• Title/Summary/Keyword: 5G mobile network

Search Result 182, Processing Time 0.032 seconds

A Review of Security Policy and 3-Steps for Defense 5G (국방 5G 운영을 위한 보안정책과 단계별 구축에 대한 고찰)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.597-599
    • /
    • 2021
  • 5G technology will be applied to various technologies related to game changers in the defense field. In addition, the establishment of a mobile work environment will be utilized. 5G has emerged as a new threat due to major technologies different from previous technologies. And due to 5G technology, there is an increasing demand to apply mobile technology to the defense sector. In this paper, we look at the security policy for defense 5G operation and the step-by-step construction plan consisting of three.

  • PDF

Floop: An efficient video coding flow for unmanned aerial vehicles

  • Yu Su;Qianqian Cheng;Shuijie Wang;Jian Zhou;Yuhe Qiu
    • ETRI Journal
    • /
    • v.45 no.4
    • /
    • pp.615-626
    • /
    • 2023
  • Under limited transmission conditions, many factors affect the efficiency of video transmission. During the flight of an unmanned aerial vehicle (UAV), frequent network switching often occurs, and the channel transmission condition changes rapidly, resulting in low-video transmission efficiency. This paper presents an efficient video coding flow for UAVs working in the 5G nonstandalone network and proposes two bit controllers, including time and spatial bit controllers, in the flow. When the environment fluctuates significantly, the time bit controller adjusts the depth of the recursive codec to reduce the error propagation caused by excessive network inference. The spatial bit controller combines the spatial bit mask with the channel quality multiplier to adjust the bit allocation in space to allocate resources better and improve the efficiency of information carrying. In the spatial bit controller, a flexible mini graph is proposed to compute the channel quality multiplier. In this study, two bit controllers with end-to-end codec were combined, thereby constructing an efficient video coding flow. Many experiments have been performed in various environments. Concerning the multi-scale structural similarity index and peak signal-to-noise ratio, the performance of the coding flow is close to that of H.265 in the low bits per pixel area. With an increase in bits per pixel, the saturation bottleneck of the coding flow is at the same level as that of H.264.

Implementation of mmWave long-range backhaul for UAV-BS

  • Jangwon Moon;Junwoo Kim;Hoon Lee;Youngjin Moon;Yongsu Lee;Youngjo Bang;Kyungyeol Sohn;Jungsook Bae;Kwangseon Kim;Seungjae Bahng;Heesoo Lee
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.781-794
    • /
    • 2023
  • Uncrewed aerial vehicles (UAVs) have become a vital element in nonterrestrial networks, especially with respect to 5G communication systems and beyond. The use of UAVs in support of 4G/5G base station (uncrewed aerial vehicle base station [UAV-BS]) has proven to be a practical solution for extending cellular network services to areas where conventional infrastructures are unavailable. In this study, we introduce a UAV-BS system that utilizes a high-capacity wireless backhaul operating in millimeter-wave frequency bands. This system can achieve a maximum throughput of 1.3 Gbps while delivering data at a rate of 300 Mbps, even at distances of 10 km. We also present the details of our testbed implementation alongside the performance results obtained from field tests.

A Study on Implementation of Safety Navigation Mobile Application Converging Marine Environment Information and Location-Based Service

  • Jeon, Joong-Sung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.289-295
    • /
    • 2019
  • In this paper, we implemented a safety navigation mobile application that converged AtoN information and location-based services. When application user uses the smartphone's GPS sensor to transmit the user's vessel location data to the data server, the user receives information of which its providing range is considered, such as stored AtoN data, neighboring vessels information, danger area, and weather information in the server. Providing information is sorted based on the smartphone's direction and inclination and it will be also delivered via wireless network (5G, LTE, 3G, WiFi). Additionally the application is available to implement other functions such as information provision through voice and text alarming service when the user's vessel is either approaching or entering the danger area, and an expanded information provision service that is available in shadow area linking with data-storing methods; other linkable data such as weather and other neighboring vessels will be applied based on the lasted-saved data perceived from the non-shadow area.

Data Error Compensation Estimation Technology for Providing High Quality Contents in IoT Environment (IoT 환경에서 고품질 콘텐츠 제공을 위한 데이터 오류 보상 추정 기술)

  • Kim, Jeong Su
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.333-338
    • /
    • 2019
  • Cultural contents are the most important factor in high speed and high quality data communication. High-quality content includes VR and AR technology, and a variety of high-quality content can be streamed over wireless mobile phones via smartphones. In addition, network and wired/wireless communication are inevitably required in an Internet of Things (IoT) environment in which things are connected to a wireless Internet. IoT is used in various network technologies such as 4G, 5G mobile communication, WIFI wireless LAN, Bluetooth and so on. It is a technology that can use the connection between things anytime, anywhere, and can be achieved in a wireless mobile communication environment. Therefore, in this paper, we study data error compensation estimation method which can reduce data error based on mobile communication channel environment analysis so that high quality contents can be serviced even in high speed mobile environment.

Combined time bound optimization of control, communication, and data processing for FSO-based 6G UAV aerial networks

  • Seo, Seungwoo;Ko, Da-Eun;Chung, Jong-Moon
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.700-711
    • /
    • 2020
  • Because of the rapid increase of mobile traffic, flexible broadband supportive unmanned aerial vehicle (UAV)-based 6G mobile networks using free space optical (FSO) links have been recently proposed. Considering the advancements made in UAVs, big data processing, and artificial intelligence precision control technologies, the formation of an additional wireless network based on UAV aerial platforms to assist the existing fixed base stations of the mobile radio access network is considered a highly viable option in the near future. In this paper, a combined time bound optimization scheme is proposed that can adaptively satisfy the control and communication time constraints as well as the processing time constraints in FSO-based 6G UAV aerial networks. The proposed scheme controls the relation between the number of data flows, input data rate, number of worker nodes considering the time bounds, and the errors that occur during communication and data processing. The simulation results show that the proposed scheme is very effective in satisfying the time constraints for UAV control and radio access network services, even when errors in communication and data processing may occur.

A Study on 5G Service Methods by using BOCR Model and ANP

  • Song, Inkuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3299-3312
    • /
    • 2022
  • Recently, South Korea preferentially allocated frequencies to build 5G networks as a core competitiveness of the 4th Industrial Revolution. Although the government recognize the importance of 5G construction and preoccupation, network operators have limited to some services, testing the possibility of practical use of 5G. They hesitated to actively build and to carry out the service of a complete 5G network. While 5G is being developed and standardized like this, no one is sure of this step exactly what 5G will be. Thus, following research questions are asked by various stakeholders of 5G market: What is an ideal service providing method for the practical use of 5th generation mobile network? And what are the critical elements to be considered when selecting the service providing method? Therefore, the study aims to investigate 5G service providing issues and elements to be considered and to provide most appropriate service providing method for the practical use of 5G. The results identify that 'Specialized Service' is most appropriate method at the aspects of benefit and opportunity as well as the aspect of risk. In addition, the outcomes imply that the experts replying to the survey not only expect the expansion of emerging market, but also concern the social risk and cost. Since the study dealt with economic, social and business issues in providing 5G service, it might contribute not only to practical research, but also to academic research regarding 5G service method.

Low-latency 5G architectures for mission-critical Internet of Things (IoT) services

  • Choi, Changsoon;Park, Jong-Han;Na, Minsoo;Jo, Sungho
    • Information and Communications Magazine
    • /
    • v.32 no.9
    • /
    • pp.17-23
    • /
    • 2015
  • This paper presents design methodologies for 5G architecture ensuring lower latency than 4G/LTE. Among various types of 5G use cases discussed in standardization bodies, we believe mobile broadband, massive IoT(Internet of Things) and mission-critical IoT will be the main 5G use cases. In particular, a mission-critical IoT service such as remote controlled machines and connected cars is regarded as one of the most distinguished use cases, and it is indispensable for underlying networks to support sufficiently low latency to support them. We identify three main strategic directions for end-to-end network latency reduction, namely new radio access technologies, distributed/flat network architecture, and intelligent end-to-end network orchestration.

Security Vulnerability and Countermeasure on 5G Networks: Survey (5G 네트워크의 보안 취약점 및 대응 방안: 서베이)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.197-202
    • /
    • 2019
  • In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.