• Title/Summary/Keyword: Over-The-Air (OTA)

Search Result 10, Processing Time 0.15 seconds

Human Hand Effect on The MIMO OTA Performance of LTE Mobile Handset (LTE 이동 단말의 MIMO 무선 성능과 Hand effect)

  • Cho, Y.S.;Kim, Y.R.;Noh, S.P.;Shim, H.J.;Kim, I.K.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.5
    • /
    • pp.91-98
    • /
    • 2012
  • Since the major cellular data service providers in U.S, Japan as well as in Korea started the LTE (Long Term Evolution) service, there has been more strong need for the methods that can accurately measure the MIMO (Multi Input-Multi Output) OTA (Over The Air) performance of LTE handsets because the performance of the MIMO antenna determines the data throughput in the downlink. In this paper, the hand effect on the MIMO antenna performance is analyzed by numerically and experimentally. The hand effect on the LTE mobile handset is analyzed by measuring the link level performance in the MIMO OTA system.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.

On MIMO OTA Performance Characterization Method for Mobile Devices with Multiple Antennas (MIMO 무선 성능 성능평가 방법에 관한 연구)

  • Cho, Y.S.;Kim, Y.R.;No, S.P.;Shim, H.J.;Kim, I.K.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.5
    • /
    • pp.84-90
    • /
    • 2012
  • Since the major cellular data service providers in U.S, Japan as well as in Korea started the LTE (Long Term Evolution) service, there has been more strong need for the methods that can accurately measure the MIMO (Multi Input-Multi Outout) OTA (Over The Air) performance of LTE handsets because the performance of the MIMO antenna determines the packet data rates in the downlink and therefore the higher system throughput of the network. In this regard, there has been a lot discussions in 3GPP on the candidate MIMO OTA test solutions. In this paper, a faire comparison has been done for the conventional method, the Envelop Correlation Coefficient (ECC) measurements, and the anechoic chamber based MIMO OTA test solution, one of the candidate system being discussed in 3GPP. The evaluations and the comparisons are conducted by numerically and experimentally.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

A Remote Firmware Update Mechanism for a TDMA-based Bidirectional Linear Wireless Sensor Network (양방향 통신을 지원하는 시분할 기반 선형 무선 센서 네트워크를 위한 원격 펌웨어 업데이트 방법)

  • Moon, Jung-Ho;Kim, Dae-Il;Park, Lae-Jeong;Lee, Hyung-Bong;Chung, Tae-Yoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.8
    • /
    • pp.867-875
    • /
    • 2009
  • A wireless sensor network inherently comprises a plurality of sensor nodes widely deployed for sensing environmental information. To add new functions or to correct some faulty functions of an existing wireless sensor network, the firmware for each sensor node needs to be updated. Firmware update would be quite troublesome if it requires the gathering, reprogramming, and redeploy of all of already deployed sensor nodes. Over-the-air programming (OTA) facilitates the firmware update process, thereby allowing convenient maintenance of an already-deployed sensor network. This paper proposes and implements a remote firmware update mechanism for a TDMA-based wireless sensor network, in which the firmware for sensor nodes constituting the TDMA-based sensor network can be easily updated and the update process can be conveniently monitored from a remote site. We verify the validity of the proposed firmware update method via experiments and introduce three wireless sensor networks installed in outdoor sites in which the proposed firmware update mechanism has been exploited.

SDR 소프트웨어 구조 및 다운로드

  • Lee, Heon U;Jeong, Sang Guk;Kim, Han Gyeong
    • The Magazine of the IEIE
    • /
    • v.30 no.4
    • /
    • pp.398-398
    • /
    • 2003
  • 이동통신서비스 기술이 서비스 속도 측면에서의 차별화로 인하여 이동 통신 단말기 구축 기술 스펙트럼이 다양하게 확대되어감에 따라 이를 지원하는 기술 사이에 호환성에 대한 필요성이 대두되고 있으며, 이를 지원할 기술로 소프트웨어에 의한 단말기 형상의 재구성을 고려하게 되었다. 이를 Software Defined Radio(SDR)라고 하며, SDR의 핵심을 이루는 기술 중의 하나로 소프트웨어 다운로드 기술이 요구된다. SDR Forum에서 소프트웨어 다운로드 기술을 표준화하기 위한 작업이 진행되고 있으나 아직 확정된 바가 없다. 소프트웨어 다운로드 중에서도 global roaming의 기반이 되는 Over-the-air(OTA)에 의한 형상 재구성 방안은 각 단말기가 갖는 다양성과 다운로드 과정의 복잡성으로 인하여 요구사항을 정하는 것이 쉽지 않다. 이에 다운로드 프로토콜의 진화와 변경을 고려하여, 소프트웨어의 구조와 다운로드 프로토콜을 제시한다.

SDR 소프트웨어 구조 및 다운로드

  • 이헌우;정상국;김한경
    • The Magazine of the IEIE
    • /
    • v.30 no.4
    • /
    • pp.52-63
    • /
    • 2003
  • 이동통신서비스 기술이 서비스 속도 측면에서의 차별화로 인하여 이동 통신 단말기 구축 기술 스펙트럼이 다양하게 확대되어감에 따라 이를 지원하는 기술 사이에 호환성에 대한 필요성이 대두되고 있으며, 이를 지원할 기술로 소프트웨어에 의한 단말기 형상의 재구성을 고려하게 되었다. 이를 Software Defined Radio(SDR)라고 하며, SDR의 핵심을 이루는 기술 중의 하나로 소프트웨어 다운로드 기술이 요구된다. SDR Forum에서 소프트웨어 다운로드 기술을 표준화하기 위한 작업이 진행되고 있으나 아직 확정된 바가 없다. 소프트웨어 다운로드 중에서도 globa1 roaming의 기반이 되는 Over-the-air(OTA)에 의한 형상 재구성 방안은 각 단말기가 갖는 다양성과 다운로드 과정의 복잡성으로 인하여 요구사항을 정하는 것이 쉽지 않다. 이에 다운로드 프로토콜의 진화와 변경을 고려하여, 소프트웨어의 구조와 다운로드 프로토콜을 제시한다.

  • PDF

A Proposal Of Methods About Downloading Software Based Ad hoc For SDR System (SDR 시스템을 위한 Ad hoc 방식 분산 소프트웨어 다운로드 제안)

  • 이진성;양형규;이병호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.238-240
    • /
    • 2003
  • SDR(Software Defined Radio) 시스템의 발전으로 단말기와 기지국 장비의 교체 없이 서로 다른 표준안을 요구하는 서비스에 대해서 해당 컴포넌트들을 다운로드하고 동적으로 시스템을 재구성하여 해당 서비스에 맞는 시스템을 구성할 수 있다. SDR 시스템의 기본 기능에는 사용하고자 하는 컴포넌트를 여러 가지 방법에 따라 다운로드하는 것이 포함 될 수 있다. 다운로드 할 필요가 있는 컴포넌트는 크게 상용과 공개용으로 나눠 볼 수 있는데 기본적으로 안티­바이러스 패치나 해당 사업자의 중요한 소프트웨어 패치 등의 공개용 컴포넌트를 효율적으로 다운로드 하여 재구성하는 방안이 우선적으로 요구된다. 본 논문에서는 OTA(Over The Air)를 통해 다운로드 하고자 하는 경우를 중심으로. Server/Client 모델의 일 대 일 방식의 다운로드 방식보다 네트워크 자원 및 트래픽의 효율적인 사용을 위해 Ad hoc 모델을 이용하여 다운로드하는 알고리즘을 제안하였다.

  • PDF

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Assessment of a Low Power Offset BPSK Component for Spreading Code Authentication

  • Maier, Daniel S.;Pany, Thomas
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.2
    • /
    • pp.43-50
    • /
    • 2020
  • In this paper a low power Spreading Code Authentication (SCA) sequence with a BPSK(1) modulation at a frequency offset of +7.161 MHz is tested for authentication purposes, the Galileo E1OS is used as base signal. The tested signals comprise a Galileo constellation with 5 satellites including the Galileo OS Navigation Message Authentication (OSNMA) and a low power offset BPSK (OBPSK(7,1)) as SCA component. The signals are generated with the software based MuSNAT-Signal-Generator. The generated signals were transmitted Over-The-Air (OTA) using a Software-Defined-Radio (SDR) as pseudolite. With a real-environment-testbed the performance of the SCA in real channel conditions (fading and multipath) was tested. A new SCA evaluation scheme is proposed and was implemented. Under real channel conditions we derive experimental threshold values for the new SCA evaluation scheme which allow a robust authentication. A Security Code Estimation and Replay (SCER) spoofing attack was mimicked on the real-environment-testbed and analyzed with the SCA evaluation scheme. It was shown that the usage of an OBPSK is feasible as an authentication method and can be used in combination with the OSNMA to improve the authentication robustness against Security SCER attacks.