• Title/Summary/Keyword: device access

Search Result 951, Processing Time 0.028 seconds

Temporary Access Selection Technology in WIFI Networks

  • Lu, Yang;Tan, Xuezhi;Mo, Yun;Ma, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4269-4292
    • /
    • 2014
  • Currently, increasing numbers of access points (AP) are being deployed in enterprise offices, campuses and municipal downtowns for flexible Internet connectivity, but most of these access points are idle or redundant most of the time, which causes significant energy waste. Therefore, with respect to power conservation, applying energy efficient strategies in WIFI networks is strongly advocated. One feasible method is dynamically managing network resources, particularly APs, by powering devices on or off. However, when an AP is powered on, the device is initialized through a long boot time, during which period clients cannot be associated with it; therefore, the network performance would be greatly impacted. In this paper, based on a global view of an entire WLAN, we propose an AP selection technology, known as Temporary Access Selection (TAS). The criterion of TAS is a fusion metric consisting of two evaluation indexes which are based on throughput and battery life, respectively. TAS is both service and clients' preference specific through balancing the data rate, battery life and packet size. TAS also works well independently in traditional WLANs in which no energy efficient strategy is deployed. Moreover, this paper demonstrates the feasibility and performance of TAS through experiments and simulations with Network Simulator version 3 (NS3).

Device characterization and Fabrication Issues for Ferroelectric Gate Field Effect Transistor Device

  • Yu, Byoung-Gon;You, In-Kyu;Lee, Won-Jae;Ryu, Sang-Ouk;Kim, Kwi-Dong;Yoon, Sung-Min;Cho, Seong-Mok;Lee, Nam-Yeal;Shin, Woong-Chul
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.3
    • /
    • pp.213-225
    • /
    • 2002
  • Metal-Ferroelectric- Insulator- Silicon (MFIS) structured field effect transistor (FET) device was fabricated and characterized. Important issues to realize ferroelectric gate field effect transistor device were summarized in three sections. The choice of interlayer dielectric was made in the consideration of device functionality and chemical reaction between ferroelectric materials and silicon surface during fabrication process. Also, various ferroelectric thin film materials were taken into account to meet desired memory window and process compatibility. Finally, MFIS structured FET device was fabricated and important characteristics were discussed. For feasible integration of current device as random access memory array cell address schemes were also suggested.

Implementation of the ZigBee-based Homenetwork security system using neighbor detection and ACL (이웃탐지와 ACL을 이용한 ZigBee 기반의 홈네트워크 보안 시스템 구현)

  • Park, Hyun-Moon;Park, Soo-Hyun;Seo, Hae-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.35-45
    • /
    • 2009
  • In an open environment such as Home Network, ZigBee Cluster comprising a plurality of Ato-cells is required to provide intense security over the movement of collected, measured data. Against this setting, various security issues are currently under discussion concerning master key control policies, Access Control List (ACL), and device sources, which all involve authentication between ZigBee devices. A variety of authentication methods including Hash Chain Method, token-key method, and public key infrastructure, have been previously studied, and some of them have been reflected in standard methods. In this context, this paper aims to explore whether a new method for searching for neighboring devices in order to detect device replications and Sybil attacks can be applied and extended to the field of security. The neighbor detection applied method is a method of authentication in which ACL information of new devices and that of neighbor devices are included and compared, using information on peripheral devices. Accordingly, this new method is designed to implement detection of malicious device attacks such as Sybil attacks and device replications as well as prevention of hacking. In addition, in reference to ITU-T SG17 and ZigBee Pro, the home network equipment, configured to classify the labels and rules into four categories including user's access rights, time, date, and day, is implemented. In closing, the results demonstrates that the proposed method performs significantly well compared to other existing methods in detecting malicious devices in terms of success rate and time taken.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Geolocation Spectrum Database Assisted Optimal Power Allocation: Device-to-Device Communications in TV White Space

  • Xue, Zhen;Shen, Liang;Ding, Guoru;Wu, Qihui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4835-4855
    • /
    • 2015
  • TV white space (TVWS) is showing promise to become the first widespread practical application of cognitive technology. In fact, regulators worldwide are beginning to allow access to the TV band for secondary users, on the provision that they access the geolocation database. Device-to-device (D2D) can improve the spectrum efficiency, but large-scale D2D communications that underlie TVWS may generate undesirable interference to TV receivers and cause severe mutual interference. In this paper, we use an established geolocation database to investigate the power allocation problem, in order to maximize the total sum throughput of D2D links in TVWS while guaranteeing the quality-of-service (QoS) requirement for both D2D links and TV receivers. Firstly, we formulate an optimization problem based on the system model, which is nonconvex and intractable. Secondly, we use an effective approach to convert the original problem into a series of convex problems and we solve these problems using interior point methods that have polynomial computational complexity. Additionally, we propose an iterative algorithm based on the barrier method to locate the optimal solution. Simulation results show that the proposed algorithm has strong performance with high approximation accuracy for both small and large dimensional problems, and it is superior to both the active set algorithm and genetic algorithm.

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.

A Study on Sharing the Remote Devices through USB over IP (USB/IP를 이용한 원격장치공유에 대한 연구)

  • Yoo, Jin-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4592-4596
    • /
    • 2010
  • This paper is related to the method for sharing some remote devices through USB/IP on the connected system environment. Sharing the remote devices is actually based on the connection technology using USB which is one way of access methods on virtualized server environment. The users who receive server computing unit might want to connect to remote allocated server with the local devices. We can solve the problem of the access methods related to the sharing devices through USB device emulation. This paper discusses the implementation of USB emulation which is based on personalized services on virtualized server environment. Like this, this paper will share devices on the level of USB device. This research can write to the device directly due to virtualizing the device level.

High Performance IP Address Lookup Using GPU

  • Kim, Junghwan;Kim, Jinsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.49-56
    • /
    • 2016
  • Increasing Internet traffic and forwarding table size need high performance IP address lookup engine which is a crucial function of routers. For finding the longest matching prefix, trie-based or its variant schemes have been widely researched in software-based IP lookup. As a software router, we enhance the IP address lookup engine using GPU which is a device widely used in high performance applications. We propose a data structure for multibit trie to exploit GPU hardware efficiently. Also, we devise a novel scheme that the root subtrie is loaded on Shared Memory which is specialized for fast access in GPU. Since the root subtrie is accessed on every IP address lookup, its fast access improves the lookup performance. By means of the performance evaluation, our implemented GPU-based lookup engine shows 17~23 times better performance than CPU-based engine. Also, the fast access technique for the root subtrie gives 10% more improvement.

Impact of gate protection silicon nitride film on the sub-quarter micron transistor performances in dynamic random access memory devices

  • Choy, J.-H.
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.14 no.2
    • /
    • pp.47-49
    • /
    • 2004
  • Gate protection $SiN_x$ as an alternative to a conventional re-oxidation process in Dynamic Random Access Memory devices is investigated. This process can not only protect the gate electrode tungsten against oxidation, but also save the thermal budget due to the re-oxidation. The protection $SiN_x$ process is applied to the poly-Si gate, and its device performance is measured and compared with the re-oxidation processed poly-Si gate. The results on the gate dielectric integrity show that etch damage-curing capability of protection $SiN_x$ is comparable to the re-oxidation process. In addition, the hot carrier immunity of the $SiN_x$ deposited gate is superior to that of re-oxidation processed gate.

A Multi-hop routing protocol for bluetooth devices (블루투스 멀티 홉 라우팅 프로토콜)

  • Yang, Il-Sik;Kim, Myung-Gyu;Son, Ji-Yeon;Park, Jun-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.448-450
    • /
    • 2005
  • A ubiquitous network allows all users to access and exchange information of any kind freely at any time, from anywhere, and from any appliance through the use of broadband and mobile access. Bluetooth commincation can provide the missing wireless extension to the heterogeneous network, allowing a more ubiquitous access. In this point of view, the BT specifications define ways for which each BT device can set up multiple connections with neighboring devices to communicate in a multi-hop fashion. this paper provides insights on the Bluetooth technology and on some limitations of the scatternet formations. so that, we describe a new multi-hop routing protocol for the establishment of scatternets. this protocol defines rules for forming a multi-hop topology in two phases. the first phase, topology discovery, concerns the discovery of the node's depth from a root node initiating inquiry process. the second phase forms scatternet topology based on the result of topology discovery.

  • PDF