• Title/Summary/Keyword: 무선 정보 서비스

Search Result 3,149, Processing Time 0.031 seconds

The Study of End-to-End QoS Providing Technique in Mobile IPv6 Network Based on IEEE 802.11e (IEEE 802.11e기반 Mobile IPv6망에서 End-to-End QoS 보장 기술에 관한 연구)

  • Ye, Hwi-Jin;Kim, Moon;Son, Sung-Chan;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.573-577
    • /
    • 2005
  • Recently there are increasing needs for Internet and various kinds of contents. These traffics for various contents need more amount of data to provide high-quality information and require various QoS depending on the characteristics of contents. However, current Internet service supports BE (Best Effort) service only, therefore IntServ (Integrated Service) scheme and DiffServ (Differentiated Service) scheme are represented to support QoS in IP layer. Moreover, while wireless Internet is getting popular, MAC(Medium Access Control)is also becoming important. This is due to the fact that wireless access, resource allocation and packet scheduling, which are done in another layers before, are performed in MAC layer in many new wireless systems. This paper describes new scheme that provides QoS taking into account the traffic characteristics over Mobile IPv6 network based on IEEE 802.11e EDCF and evaluates the performance through computer simulation.

  • PDF

Optimized Spectrum Pooling by Inventory Model (인벤토리모델을 이용한 스펙트럼풀링 최적화)

  • Byun, Sang-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2664-2669
    • /
    • 2014
  • Recently, many research efforts have paid attention to spectrum pooling meshanism that provides efficient way to manage transient spectrum requests of secondary users in cognitive radio networks. Spectrum pooling is maintained by WSP (wireless service provider). WSP leases the spectrums stored in her spectrum pool to secondary users with being paid for it. It is natural that WSP tries to get profits as much as possible, which implies the WSP tries to minimize the cost required for maintaining her spectrum pool. In this paper, we model the spectrum pool into a probabilistic inventory model. Assuming secondary users' spectrum requests follow normal distribution, we give a strategic way that minimizes the maintenance cost of the spectrum pool. By a series of simulations, we show that WSP can reduce the total maintenance cost through our inventory model-based spectrum pooling than maintaining fixed inventory level.

Location Error Compensation in indoor environment by using MST-based Topology Control (MST 토폴로지를 이용한 실내 환경에서의 위치측정에러의 보상기법)

  • Jeon, Jong-Hyeok;Kwon, Young-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1926-1933
    • /
    • 2013
  • Many localization algorithms have been proposed for Wireless Sensor Networks (WSNs). The IEEE 802.15.4a-based location-aware-system can provide precise ranging distance between two mobile nodes. The mobile nodes can obtain their exact locations by using accurate ranging distances. However, the indoor environments contain various obstacles which cause non-line-of-sight (NLOS) conditions. In NLOS condition, the IEEE 802.15.4a-based location-aware system has a large scale location error. To solve the problem, we propose location error compensation in indoor environment by using MST-based topology control. Experimental and simulation results show that the proposed algorithm improves location accuracy in NLOS conditions.

The Analysis on the Interference Effects from GSO Satellites into HAPS Ground station (GSO 위성으로부터 HAPS 지상국에 미치는 간섭 영향 분석)

  • 강영흥;최문환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.523-528
    • /
    • 2004
  • The bands 27.5 ∼ 28.35GHz and 31.0 ∼ 31.3GHz were allocated to the High Altitude Platform Station in WRC-2000. However, since these bands were already allocated to the existing fixed-satellite service, the analysis on the interference effects between the existing FSS/GSO system and FS/HAPS system should be needed. To do study on the interference effects between above two systems, we can consider two frequency operational conditions, one is the Reverse mode and the other Forward mode. In this paper, we considered the Forward mode as the frequency operational condition and analyzed the interference effect from a number of GSO satellites to HAPS ground station due to the I/N values, the latitude of HAPS and the satellite separation. In future, these results will be vital data to share between HAPS and GSO systems.

Analysis Third-dimension Turbo Code for DVB-RCS Next Generation (DVB-RCS Next Generation을 위한 Third-dimension Turbo Code 분석)

  • Park, Tae-Doo;Kim, Min-Hyuk;Jung, Ji-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.279-285
    • /
    • 2011
  • The next generation wireless communication systems are required high BER performance better than present performance. Double binary Turbo code have error floor at high SNR, so it cannot be used in next generation wireless communication system. Therefore, many methods are proposed for overcome error floor at DVB-RCS NG(next generation). In this paper, we analysis structure of third-dimension Turbo code(3D-turbo code). 3D-Turbo code overcomes error flow by additive post-encoder in conventional DVB-RCS Turbo code. Performance of 3D-Turbo code is changed by post-encoder form, interleaving method, value of ${\lambda}$. So we are simulated by those parameter and proposed optimal form. By a result, performance of 3D-Turbo is better than conventional DVB-RCS Turbo code and it overcome error floor of conventional DVB-RCS Turbo code.

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

An Inventory Model-based Spectrum Pooling in Cognitive Radio Networks (인벤토리모델을 이용한 인지무선네트워크에서 스펙트럼풀링)

  • Byun, Sang-Seon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.338-341
    • /
    • 2014
  • Recently, many research efforts have paid attention to spectrum pooling meshanism that provides efficient way to manage transient spectrum requests of secondary users in cognitive radio networks. Spectrum pooling is maintained by WSP (wireless service provider). WSP leases the spectrums stored in her spectrum pool to secondary users with being paid for it. It is natural that WSP tries to get profits as much as possible, which implies the WSP tries to minimize the cost required for maintaining her spectrum pool. In this paper, we model the spectrum pool into a probabilistic inventory model. Assuming secondary users' spectrum requests follow normal distribution, we give a strategic way that minimizes the maintenance cost of the spectrum pool. By a series of simulations, we show that WSP can reduce the total maintenance cost through our inventory model-based spectrum pooling than maintaining fixed inventory level.

  • PDF

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

Learning data preprocessing technique for improving indoor positioning performance based on machine learning (기계학습 기반의 실내 측위 성능 향상을 위한 학습 데이터 전처리 기법)

  • Kim, Dae-Jin;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1528-1533
    • /
    • 2020
  • Recently, indoor location recognition technology using Wi-Fi fingerprints has been applied and operated in various industrial fields and public services. Along with the interest in machine learning technology, location recognition technology based on machine learning using wireless signal data around a terminal is rapidly developing. At this time, in the process of collecting radio signal data required for machine learning, the accuracy of location recognition is lowered due to distorted or unsuitable data for learning. In addition, when location recognition is performed based on data collected at a specific location, a problem occurs in location recognition at surrounding locations that are not included in the learning. In this paper, we propose a learning data preprocessing technique to obtain an improved position recognition result through the preprocessing of the collected learning data.