• 제목/요약/키워드: communication technology

검색결과 16,760건 처리시간 0.049초

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

A New AAL2 Scheduling Algorithm for Mobile Voice and Data Services over ATM

  • Huhnkuk Lim;Dongwook lee;Kim, Kiseon;Kwangsuk Song;Changhwan Oh;Lee, Suwon
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -1
    • /
    • pp.229-232
    • /
    • 2000
  • AAL2 has been adopted for bandwidth-efficient trans-mission of low bit tate traffic over ATM networks in ITUT and ATM Forum. Since ATM/AAL2 is expected to be used as a switching technology in third-generation mobile access networks and mobile data traffic is expected to increase rapidly in near future, there must be a need for efficient scheduling scheme satisfying the QoS requirement of ow bit rate voice as well as the one of high bit rate data. In this paper, we propose a new class-scheduling scheme to improve data packet loss probability, while Qos of voice traffic is guaranteed, when data traffic is multiplexed together with mobile voice traffic into a single ATM VCC. The proposed scheme can efficiently support data traffic by assigning a time threshold value to voice traffic. Through simulation study, we show that the proposed scheme does not only achieve better efficiency for providing both mobile voice and data services than HOL class-scheduling scheme and normal FIFO scheme, but also guarantees mean voice packet delay under a certain criteria.

  • PDF

Flexible Protocol Reconfiguration for Emergency Communication Systems

  • Zhang, Ji;Li, Hai;Hou, Shujuan
    • ETRI Journal
    • /
    • 제33권1호
    • /
    • pp.18-26
    • /
    • 2011
  • The necessity for services of emergency communication systems to be uninterrupted and reliable has brought forward strict requirements for express software upgrades of base stations. Based on reconfigurability technology, this paper presents a protocol reconfiguration scheme for emergency communication base stations. By introducing the concept of 'local safe state,' the proposed scheme could make the updating and replacement of the protocol software flexible and maintain interactions during the updating procedure to achieve seamless system upgrades. Further, taking TETRA protocol stack and VxWorks operating system as an example, specific processes and realization methods of reconfiguration are proposed in this paper, along with the measurements of the factors impacting on the system performance. Simulation results show that, compared with traditional technology, the method proposed significantly improves the system efficiency and does not interrupt system services.

원격로봇학습과 원격화상학습에 대한 아동 반응 비교 (Is a Robot better than Video for Initiating Remote Social Connections among Children?)

  • 김누리;한정혜
    • 제어로봇시스템학회논문지
    • /
    • 제20권5호
    • /
    • pp.513-519
    • /
    • 2014
  • Videoconferencing technology is increasingly used in classrooms to introduce children to people from other countries and cultures in order to provide a wider learning experience. However, with traditional screen-based video conferencing technology, research has shown that it is easy for students to miss non-verbal cues that play a key role in developing human relationships. To investigate how children interact differently when their interactions are mediated through screen-based video communication versus robot-mediated communication, we conducted a study with elementary students in Korea, comparing the use of both technologies to introduce classroom students with peer-aged individuals in America. Our findings show that the children displayed more positive emotions during certain tasks and exhibited more interest and intimacy to remote participants in the context of robot-mediated communication than with video-mediated communication.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

초고속 정보통신 새 시대를 대비한 기술개발 전략 (On the R&D Strategy for the new era of Gigabit Information Technology)

  • 윤석환
    • 기술사
    • /
    • 제29권5호
    • /
    • pp.99-103
    • /
    • 1996
  • In this paper we discuss Gigabit information communication service utilizing Gigabit information super-highway, multimedia data processing technology for the services, multimedia communication protocol for transmitting multimedia data and construction of Gigabit information communication network which can be accessed everywhere and present items which should be tactically prepared for high-level information society of the 21 st century.

  • PDF

위성통신망을 이용한 도서지역 음성네트워크 구축 (The Construction of voice network in the island using the satellite communication system)

  • 김수배;현덕화;김명수;이상진
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.298-300
    • /
    • 2005
  • There are several types of communication method which is used for providing the supply of electric power stably. But the communication methods used in KEPCO have weak points in the viewpoint of economy, technology and management. Therefore the power plant located in the island could not be provided the communication service because of above reasons. Because the Satellite communication systems have competitive power in price and technology nowdays, the utility could provide the communication service in even back land. This paper presents some of design efforts for the satellite communication systems as the voice network in the island.

  • PDF

Energy-Efficient Antenna Selection in Green MIMO Relaying Communication Systems

  • Qian, Kun;Wang, Wen-Qin
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.320-326
    • /
    • 2016
  • In existing literature on multiple-input multiple-output (MIMO) relaying communication systems, antenna selection is often implemented by maximizing the channel capacity or the output single-to-noise ratio (SNR). In this paper, we propose an energy-efficient low-complexity antenna selection scheme for MIMO relaying communication systems. The proposed algorithm is based on beamforming and maximizing the Frobenius norm to jointly optimize the transmit power, number of active antennas, and antenna subsets at the source, relaying and destination. We maximize the energy efficiency between the link of source to relay and the link of relay to destination to obtain the maximum energy efficiency of the system, subject to the SNR constraint. Compared to existing antenna selection methods forMIMO relaying communication systems, simulation results demonstrate that the proposed method can save more power in term of energy efficiency, while having lower computational complexity.

A Simulator for Calculating Normal Induced Voltage on Communication Line

  • Heo, Jeong-Yong;Seo, Hun-Chul;Lee, Soon-Jeong;Kim, Yoon Sang;Kim, Chul-Hwan
    • Journal of Electrical Engineering and Technology
    • /
    • 제9권4호
    • /
    • pp.1394-1400
    • /
    • 2014
  • The current flowing through the overhead transmission lines causes induced voltage on the communication lines, which can be prevented by calculating the induced voltage at the planning stage for overhead transmission line installment through an agreement between the communication and electric power companies. The procedures to calculate the induced voltages, however, are complicated due to the variety of parameters and tower types of the overhead transmission lines. The difficulty necessitates the development of a simulator to measure the induced voltage on the communication lines. This paper presents two simulators developed for this purpose; one using the Data Base (DB) index method and the other using the Graphic User Interface (GUI) method. The simulators described in this paper have been implemented by the EMTP (Electromagnetic Transient Program).