• Title/Summary/Keyword: 무선네트워킹

Search Result 192, Processing Time 0.026 seconds

A Reliable Cluster based Dynamic Authentication Mechanism in MANET (이동 애드혹 네트워크에서 신뢰성 있는 클러스터 기반 동적 인증 기법)

  • Hwang, Yoon-Cheol;Kim, Jin-Il
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.5
    • /
    • pp.661-672
    • /
    • 2008
  • Mobile Ad-hoc NETwork is a kind of self-controlled network composed only of mobile hosts. Since its range of use is gradually expanding into various sections applicable to practical lives, active researches are being conducted on it. However, as it depends on cooperation of nodes composing the entire network, due to weakness of wireless link and lack of its central infrastructure, so it is exposed to more serious risk than general network in security. Therefore, this paper proposes Cluster-Based Dynamic Authentication that enables only reliable nodes to participate in communication, by solving lack of centralized infrastructure, using hierarchical Mobile Ad hoc NETwork structure based on cluster, and by complementing security weakness through mutual authentication between hierarchical nodes. Simulation shows that the proposed scheme can complement security weakness of Mobile Ad hoc NETwork and that it is more adequate in reliability and expandability than the existing schemes.

  • PDF

An Efficient Scheme to Create Data Delivery Tree for Community Group Communication (커뮤니티 그룹 통신을 위한 효율적인 데이터 전달 트리 구성 방안)

  • Oh, Je-Jun;Kang, Nam-Hi;Kim, Yong-Hyuk;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.55-63
    • /
    • 2007
  • Multicast is an efficient transport mechanism for community communications and MANET is recently regarded as a promising solution for support ubiquitous computing as an underlying network technology. However, it is hard to deploy multicast mechanism into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome the limitations. Especially, overlay multicasting schemes present several advantages over network based multicasting schemes. Yet, the overlay multicasting schemes still introduce redundant data transmissions that waste network bandwidth and battery of relay nodes. As a result the performance of the network is degraded. To reduce the redundancy, we propose an efficient way to construct an overlay structure as a multicast data delivery tree that utilizes a branch node which belongs to the tree. By using network simulation, we show that the proposed scheme presents higher packet delivery ratio and lower transmission cost than previously proposed schemes.

MPTCP based Handover Scheme in PMIPv6 domain (PMIPv6 도메인에서 MPTCP 기반 Handover 기법)

  • Youn, Joo-Sang;Choi, Hun;Heo, Gyeong-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.71-80
    • /
    • 2014
  • Recently, most mobile nodes, such as smartphones, will have multiple wireless radio interfaces. This feature allows a mobile node to access a multi-network through multiple wireless radio interfaces simultaneously. Accordingly, various networking technology has been studied to use wireless multi-interface more efficiently. In this paper, MPTCP based handover scheme is proposed to reduce data loss and end-to-end latency during the handover in PMIPv6 domain. The proposed scheme performs 2-step flow mobility on the multi-path established through the multi-interface of mobile node in the handover procedure and uses MPTCP subflow function to overcome end-to-end disconnection during the handover. Therefore, the proposed scheme takes the advantage of being able to minimize data loss and a latency generated during performing the handover of mobile node.

Low Power UHF Tag Chip Design (저 전력 UHF 태그 칩 설계)

  • Kwon, Hyuk-Je;Lee, Pyeong-Han;Lee, Chul-Hee;Kim, Chong-Kyo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.12
    • /
    • pp.47-56
    • /
    • 2008
  • An RFID system comprises a reader and a tag, and this paper focuses on a tag design. A UHF tag is activated by energy supply using electromagnetic waves and energy reflection through impedance mismatching. The tag uses a $0.25{\mu}m$ CMOS process and comprises a digital part executing tag protocols, a 512-bit memory, and an analog part having a rectifier, a modulation/demodulation unit, a clock generator, etc. The total dimension of the tag, including a saw line, is $750{\mu}m*750{\mu}m$ and the power consumption of the tag consumption power is about $17.8{\mu}W$ at a supply voltage of 2V.

Design and Implementation of Mobile VNC System for GUI Control and Monitoring of Remote Computer (원격 컴퓨터의 GUI 제어와 모니터링을 위한 Mobile VNC 시스템 설계 및 구현)

  • Chon Hee-ja;Seo Jung-Hee;Park Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.912-919
    • /
    • 2005
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere. So mobile devices like cellular phone and PDA are now used in various fields. In particular, the mobility of mobile devices has a great advantage in remote control. This paper designed and implemented a Mobile VNC system that transmitted the screen image of a remote computer, control the remote computer GU and monitor all by cellular phone. The proposed system consists of a Mobile Viewer un on the cellular phone, VNC Server m on a number of remote computers and a VNC Monitor. For communication between the VNC Server and the Mobile Viewer the MRFB protocol is used. The screen image transmitted to the Mobile Viewer is encoded in the PNG format supported by SK-VM, the Java execution environment of the Cellular phone. According to implementation results, the image is about $2KB\~8KB$. According to the 65 times transmission test, the average frame per second is 4.93fps in the emulator and a real cellular phone takes 0.8fps. Therefore, the proposed system is more efficient than existing systems.

Performance Analysis of Operation Strategy of Dual Virtual Cell-based System under The Overlay Convergent Networks of Cognitive Networking (인지 네트워킹 기반 중첩 융합 네트워크에서 이중 가상 셀 운영방안의 성능분석)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.483-488
    • /
    • 2012
  • With the fast growing data traffic, the performance of the convergent overlay network environment under the cognitive networking environment is crucial for the implementation of the efficient network structure. In order to achieve high capacity and reliable link quality in wireless communication of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of ambient-aware dual cell system's operation. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on DWCS network. One is the Active Virtual Cell which exists for user's actual data traffic and the other is the Candidate Virtual Cell which contains a set of candidate antennas to protect user's link quality from performance degradation or interruption. The considered system constructs DVC by using cognitive ability of finding useful virtual signals. Also, for multi-user high-rate data transmission, the DWCS system exploits Space-Time Trellis Codes. The effects of changing environments on the system performance has been investigated thereafter.

A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence (스마트 센서 기술 융합을 통한 망 생존성 강화에 관한 연구)

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.269-276
    • /
    • 2016
  • Public Safty-LTE(Long Term Evolution) is being deployed in the direction of reducing cost by using both of municipal network and commercial network. However, LTE Network is difficult to ensure the survivability during the information communication infrastructure failures. In addition, it is vulnerable in communication coverage of inside buildings and underground. In this study, we propose to implement effectively the network survivability technique through the convergence to the proven technology. As the advent of the IoT Age, smart sensors which are embedded in the environment and the things will be able to provide a useful infrastructure for ensuring the network survivability. Based on the feature of the smart sensor, we designed the sink node architecture to guarantee the network survivability in disaster situation through the convergence of the small cell technology and extension of wireless network coverage technology. The computing power inherent in the environment is a valuable resource that can be utilized in the disaster situation.

Management System of USN-based Collaborative Lighting Energy (USN기반 참여형 조명에너지 관리시스템)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.47-53
    • /
    • 2013
  • Nowadays, Advanced country have devised a plan energy-saving through lighting effectiveness and increasing performance of lighting control system. If it uses the LED as a source of light then conserve electricity by 50%. This paper implement LEMS(Lighting Energy Management System) that applicate and Smart Dimmer and Smart Switch that control the digital LED light, support wired-wireless communication using USN(Ubiquitous Sensor Network). This system of validity and reliability control special purpose lamp including indoor and outdoor lighting and landscape lighting effectively. It minimize the use of indoor and outdoor lighting energy by USN remote integral control function of Digital System Lighting of LED and increase effectiveness of energy and is a collaborative system that can feedback the use of electricity by measurement itself through Web and Switch.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.