• Title/Summary/Keyword: mobile communication network

Search Result 2,173, Processing Time 0.028 seconds

Study on key standardization Work Item derivation and strategies for IoT services (사물인터넷 서비스의 중점 표준화 항목 도출 및 전략에 관한 연구)

  • Kim, Jungsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.13-26
    • /
    • 2016
  • Service and technology for the future hyper-connected society, which is every information receive through the mobile internet, will be an Internet of Things. Thus, it is mandatory to derive key standardization work item and establish strategy for the global business with the standardization of device and service platform by the application service. In this study, by analyzing the domestic and international market trends, state of technical development, and standardization of technology, we identified the open platform is the stepping stone for achieving the goal which is establishing the virtuous circulation of IoT ecosystem. Also, we defined emphasized key standardization work item for achieving the open platform are network, server, access authentication, billing system, and software platform. After that, we proposed future strategy direction of standardization. This research could be contribute to the IoT service diffusion by realizing IP communication among low power wireless terminals and implementing light-weight standard internet protocol.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Performancs Analysis of Packet Padio Network in Multi-Carrier DS/FH Mobile Communication System (다중반송파 DS/FH 이동통신시스템에서 패킷무선망의 성능분석)

  • 신동재;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.11A
    • /
    • pp.1620-1629
    • /
    • 2000
  • 본 논문에서는 켑춰를 갖는 슬랏 ALOHA 방식을 이용한 패킷 무선망의 성능을 분석하였다. 접속을 획득하기 위해서 켑춰효과를 이용하고 트래픽은 포아슨 랜덤프로세서로 가정하였을며 공간트래픽밀도는 실제적인 이동통신환경을 나타내는 puncturing 종형분포로 가정하였다. 패킷은 접속을 획득하는 헤더부분과 데이터 정보가 들어있는 데이터 부분으로 나눈다헤더부분은 공통확산부호를 갖는 DS에 의해 확산되고 데이터부분은 간섭전력과재밍에 강하고 고속의 데이터 전송시 성능향상을 기대할 수 있는 MC DS/FH에 의해 확산된다. 이동통신채널은 도심 전파의 다중경로 채널에 대한 다양한 헤이딩 환경을 제공해 주는 나카가미 페이딩 채널을 가정하였다. 동일한 지연시간에 반송주파수수를 증가시킴에 따라 높은 co널 처리 용량을 얻었으며 FH를 MC/DS/CDMA에 사용함으로서 간섭전력의 변화가 심한 환경에서 시스템의 성능을 일정하게 유지시켰다. 또한 Hard-limiting 상관수신기를 사용함으로써 페이딩이 심한 환경에서 패킷 무선망의 성능을 개선시켰다.

  • PDF

A novel routing protocol for cognitive radio networks with cooperation process

  • Kim, Sunwoo;Pyeon, Dohoo;Jang, Ingook;Yoon, Hyunsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3860-3875
    • /
    • 2014
  • Cognitive radio networks (CRNs) are composed of mobile users who can use multiple spectrum bands for communication. CRNs allow unlicensed users (called cognitive users) to efficiently utilize unused licensed spectrums without interfering with communications of licensed users (called primary users). The main goals of CRNs are to mitigate spectrum saturation and to improve spectrum utilization. This paper introduces state-of-the-art routing protocols for CRNs and addresses some limitations of these protocols. To resolve the limitations, we suggest a new research direction for routing protocols in CRNs. We implement our protocol to compare with the existing routing protocols for multi-hop CRNs. Our protocol shows good performance compared to the existing routing protocols in terms of network performance and PU protection.

A Tightly-coupled Integration between Portable Internet and cdma2000 Mobile Communication Network (휴대 인터넷과 cdma2000 이동통신망의 밀결합 연동 방안)

  • 이건백;조진성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.583-585
    • /
    • 2004
  • 현재 cdma2000 1$\times$ 및 1$\times$EV-DO 이동통신망을 통해 패킷 데이터 서비스가 이뤄지고 있으며, 보다 높은 대역폭의 서비스를 위하여 휴대 인터넷 서비스 표준화가 추진되고 있다. 고속 데이터 서비스가 가능하나 서비스 커버리지가 작은 휴대 인터넷 서비스를 cdma2000 이동통신망과 효율적으로 연동하여 사용한다면 많은 성과를 얻을 수 있다. 이에 본 논문은 기존 cdma2000 이동통신망과 휴대 인터넷의 효율적인 연동망 구조와 그 세부적인 연동방안을 제시한다. 본 논문에서 제안된 밀결합 연동 구조는 기존 cdma2000 이동통신망의 수정 및 추가 구현 없이 통합된 사용자 인증 및 과금을 수행하기 용이하며 연속적인 서비스를 제공할 수 있으며, cdma2000 로 휴대 인터넷 서비스를 동시에 제공하는 이중 모드 단말의 구현 시에도 복잡도가 최소화된다.

  • PDF

An Immune System Modeling for Realization of Cooperative Strategies and Group Behavior in Collective Autonomous Mobile Robots (자율이동로봇군의 협조전략과 군행동의 실현을 위한 면역시스템의 모델링)

  • 이동욱;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.03a
    • /
    • pp.127-130
    • /
    • 1998
  • In this paper, we propose a method of cooperative control(T-cell modeling) and selection of group behavior strategy(B-cell modeling) based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment. For the purpose of applying immune system to DARS, a robot is regarded as a B cell, each environmental condition as an antigen, a behavior strategy as an antibody and control parameter as a T-call respectively. The executing process of proposed method is as follows. When the environmental condition changes, a robot selects an appropriate behavior strategy. And its behavior strategy is stimulated and suppressed by other robot using communication. Finally much stimulated strategy is adopted as a swarm behavior strategy. This control scheme is based of clonal selection and idiotopic network hypothesis. And it is used for decision making of optimal swarm strategy. By T-cell modeling, adaptation ability of robot is enhanced in dynamic environments.

  • PDF

A Comparative Study on Image Enhancement Methods for Low Contrast Images (저대비 영상을 위한 영상향상 기법들의 비교연구)

  • Kim Yong-Soo;Kim Nam-Jin;Lee Se-Yul
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.04a
    • /
    • pp.269-272
    • /
    • 2005
  • The principal objective of enhancement methods is to process an image so that the result is more suitable than the original image for a specific application. Images taken in the night can be low-contrast images because of poor environments. In this paper, we compare the structure of ICECA(Image Contrast Enhancement technique using Clustering Algorithm) with the structures of HE(Histogram Equalization), BBHE(Brightness preserving Bi-Histogram Equalization), and Multi -Scale Retinex(MSR). We compared performances of image enhancement methods by applying these methods to a set of diverse images.

  • PDF

Remote Controlled Robot System using Real-Time Operating System (실시간 운영체제를 탑재한 원격 제어 로봇 시스템)

  • Lee, Tae-Hee;Cho, Sang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.689-695
    • /
    • 2004
  • This paper presents a robot system that combines computer network and an autonomous mobile robot where RTOS is installed. We propose a wireless communication protocol, and also implement it on the RTOS of the robot system. Main controller of the robot processes the control program as a task type in the real-time operating system. Peripheral devices are driven by the device driver functions with the dependency of the hardware. Because the client and server program was implemented to support the multi-platforms by Java SDK and Java JMF, it is easy to analyze programs, maintain system, and correct the errors in the system. End-user can control a robot with a vision showing remote sight over the Internet in real time, and the robot is moved keeping away from the obstacles by itself and command of the server received from end-user at the local client.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF