• 제목/요약/키워드: internet communications

검색결과 1,896건 처리시간 0.021초

인터넷 거버넌스와 이용자 (Internet Governance and Users)

  • 김보라미
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.95-100
    • /
    • 2013
  • Having taken actions for 2 years, Net Neutrality User Forum has realized Net Neutrality as a international issue of future Internet. Although the Internet design principle (layering, module, IP protocol) has enabled the end users to communicate each other without any additional permission or interference, in the reality, the end users have been tracked by both companies and governments, and the communications could be blocked, or restricted by surveillance devices, such as DPI, which could change the whole Internet design principle. Given that the Internet is a large community of the equal end-users based on end-to-end principle, it's essentially the issues of the whole Internet users, rather than of one nation, and we should focus on developing the transparent and participatory ways in Internet governance. The current Internet governance discussion have taken placed in ICANN, IGF, etc., in bottom-up processes of multistakeholderism to reflect the views of end-users. However there have been the controversial issues in Internet Governance, such as the position of government as a stakeholder, global north-south problem, transparency, so we have faced the debate on the new or evolving frame of Internet governance.

  • PDF

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

  • Li, Zhigang;Shi, Yan;Chen, Shanzhi;Zhao, Jingwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.872-885
    • /
    • 2015
  • The rapid increase of smart mobile devices and mobile applications has led to explosive growth of data traffic in cellular network. Offloading data traffic becomes one of the most urgent technical problems. Recent work has proposed to exploit opportunistic communications to offload cellular traffic for mobile data dissemination services, especially for accepting large delayed data. The basic idea is to deliver the data to only part of subscribers (called target-nodes) via the cellular network, and allow target-nodes to disseminate the data through opportunistic communications. Human mobility shows temporal and spatial characteristics and predictability, which can be used as effective guidance efficient opportunistic communication. Therefore, based on the regularity of human mobility we propose NodeRank algorithm which uses the encounter characteristics between nodes to choose target nodes. Different from the existing work which only using encounter frequency, NodeRank algorithm combined the contact time and inter-contact time meanwhile to ensure integrity and availability of message delivery. The simulation results based on real-world mobility traces show the performance advantages of NodeRank in offloading efficiency and network redundant copies.

Time Switching for Wireless Communications with Full-Duplex Relaying in Imperfect CSI Condition

  • Nguyen, Tan N.;Do, Dinh-Thuan;Tran, Phuong T.;Voznak, Miroslav
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4223-4239
    • /
    • 2016
  • In this paper, we consider an amplify-and-forward (AF) full-duplex relay network (FDRN) using simultaneous wireless information and power transfer, where a battery-free relay node harvests energy from the received radio frequency (RF) signals from a source node and uses the harvested energy to forward the source information to destination node. The time-switching relaying (TSR) protocol is studied, with the assumption that the channel state information (CSI) at the relay node is imperfect. We deliver a rigorous analysis of the outage probability of the proposed system. Based on the outage probability expressions, the optimal time switching factor are obtained via the numerical search method. The simulation and numerical results provide practical insights into the effect of various system parameters, such as the time switching factor, the noise power, the energy harvesting efficiency, and the channel estimation error on the performance of this network. It is also observed that for the imperfect CSI case, the proposed scheme still can provide acceptable outage performance given that the channel estimation error is bounded in a permissible interval.

프로그래머블 로봇 개념 기반 자세 교정 방석 개발 (Development of Posture Correction Cushion based on Programmable Robot)

  • 황성운;안병구;지인호
    • 한국인터넷방송통신학회논문지
    • /
    • 제12권4호
    • /
    • pp.43-49
    • /
    • 2012
  • 최근에 컴퓨터 기술, 특히 영상 처리, 무선 통신, 프로그래머블 로봇 기술이 발전하여 우리 일상 생활에 활발히 적용되고 있다. 본 논문에서는 이러한 기술들을 융합하여 사용자의 잘못된 자세를 탐지하고, 이를 사용자에게 알려주고, 사용자로 하여금 적극적으로 자세 교정을 할 수 있도록 도움을 주는 프로그래머블 로봇기반 방석을 개발한다. 또한 이를 통해 컴퓨터 관련 학과 학부생들이 창의적으로 문제를 정의하고 해결하는 과정에서 IT 융합형 프로그래머블 로봇이 갖는 효과를 분석한다.

A Secure MQAM Scheme Based on Signal Constellation Hopping

  • Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2246-2260
    • /
    • 2014
  • In this paper, a secure multilevel quadrature amplitude modulation (MQAM) scheme is proposed for the physical layer security (PLS) of the wireless communications. In the proposed scheme, each transmitted symbol's signal constellation (SC) is hopping with the control of two unique factors: amplitude distortion (AD) factor and phase hopping (PH) factor. With unknown the two factors, the eavesdropper cannot extract effective information from the received signal. We first introduce a security metric, referred to as secrecy gain, and drive a lower bound on the gain that the secrecy capacity can be improved. Then, we investigate the relationship among the secrecy gain, the signal to noise power ratios (SNRs) of the main and wiretap channels, and the secrecy capacity. Next, we analyze the security of the proposed scheme, and the results indicate that the secrecy capacity is improved by our scheme. Specifically, a positive secrecy capacity is always obtained, whether the quality of the main channel is better than that of the wiretap channel or not. Finally, the numerical results are provided to prove the analytical work, which further suggests the security of the proposed scheme.

Machine-to-Machine (M2M) Communications in Vehicular Networks

  • Booysen, M.J.;Gilmore, J.S.;Zeadally, S.;Rooyen, G.J. Van
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.529-546
    • /
    • 2012
  • To address the need for autonomous control of remote and distributed mobile systems, Machine-to-Machine (M2M) communications are rapidly gaining attention from both academia and industry. M2M communications have recently been deployed in smart grid, home networking, health care, and vehicular networking environments. This paper focuses on M2M communications in the vehicular networking context and investigates areas where M2M principles can improve vehicular networking. Since connected vehicles are essentially a network of machines that are communicating, preferably autonomously, vehicular networks can benefit a lot from M2M communications support. The M2M paradigm enhances vehicular networking by supporting large-scale deployment of devices, cross-platform networking, autonomous monitoring and control, visualization of the system and measurements, and security. We also present some of the challenges that still need to be addressed to fully enable M2M support in the vehicular networking environment. Of these, component standardization and data security management are considered to be the most significant challenges.

LTE Mobility Enhancements for Evolution into 5G

  • Park, Hyun-Seo;Choi, Yong-Seouk;Kim, Byung-Chul;Lee, Jae-Yong
    • ETRI Journal
    • /
    • 제37권6호
    • /
    • pp.1065-1076
    • /
    • 2015
  • Network densification is regarded as the dominant driver for wireless evolution into the era of 5G. However, in this context, interference-limited dense small cell deployments are facing technical challenges in mobility management. The recently announced results from an LTE field test conducted in a dense urban area show a handover failure (HOF) rate of over 21%. A major cause of HOFs is the transmission failure of handover command (HO CMD) messages. In this paper, we propose two enhancements to HO performance in LTE networks - radio link failure-proactive HO, which helps with the reliable transmission of HO CMD messages while the user equipment is under a poor radio link condition, and Early Handover Preparation with Ping-Pong Avoidance (EHOPPPA) HO, which assures reliable transmission of HO CMD under a good radio link condition. We analyze the HO performance of EHOPPPA HO theoretically, and perform simulations to compare the performance of the proposed schemes with that of standard LTE HO. We show that they can decrease the HOF rate to nearly zero through an analysis, and based on the simulation results, by over 70%, without increasing the ping-pong probability.

무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증 (The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network)

  • 박민호;백해현;금동원;최형석;이종성
    • 한국군사과학기술학회지
    • /
    • 제18권4호
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.