• Title/Summary/Keyword: 무선 정보 서비스

Search Result 3,149, Processing Time 0.031 seconds

Design and Performance Analysis of Cost-Effective and Fast Inter-Domain NEMO Scheme with Multicasting Support (멀티캐스팅 지원의 비용효과적인 도메인간 빠른 NEMO 기법의 설계 및 성능분석)

  • Han, Sunghee;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.87-98
    • /
    • 2012
  • In recent years, there are many data and multimedia services that are supported by WiFi-enabled mobile devices. As a result, the demand for the ability to connect to the Internet anywhere is rapidly increasing and network infrastructure is becoming increasingly important. The design of cost-efficient network mobility (NEMO) protocol is intended to reduce the demand for limited wired/wireless network bandwidth at the signaling of mobility support and packet delivery operations. In this paper, we propose a cost-effective inter-LMA domain mobility management scheme which provides fast handover with multicasting support in NEMO environments. And our Fast PR-NEMO scheme is compared with N-PMIPv6, rNEMO, and PR-NEMO. In conclusion, our proposed scheme shows the best performance in terms of location updating cost, and packet tunneling cost.

A Case Study on Mobile Advertisement Injection (모바일 광고 인젝션 사례 연구)

  • Cho, Sanghyun;Heo, Gyu;Choi, Hyunsang;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1049-1058
    • /
    • 2017
  • The rapid evolution of mobile technologies and proliferation of mobile devices have created a new channel for marketing by mobile advertising. As mobile advertising is a close relative to online advertising, it also has similar problems such as advertisement injections (Ad injections). Users are exposed to unwanted advertisements and redundant web traffic by injected ads can cause additional charges of mobile devices. Although mobile ad injection can cause many problems it has been merely studied. In this paper, we analyze ad injection activities by mobile applications that exploit a legitimate application (Naver mobile application). We reverse-engineered 2 mobile applications and find out characteristics of mobile ad injections. We compare mobile ad injections with online ad injections and suggest feasible mitigations.

Design of Antenna for Beam Scanning for Dual-Band base station (이중대역 기지국용 빔 스캔 안테나 설계)

  • Ko Jin-Hyun;Jang Jae-Su;Ha Jae-Kwon;Park Sae-Houn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.632-636
    • /
    • 2006
  • It is needed to use the beam scanning to control the cell coverage of the base station considering operation conditions, season, time period, radiation character and mobility of customers and vehicles for varied wireless communication service and quality improvement. This paper proposes a mobile antenna system which can obtain the characteristics of the beam scanning by controlling the directivity depending on the operation condition. Radiation block is made of 2 sub-array of $1\times3$ patched antennas for ITS of 5.8GHZ bandwidth with the gain of 13dBi, and of 2 sub-array of single patched antenna for WiBro of 2.3GHZ bandwidth with the gain of 12dBi. RF module is made of a switch, an amplifier, a PAD, a 3-Bit phase shifter, and a power divider. The system is able to control the beam tilting with electronic methode by using 3-bit phase shifter$(45^{\circ},\;90^{\circ},\;180^{\circ})$.

  • PDF

A study of performance improvement scheme in MIPv6 based on Ad-hoc (Ad-hoc 기반 MIPv6망에서 성능향상 기법 연구)

  • Jo Young-Jun;Ye Hwi-Jin;Moon Tae-Wook;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.402-405
    • /
    • 2006
  • Mobile IP has been designed to have mobile host users move from place to plate without changing their IP address. Ad-hoc network is a provisional network whose mobile host users construct networks by themselves without any assistance of infra structure network, using wireless interface. In this paper we discuss the scheme with which Ad-hoc network users ran access the Internet freely, using mobile IP protocol, and Ad-hot networks are access networks in the spotlight. In this paper we propose algorithm that support enhanced mobility between two Ad-hoc networks applying mobile IP at Ad-hoc routing protocol.

  • PDF

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

The Efficient AES-CCM Architecture for a hardware library in the WAVE (WAVE 하드웨어 암호 라이브러리에 적합한 효율적인 AES-CCM 구조 설계)

  • Lee, Yeon-Cheol;Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2899-2905
    • /
    • 2013
  • According to developing wireless communications in vehicle, various security threat in the WAVE(Wireless access in vehicular environments) is increased. To protect this, IEEE 1609.2 specify services as for prevent message from attacks such as spoofing, eavesdropping and replay. It is possible to implement a hardware library for defending these attacks. In this paper, we proposed a efficient AES-CCM architecture for the hardware library in the WAVE. We compare our architecture to the previous one in the same FPGA. And our design uses less slices than 27 % of it and less slices than 45 % of it if we share registers that were used by other modules in the library. We also achieves a throughput of 1355 Gbits/s in xc5vlx110t-2ff1136.

An Efficient Resource Allocation Algorithm for Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크를 위한 효율적인 자원할당 알고리즘)

  • Hwang, Jeewon;Cho, Juphil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2769-2774
    • /
    • 2013
  • The key of USN(Ubiquitous Sensor Network) technology is low power wireless communication technology and proper resource allocation technology for efficient routing. The distinguished resource allocation method is needed for efficient routing in sensor network. To solve this problems, we propose an algorithm that can be adopted in USN with making up for weak points of PQ and WRR in this paper. The proposed algorithm produces the control discipline by the fuzzy theory to dynamically assign the weight of WRR scheduler with checking the Queue status of each class in sensor network. From simulation results, the proposed algorithm improves the packet loss rate of the EF class traffic to 6.5% by comparison with WRR scheduling method and that of the AF4 class traffic to 45% by comparison with PQ scheduling method.

Implementation of VLC transceiver module using USB OTG (USB OTG를 이용한 VLC 송·수신 모듈 구현)

  • Lee, Jong-Sung;Lee, Dae-Hee;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.668-670
    • /
    • 2017
  • Visible Light Communication, which is promising as a next generation near field wireless communications, has been increased study and application case due to the development of LED technology. However, there are few application cases to IoT service due to the necessity of separate equipment for communication and limitation of light transmission to obstacles. In this paper, it propose a portable VLC transceiver module that can be connected to USB OTG and dedicated application for control to realization position possible necessary technique. The string input from the dedicated application is sent to the VLC module via USB OTG to transmit and receive data between the modules. As string transmission experiment result, it is confirmed that ASCII code transmission between VLC transceiver modules is possible through control of the implemented dedicated application.

  • PDF

Design of Worker's Safety Management System by Monitoring Work Location and Sensing Danger Zones (위험구역 접근 센싱 및 작업위치 모니터링을 이용한 작업자 안전관리 시스템 설계)

  • Min, So-Yeon;Lee, Kwang-Hyoung;Park, Jeong-Hyo;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3236-3244
    • /
    • 2011
  • Negligent accidents are often caused by risk factors of working environment at most construction sites and construction schedules are delayed as the workers' work location and construction progress are not figured out accurately, and this leads to a lot of loss. In this paper, with the object of solving the problems at construction sites, RFID portable device, active tag and wireless RFID reader to provide the status of workers which is based on location are designed in order to send information about the location of workers and work progress in real time to a personal RFID device. Also an application system to monitor workers' approaching to prevent accidents from vehicles and danger zones and to manage the real time location of workers is designed.

User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network (의료 센서 네트워크에서 휴대폰을 이용한 사용자 인증 및 안전한 데이터 통신 방안)

  • Kim, Jee-Hyun;Doh, In-Shil;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Wireless sensor network provides services anytime and anywhere they are requested. Especially, medical sensor network based on biosensors is applied a lot to biotechnology and medical engineering. In medical sensor network, people can make their health checked at home free from temporal and spatial constraints. In ubiquitous healthcare environment, people can get instant help even in the emergency, and in hospital, patients can be taken care of efficiently. In this environment, health and life related data are delivered, and the privacy and security of personal data are very important. In this paper, we propose user authentication and data communication mechanism in two modes, normal and urgent situation using cellular phone. Through our proposal, data can be transferred in quick and secure manner.