• Title/Summary/Keyword: Media Access Control

Search Result 276, Processing Time 0.021 seconds

Traceability Number-Driven Livestock Inventory Management IoT System Utilizing Electronic Scale Access Control Technology (전자저울 접근제어 기술을 통한 이력번호 기반의 재고관리 IoT 시스템)

  • Youchan Jeon
    • Smart Media Journal
    • /
    • v.12 no.10
    • /
    • pp.85-92
    • /
    • 2023
  • In December 2014, Livestock and Livestock Products Traceability Act was established, allowing consumers to receive livestock traceability information. While the Livestock Traceability System provides consumers with transparent and fair information about their food, it has brought increased workload and penalty burdens to stakeholders in the livestock industry. In this paper, we propose an IoT system for inventory management based on traceability numbers to enable sellers to conveniently provide livestock traceability information to consumers. We analyzed the protocol for managing data from electronic scales and conducted functional testing and verification on mobile devices. Furthermore, we implemented the design and system functionality, taking into account UI/UX on Android OS-based devices to synchronize and interconnect traceability and product information with electronic scales. We anticipate that the proposed approach will minimize user inconvenience and raise production efficiency in the existing market.

Security Review of B-MAC Communication Protocol (B-MAC통신 프로토콜에서 보안 리뷰)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.447-452
    • /
    • 2013
  • Berkley Media Access Control (B-MAC) protocol is one of the well-known MAC protocols, which uses adaptive preamble sampling scheme and is designed for wireless sensor networks (WSN). In this paper, we are reviewed about security vulnerability in B-MAC, and analyzed the power which is consumed at each stage of B-MAC protocol according to vulnerability of denial of sleep(DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general B-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in B-MAC.

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Developing the Core Modules of for Viz-Platform for Supporting Public Service in the City (도시의 공공서비스 제공을 위한 시각화 플랫폼의 핵심모듈 개발)

  • Kim, Mi-Yun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.9
    • /
    • pp.1131-1139
    • /
    • 2015
  • The purpose of this research is creating the visualization platform of the user interface to make able to be provide the demanded service while users communication with surrounding space in a smart city environment. This comes from the latest enhanced interface technology and social media, and it uses the shares information to support the proper interface environment according to a life style and spatial properties. "EzCity" which is the user interface platform suggested in this research, can control the enormous amount of public data for the smart city. The core module of user platform is made up with Public data module, Interface module, Visualization module and Service module. The role of this platform is to be provide "Geo-Intelligent Interface Service" for space users to access the data in easier and more practical interface environment. This reinforces the visualization process for data collecting, systematization, visualization and providing service. Also this will be expected to be the base to solve the problem which complexity and rapidly increasing amount of data.

An Energy Efficient and Low Latency MAC Protocol Using RTS Aggregation Scheme for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성과 낮은 지면을 위한 RTS Aggregation 기법)

  • Lee, Dong-Ho;Song, Byung-Hun;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.276-280
    • /
    • 2008
  • 무선 센서 네트워크의 연구는 이벤트 기반과 주기적 모니터링 기반미라는 두 가지 응용의 형태에 맞추어 진행되었다. 두 가지 응용의 핵심적인 요구 사항은 다르지만 안정적인 운용을 위해 공동적으로 낮은 전송 자연의 요구가 존재한다. 하지만 기존의 무선 센서 네트워크의 프로토콜은 에너지 효율성을 중심으로 연구가 진행되었기 때문에 전송 자연에 대한 고려가 부족하였다. 본 논문에서는 무선 센서 네트워크의 MAC 프로토콜인 RA-MAC(RTS Aggregation-Media Access Control) 프로토콜을 제안하였다. RA-MAC 프로토콜은 새로운 채널 접근 기법 및 RTS Aggregation 기법에 의해 에너지 효율성과 낯은 전송 자연을 이룰 수 있고 수신 노드의 전송 스케줄링에 의해 이벤트 기반과 주기적 모니터링 기반 응용의 요구 사항을 동시에 만족시킬 수 있다. 실험을 통해 RA-MAC 프로토콜은 기존에 제안된 에너지 효율적인 MAC 프로토콜과 비슷한 에너지 효율을 보이면서 좀 더 낮은 전송 지연을 이루고 전송률을 향상시킬 수 있음을 확인하였다.

  • PDF

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

S-ARQ: A New Truncated ARQ for IP-Based Wireless Network

  • Choi, Young-Kyu;Oh, Seong-Jun;Choi, Sung-Hyun
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.174-180
    • /
    • 2010
  • Automatic Repeat reQuest (ARQ) is a very effective technique against transmission error at the medium access control (MAC) layer. An erroneous MAC protocol data unit can be typically retransmitted within a given limit. In order to improve the IP-level performance, which directly affects the user-perceived quality-of-service (QoS), we propose a new truncated ARQ strategy, called MAC service data unit-based ARQ (S-ARQ), where the finite number of opportunities for retransmissions are shared by multiple fragments out of an IP datagram. We describe how SARQ can be implemented in a practical system, and then propose another variant of S-ARQ employing a functionality called early detection of failure. Basically, we evaluate the performance of SARQ in two different manners. First, assuming i.i.d. error process, we analyze both the probability of the delivery failure and the average delay of IP datagram. Then, we assess the performance of S-ARQ via simulation over a 2-state Markov channel.

Development of Real-time Condition Monitoring System for Container Cranes (컨테이너 크레인 실시간 설비진단 시스템 개발)

  • Jung, D.U.;Choo, Y.Y.
    • Journal of Power System Engineering
    • /
    • v.12 no.6
    • /
    • pp.18-23
    • /
    • 2008
  • This paper describes development of real-time condition monitoring system to observe state of a container crane in a port. To analyze the state of a crane, the strength and the direction of wind are measured with sensors along with the load resulted a crane at the moment. The measured signals are processed by especially developed conditioning board and converted into digital data. Measured data are analyzed to define the state of the crane at an indicator. For transmission of these data to the indicator, we implemented wireless sensor network based on IEEE 802.15.4 MAC(Media Access Control) protocol and Bluetooth network protocol. To extend the networking distance between the indicator and sensor nodes, the shortest path routing algorithm was applied for WSN(Wireless Sensor Network) networks. The indicator sends the state information of the crane to monitoring server through IEEE 802.11 b wireless LAN(Local Area Network). Monitoring server decides whether alarm should be issued or not. The performance of developed WSN and Bluetooth network were evaluated and analyzed in terms of communication delay and throughput.

  • PDF

A Study on CSMA/CA for IEEE 802.11 WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.71-74
    • /
    • 2006
  • A basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size Also, a time of packet transmission delay increases and efficienty is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (A WGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

Throughput Analysis of R-NAD in MIL-STD-188-220 (MIL-STD-188-220의 R-NAD 처리율 분석)

  • Kim, Sangsoo;Gu, Sungmo;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.561-568
    • /
    • 2014
  • The Republic of Korea Army is using R-NAD of MIL-STD-188-220 as a Media Access Control protocol. Under urgent situations, almost all stations transmit data frames and then the network will reach a saturation state. Several articles have been devoted to the study of R-NAD performance. However, most of them focus on comparing the performance of some NADs using network simulation tools. We propose an analytical model to compute the throughput of R-NAD under the assumption of a network traffic saturation. Analytical results were verified by Monte Carlo methods. We have shown that the performance of a success probability and an average idle time remains almost unchanged as the total number of stations increases. We have also shown that Type 1/2/4 operation mode outperforms Type 3 operation mode in throughput. The results showed that the system with a squelch detection achieved a better performance than the one without it. The longer DATA time had a higher throughput.