• Title/Summary/Keyword: mobile communication network

Search Result 2,173, Processing Time 0.031 seconds

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

Lossless Data Hiding Using Modification of Histogram in Wavelet Domain (웨이블릿 영역에서 히스토그램 수정을 이용한 무손실 정보은닉)

  • Jeong Cheol-Ho;Eom Il-Kyu;Kim Yoo-Shin
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.27-36
    • /
    • 2006
  • Lossless data embedding is a method to insert information into a host image that guarantees complete restoration when the extraction has been done. In this paper, we propose a noble reversible data embedding algorithm for images in wavelet domain. The proposed embedding technique, which modifies histogram of wavelet coefficient, is composed of two inserting steps. Data is embedded to wavelet coefficient using modification of histogram in first embedding process. Second embedding step compensates the distortion caused by the first embedding process as well as hides more information. Hence we achieve higher inserting capacity. In view of the relationship between the embedding capacity and the PSNR value, our proposed method shows considerably higher performance than the current reversible data embedding methods.

3GPP LTE-Assisted Wi-Fi-Direct: Trial Implementation of Live D2D Technology

  • Pyattaev, Alexander;Hosek, Jiri;Johnsson, Kerstin;Krkos, Radko;Gerasimenko, Mikhail;Masek, Pavel;Ometov, Aleksandr;Andreev, Sergey;Sedy, Jakub;Novotny, Vit;Koucheryavy, Yevgeni
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.877-887
    • /
    • 2015
  • This paper is a first-hand summary on our comprehensive live trial of cellular-assisted device-to-device (D2D) communications currently being ratified by the standards community for next-generation mobile broadband networks. In our test implementation, we employ a full-featured 3GPP LTE network deployment and augment it with all necessary support to provide realtime D2D connectivity over emerging Wi-Fi-Direct (WFD) technology. As a result, our LTE-assisted WFD D2D system enjoys the required flexibility while meeting the existing standards in every feasible detail. Further, this paper provides an account on the extensive measurement campaign conducted with our implementation. The resulting real-world measurements from this campaign quantify the numerical effects of D2D functionality on the resultant system performance. Consequently, they shed light on the general applicability of LTE-assisted WFD solutions and associated operational ranges.

A Study on Error Reduction of Indoor Location Determination using triangulation Method and Least Square Method (삼각측량법과 최소자승법을 활용한 실내 위치 결정의 산포 감소 방안에 관한 연구)

  • Jang, Jung-Hwan;Lee, Doo-Yong;Zhang, Jing-Lun;Jho, Yong-Chul;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.1
    • /
    • pp.217-224
    • /
    • 2012
  • Location-Based Services(LBS) is a service that provide location information by using communication network or satellite signal. In order to provide LBS precisely and efficiently, we studied how we can reduce the error on location determination of objects such people and things. We focus on using the least square method and triangulation positioning method to improves the accuracy of the existing location determination method. Above two methods is useful if the distance between the AP and the tags can be find. Though there are a variety of ways to find the distance between the AP and tags, least squares and triangulation positioning method are wildely used. In this thesis, positioning method is composed of preprocessing and calculation of location coordinate and detail of methodology in each stage is explained. The distance between tag and AP is adjusted in the preprocessing stage then we utilize least square method and triangulation positioning method to calculate tag coordinate. In order to confirm the performance of suggested method, we developed the test program for location determination with Labview2010. According to test result, triangulation positioning method showed up loss error than least square method by 38% and also error reduction was obtained through adjustment process and filtering process. It is necessary to study how to reduce error by using additional filtering method and sensor addition in the future and also how to improve the accuracy of location determination at the boundary location between indoor and outdoor and mobile tag.

A Study on VoIP Security Risk Analysis and Countermeasure (VoIP 보안 위협 분석 및 대책 연구)

  • Kim, Hyun-Chul;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.277-280
    • /
    • 2011
  • VoIP is a technology of voice communication, using the existing internet network which sends and receives voice packets. VoIP has an advantage that VoIP is cheaper than an existing telephony, and the tech is vitalized lately. But recently you can download Volp Application in the Market that have a vulnerability(Anyone Can Upload). This weakness is wrongfully used that People are downloaded by encouraging about malignant code is planted. Signal intercepts indicates from this case. and paralysis by DDoS Attack, bypass are charged for hacking. Judging from, security threat of VolP analysis and take countermeasures. In the thesis we analyze the VoIP security caused on 'Soft Phone' and 'Smart Phone', and figure out security policies and delineate those policies on the paper.

  • PDF

Design and Evaluation of Fast-Handover Mechanism Between Hetrogeneous Networks Considering the Location Management in PMIPv6 (PMIPv6에서의 위치관리기법을 고려한 이 기종 망간의 Fast Handover 기법 설계 및 평가)

  • Shim, JaeSung;Park, SeokCheon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.219-228
    • /
    • 2012
  • As the wireless Internet become more widely accessible, variety of Internet services can be used without limitation of location. However, existing mobility management methods such as MIP and PMIP of IETF requires the load of heavy protocol stack on the mobile nodes or the addition of components such as LMA and MAG. In this paper, we proposed the location management technique in the PMIPv6 and Fast Handover technique. according to the moving pattern of the node, the location management technique proposed in order to adjust the paging area dynamically. The Fast Handover technique applied MIH technology and it reduced the handover signal processing time between heterogeneous network. The location management cost in the environment which the node moves in order to evaluate this and handover delay time was calculate. The proposal technique was efficiently more evaluated than PMIPv6 with the smallest 29% and maximum 83%.

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

The Method of Real-Time Location Information Service by using GPS and OpenAPI for Cost-cutting (비용 절감을 위한 GPS와 OpenAPI을 이용한 실시간 위치정보 서비스 방안)

  • Youn, Jae-Hong;Kim, Eun-Seok;Hur, Gi-Taek
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.902-905
    • /
    • 2008
  • With development of internet, location-based service (LBS) is getting more interest in wire and wireless network, and many studies are in progress to provide various services such as GIS and GPS technique related to this. Today positioning and information providing service is accomplished by mobile communication companies' chasing the cell or building unique GIS system, but there is a lot of building-cost that must be endured to define boundary of collecting precise location information from chasing Cell and provide unique location information service. In this paper, it desires to make the database of location information with using GPS, relatively precise satellite positioning system, to cut the cost of building location information service, and to present service models such as children's positioning service that is to reduce the cost of building GIS by using Web Open API and provide location information of discrete object in real-time.

  • PDF

Performance analysis of BTB-TDMA considering asymmetry of propagation delays in UANets (수중 네트워크의 전파 비대칭성을 고려한 BTB-TDMA 성능 분석)

  • Cho, A-Ra;Yun, Changho;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.50-60
    • /
    • 2015
  • A Block-Time-Bounded Time Division Multiple Access (BTB-TDMA) medium access control protocol, which estimates the propagation delay of nodes according to their location and moving velocity information, has been proposed for underwater acoustic networks. BTB-TDMA provides nodes with their transmission schedules by a time block that is a time unit, newly designed for BTB-TDMA. In this paper, we investigate how the receiver collision, that is induced by the asymmetry between node's uplink and downlink propagation delay due to its mobility, affects the performance of BTB-TDMA. To do this, we analytically obtain the collision rate, the channel access delay, and the channel utilization by considering the asymmetry of propagation delay. Then, simulations are extensively performed with respect to the length of a time block by varying the number of nodes, the network range, and the node's velocity. Thus, the simulation results can suggest performance criteria to determine the optimal length of a time block which minimizes the collision rate and concurrently maximizes the channel access delay and the channel utilization.