• Title/Summary/Keyword: Wireless communication convergence

Search Result 694, Processing Time 0.029 seconds

Remote Vital Signal Monitoring System Based on Wireless Sensor Network Using Ad-Hoc Routing

  • Walia Gaurav;Lee Young-Dong;Chung Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.67-70
    • /
    • 2006
  • A distributed healthcare monitoring system prototype for clinical and trauma patients was developed, using wireless sensor network node. The proposed system aimed to measure various vital physiological health parameters like ECG and body temperature of patients and elderly persons, and transfer his/her health status wirelessly in Ad-hoc network to remote base station which was connected to doctor's PDA/PC or to a hospital's main Server using wireless sensor node. The system also aims to save the cost of healthcare facility for patients and the operating power of the system because sensor network is deployed widely and the distance from sensor to base station was shorter than in general centralized system. The wireless data communication will follow IEEE 802.15.4 frequency communication with ad-hoc routing thus enabling every motes attached to patients, to form a wireless data network to send data to base-station, providing mobility and convenience to the users in home environment.

Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey (무선 센서 네트워크 보안 위협 및 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.1-6
    • /
    • 2014
  • A wireless sensor network is being actively researched around the world that are connected to the mesh are a plurality of sensor nodes in a wireless manner that span different regions of the techniques. However, wireless communications use the limitation of resources, so it is very weak due to the properties of the network itself secure in comparison to the normal network. Wireless sensor network is divided into tapped-based attacks, forgery based attacks, denial of service attacks based largely by securities laws must defend against various attacks such as insertion of the wrong information being sent eavesdropping or modification of information, which is usually sensor network applications need to do. The countermeasure of sensor network attack is described in this research, and it will contribute to establish a secure sensor network communication.

  • PDF

A Security Threats in Wireless Charger Systems in M2M (M2M에서 무선충전 시스템의 보안 위협)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.1
    • /
    • pp.27-31
    • /
    • 2013
  • The fast-paced development in the field of wireless charger based on M2M, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. Wireless charger technology in M2M has various security threats because it is based on wireless network. The purpose of this paper is to examine the threats of authentication and payment attacks based on wireless network attacks, and to propose the response technique that fit the situation of the wireless charger service by modifying the existing detecting authentication and payment through wireless charger.

Analysis of Threats Factor in IT Convergence Security (IT 융합보안에서의 위협요소 분석)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.49-55
    • /
    • 2010
  • As the developing of the information communication technology, more and more devices are with the capacity of communication and networking. The convergence businesses which communicate with the devices have been developing rapidly. The IT convergence communication is viewed as one of the next frontiers in wireless communications. In this paper, we analyze detailed security threats against M2M(Machine to Machine), intelligent vehicle, smart grid and u-Healthcare in IT convergence architecture. We proposed a direction of the IT convergence security that imbedded system security, forensic security, user authentication and key management scheme.

Wirelessly Synchronized One-Way Ranging Algorithm with Active Mobile Nodes

  • Nam, Yoon-Seok;Kang, Bub-Joo;Huh, Jae-Doo;Park, Kwang-Roh
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.466-468
    • /
    • 2009
  • In this letter, we propose a one-way ranging algorithm that is based on wireless synchronization with measured timestamps and clock frequency offsets. In our proposed algorithm, an active mobile node initiates a ranging procedure by transmitting a ranging frame, and the anchor nodes report their timestamps for the received ranging frame to a reference anchor node. The synchronization of a pair of nodes is provided with instantaneous time information, and the corresponding difference of distances can be calculated.

Industry specialization and wireless convergence in Daejeon (대전의 산업특화와 무선통신융합)

  • Park, Jae-Sue;Park, Jung-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2739-2744
    • /
    • 2015
  • Development of policy incentives and policy direction in the innovation economy is always important. Innovations policy have characterized industrial dynamics, leading to a transformation of the market structure of the specific industry. The paper explores the development of industry convergence for understanding the change of the wireless industry in Daejeon. Although its initial focus is R&D center, The business model has become the research and development of external demand than its own product research and development. For regional innovation, the wireless industry policy should be provided with their own product development pattern.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Design and Performance Analysis of Visible -Light Wireless Communication System using LED

  • Choi, Jae Myoeng
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.147-157
    • /
    • 2018
  • In this study, we analyzed an outdoor visible light communication system and implemented it through a simulation. We designed a Reed-Solomon encoder, a variable interleaver structure, and set it to the Institute of Electrical and Electronics Engineers (IEEE) 802.15.7 PHY I specification mode. We also analyzed the performance of an additive white gaussian noise (AWGN) channel environment using a root-raised-cosine (RRC) filter, implemented a MATLAB simulation and analyzed its performance. The results showed a requirement for an additional signal-to-noise ratio (SNR) of approximately 1.5 dB in a 3-ray multipath visible light channel environment than in an AWGN environment.

ARM: Adaptive Resource Management for Wireless Network Reliability (무선 네트워크의 신뢰성 보장을 위한 적응적 자원 관리 기법)

  • Lee, Kisong;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2382-2388
    • /
    • 2014
  • To provide network reliability in indoor wireless communication systems, we should resolve the problem of unexpected network failure rapidly. In this paper, we propose an adaptive resource management (ARM) scheme to support seamless connectivity to users. In consideration of system throughput and user fairness simultaneously, the ARM scheme adaptively determines the set of healing channels, and performs scheduling and power allocation iteratively based on a constrained non-convex optimization technique. Through intensive simulations, we demonstrate the superior performance results of the proposed ARM scheme in terms of the average cell capacity and user fairness.

Distributed Power and Rate Control for Cognitive Radio Networks

  • Wang, Wei;Wang, Wenbo;Zhu, Yajun;Peng, Tao
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.166-174
    • /
    • 2009
  • In this paper, a distributed power and end-to-end rate control algorithm is proposed in the presence of licensed users. By Lagrangian duality theory, the optimal power and rate control solution is given for the unlicensed users while satisfying the interference temperature limits to licensed users. It is obtained that transmitting with either 0 or the maximum node power is the optimal scheme. The synchronous and asynchronous distributed algorithms are proposed to be implemented at the nodes and links. The convergence of the proposed algorithms are proved. Finally, further discussion on the utility-based fairness is provided for the proposed algorithms. Numerical results show that the proposed algorithm can limit the interference to licensed user under a predefined threshold.