• Title/Summary/Keyword: Device Network

Search Result 2,401, Processing Time 0.032 seconds

Adaptive Wireless Sensor Network Technology for Ubiquitous Container Logistics Development

  • Chai, Bee-Lie;Yeoh, Chee-Min;Kwon, Tae-Hong;Lee, Ki-Won;Lim, Hyotaek;Kwark, Gwang-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.317-320
    • /
    • 2009
  • At the present day, the use of containers crisscrossing seven seas and intercontinental transport has significantly increased and bringing the change on the shape of the world economy which we cannot be neglected. Additionally, with the recent technological advances in wireless sensor network (WSN) technologies, has providing an economically feasible monitoring solution to diverse application that allow us to envision the intelligent containers represent the next evolutionary development step in order to increase the efficiency, productivity, utilities, security and safe of containerized cargo shipping. This paper we present a comprehensive containerized cargo monitoring system which has adaptively embedded WSN technology into cargo logistic technology. We share the basic requirement for an autonomous logistic network that could provide optimum performance and a suite of algorithms for self-organization and bi-directional communication of a scalable large number of sensor node apply on container regardless inland and maritime transportation.

  • PDF

Energy-Aware Media Streaming Service for Mobile Devices (이동단말기를 위한 에너지 인식 미디어 스트리밍 서비스)

  • Lee, Joa-Hyoung;Kim, Hark-Soo;Jung, In-Bum
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.379-388
    • /
    • 2007
  • With proliferation of computer and wireless network technology, it is common to access Internet through wireless network using mobile device. Ratio of using streaming media out of many applications through Internet is increasing not only in wired network but also in wireless network. Streaming media is much bigger than other contents and requires more network bandwidth and more computing resources. However mobile devices hate relatively poor computing resource and low network bandwidth. If media streaming service is provided for mobile devices without any consideration about network bandwidth and computing power, it is hard for the client to get high qualify service. Since mobile device is supported with very limited energy from the battery, media streaming should be adjusted to varying energy state of mobile device in realtime to ensure complete playback of streaming media. In this paper, we propose DFRC to provide high qualify service to mobile client through wireless network by controlling the number of frames transmitted to client based on computing resource and energy state of mobile device.

Energy-Efficient Power Control for Underlaying D2D Communication with Channel Uncertainty: User-Centric Versus Network-Centric

  • Ding, Jianfeng;Jiang, Lingge;He, Chen
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.589-599
    • /
    • 2016
  • Most existing resource management problem models arise from the original desire of allocating resources in either a user-centric or network-centric manner. The difference between their objectives is obvious: user-centric methods attempt to optimize the utility of individual users, whereas network-centric models intend to optimize the collective utilities of the entire network. In this paper, from the above two aspects, we analyze the robust power control problem in device-to-device (D2D) communication underlaying cellular networks, where two types of channel uncertainty set (e.g., ellipsoidal and column-wise) are considered. In the user-centric method, we formulate the problem into the form of a Stackelberg game, where the energy efficiency (EE) of each user is the ingredient of utility function. In order to protect the cellular user equipment's (CUE) uplink transmission, we introduce a price based cost function into the objectives of D2D user equipment (DUE). The existence and uniqueness of the game with the influence of channel uncertainty and price are discussed. In the network-centric method, we aim to maximize the collective EE of CUEs and DUEs. We show that by the appropriate mathematical transformation, the network-centric D2D power control problem has the identical local solution to that of a special case of the user-centric problem, where price plays a key role. Numerical results show the performance of the robust power control algorithms in the user-centric and network-centric models.

A Device-to-device Sharing-Resource Allocation Scheme based on Adaptive Group-wise Subset Reuse in OFDMA Cellular Network (OFDMA 셀룰러 네트워크에서 적응적인 Group-wise Subset Reuse 기반 Device-to-device 공유 자원 할당 기법)

  • Kim, Ji-Eun;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.72-79
    • /
    • 2010
  • Device-to-device(D2D) links which share resources in a cellular network present a challenge in radio resource management due to the potentially severe interference they may cause to the cellular network. In this paper, a resource allocation scheme based on subset reuse methods is proposed to minimize the interference from the D2D links. We consider an adaptive group-wise subset reuse method to enhance the efficiency of frequency resource allocation for cellular and D2D links. A power optimization scheme is also proposed for D2D links if cellular links are interfered by adjacent D2D transmissions. The computer simulation results show that performance gain is obtained in link SINR, and total cell throughput increases as nearby traffic becomes more dominant.

Performance Analysis and Experiment of Network Architecture for Distributed Control System

  • Lee, Sung-Woo;Gwak, Kwi ?Yil;Song, Seong-Il;Park, Doo-Yong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.334-337
    • /
    • 2005
  • This paper describes the implementation of DCS communication network that provides high bandwidth and reliability. The network for DCS in this paper adopts the Reflective Memory (RM) architecture and Fast Ethernet physical media that have 100Mbps bandwidth. Also, this network uses Ring Enhancement Device (RED) which was invented to reduce the time delay of each node. The DCS network that is introduced in this paper is named as ERCNet(Ethernet based Real-time Control Network). This paper describes the architecture and working algorithms of ERCNet and performs numerical analysis. In addition, the performance of ERCNet is evaluated by experiment using the developed ERCNet network.

  • PDF

Design and Implementation of MOST Network Service over POSIX (차량용 MOST 네트워크를 위한 POSIX 기반의 Network Service 설계 및 구현)

  • Lee, Mu-Youl;Chung, Sung-Moon;Jin, Hyun-Wook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.23-28
    • /
    • 2010
  • The automotive industry tries to provide infotainment systems to emerging automobiles. Since the infotainment systems require various peripheral devices and network connectivity, legacy operating systems such as Linux and Windows can be much preferred due to its plentiful device drivers and multimedia applications while the operating systems following OSEK standard are used for automotive electronic control units. Thus it is highly desired that the system software supporting infotainment applications can be portable over different legacy operating systems providing unified programming interfaces. The majority of legacy operating systems support POSIX interfaces for application development. MOST is an automotive network standard for infotainment systems. Network Service defines the protocol stacks for MOST control data, which is essential to implement infotainment applications over MOST. In this paper, we suggest a POSIX-based Network Service so that we can utilize legacy device drivers and applications for automotive infotainment systems. We measure the performance of the POSIX-based Network Service and show that its overhead is not significant.

HAN(Home Area Network) in Zigbee Safety Authentication Mechanism for Zigbee Device (홈 네트워크 디바이스에서 ZigBee기반의 안전한 인증 메커니즘)

  • Choi, Ji-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.267-271
    • /
    • 2010
  • Zigbee는 단말에 대한 경제성이 뛰어나고 저 전력통신을 이용하기 때문에 수명이 길다. Mesh, Tree, Star 등 다양한 방식의 토플리지 구조를 지원 하며 확장성이 뛰어나 군사적인 용도, 환경 모니터링 시스템 등 많은 분야에 사용되고 있다. 최근 스마트그리드환경을 구축함에 있어 Zigbee는 HAN(Home Area Network)에 표준으로 사용될 예정이며 현재는 Zigbee를 이용한 AMR(Automatic Meter Reading)을 시범 중에 있다. 일반적으로 ZIgbee Network은 ZC(Zigbee Coordinator), ZCH(Zigbee Cluster Head), ZE(Zigbee End Device) 3가지로 구성되며, Zigbee Network에서 발생할 수 있는 취약점은 허가되지 않은 디바이스의 접근, 라우터의 흐름을 조작하는 방법, ZC(Zigbee Coordinator)와 ZE(Zigbee End Device)사이의 키 전송 시 안전하지 않은 채널을 이용하여 전송되는 문제가 발생된다. 본 논문에서는, TCP(Third Party Center)를 이용함으로써, ZE와 ZC간의 키 생성 시 발생하는 취약점을 보완하였다. 또한 인증절차를 강화함으로써 ZE(Zigbee End Device)에서 발생 할 수 있는 취약점을 보완하고자 하였으며 RS(Register Server)를 이용하여 HAN에 존재하는 디바이스에 대하여 실시간 모니터링이 가능하게 하였다.

  • PDF

Design of U-Healthcare Monitoring System based on Mobile Device (모바일 디바이스 기반의 U-헬스케어 모니터링 시스템 구현)

  • Park, Joo-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.46-53
    • /
    • 2012
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. It is necessary to develop the WBAN core technology that sensor node device, WBAN middleware and WBAN application service for WBAN environment. In this paper we designed the medical message structure and implemented medical application for purpose of vital information reliability. The message structure was proposed for WBAN environment and application can be check biometric information from BN on smart device through WBAN gateway.

A Study on Group Key Management based on Mobile Device ID in Ad-hoc network (Ad-hoc 네트워크에서 모바일 디바이스 아이디 기반의 그룹 키 관리에 대한 연구)

  • Kang, Seo-Il;Lee, Nam-Hoon;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.540-549
    • /
    • 2009
  • An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely communicate in the Ad-hoc network. This paper examines the trend of the authentication in the Ad-hoc network and the group key management and suggests the plan for ID-based mutual authentication and group key establishment. ID-based mutual authentication in proposed scheme uses zero knowledge in the absence of shared information and is applied to establish a session key and group key. In addition, the proposed scheme is applied to Ad-hoc network to increase the efficiency and the safety of security technology.

  • PDF

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.