• Title/Summary/Keyword: Internet Generation

Search Result 1,394, Processing Time 0.023 seconds

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform

  • Zhan, Furui;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2701-2722
    • /
    • 2017
  • Key generation is essential for protecting wireless networks. Based on wireless channel reciprocity, transceivers can generate shared secret keys by measuring their communicating channels. However, due to non-simultaneous measurements, asymmetric noises and other interferences, channel measurements collected by different transceivers are highly correlated but not identical and thus might have some discrepancies. Further, these discrepancies might lead to mismatches of bit sequences after quantization. The referred mismatches significantly affect the efficiency of key generation. In this paper, an efficient key generation scheme leveraging wireless channel reciprocity is proposed. To reduce the bit mismatch rate and enhance the efficiency of key generation, the involved transceivers separately apply discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) to pre-process their measurements. Then, the outputs of IDCT are quantified and encoded to establish the bit sequence. With the implementations of information reconciliation and privacy amplification, the shared secret key can be generated. Several experiments in real environments are conducted to evaluate the proposed scheme. During each experiment, the shared key is established from the received signal strength (RSS) of heterogeneous devices. The results of experiments demonstrate that the proposed scheme can efficiently generate shared secret keys between transceivers.

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

The Y Generation's Decision Factors of Purchasing Jeans in the United States (미국 Y세대의 청바지 구매결정요인에 관한 연구)

  • Hwang, Su-Jeong;Lee, Jin-Hee
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.5
    • /
    • pp.878-885
    • /
    • 2009
  • The Y generation born between 1981 and 1995 is the largest consumer group in the United States. This study is to provide an insight of understanding Y generation's decision factors of purchasing Jeans and the fit issues. This study investigated their purchasing decisions factors, including fit, cost, brand, color, and the media/internet influences. It is revealed that the Y generation might have access to the internet, but they still rely more on their peers and savvy skills to decide what they purchase. They preferred to shop from the land based retail stores rather than the internet. The fit was the most important factor of their purchasing decision, but less concerns of the brand. In this study, 87% of them chose "fit" as the reason to buy a pair of jeans. Fit problems were related to the price category. This study suggests apparel manufacturers should understand Y generation's fit issues in the global market.

  • PDF

Internet Monitoring of Wind-Photovoltaic Hybrid Generation System (풍력-태양광 복합발전 시스템의 인터넷 모니터링)

  • Yang, Si-Chang;Moon, Chae-Joo;Chang, Young-Hak;Soh, Soon-Yeol;Chung, Ji-Hyun;Kim, Eui-Sun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.4
    • /
    • pp.43-48
    • /
    • 2006
  • Recently, many researchers have shown great interest in wind-photovoltaic hybrid generation system which promotes electric power supply safely and progress of energy usage efficiently with complementary cooperation of a wind generation system and photovoltaic generation system. To use this hybrid generation system stably and effectively, we established a system which can acquire, analyse and save data and monitored remotely using internet. We constructed the signal conditioning circuit and used many kinds of converters to measure physical quantities such as wind velocity, intensity of illumination and temperature as well as many kinds of voltage and current for AC and DC. we acquired data from computer with data acquisition board, developed server program and client program which can download data that is monitored and saved in realtime at remote place. We analysed the measured data in relation to many conditions such as time and weather conditions.

A Study on Framework to offer the differentiated Optical QoS Service in the Next-Generation WDM Optical Internet Backbone Network (차세대 WDM 광 인터넷 백본망에서 차등화된 광 QoS 서비스 제공 프레임워크 연구)

  • Kim Yong-Seoug;Ryu Shi-Kook;Lee Jae-Dong;Kim Sung-Un
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.881-890
    • /
    • 2005
  • Over for the past 10 years, the increase in geometric progression for the internet traffic, has allowed the IP protocol framework to be the most important network technology. In addition, the internet service is being developed as a service mode differentiated, aiming to support the new-mode real-time multimedia services such as internet phone, video conference, cyber reality, and internet game, focusing on offering a latest service. These days, aiming to solve the need for broad bandwidth along with guaranteeing QoS, the WDM technology of offering multiple gigabit wavelengths is emerging as the core technology of next-generation optical internet backbone network. In the next-generation optical internet backbone network based on WDM, the QoS framework is one of fore subjects aiming to offer a service of guaranteeing QoS This study analyzes the requirements of performance related to QoS framework in IP Subnet and in WDM optical backbone network, and suggests optical QoS service framework differentiated. in order to guarantee end-to-end QoS through the next-generation optical internet backbone network, using GMPLS control protocol.

The Economic Value of Next-Generation Converged Communications and Broadcasting Services

  • Kang, Shin-Won;Cho, Sang-Sup;Lie, Han-Young
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.759-767
    • /
    • 2005
  • This research is to substantially analyze the economic value of portable Internet (WiBro), WCDMA High Speed Downlink Packet Access (HSDPA), WiBro+VoIP, and WiBro+DMB regarded as the next generation of broadcasting. Based on the empirical analysis of economic values, we provide the optimal paths of converged communications and broadcasting services related to WiBro. 1,000 Internet users in the Seoul and Gyeonggi areas were surveyed in their homes. The collected survey was calculated as an accurate economic value distribution for relevant services, and the average and mean were taken using a parametric logit model, semi-parametric Spike model, and nonparametric Turnbull and Kernel estimations in order to analyze the contingent economic value of the amount offered to the subjects of the analysis. The contingent value analysis results varied slightly according to the different methodologies; however, all showed the following common features. The economic value of WiBro, Internet-based WCDMA, VoIP, and DMB with WiBro appeared to be similar. Therefore, if WiBro and WCDMA (HSDPA) form a competitive relationship, the types of bundled services offered as portable Internet service and the supply point of such bundled services are expected to emerge in a strategic plan for stimulating service markets and the prior occupation of the market.

Study on Wireless Internet Industry Trends (무선인터넷 산업의 동향)

  • 김강회;여운동;홍성화
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.597-600
    • /
    • 2003
  • Wireless Internet access shows an early-stage market that is entering a period of strong and sustained growth., reaching almost $40 billion in combined related equipment services by 2008 with equipment and services of nearly equal proportion. This explosive development is possible due to the continued growth of two of the most successful markets in history, the internet and mobile telephony. The number of global wireless internet users will incense from approximately 1.9million in 2001 to 1.3billion by 2006. Technological changes are the main factor in the emergence of what is being called the fourth generation of mobile communications.

  • PDF

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model

  • Luo, Yubo;Huang, Yongfeng;Li, Fufang;Chang, Chinchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4568-4584
    • /
    • 2016
  • Steganography based on text generation has become a hot research topic in recent years. However, current text-generation methods which generate texts of normal style have either semantic or syntactic flaws. Note that texts of special genre, such as poem, have much simpler language model, less grammar rules, and lower demand for naturalness. Motivated by this observation, in this paper, we propose a text steganography that utilizes Markov chain model to generate Ci-poetry, a classic Chinese poem style. Since all Ci poems have fixed tone patterns, the generation process is to select proper words based on a chosen tone pattern. Markov chain model can obtain a state transfer matrix which simulates the language model of Ci-poetry by learning from a given corpus. To begin with an initial word, we can hide secret message when we use the state transfer matrix to choose a next word, and iterating until the end of the whole Ci poem. Extensive experiments are conducted and both machine and human evaluation results show that our method can generate Ci-poetry with higher naturalness than former researches and achieve competitive embedding rate.