• Title/Summary/Keyword: Exchange & Communication

Search Result 1,204, Processing Time 0.025 seconds

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.

Developement of communication system for cooperative behavior i collective autonomous mobile robots (자율이동로봇군의 협조행동을 위한 통신시스템의 개발)

  • 이동욱;심귀보
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.3
    • /
    • pp.33-45
    • /
    • 1997
  • In this paper, we propsoe a new method of th ecommunication system for cooperative behaviors and works in collective autonomous mobile robots. A communication function among the collective robots is essential to intelligent cooperative works. In genral, global communication is effective for small number of robots. However when the number of robot goes on increasing, this becomes difficult to be realized because of limited communication capacity and increasing amount of information to handle. And also the problems such as communciation interfeence and improper message transmission occur. So we propose local communication system based on infrared sensor to realize the cooperative behavior among robots as the solution of above problem. It is possible to prevent overflow of information and exchange of complex information by fusion sign board model which transmits the information to unspecified robots and message passing model which communicate a specific robot. And we formularize optimal communication range by analysis of information propagation mechanism from the proposed comunication system. At last we verify the effectiveness of the proposed communication system from example of cooperative works.

  • PDF

ROSS: Low-Cost Self-Securing VoIP Communication Framework

  • Syafalni, Alfin;Samsudin, Azman;Jaafar, Yazid;Omar, Mohd. Adib
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3366-3383
    • /
    • 2012
  • Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort. Accordingly, a security framework for known participants in VoIP communication is proposed in this paper. The framework is known as Randomness-Optimized Self-Securing (ROSS), which performs authentication automatically throughout the session by optimizing the uniqueness and randomness of the communication itself. Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost. Human intelligence supports ROSS authentication process to ensure participant authenticity and communication regularity. The results show that with marginal overhead, the proposed framework is able to secure VoIP communication by performing reliable authentication.

Secure private key exchange method based on optical interferometry using biometric finger print (생체 지문을 이용한 광학 간섭계에 기반한 안전한 개인키 교환 기법)

  • Jeon, Seok-Hee;Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.42-46
    • /
    • 2021
  • A novel key exchange cryptographic method utilizing biometric finger print as a user's private key is proposed. Each unknown users' finger print is encrypted by optical phase-shifting interferometry principle and is changed into two ciphers, which are exchanged with the other party over a public communication network for secret key sharing. The transmitted ciphers generate a complex hologram, which is used to calculate a shared secret key for each user. The proposed method provides high security when applied to a secret key sharing encryption system.

A Study on the Development and Evaluation of a Collaborative Problem-Solving Learning Model for Nursing Students

  • Lee, Sowon;Kim, Boyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.168-176
    • /
    • 2021
  • This study developed and evaluated a learning model to improve collaborative problem-solving skills for nursing students taking physiology courses. This one-group pretest-posttest design used the jigsaw cooperative learning method on 30 nursing students from one local university. We analyzed the effect of a cooperative problem- solving learning model using SPSS 21.0 to compare changes in the students' collaborative self-efficacy, problem-solving abilities, and team-member exchange. As a result, the participants showed significant increases in collaborative self-efficacy, problem-solving ability, and team-member exchange after experiencing cooperative problem- solving learning model. Therefore, we will help nursing students improve their communication skills by enhancing their collaborative self-efficacy and help them solve problems effectively in conflict situations.

Applying Security Algorithms using Authentication Against Cyber Attacks in DAS Communication Network (배전자동화 시스템 통신망에 대한 사이버 공격에 대해 인증의 기법을 이용한 보안 알고리즘 적용방안)

  • Lim, Il-Hyung;Choi, Myeon-Song;Lee, Seung-Jae;Lim, Seong-Il;Lee, Sung-Woo;Ha, Bok-Nam;Hong, Sug-Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.327-335
    • /
    • 2008
  • As communication is becoming increasingly prevalent and especially communication architecture is more relying on the open standard communication protocols, the security issues become major concerns. In this paper we consider possible cyber attacks in the applications based on the current distribution communication architecture, and then derive the security goals. Next we propose how the security algorithms can be adapted to achieve these security goals. We intend to adapt the most efficient ways of secure message exchange, taking the resource-constrained FRTUs into account Finally we show some experiments to validate the protocols.

Novel Digital Cancelation Method in Presence of Harmonic Self-Interference

  • Ju, Hyungsik;Gwak, Donghyuk;Lee, Yuro;Kim, Tae-Joong
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.245-254
    • /
    • 2017
  • In-band full-duplex (IFD) communication has recently attracted a great deal of interest because it potentially provides a two-fold spectral efficiency increase over half-duplex communications. In this paper, we propose a novel digital self-interference cancelation (DSIC) algorithm for an IFD communication system in which two nodes exchange orthogonal frequency-division multiplexing (OFDM) symbols. The proposed DSIC algorithm is based on the least-squares estimation of a self-interference (SI) channel with block processing of multiple OFDM symbols, in order to eliminate the fundamental and harmonic components of SI induced through the practical radio frequency devices of an IFD transceiver. In addition, the proposed DSIC algorithm adopts discrete Fourier transform processing of the estimated SI channel to further enhance its cancelation performance. We provide a minimum number of training symbols to estimate the SI channel effectively. The evaluation results show that our proposed DSIC algorithm outperforms a conventional algorithm.

Adolescent Perceptions of Social Media in a Pacific Rim Community

  • Holmes, Robyn M.;Liden, Sharon;Shin, Lisa
    • Child Studies in Asia-Pacific Contexts
    • /
    • v.3 no.2
    • /
    • pp.81-103
    • /
    • 2013
  • This study explored social media use among 50 adolescents attending a public high school in a non-Western community. Adolescents participated in focus group interviews and completed a written self-report survey. Findings revealed that these teenagers use electronic communication forms such as phone texting and social networking sites to connect with friends and family. They show a preference for Facebook, YouTube, and Instagram, do not engage in risky Internet behavior, and acknowledge both positive and negative aspects of electronic communication forms. In addition, their selection of electronic communication forms is dependent upon several factors that include the strength of the relationship and type of discourse exchange. For example, they reserve phone texting and cell use, which are more private communication mediums for family and friends. Electronic communication did not replace face-to-face interactions; rather it complemented and extended those interactions. Findings support existing literature on adolescent social media use and those shared with other collectivist cultural groups.

Communication Resource Allocation Strategy of Internet of Vehicles Based on MEC

  • Ma, Zhiqiang
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.389-401
    • /
    • 2022
  • The business of Internet of Vehicles (IoV) is growing rapidly, and the large amount of data exchange has caused problems of large mobile network communication delay and large energy loss. A strategy for resource allocation of IoV communication based on mobile edge computing (MEC) is thus proposed. First, a model of the cloud-side collaborative cache and resource allocation system for the IoV is designed. Vehicles can offload tasks to MEC servers or neighboring vehicles for communication. Then, the communication model and the calculation model of IoV system are comprehensively analyzed. The optimization objective of minimizing delay and energy consumption is constructed. Finally, the on-board computing task is coded, and the optimization problem is transformed into a knapsack problem. The optimal resource allocation strategy is obtained through genetic algorithm. The simulation results based on the MATLAB platform show that: The proposed strategy offloads tasks to the MEC server or neighboring vehicles, making full use of system resources. In different situations, the energy consumption does not exceed 300 J and 180 J, with an average delay of 210 ms, effectively reducing system overhead and improving response speed.

An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station (기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜)

  • Cho, KookRae;Son, Jong-Wuk;Cho, HuiSup
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.118-127
    • /
    • 2010
  • Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.