• Title/Summary/Keyword: 3G network

Search Result 827, Processing Time 0.032 seconds

Design and Implementation of BAN System using ECG Sensor based on Smartphone (스마트폰 기반 ECG 센서를 이용한 BAN 시스템의 설계 및 구현)

  • Lee, Min-Ki;Kim, Kyu-Ho;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.17-22
    • /
    • 2010
  • As the services of ubiquitous environment has become accessible everywhere, it has been developed in various fields. Additionally interests in the u-Healthcare has sharply increased. In this paper, the BAN (Body Area Network) has been applied through ECG sensor and Zigbee communication of the existing ubiquitous sensor network environment to measure one's vital signs. The measured vital signs were then implemented in a system that enabled doctors and specialists to monitor by using 3G(WCDMA) communication. Furthermore, a location search device has been designed using the Smartphone's GPS modules to locate patients in the case of an emergency. The data field definition and designed system was based on the Smartphone's iPhone platform which has been in the spotlight for the previous months.

Spatiotemporal Routing Analysis for Emergency Response in Indoor Space

  • Lee, Jiyeong;Kwan, Mei-Po
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.6
    • /
    • pp.637-650
    • /
    • 2014
  • Geospatial research on emergency response in multi-level micro-spatial environments (e.g., multi-story buildings) that aims at understanding and analyzing human movements at the micro level has increased considerably since 9/11. Past research has shown that reducing the time rescuers needed to reach a disaster site within a building (e.g., a particular room) can have a significant impact on evacuation and rescue outcomes in this kind of disaster situations. With the purpose developing emergency response systems that are capable of using complex real-time geospatial information to generate fast-changing scenarios, this study develops a Spatiotemporal Optimal Route Algorithm (SORA) for guiding rescuers to move quickly from various entrances of a building to the disaster site (room) within the building. It identifies the optimal route and building evacuation bottlenecks within the network in real-time emergency situations. It is integrated with a Ubiquitous Sensor Network (USN) based tracking system in order to monitor dynamic geospatial entities, including the dynamic capacities and flow rates of hallways per time period. Because of the limited scope of this study, the simulated data were used to implement the SORA and evaluate its effectiveness for performing 3D topological analysis. The study shows that capabilities to take into account detailed dynamic geospatial data about emergency situations, including changes in evacuation status over time, are essential for emergency response systems.

Enhanced Secure Transaction Protocol for IoT Devices via LTE Network (LTE 네트워크에서의 IoT 장치를 위한 향상된 보안 거래)

  • AL-Alkeem, Ebrahim;Yeun, Chan Yeob;Hammadi, Yousef Al;Yeun, Hyun Ku;Byon, Young-Ji
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1921-1936
    • /
    • 2017
  • Internet of Thing (IoT) and NFC (Near Field Communication) have got a good adaptable structure that it can be easily combined with any wireless network. Since IoT/NFC can be used to communicate wirelessly with all the transactions that can be done remotely without any physical connections. In this paper, we propose an enhanced secure IoT/NFC protocol based on LTE network that enhances the original security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM and 3G, which substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Analysis of VoLTE Charge Reduction under VoLTE Growth (VoLTE 활성화에 따른 요금 인하 여력 분석)

  • Lee, Sang-Woo;Jeong, Seon-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.92-100
    • /
    • 2016
  • It is informed that the Voice over LTE(VoLTE) which serves voice and message on IP networks is better in terms of economies of scale than the legacy voice service on 2G/3G circuit-switched networks because of its technological and cost efficiency. In addition, services of voice and data are running on a single LTE network and as a result VoLTE has the more economies of scope. But, there is no study about how much technology-efficiency VoLTE has compared to circuit-based voice service and how much voice charge can be reduced as VoLTE grows up. This paper analyzes empirically cost-efficiency of VoLTE against circuit-based voice service and quantifies the reduction of voice charge as 2G/3G voice traffic shifts to VoLTE. The results describe the first is that the average cost of the total voice traffic rises shortly just after the investment of LTE network for providing VoLTE but it will soon have a capacity available to reduce the charge due to VoLTE's outstanding cost efficiency on the assumption that voice traffic is fixed, and the second is that the charge can be cut to 60% of the current rate in case of all the voice traffic moves to VoLTE. The latter proves partially the validation of data-focusing pricing plan. Our results are expected to become basic data for network operators' establishing pricing strategies and for policy makers' inducing price cutting.

Development of Service Use Cases and Business Models for 4G Mobile Communications Based on Device-to-Device Communications (단말기간 직접통신(Device-to-Device) 기반 4G 이동통신 서비스 발굴 및 비즈니스 모델 개발 방법론)

  • Oh, Seul-Ki;Ryu, Seung-Wan;Park, Sei-Kwon;Shin, Dong-Cheon;Kim, Yi-Kang
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.339-353
    • /
    • 2012
  • Mobile communication technology is advancing forward to deliver more connected devices and richer content and applications. The number of subscriptions continues to grow along with an explosive increase in the mobile data traffic demand. Thereby, it creates a significant network capacity shortage concerns for mobile network operators. In order to address this problem, it is essential to increase the network capacity at a low additional cost. The device-to-device (D2D) communication based proximity service is believed to have a promising future mobile communication technology that is capable to create new mobile service opportunities and offload traffic to the eNB. In addition, it is also required to develop new mobile communication services and its business models not only to accommodate the increasing mobile traffic demand but also to foster profitability of mobile business service providers such as the network providers, contents providers and platform providers. In this article, we first analyze current mobile business eco-system in the context of CPNT based value chain. Then, propose service development framework and business model creation methodologies for the device-to-device communication based services in the beyond LTE/LTE-Advanced systems.

Intelligent Massive Traffic Handling Scheme in 5G Bottleneck Backhaul Networks

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.874-890
    • /
    • 2021
  • With the widespread deployment of the fifth-generation (5G) communication networks, various real-time applications are rapidly increasing and generating massive traffic on backhaul network environments. In this scenario, network congestion will occur when the communication and computation resources exceed the maximum available capacity, which severely degrades the network performance. To alleviate this problem, this paper proposed an intelligent resource allocation (IRA) to integrate with the extant resource adjustment (ERA) approach mainly based on the convergence of support vector machine (SVM) algorithm, software-defined networking (SDN), and mobile edge computing (MEC) paradigms. The proposed scheme acquires predictable schedules to adapt the downlink (DL) transmission towards off-peak hour intervals as a predominant priority. Accordingly, the peak hour bandwidth resources for serving real-time uplink (UL) transmission enlarge its capacity for a variety of mission-critical applications. Furthermore, to advance and boost gateway computation resources, MEC servers are implemented and integrated with the proposed scheme in this study. In the conclusive simulation results, the performance evaluation analyzes and compares the proposed scheme with the conventional approach over a variety of QoS metrics including network delay, jitter, packet drop ratio, packet delivery ratio, and throughput.

The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch (네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례)

  • Park, Eunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.4
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

Many-to-Many Disjoint Path Covers in Double Loop Networks (이중 루프 네트워크의 다대다 서로소인 경로 커버)

  • Park Jung-Heum
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.8
    • /
    • pp.426-431
    • /
    • 2005
  • A many-to-many k-disjoint path cover (k-DPC) of a graph G is a set of k disjoint paths joining k distinct source-sink pairs in which each vertex of G is covered by a path. In this paper, we investigate many-to-many 2-DPC in a double loop network G(mn;1,m), and show that every nonbipartite G(mn;1,m), $m{\geq}3$, has 2-DPC joining any two source-sink pairs of vertices and that every bipartite G(mn;1,m) has 2-DPC joining any two source-sink pairs of black-white vertices and joining any Pairs of black-black and white-white vertices. G(mn;l,m) is bipartite if and only if n is odd and n is even.

A Review of Security Policy and 3-Steps for Defense 5G (국방 5G 운영을 위한 보안정책과 단계별 구축에 대한 고찰)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.597-599
    • /
    • 2021
  • 5G technology will be applied to various technologies related to game changers in the defense field. In addition, the establishment of a mobile work environment will be utilized. 5G has emerged as a new threat due to major technologies different from previous technologies. And due to 5G technology, there is an increasing demand to apply mobile technology to the defense sector. In this paper, we look at the security policy for defense 5G operation and the step-by-step construction plan consisting of three.

  • PDF