• Title/Summary/Keyword: Wireless machine

Search Result 242, Processing Time 0.028 seconds

Converged Mobile Cellular Networks and Wireless Sensor Networks for Machine-to-Machine Communications

  • Shan, Lianhai;Li, Zhenhong;Hu, Honglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.147-161
    • /
    • 2012
  • In recent years, machine-to-machine (M2M) communications are under rapid development to meet the fast-increasing requirements of multi-type wireless services and applications. In order to satisfy M2M communications requirements, heterogeneous networks convergence appears in many areas, i.e., mobile cellular networks (MCNs) and wireless sensor networks (WSNs) are evolving from heterogeneous to converged. In this paper, we introduce the system architecture and application requirement for converged MCN and WSN, where mobile terminals in MCN are acting as both sensor nodes and gateways for WSN. And then, we discuss the joint optimization of converged networks for M2M communications. Finally, we discuss the technical challenges in the converged process of MCN and WSN.

A Residual Power Estimation Scheme Using Machine Learning in Wireless Sensor Networks (센서 네트워크에서 기계학습을 사용한 잔류 전력 추정 방안)

  • Bae, Shi-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.67-74
    • /
    • 2021
  • As IoT(Internet Of Things) devices like a smart sensor have constrained power sources, a power strategy is critical in WSN(Wireless Sensor Networks). Therefore, it is necessary to figure out the residual power of each sensor node for managing power strategies in WSN, which, however, requires additional data transmission, leading to more power consumption. In this paper, a residual power estimation method was proposed, which uses ignorantly small amount of power consumption in the resource-constrained wireless networks including WSN. A residual power prediction is possible with the least data transmission by using Machine Learning method with some training data in this proposal. The performance of the proposed scheme was evaluated by machine learning method, simulation, and analysis.

Selection of Machine Learning Techniques for Network Lifetime Parameters and Synchronization Issues in Wireless Networks

  • Srilakshmi, Nimmagadda;Sangaiah, Arun Kumar
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.833-852
    • /
    • 2019
  • In real time applications, due to their effective cost and small size, wireless networks play an important role in receiving particular data and transmitting it to a base station for analysis, a process that can be easily deployed. Due to various internal and external factors, networks can change dynamically, which impacts the localisation of nodes, delays, routing mechanisms, geographical coverage, cross-layer design, the quality of links, fault detection, and quality of service, among others. Conventional methods were programmed, for static networks which made it difficult for networks to respond dynamically. Here, machine learning strategies can be applied for dynamic networks effecting self-learning and developing tools to react quickly and efficiently, with less human intervention and reprogramming. In this paper, we present a wireless networks survey based on different machine learning algorithms and network lifetime parameters, and include the advantages and drawbacks of such a system. Furthermore, we present learning algorithms and techniques for congestion, synchronisation, energy harvesting, and for scheduling mobile sinks. Finally, we present a statistical evaluation of the survey, the motive for choosing specific techniques to deal with wireless network problems, and a brief discussion on the challenges inherent in this area of research.

Research Trends of Ultra-reliable and Low-latency Machine Learning-based Wireless Communication Technology (기계학습기반 초신뢰·저지연 무선통신기술 연구동향)

  • Lee, H.;Kwon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.93-105
    • /
    • 2019
  • This study emphasizes the importance of the newly added Ultra-Reliable and Low-Latency Communications (URLLC) service as an important evolutionary step for 5G mobile communication, and proposes a remedial application. We analyze the requirements for the application of 5G mobile communication technology in high-precision vertical industries and applications, introduce the 5G URLLC design principles and standards of 3GPP, and summarize the current state of applied artificial intelligence technology in wireless communication. Additionally, we summarize the current state of research on ultra-reliable and low-latency machine learning-based wireless communication technology for application in ultra-high-precision vertical industries and applications. Furthermore, we discuss the technological direction of artificial intelligence technology for URLLC wireless communication.

A Method of Combining Scrambling Technology with Error Control Coding to Realize Both Confidentiality and Reliability in Wireless M2M Communication

  • Zhang, Meng;Wang, Zhe;Guo, Menghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.162-177
    • /
    • 2012
  • In this paper we present a novel method of applying image scrambling technology which belongs to the information hiding field in the error control coding to introduce confidentiality in wireless machine to machine communication. The interleaver in serial concatenated convolutional codes, which is the key module in overcoming burst errors, is deliberately designed with the scrambling function to provide a low error rate for those authorized transceivers. By contrast, the unauthorized transceivers without keys would get so high an error rate that decoding bits could bring little value, thus realizing both the confidentiality and reliability in wireless machine to machine communication.

Design and Performance Evaluation of Support Vector Machine based Loss Discrimination Algorithm for TCP Performance Improvement (TCP 성능개선을 위한 SVM 기반 LDA 설계 및 성능평가)

  • Kim, Do-Ho;Lee, Jae-Yong;Kim, Byung-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.451-453
    • /
    • 2019
  • Recently, as the use of wireless communication devices has increased, the wireless network usage has increased, and a wired network and a wireless network have been mixed to form a network. Existing TCP algorithms are designed for wired networks. Therefore, in the modern network environment, packet loss can not be accurately distinguished and improper congestion control is performed, resulting in degradation of TCP performance. In this paper, we propose SLDA (Support Vector Machine based Loss Discrimination Algorithm) which can accurately classify the packet loss environment to improve TCP performance and evaluate its performance.

  • PDF

Vertical Handoff Decision System based on Support Vector Machine

  • Oh, Ryong;Yu, Jae-Hak;Kim, Tae-Sub;Lim, Chi-Hun;Ryu, Seung-Wan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.771-779
    • /
    • 2011
  • It is expected that many heterogeneous wireless systems, such as 3GPP LTE systems, WiMAX systems and WLAN systems, will coexist in the next generation wireless communication environments. Integrated radio resource management and seamless vertical handoff (VHO) should be supported to provide integrated communication services over multi-radio access networks. A new class of adaptive VHO system that views the handoff problem as a pattern recognition problem is proposed. In this paper, we propose a unified radio resource management (URRM) architecture and Support Vector Machine (SVM) based vertical handoff decision system. Extensive simulation studies show the proposed VHO algorithm outperforms RSS based VHO algorithms in terms of throughput and service cost.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks

  • Wang, Qiuhua;Kang, Mingyang;Yuan, Lifeng;Wang, Yunlu;Miao, Gongxun;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2255-2281
    • /
    • 2021
  • Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in a fog computing environment. While existing channel characteristic-based physical layer authentication schemes may be efficient when deployed in the conventional wireless network environment, they may be less efficient and practical for the industrial wireless communication environment due to the varying requirements. We observe that this is a topic that is understudied, and therefore in this paper, we review the constructions and performance of several commonly used test statistics and analyze their performance in typical industrial wireless networks using simulation experiments. The findings from the simulations show a number of limitations in existing channel characteristic-based physical layer authentication schemes. Therefore, we believe that it is a good idea to combine machine learning and multiple test statistics for identity authentication in future industrial wireless network deployment. Four machine learning methods prove that the scheme significantly improves the authentication accuracy and solves the challenge of choosing a threshold.

A Study on Dynamic Key Management in Mixed-Mode Wireless LAN (혼합모드 무선랜에서의 동적 키 관리 방식 연구)

  • 강유성;오경희;정병호;정교일;양대헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.581-593
    • /
    • 2004
  • The interest in wireless LAN security is on the increase owing to a role of high-speed wireless Internet infrastructure of wireless LAN. Wi-Fi has released WPA standard in order to overcome drawbacks of WEP algorithm that is security element of current IEEE 802.11-based wireless LAN system. Pairwise key management and group key management in a mixed-mode which supports both terminals running WPA and terminals running original WEP security are very complicate. In this paper, we analyze flaws in WPA authenticator key management state machine for key distribution and propose the countermeasures to overcome the analyzed problems. Additionally, WPA authenticator key management state machine to which the solutions are applied is described. The reconstructed WPA authenticator key management state machine helps the AP perform efficiently group key exchange and group key update in the mixed-mode.