• 제목/요약/키워드: mobile communication network

검색결과 2,174건 처리시간 0.049초

IDENTITY-BASED AAA AUTHENTICATION PROTOCOL

  • Kim Dong-myung;Cho Young-bok;Lee Dong-heui;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.678-682
    • /
    • 2005
  • IETF suggested AAA for safe and reliable user authentication on various network and protocol caused by development in internet and increase in users. Diameter standard authentication system does not provide mutual authentication and non-repudiation. AAA authentication system using public key was suggested to supplement such Diameter authentication but application in mobile service control nodes is difficult due to overhead of communication and arithmetic. ID based AAA authentication system was suggested to overcome such weak point but it still has the weak point against collusion attack or forgery attack. In this thesis, new ID based AAA authentication system is suggested which is safe against collusion attack and forgery attack and reduces arithmetic quantity of mobile nodes with insufficient arithmetic and power performance. In this thesis, cryptological safety and arithmetical efficiency is tested to test the suggested system through comparison and assessment of current systems. Suggested system uses two random numbers to provide stability at authentication of mobile nodes. Also, in terms of power, it provides the advantage of seamless service by reducing authentication executing time by the performance of server through improving efficiency with reduced arithmetic at nodes.

  • PDF

Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks

  • Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.610-614
    • /
    • 2011
  • Nowadays Mobile Ad Hoc Networks (MANETs) are a very popular and emerging technology in the world. MANETs helps mobile nodes to communicate with each other anywhere without using infrastructure. For this purpose we need good routing protocols to establish the network between nodes because mobile nodes can change their topology very fast. Mobile node movements are very important features of the routing protocol. They can have a direct effect on the network performance. In this paper, we are going to discuss random walk and random waypoint mobility models and their effects on routing parameters. Previously, mobility models were used to evaluate network performance under the different routing protocols. Therefore, the network performance will be strongly modeled by the nature of the mobility pattern. The routing protocols must rearrange the changes of accurate routes within the order. Thus, the overheads of traffic routing updates are significantly high. For specific network protocols or applications, these mobility patterns have different impacts.

객체지향적 시뮬레이션플랫폼을 이용한 이동통신 시뮬레이션 구현 (An Implementation of the Mobile Communication Simulator using a Object-Oriented Simulation Platform)

  • 윤영현;김상복;이정배
    • 정보처리학회논문지C
    • /
    • 제11C권5호
    • /
    • pp.613-620
    • /
    • 2004
  • 오래 전부터 이동통신 서비스를 위한 통신 프로토콜이나 기능 요소의 성능을 평가하고 시험하기 위하여 시뮬레이션을 통한 평가 방법이 사용되었다. 본 논문에서는 객체지향적 시뮬레이션 플랫폼을 이용하여 이동통신 서비스의 성능을 예측할 수 있는 이동통신 시뮬레이터인 PCSsim (Personal Communication System Simulator)를 구현하였다. PCSsim은 사용자 이동성, 호 발생 주기 및 호 지속 시간을 고려하여 기지국과 이동호스트를 시뮬레이션 할 수 있다. 이를 이용해 본 논문에서는 주거 및 상업지역에서의 통화 발생률, 사용자 이동 속도와 통화 시간에 따른 핸드오프 발생율을 시뮬레이션 결과로 제시하였으며, 시뮬레이션 결과로 발생된 핸드오프율과 실제 서비스 환경에서의 핸드오프율이 거의 유사한 특성을 나타내는 것을 확인할 수 있었다. PCSsim은 설계 과정에서 동적 핸드오프 버퍼링이나 사용자 통화 특성에 따른 기지국 특성을 조정하는데 사용될 수 있으며, 기지국 지역 특성과 사용자 이동성을 반영하여 새로운 이동통신 네트워크를 구축하는데 사용할 수 있다.

생물지리학적 최적화를 적용한 이동체 리포팅 셀 시스템 설계 (Biogeography Based Optimization for Mobile Station Reporting Cell System Design)

  • 김성수
    • 산업경영시스템학회지
    • /
    • 제43권1호
    • /
    • pp.1-6
    • /
    • 2020
  • Fast service access involves keeping track of the location of mobile users, while they are moving around the mobile network for a satisfactory level of QoS (Quality of Service) in a cost-effective manner. The location databases are used to keep track of Mobile Terminals (MT) so that incoming calls can be directed to requested mobile terminals at all times. MT reporting cell system used in location management is to designate each cell in the network as a reporting cell or a non-reporting cell. Determination of an optimal number of reporting cells (or reporting cell configuration) for a given network is reporting cell planning (RCP) problem. This is a difficult combinatorial optimization problem which has an exponential complexity. We can see that a cell in a network is either a reporting cell or a non-reporting cell. Hence, for a given network with N cells, the number of possible solutions is 2N. We propose a biogeography based optimization (BBO) for design of mobile station location management system in wireless communication network. The number and locations of reporting cells should be determined to balance the registration for location update and paging operations for search the mobile stations to minimize the cost of system. Experimental results show that our proposed BBO is a fairly effective and competitive approach with respect to solution quality for optimally designing location management system because BBO is suitable for combinatorial optimization and multi-functional problems.

무선 네트웍에서의 효율적인 QoS제공을 위한 모델링 (Modeling for Efficient QoS support in wireless Networks)

  • 이성협;염익준
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(1)
    • /
    • pp.249-252
    • /
    • 2001
  • This paper focuses on the consideration of not only QoS parameters in wired network, but also QoS parameters in wireless network that supported for the Efficient QoS in the Al1 Service Levels. So, We supposed the "Efficient QoS Model" that guaranteed the QoS parameters "Loss Profile" , "Service Degradation" , "Latency and Jittering" , "Mobility of Mobile User" , "Probability of seamless communication" in wired-wireless networks. And the Method of Efficient QoS support that we supposed consists of "Multicast Routing-RSVP Protocol architecture based on Mobile IP" and "Protocols internetworking model ".

  • PDF

Reliable Distributed Lookup Service Scheme for Mobile Ad-hoc Networks

  • Malik Muhammad Ali;Kim Jai-Hoon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2006년도 한국컴퓨터종합학술대회 논문집 Vol.33 No.1 (D)
    • /
    • pp.124-126
    • /
    • 2006
  • Mobile Ad hoc networking is an emerging technology and in these days many applications are being developed to run on these networks. In these networks lookup services are very important because all nodes do not have same resources in term of memory and computing power. Nodes need to use different services offered by different servers. Reliable and efficient scheme should be available for lookup services due to limited bandwidth and low computing power of devices in mobile ad hoc networks. Due to mobility and rapid change in network topology, lookup mechanism used in wired network is not appropriate. Service discovery mechanism can be divided into two main categories Centralized and Distributed. Centralized mechanism is not reliable as there is no central node in these networks. Secondly centralized mechanism leads toward single point failure. We can handle the service discovery mechanism by distributing server's information to each node. But this approach is also not appropriate due to limited bandwidth and rapid change in network. In this paper, we present reliable lookup service scheme which is based on distributed mechanism. We are not using replication approach as well due to low bandwidth of wireless networks. In this scheme service discovery mechanism will be handled through different lookup servers. Reliability is the key feature of our proposed scheme.

  • PDF

An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • Journal of Information Processing Systems
    • /
    • 제11권1호
    • /
    • pp.148-164
    • /
    • 2015
  • The use of mobile agents for collaborative processing in wireless sensor network has gained considerable attention. This is when mobile agents are used for data aggregation to exploit redundant and correlated data. The efficiency of agent-based data aggregation depends on the agent migration scheme. However, in general, most of the proposed schemes are centralized approach-based schemes where the sink node determines the migration paths for the agents before dispatching them in the sensor network. The main limitations with such schemes are that they need global network topology information for deriving the migration paths of the agents, which incurs additional communication overhead, since each node has a very limited communication range. In addition, a centralized approach does not provide fault tolerant and adaptive migration paths. In order to solve such problems, we have proposed a distributed approach-based scheme for determining the migration path of the agents where at each hop, the local information is used to decide the migration of the agents. In addition, we also propose a local repair mechanism for dealing with the faulty nodes. The simulation results show that the proposed scheme performs better than existing schemes in the presence of faulty nodes within the networks, and manages to report the aggregated data to the sink faster.

Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network

  • Han, Longzhe;Maksymyuk, Taras;Bao, Xuecai;Zhao, Jia;Liu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4572-4586
    • /
    • 2019
  • Mobile Edge Computing (MEC) and Information-Centric Networking (ICN) are essential network architectures for the future Internet. The advantages of MEC and ICN such as computation and storage capabilities at the edge of the network, in-network caching and named-data communication paradigm can greatly improve the quality of video streaming applications. However, the packet loss in wireless network environments still affects the video streaming performance and the existing loss recovery approaches in ICN does not exploit the capabilities of MEC. This paper proposes a Deep Learning based Loss Recovery Mechanism (DL-LRM) for video streaming over MEC based ICN. Different with existing approaches, the Forward Error Correction (FEC) packets are generated at the edge of the network, which dramatically reduces the workload of core network and backhaul. By monitoring network states, our proposed DL-LRM controls the FEC request rate by deep reinforcement learning algorithm. Considering the characteristics of video streaming and MEC, in this paper we develop content caching detection and fast retransmission algorithm to effectively utilize resources of MEC. Experimental results demonstrate that the DL-LRM is able to adaptively adjust and control the FEC request rate and achieve better video quality than the existing approaches.

An Efficient Network Slice Configuration Method in 5G Mobile Networks

  • Kim, Jae-Hyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제27권9호
    • /
    • pp.101-112
    • /
    • 2022
  • 본 논문에서는 5G 네트워크 슬라이싱에 대해서 분석하고 5G 이동 통신망에서의 효율적인 네트워크 슬라이스 설정 방안을 제안한다. 5G 이동 통신망에서 네트워크 슬라이싱은 네트워크 슬라이스 인스턴스 정보에 기반하여 구분되고 수행된다. 단말과 네트워크 간의 네트워크 슬라이스 인스턴스 정보가 상호 일치하지 않는 경우, 단말의 PDU 세션 연결 요청 실패에 따른 불필요한 시그널링 오버헤드가 발생한다. 본 논문은 이러한 문제를 해결하기 위해서, 두 가지 효율적인 네트워크 슬라이스 설정 기법, 단말 기반 ENSC(Efficient Network Slice Configuration) 기법과 네트워크 기반 ENSC 기법을 제안한다. 제안하는 두 가지 기법들은 신속한 단말과 네트워크 간의 최신 변경 업데이트된 네트워크 슬라이스 정보를 제공 설정 수행하게 되어, 기존 방안과 비교하여 배터리 리소스 효율성을 향상시키고 불필요한 시그널링 오버헤드를 최소화할 수 있다.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.