• Title/Summary/Keyword: 양방향 통신

Search Result 735, Processing Time 0.025 seconds

An Enhanced Frequency Synchronization Algorithm for 3GPP LTE FDD/TDD Dual Mode Downlink Receiver (3GPP LTE FDD/TDD 듀얼 모드 하향 링크 수신기를 위한 개선된 주파수 동기 알고리즘)

  • Shim, Myung-Jun;Jang, Jun-Hee;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1C
    • /
    • pp.103-112
    • /
    • 2010
  • In this paper, we propose a coarse and fine frequency synchronization method which is suitable for the 3GPP(3rd Generation Partnership Project) LTE(Long Term Evolution) FDD(Frequency Division Duplexing) / TDD(Time Division Duplexing) dual mode system. In general, PSS(Primary Synchronization Signal) correlation based estimation method and CP(Cyclic Prefix) correlation based tracking loop are applied for coarse and fine frequency synchronization in 3GPP LTE OFDMA(Orthogonal Frequency Division Multiple Access) system, respectively. However, the conventional coarse frequency synchronization method has performance degradation caused by fading channel and squaring loss. Also, the conventional fine frequency synchronization method cannot guarantee stable operation in TDD mode because of signal power difference between uplink and downlink subframe. Therefore, in this paper, we propose enhanced coarse and fine frequency synchronization methods which can estimate more accurately in multi-path fading channel and high speed channel environments and has stable operation for TDD frame structure, respectively. By computer simulation, we show that the proposed methods outperform the conventional methods, and verify that the proposed frequency synchronization method can guarantee stable operation in 3GPP LTE FDD/TDD dual mode downlink receiver.

An Enhanced AGC Structure and P-SCH Detection Method for Initial Cell Search in 3GPP LTE FDD/TDD Dual Mode Downlink Receiver (3GPP LTE FDD/TDD 듀얼 모드 하향 링크 수신기의 초기 셀 탐색을 위한 개선된 AGC 구조 및 P-SCH 검출 기법)

  • Chung, Myung-Jin;Jang, Jun-Hee;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3C
    • /
    • pp.302-313
    • /
    • 2010
  • In this paper, we propose an enhanced AGC (Automatic Gain Control) structure and P-SCH detection method for initial cell search in 3GPP (3rdGenerationPartnershipProject) LTE (Long Term Evolution) FDD(Frequency Division Duplex) / TDD (Time Division Duplex) dual mode system. Since TDD frame structure consists of uplink subframe and downlink subframe, conventional AGC structure causes P-SCH detection performance degradation by increase of AGC variation due to signal power difference between uplink and downlink subframe. Also, P-SCH detection performance is degraded by distortion of P-SCH correlation characteristic in frequency offset and multipath fading channel environments. Therefore, we propose an AGC structure which can minimize P-SCH detection performance degradation with stable operation in 3GPP LTE TDD mode as well as FDD mode. Also we propose a P-SCH detection method which can reduce distortion of correlation chareteristics in frequency offset and multipath fading environments and obtain good P-SCH detection performance. Simulation results show that the proposed AGC structure and P-SCH detection method have stable AGC operation and excellent P-SCH detection performance for 3GPP LTE TDD / FDD dual mode downlink receiver in various channel environments.

A Study on OBC Integrated 1.5kW LDC Converter for Electric Vehicle. (전기자동차용 OBC 일체형 1.5kW급 LDC 컨버터에 대한 연구)

  • Kim, Hyung-Sik;Jeon, Joon-Hyeok;Kim, Hee-Jun;Ahn, Joon-Seon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.456-465
    • /
    • 2019
  • PHEV(Plug in Hybrid Electric Vehicle) and BEV(Battery Electric Vehicle) equip high voltage batteries to drive motor and vehicle electric system. Those vehicle require OBC(On-Board Charger) for charging batteries and LDC(Low DC/DC Converter) for converting from high voltage to low voltage. Since the charger and the converter actually separate each other in electrical vehicles, there is a margin to reduce the vehicle weight and area of installation by integration two systems. This paper studies a 1.5kW LDC converter that can be integrated into an OBC using an isolated current-fed converter by simplifying the design of LDC transformers. The proposed LDC can control the final output voltage of the LDC by using a fixed arbitrary output voltage of the bidirectional buck-boost converter, so that Compared to the existing OBC-LDC integrated system, it has the advantage of simplifying the transformer design considering the battery voltage range, converter duty ratio and OBC output turn ratio. Prototype of the proposed LDC was made to confirm normal operation at 200V ~ 400V input voltage and maximum efficiency of 91.885% was achieved at rated load condition. In addition, the OBC-LDC integrated system achieved a volume of about 6.51L and reduced the space by 15.6% compared to the existing independent system.

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Analysis of Driving and Environmental Impacts by Providing Warning Information in C-ITS Vehicles Using PVD (PVD를 활용한 C-ITS 차량 내 경고정보 제공에 따른 주행 및 환경영향 분석)

  • Yoonmi Kim;Ho Seon Kim;Kyeong-Pyo Kang;Seoung Bum Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.224-239
    • /
    • 2023
  • C-ITS (Cooperative-Intelligent Transportation System) refers to user safety-oriented technology and systems that provide forward traffic situation information based on a two-way wireless communication technology between vehicles or between vehicles and infrastructure. Since the Daejeon-Sejong pilot project in 2016, the C-ITS infrastructure has been installed at various locations to provide C-ITS safety services through highway and local government demonstration projects. In this study, a methodology was developed to verify the effectiveness of the warning information using individual vehicle data collected through the Gwangju Metropolitan City C-ITS demonstration project. The analysis of the effectiveness was largely divided into driving behavior impact analysis and environmental analysis. Compliance analysis and driving safety evaluation were performed for the driving impact analysis. In addition, to supplement the inadequate collection of Probe Vehicle Data (PVD) collected during the C-ITS demonstration project, Digital Tacho Graph ( DTG ) data was additionally collected and used for effect analysis. The results of the compliance analysis showed that drivers displayed reduced driving behavior in response to warning information based on a sufficient number of valid samples. Also, the results of calculating and analyzing driving safety indicators, such as jerk and acceleration noise, revealed that driving safety was improved due to the provision of warning information.

Cost-effective Residual Frame Synchronization Error Removal Technique in TDD OFDM Systems (TDD OFDM 시스템에서의 효율적인 잔류 시간동기 오차 제거 기법)

  • Lee, Seong-Joo;Kim, Kyung-Min;Kim, Jae-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.2
    • /
    • pp.37-45
    • /
    • 2007
  • A lot of conventional algorithms has tried to cancel the Residual Frame Synchronization Error (RFSE), which causes the performance degradation of channel estimation when using interpolation in lattice-type pilot-aided Time Division Duplex (TDD) OFDM systems. Among them, a pre- and post-compensation method has been attractive to eliminate the effects of RFSE, providing good performance but requiring high computational complexity. In this paper we propose a new method which lowers computational costs by adjusting the starting point of TDD OFDM systems' FFT window in order to compensate for the RFSE. For the performance verification, we apply the proposed method to IEEE 802.16e standard and also estimate additionally required computational power of it compared to the pre- and post-compensation method. Simulation and implementation results show that the proposed algorithm has performance similar to the conventional method and is very efficient with low power implementation, requiring only 4.9 % of the power which the conventional method needs additionally.

Smart Card and Dynamic ID Based Electric Vehicle User Authentication Scheme (스마트카드 및 동적 ID 기반 전기 자동차 사용자 인증 스킴)

  • Jung, Su-Young;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.141-148
    • /
    • 2013
  • Smart grid can two-way communication using ICT(Information & Communication Technology). Also, smart grid can supply to dynamic power that grafted to electric vehicle can activate to electric vehicle charging infrastructure and used to storage battery of home. Storage battery of home can resale to power provider. These electric vehicle charging infrastructure locate fixed on home, apartment, building, etc charging infrastructure that used fluid on user. If don't authentication for user of fluid user use to charging infrastructure, electric charging service can occurred to illegal use, electric charges and leakgage of electric information. In this paper, we propose smartcard and dynamic ID based user authentication scheme for used secure to electric vehicle service in smart grid environment.

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.