• Title/Summary/Keyword: mobile communication environment

Search Result 1,403, Processing Time 0.039 seconds

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments (이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜)

  • Kim, Soon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2193-2201
    • /
    • 2006
  • In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.

An Efficient Proxy-Signcryption Scheme for Mobile Communications (이동통신 환경에 적합한 효율적인 Proxy-Signcryption 방식)

  • 김동우;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.518-526
    • /
    • 2003
  • According to the development of mobile communications, the future mobile communication systems are expected to provide high quality multimedia service to users. Therefore, many technical factors we needed in these systems. Especially the confidentiality and the security would be obtained through the introduction of the security for mobile communications. In this paper, we propose an efficient Proxy-Signcryption scheme, which can be performed digital signature and encryption by using the proxy agent who has more computational power under mobile communications environment. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy agent in a phase of proxy signature processing. This scheme also keeps the confidentiality and the security in mobile communication by means of confirming the signature by right receiver.

  • PDF

Design and Implementation of a Mobile Middleware System for Mobile Business (모바일 비즈니스를 위한 모바일 미들웨어 시스템 설계 및 구현)

  • Lee, Il-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.102-113
    • /
    • 2014
  • Present communication and network environment have been moving rapidly toward wireless and mobile base from existing wired internet base. This change of trend influences greatly on business methods accordingly. Therefore many enterprises are trying hard to adopt mobile business in order to gain competitive edge of their products and they are in need of more effective and stable mobile solutions. However, the method of establishing optimal mobile computing environment and how to handle existing business process and use vast amount of database are still needed. Therefore this paper tries to realize a mobile middleware system as a mobile business establishment supporting tool that could link various computational resource on wired internet with wireless LAN, mobile phone network, and mobile devices. To accomplish that specific goal, this paper provides a powerful tool of mobile and wireless application data access that could expand the line of business already set up in general enterprises easily and rapidly into mobile environment. When this suggested solution is applied in the field of industry, it can economically change legacy business process into mobile environment without having to change existing logic and resources at all.

Design of the Advanced Mobile Teletraffic Model and Object Classes for Mobile Simulator (이동통신 시뮬레이터를 위한 개선된 텔레트래픽 모델과 객체 클래스 설계)

  • Yoon, Young-Hyun;Kim, Sang-Bok;Lee, Jeong-Bae;Lee, Sung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.509-518
    • /
    • 2004
  • Many simulators have been developed and are being used for the complex and various mobile communication service environments. Each of these simulators has its own teletraffic model that consists of traffic source model and network traffic model. In this paper, network traffic model and traffic source model, which are based on the data gathered in real environment, are defined in order to get more accurate simulation results in the mobile communication simulation for the urban region. The network traffic model suggested in this paper reflects the hourly call generation rate and call duration time by analyzing the data collected from actually installed base station by the time and place, and the traffic source model includes the delivery share ratio and average speed information in the region where the base station is installed. This paper defined and designed Mobile Host object that reflects the suggested traffic source model, and Call Generator object that reflects the network traffic model, and other objects support both objects. Using the teletraffic model suggested in the paper, user mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time.

Performance Analysis and Evaluation of SNMP and Mobile Agent for Efficient Network Management (효율적인 네트워크 관리를 위한 SNMP와 이동 에이전트의 성능 분석 및 평가)

  • 이정우;정진하;윤완오;최상방
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.105-108
    • /
    • 2002
  • This paper analytical models of a centralized approach based on SNMP Protocol, distributed approach based on mobile agent, and mixed model which is tile existing mobile agent model in order to overcome large communication numbers of SNMP and accumulated data of mobile agent. And then, we compare and analyze these analytical models. Performance evaluation results show that performance of mobile agent and the mixed model is less sensitive to the network traffic and more profitable for complex network environment than that of SNMP.

  • PDF

Implementation of an Indoor Mobile Robot and Environment Recognition using Line Histogram Method (실내 자율주행 로봇의 구현 및 라인 히스토그램을 이용한 환경인식)

  • Moon, Chan-Woo;Lee, Young-Dae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.45-50
    • /
    • 2009
  • The environment exploration is an essential process for indoor robots such as clean robot and security robot. Apartment house and office building has common frame structure, but internal arrangement of each room may be slightly different. So, it is more convenient to use a common frame map than to build a new map at every time the arrangement is changed. In this case, it is important to recognize invariant features such as wall, door and window. In this paper, an indoor mobile robot is implemented, and by using the laser scanner data and line segment histogram with respect to segment orientation and distance, an environment exploration method is presented and tested. This robot is fitted with a laser scanner, gyro sensor, ultra sonic sensor and IR sensor, and programed with C language.

  • PDF

Mobile DB Service of P2P Environment (P2P 환경에서 모바일 데이터베이스 서비스)

  • Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.46-51
    • /
    • 2007
  • The file sharing method from P2P environments with client/server method to be different price does not use an expensive server from radio environment not to be, uses only the client computers and dispersed the joint ownership and a management of data. Human occurs from the client/server method which uses the server of large dosage with like this reason, will be able to minimize the waste of the waste of the material resources. Also valence increasing number of days rock operation of the user provides their benefit of etc. their result comes to be high. Like this is caused by with reason and the many people have an interest in P2P, also currently footlights the researches whice use P2P even in the mobile relation field which is receiving actively, is advanced.

  • PDF

Developed Location Based Service System for Management of Underground Facilities' DB (지하시설물 DB의 유지관리를 위한 LBS 시스템 개발)

  • 이현직;황창섭;박기석;유지호
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2004.11a
    • /
    • pp.325-333
    • /
    • 2004
  • Since 1995, One of the NGIS(National Geographic Information System) projects, the underground utilities project has been finished in 2003. The 19 cities in korea for this project will use underground utilities management system using underground utilities database focusing on water and sewage system. However, special expert, technical and experience problem in computer environment has not been had in working department for water and sewage management and maintenance for each local government. The management and maintenance of underground utilities database by manual method is getting lowered a data quality of underground utilities database because of the data omitting, error in writing and securing of the lasted database. Therefore, in this study, Application test for field workers using a mobile tool and environment analysis of wireless communication in Korea and application test of GPS receiver for mobile tools had been processed and made a mobile working environment. The efficient management and maintenance method for underground utilities database has been developed an off- line method for modification and update of database about general work which has a high working frequency because of the limitation of wireless communication environment Also, the emergency working has been applied for on-line method.

  • PDF

3D Fish Encyclopedia System based on Mobile Augmented Reality (모바일 증강현실 기반의 3D 어류백과 시스템)

  • Oh, Yeon-Jae;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1005-1010
    • /
    • 2012
  • The Augmented Reality, as a technology caught the spotlight as a next generation's technology of inserting 3D virtual objects in the space of reality seen through the camera, can maximize the learning effects by inducing user's absorption and interest using interaction between user and objects. Recently, as the movile devices having excellent mobility and portability are generalized, the diversified augmented reality are introduced using mobile devices. In this article, a 3D fish encyclopedia system augmented from the mobile environment was designed to provide the user with learning contents focusing on the sense of absorption and an interest. This system is intened to provide helps to learn about the fishes by recognizing the pictures of fishes in the encyclopedia as marker, bringing out the 3D model stored in server and displaying in the mobile environment.

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.