Claim Missing Document
Check
Articles

Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network M. Udin Harun Al Rasyid; Ferry Astika Saputra; Alfian Fahmi
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9039.049 KB) | DOI: 10.24003/emitter.v1i1.8

Abstract

IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology.Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca
Combination Adaptive Traffic Algorithm and Coordinated Sleeping in Wireless Sensor Network M. Udin Harun Al Rasyid; Eka Saputra Aji; Isbat Uzzin Nadhori
EMITTER International Journal of Engineering Technology Vol 2 No 2 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9680.169 KB) | DOI: 10.24003/emitter.v2i2.23

Abstract

Wireless sensor network (WSN) uses a battery as its primary power source, so that WSN will be limited to battery power for long operations. The WSN should be able to save the energy consumption in order to operate in a long time.WSN has the potential to be the future of wireless communications solutions. WSN are small but has a variety of functions that can help human life. WSN has the wide variety of sensors and can communicate quickly making it easier for people to obtain information accurately and quickly. In this study, we combine adaptive traffic algorithms and coordinated sleeping as power‐efficient WSN solution. We compared the performance of our proposed ideas combination adaptive traffic and coordinated sleeping algorithm with non‐adaptive scheme. From the simulation results, our proposed idea has good‐quality data transmission and more efficient in energy consumption, but it has higher delay than that of non‐adaptive scheme.Keywords:WSN,adaptive traffic,coordinated sleeping,beacon order,superframe order.
Performance of Implementation IBR-DTN and Batman-Adv Routing Protocol in Wireless Mesh Networks Herman Yuliandoko; Sritrusta Sukaridhoto; M Udin Harun Al Rasyid; Nobuo Funabiki
EMITTER International Journal of Engineering Technology Vol 3 No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v3i1.32

Abstract

Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility, heterogeneous condition and intermittent network connectivity cause data packets drop during wireless communication and it becomes a problem in the wireless mesh networks. This condition can happen because wireless mesh networks use connectionless networking type such as IP protocol which it is not tolerant to delay. To solve this condition it is needed a technology to keep data packets when the network is disconnect. Delay tolerant technology is a technology that provides store and forward mechanism and it can prevent packet data dropping during communication. In our research, we proposed a test bed wireless mesh networks implementation by using proactive routing protocol and combining with delay tolerant technology. We used Batman-adv routing protocol and IBR-DTN on our research. We measured some particular performance aspect of networking such as packet loss, delay, and throughput of the network. We identified that delay tolerant could keep packet data from dropping better than current wireless mesh networks in the intermittent network condition. We also proved that IBR-DTN and Batman-adv could run together on the wireless mesh networks. In The experiment throughput test result of IBR-DTN was higher than Current TCP on the LoS (Line of Side) and on environment with obstacle.Keywords: Delay Tolerant, IBR-DTN, Wireless Mesh, Batman-adv, Performance
Implementation of Energy Efficiency Based on Time Scheduling to Improve Network Lifetime in Wireless Body Area Network (WBAN) Subono .; M. Udin Harun Al Rasyid; I Gede Puja Astawa
EMITTER International Journal of Engineering Technology Vol 3 No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.541 KB) | DOI: 10.24003/emitter.v3i2.43

Abstract

ZigBee applications of IEEE 802.15.4 Wireless Sensor Network (WSN) with Low Rate Wireless Personal Area Network (LR-WPAN) can be integrated with e-health technology Wireless Body Area Network (WBAN). WBAN are small size and can communicate quickly making it easier for people to obtain information accurately.WBAN has a variety of functions that can help human life. It can be used in the e-health, military and sports. WBAN has the potential to be the future of wireless communication solutions. WBAN use battery as its primary power source. WBAN has limited energy and must be able to save energy consumption in order to operate for a long time. In this study, we propose a method of time scheduling called cycle sleep period (CSP) as WBAN solutions to save energy and improve energy efficiency. The CSP method is implemented in the real hardware testbed using sensor e-health includes temperature body and current sensor. We compared the performance of CSP method with duty cycle management (DCM) time scheduling-based and without using time scheduling.From the measurement results, our proposed idea has decreasingenergy consumption.Keywords: WSN, LR-WPAN, WBAN, e-health, Time Scheduling
Modified GTS Allocation Scheme for IEEE 802.15.4 Zakha Maisat Eka Darmawan; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 3 No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (230.914 KB) | DOI: 10.24003/emitter.v3i1.92

Abstract

IEEE 802.15.4 standard is widely used in wireless personal area networks (WPANs). The devices transmit data during two periods: contention access period (CAP) by accessing the channel using CSMA/CA and contention free period (CFP), which consists of guaranteed time slots (GTS) allocated to individual devices by the personal area network (PAN). However, the use of GTS slot size may lead to severe bandwidth wastage if  the traffic pattern is not fit or only a small portion of GTS slot is used by allocated device. The proposed scheme devides the GTS slot and then optimizes the GTS slot size by exploiting the value of superframe order (SO) information. The proposed scheme was tested through simulations and the results show that the new GTS allocation scheme perform better than the original IEEE 802.15.4 standard in terms of average transmitted packets, throughput, latency and probability of successful packets.
Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard Nurul Fahmi; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2836.872 KB) | DOI: 10.24003/emitter.v4i1.115

Abstract

In the recent years, Wireless Sensor Networks (WSNs) have become a very popular technology for research in various fields. One of the technologies which is developed using WSN is environmental health monitoring. However, there is a problem when we want to optimize the performance of the environmental health monitoring such as the limitation of the energy. In this paper, we proposed a method for the environmental health monitoring using the fuzzy logic approach according to the environmental health conditions. We use that condition to determine the sleep time in the system based on IEEE 802.15.4 standard protocol. The main purpose of this method is to extend the life and minimize the energy consumption of the battery. We implemented this system in the real hardware test-bed using temperature, humidity, CO and CO2 sensors. We compared the performance without sleep scheduling, with sleep scheduling and adaptive sleep scheduling. The power consumption spent during the process of testing without sleep scheduling is 52%, for the sleep scheduling is 13%, while using the adaptive sleep scheduling is around 7%. The users also can monitor the health condition via mobile phone or web-based application, in real-time anywhere and anytime.
Dynamic Sleep Scheduling on Air Pollution Levels Monitoring with Wireless Sensor Network Gezaq Abror; Rusminto Tjatur Widodo; M. Udin Harun Al Rasyid
EMITTER International Journal of Engineering Technology Vol 5 No 2 (2017)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.333 KB) | DOI: 10.24003/emitter.v5i2.185

Abstract

Wireless Sensor Network (WSN) can be applied for Air Pollution Level Monitoring System that have been determined by the Environmental Impact Management Agency which is  PM10, SO2, O3, NO2 and CO. In WSN, node system is constrained to a limited power supply, so that the node system has a lifetime. To doing lifetime maximization, power management scheme is required and sensor nodes should use energy efficiently. This paper proposes dynamic sleep scheduling using Time Category-Fuzzy Logic (Time-Fuzzy) Scheduling as a reference for calculating time interval for sleep and activated node system to support power management scheme. This research contributed in power management design to be applied to the WSN system to reduce energy expenditure. From the test result in real hardware node system, it can be seen that Time-Fuzzy Scheduling is better in terms of using the battery and it is better in terms of energy consumption too because it is more efficient 51.85% when it is compared with Fuzzy Scheduling, it is more efficient 68.81% when it is compared with Standard Scheduling and it is more efficient 85.03% when compared with No Scheduling.
Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm Novi Aryani Fitri; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 7 No 1 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (999.468 KB) | DOI: 10.24003/emitter.v7i1.356

Abstract

Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it was stored in the data center. The user must go through an authentication process to ensure that not an attacker and verify to ensure the authenticity and accuracy of the data received. In this research, we proposed a solution to secure medical data using the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Elliptic Curve Digital Signature Algorithm (ECDSA) methods. Our system can secure data centers from illegal access because the uploaded data has patient control over access rights based on attributes that have been embedded during the data encryption process. Encrypted data was added to the digital signature to pass the authentication process before being sent to the data center. The results of our experiments serve efficient system security and secure with low overhead. We compare the proposed system performance with the same CP-ABE method but don’t add user revocation to this system and for our computing times are shorter than the previous time for 0.06 seconds and 0.1 seconds to verify the signature. The total time in the system that we propose requires 0.6 seconds.
Enhanced PEGASIS using Dynamic Programming for Data Gathering in Wireless Sensor Network Mohammad Robihul Mufid; M. Udin Harun Al Rasyid; Iwan Syarif
EMITTER International Journal of Engineering Technology Vol 7 No 1 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.727 KB) | DOI: 10.24003/emitter.v7i1.360

Abstract

A number of routing protocol algorithms such as Low-Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient Gathering in Sensor Information Systems (PEGASIS) have been proposed to overcome the problem of energy consumption in Wireless Sensor Network (WSN) technology. PEGASIS is a development of the LEACH protocol, where within PEGASIS all nodes are active during data transfer rounds thus limiting the lifetime of the WSN. This study aims to propose improvements from the previous PEGASIS version by giving the name Enhanced PEGASIS using Dynamic Programming (EPDP). EPDP uses the Dominating Set (DS) concept in selecting a subset of nodes to be activated and using dynamic programming based optimization in forming chains from each node. There are 2 topology nodes that we use, namely random and static. Then for the Base Station (BS), it will also be divided into several scenarios, namely the BS is placed outside the network, in the corner of the network, and in the middle of the network. Whereas to determine the performance between EPDP, PEGASIS and LEACH, an analysis of the number of die nodes, number of alive nodes, and remaining of energy were analyzed. From the experiment result, it was found that the EPDP protocol had better performance compared to the LEACH and PEGASIS protocols in terms of number of die nodes, number of alive nodes, and remaining of energy. Whereas the best BS placement is in the middle of the network and uses static node distribution topologies to save more energy.
Energy Efficiency Optimization for Intermediate Node Selection Using MhSA-LEACH: Multi-hop Simulated Annealing in Wireless Sensor Network Aidil Saputra Kirsan; Udin Harun Al Rasyid; Iwan Syarif; Dian Neipa Purnamasari
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.459

Abstract

Energy usage on nodes is still a hot topic among researchers on wireless sensor networks. This is due to the increasing technological development increasing information requirements and caused the occurrence of information exchange continuously without stopping and impact the decline of lifetime nodes. It takes more effort to manually change the energy source on nodes in the wireless sensor network. The solution to such problems is to use routing protocols such as Low Energy Adaptive Clustering Hierarchy (LEACH). The LEACH protocol works by grouping nodes and selecting the Cluster Head (CH) in charge of delivering data to the Base Station (BS). One of the disadvantage LEACH protocols, when nodes are far from the CH, will require a lot of energy for sending data to CH. One way to reduce the energy consumption of each node-far is to use multi-hop communication. In this research, we propose a multi-hop simulated annealing (MhSA-LEACH) with an algorithm developed from the LEACH protocol based on intra-cluster multi-hop communication. The selection of intermediate nodes in multi-hop protocol is done using Simulated Annealing (SA) algorithm on Traveling Salesman Problem (TSP). Therefore, the multi-hop nodes are selected based on the shortest distance and can only be skipped once by utilizing the probability theory, resulting in a more optimal node path. The proposed algorithm has been compared to the conventional LEACH protocol and the Multi-Hop Advance Heterogeneity-aware Energy Efficient (MAHEE) clustering algorithm using OMNeT++. The test results show the optimization of MhSA-LEACH on the number of packets received by BS or CH and the number of dead or alive nodes from LEACH and MAHEE protocols.
Co-Authors A Wildan J Achmad Basuki Achmad Basuki Agus Indra Gunawan Agus Indra Gunawan Agus Prasetyo Ahmad Rifa'i Ahmad Rifai Ahsan, Ahmad Syauqi Aidil Saputra Kirsan Al Falah, Adam Ghazy Alfaqih, Wildan Maulana Akbar Alfian Fahmi Alfian Fahmi, Alfian Ali Ridho Barakbah Amang Sudarsono, Amang Amma Liesvarastranta Haz Andhik Ampuh Yunanto Andi Roy Arna Fariza Asmara, Rengga Ata Amrullah Aziz, Adam Shidqul Bih Hwang Lee Bima Sena Bayu Dewantara Budiarti, Rizqi Putri Nourma Darmawan, Zakha Maisat Eka Desy Intan Permatasari, Desy Intan Dhodit Rengga Tisna Dian Neipa Purnamasari Dona Wahyudi Dwi Susanto Edelani, Renovita Edi Satriyanto Eka Saputra Aji Eka Saputra Aji, Eka Saputra Eko Prayitno Entin Martiana Kusumaningtyas Evianita Dewi Fajrianti Ferry Astika Saputra Ferry Astika Saputra Ferry Astika Saputra Fitri, Novi Aryani Gezaq Abror Hary Oktavianto Hendi Yanuar Setianto Herman Yuliandoko Herman Yuliandoko Herman Yuliandoko, Herman I Gede Puja A I Gede Puja Astawa I Gede Puja Astawa Idris Winarno Ilham Achmad Al Hafidz Isbat Uzzin Nadhori Isbat Uzzin Nadhori, Isbat Uzzin iwan Syarif Jauari Akhmad Nur Hasim Junaedi Ispianto Khoirunnisa, Asy Syaffa Kindarya, Fabyan Kurniawan Saputra Kusuma, Selvia Ferdiana M. Husni Mubarrok Mufid, Mohammad Robihul Muh. Zen Samsono Hadi Muhammad Aksa Hidayat Muhammad Iskandar Dzulqornain Nana Ramadijanti, Nana Naufal Adi Satrio Nobuo Funabiki Nobuo Funabiki, Nobuo Nur Rosyid Mubtadai, Nur Rosyid Nurazmi, Talita Iza Nuril Ratu Qurani Nurul Fahmi Nurul Fahmi Nurul Fahmi Nusantoko, Yuliarta Rizki Primajaya, Grezio Arifiyan Rachma Rizqina Mardhotillah Rengga Asmara Ricky Afiful Maula Riyadh Arridha Rizki Amalia Rozie, Fachrul Rusminto Tjatur Widodo Sa'adah, Umi Setiawardhana Setiawardhana Setiawardhana Setiawardhana Sritrusta Sukaridhoto Subono . Subono ., Subono Subono Subono Sumarsono, Irwan Titing Magfirah Tomy Iskandar Vivien Arief Wardhany Wirama, I Made Adiswara Yunia Ikawati