• Title/Summary/Keyword: 무선통신망

Search Result 899, Processing Time 0.024 seconds

A Security Design for a Smart Power Grid Field Test based-on Power IT Systems (전력 IT 기반스마트 파워그리드 실증 보안 체계 설계)

  • Lee, Myung-Hoon;Bae, Si-Hwa;Son, Sung-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2497-2506
    • /
    • 2010
  • Smart power grid is targeting to improve grid operation by integrating existing power IT technologies in the jeju smart grid field test. Real-time two-way communication and interoperability in power grid are essential to smart power grid. Adopting smart grid will increase security vulnerabilities in power grid by increasing the number of wireless sensors and the chances of the external exposure of communication networks. In addition, hackers can cause chaos in the power grid system with eavesdropping and forgery attacks in communication networks. Smart power grid is one of the most important systems in deploying smart grid, and it is important to design security system systematically since smart grid can be seriously damaged when problem occurs. In this paper, local and global smart grid security standard and security vulnerabilities in power grid are reviewed, and 2 level smart grid service model is proposed.

Improved Mobility Management and Multicast Protocols for Mobile Hosts (이동 호스트를 위한 개선된 이동성 관리 및 멀티캐스트 프로토콜)

  • Cha, Yeong-Hwan;Seong, Hyeon-Gyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.1
    • /
    • pp.81-94
    • /
    • 1995
  • By intergrating technologies for protable computers, radio communications, and computer networking, the Land Mobile Computer Network(LMCN) is supposed to overcome the time and space limitation of present computer communication network. However, because the MHs(mobile hosts) do move any time, the network connectivity is often changed causing temporarily duplicated lost, or out-of-sequenced message delivery as well as frequent communications for maintainning the network connectivity. Previous works solved the problems through message flooding, used also in multicasting, resulting in high communication cost(i.e., number of communication messages). In this paper, new protocols for efficient mobility management and multicasting are proposed. The protocols define location update, handover, and multicasting procedure of a MH over a hierarchical LMCN architecture. The protocol specification is presented, and it is shown that the communication cost of the new protocols is superior to the existing ones in terms of the communication cost.

  • PDF

A New Bandwidth Allocation Scheme for Hard Real-time Communication on Dual IEEE 802.11 WLANs (이중 IEEE 802.11 WLAN에서 경성 실시간 통신을 위한 대역폭 할당)

  • Lee, Jung-Hoon;Kang, Mi-Kyung
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.633-640
    • /
    • 2005
  • This paper proposes and analyzes a message scheduling scheme and corresponding bandwidth allocation method for the hard real-time communication on dual standard 802.11 Wireless LANs. By making the superframeof one network precede that of the other by half, the dual network architecture can minimize the effect of deferred beacon and reduce the worst case waiting timeby half. The effect of deferred beacon is formalized and directly considered to decide the polling schedule of PCF phase. Simulation results executed via ns-2 show that the proposed scheme can improve the schedulability by 3$36\%$ for real-time messages and give $9\%$ more bandwidth to non-real-time messages for the given stream sets, compared with the network whose bandwidth is just doubled with the same MAC.

Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication (IPsec VPN 위성통신에서 인증알고리즘이 미치는 영향 분석)

  • Jeong, Won Ho;Hwang, Lan-Mi;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.147-154
    • /
    • 2015
  • Satellite broadcasting networks, like if you have if you have just received information that everyone must bring the required security attributes this earth should be done as encryption. In this paper, a satellite communication network AH additional security header in transport mode IPsec VPN by applying the SHA-256 and MD-5 authentication algorithm to authenticate the data portion Error rate and analyze the BER and Throughput. First, to generate a normal IP packet added to IPsec transport mode security header AH were constructed internal authentication data by applying the SHA-256 and MD-5 algorithm. Channel coder was applied to the Rate Compatible Punctured Turbo Codes, packet retransmission scheme Hybrid-ARQ Type-II and Type-III were used. Modulation method was applied to the BPSK, the wireless channel Markov channel (Rician 80%, Rayleigh 20% and Rician 90%, Rayleigh 10%) as an authentication algorithm according to the satellite channel state analyzed how they affect the error rate and Throughput.

A Study of LMDS System Structure and Link Budget Analysis Against Output Power Variation of HUB Station In KOREA Environment (국내환경 LMDS 시스템의 구조와 기지국 출력 변화에 따른 링크버짓 분석)

  • Youm, Jee-Woon;Choi, Kwang-Joo;Oh, Sung-Hwan
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.6
    • /
    • pp.1-12
    • /
    • 1999
  • This paper illustrates and analyzes system structure, link budget and cell coverage to accommodate Korea environment about LMDS systems that are expected to play an important role as the future wireless infrastructure of the information superhighway. In the mean time, many parameters used for the analysis apply to the allocated frequency bandwidth (Up-stream : 24.25GHz-24.75GHz, Down-stream : 25.5GHz-27.5GHz) of Ministry of Information and Communication. The modem and channel coding must be developed to accommodate specifications of DAVIC protocol. The materials about atmospheric phenomena refer to apply specifications of ITU-R. This paper will be need to disign the network structure and system configuration of LMDS system.

  • PDF

Study on the Next Disaster Safety Communication Network in M2M Communication (사물지능통신을 이용한 차세대 재난안전통신망에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.585-590
    • /
    • 2011
  • In the past few years, M2M (Machine-to-Machine) applications have become a hot topic in the wireless industry. While M2M applications can be used for many purposes (smart homes, smart metering/electricity meter reading, fleet management, mobile workforce, automobile insurance, vending machines, etc), and in many sectors (healthcare, agriculture, commercial, industrial, retail, utility, etc.), smart metering applications or smart grids present the biggest growth potential in the M2M market today. M2M platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. The promising technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. In this paper the information communication technique based on the disaster prevention system's for the M2M, concepts and its requirement technology and application are studied.

End-to-End Digital Secure Speech Communication over UHF and PSTN (UHF와 PSTN간 단대단 디지털 음성보안통신)

  • Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.5
    • /
    • pp.2313-2318
    • /
    • 2012
  • With the widely applications of tactical radio networks, end-to-end secure speech communication in the heterogeneous network has become a very significant security issue. High-grade end-to-end speech security can be achieved using encryption algorithms at user ends. However, the use of encryption techniques results in a problem that encrypted speech data cannot be directly transmitted over heterogeneous tactical networks. That is, the decryption and re-encryption process must be fulfilled at the gateway between two different networks. In this paper, in order to solve this problem and to achieve optimal end-to-end speech security for heterogeneous tactical environments, we propose a novel mechanism for end-to-end secure speech transmission over ultra high frequency (UHF) and public switched telephone network (PSTN) and evaluate against the performance of conventional mechanism. Our proposed mechanism has advantages of no decryption and re-encryption at the gateway, no processing delay at the gateway, and good inter-operability over UHF and PSTN.

A Study on the Smart Printing Work Distribution Program to Increase the Efficiency of Managing Multiple Printers (복수의 프린터 관리효율을 증가시키기 위한 스마트한 인쇄작업 분배 프로그램 구현에 관한 연구)

  • Oh, Eun-Yeol
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.1-8
    • /
    • 2019
  • Generally, printers are common for users to use for public use over a wired or wireless local area network. The number of printers in the same network is increasing, and management of multiple printers is needed. To do this, a program that drives two or more printers and a computer connected by a wired or wireless network. When a computer's control department receives a print command for a designated file, it executes the steps of receiving status information from the printer, selecting the printer, and sending the print command execution. As a method of research, we presented a method for selecting differentiation from this study through prior art research and literature research. Therefore, the purpose of the study is to distribute smart print commands according to real-time status information of many printers to increase the efficiency of the printer's management, and to distribute print commands according to the cumulative and usable workload of many printers so that parts replacement of many printers can be instantaneously performed.

Heterogeneous Network Gateway Architecture and Simulation for Tactical MANET (전술 에드혹 환경에서 이종망 게이트웨이 구조 및 시뮬레이션 연구)

  • Roh, Bong Soo;Han, Myoung Hun;Kwon, Dae Hoon;Ham, Jae Hyun;Yun, Seon Hui;Ha, Jae Kyoung;Kim, Ki Il
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.97-105
    • /
    • 2019
  • The tactical mobile ad-hoc network(MANET) consists of distributed autonomous networks between individual ground nodes, which is effective in terms of network survivability and flexibility. However, due to constraints such as limited power, terrain, and mobility, frequent link disconnection and shadow area may occur in communication. On the other hand, the satellite network has the advantage of providing a wide-area wireless link overcoming terrain and mobility, but has limited bandwidth and high-latency characteristic. In the future battlefield, an integrated network architecture for interworking multi-layer networks through a heterogeneous network gateway (HNG) is required to overcome the limitations of the existing individual networks and increase reliability and efficiency of communication. In this paper, we propose a new HNG architecture and detailed algorithm that integrates satellite network and the tactical MANET and enables reliable data transfer based on flow characteristics of traffic. The simulations validated the proposed architecture using Riverbed Modeler, a network-level simulator.

A Study of TCP LINK based Real-Time Secure Communication Research in the Ocean (해상에서 실시간 TCP 링크관절 보안통신 연구)

  • Yoo, Jaewon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.250-253
    • /
    • 2014
  • Due to limited resource, marine communication is severely limited when compared to communications in land. Radio relay facilities, etc. based on a wired network through a long distance communication is possible. In addition, the aircraft is in the air, the ground-based network service based on long-range straight-line distance and elevation (LOS: Line of Sight) communications. On the other hand, the distance in a straight line to the sea, the sea level because communication is limited or through satellite, underwater communications relay equipment installed in the communication scheme has been investigated.. In this paper, using TCP-based real-time joint maritime security communication links were studied. Harsh marine environment, real-time communication that can provide secure communications and propose a LINK joint. In this study, more secure, and convenient communications at sea, a plan was presented to you.

  • PDF