• Title/Summary/Keyword: 통신중계

Search Result 911, Processing Time 0.029 seconds

Cooperative Communication Scheme Based on channel Characteristic for Underwater Sensor Networks (수중 센서 네트워크를 위한 채널 특성기반의 협력 통신 기법)

  • Ji, Yong-Joo;Choi, Hak-Hui;Lee, Hye-Min;Kim, Dong-Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.6
    • /
    • pp.21-28
    • /
    • 2016
  • This paper presents a cooperative transmission scheme for underwater acoustic sensor networks to improve packet transmission rate and reduce energy consumption. Source node transmits duplicated information relayed by distributed antennas called a virtual antenna array. Destination node combines that information to reduce packet error rate. The suggested cooperative scheme enhances the reliability by providing high diversity gains through intermediate relay nodes to overcome the distinct characteristics of the underwater channel, such as high transmission loss, propagation delay, and ambient noises. It is suggested that the algorithm select destinations and potential relays from a set of neighboring nodes that utilize distance cost, the residual energy of each node and local measurement of the channel conditions into calculation. Simulation results show that the proposed scheme reduces average energy consumption, response time, and increases packet delivery ratio compared with the SPF(Shortest Path First) and non-cooperative scheme using OPNET Moduler.

Voltage-Controlled PH Diode Attenuator and Temperature Compensation Circuit for Ku-band Satellite Payload (Ku-대역 위성중계기용 전압제어형 PIN 다이오드 감쇄기 및 온도보상회로 설계)

  • 장병준;염인복;이성팔
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.5
    • /
    • pp.484-491
    • /
    • 2002
  • This paper presents the results of a study of voltage-controlled PIN diode attenuators for Ku-band satellite payload and suggests the temperature-compensation method of these attenuators. The PIN diode attenuators are designed using thin-film hybrid techniques. The load resistance for maximum linear characteristics is determined by simulation and measurements. In the case of APD0805, load resistance of 150 $\Omega$ gives attenuator up to 10 dB linear attenuation range per a PIN diode. Also, measurements over temperature of these PIN diode attenuators were performed. From these measurements, designed PIN diode attenuators shows the severe temperature dependency due to forward voltage variation. A temperature compensation method using thermistor is now suggested to compensate the temperature variation of these PIN diode attenuators. This circuit shows good linear characteristics over wide temperature range

Design and Implementation of a Protocol for u-Safety Service (u-안심 서비스 프로토콜 설계 및 구현)

  • Cho, Byung Soon;Lee, Jae Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.117-128
    • /
    • 2013
  • u-safety service system inter-works with the diverse operation agencies, through CCTV network, such as the emergency call terminal with built-in GPS, the mobile communication network, u-safety service provider, relay system and CCTV control center. In the case of the emergency call, this service searches the location of caller in real time, and then continues to search the location of caller through the control of CCTV in the searched place, and can provide the several agencies like guardian, police office, fire station, hospitals, relief organizations and municipalities, with the diverse information necessary for the secure rescue through SMS and wired network. In this paper, a new protocol and specification for u-safety service relay system is designed and implemented. The effectiveness of presented protocol is verified by computer simulation. The designed protocol of u-safety service is applied to real 3GPP and 3GPP2 mobile communication networks to verify its performance.

Design of Multiband Repeater Antenna with Fire-Fighting Band for In-Building Mobile Communication (소방무선대역을 포함하는 인빌딩용 다중대역 중계기 안테나 설계)

  • Kim, Sung-Min;Min, Kyeong-Sik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.6
    • /
    • pp.495-503
    • /
    • 2016
  • This paper proposes the design of multiband repeater antenna with fire-fighting band for in-building mobile communication. The proposed antenna is composed of a center monopole and 4 parasitic elements on a circular plate. In order to realize good reflection coefficients at the multiband, mutual coupling between 4 parasitic elements and center monopole antenna is considered. The important parameters such as distance between parasitic element and a center monopole, and each height of a center monopole and 4 parasitic elements are simulated to obtain good antenna characteristics at the multiband. The diameter of 4 parasitic elements and a center monopole was fixed to 10 mm for easy design and manufacturing. The measurement results of reflection coefficients, 2-D patterns and gain agreed well with their simulation ones.

Blind Detouring Problem in Geographic Routing for Wireless Ad-hoc Networks (무선 애드-혹 망을 위한 위치기반 라우팅에서의 맹목적 우회경로 결정문제)

  • Na, Jong-Keun;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.428-437
    • /
    • 2006
  • Wireless ad-hoc routing has been extensively studied and many clever schemes have been proposed over the last several years. One class of ad-hoc routing is geographic routing where each intermediate node independently selects the next hop using the given location information of destination. Geographic routing, which eliminates the overhead of route request packet flooding, is scalable and suitable for large scale ad hoc networks. However, geographic routing may select the long detour paths when there are voids between a source and a destination. In this paper, we propose a novel geographic routing approach called Geographic Landmark Routing(GLR). GLR recursively discovers the intermediate nodes called landmarks and constructs sub-paths that connect the subsequent landmarks. Simulation results on various network topologies show that GLR significantly improves the performance of geographic routing.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

Designed and Development of Location Tracking System by The Short-Range Radio Frequency Relay Algorithm (근거리 RF중계알고리즘에 의한 구내 위치추적시스템 연구)

  • Park, Sang-Min;Lee, Gong;Lee, Sang-Keun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.73-81
    • /
    • 2008
  • We can find easily about researches or technical development that deal with grasping the location of an object with GPS(Global Positioning System) in order to use them as a useful information. Most researches or technical development on application of tracing have been developed for the purpose of tracing objects in broad area as physical distribution or transportation, but recently, there are many researches on tracing materials in premise area as a fork lift, carts, or the equipment of work. In general, a system that utilizes location information of objects needs data communication network to transmit location data and it ensures data communication network by using common networks(SK, LG, KFT) or wireless LAN. However these two methods need monthly payment for the rental fee or require considerable amount of investment for the early stage so it is difficult to use them merely for tracing premise subjects. This study was conducted to build a tracing system for premise area by local area RF relay algorithm with low cost applying RF relay algorithm to local area wireless communication(ZIGBEE, 424MHz, Bluetooth, 900MHz) system in order to supplement these demerits and included relay algorithm, RF locating information terminal, local area RF gab-fillers, a plan for collection server of locating information, and the way of realization as they are needed in this system. I consider that this study would be applicable with flexibility in the industry area that needs tracing solution within a specific area or needs ensuring data communication network, to transmit data in ubiquitous environment, by easier and more rapid way with lower cost.

  • PDF

1-2-1 Coded Cooperative Communication Using STBC and ARQ (STBC와 ARQ를 이용한 1-2-1 부호화 협력 통신)

  • Hong, Seong-Wook;Kong, Hyung-Yun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.5
    • /
    • pp.421-427
    • /
    • 2009
  • This paper has proposed 1-2-1 coded cooperative communication that is a combination of STBC and ARQ. Coded cooperative communication is a protocol that integrates channel coding with cooperative communication. In this paper consider convolution encoder. ARQ method can increase the spectral efficiency than conventional cooperative communication because if the received signal from source node is satisfied by the destination preferentially, the destination transmits ACK message to both relay node and source node and then recovers the received signal. Where each relay 1, 2 forwards a punctured portion of receive data. When relay transmit to destination apply STBC the reliability to increase. Moreover this protocol can get better BER performance of receiver using simple comparator. We verified BER performance for the proposed protocol through Monte-Carlo simulation over Rayleigh fading plus AWGN.