• Title/Summary/Keyword: 3G Networks

Search Result 408, Processing Time 0.024 seconds

Technology Development Trends in Integration of Communication and Sensing in 6G Networks (6G 센싱-통신 융합 서비스의 기술 개발 동향)

  • S.J. You;H.J. Kim;J.Y. Ahn;J.H. Hwang;J.J. Park;S.K. Park
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.1
    • /
    • pp.25-35
    • /
    • 2024
  • Wireless communication, including mobile networks and local area networks, has become an essential service in the society. Wireless communication is evolving to include sensing services, as demonstrated by the increasing attention in organizations and standards such as 3GPP and IEEE 802.11. This survey presents technology trends in the integration of sensing and communication. The standardization status along with use cases provided by standards are explained. In addition, core and supporting technologies such as channel modeling, waveform design, and artificial intelligence are analyzed.

A Study of 4G Network for Security System

  • Kim, Suk-jin;Lee, Hyangran;Lee, Malrey
    • International Journal of Advanced Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.77-86
    • /
    • 2015
  • In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a result of the nature of 4G networks there are still more security holes and open issues for expert to notice. Our survey shows that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. Other than that, it tells about the security issues and vulnerabilities present in the above 4G standards are discussed. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention and future work by the research and advanced technology industry.

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing (5G 모바일 에지 컴퓨팅에서 빅데이터 분석 기능에 대한 데이터 오염 공격 탐지 성능 향상을 위한 연구)

  • Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.549-559
    • /
    • 2023
  • As mobile edge computing (MEC) is gaining attention as a core technology of 5G networks, edge AI technology of 5G network environment based on mobile user data is recently being used in various fields. However, as in traditional AI security, there is a possibility of adversarial interference of standard 5G network functions within the core network responsible for edge AI core functions. In addition, research on data poisoning attacks that can occur in the MEC environment of standalone mode defined in 5G standards by 3GPP is currently insufficient compared to existing LTE networks. In this study, we explore the threat model for the MEC environment using NWDAF, a network function that is responsible for the core function of edge AI in 5G, and propose a feature selection method to improve the performance of detecting data poisoning attacks for Leaf NWDAF as some proof of concept. Through the proposed methodology, we achieved a maximum detection rate of 94.9% for Slowloris attack-based data poisoning attacks in NWDAF.

DECOMPOSITION APPROXIMATION FOR OPEN QUEUEING NETWORKS

  • Lim, Jong-Seul
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.3
    • /
    • pp.1035-1045
    • /
    • 2001
  • We present two decomposition approximations for the mean sojourn times in open single class queing networks. If there is a single bottleneck station, the approximations are asymptotically exact in both light and heavy traffic. When applied to a Jackson network or an M/G/1 queue, these approximations are exact for all values of the traffic intensity.

Unpaired Many-to-Many Disjoint Path Covers in Hypercube-Like Interconnection Networks (하이퍼큐브형 상호연결망의 비쌍형 다대다 서로소인 경로 커버)

  • Park, Jung-Heum
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.10
    • /
    • pp.789-796
    • /
    • 2006
  • An unpaired many-to-many k-disjoint nth cover (k-DPC) of a graph G is a set of k disjoint paths joining k distinct sources and sinks in which each vertex of G is covered by a path. Here, a source can be freely matched to a sink. In this paper, we investigate unpaired many-to-many DPC's in a subclass of hpercube-like interconnection networks, called restricted HL-graphs, and show that every n-dimensional restricted HL-graph, $(m{\geq}3)$, with f or less faulty elements (vertices and/or edges) has an unpaired many-to-many k-DPC for any $f{\geq}0\;and\;k{\geq}1\;with\;f+k{\leq}m-2$.

Inter-clustering Cooperative Relay Selection Schemes for 5G Device-to-device Communication Networks

  • Nasaruddin, Nasaruddin;Yunida, Yunida;Adriman, Ramzi
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.3
    • /
    • pp.143-152
    • /
    • 2022
  • The ongoing adoption of 5G will increase the data traffic, throughput, multimedia services, and power consumption for future wireless applications and services, including sensor and mobile networks. Multipath fading on wireless channels also reduces the system performance and increases energy consumption. To address these issues, device-to-device (D2D) and cooperative communications have been proposed. In this study, we propose two inter-clustering models using the relay selection method to improve system performance and increase energy efficiency in cooperative D2D networks. We develop two inter-clustering models and present their respective algorithms. Subsequently, we run a computer simulation to evaluate each model's outage probability (OP) performance, throughput, and energy efficiency. The simulation results show that inter-clustering model II has the lowest OP, highest throughput, and highest energy efficiency compared with inter-clustering model I and the conventional inter-clustering-based multirelay method. These results demonstrate that inter-clustering model II is well-suited for use in 5G overlay D2D and cellular communications.

Embedding Mesh-Like Networks into Petersen-Torus(PT) Networks (메쉬 부류 네트워크를 피터슨-토러스(PT) 네트워크에 임베딩)

  • Seo, Jung-Hyun;Lee, Hyeong-Ok;Jang, Moon-Suk
    • The KIPS Transactions:PartA
    • /
    • v.15A no.4
    • /
    • pp.189-198
    • /
    • 2008
  • In this paper, we prove mesh-like networks can be embedded into Petersen-Torus(PT) networks. Once interconnection network G is embedded in H, the parallel algorithm designed in Gcan be applied to interconnection network H. The torus is embedded into PT with dilation 5, link congestion 5 and expansion 1 using one-to-one embedding. The honeycomb mesh is embedded into PT with dilation 5, link congestion 2 and expansion 5/3 using one-to-one embedding. Additional, We derive average dilation. The embedding algorithm could be available in both wormhole routing system and store-and-forward routing system by embedding the generally known Torus and honeycomb mesh networks into PT at 5 or less of dilation and congestion, and the processor throughput could be minimized at simulation through one-to-one.

Performance Analysis of Frequency Allocation Methods Using Frequency Reuse and Channel Estimation in Cognitive Radio Systems (인지 무선 시스템에서 주파수 재사용율과 채널 추정에 따른 주파수 할당 방식의 성능 분석)

  • Kim, Tae-Hwan;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5A
    • /
    • pp.391-400
    • /
    • 2009
  • Recently, cellular communication networks are migrating from 2G to 3G. Spectrum utilization tends to be inefficient during the transition. Cognitive radio (CR) technology can be a key solution to increase spectrum efficiency by allowing secondary networks to utilize frequency resource of primary networks. However, conventional CR approaches which do not utilize the frequency reuse factor of primary networks may incur degradation of whole network performance. In this paper, we propose a mechanism that a secondary network senses pilot signals of a primary network and select optimum frequency bands. In order to maximize whole network performance, we formulate an optimization problem subject to interference constraints for a primary network and present algorithms. Simulation results compare the proposed method with the conventional method. Our proposed method shows performance gain over the conventional method if channel variation of a primary network is dynamic and the frequency reuse factor of a primary network is high.