• Title/Summary/Keyword: CAN communication

Search Result 20,525, Processing Time 0.039 seconds

Study on optimized positioning of wireless communication equipment for CBTC (CBTC를 위한 무선통신장비의 최적 위치 선정연구)

  • Kim Yun-Bae;Jung Jae-Ok
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1199-1204
    • /
    • 2004
  • In this paper, the DCS (Data Communication System) which is a main part of CBTC (Communication Based Train Control) system is consisted of radio based wireless communication system and optical based wired system. In the radio based wireless communication, the location of AP(Access Point) Enclosure and Antenna shall be optimized for the guaranteed communication channel between wayside and trains either open aired or tunnelled area. This study is introducing the way of determinating optimized positioning the radio based wireless communication equipment in Bundang Line. At this moment, this CBTC project for the KNR's (Korea National Railway) intelligent train control system are in installment phase therefore the simulation data can show only from lab equipment. After the phase I testing, more detailed data can be collected and advanced paper will be issued in a short time.

  • PDF

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

The performance of MIMO cooperative communication systems using the relay with multi-antennas and DSTC

  • Chan Kyu Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.14-23
    • /
    • 2023
  • The cooperative communication systems using MIMO(multiple input multiple-output) relay are known as one of the most promising techniques to improve the performance and coverage of wireless communication systems. In this paper, we propose the cooperative communication systems using the relay with multi-antennas and DSTC(distributed space time coding) for decode-and-forward protocol. As using DSTC for DF(decode-and-forward), we can minimize the risk of error propagation at the wireless system using relay system. Also, the MIMO channel cab be formed by multi-antenna and DSTC at the MS(mobile station)-RS(relay station) and at the RS-BS(base station).Therefore, obtaining truly constructive the MIMO diversity and cooperative diversity gain from the proposed approach, the performance of system can be more improved than one of conventional system (relay with single antenna, no relay). The improvement in bit error rate is investigated through numerical analysis of the cooperative communication system with the proposed approach.

Gesture Communication: Collaborative and Participatory Design in a New Type of Digital Communication (제스츄어 커뮤니케이션: 새로운 방식의 디지털 커뮤니케이션의 참여 디자인 제안)

  • Won, Ha Youn
    • Korea Science and Art Forum
    • /
    • v.20
    • /
    • pp.307-314
    • /
    • 2015
  • Tele-Gesture is a tangible user interface(TUI) device that allows a user to physically point to a 3D object in real life and have their gestures play back by a robotic finger that can point to the same object, either at the same time, or at another point in time. To understand the extent of the gestures as new way of digital collaborative communication, collaboration situation and types were experimented as TUI implementations. The design prototype reveals that there is a rich non-verbal component of communication in the form of gesture-clusters and body movements that happen in an digital communication. This result of analysis can contribute to compile relevant contributions to the fields of communication, human behavior, and interaction with high technology through an interpretive social experience.

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems

  • Kim, BeomSeok
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1602-1612
    • /
    • 2017
  • Since rapidly disseminating of Internet of Things (IoT) as the new communication paradigm, a number of studies for various applications is being carried out. Especially, interest in the smart medical system is rising. In the smart medical system, a number of medical devices are distributed in popular area such as station and medical center, and this high density of medical device distribution can cause serious performance degradation of communication, referred to as the coexistence problem. When coexistence problem occurs in smart medical system, reliable transmitting of patient's biological information may not be guaranteed and patient's life can be jeopardized. Therefore, coexistence problem in smart medical system should be resolved. In this paper, we propose a distributed coexistence mitigation scheme for IoT-based smart medical system which can dynamically avoid interference in coexistence situation and can guarantee reliable communication. To evaluate the performance of the proposed scheme, we perform extensive simulations by comparing with IEEE 802.15.4 MAC protocol which is a traditional low-power communication technology.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

Channel Sorting Based Transmission Scheme For D2D Caching Networks (채널 정렬을 활용한 D2D 캐싱 네트워크용 전송 기법)

  • Jeong, Moo-Woong;Ryu, Jong Yeol;Kim, Seong Hwan;Lee, Woongsup;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1511-1517
    • /
    • 2018
  • Mobile Device-to-Device (D2D) caching networks can transmit multimedia data to users directly without passing through any network infrastructure by storing popular multimedia contents in advance that are popular among many mobile users at caching server devices (CSDs) in distributed manners. Thus, mobile D2D caching networks can significantly reduce backhaul traffic in wired networks and service latency time of mobile users. In this paper, we propose an efficient transmission scheme that can enhance the transmission efficiency of mobile D2D caching networks by using multiple CSDs that are caching the contents that are popular among mobile users. By sorting the multiple CSDs that are caching a content that mobile users want to receive according to their channel gains, the proposed scheme can reduce the complexity of algorithm significantly, compared to an optimal scheme based on Brute-force searching, and can also obtain much higher network transmission efficiency than the existing Blanket and Opportunistic transmission schemes.

Indoor IoT Monitoring System based on Visible Light Communication using Smart Phone (스마트폰을 이용한 가시광통신 기반 실내 IoT 모니터링 시스템)

  • Oh, Hoon;Lee, Yeon Jae;Park, Su Bin;An, Hyeon Sik;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.4
    • /
    • pp.35-43
    • /
    • 2017
  • In this paper, we propose indoor IoT monitoring system based on visible light communication using smart phone with attracting attentions in recent wireless communication. The main features and contributions of the proposed system developed in this paper are as follows. First, the actual data generated within indoor can be processed via the server by using only the visible light communication. Second, the collected data by using the visible light communication can be monitered by smart phone. Performance evaluation of the proposed system is performed under illumination of the normal fluorescent lamps. We first check successful transmission between transmitting module and receiving module of the data collection system. The monitoring system is tested according to the change of the degree of condensing and distance of the LED and the decoding success rate of the proposed smart phone application. We expect that the proposed system can be applied for indoor and outdoor IoT areas together.

Implementation of Wireless Network simulator considering a User's Call Characteristics (사용자 통화 특성을 고려한 무선 네트워크 시뮬레이터 구현)

  • Yoon, Young Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.107-115
    • /
    • 2009
  • Traditionally, simulation method is used to test and evaluate the performance of communication protocol or functional elements for mobile communication service. In this paper, wireless network simulator is implemented using the C++ object-oriented programming language. This simulator can simulate wireless data services, like as ad-hoc networks, by considering the user's mobility. In this paper, the simulator includes network traffic model to reflect wireless data service and traffic source model to represent a user's mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time. This simulator can be used in adjusting the characteristics of wireless data hosts following the mobility of the user, and also can be used in building new wireless ad-hoc network routing protocols.

Analysis of Response Characteristics of CAN-Based Feedback Control System Considering Message lime Delays (메시지 지연시간을 고려한 CAN 기반 피드백 제어시스템의 응답특성 분석)

  • Jeon, Jong-Man;Kim, Dae-Won
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.5
    • /
    • pp.190-196
    • /
    • 2002
  • In this paper, the response characteristics of CAN-based feedback control system are analyzed when message time delays through the network are considered. The message time delays are composed of computation time delay and communication time delay. The application layer of CAN communication is modeled mathematically to analyze two time delays, and the communication time delay is redefined under several assumption conditions. The CAN-based feedback control system is proposed as a target system that is the machining system with the three axes. The response characteristics of time delays in the proposed system are analyzed through computer simulations, and can be improved by the compensation using the PID tuning method to satisfy the design specifications of the system.