NICS 2017
International Conference
Copyright © 2017 by The Institute of Electrical and Electronics Engineers, Inc.
All rights reserved
Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyrights Manager at [email protected].
All rights reserved. Copyright ©2017 by IEEE.
IEEE Catalog Number: CFP17M51-ART ISBN: 978-1-5386-3210-9
Executive Committee General Chairs
Do Tien Dung, The National Foundation for Science and Technology Development (NAFOSTED) Nguyen Viet Ha, VNU University of Engineering and Technology
Dinh Dung, Vietnam National University, Hanoi (VNU)
Program Chairs
Le Sy Vinh, VNU University of Engineering and Technology Tran Xuan Nam, Le Quy Don Technical University
Le Hoai Bac, Vietnam National University - Ho Chi Minh City (VNU-HCM) Vo Nguyen Quoc Bao, Posts and Telecommunications Institute of Technology
Local Arrangement Chairs
Pham Minh Trien, VNU University of Engineering and Technology Nguyen Hoang Xiem, VNU University of Engineering and Technology Le Thanh Ha, VNU University of Engineering and Technology
Publication Chairs
Truong Anh Hoang, VNU University of Engineering and Technology Dang Thanh Hai, VNU University of Engineering and Technology
Finance Chair
Bui Ngoc Thang, VNU University of Engineering and Technology
Table of Contents
2017 4th NAFOSTED Conference on Information and Computer Science
Computational Intelligence
Communications and Networking
Similarity Measures for Intuitionistic Linguistic Numbers, Intuitionistic Linguistic Vectors and Application
Vu Hue (National University of Civil Engineering, Vietnam), Pham Hong Phong (National
University of Civil Engineering, Vietnam) 1
Anomaly Detection in Wireless Sensor Networks via Support Vector Data Description with Mahalanobis Kernels and Discriminative Adjustment
Van Vuong Trinh (Dong A University, Vietnam), Kim Phuc Tran (Division of Artificial
Intelligence, Dong A University Research Institute & Dong A University, Vietnam), Tuan Mai
Anh (Hanoi University of Science and Technology, Vietnam) 7
APP-RB: an efficient method for biological network querying based on rebuild procedure Ngọc Anh Vũ (The Hanoi College of Industrial Economics, Vietnam), Vương Nguyễn (VNU University of Engineering and Technology, Vietnam), Hải Đặng Thanh (Vietnam National
University-Hanoi, Vietnam), Dong Do Duc (VNU, Hanoi, Vietnam) 13 Domain Adaptation for Neural Network Language Generation in Dialogue
Khanh Van Tran (Japan Advanced Institute of Science and Technology, Japan), Minh Le
Nguyen (Japan Advanced Institute of Science and Technology, Japan) 19
An AF Performance Analysis in the energy harvesting Relaying Network
Tam Nguyen Kieu (Ton Duc Thang University, Ho Chi Minh City, Viet Nam., Vietnam), Miroslav Voznak (VSB-Technical University of Ostrava, Czech Republic), Long Nguyen Ngoc (Ton Duc Thang University, Ho Chi Minh City., Vietnam), Nhu Nguyen Hong (Ho Chi Minh CITY TECHNICAL ECONOMIC COLLEGE, Vietnam), Nguyen Thi Phuong Loan (Posts and Telecommunications Institute of Technology, Vietnam), Duc Le (VSB Technical University of Ostrava & Ho Chi Minh City Technical and Economic College, Vietnam), Jaroslav Zdralek (VSB
– Technical University of Ostrava, Czech Republic) 25
Improving the secrecy of cooperative transmissions using unshared jamming
Ngoc Son Pham (Ho Chi Minh City University of Technology and Education, Vietnam), Van Phu Tuan (University of Ulsan, Korea), Sol Park (University of Ulsan, Korea), Thi Anh Le (Ulsan
University, Korea), Hyung-Yun Kong (University of Ulsan, Korea) 31 High-Accuracy Positioning System based on ToA for Industrial Wireless LAN
Tran Thi Thao Nguyen (Kyushu Institute of Technology, Japan), Khairunisa Ahmad Denney (Kyushu Institute of Technology, Japan), Ohhara Syuhei (Kyushu Institute of Technology, Japan), Yuhei Nagao (Kyushu Institute of Technology, Japan), Masayuki Kurosaki (Kyushu
Institute of Technology, Japan), Hiroshi Ochi (Kyushu Institute of Technology, Japan) 37 Performance of a Phase Estimation Method under Different Nonlinearities Incurred by High
Power Amplifiers in MIMO-STBC Systems
Thanh Nguyen (Le Quy Don Technical University, Vietnam), Tat-Nam Nguyen (Le Quy Don Technical University, Vietnam), Nguyen Quoc Binh (Vietnamese Military Technical Academy,
Vietnam) 42
Foundation of Computer Science
Computational Intelligence
Communications and Networking
Picture fuzzy rough sets: Some new basic propositions
Bui Cong Cuong (Institute of Mathematics, Academy of Science and Technology, Vietnam), Hung Le (Banking Academy of Vietnam, Vietnam), Pham Van Chien (Hanoi University of
Science and Technology, Vietnam) 48
Certificateless Public Key Encryption Made Practical
Cuong Trinh (Hong Duc University, Vietnam) 54
Resource Allocation with Multi-Unit Items: Representation and Computational Results
Trung Thanh Nguyen (Hai Phong University, Vietnam), Khuong Nguyen (Hai Phong University,
Vietnam), Nguyen Le (Hai Phong University, Vietnam) 60
Distributed Redundant Image Storages and Reconstruction Algorithm to Contents Verification
Ta Minh Thanh (Tokyo Institute of Technology, Japan) 66
RBF Models with Shallow and Deep Feature for Skeleton-based Human Gesture Recognition Nguyen Hai (Kyoto University, Japan), Thang Pham (Tay Bac University, Vietnam), Dung Duc Nguyen (Institute of Information Technology & Vietnam Academy of Science and Technology,
Vietnam) 72
Enhancing Threshold-Raising Strategies for Effective Mining Top-k High Utility Patterns Bac Le (University of Science, Vietnam), Cao Truong (Kien Giang Teacher Training College, Vietnam), Minh-Thai Tran (Ho Chi Minh City University of Foreign Languages - Information
Technology, Vietnam) 78
A Robust Random Forest-based Tri-Training Algorithm for Early In-trouble Student Prediction Chau Vo (Ho Chi Minh City University of Technology, Vietnam), Phung Nguyen (CSE/Ho Chi
Minh City University of Technology, Vietnam) 84
A New method for Displayed Mathematical Expression Detection Based on FFT and SVM Bui Hai Phong (MICA, HUST, Vietnam, Vietnam), Thang Manh Hoang (Hanoi University of
Science and Technology, Vietnam), Thi-Lan Le (MICA, HUST, Vietnam) 90 Gender classification by LPQ features from intensity and Monogenic images
Huu-Tuan Nguyen (Faculty of Information Technology, Vietnam Maritime University, 484 Lach tray, Le Chan, Hai Phong, Vietnam, Vietnam), Ngoc Huong Trinh (Faculty of Information
Technology, Vietnam Maritime University, Vietnam) 96
A Simple Method for Anonymous Tag Cardinality Estimation in RFID Systems with False Detection
Chuyen T. Nguyen (Hanoi University of Science and Technology, Vietnam), Tuyen Hoang (Hanoi University of Science and Technology, Vietnam), Xuan Vu Phan (Hanoi University of
Science and Technology, Vietnam) 101
A new multi-proxy multi-signature scheme based on elliptic curve cryptography
Dang Tuan (Vietkey, Vietnam), Viet Nguyen (Institute of Military Science and Technology &
17 Hoang Sam - Cau Giay - Ha Noi, Vietnam) 105
Identification of Paths and Parameters in RESTful URLs for the Detection of Web Attacks
Duc Pham Minh (VNU University of Engineering and Technology, Vietnam), Tuan Ly Van (VNU University of Engineering and Technology, Vietnam), Thanh Le Dinh (VNU University of
Engineering and Technology, Vietnam) 110
Intelligent Environment Management System for Controlled Horticulture
Meonghun Lee (National Institute of Agricultural Sciences, Korea), Haengkon Kim (Catholic
University of Daegu, Korea), Hyun Yoe (Sunchon National University, Korea) 116
Foundations of Computer Science
Communications and Networking
HAP-based FSO System using All-Optical Detect-Amplify-and-Forward Relaying and Coherent Detection Receiver
Minh Vu (Posts and Telecommunications Institute of Technology, Vietnam), Nga Nguyen Thi Thu (Posts and Telecommunications Institute of Technology, Vietnam), Binh-Minh Vu (Posts and Telecommunications Institute of Technology, Vietnam), Hang Phan (Hanoi University of Industry, Vietnam), Hien Pham (Posts and Telecommunications Institute of Technology,
Vietnam), Ngoc Dang (Posts and Telecommunications Institute of Technology, Vietnam) 120
A Comparative Survey of 3D GIS Models
Tuan Anh Nguyen Gia (UIT, Vietnam), Minh-Son Dao (Universiti Teknologi Brunei, Brunei Darussalam & University of Information Technology, Vietnam), Cuong Mai-Van (UIT,
Vietnam) 126
Automatic dragon fruit counting on the tree using adaptive thresholds for image segmentation and shape analysis
Chi Cuong Tran (CanTho University, Vietnam), Dinh Tu Nguyen (CanTho University, Vietnam), Hoang Dang LE (CanTho University, Vietnam), Quoc Dinh Truong (CanTho University,
Vietnam), Quoc Bao Truong (CanTho University, Vietnam) 132
Multilinear Mappings Based on Weil Pairing over Elliptic Curves
Binh Nguyen (University of Science, Vietnam), My Huynh Tran Thi (University of Science,
Vietnam) 138
Solving the staff rescheduling problem in Lai Chau hydropower station
Minh Hoàng Hà (UET-VNU, Vietnam), Thuy Do (FPT University, Vietnam), Giang Pham Hoang
(FPT University, Vietnam) 144
A New Windowed Graph Fourier Transform
Le Trung-Thanh (Vietnam National University, Hanoi, Vietnam), Nguyen Linh-Trung (Vietnam National University, Hanoi, Vietnam), Viet-Dung Nguyen (University of Paris Saclay, France),
Karim Abed-Meraim (Polytech'Orléans & University of Sharjah, UAE, France) 150 HA-IDS: A Heterogeneous Anomaly-based Intrusion Detection System
Chau Tran (Ho Chi Minh University of Technology, Vietnam), Tran Nguyen Vo (Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology, Vietnam), Tran
Thinh (Ho Chi Minh City University of Technology, Vietnam) 156
Pilot-based Reference Amplitude Compensation for Ultra-multi-level PAM-SSB-DFTs-OFDM Tomoya Suzuki (Ibaraki University, Japan), Hirokazu Fusayasu (Ibaraki University, Japan), Masahiro Umehira (Ibaraki University, Japan), Shigeki Takeda (Ibaraki University, Japan),
Xiaoyan Wang (Ibaraki University, Japan) 162
A Comparison for Improving The Performance of Two-Stage Optical Phase Conjugation Using The Third-Order Nonlinearity
Binh Tran (Posts and Telecommunications Institute of Technology, Vietnam), Nhan Nguyen (Posts and Telecommunications Institute of Technology, Vietnam), Ngo-Thi-Thu- Trang (Posts
and Telecommunications Institute of Technology, Vietnam) 168
Jamming Signal and Primary Interference in Spectrum Sharing Environment: Performance Analysis
Khuong Ho-Van (HoChiMinh City University of Technology, Vietnam), Thiem Do-Dac (Thu Dau Mot University, Vietnam), Ngoc Pham-Thi-Dan (HoChiMinh City University of Technology, Vietnam), Phong Nguyen - Huu (Broadcast Research & Application Center (BRAC), Vietnam), Tuan Nguyen-Thanh (HoChiMinh City University of Technology, Vietnam), Pham Ngoc Son (Ho Chi Minh City University of Technology and Education, Vietnam), Son Vo (Ho Chi Minh City University of Technology, Vietnam), Lien Pham Hong (University of Technical Education,
Vietnam) 174
LSI design and IoT Applications
Software Engnineering
An Energy-Efficient Smart Monitoring System Using ZigBee Wireless Sensor Network Van-Lan Dao (Le Quy Don Technical University, Vietnam), Xuan-Thiep Nguyen (Viettel Research and Development Institute, Vietnam), Van-Phuc Hoang (Le Quy Don Technical
University, Vietnam) 179
An Efficient Runtime Adaptable Floating-Point Gaussian Filtering Core
Cuong Pham-Quoc (Ho Chi Minh City University of Technology (HCMUT) & Faculty of Computer Science and Engineering, Vietnam), Tran Thinh (Ho Chi Minh City University of
Technology, Vietnam) 183
RTL Design of a Dynamically Reconfigurable Cell Array for Multimedia Processing
Hung Nguyen (VNU University of Engineering and Technology, Vietnam), Minh Phan (VNU
University of Technology and Engineering, Vietnam) 189
Short-term prediction of energy consumption of air conditioners based on weather forecast HoaiSon Nguyen (University of Engineering and Technology, VNU-Hanoi, Vietnam), Yoshiki Makino (Japan Advanced Institute of Science and Technology & National Institute of
Information and Communications Technology, Japan), Yuto Lim (Japan Advanced Institute of Science and Technology (JAIST) & School of Information Science, Japan), Yasuo Tan (JAIST,
Japan) 195
Accurate and Low Complex Cell Histogram Generation By Bypass The Gradient of Pixel Computation
Huy-Hung Ho (VNU University of Engineering and Technology, Vietnam), Ngoc-Sinh Nguyen (VNU University of Engineering and Technology, Vietnam), Duy-Hieu Bui (VNU University of Engineering and Technology (VNU-UET), Vietnam), Xuan-Tu Tran (Vietnam National
University, Hanoi, Vietnam) 201
Automated testing reactive systems from Event-B model
Dieu Huong Vu (Vietnam National University, Hanoi, Vietnam), Hoang Truong (VNU University of Engineering and Technology, Vietnam), Yuki Chiba (JAIST, Japan), Toshiaki Aoki (JAIST,
Japan) 207
An Evaluation on the Effective Processing Time of Raspberry Pi-3B-based Embedded System for Determining Forged Images
Thuong Le-Tien (Hochiminh city University of Technology, Vietnam), Tu Huynh-Kha (Ho Chi Minh City University of Technology, VNUHCM & International University, VNUHCM, Vietnam), Tuan Thanh Nguyen (HCM City Uni. of Technology, National University, Australia), Thinh Pham (HCM City Uni. of Technology, National University, Vietnam), Tin Nguyen (HCM City
Uni. of Technology, National University, Vietnam) 213
A k-Nearest Neighbors Approach for COCOMO Calibration
Phu Le (Global Cybersoft (JSC) Vietnam, Hitachi Consulting, Vietnam), Vu Nguyen (University
of Science & Vietnam National University - Ho Chi Minh city, Vietnam) 219 Enhancing the Performance of Android Applications on Multi-core Processors by Selecting
Parallel Configurations for Source Codes
Huong Pham (Academy of Cryptography Techniques, Vietnam), Phuc Bui Huu (VNU University
of Engineering and Technology, Vietnam) 225
A Formal Contract-based Model for Component-based Real-time Systems
Dong Trinh Nguyen (Faculty of Information Technology & Hai Phong Private University, Vietnam), Hưng Đặng (VNU-UET, Vietnam), Hoang Truong (VNU University of Engineering
and Technology, Vietnam) 230
Computational Intelligence
Communications and Networking
Link Prediction in Weighted Network based on Reliable Routes by Machine Learning Approach Dung Hua (University of Information Technology & Vietnam National University Ho Chi Minh City., Vietnam), Anh-Thu Nguyen-Thi (University of Information Technology, VNU-HCM, Vietnam), Tu-Anh Nguyen-Hoang (University of Information Technology - VNU-HCM,
Vietnam) 236
Random walk with restart: A powerful network propagation algorithm in Bioinformatics field
Duc-Hau Le (Water Resources University, Vietnam) 242
Building minimum recombination ancestral recombination graphs for whole genomes
Thao Nguyen (Vietnam Academy of Science and Technology, Vietnam), Le Sy Vinh (VNU Ha
Noi, Vietnam) 248
Deep Neural Network Accelerator based on FPGA
Thang Viet Huynh (Danang University of Science and Technology, Vietnam) 254 Co-Reference Resolution in Graph Model for Enhancing Vietnamese Paragraph Compression
Trung Tran (University of Information Technology, VNU - HCMC, Vietnam), Dang Tuan
Nguyen (University of Information Technology, VNU-HCM, Vietnam) 258 A Robust Geometric Model of Road Extraction Method for Intelligent Traffic System
Van-Tuyen Dinh (Nguyen Tat Thanh University & Ho Chi Minh City University of Technology,
Vietnam), Hoang-Hon Trinh (HCMUT, Vietnam) 264
VNU-SMM: A Social Media Monitoring Framework on Vietnamese Online News
Duc Nguyen (University of Engineering and Technology, Vietnam), Duc M. Nguyen (University of Engineering and Technology, Vietnam), Vu Tran (University of Engineering and
Technology, Vietnam), Phan Xuan Hieu (VNU Ha Noi, Vietnam), Pham Son (Vietnam National
University, Thailand) 269
Impact of Timing Mismatch in Multicarrier Spectral-Slicing Transmission System Using Single Coherent Receiver
Van Dien Nguyen (The University of Danang, Vietnam), Son Thai Le (Nokia-Bell-Labs, Germany), Cao Dung Truong (Hanoi University of Science and Technology, Vietnam), Tuan Nguyen Van (Da Nang University, Vietnam), Hung Nguyen (The University of Danang,
Vietnam) 275
A Duplicated Network Structure to Ensure the Reliability of an LTE-based Train Control System
Nguyen Dinh Han (Hung Yen University of Technology and Education, Vietnam) 281 A Compact Triplexer Based on Cascaded Three Tilted MMI Couplers Using Silicon Waveguides
Cao Dung Truong (Hanoi University of Science and Technology, Vietnam), Hung Nguyen (The
University of Danang, Vietnam) 287
Toward Service Placement on Fog Computing Landscape
Quang Tran Minh (Hochiminh City University of Technology, Vietnam), Duy Tai Nguyen (Ho Chi Minh University of Technology, Vietnam), An Van Le (Hochiminh City University of
Technology, Vietnam), Hai Duc Nguyen (Ho Chi Minh City University of Technology, Vietnam),
Anh Truong (Ho Chi Minh City University of Technology, Vietnam) 291 Channel Reallocation for Reducing Power Consumption in Femtocell Mobile Networks
Nam-Hoang Nguyen (VNU-Uiversity of Engineering and Technology, Vietnam), Bac Nguyen (University of Engineering and Technology, Vietnam), Takahiko Saba (Chiba Institute of
Technology, Japan) 297
An Adaptive Streaming Method of 360 Videos over HTTP/2 Protocol
Minh Nguyen (Hanoi University of Science and Technology, Vietnam), Dang Nguyen (Hanoi University of Science and Technology, Vietnam), Cuong Pham (Hanoi University of Science and Technology, Vietnam), Pham Nam (Hanoi University of Science and Technology & School of Electronics and Telecoms, Vietnam), Duc V. Nguyen (The University of Aizu, Japan),
Truong Cong Thang (The University of Aizu, Japan) 302
Multimedia
Joint Exploration Model based Light Field Image Coding: A Comparative Study
Huy Phi (Posts and Telecommunications Institute of Technology, Vietnam), Xiem HoangVan
(Vietnam National University & University of Engineering and Technology, Vietnam) 308 HEVC based distributed scalable video coding for surveillance visual system
Xiem HoangVan (Vietnam National University & University of Engineering and Technology, Vietnam), Le Dao Thi Hue (University of Engineering and Technology, Vietnam), Dinh Trieu
Duong (VNU, Vietnam) 314
An optimized hardware design of Integer Motion Estimation HEVC for encoding 8K Video Nguyen Thang (HUST, Vietnam), Tung Vu (School of Electronics & Telecommunications,
Vietnam), Hoan Nguyen (School of Electronics & Telecommunications, Vietnam) 319 Mobile Devices Pixel Density and Video Quality
Is-Haka Mkwawa (University of Plymouth, United Kingdom (Great Britain)), Abubakr Almnsi
(Sudan University of Science and Technology, Sudan) 325
A Robust Hybrid Watermarking Scheme Based on DCT and SVD for Copyright Protection of Stereo Images
Hung Vo (Tra Vinh University & Tra Vinh Province, Vietnam) 331 Adaptive steganography technique to secure patient confidential information using ECG signal
Liem Dao (Saigon Technology University, Vietnam), Thy Nguyen (Saigon Technology
University, Vietnam), Tu Huynh (Saigon Technology University, Vietnam) 336
An Energy-Efficient Smart Monitoring System Using ZigBee Wireless Sensor Network
Van-Lan Dao
1, Xuan-Thiep Nguyen
2and Van-Phuc Hoang
11Le Quy Don Technical University, 236 Hoang Quoc Viet Str., Hanoi, Vietnam
2Viettel Research and Development Institute, Hanoi, Vietnam Email: [email protected]
Abstract— In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modifying the MAC algorithm and AES cryptography, the proposed network allows users to utilize the power efficiently, provide high level of security and can be applied to a variety of applications.
I. INTRODUCTION
Nowadays, the need of using energy-efficient electronic devices and communication networks is more and more emerging. The various new applications enable wireless sensor networks to be used in many areas of life. Wireless sensor networks [1]-[5] can be utilized in army, agriculture, industry, medicine, sport, environmental resource monitoring, traffic, smart houses, etc. Some sort of sensors can be used as the tools to monitor temperature, moisture, water level, heart rate, movement, poisons and so on. Figure 1 is the general model of a wireless sensor network. This paper presents the implementation results of a wireless sensor network (WSN) which can utilize the power supply efficiently. Section II introduces hardware and software algorithms of for the network, followed by Section III with AES cryptography for WSN. Section IV presents the implementation results. Finally, section V gives the conclusions.
RTO 1 ED01
RTO 2
ED01 ED01
ED01
ED01
ED01 ED01
ED01 CR01 WSN Monitoring System
Coordinator Router End Device
Wireless Sensor Network
2.4GHz wireless link
Fig. 1. General model of wireless sensor network.
II. SYSTEM DESIGN FOR THE PROPOSED WSN
Figure 2 shows the system model for ZigBee/IEEE 802.15.4 with a multi-layer model and detail specifications.
Consider these two following block diagrams which are block diagram of end device or router depicted in Fig. 3 and coordinator block diagram in Fig. 4.
All components used in this paper are all energy saving ones. Microcontroller units (MCUs) of end device and router are made of Microchip PIC18F26J50 which is an ultra-energy saving chip with Nano-watt technology. Sensor unit is the temperature sensor DS18B20 of DALLAS, RF module uses module MRF24J40MC of Microchip which enables to save energy by sleep scheduling and enhancing information space to 1km. Power supply unit is lithium CR 123A of Panasonic with the size of 1550mAh and the maximum lifetime of 10 years.
Fig. 2. System model for ZigBee/IEEE 802.15.4.
Fig. 3. Block diagram of an end device or a router.
2017 4th NAFOSTED Conference on Information and Computer Science
Fig. 4. Coordinator block diagram.
With regard to the coordinator node, although there is no high request for saving energy, it requires high processing speed and is a versatile tool, thus, microcontroller unit should be equipped by chip PIC18F97J60. Power unit uses grid electricity, dynamo or accumulator. Finally, computer connector unit allows to have diversified methods of sending data to the center, and allows communicating through some interfaces such as Ethernet, SIM module or RS232.
The end device node MAC algorithm is depicted in Fig. 5 in which CSMA-CA protocol is used. This algorithm is based on the algorithm presented in [6]. In this paper, we have modified the CSMA-CA protocol so that the high energy efficiency can be achieved while the sensor network still operates efficiently.
In this proposed algorithm, the sensor node transfer data when the temperature changes. Moreover, after if there is no change in temperature or completing data transmission, the sensor nodes go to sleep state.
The algorithm in Fig. 5 can be described as follows. Firstly, NB (Number backoff) or the message resend number is initialized with 0, BE (backoff exponent) or the exponent of resend period is initialized with minimal value and the temperature value is set with 0oC and the end device reads temperature value from sensor. If the temperature change is higher than 1oC, the end device starts transferring data.
Otherwise, the timeout is checked and the device goes to sleep state if there is not any change before this timeout. Next, if the temperature change is higher than 1oC, or after timeout, the device waits for random period (2BE-1) and then does carrier sensing. If this channel is not occupied, the device sends the package to router and wait for ACK signal from router, and falls to sleep or deep sleep states. If the channel is occupied or ACK is not received after timeout due, NB is increased by 1 and BE is assigned as Min(BE+1, aMaxBE). Then, the device reads the temperature and waits a random period again. If the value of NB is higher than a given value, it is assumed that there is an error and the device falls to the sleep state.
The algorithms for coordinator and router nodes are also built based on the above algorithm.
III. AES ENCRYPTION AND DECRYPTION FOR SECURITY IMPLEMENTATION IN WSN
AES (Advanced Encryption Standard), first introduced in [7], is a popular encryption standard. AES processes the data as 128-bit blocks with the key lengths of 128, 192 or 256 bit.
Fig.6 depicts the AES encryption/decryption algorithm. In this work, 128-bit key AES cryptography is implemented on an 8- bit MCU with the Flash and SRAM memory. The AES encryption/decryption algorithms are realized by C language.
Due to the limitation of memory capacity in the MCUs, the management of variables in software programs is very important. In our implementation, S-box constants are declared and stored in Flash memory, not in RAM.
START (Unslotted CSMA-CA with comparing the temperature)
Compare If tº to vary Initialization (NB = 0, BE = macMinBE)
Temp=0
Delay for random[(2^BE) – 1]
Unit backoff periods
Perform CCA
Channel idle
Send packet
ACK
NB = NB + 1 BE=Min(BE+1,aMaxBE)
NB>macMaxCSMABackoffs?
Success Failure
Sleep (Deep sleep)
Read Temperature
Yes Yes
Yes
Yes
Yes No
Yes
No No
Yes
Timeout No
No Timeout
No No
Wakeup event
Fig. 5. Proposed end device MAC algorithm.
IV. IMPLEMENTATION RESULTS
To calculate the lifetime of the WSN nodes, we consider the transmitter-receiver protocol or concretizing by transmitter- receiver algorithm, and the parameter given by the manufacturer enclosing to the components. Hereafter is the calculated results of end devices. Table I presents the case of taking only temperature sample and not transmitting.
TABLE I. CASE 1
(Temperature sample only and no transmision).
Mode T (ms) Sensor (uA)
MCU (uA)
RF module
(uA)
Iqi*T (uA i*ms)
Convert T 93.75 1500 6.2 12 142331.3
Sleep 5000 1 0.105 12 65525
2017 4th NAFOSTED Conference on Information and Computer Science
Add round key
Subbytes
ShiftRows
MixColumn
Add round key
Round 1
Subbytes
ShiftRows
MixColumn
Add round key
Round 9
Subbytes
ShiftRows
Add round key
Round 10
Add round key InvMixcolumn
AddRoundkey
InvSubbytes
InvShiftRows
Round 1
InvMixcolumn
AddRoundkey
InvSubbytes
InvShiftRows
Round 9
Add round key
InvSubbytes
InvShiftRows
Round 10
W[0,3]
W[4,7]
W[36,39]
W[40,43]
CipherText CipherText
PlainText PlainText
Fig. 6. AES encryption/decryption algorithm.
The operating cycle of the WSN node is 5.09375s. The average electrical current in this regime is 40.81uA, so the node can operate in:
1550/(40.81x10-3) = 37980.89(hours) = 1582.54 (days) Table II shows the case of taking sample and transmitting successfully since the first time and every operating cycle later, suppose the temperature fluctuates and surpasses continuously the allowed rate.
TABLE II. CASE 2
(Taking sample and transmision successfully).
Mode T (ms) Sensor (uA)
MCU (uA)
RF module
(uA)
Iqi*T (uA i*ms)
Convert T 93.75 1500 6.2 12 142331.3
Process and wait 4.24 1 6.2 12 81.41
Transmit 0.704 1 2.3 120000 84482.3
Wait ACK 2*2 +
0.00033 1 2.3 12 61.2
Receive ACK 0.704 1 2.3 25000 17602.3
Process after
received ACK 2 1 6.2 12 38.4
Sleep 5000 1 0.105 12 65525
The average current in this regime is 60.76uA, therefore the maximum time that the sensor node can operate is:
1550/(33.48x10-3) = 25510.20 (hours) = 1062.93 (days)
Table III presents the case of taking sample and transmitting unsuccessfully constantly allowing to retransmit with maximum of 4 times, then the sensor node stops transmitting and fall to the sleep state.
TABLE III. CASE 3
(Taking sample and transmision unsuccessfully).
Mode T (ms) Sensor (uA)
MCU (uA)
RF module
(uA)
Iqi*T (uA i*ms)
Convert T 93.75 1500 6.2 12 142331.3
Prepare
transmit 2 1 6.2 12 38.4
Transmit 0.704*4 1*4 2.3*4 120000*4 1351717.17 Wait ACK [2*2 +
0.00033]*4 1*4 2.3*4 12*4 979.28 Random
time 36.48 1 2.3 25000 17602.3
Sleep 5000 1 0.105 12 65525
The average current is 306.39uA. The maximum time that the node can operate is:
1550/(306.39x10-3) = 5058.91 (hours) = 210.79 (days) In the regime of sending signal to confirm every 60s, there will be 5.1042s that the sensor node operates with the average electric current of 60.76uA, and 54.8958s with the average electrical current of 40.81uA. Hence, the average electrical current that the sensor node uses within 60s is 42.51uA. Then, the maximum time that the node can operate is:
1550/(42.51x10-3) = 36462.01 (hours) = 1519.25 (days) Calculating the existence of router is performed similarly.
Beside the factors about components and algorithm, we must rely on the amount of information that we have to deal with.
The existence of a node depends on the components, algorithm, pin capacity and the amount of information that need to be transmitted and received. Usually, the lifetime of end device is longer than router.
Besides, to extend the lifetime of end device and router, we can extend the operating cycle of the WSN node or using higher capacity power supply. The practical WSN system has been tested, as shown in the Fig. 7. It was conformed that the proposed wireless sensor network can work correctly. The merit of efficient energy consumption leads to potential applications of the proposed WSN in emerging environment monitoring system such as in Fig. 8 for flood, drought and wildfire monitoring and early warnings.
Moreover, with AES cryptography implementation for the proposed WSN, Fig. 9 presents the detail results of encryption/decryption speed (cycle count and processing time) and code size (stored in program memory) with different values of AES datapath width to provide detail tradeoff so that the WSN designers can select suitable parameters for each application.
2017 4th NAFOSTED Conference on Information and Computer Science
Fig. 7. The proposed wireless sensor network.
End device 4 Tọa độ: E 4
(Đo mực nước) End device 1
Tọa độ: E 1 (Đo T, RH)
End device 3 Tọa độ: E 3 (Đo T, RH)
Router 2 Tọa độ: E2 (Đo T, RH)
COORDINATOR
Fig. 8. A practical application model of the proposed WSN in flood, drought and wildfire monitoring and early warnings.
V. CONCLUSIONS
In this paper, we have presented a wireless sensor network complying with ZigBee standard by employing energy efficient techniques and MCU-based AES cryptography. This design is suitable for applications in the remote regions with poor facilities and having difficulty in deploying electricity networks or other communication means.
Using only a low-end pin power supply, the end devices can operate in 6 months to 4 years. In the future, we will try to implement more wireless sensor networks for other applications towards a smart society.
ACKNOWLEDGMENT
This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.02-2015.20.
REFERENCES
[1] Anna Hac, Wireless sensor network designs, John Wiley & Sons, 2013.
[2] Tiwari, Ankit et al., “Energy-efficient wireless sensor network design and implementation for condition-based maintenance,” ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 1, Mar. 2007.
[3] Doo Seop Yun, Seung-Jun Lee, Do Hyun Kim, “A study on the vehicular wireless base-station for in-vehicle wireless sensor network system,” Proc. 2014 International Conference on Information and Communication Technology Convergence, pp.609-610, Oct. 2014.
[4] Renwei Ding, Jianjun Hou, Bingbing Xing, “Research of Wireless Sensor Network Nodes Based on Ambient Energy Harvesting,”
Proc. 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp.286-288, Nov. 2013.
[5] Liu Yanfei, Wang Cheng, Qiao Xiaojun, Zhang Yunhe, Yu Chengbo,
“An improved design of ZigBee Wireless Sensor Network,” Proc. 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), pp.515-518, Aug. 2009.
[6] IEEE Standard for Local and metropolitan area networks, Part 15.4:
Low-Rate Wireless Personal Area Networks (LR-WPANs), pp.1-334, Jun. 2011.
[7] National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” FIPS Publication 197, Nov. 2001.
11987 23757
47257 94257
188257
12246 24669
49081 97905
195553
8 16 32 64 128 256 512
0 50000 100000 150000 200000
Cycle count
Data size (bytes) Encryption
Decryption
(a)
749,19 1484,81
2953,56 5891,06
11766,06
765,38 1541,81
3067,56 6119,06
12222,06
8 16 32 64 128 256 512
0 2000 4000 6000 8000 10000 12000 14000
Time (us)
Data size (bytes) Encryption
Decryption
(b)
1528 1560 1624 1752
2008
3548 3600 3664 3792
4048
8 16 32 64 128 256 512
0 2000 4000
Memory usage (bytes)
Data size (bytes) Encryption
Decryption
(c)
Fig. 9. Implementation results of MCU-based AES cryptography for the proposed WSN: (a) Cycle count; (b) Processing time; (c) Memory usage.
2017 4th NAFOSTED Conference on Information and Computer Science