• Title/Summary/Keyword: Wireless Relay Network

Search Result 265, Processing Time 0.027 seconds

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

A Study on Quality and Economical Analysis of B-WLL and Optical Transmission Systems for Substituting M/W Relay System (M/W 중계장치 대체를 위한 B-WLL 및 광전송 장치의 품질과 경제성 분석에 대한 연구)

  • Suh Kyoung-Whoan;Choi Yong-Seok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.9
    • /
    • pp.809-819
    • /
    • 2004
  • In this paper, in order to exclude the expansion of M/W relay frequency or its new frequency assignment possibly, we analyzed a possibility of substituting M/W system by B-WLL or optical fiber network regarding service quality and economical points. To define the target of service quality, pre-condition and analysis method for the selected media have been derived to compare each other. E1 transmission with BER 10$^{-1}$ was chosen as a reference capacity, and service distance was calculated f3r the selected media as a function of availability. Also from the economical point we considered 3 systems such as optical fiber, M/W, and B-WLL based upon basic system structure, and analyzed them for various line configurations of fiber optic and B-WLL according to service period, system capacity, transmission distance, and data rate. It was confirmed that B-WLL can provide quality of service with 99.999 % availability within 1.6 km cell radius, and for optical fiber substitution, the leased fiber conduit on an electric pole is more economical than M/W system irrespective of service period, but in case of directly digging for underground conduit, it turned out ineffective regardless of cabling duct types.

Energy-Efficient Routing Protocol based on Interference Awareness for Transmission of Delay-Sensitive Data in Multi-Hop RF Energy Harvesting Networks (다중 홉 RF 에너지 하베스팅 네트워크에서 지연에 민감한 데이터 전송을 위한 간섭 인지 기반 에너지 효율적인 라우팅 프로토콜)

  • Kim, Hyun-Tae;Ra, In-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.611-625
    • /
    • 2018
  • With innovative advances in wireless communication technology, many researches for extending network lifetime in maximum by using energy harvesting have been actively performed on the area of network resource optimization, QoS-guaranteed transmission, energy-intelligent routing and etc. As known well, it is very hard to guarantee end-to-end network delay due to uncertainty of the amount of harvested energy in multi-hop RF(radio frequency) energy harvesting wireless networks. To minimize end-to-end delay in multi-hop RF energy harvesting networks, this paper proposes an energy efficient routing metric based on interference aware and protocol which takes account of various delays caused by co-channel interference, energy harvesting time and queuing in a relay node. The proposed method maximizes end-to-end throughput by performing avoidance of packet congestion causing load unbalance, reduction of waiting time due to exhaustion of energy and restraint of delay time from co-channel interference. Finally simulation results using ns-3 simulator show that the proposed method outperforms existing methods in respect of throughput, end-to-end delay and energy consumption.

Aircraft Position Prediction and Shadow Zone Penetration Control Using Bezier Curve (베지에 곡선을 이용한 항공기 위치 예측 및 음영 지역 진입 제어 방법)

  • Jeong, Jae-Soon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1011-1022
    • /
    • 2014
  • Currently, the wireless network environment of air node is constructed mainly of ground relay station. However, as the Korean Peninsula is composed of 70% mountainous region, there are multiple shadow zones. This is calling for effective measures to prevent aircraft from losing communication link during low-mid altitude missions. In this article we propose the utilization of Bezier Curve for estimation of aircraft flight path and control method for entering shadow zone. This method successfully estimated aircraft track, and analyzed the existence, disseminated the warning, and took measures to avoid the shadow zone before entering. This article, suggested after simulated experiments, proves that the method enables seamless communication during air operations.

M2M Network Platform Using the MSRP (MSRP를 이용한 M2M 플랫폼 구조)

  • Kim, Jung-Ho;Been, Jae-Man;Kang, Seung-Chan;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.752-757
    • /
    • 2016
  • Machine to Machine (M2M) communications is communications between a business application and devices via a communication network without any direct human interaction. The aim of our research is to connect any M2M device with an M2M AS (Application server) through an IMS (IP Multimedia Subsystem) Network Core using a M2M Gateway, in order to develop an M2M Horizontal Services Platform over IMS. An IP Multimedia Subsystem (IMS) is an architectural framework defined by the wireless standards body of the 3rd Generation Partnership Project (3GPP) for delivering IP multimedia services to mobile users. This paper shows the design and implementation of a Horizontal M2M Network Services Platform over an IP Multimedia Subsystem (IMS) using the Message Session Relay Protocol (MSRP). We summarize the protocols and architectures that formed the basis for the creation of our architecture. We provide a detailed description of our architecture design, describing the call flow of the proposed architecture and the entities operating in each process. We also describe the design and implementation process detailing the different tools used, explaining the selection of each component and its importance; also how we designed and implemented the M2M gateway, M2M Application Server, Open IMS Core, business application and M2M devices.

Design of Cooperative M-1-1 Protocol Using OFDM to Increase Spectrum Utilization in WSN (무선 센서 네트워크의 주파수 사용 효율성 향상을 위한 OFDM을 사용한 협력적 M-1-1 프로토콜 설계)

  • Hwang, Yun-Kyeong;Kong, Hyung-Yun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.7
    • /
    • pp.766-773
    • /
    • 2007
  • Conventional wireless sensor network(WSN) has limited power and bandwidth. In order to develop multimedia sensor technology, high data rate communication systems are required. Cooperative communication system can help to decrease power consumption through spatial diversity. In cooperative transmission, one partner node assists one sensor node to transmit their data to destination. Instead of using M partners for M sensor nodes, we propose 1 partner for M sensor nodes. Proposed protocol offers similar diversity order as conventional one with much less bandwidth and hardware. It is able to almost reduce scattered nodes interference using orthogonal sub-carriers. In addition, we examined a power allocation between sensor nodes and relay that optimize the system performance.

The Design and Implementation of AMI System Using Binary CDMA (Binary CDMA 기반의 AMI 시스템 설계 및 구현)

  • Joe, In-Whee;Jeong, Jong-Yuel
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.663-669
    • /
    • 2012
  • To solve the energy problem and finding new growth engines, interest for the smart grid is increasing and related technologies are making great efforts to secure in the world. AMI (Advanced Metering Infrastructure) Among them is the first to be constructed and getting attention as a key component of smart grid. A fusion of various technologies in technology development and demonstration is underway on Jeju Island Smart Grid Demonstration Complex in Korea, and focusing on broadband power line communication technology infrastructure is actively underway in Korea Electric Power Corporation. AMI system using power line communication technology without building a separate communication lines are available for power supply lines, but communication is impossible in occurs because admission to the power company or the ideal infrastructure for communication is not considered. In this paper, we analyze the requirements to build AMI system using Binary CDMA and powerline communications technology, and design the basic communication protocol based on Binary CDMA, implement network management and relay feature. By doing so, ways to apply Ad-hoc Binary CDMA indigenous technology to the AMI system were derived, and could build a system to make use of Wired (PLC) and wireless (Binary CDMA) simultaneously.

Residual Voltage Reduction of Coaxial Surge Arrestor Using Ceramic Filler (세라믹 필터를 이용한 동축 서지어레스터의 잔류전압 저감)

  • Eom, Ju-Hong;Cho, Sung-Chul;Lee, Tae-Hyung;Lee, Young-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.2
    • /
    • pp.46-53
    • /
    • 2007
  • Extension of the mobile communication and the rapidly developing services connected with wireless multimedia(W-CDMA, DMB, Wibro, and so on) need great many base station transceiver systems, antennas, and many signal transmission line to embody these services. The min communication appliances system is exposed always in danger of transient overvoltage by direct stroke or induced lightning surge flowing in through antenna because the antenna of base station transceiver system or relay equipment is combined with expensive communication network equipments through signal transmission line. Now, gas discharge tube(GDT) or narrow band stub arrestor which is used by the surge protector for communication use is exposing limitations as for lightning surge protective means of the communication facility with high speed and wide frequency band. Therefore, for improving performance of surge arrestor, we applied ceramic filter which can reduce lightning surge invading from antenna effectively, and proved that ceramic filter is effective in residual voltage reduction through the experimental research.