• Title/Summary/Keyword: Wireless Communication Environment

Search Result 1,483, Processing Time 0.031 seconds

A Study on the Use of Cognitive Radio Networks in the Military Operation Environment (군 작전 환경에서의 인지 무선 네트워크 활용방안에 관한 연구)

  • Speybrouck, Valentine;Despoux, Eve;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.106-114
    • /
    • 2021
  • The needs in terms of wireless communications are growing up both for civil and military applications. Therefore a constant improvement of this technology is required to meet customer wishes. One of its main shortcomings is the inefficient use of the spectrum in which a large part of the allocated bands of frequencies is unused. Since communication is crucial, spectrum shortage problems can lead a multi-national and coalition operation to failure. Cognitive Radio Networks (CRNs) are a promising technology which continuously analyses the spectrum searching for available frequencies. It can solve this spectrum issue by avoiding interferences, improving system-wide spectral efficiency, robustness to dynamic conditions and allowing more spectrum flexibility This paper specifically analyzed and presented the application of the CRNs in the military operational environment, and presented the appropriate method applicable to each actual operational situation.

A Study on the Internet Broadcasting Image Processing based on Offloading Technique on the Mobile Environments (모바일 환경에서 오프로딩 기술 기반 인터넷 방송 영상 처리에 관한 연구)

  • Kang, Hong-gue
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.63-68
    • /
    • 2018
  • Offloading is a method of communicating, processing, and receiving results from some of the applications performed on local computers to overcome the limitations of computing resources and computational speed.Recently, it has been applied in mobile games, multimedia data, 360-degree video processing, and image processing for Internet broadcasting to speed up processing and reduce battery consumption in the mobile computing sector. This paper implements a viewer that enables users to convert various flat-panel images and view contents in a wireless Internet environment and presents actual results of an experiment so that users can easily understand the images. The 360 degree spherical image is successfully converted to a plane image with Double Panorama, Quad, Single Rectangle, 360 Overview + 3 Rectangle depending on the image acquisition position of the 360 degree camera through the interface. During the experiment, more than 100 360 degree spherical images were successfully converted into plane images through the interface below.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

A Study on Message authentication scheme based on efficient Group signature in VANET (VANET환경에서의 효율적인 그룹서명기반 메시지 인증 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.239-248
    • /
    • 2012
  • VANET (Vehicular Ad-hoc Network) is a type of MANET (Mobile Ad-hoc Network) which is the next-generation networking technology to provide communication between vehicles or between vehicle and RSU (Road Side Unit) using wireless communication. In VANET system, a vehicle accident is likely to cause awful disaster. Therefore, in VANET environment, authentication techniques for the privacy protection and message are needed. In order to provide them privacy, authentication, and conditional, non-repudiation features of the group signature scheme using a variety of security technologies are being studied. In this paper, and withdrawal of group members to avoid frequent VANET environment is suitable for vehicles produced by the group administrator for a private signing key to solve the key escrow problem of a group signature scheme is proposed. We proposed a message batch verification scheme using Bloom Filter that can verify multiple messages efficiently even for multiple communications with many vehicles.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Task offloading scheme based on the DRL of Connected Home using MEC (MEC를 활용한 커넥티드 홈의 DRL 기반 태스크 오프로딩 기법)

  • Ducsun Lim;Kyu-Seek Sohn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.61-67
    • /
    • 2023
  • The rise of 5G and the proliferation of smart devices have underscored the significance of multi-access edge computing (MEC). Amidst this trend, interest in effectively processing computation-intensive and latency-sensitive applications has increased. This study investigated a novel task offloading strategy considering the probabilistic MEC environment to address these challenges. Initially, we considered the frequency of dynamic task requests and the unstable conditions of wireless channels to propose a method for minimizing vehicle power consumption and latency. Subsequently, our research delved into a deep reinforcement learning (DRL) based offloading technique, offering a way to achieve equilibrium between local computation and offloading transmission power. We analyzed the power consumption and queuing latency of vehicles using the deep deterministic policy gradient (DDPG) and deep Q-network (DQN) techniques. Finally, we derived and validated the optimal performance enhancement strategy in a vehicle based MEC environment.

A Study on the Permeability through Concrete using RF Wireless Module for Reinforced Concrete Structure (철근콘크리트 구조물에 내제된 RF 무선송수신 모듈의 콘크리트 투과성 실험 연구)

  • Jo, Byung-Wan;Park, Jung-Hoon;Yoon, Kwang-Won;Kim, Heoun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.2D
    • /
    • pp.295-302
    • /
    • 2011
  • Ubiquitous is an information communication environment which peoples could connect on network without being conscious of the network and computer condition at anytime and anywhere. Presently, advanced technology, digital cities and eco-friendly cities using Ubiquitous technology are being focused through out the world. As recent information industry and communication technology have developed remarkably, studies on intelligent structures and structural maintenance methods by combining a general idea of connecting all objects on network by interpolating computers which is called Ubiquitous Computing, and USN(Ubiquitous Sensor Network) are being attempted. In this paper, a basic experiment on penetration of RF(Radio Frequency) sensor nodes using an experimental sample setting concrete and reinforcing bar as variables is studied to estimate the possibility of applying wireless sensor networks in structures. The spring of reinforcing bars, concrete thickness, intensity of radio frequency were set up as variables, transmitting and receiving distance were checked vertically and horizontally. Moreover, Spectrum Analyzer was used for checking the magnitude of the frequency used in order to measure the reduction of radio wave exactly. The radio wave reduction was numerically analyzed, and the influence of the wavelength was analysed as well. As a result, the penetration depth in concrete without reinforcing bars was 45cm, and in reinforced concretes which reinforcing bars placed at spacing of 5cm and 15cm, the penetration depth were 37cm and 45cm each. No influence on radio wave penetration depth were found when the spacing of reinforcing bars in the reinforced concrete structures becomes over 15cm.

Development of Livestock Traceability System Based on Implantable RFID Sensor Tag with MFAN (MFAN/RFID 생체 삽입형 센서 태그 기반 가축 이력 관리 시스템 개발)

  • Won, Yun-Jae;Kim, Young-Han;Lim, Yongseok;Moon, Yeon-Kug;Lim, Seung-Ok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1318-1327
    • /
    • 2012
  • With the recent increased risk of livestock disease spread and human infection, livestock disease control has become very important. Consequently, there has been an increased attention on an implantable real-time monitoring and traceability system for individual cattle. Therefore, we have developed a robust monitoring and traceability system based on an implantable MFAN/RFID sensor tag. Our design combines the MFAN technology that is capable of robust wireless communication within cattle sheds and the 900MHz RFID technology that is capable of wireless communication without battery. In MFAN/RFID implantable sensor tag monitoring system, UHF sensor tag is implanted under the skin and accurately monitors the body temperature and biological changes without being affected by external environment. In order to acquire power needed by the tag, we install a MFAN/RFID tranceiver on the neck of cattle. The MFAN coordinator passes through the MFAN node and the RFID-reader-combined MFAN/RFID transceiver and transmits/receives the data and power for the sensor tag. The data stored in the MFAN coordinator is transmitted via the internet to the livestock history monitoring system, where it is stored and managed. By developing this system, we hope to alleviate the problems related to livestock disease control.

Implementation of a Remote Patient Monitoring System using Mobile Phones (모바일 폰을 이용한 원격 환자 관리 시스템의 구현)

  • Park, Hung-Bog;Seo, Jung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1167-1174
    • /
    • 2009
  • In the monitoring of a patient in a sickroom, not only the physiologic and environmental data of the patient, which is automatically measured, but also the clinical data(clinical chart)of the patient, which is drew up by a doctor or nurse, are recognized as important data. However, since in the current environment of a sickroom, clinical data is collected being divided from the data that is automatically measured, the two data are used without an effective integration. This is because the integration of the two data is difficult due to their different collection times, which leads the reconstruction of clinical data to be remarkably uncertain. In order to solve these problems, a method to synchronize the continuous environmental data of a sickroom and clinical data is appearing as an important measure. In addition, the increase of use of small machines and the development of solutions based on wireless communications provide a communication platform to the developers of health care. Thus, this paper realizes a remote system for taking care of patients based on a web that uses mobile phones. That is, clinical data made by a nurse or doctor and the environmental data of a sick room comes to be collected by a collection module through a wireless sensor network. An observer can see clinical data and the environmental data of a sickroom through his/her mobile phone, integrating and storing his/her data into the database. Families of a patient can see clinical data made by hospital and the environment of the sick room of the patent through their computers or mobile phones outside the hospital. Through the system,hospital can provide better medical services to patients and their families.

Power efficiency research for application of IoT technology (사물인터넷 기술 적용을 위한 소비전력 효율화 연구)

  • Seo, Younghoon;Park, Eun-Cheol;Kang, Sunghwan;Hwang, Jae-Mun;Yun, Junghwan;Eom, Junyoung;Gwon, Hyeong-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.669-672
    • /
    • 2015
  • Recent Internet of Things (IoT, Internet of Things) that can be applied to various fields as the development of technology has been developed a lot of service and has been developed with the service also for crop management. To manage the essential elements of soil moisture in the crop growth but existing a direct person measuring the fluid point to carry the measuring instrument, if you take advantage of the WPAN (Wireless Personal Area Network) in this paper to manage sensor data, a fixed 3 points (30, 60, 90 cm) and can be managed can be scientifically analyzed the state of growth of the crop. Open field environment is utilized as it is less disturbance of the interference and the frequency of the radio frequency signal of the structure provides a relatively comfortable environment. Therefore, WPAN building and data transmission scheme of the minimum cost is to be developed. In addition, the operation to enter low power mode, the algorithm is necessary because a lot of restrictions on the power supply applied to the sensor nodes and the gateway is constructed in the open field. In the experiment, verifying the effectiveness by using a network configuration of each of the sensor nodes and the gateway, and provides a method for time synchronization of the operation and a low power mode. The study protocol for the RF communication with the LoRa and to enhance communication efficiency is needed in the future.

  • PDF