• Title/Summary/Keyword: 단말간 직접 통신

Search Result 78, Processing Time 0.025 seconds

Advanced Receiver for Interference Cancellation in 3GPP LTE-A (3GPP LTE-A에서의 진화된 간섭 제거 수신기)

  • Hwang, Jin-Yup;Lee, Sang-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.389-397
    • /
    • 2014
  • This paper focuses on advanced receiver for interference suppression or cancellation from neighbor cells in the 3GPP Rel-12 standard. From UE (User Equipment) perspective, the advanced receiver which can manage inter-cell interference of adjacent cell is required to support and manage fast-growing wireless data traffic. In 3GPP standard, NAICS which is one of approaches to improve SINR and receiver performance by directly suppression or cancellation of data (PDSCH) and control (PDCCH) signal from interference cells is discussed. In this paper, we briefly introduce the concept and candidate receivers for NAICS (Network Assisted Interference Cancellation and Suppression) based on 3GPP Rel-12 standard, and simulation results for basic NAICS receiver performance are provided.

Research of Real Time Mutual Authentication System in Wireless Network (무선 네트워크상에서 실시간 상호인증시스템에 관한 연구)

  • Jung, Don-Chul;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1996-2001
    • /
    • 2006
  • Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about 802.1x and user authentication method applying PKI. but certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. This paper applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems. Also It suggested the system that can make authentication steps more shorter using authentication server and Mutual authentication system by public certificate(small size/low speed wireless terminal can access to wireless network fast and safely)

Development of a Portable Device Based Wireless Medical Radiation Monitoring System (휴대용 단말 기반 의료용 무선 방사선 모니터링 시스템 개발)

  • Park, Hye Min;Hong, Hyun Seong;Kim, Jeong Ho;Joo, Koan Sik
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.3
    • /
    • pp.150-158
    • /
    • 2014
  • Radiation-related practitioners and radiation-treated patients at medical institutions are inevitably exposed to radiation for diagnosis and treatment. Although standards for maximum doses are recommended by the International Commission on Radiological Protection (ICPR) and the International Atomic Energy Agency (IAEA), more direct and available measurement and analytical methods are necessary for optimal exposure management for potential exposure subjects such as practitioners and patients. Thus, in this study we developed a system for real-time radiation monitoring at a distance that works with existing portable device. The monitoring system comprises three parts for detection, imaging, and transmission. For miniaturization of the detection part, a scintillation detector was designed based on a silicon photomultiplier (SiPM). The imaging part uses a wireless charge-coupled device (CCD) camera module along with the detection part to transmit a radiation image and measured data through the transmission part using a Bluetooth-enabled portable device. To evaluate the performance of the developed system, diagnostic X-ray generators and sources of $^{137}Cs$, $^{22}Na$, $^{60}Co$, $^{204}Tl$, and $^{90}Sr$ were used. We checked the results for reactivity to gamma, beta, and X-ray radiation and determined that the error range in the response linearity is less than 3% with regard to radiation strength and in the detection accuracy evaluation with regard to measured distance using MCNPX Code. We hope that the results of this study will contribute to cost savings for radiation detection system configuration and to individual exposure management.

A MDA-based Approach to Developing UI Architecture for Mobile Telephony Software (MDA기반 이동 단말 시스템 소프트웨어 개발 기법)

  • Lee Joon-Sang;Chae Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.383-390
    • /
    • 2006
  • Product-line engineering is a dreaming goal in software engineering research. Unfortunately, the current underlying technologies do not seem to be still not much matured enough to make it viable in the industry. Based on our experiences in working on mobile telephony systems over 3 years, now we are in the course of developing an approach to product-line engineering for mobile telephony system software. In this paper, the experiences are shared together with our research motivation and idea. Consequently, we propose an approach to building and maintaining telephony application logics from the perspective of scenes. As a Domain-Specific Language(DSL), Menu Navigation Viewpoint(MNV) DSL is designed to deal with the problem domain of telephony applications. The functional requirements on how a set of telephony application logics are configured can be so various depending on manufacturer, product concept, service carrier, and so on. However, there is a commonality that all of the currently used telephony application logics can be generally described from the point of user's view, with a set of functional features that can be combinatorially synthesized from typical telephony services(i.e. voice/video telephony, CBS/SMS/MMS, address book, data connection, camera/multimedia, web browsing, etc.), and their possible connectivity. MNV DSL description acts as a backbone software architecture based on which the other types of telephony application logics are placed and aligned to work together globally.

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

Implementation of U-Kiosk based on PANDA and VNC (PANDA$^{1)}$와 VNC에 기반한 U-Kiosk 구현)

  • Seok, Hyun-Chul;Park, Ki-Woong;Lim, Sang-Seok;Park, Kyu-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.238-243
    • /
    • 2006
  • 휴대용 단말기의 보급과 인터넷 및 무선 네트워크의 발달로 사용자들이 사용하는 개별 장치들이 보편화되어 있으며, 이들을 서로 유기적으로 엮은 서비스가 등장하고 있다. 본 논문에서는 이러한 서비스의 한 종류로 U-Kiosk의 개념을 소개한다. U-Kiosk는 Kiosk 단말장치나 공용 PC를 사용자 개인의 PC처럼 사용할 수 있도록 하여 이들의 리소스를 직접 제어할 수 있는 기능을 제공한다. 이것을 실현하기 위한 방안으로 본 논문에서는 공용 PC에서 개인 PC의 바탕화면 설정을 포함해 모든 자원을 직접 사용할 수 있도록 하는 부분을 구현하고 설명을 하였으며, 인증 과정에서 사용자의 개입을 최소한으로 줄이는 방법에 대해서 소개한다. 이를 위하여 초소형 보안 단말기인 PANDA를 사용하였으며, Zigbee 통신을 사용하여 사용자의 위치정보를 파악하여 자동으로 인증을 하도록 하는 Transient Authentication의 개념을 도입하였다. 두 컴퓨터 간의 원격 접속을 위해서는 VNC를 이용하여 구현하였으며, 사용자가 공용 PC로부터 일정 거리 안에 있을 경우, 자동으로 원격 접속이 이루어지고, 공용 PC로부터 멀어질 경우 자동으로 접속이 종료되도록 구현하였다. 이를 기반으로 제안하는 U-Kiosk의 개념에 맞는 테스트 베드를 구축 하였다. 이는 UFC Project$^{2)}$의 일부로서 차후 완벽한 인증 인프라를 구축하여 보다 안정적이고 사용하기 편리한 U-Kiosk의 구현에 초석이 될 것이다.

  • PDF

A Mechanism of Clock Synchronization for Wireless Networked Control System (무선 네트워크 제어 시스템을 위한 클럭 동기화 메커니즘)

  • Do, Trong-Hop;Quan, Wenji;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.564-571
    • /
    • 2013
  • Wireless network has been used in many applications due to its advantages such as convenience, mobility, productivity, easy deployment, easy expandability and low cost. When it comes to stability, wireless network still shows its limitation which makes it difficult to be used for real-time control system. One of the first problems of using wireless network for control system is clock synchronization. There have been synchronization schemes proposed for wired networked control system as well as wireless network. But these should not be applied directly in wireless network control system. In this paper, we point out the importance of clock synchronization in wireless network control system. Then based on the characteristic of wireless networked control system, we propose a clock synchronization scheme for it. Furthermore, we simulate our scheme and compare with previous synchronization scheme in wired and wireless environments.

SRTP Key Exchange Scheme Using Split Transfer of Divided RSA Public Key (RSA 공개키 분할 전송을 이용한 SRTP 키 교환 기법)

  • Chae, Kang-Suk;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.147-156
    • /
    • 2009
  • This paper proposes a SRTP key exchange scheme using split transfer of divided RSA public key in SIP-based VoIP environment without PKI. The existing schemes are hard to apply to real VoIP environment, because they require a PKI and certificates in the end devices. But in case of ZRTP. which is one of existing schemes, it's able to exchange SRTP Key securely without PKI, but it is inconvenient since it needs user's involvement. To solve these problems, the proposed scheme will split RSA public key and transmit them to SIP signaling secession and media secession respectively. It can defend effectively possible Man-in-The-Middle attacks, and it is also able to exchange the SRTP key without the user's involvement. Besides, it meets the requirements for security of SRTP key exchange. Therefore, it's easy to apply to real VoIP environment that is not available to construct PKL.