• Title/Summary/Keyword: mobile communication network

Search Result 2,173, Processing Time 0.029 seconds

Priority Based Interface Selection for Overlaying Heterogeneous Networks

  • Chowdhury, Mostafa Zaman;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1009-1017
    • /
    • 2010
  • Offering of different attractive opportunities by different wireless technologies trends the convergence of heterogeneous networks for the future wireless communication system. To make a seamless handover among the heterogeneous networks, the optimization of the power consumption, and optimal selection of interface are the challenging issues. The access of multi interfaces simultaneously reduces the handover latency and data loss in heterogeneous handover. The mobile node (MN) maintains one interface connection while other interface is used for handover process. However, it causes much battery power consumption. In this paper we propose an efficient interface selection scheme including interface selection algorithms, interface selection procedures considering battery power consumption and user mobility with other existing parameters for overlaying networks. We also propose a priority based network selection scheme according to the service types. MN‘s battery power level, provision of QoS/QoE and our proposed priority parameters are considered as more important parameters for our interface selection algorithm. The performances of the proposed scheme are verified using numerical analysis.

Dynamic behavior control of a collective autonomous mobile robots using artificial immune networks (인공면역네트워크에 의한 자율이동로봇군의 동적 행동 제어)

  • 이동욱;심귀보
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.124-127
    • /
    • 1997
  • In this paper, we propose a method of cooperative control based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment. For the purpose of applying immune system to DARS, a robot is regarded as a B lymphocyte(B cell), each environmental condition as an antigen, and a behavior strategy as an antibody respectively. The executing process of proposed method is as follows. When the environmental condition changes, a robot selects an appropriate behavior strategy. And its behavior strategy is simulated and suppressed by other robot using communication. Finally much simulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and idiotopic network hypothesis. And it is used for decision making of optimal swarm strategy.

  • PDF

Re-Ordering of Users in the Group Key Generation Tree Protocol (사용자 순서 재조정을 통한 그룹 키 생성 트리 프로토콜)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.247-251
    • /
    • 2012
  • Tree-based Group Diffie-Hellman (TGDH) is one of the efficient group key agreement protocols to generate the GK. TGDH assumes all members have an equal computing power. As one of the characteristics of distributed computing is heterogeneity, the member can be at a workstation, a laptop or even a mobile computer. Therefore, the group member sequence should be reordered in terms of the member's computing power to improve performance. This research proposes a reordering of members in the group key generation tree to enhance the efficiency of the group key generation.

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

Design of a Dielectric Resonator Filter with Improved Flatness Passband for WiBro band (통과대역 내 평탄도를 개선한 휴대인터넷 대역 유전체 공진기 여파기 설계)

  • Lee, Song-Yi;Yun, Sang-Won
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2005.11a
    • /
    • pp.13-16
    • /
    • 2005
  • Many mobile communication systems require bandpass filter with sharp skirt characteristics and consequently a filter was formed by more order. It needs to improve flatness in passband. In this paper, amplitude equalizer was used to improve the flatness of passband. We modified Chebyshev prototype filter by use of network synthesis and computed the prototype elements for Shaping filter. We designed and realized a 13-order combline bandpass filter and 4-order amplitude equalizer with coaxial dielectric resonators at WiBro band. The measured results show $\pm$0.82 dB amplitude difference in passband, 6 dB improved flatness.

  • PDF

Comparative Performance Evaluation of Location Registration Schemes in Mobile Communication Network (이동통신망에서 위치등록 방법의 성능 비교)

  • Luo, Yong;Baek, Woon-Young
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.47-54
    • /
    • 2007
  • In this study, we consider the movement-based registration (MBR), location-based registration (LBR) and distance-based registration (DBR) schemes. Analytical models based on a 2-dimensional random walk in a hexagonal cell configuration are considered to analyze and compare the performances of these three schemes. We focus on the derivation of the registration costs of LBR and DBR using an analytical method and then show that DBR always outperforms both MBR and LBR. Numerical results are provided to demonstrate the validity of our models under various circumstances.

  • PDF

New Scheme Protecting Location Information of User in Mobile Communication Environments (이동통신 환경에서 사용자의 위치정보를 보호하는 새로운 방법)

  • 박창설;김순석;김성훈;박창윤;김성권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.901-903
    • /
    • 2002
  • 기존의 이동통신은 과거 몇 년간 이동성, 신속성, 광역성, 편리성 등으로 인하여 이용도가 크게 늘어났다 제1세대 이동통신인 아날로그 이동전화 서비스가 시작된 이후 2세대 디지털 이동통신 기술인 CDMA 및 GSM을 거쳐 최근에 대두되고 있는 차세대 멀티미디어 이동통신인 IMT-2000 시대를 개막함으로써 이동통신에 대한 관심은 한층 증대되었으며, 또한 사용량 증가에 따라 보안문제에도 최근 많은 관심을 보이고 있다. 본 논문에서는 차세대 이동통신 환경에서 네트워크 제공자(Network Provider, 이하 줄여서 NP라 부른다)로부터 모바일 사용자의 프라이버시라 할 수 있는 위치정보를 보호하기 위한 새로운 시스템을 제안하고자 한다.

  • PDF

A Telecommunication Technologies Changing to Multi-media from old-media and New-media (올드미디어(Old media), 뉴미디어(New media)로부터 멀티미디어(Multi-media)로 변천하는 전기통신기술)

  • 조규심
    • Journal of the Korean Professional Engineers Association
    • /
    • v.30 no.4
    • /
    • pp.18-29
    • /
    • 1997
  • The telecommunications industry pro-grossed as old media, but new media is going into a new era of multi-media in the 21st century. In the latter half of 1970s we saw a boom of new media as a post-telephone era began. As the machines grew to the world level(standard), facsimiles, minitels of France and word processors of Japan were developed. Today some 15 years since the advent of new media era, the progress of technology is astonishing. Advancement of technology is seen in V and U letters attached to semiconductor chips, astonishing capability advancement of light emitting lasers and photo-diodes, etc and additionally technology advancement in large capacitized light disks. Thus these technologies have made possible transmitting a broad band network and a mobile communication and digitalized broadcasting. Increased capacity of every terminal, e.g, "letters $.$ voice $.$ still and mov-ing pictures" are essential for new media simultaneous and two -way transmission.

  • PDF

Implementation of CoAP-Lite Protocol over USN

  • Jeong, Sun-Chul;Yu, So-Ra;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.602-606
    • /
    • 2011
  • It is necessary for developing specific application protocol for mobile sensor end nodes and data collection devices that have constrained resources and computing powers. Because of these needs, IETF WG developed CoAP protocol and Internet draft was released, and processing to international standardization of this protocol. Because sensor nodes and information collection devices have restricted resources and computing powers, there are some limitations for applying to this proposed protocol directly. Thus in this paper we shows the implementation of full CoAP protocol for server, works on Linux and CoAP-Lite over telos which works on TinyOS for information collection devices. In this implementation we verified the main activities of CoAP protocol over USN by modifying some hardware with dependent algorithm.

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.