security status information corresponding to the examined node characteristic information from the memory unit, and generating data packets including the detected security status information.
摘要:
A method and system for detecting a suspicious frame in a wireless sensor network that includes: a plurality of sensor nodes, for sending sensed data and data regarding an upper-level node and cluster head node. A data collecting node receives data from the sensor nodes, sends information, and extracts data received from the sensor nodes. A first probability of occurrence of the routing path is computed with respect to training frames, and a second probability of occurrence of a source routing path is computed using the first probability. The second probability is compared with a reference value, and displays an indication notifying an abnormality of the source node according to when the second probability and the reference value.
摘要:
A method for preventing a replay attack is provided. A prime number is mutually exchanged between a main node and children nodes. The main node generates a Prime Sequence Code Matrix (PSCM) corresponding to the prime number, notifies the children nodes of sequence orders corresponding to the children nodes. The main node selects an arbitrary value of a Prime Sequence Code-1 (PSC1) among a series of values corresponding to an arbitrary node in the PSCM. The arbitrary node computes a Prime Sequence Code-2 (PSC2) subsequent to receiving the PSC1 using a sequence order received from the main node and the prime number. The PSC2 is transmitted to the main node. The main node compares the received PSC2 with the PSCM. The method can be easily applied by supplementing a weakness for a replay attack on the basis of an IEEE 802.15-4-2006 standard and minimizing system load.
摘要:
A method and system for detecting a suspicious frame in a wireless sensor network that includes: a plurality of sensor nodes, for sending sensed data and data regarding an upper-level node and cluster head node. A data collecting node receives data from the sensor nodes, sends information, and extracts data received from the sensor nodes. A first probability of occurrence of the routing path is computed with respect to training frames, and a second probability of occurrence of a source routing path is computed using the first probability. The second probability is compared with a reference value, and displays an indication notifying an abnormality of the source node according to when the second probability and the reference value.
摘要:
A method for preventing a replay attack is provided. A prime number is mutually exchanged between a main node and children nodes. The main node generates a Prime Sequence Code Matrix (PSCM) corresponding to the prime number, notifies the children nodes of sequence orders corresponding to the children nodes. The main node selects an arbitrary value of a Prime Sequence Code-1 (PSC1) among a series of values corresponding to an arbitrary node in the PSCM. The arbitrary node computes a Prime Sequence Code-2 (PSC2) subsequent to receiving the PSC1 using a sequence order received from the main node and the prime number. The PSC2 is transmitted to the main node. The main node compares the received PSC2 with the PSCM. The method can be easily applied by supplementing a weakness for a replay attack on the basis of an IEEE 802.15-4-2006 standard and minimizing system load.