• Title/Summary/Keyword: Wireless terminal

Search Result 545, Processing Time 0.027 seconds

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

An On-demand Station Location Management scheme using 6-address structure of IEEE 802.11s (IEEE 802.11s 6-Address 구조를 이용한 On-demand 방식 단말 위치 관리기법)

  • Jang, Jeong-Hun;Kong, Jong-Min;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.829-836
    • /
    • 2013
  • Wireless mesh networks(WMNs) are wireless backbone networks technology consisting of a multi-hop routers. Location management is essential to provide a service to the terminal in WMNs. IEEE 802.11s standards have two basic location management scheme for location management - the proxy registration procedure and the associated station discovery protocol. These basic schemes, however, suffer from serious drawbacks including redundancy control message, ineffective location information maintenance, additional delay time. This paper propose an on-demand station location management scheme using 6-address structure of IEEE 802.11s. Through analysis and experimental evaluation on simulation, we show that proposal scheme reduce control message and forwarding delay time.

Home Management System Using Smartphone and Sensor Networks (스마트폰과 센서 네트워크를 이용한 홈 관리 시스템)

  • Han, Joosik;Jung, Yeonsoo;Son, Youngho;Hwang, Soyoung;Joo, Jaeheum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.405-406
    • /
    • 2012
  • A sensor network is composed of a large number of sensor nodes which have sensing, computation and wireless communication capabilities. The sensor node sends such collected data, usually via radio transmitter, to a command center (sink) either directly or through a data concentration center (a gateway). These sensor networks can be used for various application areas such as health, military, home network, managing inventory, monitoring disaster areas and so on. Moreover, owing to the rapid growth of mobile technology, high-performance smartphones are widespread and in increasing cases are utilized as a terminal device. In this paper, we propose a home management system using smartphone and sensor networks.

  • PDF

Design and Implementation of a ubiquitous health care system (유비쿼터스 헬스 케어 시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.921-924
    • /
    • 2007
  • In this paper, we have implemented a ubiquitous healthcare system that can measure and check human's health in anytime and anywhere. The implemented prototype are composed of both front-end and back-end. The front-end have several groups: environment sensor group such as temperature, humidity, photo, voice sensor, health sensor group such as blood pressure, heart beat, electrocardiogram, spo2 sensor, gateway for wired/wireless communication, and RFlD reader to identify personal. The back-end has a serial forwarder to propagate measurment results, monitor program, and medical information server. The implemented sensor node constructs a sensor network using the Zigbee protocol and is ported the TinyOS. The data gathering base node is linux-based terminal that can transfer a sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through our experiments, we've confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.

  • PDF

Design and Evaluation of a Fuzzy Logic-based Selective Paging Method for Wireless Mobile Networks (무선 이동망을 위한 퍼지 논리 기반 선택적 페이징 방법의 설계 및 평가)

  • 배인한
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.289-297
    • /
    • 2004
  • State-of-the-art wireless communication networks allow dynamic relocation of mobile terminals. A location management mechanism is required to keep track of a mobile terminal for delivering incoming calls. In this paper, we propose a fuzzy logic-based selective paging method to reduce paging cost. In the proposed fuzzy logic-based location management method, the location update uses the area-based method that uses direction-based together with movement-based methods, and the location search uses the fuzzy logic-based selective paging method based on the mobility information of mobile terminals. A partial candidate paging area is selected by fuzzy control rules, then the fuzzy logic-based selective paging method pages only the cells within the partial candidate paging area. The performance of proposed fuzzy logic-based location management method is to be evaluated by both an analytical model and a simulation, and is compared with those of LA and BVP methods. From these evaluation results, we know that the proposed fuzzy logic-based location management method provide better performance than other location management methods.

Performance Analysis of Operation Strategy of Dual Virtual Cell-based System under The Overlay Convergent Networks of Cognitive Networking (인지 네트워킹 기반 중첩 융합 네트워크에서 이중 가상 셀 운영방안의 성능분석)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.483-488
    • /
    • 2012
  • With the fast growing data traffic, the performance of the convergent overlay network environment under the cognitive networking environment is crucial for the implementation of the efficient network structure. In order to achieve high capacity and reliable link quality in wireless communication of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of ambient-aware dual cell system's operation. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on DWCS network. One is the Active Virtual Cell which exists for user's actual data traffic and the other is the Candidate Virtual Cell which contains a set of candidate antennas to protect user's link quality from performance degradation or interruption. The considered system constructs DVC by using cognitive ability of finding useful virtual signals. Also, for multi-user high-rate data transmission, the DWCS system exploits Space-Time Trellis Codes. The effects of changing environments on the system performance has been investigated thereafter.

A Study on the MAC Protocol for ABR Service in Wireless environments (무선 환경에서 ABR 서비스를 위한 MAC 프로토콜에 관한 연구)

  • 강상욱;정종혁
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.11a
    • /
    • pp.463-470
    • /
    • 2000
  • In this paper, we describe a wireless MAC protocol named APRMA(Abitrary Period Reservation Multiple Access), which is capable of supporting the ABR type data service and maximizing channel utilization. In original PRMA protocol, data terminals with random data packets cannot reserve slot. That is, slot reservation is applicable to the. time constraint voice packet exclusively. But the reservation scheme have to be performed for loss sensitive data packet, so data packets can get their quality of service. The aspects of service, if fixed bandwidth is allocated to data terminals, time constraint voice packets may have a low efficiency So in this study, the terminal which wants to request for ABR type service, acquires a minimum bandwidth from system for the first time. If the system have extra available bandwidth, ABR terminals would acquire additional bandwidth slot by slot. As a result, APRMA protocol can support the data service with loss sensitivity and maintain their channel utilization highly. Also high Priority services like voice can be satisfied with their QoS by APRMA.

  • PDF

Development of Mobile Camera Vision System and Build of Wire.Wireless Integration ERP System (모바일 카메라 비전 시스템 개발과 유.무선 통합 ERP 시스템 구축)

  • Lee, Hyae-Jung;Shin, Hyun-Cheol;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.81-89
    • /
    • 2007
  • Mobile computing environment that support so that can offer employees inside information that enterprise has always improves business productivity and fetches efficiency enlargement. In this paper, limit model that can process ERP information by real-time as easy and convenient always utilizing radio network and PDA, Mobile camera based on Mobile vision concept. Calculable information between seller and customer is supplied supplying real-time brand image and information by practical use of Enterprise Resource Planning doing based on Mobile. Technical development and commercialization that utilize mobility, enforcement stronghold, portability etc. that is advantage of Mobile communication are required. In this paper, mobility of precious metals.jewel field that use portable terminal equipment taking advantage of a Mobile technology is secured. Constructed Mobile vision system that satisfy photography and bar-code scan at the same time from Mobile camera.

  • PDF

A Study for Key Generation and Access Control Protocol in BYOD Environments (BYOD환경에서 키 생성 및 접근 제어 프로토콜에 관한 연구)

  • Min, So-Yeon;Jin, Byung-Wook;Lee, Kwang-Hyoung;Lee, Keun-Wang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.27-35
    • /
    • 2015
  • Depending on the smart device user growth and development of communication technology, the area about working environment was extended without constraints of time and places. It is introducing to work using user's devices and this environment is called 'BYOD(Bring Your On Device)'. But it is vulnerable to security threat that happened in existing wireless environment and its security threat issue which is caused by inside information leak by an inside job and lost or stolen terminal which is caused by careless user is getting heated. So we studied about access control protocol by user rights under the BYOD situation make a session key based on the user information. We make a session key based on the user information and user device information, after that we design an access control protocol. The protocol we suggest can protect from attack under the BYOD situation and wireless communication situation and also safety and security requirement from inside information leak because it controls user rights.

Forward Handover According to COS Reservation in Wireless ATM (무선 ATM에서 COS 예약에 의한 순방향 핸드오버)

  • No, Seung-Hwan;Gi, Jang-Geun;Park, Seong-Gyun;Choe, Gwan-Su
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.4
    • /
    • pp.44-51
    • /
    • 2000
  • Wireless ATM is the next-generation technology which can provide broadband services for mobile multimedia terminals. Proposed in this paper is a method of enabling fast handover by forming one cell group with the cell having the mobile terminal (MT) at present and six adjacent cells and storing information on COS which is to perform re-routing between new cell to which MT is moved when handover occurs and adjacent cells to which the MT can be handed over in new cells in advance. And the order of data cells is guaranteed by using the in-band marking cell during handover. Also the handover delay is analyzed and compared to the conventional handover method without COS reservation.

  • PDF