• Title/Summary/Keyword: Wireless Industry

Search Result 519, Processing Time 0.024 seconds

A Study on DID Implementation for Wireless Calling System using Smart-device (스마트 기기를 이용한 무선호출용 DID구현에 대한 연구)

  • Cho, Youngseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.19-25
    • /
    • 2015
  • In this time, as an industrial society developed to a welfare society, more and more people want their quality of lives upgraded and specially customized service by mass production/mass consumption. And it leads to an increase of requiring service. There're active developments and studies on various IT equipment as the requirement made IT devices used in service. In this paper, we try to design and realize radio paging DID by using smart device to be used as a receiver of a radio pager which is broadly used at face to face service. Firstly, we used MCU to design and implement Wireless Calling Gateway which change radio calling signal of ISM band to smart device. A receiver of wireless caller used original receiver module. Also it used bluetooth module to communicate with smart device. It was possible to have satisfactory communication since radio paging signal converter and smart device were linked in 3M. Secondly, to indicate various paging information delivered from a radio pager, we realized DID application program by using Smart PAD. As a result, we could indicate various information compared to an original receiver which only could indicate letters or numeric data. Secondly, we implemented the DID app for wireless calls that can display a variety of information sent from a wireless pager. Was implemented using the Smart Pad. As a result, it is shown that can display a variety of information than the existing receiver.

Standardization Trends and Local Policy for Wireless Internet (무선인터넷 표준화 동향 및 국내 정책 방향)

  • Kim, Sung-Han;Park, Wung;Kim, Young-Tae;Park, Ki-Shik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.571-574
    • /
    • 2001
  • Wireless Internet is capable of transmitting data for voice, text and video by wireless network, and recently wireless internet industry is one of the most widely issued. And, Operators, device manufacturers and contents providers are busy in developing technology and standardization. In this paper, we focus on the trends of standardization for wireless internet to enhance the industry and to have a competition compared to other countries. Lastly, we analysed the government's policy for wireless internet.

  • PDF

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

A Study on the Authentication Mechanism for Wireless Mesh Network (무선 메쉬 네트워크를 위한 인증 메커니즘에 관한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.117-126
    • /
    • 2009
  • Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., This paper presents a secure and efficient authentication mechanism for Wireless mesh network. The validity of proposed mechanism is provided by BAN logic and the efficiency of suggested mechanism is showed through the performance evaluation.

A Priority Time Scheduling Method for Avoiding Gateway Bottleneck in Wireless Mesh Networks (무선 메쉬 네트워크에서 게이트웨이 병목 회피를 위한 우선순위 타임 스케줄링 기법)

  • Ryu, Min Woo;Kim, Dae Young;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.101-107
    • /
    • 2009
  • In existing wireless ad-hoc networks, how to distribute network resources fairly between many users to optimize data transmission is an important research subject. However, in wireless mesh networks (WMNs), it is one of the research areas to avoid gateway bottleneck more than the fair network resource sharing. It is because WMN traffic are concentrated on the gateway connected to backhaul. To solve this problem, the paper proposes Weighted Fairness Time-sharing Access (WFTA). The proposed WFTA is a priority time scheduling scheme based on Weighted Fair Queuing (WFQ).

Cluster Head Chain Routing Protocol suitable for Wireless Sensor Networks in Nuclear Power Plants (원전 무선 센서 네트워크에 적합한 클러스터 헤드 체인 라우팅 프로토콜)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2020
  • Nuclear power plants have a lower cost of power generation, and they are more eco-friendly than other power generation plants. Also, we need to prepare nuclear plant accidents because of their severe damage. In the event of a safety accident, such as a radiation leak, by applying a wireless sensor network to a nuclear power plant, many sensor nodes can be used to monitor radiation and transmit information to an external base station to appropriately respond to the accident. However, applying a wireless sensor network to nuclear power plants requires routing protocols that consider the sensor network size and bypass obstacles such as plant buildings. In general, the hierarchical-based routing protocols are efficient in energy consumption. In this study, we look into the problems that may occur if hierarchical-based routing protocols are applied to nuclear power plants and propose improved routing protocols to solve these problems. Simulation results show that the proposed routing protocol is more effective in energy consumption than the existing LEACH protocol.

Wireless Automatic Flowmeter Using PICBASIC (PICBASIC을 이용한 무선자동 유량시스템)

  • 박정희
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.229-234
    • /
    • 2001
  • The flowmeter is being widely used from water flowmeter for homeuse to many other applications for industry such as petrochemistry. In particular, a wireless automatic flowmeter is highly in demand. This paper suggests a gearwheel wireless automatic flowmeter using PICBASIC which can be simply implemented for manufacturing. It is confirmed by experiment that the automatic flowmeter using by a wireless chip works well in a local area within 300 meters.

  • PDF

Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks (무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜)

  • Choi, Younsung;Chang, Beom-Hwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.71-84
    • /
    • 2019
  • Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

A basic study of wireless sensor monitoring system configuration for active machinery (능동기기 무선센터 모니터링 시스템 구축에 관한 기초연구)

  • Park, Chang-Dae;Lim, Byung-Ju;Lee, Hoo-Rock;Choi, Bong-Woo;Hwang, Seung-Jae;Chung, Kyung-Yul
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2012.06a
    • /
    • pp.119-120
    • /
    • 2012
  • In the various industry plant, it need a condition monitoring system for an active machine that used an detachable wireless sensors. In this paper, IEEE802.15.4 standard based detachable wireless sensor monitoring system configure results will be introduced.

  • PDF

The Trends for Wireless Internet (무선인터넷 외국 동향)

  • 김성한;민재홍;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.525-528
    • /
    • 2001
  • Wireless Internet is capable of transmitting data for voice, text and video by wireless network, and recently wireless internet industry is one of the most widely issued. It is categorized into two parts: one is mobile internet and the other wireless internet. Wireless internet's major feature are anytime/anywhere connectionable, portable and multimedia service. And, the markets are increasingly bigger than any other time. In this paper, wireless internet standardization and protocols are described.

  • PDF