• Title/Summary/Keyword: Personal communication network

Search Result 486, Processing Time 0.029 seconds

Limit-Zero Network: Trends of Hyper-Connected Photonics Technology for Limitless Network (한계 제로 네트워크: 한계 없는 네트워크를 위한 초연결 포토닉스 기술 동향)

  • Kim, K.;Park, H.;Chung, H.S.;Cho, S.H.;Lee, J.C.;Song, J.T.;Chang, S.H.;Lee, J.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.49-60
    • /
    • 2019
  • The prosperity of modern society is heavily depending on communication technology. Communication is now expanding its roles from personal convenience to social/industrial functioning. Photonics was first introduced to communication in longdistance transmission area since it provided wide bandwidth cost-effectively. However, nowadays, photonics is not only a harmonious collaborator with electronics, but has its own exclusive playgrounds in various parts of communication. Limit-zero network pursues a network that can provide abundant capacity and efficiency using very limited resources. Photonics is the most promising candidate to accomplish the goal. In this article, we review the current status and predict the future contributions of photonics to limit-zero network.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

An applicable Key Distribution and Authentication Protocol in Personal Communication Networks (개인 통신망에서 적용가능한 인증 및 키분배 프로토콜)

  • 송희삼;전문석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.331-337
    • /
    • 1995
  • In this paper, We present that protocols have already proposed an applicable key distribution and authentication protocol based discrete logarithm and prime-factorization problem in PCN(Personal Communication Network) is anaysised. We newly propose identiity-based protocol using smart card. This proposed potocol is that Fiat-Shamir identification scheme and a new key distribution scheme based on Fiat-Shamir identification scheme are joined. Proposed protocol is compared with suiting protocols with respect to security and efficiency to evalate performance, so its calculation is reduced in key distribution and authentication to evaluate performance.

  • PDF

Packet Discrimination Method Using Artificial Frequency Offsets for Low Decoding Power Consumption in Heterogeneous Cooperative Communication Systems (이기종 협력 통신시스템에서 디코딩 전력소모 감소를 위한 인위적인 주파수 오프셋을 이용한 패킷 구별 기법)

  • Chae, Seungyeob;Yeo, Gyuhak;Rim, Minjoong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.372-379
    • /
    • 2014
  • When a hand-held device with limited battery transmits and receives data using short-range wireless communication systems, such as WLAN(Wireless Local Area Network) or high speed WPAN(Wireless Personal Area Network), instead of mobile communication systems, the device is able to reduce the power consumption due to the reduced transmission distance. However, if there are many WLAN or high speed WPAN systems around the device, non-negligible power may be consumed by receiving and decoding the packets which have nothing to do with the device. In this paper, we propose a scheme reducing the power consumption by including physical-layer ID in WLAN or WPAN packets and avoiding unnecessary packet receptions. Also, we describe a method to determine the optimum number of physical-layer IDs.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Efficient Protocol for Authentication and Certificate Status Management in PAN (PAN에서 인증 및 인증서 상태 관리를 위한 효율적인 프로토콜)

  • Jang, Hwa-Sik;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.373-380
    • /
    • 2007
  • In this paper we propose a new efficient authentication protocol that reduces overheads of computation for digital signature generation/verification on mobile devices in the Personal Area Network (PAN). In particular, we focus on eliminating the traditional public key operations on mobile devices without any assistance of a signature server. Moreover, the proposed protocol provides a simplified procedure for certificate status management to alleviate communication and computational costs on mobile devices in the PAN.

  • PDF

The Development of Collection Solution of the Three-Phase Power Data based on the Personal Computer for Supporting the Smart Grid (스마트 그리드 지원을 위한 컴퓨터 기반 3상 전력 데이터 수집 솔루션 개발)

  • Ko, Yun-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.553-558
    • /
    • 2011
  • The smart grid is an intelligent electric power network in which a digital communication network is integrated into the existing electric power system. This enhances the efficiency of the electric use by supplying and controlling the electric power through the two-way communication between the utility and the electric customer. In this paper, to support the smart grid, a computer-based solution which collects the three-phase electric power data based on the LPT Communication is designed, and then its prototype is made.

National Reputation and Intercultural Communication: Focused on the Foreign Residents in Korea (국가명성(National Reputation)과 문화 간 커뮤니케이션: 한국 거주 서구인을 중심으로)

  • Cha, Hee-Won;Shin, Ho-Chang
    • Korean journal of communication and information
    • /
    • v.39
    • /
    • pp.506-543
    • /
    • 2007
  • The purpose of this study is to explore the relationship between national reputation, culture and communication based on the intercultural communication theory. The 18 foreign residents in Korea were interviewed. The analysis of in-depth interview reveals that culture and communication are very important factors in establishing the national reputation. The qualitative research showcases that the cultural acculturation types(separation, integration, and assimilation) are grouped as foreigners adapt and acculturate to the residence. Especially, the assimilation is very essential type in having the in-group expectancy and the loyalty to Korea. The results reveal that a higher level of heterogeneity of a personal network('Korean in-group network') is associated with a higher level of reputation and loyalty to Korea. This suggests that having outgroup members in individuals' personal networks facilitates outgroup communication competence and loyalty to Korea.

  • PDF