• Title/Summary/Keyword: Wireless Mobile Communication

Search Result 1,758, Processing Time 0.031 seconds

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Design of the 1.5kVA Class Wireless Power Transfer Device for Battery Charging of Integrated Power Control System in MSAP (군 이동기지국시스템(MSAP) 통합전원제어장치 배터리 충전용 1.5kVA급 무선전력전송기기의 설계)

  • Kim, Jin-Sung;Kim, Byung-Jun;Park, Hyeon-Jeong;Seo, Min-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.413-420
    • /
    • 2020
  • The Tactical Information and Communication Network system provides real-time multimedia services such as voice and data by utilizing the Mobile Subscriber Access Point. At this time, an external transmission path is constructed through the Low Capacity Trunk Radio and the High Capacity Trunk Radio system. The communication devices of each wireless transmission system are mounted on a tactical vehicle and a secondary battery is used to prevent a power interruption when the supply power to the tactical vehicle is transferred to the integrated power control device. In this paper, the basic design of the Wireless Power Transfer device for charging the battery of the integrated power control system of the mobile base station system using the Loading Distribution Method and checking the number of primary windings and the core material selection by the air gap through the Finite Elements Method.

Handoff Management for Mobile Devices in Hybrid Wireless Data Networks

  • Inayat Riaz;Aibara Reiji;Nishimura Kouji
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.76-86
    • /
    • 2005
  • Today's wireless access networks consist of several tiers that overlap each other. Provisioning of real time undisrupted communication to mobile users, anywhere and anytime through these heterogeneous overlay networks, is a challenging task. We extend the end-to-end approach for the handoff management in hybrid wireless data network by designing a fully mobile-controlled handoff for mobile devices equipped with dual mode interfaces. By handoff, we mean switching the communication between interfaces connected to different subnets. This mobile-controlled handoff scheme reduces the service disruption time during both horizontal and vertical handoffs and does not require any modification in the access networks. We exploit the IP diversity created by the dual interfaces in the overlapping area by simultaneously connecting to different subnets and networks. Power saving is achieved by activating both interfaces only during the handoff period. The performance evaluation of the handoff is carried out by a simple mathematical analysis. The analysis shows that with proper network engineering, exploiting the speed of mobile node and overlapping area between subnets can reduce service disruption and power consumption during handoff significantly. We believe that with more powerful network interfaces our proposal of dual interfaces can be realized.

Routing Protocol for Wireless Sensor Networks Based on Virtual Force Disturbing Mobile Sink Node

  • Yao, Yindi;Xie, Dangyuan;Wang, Chen;Li, Ying;Li, Yangli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1187-1208
    • /
    • 2022
  • One of the main goals of wireless sensor networks (WSNs) is to utilize the energy of sensor nodes effectively and maximize the network lifetime. Thus, this paper proposed a routing protocol for WSNs based on virtual force disturbing mobile Sink node (VFMSR). According to the number of sensor nodes in the cluster, the average energy and the centroid factor of the cluster, a new cluster head (CH) election fitness function was designed. At the same time, a hexagonal fixed-point moving trajectory model with the best radius was constructed, and the virtual force was introduced to interfere with it, so as to avoid the frequent propagation of sink node position information, and reduce the energy consumption of CH. Combined with the improved ant colony algorithm (ACA), the shortest transmission path to Sink node was constructed to reduce the energy consumption of long-distance data transmission of CHs. The simulation results showed that, compared with LEACH, EIP-LEACH, ANT-LEACH and MECA protocols, VFMSR protocol was superior to the existing routing protocols in terms of network energy consumption and network lifetime, and compared with LEACH protocol, the network lifetime was increased by more than three times.

Implementation and Field Test for Smart Hybrid Mobile Broadcasting System

  • Song, Yun-Jeong;Kim, Youngsu;Yun, Jeongil;Lim, HyoungSoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.325-330
    • /
    • 2014
  • The era of convergence is being applied to all areas of Information and Communication Technology (ICT). The convergence of broadcasting service and communication service almost occurs on smart devices including smartphone. The smart hybrid Digital Multimedia Broadcasting (DMB) is a typical example of the convergence of broadcasting and wireless communication service. The hybrid mobile broadcasting service can support seamless video, 3D, high quality, and additional data services based on network connection between the broadcasting and wireless network. The gateway and terminal (including apps on the smartphone) take the role of the main components on the hybrid service. This paper presents the service concept, main components structure, the implementation of gateway and terminals, and field test to the urban areas for the mobile hybrid system.

Link Handover Scheme in Ad Hoc Networks (Ad Hoc 망에서 링크 핸드오버 방안)

  • 박상준;김형종
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.2
    • /
    • pp.53-63
    • /
    • 2004
  • In ad hoc networks, the link survivability is firstly considered if a routing between two mobile nodes takes place through wireless environments, because all of mobile nodes participating in a connection dynamically move to anywhere. Also, mobile nodes have multi-role to implement a communication without a static system supported by wired networks. Hence, it is difficult that all mobile nodes continuously provide a reliable connection when the nodes operate each role for the connection. Therefore, it is desired to maximize the lifetime of a route as long as possible for the reliable communication. In this paper, we propose a proactive link management scheme that can provide the continuous route supported by the link handover. It consider the wireless link quality and the power lifetime of a node so that the link handover is implemented for the link survivability without disconnecting the route on the communication.

  • PDF

An Efficient Password-based Authentication and Key Exchange Protocol for M-Commerce Users (M-Commerce 사용자를 위한 효율적인 패스워드 기반 인증 및 키교환 프로토콜)

  • Park Soo-Jin;Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.125-132
    • /
    • 2005
  • Wireless access always has to include the authentication of communication partners and the encryption of communication data in order to use secure M-Commerce services. However, wireless systems have limitations compared with the wired systems, so we need an efficient authentication and key exchange protocol considering these limitations. In this paper, we propose an efficient authentication and key exchange protocol for M-Commerce users using elliptic curve crypto systems. The proposed protocol reduces the computational load of mobile users because the wireless service provider accomplishes some parts of computations instead of the mobile user, and it uses the password-based authentication in wireless links. Also, it guarantees the anonymity of the mobile user not to reveal directly the real identity of the user to the M-Commerce host, and preserves the confidentiality of communication data between the M-Commerce host and the user not to know the contents of communication between them to others including the wireless service provider.

A Wireless Channel Simulation Method Using Doppler Spectrum Models

  • Lee, Jong-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.390-394
    • /
    • 2003
  • It is very important to simulate various mobile communication channels for the reliable system design and performance tests. Therefore, a new method is proposed in this paper to improve the conventional one for the purpose of the efficient channel simulation having various characteristics. A newly proposed method can simulate any narrow band channel very efficiently from the given Doppler power spectrum model. Also, it has many simulation advantages considering the variety of wireless channel conditions since parameters related with channel characteristics, such as a signal power, signal to noise ratio, direct signal power ratio, etc., can be easily changed according to various propagation environments to be tested.

A Study on Wireless Home Network Platform for End-to-End Seamless Connection and TCP Performance Improvement (종단간 끊김없는 연결과 TCP 성능의 향상을 위한 무선 홈네트워크 플랫폼에 관한 연구)

  • Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.10
    • /
    • pp.1295-1309
    • /
    • 2007
  • A wireless access point is used for all communications in the infrastructure mode wireless home networking, including communication between mobile nodes in the same service area. When a mobile station in the infrastructure mode wireless home networking moves into a dead zone, the communication between the mobile station and the access point is disconnected. To solve this problem, the existing wireless home network platforms focus on the ad hoc mode wireless home networking. However, the performance of an ad hoc network is poorly decreased when the number of mobile participating in the ad hoc network increases. In addition, although the ad hoc routing technique is necessary to support seamless communication of mobile nodes, the existing routing protocols, such as AODV and DSR, do not consider that a wireless channel state could affect performance significantly. Therefore, we propose a wireless home networking platform based on the ESCOD (End-to-end Seamless multi-hop COnnection based on Dual network mode) technique incorporating the VLR (Virtual Link Routing) scheme that supports end-to-end seamless connections. Extensive experiments show that the proposed wireless home networking platform incorporating the VLR scheme outperforms wireless home networking platforms based on the AODV and the DSR routing protocols respectively in terms of low packet transmission failure rate, fast packet transmission time, high TCP performance, and a wider coverage area of wireless home networks.

  • PDF

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.