• Title/Summary/Keyword: KICS

Search Result 2,286, Processing Time 0.022 seconds

Estimating Minimum Efficient Scale of Korean Mobile Telecom Market: Relation between Cost per Minute and Traffic Volume (국내이동통신서비스 시장에서의 최소효율규모 추정: 분당원가와 통화량 간 관계분석을 중심으로)

  • Choi, Sae-Sol;Han, Sung-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.867-873
    • /
    • 2013
  • Competition policy for growth and activation of market should consider structural nature of relevant industry closely. In this viewpoint, whether domestic MNOs(mobile network operators) are competing while securing the effect of scale economies and maximum production efficiency is an important element when looking for competition policy means of domestic mobile communication market. With this, present study analyzed level of MES (Minimum Efficient Scale) and whether achieving them or not through investigating the relation between the cost per minute and call traffic of domestic MNOs. This analysis is differentiated from existing econometric studies entailing several assumptions by enhancing a reality reflection through directly deducing of cost curve using verified data(cost per minute and call traffic). As a result of analysis, the levels of minimum efficient scale were different from each other between domestic MNOs, and an incumbent MNO(SKT) accomplished minimum efficient scale while entrant MNOs(KT and LGU+) could not yet reach minimum efficient scale level. This result demonstrates a gap exists in production efficiency level among domestic MNOs and implies that the policy to alleviate the gap among operators is required when establishing competitive policy in the future.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

Distributed Throughput-Maximization Using the Up- and Downlink Duality in Wireless Networks (무선망에서의 상하향 링크 쌍대성 성질을 활용한 분산적 수율 최대화 기법)

  • Park, Jung-Min;Kim, Seong-Lyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.878-891
    • /
    • 2011
  • We consider the throughput-maximization problem for both the up- and downlink in a wireless network with interference channels. For this purpose, we design an iterative and distributive uplink algorithm based on Lagrangian relaxation. Using the uplink power prices and network duality, we achieve throughput-maximization in the dual downlink that has a symmetric channel and an equal power budget compared to the uplink. The network duality we prove here is a generalized version of previous research [10], [11]. Computational tests show that the performance of the up- and downlink throughput for our algorithms is close to the optimal value for the channel orthogonality factor, ${\theta}{\in}$(0.5, 1]. On the other hand, when the channels are slightly orthogonal (${\theta}{\in}$(0, 0.5]), we observe some throughput degradation in the downlink. We have extended our analysis to the real downlink that has a nonsymmetric channel and an unequal power budget compared to the uplink. It is shown that the modified duality-based approach is thoroughly applied to the real downlink. Considering the complexity of the algorithms in [6] and [18], we conclude that these results are quite encouraging in terms of both performance and practical applicability of the generalized duality theorem.

Modulation Scheme for Network-coded Bi-directional Relaying over an Asymmetric Channel (양방향 비대칭 채널에서 네트워크 부호화를 위한 변조 방식)

  • Ryu, Hyun-Seok;Kang, Chung-G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.97-109
    • /
    • 2012
  • In this paper, we propose a modulation scheme for a network-coded bi-directional relaying (NBR) system over an asymmetric channel, which means that the qualities of the relay channel (the link between the BS and RS) and access channel (the link between the RS and MS) are not identical. The proposed scheme employs a dual constellation in such a way that the RS broadcasts the network-coded symbols modulated by two different constellations to the MS and BS over two consecutive transmission intervals. We derive an upper bound on the average bit error rate (BER) of the proposed scheme, and compare it with the hybrid constellation-based modulation scheme proposed for the asymmetric bi-directional link. Furthermore, we investigate the channel utilization of the existing bi-directional relaying schemes as well as the NBR system with the proposed dual constellation diversity-based modulation (DCD). From our simulation results, we show that the DCD gives better average BER performance about 3.5~4dB when $E_b/N_0$ is equal to $10^{-2}$, while maintaining the same spectral efficiency as the existing NBR schemes over the asymmetric bi-directional relaying channel.

Performance Evaluation of Energy Saving in Core Router and Edge Router Architectures with LPI for Green OBS Networks (Green OBS 망에서 LPI를 이용하는 코어 및 에지 라우터 구조의 에너지 절감 성능 분석)

  • Yang, Won-Hyuk;Jeong, Jin-Hyo;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.130-137
    • /
    • 2012
  • In this paper, we propose core and edge router architectures with LPI(Low Power Idle) for reducing energy consumption in OBS networks. The proposed core router architecture is comprised of a BCP switch, a burst switch, line cards and sleep/wake controller for LPI. When the offered load of network is low, sleep/wake controller can change the state of the core router line card from active to sleep state for saving the energy after receiving network control packet. The edge router consists of a switch for access line card, a SCU and OBS edge router line cards. The LPI function in edge router line card is performed through network level control by network control packet, individually. Additionally, PHY/transceiver modules can transition active state to sleep state when burst assemble engine generates new bursts. To evaluate the energy saving performance of proposed architecture with LPI, the power consumption of each router is analyzed by using data sheet of commercial router and optical device. And, simulation is also performed in terms of sleep time of PHY/Transceiver through OPNET.

Development of u-Health Care System for Dementia Patients (치매환자를 위한 u-Health Care 시스템 개발)

  • Shin, Dong-Min;Shin, Dong-Il;Shin, Dong-Kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1106-1113
    • /
    • 2013
  • For patients who have senile mental disorder such as dementia, quantity of excercise and amount of sunlight are important clue for dose and the treatment. Therefore, monitoring health information of daily life is necessary for patients' safety and healthy life. Portable & wearable sensor device and server configuration monitoring data are needed to provide these services for patients. Watch-type device(smart watch) which patients wear and server system are developed in this paper. Smart watch developed includes GPS, accelerometer and illumination sensor, and can obtain real time health information by measuring the position of patients, quantity of exercise and amount of sunlight. Server system includes the sensor data analysis algorithm and web server that doctor and protector can monitor through sensor data acquired from smart watch. The proposed data analysis algorithm acquires quantity of exercise information and detects step count in patients' motion acquired from acceleration sensor and to verify this, the three cases with fast pace, slow pace, and walking pace show 96% of the experimental result. If developed u-Healthcare System for dementia patients is applied, more high-quality medical service can be provided to patients.

Distributed Hashing-based Fast Discovery Scheme for a Publish/Subscribe System with Densely Distributed Participants (참가자가 밀집된 환경에서의 게재/구독을 위한 분산 해쉬 기반의 고속 서비스 탐색 기법)

  • Ahn, Si-Nae;Kang, Kyungran;Cho, Young-Jong;Kim, Nowon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1134-1149
    • /
    • 2013
  • Pub/sub system enables data users to access any necessary data without knowledge of the data producer and synchronization with the data producer. It is widely used as the middleware technology for the data-centric services. DDS (Data Distribution Service) is a standard middleware supported by the OMG (Object Management Group), one of global standardization organizations. It is considered quite useful as a standard middleware for US military services. However, it is well-known that it takes considerably long time in searching the Participants and Endpoints in the system, especially when the system is booting up. In this paper, we propose a discovery scheme to reduce the latency when the participants and Endpoints are densely distributed in a small area. We propose to modify the standard DDS discovery process in three folds. First, we integrate the Endpoint discovery process with the Participant discovery process. Second, we reduce the number of connections per participant during the discovery process by adopting the concept of successors in Distributed Hashing scheme. Third, instead of UDP, the participants are connected through TCP to exploit the reliable delivery feature of TCP. We evaluated the performance of our scheme by comparing with the standard DDS discovery process. The evaluation results show that our scheme achieves quite lower discovery latency in case that the Participants and the Endpoints are densely distributed in a local network.

Distributed Mobility Management Scheme in LTE/SAE Networks (LTE/SAE 네트워크에서 분산 이동성 관리 기법)

  • Kim, Yong-Hwan;Han, Youn-Hee;Kim, Min;Park, Seok Yong;Moon, Sang Jun;Lee, Jin Ho;Choi, Dae Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.879-894
    • /
    • 2013
  • Recently, due to a explosive growth in the mobile Internet traffic, the problem of excessive data traffic handling on core network and thus scalability problem have been magnified in 3GPP LTE/SAE networks. Current LTE/SAE network based on the central P-GW (PDN Gateway) used as mobility anchor cannot deal with such demand for exponentially increasing mobile Internet traffic. In this paper, we propose a new LTE/SAE network architecture supporting distributed P-GWs and corresponding distributed mobility management to solve these problems. For this, in addition to the deployment of such distributed P-GWs, we propose a dynamic and distributed mobility management by distributing MMEs (Mobility Management Entities) which dynamically manages the location information of a UE's PDN connection, and also propose a handover procedure of such PDN connections by using the proposed distributed P-GWs and MMEs. The performance of the proposed dynamic and distributed LTE/SAE network system is compared with the current LTE/SAE network system in terms of handover latency and network throughput.

Flexible Disjoint Multipath Routing Protocol Using Local Decision in Wireless Sensor Networks (무선 센서 네트워크에서 지역 결정을 통한 유연한 분리형 다중경로 라우팅 프로토콜)

  • Jung, Kwansoo;Yeom, Heegyun;Park, Hosung;Lee, Jeongcheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.911-923
    • /
    • 2013
  • Multipath routing is one of challenging issues for improving the reliability of end-to-end data delivery in wireless sensor networks. Recently, a disjointedness and management of path have been studying to enhance the robustness and efficiency of the multipath routing. However, previous multipath routing protocols exploit the disjointed multipath construction method that is not to consider the wireless communication environment. In addition, if a path failures is occurred due to the node or link failures in the irregular network environment, they maintain the multipath through the simple method that to construct a new extra path. Even some of them have no a method. In order to cope with the insufficiency of path management, a hole detouring scheme, to bypass the failures area and construct the new paths, was proposed. However, it also has the problem that requires a heavy cost and a delivery suspension to the some or all paths in the hole detouring process due to the centralized and inflexible path management. Due to these limitations and problems, the previous protocols may lead to the degradation of data delivery reliability and the long delay of emergency data delivery. Thus, we propose a flexible disjoint multipath routing protocol which constructs the radio disjoint multipath by considering irregular and constrained wireless sensor networks. It also exploits a localized management based on the path priority in order to efficiently maintain the flexible disjoint multipath. We perform the simulation to evaluate the performance of the proposed method.

RFID Based Mobile Robot Docking Using Estimated DOA (방향 측정 RFID를 이용한 로봇 이동 시스템)

  • Kim, Myungsik;Kim, Kwangsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.802-810
    • /
    • 2012
  • This paper describes RFID(Radio Frequency Identification) based target acquisition and docking system. RFID is non-contact identification system, which can send relatively large amount of information using RF signal. Robot employing RFID reader can identify neighboring tag attached objects without any other sensing or supporting systems such as vision sensor. However, the current RFID does not provide spatial information of the identified object, the target docking problem remains in order to execute a task in a real environment. For the problem, the direction sensing RFID reader is developed using a dual-directional antenna. The dual-directional antenna is an antenna set, which is composed of perpendicularly positioned two identical directional antennas. By comparing the received signal strength in each antenna, the robot can know the DOA (Direction of Arrival) of transmitted RF signal. In practice, the DOA estimation poses a significant technical challenge, since the RF signal is easily distorted by the surrounded environmental conditions. Therefore, the robot loses its way to the target in an electromagnetically disturbed environment. For the problem, the g-filter based error correction algorithm is developed in this paper. The algorithm reduces the error using the difference of variances between current estimated and the previously filtered directions. The simulation and experiment results clearly demonstrate that the robot equipped with the developed system can successfully dock to a target tag in obstacles-cluttered environment.