• Title/Summary/Keyword: Access 2

Search Result 5,493, Processing Time 0.035 seconds

Access Control for D2D Systems in 5G Wireless Networks

  • Kim, Seog-Gyu;Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.103-110
    • /
    • 2021
  • In this paper, we compare two access control mechanisms for D2D(Device-to-Device) systems in 5G wireless networks and propose an effective access control for 5G D2D networks. Currently, there is no specified access control for 5G D2D networks but there can be two access control approaches for 5G D2D networks. One is the UE-to-Network Relay based access control and the other is the Remote UE(User Equipment) based access control. The former is a UE-to-Network Relay carries out the access control check for 5G D2D networks but the latter is a Remote UE performs the access control check for 5G D2D networks. Through simulation and evaluation, we finally propose the Remote UE based access control for D2D systems in 5G wireless networks. The proposed approach minimizes signalling overhead between the UE-to-Network Relay and the Remote UE and more efficiently performs the access control check, when the access control functionalities are different from the UE-to-Network Relay in 5G D2D networks.

Sheetlike Waveguide for 2.4 GHz and 5 GHz Bands

  • Eom, Kun-Sun;Hiroyuki, Arai
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.112-119
    • /
    • 2010
  • We present a useful design for a free access mat which supports two frequency bands of 2.4 GHz and 5 GHz. The free access mat is a sheet-shaped waveguide which consists of a tightly coupled double-layered microstrip resonator array. It provides easy access for devices in short-range wireless communications. Interference is a common problem with conventional applications which use free space transmission. Our proposed wireless access system uses a subsidiary waveguide, the free access mat. Wireless devices are proximately coupled to the free access mat through which the coupled electromagnetic (EM) wave transmits. The arrival domain of the EM wave of an application is therefore limited to an area close to the free access mat. Wireless devices can be coupled to the free access mat at an arbitrary position without contact. We previously presented a free access mat for a single frequency band. This paper presents a free access mat for the two frequency bands of 2.4 GHz and 5 GHz. The free access mat uses a ring patch resonator array which is easily excited by typical antennas and is resistant to interference. These characteristics are demonstrated by numerical simulation and confirmed by experiment.

The Impact of Facebook Access Motivation on Facebook Addiction among High School Students: The Mediator Role of Online Self-Disclosure

  • Lee, Eunhee
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.103-112
    • /
    • 2019
  • Online self-disclosure was hypothesized as a mediating variable, explaining the relationship between Facebook access motivation (relationship expansion, curiosity about others' life, maintenance of social connection, social pressure from others, habitual use, impression management, searching for information, and content sharing) and Facebook addiction. Data came from 407 high school students in the Busan, and Gyeongnam provinces. Structural analysis was used to specify the relations among measured construct. Facebook access motivation of curiosity about others' life, Facebook access motivation of maintenance of social connection, Facebook access motivation of social pressure from others, Facebook access motivation of habitual use, and Facebook access motivation of impression management were significant predictors of Facebook addiction. Online self-disclosure mediates between Facebook access motivation of curiosity about others' life, Facebook access motivation of social pressure from others, Facebook access motivation of searching for information & Facebook access motivation of content sharing and Facebook addiction. Viewing online self-disclosure as a mediator has important implications for social media addiction counseling practice.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

A Study on Region Gateway-based Data Transmission in IoT Environment (IoT 환경에서의 지역 Gateway 기반 데이터 전송에 관한 연구)

  • Cho, Kyoung-Woo;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.531-532
    • /
    • 2017
  • OneM2M's domain is divided into Device, Network, and Application domain, and data generated from various devices is collected through IoT/M2M gateway, it is delivered to appropriate IoT/M2M Infrastructure through Core/Access Network. However, access to the Core/Access Network is also required if the device transmit data to an Infrastructure located within the same area. In this paper, it propose data transmission based on region gateway that judge and transmit local information of data by adding a concept of region network domain to oneM2M domain, prevent access to unnecessary Core/Access Network.

  • PDF

Access Control for Secure Access Path (안전한 접근 경로를 보장하기 위한 접근 제어)

  • Kim, Hyun-Bae
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.57-66
    • /
    • 1997
  • The primary purpose of security mechanisms in a computer systems is to control the access to information. There are two types of access control mechanisms to be used typically. One is discretionary access control(DAC) and another is mandatory access control(MAC). In this study an access control mechanism is introduced for secure access path in security system. The security policy of this access control is that no disclosure of information and no unauthorized modification of information. To make this access control correspond to security policy, we introduce three properties; read, write and create.

  • PDF

ISDN Experimental Experiences on User-Network Interfaces (ISDN 가입자 - 망 접속에서의 실험적 경험에 대한 고찰)

  • Jeong, Il-Yeong;Jeong, Hui-Chang;Jo, Gyu-Seop;Im, Ju-Hwan
    • ETRI Journal
    • /
    • v.10 no.1
    • /
    • pp.3-13
    • /
    • 1988
  • With the contunuing trends towards an information based society, telecommunications services are becoming an integral part of social activities. So, emphasis on ISDN is growing rapidly and placed on supporting integrated services delivery of different levels to the end user. The end user’s perception of an integraged services delivery(in particular, ISDN services) should reflect three interrelated capabilities, ISDN access capabilities and ISDN network capabilities. For turning the ISDN concept of above capabilities into reality, we have implemented the experimental system on user-network interfaces, which are three kinds of implementations in user access arrangements, namely basic access, intermediate rate multiplexed access and primary rate multiplexed access. Through these implementations, NTE(Network Terminating Equipment) is used for single basic access [2B+D], IMUX (Intermediate rate Multiplexer) for 4 basic accesses [4X(2B+D)] and PMUX(Primary rate Multiplexer) for [10/12 X (2B+D)]. This paper describes the outlines of system features on user access equipments, system architectures of testbed and experiment result of each access arrangements.

  • PDF

THE INFLUENCE OF DIFFERENT ACCESS CAVITY DESIGNS ON THE FRACTURE STRENGTH IN ENDODONTICALLY TREATED MANDIBULAR ANTERIOR TEETH (근관와동형태에 따른 근관치료된 하악절치의 파절강도)

  • Lee Young-Gyun;Shin Hye-Jin;Park Se-Hee;Cho Kyung-Mo;Kim Jin-Woo
    • Restorative Dentistry and Endodontics
    • /
    • v.29 no.6
    • /
    • pp.515-519
    • /
    • 2004
  • Straight access cavity design allows the operator to locate all canals, helps in proper cleaning and shaping, ultimately facilitates the obturation of the canal system. However, change in the fracture strength according to the access cavity designs was not clearly demonstrated yet. The purpose of this study was to determine the influence of different access cavity designs on the fracture strength in endodontically treated mandibular anterior teeth. Recently extracted mandibular anterior teeth that have no caries, cervical abrasion, and fracture were divided into three groups (Group 1 : conventional lingual access cavity, Group 2 : straight access cavity, Group 3 : extended straight access cavity) according to the cavity designs. After conventional endodontic treatment, cavities were filled with resin core material. Compressive loads parallel to the long axis of the teeth were applied at a crosshead speed of 2mm/min until the fracture occurred. The fracture strength analyzed with ANOV A and the Scheffe test at the 95% confidence level. The results of this study were as follows: 1. The mean fracture strength decrease in following sequence Group 1 (4558.90{\;}\pm{\;}77.40{\;}N$), Group 2 ($494.07{\;}\pm{\;}123.98{\;}N) and Group 3 ($267.33{\;}\pm{\;}27.02{\;}N). 2. There was significant difference between Group 3 and other groups (P = 0.00). Considering advantage of direct access to apical third and results of this study, straight access cavity is recommended for access cavity form of the mandibular anterior teeth.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.