• Title/Summary/Keyword: 신뢰성 전송

Search Result 1,126, Processing Time 0.026 seconds

An Efficient Multicast Routing Scheme for Mobile Hosts in IPv6 based Networks (IPv6 기반 망에서 이동 호스트들을 위한 효율적인 멀티캐스트 라우팅 기법)

  • Yang, Seung-Jei;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.11-18
    • /
    • 2001
  • In this paper, we propose a multicast routing scheme for an efficient and reliable support of multicast service to mobile hosts in IPv6 based networks. The purpose of this paper is to develop an algorithm to reduce both the number or multicast tree reconstruction and the multicast service disrupt time. The proposed multicast routing scheme is a hybrid method using the advantages of the bi-directional tunneling and the remote subscription proposed by the IETF Mobile IP working group. The proposed scheme satisfies the maximum tolerable transfer delay time and supports the maximum tunneling service. The simulation results show that the proposed scheme has better performance in the number of multicast tree reconstruction and the time of multicast service disrupt than the previous schemes does.

  • PDF

The Quality Loss of a X-Band Transmitter on the LEO Satellite (저궤도 관측위성에 탑재된 X-밴드 송신기의 Quality Loss)

  • 동문호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1306-1312
    • /
    • 2000
  • The quality loss of a X-band transmitter has been derived by means of MC simulation. The transmitter as a payload of LEO(Low Earth Orbit) satellite is capable of the down transmission the image data of hundreds Mbps generated from the Electro-Optical Instrument in real time. The parameters such as data asymmetry amplitude unbalance,phase unbalance, wave shaping and channel interference are included in the quality loss simulation Assuming that normally distributed gaussian noise is simply added to the channel, the quality loss of 0.7 dB has been obtained through this simulation based on a 95% confidence interval. The obtained quality loss can be applied to the link budgets as an additional loss item.

  • PDF

Performance Enhancement of ECC Algorithm-based Mobile Web Service System (ECC 알고리즘 기반 모바일 웹 서비스 시스템의 성능 향상)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.699-704
    • /
    • 2008
  • By the dependence on Web from popularization of internet and increasing number of users, web services capability and security problem of communication is becoming a great issue. Existing web services technology decrease the capability of web application server by limiting the number of synchronous client, decreasing the processing load and increasing average response time. The encryption process to secure communication and the early expense of handshake decrease transmission speed and server capability by increasing the calculation time for connecting. Accordingly, this paper executes an encryption procedure by elliptical encryption algorithm to satisfy secure demands, improve the overload of server for web services and get reliability and security of web server architecture and proposes an improved mobile web sever which provides better ability and the techniques for deferred processing.

Federated Learning modeling for defense against GPS Spoofing in UAV-based Disaster Monitoring Systems (UAV 기반 재난 재해 감시 시스템에서 GPS 스푸핑 방지를 위한 연합학습 모델링)

  • Kim, DongHee;Doh, InShil;Chae, KiJoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.198-201
    • /
    • 2021
  • 무인 항공기(UAV, Unmanned Aerial Vehicles)는 높은 기동성을 가지며 설치 비용이 저렴하다는 이점이 있어 홍수, 지진 등의 재난 재해 감시 시스템에 이용되고 있다. 재난 재해 감시 시스템에서 UAV는 지상에 위치한 사물인터넷(IoT, Internet of Things) 기기로부터 데이터를 수집하는 임무를 수행하기 위해 계획된 항로를 따라 비행한다. 이때 UAV가 정상 경로로 비행하기 위해서는 실시간으로 GPS 위치 확인이 가능해야 한다. 만일 UAV가 계산한 현재 위치의 GPS 정보가 잘못될 경우 비행경로에 대한 통제권을 상실하여 임무 수행을 완료하지 못하는 결과가 초래될 수 있다는 취약점이 존재한다. 이러한 취약점으로 인해 UAV는 공격자가 악의적으로 거짓 GPS 위치 신호를 전송하는GPS 스푸핑(Spoofing) 공격에 쉽게 노출된다. 본 논문에서는 신뢰할 수 있는 시스템을 구축하기 위해 지상에 위치한 기기가 송신하는 신호의 세기와 GPS 정보를 이용하여 UAV에 GPS 스푸핑 공격 여부를 탐지하고 공격당한 UAV가 경로를 이탈하지 않도록 대응하기 위해 연합학습(Federated Learning)을 이용하는 방안을 제안한다.

2.4/5GHz Dual-Band RF Design and Implementation and Performance Evaluation (2.4/5GHz 이중대역 RF 설계 및 구현과 성능 평가)

  • Byung-Ik Jung;Gyeong-Hyu Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.755-760
    • /
    • 2023
  • In this paper, the 2.4/5GHz dual band was used to ensure the reliability and stability of the wireless AV surveillance system using the existing 2.4GHz band. The proposed system supports dynamic channel allocation and channel change technology to avoid interference from other signals (Wifi, Bluetooth, etc.), reduces maintenance costs incurred when building wireless CCTV, and can be linked with existing wired CCTV. The service area of the A/V surveillance system used can be expanded.

An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment (WSN 환경에서 안전한 데이터 전달을 위한 IDE 기반의 계층적 노드인증 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.149-157
    • /
    • 2012
  • In WSN environment, the sensor nodes collect sensed data, and transmit data to the BS. BS is difficult to trust the data from unauthenticated nodes. Therefore, many papers have been proposed about the node authentication and the safety of data. In the AM-E paper, data is delivered after node authentication. In this time, the sensor nodes are directly communicated to BS the AREQ/AREP message for authentication. Therefore, the sensor nodes consume more energy for authentication. Also, noes communicate directly with the BS for authentication will have problem due to the limited energy of nodes. In this paper, the same security with AM-E is supported, Furthermore, to minimize the energy consumption, IDE based hierarchical node authentication protocol is proposed. Compared with AM-E, the number of alive nodes is increased about 39%. Thus, the entire network life time is extended and energy efficiency is improved.

Development of Real-time Bridge Inspection Application connected with Bridge Management System (교량관리시스템과 연계된 실시간 교량 현장조사 프로그램 개발)

  • Park, Kyung-Hoon;Sun, Jong-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7893-7901
    • /
    • 2015
  • It is important to the periodic collection and analysis of the maintenance and management information of bridges for a more safe and efficient management of the bridges. To enhance the reliability and ease of acquisition of the bridge inspection information that is the basis for a strategy for safe and economic management using the bridge management system (BMS), this study develops a smart phone application for bridge inspection and ensures the actual applicability of the application. The developed application that is linked with the BMS for life-cycle management of bridges is possible to real-time query, modify and transmit of the maintenance-related information, and the application is able to greatly relieve the time and cost for the bridge inspection through the automatic creation of site inspection reports. The proposed method using the application is directly or indirectly expected to be very high effects of value improvement, such as ease of use, improved accuracy, sustainability of information, and future utilization, compared to conventional inspection method.

A Legal and Systematic Study On Consumer Protection In Electronic Commerce (전자상거래에서의 소비자보호에 관한 법.제도적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.787-796
    • /
    • 2009
  • The electronic commerce keeps going through a tremendous growth since the latter half of 1990's. But the consumer damages are being increased from characteristics such as non-confrontation, anonymity, internationality, unilaterality and possibility of temptation. Accordingly, this thesis has derived legal and systematic improvements for consumer protection in general as follows. First of all, it is necessary to extend the period to exercise the subscription withdrawal rights according to electronic commerce consumer protection law. Second, the electronic commerce has high possibility of causing errors by consumers because it is performed by non-confrontation and the accurate information must be provided to prevent errors in advance because it is not easy for consumers to prove their own errors. Third, a certification mark system on electronic agreement has to be adopted. Fourth, the legal, systematic and technological measures have to be adopted to prevent from having a sense of fear toward leaking or using personal information through a safe personal information management. Fifth, a strict supervision on internet trust mark is required. Finally, because the intervention or interference by a third party may take place through a hacking on messages or documents sent according to procedure in terms of online settlement, it is necessary to raise security on the system through a precise authentication between concerned parties.

Study on Local Wireless Network Data Structure for Sludge Multimeter (슬러지 멀티미터를 위한 근거리무선네트워크 데이터구조 설계 연구)

  • Jung, Soonho;Kim, Younggi;Lee, Sijin;Lee, Sunghwa;Park, Taejun;Byun, Doogyoon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.96-100
    • /
    • 2014
  • Recently, the management system of wastewater treatment facility has magnified due to the stringent regulations for the protection of the environment, and a sewage treatment plant efficiency and research of the car development are activated in large facilities or industrial park. however, the existing sewerage disposal system and specific water quality monitoring network reliability for real-time transmission of this building is insufficient. In this paper, we proposed a local wireless network design for sludge multi meter data collection and control for measuring the concentration of the sludge efficiently. Also, the collected data over the local wireless network to transmitted to the central monitoring system and accumulate the data in real time to calculate statistics is possible to monitor the status of the sewage treatment facilities. The proposed system uses a short-range wireless networks of IEEE 802.15.4 and configures an IEEE 802.11 network which can monitor real-time status in central system. Also, we install a sludge multimeter and communication network in sewage treatment facilities and confirm the usefulness of the proposed technique by demonstrating its effectiveness.

A Design of Peer-to-Peer Based IPTV System using Multiple Chain Architecture (다중 체인구조를 이용한 Peer-to-Peer 기반 IPTV 시스템 설계)

  • Kim, Ji-Hoon;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.74-82
    • /
    • 2008
  • In this paper, we propose a P2P based IPTV system using a multiple chain architecture. Proposed system is robust to the peer churn. As opposed to the internet the IPTV network managed by a single ISP has fewer bandwidth constraints and end-to-end connectivity. So, we emphasize preferentially robustness of a P2P network in IPTV environment. A single chain structure which was proposed previously emphasizes simplicity, however there exists considerable delay time at the end part of peers as the number of peers increasing. As a solution to the problem, we propose the scheme which seperates the chain into several levels and again divides each level into spans to diminish a delay time. Though the chain is separated into level and span, basic structure of proposed scheme is still a chain structure. So the scheme simplifies the recovery procedure caused by join or departure of peers. We will show the improved performance of proposed scheme rather than single chain structure with respect to the delay time and reliability.