• Title/Summary/Keyword: Next Generation Mobile

Search Result 544, Processing Time 0.03 seconds

Forward Handover According to COS Reservation in Wireless ATM (무선 ATM에서 COS 예약에 의한 순방향 핸드오버)

  • No, Seung-Hwan;Gi, Jang-Geun;Park, Seong-Gyun;Choe, Gwan-Su
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.4
    • /
    • pp.44-51
    • /
    • 2000
  • Wireless ATM is the next-generation technology which can provide broadband services for mobile multimedia terminals. Proposed in this paper is a method of enabling fast handover by forming one cell group with the cell having the mobile terminal (MT) at present and six adjacent cells and storing information on COS which is to perform re-routing between new cell to which MT is moved when handover occurs and adjacent cells to which the MT can be handed over in new cells in advance. And the order of data cells is guaranteed by using the in-band marking cell during handover. Also the handover delay is analyzed and compared to the conventional handover method without COS reservation.

  • PDF

A Next-generation Mobility Management Scheme for an IPv4/IPv6 Dual-stack Terminal (듀얼스택 단말을 지원하는 차세대 이동성 지원 기술 연구)

  • Lee, Kyoung-Hee;Lee, Sung-Kuen;Lee, Hyun-Woo;Han, Youn-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1182-1191
    • /
    • 2011
  • In this paper, we propose a network-based IP mobility management scheme, called Access Independent Mobile Service with IPv4/IPv6 Dual Stack (AIMS-DS), which can provide high-quality multimedia services to IPv4/IPv6 dual-stack mobile nodes (MNs) without any interruption over various wireless/wired access networks. The proposed scheme provides an MN with a fast and reliable mobility service among heterogeneous wireless access networks through the network-based control, the complete separation method of control and data plane, the cross-layer (layer2 and layer3) interworking method for handover control acceleration, etc, In addition, the proposed AIMS-DS can provide seamless mobility service to an MN under the environments of IPv4/IPv6 coexisting networks through the home address mobility support and transport network support. Through performance evaluation with computer simulations, we have shown the superiority of the proposed AIMS-DS in terms of handover latency, packet 1085 and packet delivery latency.

Design and Implementation of Mobile VTS Middleware for Efficient IVEF Service (효율적인 IVEF 서비스를 위한 모바일 VTS 미들웨어 설계 및 구현)

  • Park, Namje
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.6
    • /
    • pp.466-475
    • /
    • 2014
  • The IVEF service is the draft standard designed for exchange of information on sea traffic between the vessel traffic systems and between the vessels. Standardization of this service is under way as a part of the next-generation navigation system, called e-Navigation. The International Association of Lighthouse Authorities (IALA) suggests, on its recommendation V-145, the IVEF service model and the protocol for provisioning of this service. But the detailed configuration of this service must be designed by the users. This study suggests, based on the basic service model and protocol provided in the recommendation V-145, the implementation of the J-VTS middleware which will facilitate exchange of information on sea traffic. The J-VTS middleware consists of various components for providing the IVEF service and for processing the IVEF message protocols. The vessel traffic systems and the vessels corresponding to upper-layer applications may use the IVEF service with the functions provided by the J-VTS middleware, and the services are designed to be accessed according to the security level of users.

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

A Handover Mechanism for QoS Guarantee in WiBro (초고속 휴대 인터넷 망에서 서비스 품질 보장을 위한 핸드오버 메커니즘)

  • Yeom Hong-Ju;Kim Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7A
    • /
    • pp.659-665
    • /
    • 2006
  • When using the Mobile IP which is the representative technology to secure the mobility in general IP networks, the packet loss during the handover is inescapable. To remedy the packet loss problem, the smooth handover was introduced. However, the smooth handover causes the packets sequence disruption during the packet forwarding procedure and it may result in the degradation of the network performance. The same problem also occurs in the WiBro (High-speed Portable Internet) system that is the next generation portable IP service system. The WiBro system, which provides the high speed data service just like xDSL and leased line in wired internet, aims to guarantee the portability, mobility, and the differentiated service based on IEEE 802.16. So, the handover mechanisms that solve the problems of packet loss and packet sequence distribution are required in the WiBro system. In this paper, we propose the handover mechanism and the packet sequence control algorithm that provide the reliability and the differentiated service for the unicast service in the WiBro system.

A Reduced Complexity QRM-MLD for Spatially Multiplexed MIMO Systems (공간다중화 방식을 사용하는 다중 안테나 시스템을 위한 감소된 계산량의 QRM-MLD 신호검출기법)

  • Im, Tae-Ho;Kim, Jae-Kwon;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1C
    • /
    • pp.43-50
    • /
    • 2007
  • In the paper, we address QRM-MLD (Maximum Likelihood Detection with QR Decomposition and M-algorithm) signal detection method for spatially multiplexed MIMO (Multiple Input Multiple Output) systems. Recently, the QRM-MLD signal detection method which can achieve 1Gbps transmission speed for next generation mobile communication was implemented in a MIMO testbed for the mobile moving at a pedestrian speed. In the paper, we propose a novel signal detection method 'reduced complexity QRM-MLD' that achieves identical error performance as the QRM-MLD while reducing the computational complexity significantly. We rigorously compare the two detection methods in terms of computational complexity to show the complexity reduction of the proposed method. We also perform a set of computer simulations to demonstrate that two detection methods achieve identical error performance.

A Study on Message authentication scheme based on efficient Group signature in VANET (VANET환경에서의 효율적인 그룹서명기반 메시지 인증 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.239-248
    • /
    • 2012
  • VANET (Vehicular Ad-hoc Network) is a type of MANET (Mobile Ad-hoc Network) which is the next-generation networking technology to provide communication between vehicles or between vehicle and RSU (Road Side Unit) using wireless communication. In VANET system, a vehicle accident is likely to cause awful disaster. Therefore, in VANET environment, authentication techniques for the privacy protection and message are needed. In order to provide them privacy, authentication, and conditional, non-repudiation features of the group signature scheme using a variety of security technologies are being studied. In this paper, and withdrawal of group members to avoid frequent VANET environment is suitable for vehicles produced by the group administrator for a private signing key to solve the key escrow problem of a group signature scheme is proposed. We proposed a message batch verification scheme using Bloom Filter that can verify multiple messages efficiently even for multiple communications with many vehicles.

Study on MC-CDMA Using Two-fold Orthogonal Frequency Overlap (이중 직교 주파수 중첩을 이용한 MC-CDMA변조방식에 관한 연구)

  • Ryu, Kwan-Wong;Park, Yong-Wan;Suh, Young-Suk;Kim, Ki-Chai
    • Journal of IKEEE
    • /
    • v.3 no.1 s.4
    • /
    • pp.141-149
    • /
    • 1999
  • If signal time duration of MC-CDMA method which has studied for next-generation high-speed data transmission is not sufficiently large compared to delay spread of channel, the performance is degraded by generation of intersymbol interference. In this paper, this problem will solve through serial to parallel convertor and make large sufficiently time duration of signal compared to delay spread of channel and rise variable spectral efficiency through the number of serial to parallel convertor subchannel we will add to parallel frequency diversity block for improve the performance in mobile Communication. Spectral efficiency of the proposed system is counted and compared to spectral efficiency of MC-CDMA and investigated through computer simulations by using multipath Rayleigh fading channel.

  • PDF

Delay-Aware Packet Scheduling (DAPS) Algorithm in 3GPP LTE System (LTE 시스템에서 지연에 대한 QoS 보장을 위한 하향링크 패킷 스케줄링 알고리즘)

  • Choi, Bum-Gon;Chung, Min-Young;Lee, Hye-Kyung;Kim, Tai-Suk;Kang, Jee-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.498-508
    • /
    • 2009
  • In wireless mobile environments, large bandwidth and high QoS (Quality of Service) are recently required to support the increased demands for multimedia services. LTE (Long Term Evolution) is one of the promising solutions for the next generation broadband wireless access systems. To efficiently use downlink resource and effectively support QoS, packet scheduling algorithm is one of the important features in LTE system. In this paper, we proposed DAPS (Delay-Aware Packet Scheduling) algorithm to consider QoS requirements of delays for various traffic classes as well as channel condition and fairness. To reflect delay experiences at scheduling instance, DAPS observes how queue waiting time of packet is closed to maximum allowable delay. The simulation results show that the DAPS algorithm yields better performance for delay experience by increasing the number of transmitted packets with satisfying the required delay time compared with existing scheduling algorithms.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.