• Title/Summary/Keyword: Beijing Protocol

Search Result 38, Processing Time 0.022 seconds

A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems

  • Su, Haoru;Yuan, Xiaoming;Tang, Yujie;Tian, Rui;Sun, Enchang;Yan, Hairong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4385-4399
    • /
    • 2021
  • The Internet of Things (IoT) eHealth systems composed by Wireless Body Area Network (WBAN) has emerged recently. Sensor nodes are placed around or in the human body to collect physiological data. WBAN has many different applications, for instance health monitoring. Since the limitation of the size of the battery, besides speed, reliability, and accuracy; design of WBAN protocols should consider the energy efficiency and time delay. To solve these problems, this paper adopt the end-edge-cloud orchestrated network architecture and propose a transmission based on reinforcement algorithm. The priority of sensing data is classified according to certain application. System utility function is modeled according to the channel factors, the energy utility, and successful transmission conditions. The optimization problem is mapped to Q-learning model. Following this online power control protocol, the energy level of both the senor to coordinator, and coordinator to edge server can be modified according to the current channel condition. The network performance is evaluated by simulation. The results show that the proposed power control protocol has higher system energy efficiency, delivery ratio, and throughput.

Cooperative Relaying with Interference Cancellation for Secondary Spectrum Access

  • Dai, Zeyang;Liu, Jian;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2455-2472
    • /
    • 2012
  • Although underlay spectrum sharing has been shown as a promising technique to promote the spectrum utilization in cognitive radio networks (CRNs), it may suffer bad secondary performance due to the strict power constraints imposed at secondary systems and the interference from primary systems. In this paper, we propose a two-phase based cooperative transmission protocol with the interference cancellation (IC) and best-relay selection to improve the secondary performance in underlay models under stringent power constraints while ensuring the primary quality-of-service (QoS). In the proposed protocol, IC is employed at both the secondary relays and the secondary destination, where the IC-based best-relay selection and cooperative relaying schemes are well developed to reduce the interference from primary systems. The closed-form expression of secondary outage probability is derived for the proposed protocol over Rayleigh fading channels. Simulation results show that, with a guaranteed primary outage probability, the proposed protocol can achieve not only lower secondary outage probability but also higher secondary diversity order than the traditional underlay case.

A Novel Cross-Layer Dynamic Integrated Priority-Computing Scheme for 3G+ Systems

  • Wang, Weidong;Wang, Zongwen;Zhao, Xinlei;Zhang, Yinghai;Zhou, Yao
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.15-20
    • /
    • 2012
  • As Internet protocol and wireless communications have developed, the number of different types of mobile services has increased gradually. Existing priority-computing schemes cannot satisfy the dynamic requirements of supporting multiple services in future wireless communication systems, because the currently used factors, mainly user priority, are relatively simple and lack relevancy. To solve this problem and provide the desired complexity, dynamic behavior, and fairness features of 3G and beyond 3G mobile communication systems, this paper proposes a novel cross-layer dynamic integrated priority-computing scheme that computes the priority based on a variety of factors, including quality of service requirements, subscriber call types, waiting time, movement mode, and traffic load from the corresponding layers. It is observed from simulation results that the proposed dynamic integrated priority scheme provides enhanced performance.

Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node

  • Du, Guanyao;Xiong, Ke;Zhang, Yu;Qiu, Zhengding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.545-563
    • /
    • 2015
  • Energy harvesting (EH) and network coding (NC) have emerged as two promising technologies for future wireless networks. In this paper, we combine them together in a single system and then present a time switching-based network coding relaying (TSNCR) protocol for the two-way relay system, where an energy constrained relay harvests energy from the transmitted radio frequency (RF) signals from two sources, and then helps the two-way relay information exchange between the two sources with the consumption of the harvested energy. To evaluate the system performance, we derive an explicit expression of the outage probability for the proposed TSNCR protocol. In order to explore the system performance limit, we formulate an optimization problem to minimize the system outage probability. Since the problem is non-convex and cannot be directly solved, we design a genetic algorithm (GA)-based optimization algorithm for it. Numerical results validate our theoretical analysis and show that in such an EH two-way relay system, if NC is applied, the system outage probability can be greatly decreased. Moreover, it is shown that the relay position greatly affects the system performance of TSNCR, where relatively worse outage performance is achieved when the relay is placed in the middle of the two sources. This is the first time to observe such a phenomena in EH two-way relay systems.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

Outage Analysis and Optimization for Four-Phase Two-Way Transmission with Energy Harvesting Relay

  • Du, Guanyao;Xiong, Ke;Zhang, Yu;Qiu, Zhengding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3321-3341
    • /
    • 2014
  • This paper investigates the outage performance and optimization for the four-phase two-way transmission network with an energy harvesting (EH) relay. To enable the simultaneous information processing and energy harvesting at the relay, we firstly propose a power splitting-based two-way relaying protocol (PSTWR). Then, we discuss its outage performance theoretically and derive an explicit expression for the system outage probability. In order to find the optimal system configuration parameters such as the optimal power splitting ratio and the optimal transmit power redistribution factor, we formulate an outage-minimized optimization problem. As the problem is difficult to solve, we design a genetic algorithm (GA) based algorithm for it. Besides, we also investigate the effects of the power splitting ratio, the power redistribution factor at the relay, and the source to relay distance on the system outage performance. Finally, extensive simulation results are provided to demonstrate the accuracy of the analytical results and the effectiveness of the GA-based algorithm. Moreover, it is also shown that, the relay position greatly affects the system performance, where relatively worse outage performance is achieved when the EH relay is placed in the middle of the two sources.

Pilot Sequence Assignment for Spatially Correlated Massive MIMO Circumstances

  • Li, Pengxiang;Gao, Yuehong;Li, Zhidu;Yang, Dacheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.237-253
    • /
    • 2019
  • For massive multiple-input multiple-output (MIMO) circumstances with time division duplex (TDD) protocol, pilot contamination becomes one of main system performance bottlenecks. This paper proposes an uplink pilot sequence assignment to alleviate this problem for spatially correlated massive MIMO circumstances. Firstly, a single-cell TDD massive MIMO model with multiple terminals in the cell is established. Then a spatial correlation between two channel response vectors is established by the large-scale fading variables and the angle of arrival (AOA) span with an infinite number of base station (BS) antennas. With this spatially correlated channel model, the expression for the achievable system capacity is derived. To optimize the achievable system capacity, a problem regarding uplink pilot assignment is proposed. In view of the exponential complexity of the exhaustive search approach, a pilot assignment algorithm corresponding to the distinct channel AOA intervals is proposed to approach the optimization solution. In addition, simulation results prove that the main pilot assignment algorithm in this paper can obtain a noticeable performance gain with limited BS antennas.

Interference Cancellation Scheme for Three-hop Cooperative Relay Networks

  • Zhang, Yinghua;Wang, Lei;Liu, Jian;Peng, Yunfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4446-4462
    • /
    • 2019
  • In this paper, we focus on interference cancellation for three-hop cognitive radio networks (CRNs) over Rayleigh fading channels. In CRNs, secondary users (SUs) are allowed to opportunistically utilize the licensed spectrum during the idle time of primary users (PUs) to achieve spectrum sharing. However, the SUs maybe power constrained to avoid interference and cover a very short transmission range. We here propose an interference cancellation scheme (ICS) for three-hop CRNs to prolong the transmission range of SUs and improve their transmission efficiency. In the proposed scheme, a flexible transmission protocol is adopted to cancel the interference at both secondary relays and destinations at the same time. And a closed-form expression for the secondary outage probability over Rayleigh fading channels is derived to measure the system performance. Simulation results show that the proposed scheme can significantly reduce the secondary outage probability and increase the secondary diversity in comparison with the traditional cases.

A Study on Modernization of International Conventions Relating to Aviation Security and Implementation of National Legislation (항공보안 관련 국제협약의 현대화와 국내입법의 이행 연구)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.201-248
    • /
    • 2015
  • In Korea the number of unlawful interference act on board aircrafts has been increased continuously according to the growth of aviation demand, and there were 55 incidents in 2000, followed by 354 incidents in 2014, and an average of 211 incidents a year over the past five years. In 1963, a number of states adopted the Convention on Offences and Certain Other Acts Committed on Board Aircraft (the Tokyo Convention 1963) as the first worldwide international legal instrument on aviation security. The Tokyo Convention took effect in 1969 and, shortly afterward, in 1970 the Convention for the Suppression of Unlawful Seizure of Aircraft(the Hague Convention 1970) was adopted, and the Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation(the Montreal Convention 1971) was adopted in 1971. After 9/11 incidents in 2001, to amend and supplement the Montreal Convention 1971, the Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation(the Beijing Convention 2010) was adopted in 2010, and to supplement the Hague Convention 1970, the Protocol Supplementary to the Convention for the Suppression of Unlawful Seizure of Aircraft(the Beijing Protocol 2010) was adopted in 2010. Since then, in response to increased cases of unruly behavior on board aircrafts which escalated in both severity and frequency,, the Montreal Protocol which is seen as an amendment to the Convention on Offences and Certain Other Acts Committed on Board Aircraft(the Tokyo Convention 1963) was adopted in 2014. Korea ratified the Tokyo Convention 1963, the Hague Convention 1970, the Montreal Convention 1971, the Montreal Supplementary Protocol 1988, and the Convention on the Marking of Plastic Explosive 1991 which have proven to be effective. Under the Tokyo Convention ratified in 1970, Korea further enacted the Aircraft Navigation Safety Act in 1974, as well as the Aviation Safety and Security Act that replaced the Aircraft Navigation Safety Act in August 2002. Meanwhile, the title of the Aviation Safety and Security Act was changed to the Aviation Security Act in April 2014. The Aviation Security Act is essentially an implementing legislation of the Tokyo Convention and Hague Convention. Also the language of the Aviation Security Act is generally broader than the unruly and disruptive behavior in Sections 1-3 of the model legislation in ICAO Circular 288. The Aviation Security Act has reflected the considerable parts of the implementation of national legislation under the Beijing Convention and Beijing Protocol 2010, and the Montreal Protocol 2014 that are the modernized international conventions relating to aviation security. However, in future, when these international conventions would come into effect and Korea would ratify them, the national legislation that should be amended or provided newly in the Aviation Security Act are as followings : The jurisdiction, the definition of 'in flight', the immunity from the actions against the aircraft commander, etc., the compulsory delivery of the offender by the aircraft commander, etc., the strengthening of penalty on the person breaking the law, the enlargement of application to the accomplice, and the observance of international convention. Among them, particularly the Korean legislation is silent on the scope of the jurisdiction. Therefore, in order for jurisdiction to be extended to the extra-territorial cases of unruly and disruptive offences, it is desirable that either the Aviation Security Act or the general Crime Codes should be revised. In conclusion, in order to meet the intelligent and diverse aviation threats, the Korean government should review closely the contents of international conventions relating to aviation security and the current ratification status of international conventions by each state, and make effort to improve the legislation relating to aviation security and the aviation security system for the ratification of international conventions and the implementation of national legislation under international conventions.

A Design of Wireless Sensor Network Based on ZigBee Technology in Petrochemical Industry

  • Huang, Song;Zhou, Qingsen;Zhang, Ke;Suh, Hee-Jong
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.27-28
    • /
    • 2007
  • In this paper, the Wireless Sensor Network (WSN) based on ZigBee technology was devised and developed. Wireless communication was applied to petrochemical domain, like other industries. And sensor network of IEEE 802.15.4 protocol stack diagram was described. Then, by analyzing the protocol, the software systems included the communication Protocol and point-to-point network were implemented with Freescale Semiconductor's product MC13192-SARD DSK board. After that, the performance of this design system was evaluated, and finally, by using PC Graphic User Interface (GUI) and IDE CW08 V3.1 programming tool, the real time communication data and the curve function were displayed.

  • PDF