• Title/Summary/Keyword: 5G 통신

Search Result 1,031, Processing Time 0.03 seconds

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Statistical Characteristic Analysis of the Spatial Channel Model for Performance Evaluation of MIMO Systems (MIMO 송수신 시스템 성능 평가를 위한 공간 채널 모델의 통계적 특성 분석)

  • Shin, Junsik;Suh, Junyeub;Kang, Hosik;Sung, Wonjin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.8
    • /
    • pp.748-757
    • /
    • 2015
  • MIMO systems utilizing multiple antenna transmission and reception is one of the key technologies to enhance the capacity of 5G wireless communications. In order to obtain an appropriate performance evaluation of MIMO techniques, the usage of wireless channel model reflecting spatial channel characteristics is required, such as the 3-dimensional spatial channel model(3D SCM) proposed by 3GPP TR36.873 documentation. In this paper, we implement and verify the channel simulation environment based on 3D SCM, to present and compare the characteristics of UMi and UMa environments. We also apply MIMO transmission to the UMa scenario to investigate the channel correlation among antenna elements with different array distances and to identify the corresponding throughput changes. By evaluating the channel power correlations for randomly distributed users within the sector for different horizontal and vertical antenna distances, we present the statistical characteristics which determine the transmission performance under the SCM environment.

Performance Evaluation of Finite Field Arithmetic Implementations in Network Coding (네트워크 코딩에서의 유한필드 연산의 구현과 성능 영향 평가)

  • Lee, Chul-Woo;Park, Joon-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.193-201
    • /
    • 2008
  • Using Network Coding in P2P systems yields great benefits, e.g., reduced download delay. The core notion of Network Coding is to allow encoding and decoding at intermediate nodes, which are prohibited in the traditional networking. However, improper implementation of Network Coding may reduce the overall performance of P2P systems. Network Coding cannot work with general arithmetic operations, since its arithmetic is over a Finite Field and the use of an efficient Finite Field arithmetic algorithm is the key to the performance of Network Coding. Also there are other important performance parameters in Network Coding such as Field size. In this paper we study how those factors influence the performance of Network Coding based systems. A set of experiments shows that overall performance of Network Coding can vary 2-5 times by those factors and we argue that when developing a network system using Network Coding those performance parameters must be carefully chosen.

  • PDF

The Header Compression Scheme for Real-Time Multimedia Service Data in All IP Network (All IP 네트워크에서 실시간 멀티미디어 서비스 데이터를 위한 헤더 압축 기술)

  • Choi, Sang-Ho;Ho, Kwang-Chun;Kim, Yung-Kwon
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.8-15
    • /
    • 2001
  • This paper remarks IETF based requirements for IP/UDP/RTP header compression issued in 3GPP2 All IP Ad Hoc Meeting and protocol stacks of the next generation mobile station. All IP Network, for real time application such as Voice over IP (VoIP) multimedia services based on 3GPP2 3G cdma2000. Frames for various protocols expected in the All IP network Mobile Station (MS) are explained with several figures including the bit-for-bit notation of header format based on IETF draft of Robust Header Compression Working Group (ROHC). Especially, this paper includes problems of IS-707 Radio Link Protocol (RLP) for header compression which will be expected to modify in All IP network MS's medium access layer to accommodate real time packet data service[1]. And also, since PPP has also many problems in header compression and mobility aspects in MS protocol stacks for 3G cdma2000 packet data network based on Mobile IP (PN-4286)[2], we introduce the problem of solution for header compression of PPP. Finally. we suggest the guidelines for All IP network MS header compression about expected protocol stacks, radio resource efficiency and performance.

  • PDF

The Sub Authentication Method For Driver Using Driving Patterns (운전 패턴을 이용한 운전자 보조 인증방법)

  • Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.919-929
    • /
    • 2013
  • Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.

Enhanced Energy Harvester Based on Vibration Analysis of Bicycle Riding (자전거 주행의 진동 분석에 기반한 에너지 수확 증진 기술 개발)

  • Yeo, Jung-Jin;Ryu, Mun-Ho;Kim, Jung-Ja;Yang, Yoon-Seok
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.1
    • /
    • pp.47-56
    • /
    • 2012
  • Bicycle has a large amount of kinetic energy available for energy harvesting technology in its speedy and balanced riding movement. Systematic and realistic analysis of its dynamic property is essential to improve the efficiency of energy harvester. However, there has not been enough researches about precise measurement or analysis of bicycle dynamics on real roads. This study aims to investigate the characteristics of vibrational movement of bicycle using MEMS-based accelerometer and to develop a prototype of electromagnetic energy harvester with nonlinear behavior which is proper to the random vibrations accompanied in bicycle riding. The vibrational components have average magnitude of 1 g and turn out to be independent of riding speed. The developed prototype of energy harvester was installed on a front port of a bicycle to use this ambient vibration and generated an average electrical power of 1.5 mW which is enough to support power for most of portable sensors and short range radio-frequency communication. Further study about isolation of vibration from a rider and conversion efficiency is ongoing. The developed energy harvester is expected to be a platform technology for sustainable portable power supply for various smart IT devices and applications.

Measuring Circuit Design of RI-Gauge for Compaction Control (성토시공관리용 방사성 동위원소 이용계기의 측정회로설계)

  • Kil, Gyung-Suk;Song, Jae-Yong;Kim, Ki-Joon;Whang, Joo-Ho;Song, Jung-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.6 no.5
    • /
    • pp.385-391
    • /
    • 1997
  • An objection of this study is to develop a measuring circuit of a gauge using radioisotope for compaction control. The gauge developed in this study makes use of radioisotope with the activity exempted from domestic atomic law and consists of measuring circuits for gamma-rays and thermal neutrons, a high voltage supply unit, and a microprocessor. To obtain meaningful numbers of pulse counts, parallel five and two circuits are provided for gamma-rays and thermal neutrons, respectively. Being simple in electrical characteristics of G-M detector for gamma-rays, pulses are counted through only a shaping circuit. Very small pulses generated from He- 3 proportional detector for thermal neutrons are amplified to the maximum of 50 [dB] and a window comparator accepts only pulses with meaning. To minimize effects of natural environmental radiation and electrical noise, circuits are electrostatically shielded and pulses made by ripples are eliminated by taking frequency of high voltage supplied to the circuit and pulse height of ripples into consideration. One-chip microprocessor is applied to process various counts, results are stored and the gauage is made capable to communicate with PC. Enough and meaningful numbers of pulses are counted with the prototype gauage for compaction control.

  • PDF

Advertising in the AR Ecosystem and Revitalization Strategies for the Advertising and PR Industry: Centered on Qualitative Research (AR 생태계(C-P-N-D)에서의 광고, PR 산업 분야의 활성화 방안: 질적 연구를 중심으로)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.67-80
    • /
    • 2019
  • Augmented Reality (AR) is a crucial technology in the Fourth Industrial Revolution that can revolutionize the existing Information and Communication Technology (ICT) market and powerfully create a new market However, it is hard to find the clear answer for AD/PR strategies in the rapidly changing AR market. Thus this research explores the big picture of the AR industry as it pertains to Politics, Economy, Social, and Technology through in-depth interview with seven AR experts who are leading the domestic AR market. The research also analyzes the AR market's Strengths, Weaknesses, Opportunities, and Threats. Furthermore, it looks for strategies to vitalize the advertising and PR industry by analyzing the Contents, Platform, Network, and Devices of the AR ecosystem. The results of the research indicate a need for the government's strengthened policy of supporting the AR market, fostering of pace-setting killer contents, connecting services of several industries through AR platforms, strengthening the network of communication systems such as through 5G, and the commercialization and industrialization of domestic devices in order to vitalize the AR industry in its marketing and PR spheres. Therefore, this research suggests measures to revitalize the marketing and PR industries of the AR ecosystem, which has only recently gotten to its developing stage and provides an academic as well as practical foundation for future research in the field of AR.

Blockchain-based multi-IoT verification model for overlay cloud environments (오버레이 클라우드 환경을 위한 블록체인 기반의 다중 IoT 검증 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.151-157
    • /
    • 2021
  • Recently, IoT technology has been applied to various cloud environments, requiring accurate verification of various information generated by IoT devices. However, due to the convergence of IoT technologies and 5G technologies, accurate analysis is required as IoT information processing is rapidly processed. This paper proposes a blockchain-based multi-IoT verification model for overlay cloud environments. The proposed model multi-processes IoT information by further classifying IoT information two layers (layer and layer) into bits' blockchain to minimize the bottleneck of overlay networks while ensuring the integrity of information sent and received from embedded IoT devices within local IoT groups. Furthermore, the proposed model allows the layer to contain the weight information, allowing IoT information to be easily processed by the server. In particular, transmission and reception information between IoT devices facilitates server access by distributing IoT information from bits into blockchain to minimize bottlenecks in overlay networks and then weighting IoT information.

Efficient AIOT Information Link Processing in Cloud Edge Environment Using Blockchain-Based Time Series Information (블록체인 기반의 시계열 정보를 이용한 클라우드 엣지 환경의 효율적인 AIoT 정보 연계 처리 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.9-15
    • /
    • 2021
  • With the recent development of 5G and artificial intelligence technologies, it is interested in AIOT technology to collect, process, and analyze information in cloud edge environments. AIIoT technology is being applied to various smart environments, but research is needed to perform fast response processing through accurate analysis of collected information. In this paper, we propose a technique to minimize bandwidth and processing time by blocking the connection processing between AIOT information through fast processing and accurate analysis/forecasting of information collected in the smart environment. The proposed technique generates seeds for data indexes on AIOT devices by multipointing information collected by blockchain, and blocks them along with collection information to deliver them to the data center. At this time, we deploy Deep Neural Network (DNN) models between cloud and AIOT devices to reduce network overhead. Furthermore, server/data centers have improved the accuracy of inaccurate AIIoT information through the analysis and predicted results delivered to minimize latency. Furthermore, the proposed technique minimizes data latency by allowing it to be partitioned into a layered multilayer network because it groups it into blockchain by applying weights to AIOT information.