• Title/Summary/Keyword: Wireless Communication Environment

Search Result 1,483, Processing Time 0.027 seconds

Minimization of Packet Delay in a Mobile Data Collector (MDC)-based Data Gathering Network (MDC 기반 데이터 수집 네트워크에서의 패킷지연 최소화)

  • Dasgupta, Rumpa;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.89-96
    • /
    • 2016
  • In this paper, we study mobile data collector (MDC) based data-gathering schemes in wireless sensor networks. In Such networks, MDCs are used to collect data from the environment and transfer them to the sink. The majority of existing data-gathering schemes suffer from high data-gathering latency because they use only a single MDC. Although some schemes use multiple MDCs, they focus on maximizing network lifetime rather than minimizing packet delay. In order to address the limitations of existing schemes, this paper focuses on minimizing packet delay for given number of MDCs and minimizing the number of MDCs for a given delay bound of packets. To achieve the minimum packet delay and minimum number of MDCs, two optimization problems are formulated, and traveling distance and traveling time of MDCs are estimated. The interior-point algorithm is used to obtain the optimal solution for each optimization problem. Numerical results and analysis are presented to validate the proposed method.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

Design of UWB Antenna for the External Receiver of Capsule Endoscopy (캡슐 내시경의 외부 수신기용 UWB 안테나 설계)

  • Kim Hong-Seok;Oh Min-Seok;Cheon Chang-Yul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.8 s.99
    • /
    • pp.790-796
    • /
    • 2005
  • In order to accomplish a wireless communication of capsule endoscopy, an environment study in the human body and receiving antenna design have been performed. The proposed antenna is the loop antenna designed to minimize the propagation loss in multi-loss layer such as the human body and utilize the magnetic field. Considering the propagation loss in the human body, the frequency range is from 400 MHz to 500 MHz. Acorrrding to the FCC regulations, the permittivity and conductivity for each human tissue were extracted. We set up an equivalent model and make an aqueous solution which is replaced with the human body. Due to movement of capsule in the human body which propagation loss is extremly severe, an array antenna is required. Irrespective of the location of transmission antenna transmitting a signal of 1 mW, we confirme what it is possible for the enough signal detection as the average signal level of array antenna is -60 dBm.

Analysis of Mobility Robustness Optimization Technology in LTE Self Organization Networks (LTE 자가구성 네트워크에서 MRO 기술 분석)

  • Yang, Mo-Chan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1025-1030
    • /
    • 2019
  • This paper describes SON(: Self Organization Network) technology in LTE networks. The SON is a unique feature of LTE compared to previous cellular systems such as UMTS and GSM, and it is a tool that effectively derives the best performance in the time-varying wireless radio environment. Also, the SON has the ability for the operator to automate the setting of the network, allowing for centralized planning and reducing the need for manual work. The SON is largely divided into three categories: Self-Configuration, Self-Optimization, and Self-Healing. Each large categories has a detailed description of technology, and the technologies in each categories are gathered to complete the technology called the SON. In this paper, we focus on MRO which is one of the Self-Optimization technique in each of the three categories.

A Study on Signal Estimation of Modified Beamformer Method using Perturbation Covariance Matrix (섭동공분산행렬을 이용한 수정 빔형성기 방법의 신호 추정에 대한 연구)

  • Lee, Kwan-Hyeong;Cho, Tae-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.333-339
    • /
    • 2017
  • Transmission signal in wireless environment receives a signal in which a source signal, interference, and noise are mixed. The goal of this study is to estimate the desired signal from the received signal. In this paper, we have studied a method correctly estimating a target in spatial by modified beamformer method. The modified bemaformer uses an adaptive array antenna and perturbation matrix to obtain the optimal weight, and estimate the desired signal by radiating the beam in spatial. We estimate a desired signal of the target by improving resolution with the modified beamformer method which does not have complicated calculation amount. Through simulation, we compare and analyze the modified beamformer method and the MUSIC method with good resolution. In result of simulation, we showed that modified beamformer method has better resolution of 10degree than classical beamformer method and showed similar performance as the MUSIC method. The resolution of this paper was estimated to be about 5 degrees.

A Secure Electronic Payment System in Intelligent Transportation Systems Using the Dedicated Short Range Communications (단거리 전용통신을 이용한 지능형 교통시스템에서의 안전한 전자 지불 시스템)

  • Jang Chung-Ryong;Lee Yong-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.71-78
    • /
    • 2004
  • Dedicated Short Range Communications(DSRC) as a prominent communications candidate for Intelligent Transportation Systems(ITS) have been developed to support ITS applications such as value-added information service, e-commerce, electronic toll payment, etc. These various applications associated with electronic payment through unsecure communication channel of DSRC suffer from security threats. To ensure secure payment, we have adopted appropriate cryptographic mechanisms including encipherment, authentication exchange and digital signature. The cryptographic mechanisms require to use cryptographic keys established between two communication entities. In this paper, we propose a secure electronic payment system which is designed to have some functions for strong authentication, encryption, key agreement, etc. Especially, we adopt domestic developed cryptographic algorithms such as EC-KCDSA and SEED for digital signature and block cipher, respectively. We can show those mechanisms are appropriate for the secure electronic payment system for ITS services under the DSRC wireless environment in aspects of constrained computational resource use and processing speed.

  • PDF

A Fast XML Encoding System for Fast Web Services (Fast 웹서비스를 위한 Fast XML 인코딩 시스템)

  • Kim, Jong-Moon;Yu, Lei;Hong, Xian-Yu;Choi, Bong-Kyu;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.865-868
    • /
    • 2007
  • Web service in operating environment independent XML about under using, It dose so, Integration of the platform for it is different each other possibly it is doing. But XML in order to have the text data which is unnecessary plentifully with wireless Internet or the mobile communication modem in together relatively will connect frequently slow communication medium and there is a problem point which decreases the case prerequisite efficiency which the resources will use from the limited small-sized machinery and tools. Hereupon XML about under make binary the standard which reduces the size of the document from ITU-T and ISO/IEC it was under proposing with commonness, currently binary XML encoding where it is in the process of advancing standard there are Fast Infoset and Fast Schema. In this paper, implementation of Fast XML encoding system through introduction Fast Infoset algorithm and Fast Schema algorithm for web services increase performance.

  • PDF

A New Congestion Control Algorithm for Vehicle to Vehicle Safety Communications (차량 안전 통신을 위한 새로운 혼잡 제어 알고리즘 제안)

  • Yi, Wonjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.125-132
    • /
    • 2017
  • Vehicular safety service reduces traffic accidents and traffic congestion by informing drivers in advance of threats that may occur while driving using vehicle-to-vehicle (V2V) communications in a wireless environment. For vehicle safety services, every vehicle must broadcasts a Basic Safety Message(BSM) periodically. In congested traffic areas, however, network congestion can easily happen, reduce the message delivery ratio, increase end-to-end delay and destabilize vehicular safety service system. In this paper, to solve the network congestion problem in vehicle safety communications, we approximate the relationship between channel busy ratio and the number of vehicles and use it to estimate the total network congestion. We propose a new context-aware transmit power control algorithm which controls the transmission power based on total network congestion. The performance of the proposed algorithm is evaluated using Qualnet, a network simulator. As a result, the estimation of total network congestion is accurately approximated except in specific scenarios, and the packet error rate in vehicle safety communication is reduced through transmit power control.

The Optimized Detection Range of RFID-based Positioning System using k-Nearest Neighbor Algorithm

  • Kim, Jung-Hwan;Heo, Joon;Han, Soo-Hee;Kim, Sang-Min
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.270-271
    • /
    • 2008
  • The positioning technology for a moving object is an important and essential component of ubiquitous communication computing environment and applications, for which Radio Frequency IDentification Identification(RFID) is has been considered as also a core technology for ubiquitous wireless communication. RFID-based positioning system calculates the position of moving object based on k-nearest neighbor(k-nn) algorithm using detected k-tags which have known coordinates and k can be determined according to the detection range of RFID system. In this paper, RFID-based positioning system determines the position of moving object not using weight factor which depends on received signal strength but assuming that tags within the detection range always operate and have same weight value. Because the latter system is much more economical than the former one. The geometries of tags were determined with considerations in huge buildings like office buildings, shopping malls and warehouses, so they were determined as the line in 1-Dimensional space, the square in 2-Dimensional space and the cubic in 3-Dimensional space. In 1-Dimensional space, the optimal detection range is determined as 125% of the tag spacing distance through the analytical and numerical approach. Here, the analytical approach means a mathematical proof and the numerical approach means a simulation using matlab. But the analytical approach is very difficult in 2- and 3-Dimensional space, so through the numerical approach, the optimal detection range is determined as 134% of the tag spacing distance in 2-Dimensional space and 143% of the tag spacing distance in 3-Dimensional space. This result can be used as a fundamental study for designing RFID-based positioning system.

  • PDF

Design and Implementation of LED Lighting Control System Using Arduino Yun and Cloud in IoT (사물인터넷에 아두이노 윤과 클라우드를 이용한 LED 조명 제어 시스템 설계)

  • Xu, Hao;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.983-988
    • /
    • 2016
  • Internet of Things Iranian people and things, things and things are connected through the Cloud. It can significantly save energy through a combination of LED lighting as a new ICT technologies and industry-to provide a human-centric, eco-friendly, and the content is embedded multifunction solutions that meet your needs, environment, implementation time according to user requirements, technology It can be systematized as converged next-generation lighting. In this paper, we have developed regarding whether the building in relation to the LED lighting control system using smart devices and Cloud-based user as a human connection through the board to the Arduino Yun lit LED lighting, wireless smart device or to the Cloud or off. After the Arduino Yun is connected to the Internet, taking the current date and time information from the Linux shell command used the way coming across the bridge (BRIDGE) its value.