• 제목/요약/키워드: Mobile Networks, Network Architecture

검색결과 222건 처리시간 0.028초

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

무선 네트웍에서의 효율적인 QoS제공을 위한 모델링 (Modeling for Efficient QoS support in wireless Networks)

  • 이성협;염익준
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(1)
    • /
    • pp.249-252
    • /
    • 2001
  • This paper focuses on the consideration of not only QoS parameters in wired network, but also QoS parameters in wireless network that supported for the Efficient QoS in the Al1 Service Levels. So, We supposed the "Efficient QoS Model" that guaranteed the QoS parameters "Loss Profile" , "Service Degradation" , "Latency and Jittering" , "Mobility of Mobile User" , "Probability of seamless communication" in wired-wireless networks. And the Method of Efficient QoS support that we supposed consists of "Multicast Routing-RSVP Protocol architecture based on Mobile IP" and "Protocols internetworking model ".

  • PDF

차량 내 IPv6 네트워크를 위한 다중 이동 라우터 구조의 설계와 분석 (Design and Analysis of Multiple Mobile Router Architecture for In-Vehicle IPv6 Networks)

  • 백은경;조호식;최양희
    • 한국ITS학회 논문지
    • /
    • 제2권2호
    • /
    • pp.43-54
    • /
    • 2003
  • 언제 어디서나 컴퓨터 통신을 제공하는 유비쿼터스 통신이 대두되면서 차량은 자체 센서 및 제어 기기를 통신 네트워크로 연결할 뿐 아니라 승객에게도 통신 연결을 제공하는 새로운 통신 플랫폼으로서 주목받고 있다. 모든 통신 네트워크를 IP로 연결하는 4세대 이동 통신으로의 전이를 위하여 차량 내 네트워크 또한 IP 연결이 요구된다. 네트워크 이동성은 이동 IPv6 기반의 개념으로서, 이동의 단위를 호스트가 아닌 네트워크로 하여, 차량과 같이 다수의 이동 통신 노드를 포함하는 경우에 동시에 다수의 이동성 관리를 처리하는 부담을 해결하기 위하여 등장하였다. 네트워크 이동성을 이용하면 이동 라우터가 인터넷과 차량 내 이동 노드들 사이에서 이동성 관리를 일괄하여 처리한다 트래픽의 단일 통과 지점인 이동 라우터의 신뢰성은 전체 차량 내 IPv6 네트워크의 성능을 좌우하는 중요한 요소이며 단일 고장 지점이 된다. 본 논문에서는 차량 내 IPvS 네트워크의 신뢰성 향상과 충분한 데이터 전송률 제공을 위하여, 멀티호밍 기법에 의한 적응형 다중 이동 라우터 구조를 제안한다. 제안하는 다중 이동 라우타 구조는 차량의 종류에 따라 달라지는 이동성 특징을 이용하여 동적으로 무선 연결 상태가 변화하는 환경에 적응한다. 시뮬레이션 결과는 제안한 다중 이동 라우터 관리 구조가 기존의 단순 라우터 중복 구조에 비하여 세션 연결성을 증가시킴으로써 패킷 손실을 감소시키고 신뢰성을 높임을 보여준다. 또한 유효 도달 범위와 데이터 전송률이 서로 다른 액세스 기술이 혼재하는 통신 환경에서 세션 연결성을 보장하는 동시에 데이터 전송률 향상을 도모하는 적응성을 보인다.

  • PDF

가상 라우터 계층을 이용한 Hierarchical Mobile IP 구조 (A Hierarchical Mobile W Architecture using a Virtual Router Layer)

  • 신복덕;하경재
    • 한국정보과학회논문지:정보통신
    • /
    • 제32권5호
    • /
    • pp.603-614
    • /
    • 2005
  • Mobile IP를 이용한 무선 네트워크 환경은 이더넷 기반의 유선 네트워크와의 연동을 전제로 하여 구축되고 운용된다. 그러나 그동안 Mobile IP와 연동되는 유선네트워크의 대부분은 무선 네트워크의 도입 시 성능에 영향을 주는 중요한 사항들을 고려하지 않고 구축함으로써 운용상 많은 문제점을 가지고 있었다. 본 논문에서는 실제 운용되고 있는 유선 네트워크에 Mobile IP 기반의 무선 네트워크를 구축할 경우 Access Router의 비대칭 연결구조에 의해 발생되는 Hierarchical Mobile IPv6(HMIPv6)의 적용상의 문제점과 이동노드들의 잦은 이동으로 인한 Binding Update 등에 의한 핸드오버 지연시간 문제를 효율적으로 해결할 수 있는 방안을 제시한다. Access Router의 계층적 불일치에서 발생하는 네트워크 지연시간을 가상 라우터 계층을 도입한 HMIPv6 구조를 사용하여 최소화하고, 이동노드의 잦은 이동에 따른 빈번한 CoA등록으로 발생하는 통신오버헤드를 라우터 간 이동정보를 사전에 교환함으로써 줄인다. 본 논문에서 제안한 기법은 HMIPv6와 Fast Handover를 기반으로 하는 현실적이고 효과적인 무선랜 환경의 구축에 기여할 것으로 기대한다.

이동 Ad Hoc 네트워크 환경에서 클러스터링 구조에 기반한 인증 메커니즘 (An Authentication Mechanism Based on Clustering Architecture in Mobile Ad Hoc Networks)

  • 이도;신용태
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.1461-1464
    • /
    • 2005
  • In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories, but those are not well-suited for securing ad hoc networks. Moreover, a fundamental issue of securing mobile ad hoc networks is to ensure mobile nodes can authenticate each other. Because of its strength and efficiency, public key and digital signature is an ideal mechanism to construct the authentication service. Although this is already mature in the internet application, providing public key based authentication is still very challenging in mobile ad hoc networks. In this paper I propose a secure public key authentication service based on clustering model and trust model to protect nodes from getting false public keys of the others efficiently when there are malicious nodes in the network.

  • PDF

UMTS 망에서의 SG 도입을 통한 신호망 구조 연구 (A Study of Signaling Network Architecture in UMTS Networks Using Signaling Gateway)

  • 조정제;박상훈
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.187-188
    • /
    • 2006
  • In CDMA based mobile communication network, signaling messages are routed through Signaling Transfer Point(STP) which is responsible for MTP layer 3 switching. As WCDMA based UMTS network is considered as next generation technology allowing global roaming services, all nodes in networks have their own identity number called Global Title(GT). Therefore, it is essential to introduce Signaling Gateway(SG) responsible for SCCP layer switching to solve the problem each node has all GT tables including even all overseas nodes. In this paper, we propose the signaling network architecture in UMTS networks using SG and we show that we can reduce CAPEX and OPEX in each node. To show the validity of the proposed method some simulations are given in which the results can be expected by intuitive observation.

  • PDF

FANET:-Communication Architecture and Routing Protocols A Review

  • Moazzam Ali;Adil Idress;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.181-190
    • /
    • 2024
  • FANET (Flying ad-hoc network) is a self-adjusting wireless network that enables easy to deploy flying nodes, inexpensive, flexible such as UAV in the absence of fixed network infrastructure they communicate amoung themselves. Past few decades FANET is only the emerging networks with it's huge range of next-generation applications.FANET is a sub-set of MANET's(Mobile Ad-hoc Network) and UAV networks are known as FANET.Routing enables the flying nodes to establish routes to radio access infrastructure specifically FANET and among themselves coordinate and collaborate.This paper presents a review on existing proposed communication architecture and routing protocols for FANETS.In addition open issues and challenges are summarized in tabular form with proposed solution.Our goal is to provide a general idea to the researchers about different topics to be addressed in future.

Evolvable Neural Networks Based on Developmental Models for Mobile Robot Navigation

  • Lee, Dong-Wook;Seo, Sang-Wook;Sim, Kwee-Bo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제7권3호
    • /
    • pp.176-181
    • /
    • 2007
  • This paper presents evolvable neural networks based on a developmental model for navigation control of autonomous mobile robots in dynamic operating environments. Bio-inspired mechanisms have been applied to autonomous design of artificial neural networks for solving practical problems. The proposed neural network architecture is grown from an initial developmental model by a set of production rules of the L-system that are represented by the DNA coding. The L-system is based on parallel rewriting mechanism motivated by the growth models of plants. DNA coding gives an effective method of expressing general production rules. Experiments show that the evolvable neural network designed by the production rules of the L-system develops into a controller for mobile robot navigation to avoid collisions with the obstacles.

5G 모바일 네트워크의 Industrial IoT 표준기술 동향 (Industrial IoT Standardization Trend of the 5G Mobile Network)

  • 김경수;강유화;김창기
    • 전자통신동향분석
    • /
    • 제36권6호
    • /
    • pp.13-24
    • /
    • 2021
  • Industrial networks has been developing various technologies from fieldbus technology to industrial Ethernet and time-sensitive networking. The industry expects that the 5G mobile network will solve the diverse and highly specific industrial site requirements. Accordingly, 3GPP has been developing standard functions to provide ultra-high reliability, ultra-high speed, ultra-connection, and ultra-low latency services, and 3GPP Rel-16 began developing ultra-low latency and ultra-high reliability communication functions for 5G mobile networks to support vertical industries. In this paper, we show the related standardization trends and requirements to apply industrial IoT service scenarios to 5G mobile networks, and in particular, we introduce 5G system features and extended 5G system architecture to provide time sensitive communication and time synchronization services.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.