• Title/Summary/Keyword: 단말

Search Result 3,733, Processing Time 0.027 seconds

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF

Adaptive Power Control Dynamic Range Algorithm in WCDMA Downlink Systems (WCDMA 하향 링크 시스템에서의 적응적 PCDR 알고리즘)

  • 정수성;박형원;임재성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.918-927
    • /
    • 2004
  • WCDMA system is 3rd generation wireless mobile system specified by 3GPP. In WCDMA downlink, two power control schemes are operated. One is inner loop power control operated in every slot. Another is outer loop power control based on one frame time. Base station (BS) can estimate proper transmission power by these two power control schemes. However, because each MS's transmission power makes a severe effect on BS's performance, BS cannot give excessive transmission power to the specific user. 3GPP defined Power Control Dynamic Range (PCDR) to guarantee proper BS's performance. In this paper, we propose Adaptive PCDR algorithm. By APCDR algorithm, Radio Network Controller (RNC) can estimate each MS's current state using received signal to interference ratio (SIR). APCDR algorithm changes MS's maximum code channel power based on frame. By proposed scheme, each MS can reduce wireless channel effect and endure outages in cell edge. Therefore, each MS can obtain better QoS. Simulation result indicate that APCDR algorithm show more attractive output than fixed PCDR algorithm.

Proactive Congestion Control for Energy Efficiency of Mobile Device in Ad-hoc Network (Ad-hoc 통신망에서 이동 단말의 에너지 효율성을 고려한 능동적인 혼잡 제어 기법)

  • Cho, Nam-Ho;Lee, Jung-Min;Choi, Woong-Chul;Rhee, Seung-Hyong;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.340-342
    • /
    • 2005
  • 최근 기지국(Base Station)의 도움 없이 이동 단말기(Mobile Device) 간의 다중 무선 홉을 사용하여 송수신자 간의 데이터 전송을 가능하게 하는 Ad-hoc 통신망에 관한 연구가 활발히 진행되고 있다. Ad-hoc 통신망을 구성하는 이동 단말은 이동성을 고려하여 한정된 배터리로 동작을 하게 된다. Ad-hoc 통신망에서 이동 단말은 종단(End Host)으로만 동작하는 것이 아닌 중계 노드(Intermediate Node)로도 동작을 하기 때문에 통신상에 경로를 제공하는 중요한 역할도 한다. 하지만, 현재 인터넷 상에서 광범위하게 사용되고 있는 전송 규약인 TCP(Transmission Control Protocol)는 수동적인(Reactive)혼잡 제어(Congestion Control)방식으로 망의 혼잡으로 인한 패킷 손실 발생 이전까지 전송 윈도우의 크기를 증가 때문에 반복적인 혼잡과 그로 인한 패킷 손실로 인해 불필요한 재전송을 반복하게 된다. 이와 같이 기존 TCP는 무선 통신망에서 동작하는 이동 단말의 한정된 배터리 전원을 고려하지 않고 동작하기 때문에 이동 단말의 에너지를 불필요하게 낭비하는 문제를 가지게 된다. 본 논문은 Ad-hoc 망에서 이동 단말의 에너지 효율을 개선하기 위해 불필요한 재전송 방지 및 망 상태에 따라 전송률을 적절하게 조절하는 TCP의 새로운 혼잡 제어 기법을 제시하였다. 또한 ns-2 시뮬레이터를 이용한 실험을 통해 이동 단말의 에너지 효율이 제안된 혼잡 제어 기법에 의해 향상되었음을 확인하였다.

  • PDF

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.

Load-Aware Cell Selection Method for Efficient Use of Network Resources (효율적 망 자원 이용을 위한 부하 인지 셀 선택 기법)

  • Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2443-2449
    • /
    • 2015
  • Downlink (DL) data rate for a MS is influenced by not only the signal to interference and noise ratio (SINR) but also the amount of radio resources allocated to the MS. Therefore, when a MS uses SINR to select a cell to associate with, it cannot receive the fastest DL data rate all the time if it associates with a congested cell. Moreover, the SINR-based cell selection may result in cell loads unbalance, which decreases the efficiency of a network. To address the issue, we propose a novel cell selection method by considering not only SINR but also a cell load which are combined into two cell selection criteria. One is the maximum achievable data rate and the other is the minimum outage probability. The simulation results show that the cell selection based on the maximum achievable data rate is superior to the SINR-based method and the method using the minimum outage probability in terms of the system efficiency and the fairness in cell loads while the cell selection method based on the minimum outage probability is superior to the others in terms of the outage probability of a MS.

Software Engineering Principles for the Development of Power-Efficient Mobile IoT Devices (파워 효율이 높은 모바일 IoT 단말 개발을 위한 소프트웨어 공학 원칙)

  • Lee, Hyesun;Lee, Kang Bok;Bang, Hyo-Chan
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.762-767
    • /
    • 2015
  • An Internet of Things (IoT) is a system where various "things" are connected to each other via a wired/wireless network, and where information is gathered, processed, and interchanged/shared. One of the important actors in IoT is a mobile IoT device (such as a smartphone or tablet). These devices tend to consume a large amount of power in order to provide various high performance application services; however, as the devices cannot be supplied with power all the time, efficient power management is necessary. Power management of mobile IoT devices involves complex relationships between various entities such as application processors (APs), HW modules inside/outside AP, operating systems, mobile IoT platforms, and applications. In order to develop power-efficient mobile IoT devices, a method is needed to systematically analyze these relationships and manage power based on a clear understanding of them. To address this problem, software engineering principles for the development of power-efficient mobile IoT devices are presented in this paper. The feasibility of the proposed principles have been validated in the domain of smartphone camera power management.

Autonomic Multimedia Transcoding Algorithm for Seamless Streaming Media of Mobile Clients (이동 단말에서 끊임없는 스트리밍 미디어를 위한 오토노믹 멀티미디어 트랜스코딩 알고리즘)

  • Han, Woo-Ram;Heo, Nan-Sook;Park, Chong-Myung;Seo, Dong-Mahn;Jung, In-Bum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.260-270
    • /
    • 2007
  • Owing to the improved wireless communication technologies, it is possible to provide streaming service of multimedia with PDAs and mobile phones in addition to desktop PCs. Since mobile client devices have low computing power and low network bandwidth due to wireless network, the transcoding technology to adapt media for mobile client devices considering their characteristics is necessary. However, since mobile clients use wireless network and the wireless network have less stable bandwidth according to distance from AP and environments, it is hard to support stable QoS to mobile clients. In this paper, we propose a dynamic bit rate control method for transcoding in order to supprot stable QoS of streaming media service to mobile clients via wireless network. The proposed method is shown to serve seamless streaming media service with adaptive bit rate control according to state of wireless network in real time and to reduce transmission failure from experiment.

Android based Mobile Device Rooting Attack Detection and Response Mechanism using Events Extracted from Daemon Processes (안드로이드 기반 모바일 단말 루팅 공격에 대한 이벤트 추출 기반 대응 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.479-490
    • /
    • 2013
  • Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note and Galaxy Tab 10.1. The malicious application can be distributed to currently used mobile devices through open market masquerading as an normal application. An attacker inserts malicious code into an application, which might threaten privacy by rooting attack. Once the rooting attack is successful, malicious code can collect and steal private data stored in mobile terminal, for example, SMS messages, contacts list, and public key certificate for banking. To protect the private information from the malicious attack, malicious code detection, rooting attack detection and countermeasure method are required. To meet this end, this paper investigates rooting attack mechanism for Android-platform mobile terminal. Based on that, this paper proposes countermeasure system that enables to extract and collect events related to attacks occurring from mobile terminal, which contributes to active protection from malicious attacks.

Battery life time extension method in the multi-interfaced terminal by using the network state information (네트워크 상황 정보를 이용한 다중 인터페이스 단말의 배터리 수명 연장 기법)

  • Lee, Jae Kyun;Yun, Dong Geun;Kim, Yong Woon;Choi, Seong Gon
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.19-24
    • /
    • 2012
  • In this paper, we propose the battery life time extension method in the multi-interface terminal by using the state information in an optical wireless integrated network architecture. When the bottlenecks occurs in the network, the terminal receives data packets via multipath. However, the battery life time is rapidly reduced because the power consumption of the terminal is bigger than single interface. For reducing the power consumption in the multi-interface terminal, the Optical Line Terminal (OLT) confirms whether the bottleneck phenomenon is occurred or not. And the network state information is transmitted to the terminal. The terminal turns one of the interfaces off to reduce the power consumption. In order to estimate the performance, we compare the power consumption between single and dual interfaces.

  • PDF

Implementation of Group Management System with Smart Phone Devices and Wireless Sensor Network (스마트폰 및 무선 센서 네트워크를 기반으로 한 그룹관리 시스템의 구현)

  • Lee, Seung-Joon;Jung, Kyung-Kwon;Lee, Hyun-Kwan;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.378-381
    • /
    • 2011
  • The group management system with Wireless Sensor Network and android application is proposed in this paper. The proposed system was composed of personal devices with sensor nodes of WSN, manager device of android platform, and the web server. The sensor node used by each group member send a data packet to the manager device every 2 seconds. The leader device displays and transmits entire information to the web server. The web server represents these information through web page. Therefore, guardians can assure their group member's safety and security on the web page. The RSSI value of each sensor node converted by computed log-normal path loss model into distance value and displays on the manager device and the web page.

  • PDF