• 제목/요약/키워드: 5G mobile network

검색결과 182건 처리시간 0.024초

국방 5G 운영을 위한 보안정책과 단계별 구축에 대한 고찰 (A Review of Security Policy and 3-Steps for Defense 5G)

  • 송원석;조준하;강성문;이민우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.597-599
    • /
    • 2021
  • 5G 기술은 국방분야에서 게임 체인처(game changer)에 관련된 다양한 기술에 접목될 것이다. 또한 모바일 업무 환경 구축도 활용될 것이다. 5G는 이전 기술과 다른 주요 기술로 인해 새로운 위협이 등장하였다. 그리고 5G 기술로 인해 모바일 기술을 국방분야에 적용하려는 요구가 증가하고 있다. 본 논문에서는 국방 5G 운영을 위한 보안정책과 3개로 구성된 단계별 구축 방안을 살펴본다.

  • PDF

Floop: An efficient video coding flow for unmanned aerial vehicles

  • Yu Su;Qianqian Cheng;Shuijie Wang;Jian Zhou;Yuhe Qiu
    • ETRI Journal
    • /
    • 제45권4호
    • /
    • pp.615-626
    • /
    • 2023
  • Under limited transmission conditions, many factors affect the efficiency of video transmission. During the flight of an unmanned aerial vehicle (UAV), frequent network switching often occurs, and the channel transmission condition changes rapidly, resulting in low-video transmission efficiency. This paper presents an efficient video coding flow for UAVs working in the 5G nonstandalone network and proposes two bit controllers, including time and spatial bit controllers, in the flow. When the environment fluctuates significantly, the time bit controller adjusts the depth of the recursive codec to reduce the error propagation caused by excessive network inference. The spatial bit controller combines the spatial bit mask with the channel quality multiplier to adjust the bit allocation in space to allocate resources better and improve the efficiency of information carrying. In the spatial bit controller, a flexible mini graph is proposed to compute the channel quality multiplier. In this study, two bit controllers with end-to-end codec were combined, thereby constructing an efficient video coding flow. Many experiments have been performed in various environments. Concerning the multi-scale structural similarity index and peak signal-to-noise ratio, the performance of the coding flow is close to that of H.265 in the low bits per pixel area. With an increase in bits per pixel, the saturation bottleneck of the coding flow is at the same level as that of H.264.

Implementation of mmWave long-range backhaul for UAV-BS

  • Jangwon Moon;Junwoo Kim;Hoon Lee;Youngjin Moon;Yongsu Lee;Youngjo Bang;Kyungyeol Sohn;Jungsook Bae;Kwangseon Kim;Seungjae Bahng;Heesoo Lee
    • ETRI Journal
    • /
    • 제45권5호
    • /
    • pp.781-794
    • /
    • 2023
  • Uncrewed aerial vehicles (UAVs) have become a vital element in nonterrestrial networks, especially with respect to 5G communication systems and beyond. The use of UAVs in support of 4G/5G base station (uncrewed aerial vehicle base station [UAV-BS]) has proven to be a practical solution for extending cellular network services to areas where conventional infrastructures are unavailable. In this study, we introduce a UAV-BS system that utilizes a high-capacity wireless backhaul operating in millimeter-wave frequency bands. This system can achieve a maximum throughput of 1.3 Gbps while delivering data at a rate of 300 Mbps, even at distances of 10 km. We also present the details of our testbed implementation alongside the performance results obtained from field tests.

A Study on Implementation of Safety Navigation Mobile Application Converging Marine Environment Information and Location-Based Service

  • Jeon, Joong-Sung
    • 한국항해항만학회지
    • /
    • 제43권5호
    • /
    • pp.289-295
    • /
    • 2019
  • In this paper, we implemented a safety navigation mobile application that converged AtoN information and location-based services. When application user uses the smartphone's GPS sensor to transmit the user's vessel location data to the data server, the user receives information of which its providing range is considered, such as stored AtoN data, neighboring vessels information, danger area, and weather information in the server. Providing information is sorted based on the smartphone's direction and inclination and it will be also delivered via wireless network (5G, LTE, 3G, WiFi). Additionally the application is available to implement other functions such as information provision through voice and text alarming service when the user's vessel is either approaching or entering the danger area, and an expanded information provision service that is available in shadow area linking with data-storing methods; other linkable data such as weather and other neighboring vessels will be applied based on the lasted-saved data perceived from the non-shadow area.

IoT 환경에서 고품질 콘텐츠 제공을 위한 데이터 오류 보상 추정 기술 (Data Error Compensation Estimation Technology for Providing High Quality Contents in IoT Environment)

  • 김정수
    • 문화기술의 융합
    • /
    • 제5권3호
    • /
    • pp.333-338
    • /
    • 2019
  • 문화콘텐츠는 고속, 고품질의 데이터 통신이 가장 핵심적인 요소이다. 고품질 콘텐츠로 VR AR 기술이 포함되고 다양한 고품질 콘텐츠는 스마트 폰을 통해 무선이동 중 스트리밍 서비스를 받을 수 있다. 또한, 사물이 무선인터넷에 연결을 하기위한 IoT(Internet of Things) 환경에서 네트워크 및 유무선 통신이 필연적으로 필요하다. IoT는 다양한 네트워크 기술로 4G, 5G 이동통신, WIFI 무선랜, 블루투스 등의 방식에 연결하여 사용되어 진다. 사물간의 연결을 언제 어디서나 이용할 수 있는 기술로 무선 이동통신 환경에서 이루어 질 수 있다. 따라서 본 논문에서는 고속 이동 환경에서도 고품질의 콘텐츠를 서비스 받을 수 있도록 이동통신 채널 환경 분석을 토대로 데이터 오류를 줄일 수 있는 데이터 오류 보상 추정 방식에 대해 연구한다.

Combined time bound optimization of control, communication, and data processing for FSO-based 6G UAV aerial networks

  • Seo, Seungwoo;Ko, Da-Eun;Chung, Jong-Moon
    • ETRI Journal
    • /
    • 제42권5호
    • /
    • pp.700-711
    • /
    • 2020
  • Because of the rapid increase of mobile traffic, flexible broadband supportive unmanned aerial vehicle (UAV)-based 6G mobile networks using free space optical (FSO) links have been recently proposed. Considering the advancements made in UAVs, big data processing, and artificial intelligence precision control technologies, the formation of an additional wireless network based on UAV aerial platforms to assist the existing fixed base stations of the mobile radio access network is considered a highly viable option in the near future. In this paper, a combined time bound optimization scheme is proposed that can adaptively satisfy the control and communication time constraints as well as the processing time constraints in FSO-based 6G UAV aerial networks. The proposed scheme controls the relation between the number of data flows, input data rate, number of worker nodes considering the time bounds, and the errors that occur during communication and data processing. The simulation results show that the proposed scheme is very effective in satisfying the time constraints for UAV control and radio access network services, even when errors in communication and data processing may occur.

A Study on 5G Service Methods by using BOCR Model and ANP

  • Song, Inkuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3299-3312
    • /
    • 2022
  • Recently, South Korea preferentially allocated frequencies to build 5G networks as a core competitiveness of the 4th Industrial Revolution. Although the government recognize the importance of 5G construction and preoccupation, network operators have limited to some services, testing the possibility of practical use of 5G. They hesitated to actively build and to carry out the service of a complete 5G network. While 5G is being developed and standardized like this, no one is sure of this step exactly what 5G will be. Thus, following research questions are asked by various stakeholders of 5G market: What is an ideal service providing method for the practical use of 5th generation mobile network? And what are the critical elements to be considered when selecting the service providing method? Therefore, the study aims to investigate 5G service providing issues and elements to be considered and to provide most appropriate service providing method for the practical use of 5G. The results identify that 'Specialized Service' is most appropriate method at the aspects of benefit and opportunity as well as the aspect of risk. In addition, the outcomes imply that the experts replying to the survey not only expect the expansion of emerging market, but also concern the social risk and cost. Since the study dealt with economic, social and business issues in providing 5G service, it might contribute not only to practical research, but also to academic research regarding 5G service method.

Low-latency 5G architectures for mission-critical Internet of Things (IoT) services

  • 최창순;박종한;나민수;조성호
    • 정보와 통신
    • /
    • 제32권9호
    • /
    • pp.17-23
    • /
    • 2015
  • This paper presents design methodologies for 5G architecture ensuring lower latency than 4G/LTE. Among various types of 5G use cases discussed in standardization bodies, we believe mobile broadband, massive IoT(Internet of Things) and mission-critical IoT will be the main 5G use cases. In particular, a mission-critical IoT service such as remote controlled machines and connected cars is regarded as one of the most distinguished use cases, and it is indispensable for underlying networks to support sufficiently low latency to support them. We identify three main strategic directions for end-to-end network latency reduction, namely new radio access technologies, distributed/flat network architecture, and intelligent end-to-end network orchestration.

5G 네트워크의 보안 취약점 및 대응 방안: 서베이 (Security Vulnerability and Countermeasure on 5G Networks: Survey)

  • 홍성혁
    • 디지털융복합연구
    • /
    • 제17권12호
    • /
    • pp.197-202
    • /
    • 2019
  • 4차 산업혁명시대에 발맞춰 통신 기술도 5G 기술이 보편화되고 있으며, 5G 기술은 네트워크 슬라이싱, 초다접속 등의 기술을 이용해 4G에 비해 빠른 속도와 응답 속도를 최소화한 기술로 평가 받고 있다. 5G NR은 5G 이동통신 표준을 의미하고, 네트워크 슬라이싱을 통해 네트워크를 병렬연결로 잘라 네트워크를 최적화한다. 또한 기지국 단위에서도 데이터를 처리하게 되면서 해킹에 대한 위험이 증가 되고 있는 실정이다. 또한, 단위면적당 접속 가능한 기기의 수가 기하급수적으로 늘어나므로 단위면적 내 기기 다수 해킹 후 기지국 공격 가능성 또한 존재한다. 이에 해결 방안으로는 양자암호통신 도입, 5G 보안 표준화 등을 본 연구에서 제안하여 안전성과 통신속도를 전부 만족시키는 방안을 제안한다.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.