• Title/Summary/Keyword: wireless application

Search Result 1,722, Processing Time 0.041 seconds

Wireless Technologies for Ultra Low Latency Communications (초저지연 서비스를 위한 무선 접속 기술)

  • Kim, Eunkyung;Park, Hyunseo;Lee, Anseok;Lee, Heesoo;Lee, Yuro;Kim, Taejoong
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.5
    • /
    • pp.74-84
    • /
    • 2017
  • In wireless access networks, it is extremely important to provide high quality of real time and interactive services, including voice and video traffic. Furthermore, low latency communication is shifting toward new paradigm which enhances user's high quality of experience, meeting the requirements for specific applications such as tactile internet, remote-control robot and machines, and mission critical application. In this paper, we introduce the approaches to achieve the extremely low latency service. The approaches include the core requirements and the key technologies providing low latency communication maintaining high reliability in wireless access networks.

An efficient spatio-temporal index for spatio-temporal query in wireless sensor networks

  • Lee, Donhee;Yoon, Kyoungro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4908-4928
    • /
    • 2017
  • Recent research into wireless sensor network (WSN)-related technology that senses various data has recognized the need for spatio-temporal queries for searching necessary data from wireless sensor nodes. Answers to the queries are transmitted from sensor nodes, and for the efficient transmission of the sensed data to the application server, research on index processing methods that increase accuracy while reducing the energy consumption in the node and minimizing query delays has been conducted extensively. Previous research has emphasized the importance of accuracy and energy efficiency of the sensor node's routing process. In this study, we propose an itinerary-based R-tree (IR-tree) to solve the existing problems of spatial query processing methods such as efficient processing and expansion of the query to the spatio-temporal domain.

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.

Clustering Scheme for (m,k)-Firm Streams in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.2
    • /
    • pp.84-88
    • /
    • 2016
  • As good example of potential application-specific requirement, (m,k)-firm real-time streams have been recently introduced to deliver multimedia data efficiently in wireless sensor networks. In addition to stream model, communication protocols to meet specific (m,k)-firm real-time streams have been newly developed or extended from existing protocols. However, since the existing schemes for an (m,k)-firm stream have been proposed under typical flat architecture, the scalability problem remains unsolved when the number of real-time flows increases in the networks. To solve this problem, in this paper, we propose a new clustering scheme for an (m,k)-firm stream. The two different clustering algorithms are performed according to either the (m,k)-firm requirement or the deadline. Simulation results are presented to demonstrate the suitability of the proposed scheme under hierarchical architecture by showing that its performance is acceptable irrespective of the increase in the number of flows.

Dosing and Implementation of wire/wireless protocol Converting Function for WAP Gateway (WAP 게이트웨이의 유/무선 프로토콜 변환 기능에 대한 설계 및 구현)

  • Lee, Jung-Eun;Lee, Jong-Youl;Noh, Kang-Rae;Shin, Dong-Il;Shin, Dong-Kyoo
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.1549-1552
    • /
    • 2001
  • 무선통신 단말기의 발전과 함께 이를 활용할 수 있는 방법론에 대한 논의도 활발해지고 있으며, 이중 가장 주목받고 있는 것이 이동 통신 단말기를 이용한 무선인터넷 서비스이다. 이러한 서비스의 기반이 되는 것이 무선 인터넷 프로토콜인 WAP(Wireless Application Protocol)이다. 현재의 셀룰러망을 이용한 통신은 비교적 낮은 전송률을 가지고 있어, 대용량의 데이터들을 포함하는 WWW 문서 및 대량의 무선 마크업 언어(WML: Wireless Markup Language) 문서를 전송하기에는 너무 느린 단점을 가지고 있다. 이에 대한 대안으로 본 논문에서는 WAP 포럼 내에서 제정한 프로토콜에 변환기능을 추가한 Gateway를 설계 및 구현하였다.

  • PDF

Design and Implementation of WMLScript Interpreter (WAP 브라우저에서의 WMLScripts 해석기의 설계 및 구현)

  • Yoo, Seung-Bum;Kim, Min-Soo;Chang, Ji-San;Shin, Dong-Kyoo;Shin, Dong-Il
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.1553-1556
    • /
    • 2001
  • 무선 이동 통신 인구의 증가와 무선 서비스에 대한 수요는 증가하고 있으며 이에 맞추어 무선휴대 장치의 성능도 빠르게 발전을 하고 있다. WAP 포럼에서 제정한 WML(Wireless Markup Language)을 사용한 무선 컨텐츠의 제작이 활발하게 이루어지고 있는 가운데 보다 더 동적인 WML 무선 컨텐츠의 요구가 증가하고 있다. 그로 인해 개발자가 실제와 같은 상황에서 WML과 WML Script 컨텐츠를 편리하게 테스팅 할 수 있는 환경이 필요하게 되었다. 따라서 본 논문에서는 CP(Content Provider)들이 작성된 WML(Wireless Markup Language) 컨텐츠(Content)를 쉽고 편리하게 브라우징하면서 테스팅 하기 위하여 필수적으로 요청되는 WAP(Wireless Application Protocol) 에뮬레이터 및 무선컨텐츠 제작에 필수적인 WMLScripts 해석기의 설계 및 구현에 대해 기술한다.

  • PDF

The Environmental Applications of Wireless Sensor Networks

  • Ituen, Ima;Sohn, Gun-Ho
    • International Journal of Contents
    • /
    • v.3 no.4
    • /
    • pp.1-7
    • /
    • 2007
  • There has been increased interest in wireless sensors in the last few years. This paper provides insight into the properties that make these sensors so attractive, specifically considering their efficiency, data reliability, and the ability to verify the data generated. Some advantages a wireless network presents over traditional information sensing are discussed as well. The paper considers how the environmental field can benefit from using these networks. Some of the possible challenges this industry will face in adopting this new method of data sampling and collection are also considered. A project we conducted raised concern over measures needed for the integrity of the communication system to be maintained, thus ensuring the integrity of the data being collected. From results of an experimental project conducted in York University, the reliability and usefulness of a sensor network is discussed.

Multi-Homing RTP (mhRTP) for QoS-guaranteed Vertical Handover in Heterogeneous Wireless Access Networks

  • Kim, Igor;Kim, Young-Tak
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.185-194
    • /
    • 2010
  • In this paper, we propose an application layer-based vertical handover management protocol, called multihoming RTP (mhRTP), for real-time applications with seamless mobility across heterogeneous wireless access networks. The proposed multi-homing RTP provides a soft handover by utilizing multiple available wireless access network interfaces simultaneously. The newly available path is dynamically added to the ongoing session by the mhRTP session manager. Also the decision making of QoS-improving or QoS-guaranteed handover is possible based on the estimation of available bandwidth in each candidate network. The performances of the proposed mhRTP have been analyzed through a series of simulations on OPNET network simulator. From the performance analysis, we confirmed that the proposed mhRTP can provide QoS-guaranteed vertical handover with efficient session managements.

Performance Evaluation of Real-time Voice Traffic over IEEE 802.15.4 Beacon-enabled Mode (IEEE 802.15.4 비컨 가용 방식에 의한 실시간 음성 트래픽 성능 평가)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.43-52
    • /
    • 2007
  • IEEE 802.15.4 specification which defines low-rate wireless personal area network(LR-WPAN) has application to home or building automation, remote control and sensing, intelligent management, environmental monitoring, and so on. Recently, it has been considered as an alternative technology to provide multimedia services such as automation via voice recognition, wireless headset and wireless camera for surveillance. In order to evaluate capability of voice traffic on the IEEE 802.15.4 LR-WPAN, we supposed two scenarios, voice traffic only and coexistence of voice and sensing traffic. For both cases we examined delay and packet loss rate in case of with and without acknowledgement, and various beacon period varying with beacon and superframe order values. In LR-WPAN with voice devices only, total 5 voice devices could be applicable and in the other case, i.e., coexisted cases of voice and sensor devices, a voice device was able to coexist with about 60 sensor devices.

  • PDF