• Title/Summary/Keyword: telecommunications network

Search Result 1,838, Processing Time 0.024 seconds

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Energy-Efficient Routing Protocol for Wireless Sensor Networks Based on Improved Grey Wolf Optimizer

  • Zhao, Xiaoqiang;Zhu, Hui;Aleksic, Slavisa;Gao, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2644-2657
    • /
    • 2018
  • To utilize the energy of sensor nodes efficiently and extend the network lifetime maximally is one of the primary goals in wireless sensor networks (WSNs). Thus, designing an energy-efficient protocol to optimize the determination of cluster heads (CHs) in WSNs has become increasingly important. In this paper, we propose a novel energy-efficient protocol based on an improved Grey Wolf Optimizer (GWO), which we refer to as Fitness value based Improved GWO (FIGWO). It considers a fitness value to improve the finding of the optimal solution in GWO, which ensures a better distribution of CHs and a more balanced cluster structure. According to the distance to the CHs and the BS, sensor nodes' transmission distance are recalculated to reduce the energy consumption. Simulation results demonstrate that the proposed approach can prolong the stability period of the network in comparison to other algorithms, namely by 31.5% in comparison to SEP, and even by 57.8% when compared with LEACH protocol. The results also show that the proposed protocol performs well over the above comparative protocols in terms of energy consumption and network throughput.

Optimization of Energy Consumption in the Mobile Cloud Systems

  • Su, Pan;Shengping, Wang;Weiwei, Zhou;Shengmei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4044-4062
    • /
    • 2016
  • We investigate the optimization of energy consumption in Mobile Cloud environment in this paper. In order to optimize the energy consumed by the CPUs in mobile devices, we put forward using the asymptotic time complexity (ATC) method to distinguish the computational complexities of the applications when they are executed in mobile devices. We propose a multi-scale scheme to quantize the channel gain and provide an improved dynamic transmission scheduling algorithm when offloading the applications to the cloud center, which has been proved to be helpful for reducing the mobile devices energy consumption. We give the energy estimation methods in both mobile execution model and cloud execution model. The numerical results suggest that energy consumed by the mobile devices can be remarkably saved with our proposed multi-scale scheme. Moreover, the results can be used as a guideline for the mobile devices to choose whether executing the application locally or offloading it to the cloud center.

A 4S DESIGN ON MOBILE AD HOC NETWORKS

  • Lee, Eun-Kyu;Kim, Mi-Jeong;Oh, Byoung-Woo;Kim, Min-Soo
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.844-849
    • /
    • 2002
  • A provision of spatial information is expected to make a market explosion in various fields. A distribution of spatial data on wireless mobile environments indicates a huge expansion of mobile technology as well as a spread of geospatial applications. For high quality spatial information, 4S technology project integrating 4 kinds of spatial systems is currently being executed with the goal of nationwide integration of spatial data and spatial information systems. In terms of network environments, a mobile ad hoc network where mobile terminals communicate with each other without any infrastructures has been standardized for the next generation mobile wireless network. With respect to the future technologies for spatial information, it is necessary to design 4S applications on mobile ad hoc networks. This paper addresses the issue, which is proposing design points for distributing 4S spatial data on mobile ad hoc networks and ad hoc styled 4S applications.

  • PDF

High-speed Satellite ATM Experimentations and Demonstrations using Ka-band Koreasat-3

  • Kim, Nae-soo;Park, Dong-Joon;Park, Seoung-Nam;Oh, Deock-Gil
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.896-899
    • /
    • 2002
  • In this paper, we present the experimentation and demonstration results of Korea-Japan high-speed satellite ATM network using Ka-band Koreasat-3. This experimentation consists of two items - TCP/IP and MPEG-2 video/audio transmission over 155Mbps ATM based satellite network. The goals of this experimentation are to measure TCP performance when the only standard mechanisms approved by IETF in order to improve TCP performance in LFN(long fat network) are used and to derive the effects of quality for the high definition video stream when MPEG-2 TS is transmitted through 155Mbps satellite ATM link. With on the results of the experiments, we demonstrated the applications suitable to the high-speed satellite ATM network. The first TCP/IP and MPEG-2 transmission experiments were done at the rate of 155Mbps using Ka-band KOREASAT-3 between Korea and Japan, and its results will be demonstrated with the ATM-based 3D-HDV(3 dimensional High definition video) and HDTV during 2002 Korea-Japan World Cup Soccer Game.

  • PDF

Implementation of Bluetooth Video Distribution Profile Tester based on TTCN

  • Kim, Jae-Youn;Lee, Kang-Hae;Park, Yong-Bum;Lee, Keun-Ku
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.404-407
    • /
    • 2009
  • Bluetooth Video Distribution Profile (VDP) defines the protocol and procedures that realize the distribution of video content compressed in a specific format for the efficient use of the limited bandwidth. In this paper, we describe the design of VDP tester based on TTCN-2 (Tree and Tabular Combined Notation), a language standardized by ISO for the specification of tests for real-time and communicating systems. Our work was carried out as a part of supporting a new profile testing module for VDP in PTS (Profile Tuning Suite), a reference test system for Bluetooth interoperability testing. Test demonstration for the interoperability with various VDP solutions at the PTS session in UPF30 (Unplug Fest) showed the validity of the developed tester. Eventually, we introduce the PTS architecture, and show the design and implementation of VDP tester included in the released PTS 3.0 in this paper.

  • PDF

Optimal Energy-Efficient Power Allocation and Outage Performance Analysis for Cognitive Multi-Antenna Relay Network Using Physical-Layer Network Coding

  • Liu, Jia;Zhu, Ying;Kang, GuiXia;Zhang, YiFan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3018-3036
    • /
    • 2013
  • In this paper, we investigate power allocation scheme and outage performance for a physical-layer network coding (PNC) relay based secondary user (SU) communication in cognitive multi-antenna relay networks (CMRNs), in which two secondary transceivers exchange their information via a multi-antenna relay using PNC protocol. We propose an optimal energy-efficient power allocation (OE-PA) scheme to minimize total energy consumption per bit under the sum rate constraint and interference power threshold (IPT) constraints. A closed-form solution for optimal allocation of transmit power among the SU nodes, as well as the outage probability of the cognitive relay system, are then derived analytically and confirmed by numerical results. Numerical simulations demonstrate the PNC protocol has superiority in energy efficiency performance over conventional direct transmission protocol and Four-Time-Slot (4TS) Decode-and-Forward (DF) relay protocol, and the proposed system has the optimal outage performance when the relay is located at the center of two secondary transceivers.

A Relay Selection and Power Allocation Scheme for Cooperative Wireless Sensor Networks

  • Qian, Mujun;Liu, Chen;Fu, Youhua;Zhu, Weiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1390-1405
    • /
    • 2014
  • This paper investigates optimal relay selection and power allocation under an aggregate power constraint for cooperative wireless sensor networks assisted by amplify-and-forward relay nodes. By considering both transmission power and circuit power consumptions, the received signal-to-noise ratio (SNR) at the destination node is calculated, based on which, a relay selection and power allocation scheme is developed. The core idea is to adaptively adjust the selected relays and their transmission power to maximize the received SNR according to the channel state information. The proposed scheme is derived by recasting the optimization problem into a three-layered problem-determining the number of relays to be activated, selecting the active relays, and performing power allocation among the selected relays. Monte Carlo simulation results demonstrate that the proposed scheme provides a higher received SNR and a lower bit error rate as compared to the average power allocation scheme.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

User Authentication Mechanism Using Authentication Server in Home Network (홈네트워크에서 인증서버를 이용한 사용자 인증 메커니즘)

  • Lee, Yun-Kyung;Ju, Hong-Il;Park, Jee-Hye;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.787-790
    • /
    • 2005
  • User authentication is an essential component for secure home network service. It enables authorized persons to use the home network. Using of various authentication methods provides user convenience. To add to this, using of home gateway included of authentication server function enables that once users are authenticated in the home gateway, the users user all authorized home network service. It is possible by authentication agent of home gateway. This paper describes user authentication mechanism using authentication server.

  • PDF