• Title/Summary/Keyword: 3GPP-LTE

Search Result 235, Processing Time 0.025 seconds

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

Development of Service Use Cases and Business Models for 4G Mobile Communications Based on Device-to-Device Communications (단말기간 직접통신(Device-to-Device) 기반 4G 이동통신 서비스 발굴 및 비즈니스 모델 개발 방법론)

  • Oh, Seul-Ki;Ryu, Seung-Wan;Park, Sei-Kwon;Shin, Dong-Cheon;Kim, Yi-Kang
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.339-353
    • /
    • 2012
  • Mobile communication technology is advancing forward to deliver more connected devices and richer content and applications. The number of subscriptions continues to grow along with an explosive increase in the mobile data traffic demand. Thereby, it creates a significant network capacity shortage concerns for mobile network operators. In order to address this problem, it is essential to increase the network capacity at a low additional cost. The device-to-device (D2D) communication based proximity service is believed to have a promising future mobile communication technology that is capable to create new mobile service opportunities and offload traffic to the eNB. In addition, it is also required to develop new mobile communication services and its business models not only to accommodate the increasing mobile traffic demand but also to foster profitability of mobile business service providers such as the network providers, contents providers and platform providers. In this article, we first analyze current mobile business eco-system in the context of CPNT based value chain. Then, propose service development framework and business model creation methodologies for the device-to-device communication based services in the beyond LTE/LTE-Advanced systems.

Reliability Constrained Resource Allocation in Cellular Network Uplink Scheduler (이동통신 역방향 스케줄러에서의 고신뢰성 자원 할당 기법)

  • Lee, Sung-Won;Jung, Kwang-Ryul;Park, Ae-Soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.57-66
    • /
    • 2010
  • In this paper, we propose the reliability constrained resource allocation scheduling algorithm in cellular network for uplink transmission, where uplink transmission is supported via packet switching schemes without the dedicated uplink circuit links. We evaluate the performance of the proposed algorithm, and compared with the conventional works to identify the pros and cons. The proposed uplink scheduling algorithm is to satisfy the constraints requirements of the MTC services which is considered as the core technology for future mobile wireless networks. It is different to conventional works which target to maximize the link capacity. The proposed algorithm provides reliable uplink transmission independent to the location and the quality of the wireless link of the mobile terminal. Based on the performance evaluation results, we conclude that the proposed method provides enhanced reliability performance than conventional works.

Ranging Performance Enhancement by Successive Interference Cancellation in Multiuser M-WiMAX System (다중 사용자 M-WiMAX 시스템에서 직렬 간섭 제거를 이용한 레인징 성능 향상 기법)

  • Kim, Jong-Hun;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.998-1005
    • /
    • 2009
  • In the uplink of OFDMA (Orthogonal Frequency Division Multiple Access) based M-WiMAX(Mobile-Worldwide Interoperability for Microwave Access) system, linear phase shift is caused by signals transmitted from multiuser with different delay time and thus, MAI (Multiple Access Interference) occurs. MAI degrades the performance of ranging code detection and delay time estimation in the uplink. Therefore, in this paper, we propose ranging algorithm, applying SIC (Successive Interference Cancellation) to the conventional ranging algorithm, to minimize MAI and to improve ranging performance. The proposed ranging algorithm is verified through the Monte Carlo simulation, which shows the improved performance of ranging code detection and delay time estimation compared to the conventional algorithms. Through compared with random access of the 3GPP LTE, we can know limit of ranging performance.

Design and Performance Analysis of FSC Receiver for Improvement of D2D Communication in Cellular Network (셀룰러 네트워크에서 D2D 통신 향상을 위한 FSC 수신기 설계 및 성능 분석)

  • Moon, Sangmi;Choe, Hun;Chu, Myeonghun;Kim, Hanjong;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.5
    • /
    • pp.33-47
    • /
    • 2015
  • Cellular Network assisted device-to-device (D2D) communication has been growing to reduce the overload of eNodeB and mitigate the frequency shortage. However, by sharing the uplink frequency resource with the cellular network, the interference between cellular and D2D is increased. In this paper, we propose an advanced receiver for full suppression cancellation (FSC) to reduce the interference between cellular and D2D. The proposed receiver can suppress and cancel the interference by integrating the interference rejection combining (IRC) technique with successive interference cancellation (SIC). We perform a system level simulation based on the 20-MHz bandwidth of the 3GPP LTE-A system. Simulation results show that the proposed receiver can improve SINR, throughput and spectral efficiency compared to conventional receivers.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

Wireless Access Network Virtualization Based on Distributed Antenna Systems (분산 안테나 시스템에 기반한 무선 액세스망 가상화)

  • Kim, Su Min;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2085-2094
    • /
    • 2012
  • In this paper, we propose a wireless access network virtualization algorithm based on a digital unit (DU)-radio unit (RU) separated network structure in a cellular network with multiple radio access technologies (RATs). The proposed wireless access network virtualization algorithm consists of a baseline access network virtualization, RAT virtualization, and access path migration algorithms. Final wireless access network virtualization is performed by sequentially performing these procedures. Through system-level simulations which assume 3GPP LTE and WiMAX systems, the performance of the proposed wireless access network virtualization is evaluated in terms of system throughput for two scenarios according to asymmetry of network traffic load. Numerical results show that our proposed wireless access network virtualization algorithm achieves significant system throughput gain even in asymmetric traffic load and user distribution situations.

Detection Techniques for High Dimensional Spatial Multiplexing MIMO System (다차원 공간다중화 MIMO 시스템의 복조 기법)

  • Lim, Sung-Ho;Kim, Kyungsoo;Choi, Ji-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.413-423
    • /
    • 2014
  • With the increasing demands on high data rate, there has been growing interests in multi-input multi-output (MIMO) technology based on spatial multiplexing (SM) since it can transmit independent information in each spatial stream. Recent standards such as 3GPP LTE-advanced and IEEE 802.11ac support up to eight spatial streams, and massive MIMO and mm-wave systems that are expected to be included in beyond 4G systems are considering employment of tens to hundreds of antennas. Since the complexity of the optimum maximum likelihood based detection method increases exponentially with the number of antennas, low-complexity SM MIMO detection becomes more critical as the number of antenna increases. In this paper, we first review the results on the detection schemes for SM MIMO systems. In addition, massive MIMO reception schemes based on simple linear filtering which does not require exponential increment of complexity will be explained, followed by brief description on receiver design for future high dimensional SM MIMO systems.

ABS Ratio Estimation Considering the Number of UEs in CRE Regions for LTE-A Heterogeneous Networks (LTE-A 기반 이종 네트워크에서 CRE 영역내 단말들의 수를 고려한 ABS 비율 산출 방법)

  • Sun, Jong-Suk;Roh, Byeong-hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.104-112
    • /
    • 2017
  • The CRE (Cell Range Expansion) that selects the small cell with more efficient uplink resources has been developed by 3GPP to relieve the problem of the traffic imbalance due to the power differences between macro and small cells in HetNet. In addition, ABS (Almost Blank Subframes) has been proposed to resolve the signal interference problem due to the operation CREs. This paper proposes an effective method to calculate the ABS ratio by considering the proportion of the number of UEs in CRE and macro cell ranges, as well as the number of small cells in a macro cell. The proposed method has been implemented on the LTESim simulator, and compared with previously proposed methods. The experimental results show that the proposed method can improve the throughput and packet loss ratio performances. In particular, it is also shown that CRE bias values affect those performances, and there exist effective CRE bias values to derive the best performances.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.