• Title/Summary/Keyword: 무선 PCS

Search Result 115, Processing Time 0.025 seconds

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Transcoding Load Estimation Method for Load Balance on Distributed Transcoding Environments (분산 트랜스코딩 환경에서 부하 균형을 위한 트랜스코딩 부하 예측 기법)

  • Seo, Dong-Mahn;Heo, Nan-Sok;Kim, Jong-Woo;Jung, In-Bum
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.466-475
    • /
    • 2008
  • Owing to the improved wireless communication technologies, it is possible to provide streaming service of multimedia with PDAs and mobile phones in addition to desktop PCs. Since mobile client devices have low computing power and low network bandwidth due to wireless network, the transcoding technology to adapt media for mobile client devices considering their characteristics is necessary. Transcoding servers transcode the source media to the target media within corresponding grades and provide QoS in real-time. In particular, an effective load balancing policy for transcoding servers is inevitable to support QoS for large scale mobile users. In this paper, the transcoding load estimation algorithm is proposed for load balance on the distributed transcoding environments. The proposed algorithm estimates transcoding time from transcoding server information, movie information and target transcoding bit-rate. The estimated transcoding time is proved based on experiments.

Channel Selection Scheme to Improve the Performance of Zigbee Networks over WLAN Interference Environment (무선랜 간섭 환경에서 지그비 네트워크 성능 개선을 위한 채널 선택 기법)

  • Son, Jong-In;Chung, Kwang-Sue
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.2
    • /
    • pp.102-110
    • /
    • 2012
  • ZigBee networks developed for low power and short range communication are being used as home network solution for ubiquitous computing. However, as smart phones and tablet PCs have been widely used, WLANs which use same frequency with ZigBee networks have been increasingly used. Therefore, radio frequency interference causes many problems. To solve radio frequency interference problem among ZigBee networks and WLANs, many researches focus on designing interference minimization schemes in ZigBee networks. However, existing schemes have problems that have waste of resource for detecting interference, and have unnecessary time to avoid interference. In this paper, we propose an interference minimization scheme to solve radio frequency interference in ZigBee networks. The proposed scheme detects interference using ACK mechanism to reduce waste of resource, and avoids interference using table driven channel hopping scheme which is faster than existed schemes. The performance of proposed interference minimization scheme is evaluated by using OPNET simulator. Through the simulation result, we prove that proposed scheme has faster channel hopping than existing schemes.

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

Design and Implementation of a Bluetooth Baseband Module with DMA Interface (DMA 인터페이스를 갖는 블루투스 기저대역 모듈의 설계 및 구현)

  • Cheon, Ik-Jae;O, Jong-Hwan;Im, Ji-Suk;Kim, Bo-Gwan;Park, In-Cheol
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.98-109
    • /
    • 2002
  • Bluetooth technology is a publicly available specification proposed for Radio Frequency (RF) communication for short-range :1nd point-to-multipoint voice and data transfer. It operates in the 2.4㎓ ISM(Industrial, Scientific and Medical) band and offers the potential for low-cost, broadband wireless access for various mobile and portable devices at range of about 10 meters. In this paper, we describe the structure and the test results of the bluetooth baseband module with direct memory access method we have developed. This module consists of three blocks; link controller, UART interface, and audio CODEC. This module has a bus interface for data communication between this module and main processor and a RF interface for the transmission of bit-stream between this module and RF module. The bus interface includes DMA interface. Compared with the link controller with FIFOs, The module with DMA has a wide difference in size of module and speed of data processing. The small size module supplies lorr cost and various applications. In addition, this supports a firmware upgrade capability through UART. An FPGA and an ASIC implementation of this module, designed as soft If, are tested for file and bit-stream transfers between PCs.

Research Dual Band Power Amplifier using PBG Structure (PBG 구조를 이용한 Dual Band 전력증폭기 연구)

  • 전익태;서철헌
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.8
    • /
    • pp.788-793
    • /
    • 2004
  • This paper proposes new configuration for the dual power amplifier that operates at 5.8 GHz for the wireless LAN and 1.8 GHz for the PCS. It dose not select the input signal but amplify the dual band signals simultaneously. Broadband diplexer is used at the input to separate the dual band signals. Output power of each amplifier is 1 W. The PBG is employed to improve the performance of power amplifier. Generally, the PBG is employed at the end of output matching network. But in this paper, the PBG is employed in the load pull output matching circuit of amplifer to maximize the output power.

Implementation of the Monitoring System for Power Condition System(PCS) using a Smartphone and Bluetooth Communication (스마트폰과 블루투스 통신을 이용한 태양광 인버터 모니터링 시스템 구현)

  • Je, Hyun-Woo;Yang, Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2185-2191
    • /
    • 2012
  • The monitoring of the existing inverter is being implemented using a local computer of web monitoring, but in this paper, the remote monitoring system of the power condition system was implemented using a Bluetooth communication at a convenient position for the user that can be monitored without the computer. The proposed system was designed to be able to monitor the wanted information by using the protocol of inverter. Also when the power condition system has failed, the fault history and the generated time of inverter were stored in the Bluetooth device. Finally the performance of the proposed system was evaluated through experiments, it showed the good performance and the possibility of commercialization.

The Design and Implementation of CE-OQPSK using NLF for Wideband PCS (NLF를 이용한 광대역 PCS용 CE-OQPSK의 설계 및 제작)

  • Bang, Sung-Il;Jang, Hong-Ju
    • Journal of IKEEE
    • /
    • v.1 no.1 s.1
    • /
    • pp.164-175
    • /
    • 1997
  • In this paper, the CE-OQPSK that has constant envelope was designed for applying PSK to the nonlinear amplifier so as to improve power efficiency. For this realization. ROM and D/A converter that have relative low power consumption were used. As a result of comparing the PSD (Power spectrum density) of CE-OQPSK with that of conventional OQPSK through simulation for estimating the performance. In case of correlation factor ${\alpha}$ = 0.707. the improvement of bandwidth efficiency of 5% and 20% is achieved in the main lobe and the sidelobe, respectively. And, in case additional bandwidth-limiting-filter is added, it can be shown that the PSD of CE-OQPSK meet the FCC wireless LAN spectrum specification.

  • PDF

Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps (안드로이드 은행앱의 동적 가상키보드에 대한 취약점 및 대응방안)

  • Cho, Taenam;Choi, SookHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.1
    • /
    • pp.9-16
    • /
    • 2019
  • Smartphones are becoming a portable computer. As a result, even the most sensitive financial application services are now available anywhere on the smartphone. Compared to general PCs, smartphones communicate with external devices through various channels such as wireless internet, mobile communication network, Bluetooth, and NFC, and a wide variety of applications are provided. Therefore, if vulnerabilities exist, the possibility of attack damage increases. In this paper, we analyze the vulnerabilities of dynamic virtual keyboards used in login of banking apps of smartphones with various physical constraints and propose countermeasures.

A Dynamic Load Balancing Scheme based on Host Load Information in a Wireless Internet Proxy Server Cluster (무선 인터넷 프록시 서버 클러스터에서 호스트 부하 정보에 기반한 동적 부하 분산 방안)

  • Kwak Hu-Keun;Chung Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.231-246
    • /
    • 2006
  • A server load balancer is used to accept and distribute client requests to one of servers in a wireless internet proxy server cluster. LVS(Linux Virtual Server), a software based server load balancer, can support several load balancing algorithms where client requests are distributed to servers in a round robin way, in a hashing-based way or in a way to assign first to the server with the least number of its concurrent connections to LVS. An improved load balancing algorithm to consider server performance was proposed where they check upper and lower limits of concurrent connection numbers to be allowed within each maximum server performance in advance and apply the static limits to load balancing. However, they do not apply run-time server load information dynamically to load balancing. In this paper, we propose a dynamic load balancing scheme where the load balancer keeps each server CPU load information at run time and assigns a new client request first to the server with the lowest load. Using a cluster consisting of 16 PCs, we performed experiments with static content(image and HTML). Compared to the existing schemes, experimental results show performance improvement in the cases of client requests requiring CPU-intensive processing and a cluster consisting of servers with difference performance.