• Title/Summary/Keyword: 무선 정보 서비스

Search Result 3,152, Processing Time 0.025 seconds

Neighbor Discovery Scheme based on Spatial Correlation of Wireless Channel (무선채널의 공간적 연관성을 이용한 주변단말 탐색방안)

  • Lee, Woongsup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2256-2262
    • /
    • 2015
  • Recently, device-to-device (D2D) communication has been considered as key technology for future cellular system, because it can solve the problem of excessive data traffic increment and can also provide new communication services. Herein, we propose new neighbor discovery for D2D communication and examine its performance. Our proposed scheme is proximity beacon based discovery in which wireless resource for pilot transmission is assigned based on the spatial correlation of wireless channel and sensing period is adjusted according to target accuracy such that power consumption can be reduced. The performance of our propose scheme is analyzed mathematically and verified through computer simulations.

A Study on the Approaches to Interconnection Regulation for MVNO (주요국 MVNO 상호접속제도 연구)

  • Cho, Eun-jin;Byun, Jae-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.498-500
    • /
    • 2012
  • MVNOs(Mobile Virtual Network Operator) provide mobile services without the own spectrum license and they lease the wireless networks from mobile network operators. They provide more covered service simple resellers have served. Most of MVNO provided in Korea have facilities related to subscribers not lines and switches. Therefore interconnection between MVNO and the other operators is performed by mother mobile operators. Recently following to reform the Business Act of Telecommunications, MVNOs are allowed to interconnect directly to others and there are concerning problems to this. This paper reviewed the status of MVNO regulations for major countries and draw from implications for establishing the MVNO regulations in Korea.

  • PDF

Communication Protocol to Support Mobile Sinks by Multi-hop Clusters in Wireless Sensor Networks (무선 센서 네트워크에서 멀티-홉 클러스터를 통한 이동 싱크 지원 통신 프로토콜)

  • Oh, Seung-Min;Jung, Ju-Hyun;Lee, Jeong-Cheol;Park, Ho-Sung;Yim, Yong-Bin;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3A
    • /
    • pp.287-295
    • /
    • 2010
  • In wireless sensor networks(WSNs), the studies that support sink mobility without global position information exploit a Backbone-based Virtual Infrastructure (BVI) which considers one-hop clusters and a backbone-based tree. Since the clusters of a sink and a source node are connected via flooding into the infrastructure, it causes high routing cost. Although the network could reduce the number of clusters via multi-level clusters, if the source nodes exist at nearest clusters from the cluster attached by the sink and they are in different branches of the tree, the data should be delivered via detour paths on the tree. Therefore, to reduce the number of clusters, we propose a novel multi-hop cluster based communication protocol supporting sink mobility without global position information. We exploit a rendezvous cluster head for sink location service and data dissemination but the proposed protocol effectively reduces data detour via comparing cluster hops from the source. Simulation shows that the proposed protocol is superior to the existing protocols in terms of the data delivery hop counts.

Anti-Spam for VoIP based on Turing Test (튜링 테스트 기반으로 한 VoIP 스팸방지)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.261-265
    • /
    • 2008
  • As increasing the user of VoIP service using ITSP(Internet Telephony Service Provider), the VoIP spam becomes a big problem. The spam used in the existing public telephone is detected by using the pattern inspection of call behavior because it is difficult to filter contents for the characteristic of real-time voice communication. However there is a false-positive problem. The threat on spam remains where spam with low threshold can't be detected or users share one number. In this paper, we propose anti-spam for VoIP based on luring test. The proposed method gives a user luring test and he/she can connect to a receiver if passing turing test. A ticket is given to a user that pass luring test and it reduces overhead of luring test in re-dial. The proposed method is implemented on ASUS WL-500G wireless router and Asterisk IP-PBX. Experimental results show the effectiveness of the proposed method.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Interference Analysis based on System Level Simulation in LTE Networks (LTE 네트워크에서 시스템 레벨 시뮬레이션 기반 인접 대역간 간섭 분석)

  • Ban, Tae Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2411-2417
    • /
    • 2012
  • Globally, the emergence of smart phones vitalized the ecosystem of mobile data service industry. Consequentially, mobile data traffic has been explosively growing and the speed of growth will be more steep. New spectrum will be required in order to properly accommodate the explosively growing mobile data traffic. However, it will be difficult to acquire a sufficient guard band between different frequency bands because the range of frequency which is suitable for wireless communications is limited. Thus, the performance degradation caused by inter-band interference will be one of challenging problems in the next generation mobile communication systems. In this paper, we analyze the performance degradation caused by inter-band interference by computer simulations in various environments. Our results show that the impact of the inter-band interference is more critical when own signal is poor or its own interference from neighboring cells is low.

A Concurrency Control Method using Optimistic Control in Mobile Computing DB Environment (모바일 컴퓨팅 데이터베이스 환경에서의 낙관적 제어기법을 이용한 동시성제어기법)

  • Cho Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.131-143
    • /
    • 2006
  • The rapid growth of mobile communication technology has provided the expansion of mobile internet services, particularly mobile realtime transaction takes much weight among mobile fields. Current mobile transaction service has serious problems which check its development, such as low bandwidths, hand over, expensive charge system, and low response time. but, There is an increasing demand for various mobile applications to process transactions in a mobile computing fields. In mobile computing environments. A mobile host computing system demands for new concurrency control method to use the bandwidth efficiently, to improve the bottleneck and the response time of transactions. This study suggests about an efficient concurrency control in a mobile computing environment. Concurrency control method in existing method uses two phases locking method. In this method, Many clients can't use the same segment simultaneously, and so useless waiting time increases. The characteristic of this proposed method unlike existing one, Enable the transaction approaching different data in the same segment to minimize the useless waiting time by permitting segments, and therefore improves the coexistence of system. Also, It shows the algorithm of the proposed concurrence control method.

  • PDF

Vertical Handover Framework for Maritime Multi-band Networks (해상 멀티대역 네트워크를 위한 수직 핸드오버 프레임워크 설계)

  • Cho, A-Ra;Yun, Changho;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2847-2856
    • /
    • 2014
  • It is necessary for maritime multi-band networks, which provide ships with diverse and seamless multimedia services, to perform vertical handover. As IEEE 802.21 WG has standardized vertical handover technologies for terrestrial wireless networks that do not consider VHF, HF, satellite networks, they cannot be directly applied to maritime multi-band networks. In this paper, the vertical handover framework for use in maritime mutlti-band networks is proposed, which includes the logical architecture, the communication reference model, re-defined handover primitives, and the handover process. The proposed vertical handover for maritime multi-band network can be applied in the ocean alone, as well as to the heterogeneous wireless networks which embrace both terrestrial and maritime networks.

Distributed Time Division Piconet Coexistence Using Local Time Offset Exchange (로컬 오프셋을 이용한 분산 시간 분리 피코넷 충돌회피 방법론)

  • Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1447-1453
    • /
    • 2014
  • Wireless Body Area Networks (WBAN), standardized as IEEE 802.15.6, enable digital devices on/around the human body to communicate with one another. WBAN is essentially a person's piconet consisting of a master (mobile) device and several slave devices, which follows his/her mobility pattern, and hence, occasionally collides with another piconet as people meet or pass by. As such, a mechanism to detect collision and avoid interference is needed for intra-piconet communications. In this paper, we focus on this notorious problem of piconet collision and propose Distributed Time Division Piconet Coexistence (DTDPC) using local time offset exchange as a simple, attractive solution. The proposed DTDPC provides different level of services for various applications. Besides our simulation results have shown that the proposed solution outperforms the conventional CSMA protocols.