• Title/Summary/Keyword: 와이브로(WiBro)

Search Result 118, Processing Time 0.023 seconds

Analysis of Termination Capacity in IEEE 802.16 Broadband Wireless Access Environments (IEEE 802.16 BWA 환경에서의 가입자 수용용량 분석)

  • Lim Seog-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.65-73
    • /
    • 2005
  • Request about fast diffusion of internet and high-capacity multimedia service is increasing day after day. Because existent wireless LAN is short range, if subscriber is far away in base station transceiver system(Base Station), subscriber's quality of service becomes low, and wileless internet is expensive. Lately, WiBro(Wireless Broadband Internet) system that is developed in domestic by world first, is high-speed portable internet service that is situated in middle area of mobile phone and wireless LAN. In this paper, service traffic model and characteristics are analyzed to provide multimedia service based on IEEE 802.16 BWA accomplishes base of WiBro and simulation is conducted according to various traffic mixing ratio. Finally, on the basis of these simulation results, maximum allowable number of subscriber per cell is calculated.

  • PDF

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2 (NS-2를 이용한 WiBro상에서의 종단 간 보안 프로토콜의 성능평가 및 분석)

  • Kim, Jung-Yoon;Song, Se-Hwa;Kim, In-Hwan;Hwang, In-Yong;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.184-190
    • /
    • 2009
  • WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.

A Study of Relay scheme for shadow area in WiBro network (와이브로 네트워크에서 음영지역에 대한 중계방식에 관한 연구)

  • Son, Sung-Chan;Oh, Chung-Gyun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.394-397
    • /
    • 2008
  • Recently WiBro network is installed for high speed wireless internet service by telecommunication service provider, however WiBro service is not provided in the region of mountain or difficult region to install network infra. Fixed repeater is used to resolve those shadow area problem in current WiBro network. This paper study introducing Ad-hoc based multi-hop relay instead of using fixed repeater in order to resolve those shadow area problem. Cost down of fixed repeater and active network expansion is possible to resolve shadow area problem by introducing multi-hop relay technology.

  • PDF

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

Secure Handover Scheme in IEEE 802.16e/WiBro Networks (IEEE 802.16e/와이브로 망에서의 안전한 핸드오버 적용 방안)

  • Jo Hea-Suk;Jeon Woong-Ryul;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.318-321
    • /
    • 2006
  • 현재 국내 국책사업으로 추진 중인 와이브로(WiBro) 기술 규격이 포함되어 있는 휴대인터넷 표준 규격인 IEEE 802.16e는 IP기반으로, 이동성이 뛰어나고 고속전송 기능의 특징을 가지고 있다. 또한 기지국간의 핸드오버(Handover)를 지원함으로써 이동성을 지원한다. 그러나 이러한 핸드오버 기법에 있어서 Replay 공격, Man-in-the-Middle 공격, Stolen-Verifier 공격 등에 취약한 문제점이 드러나고 있다. 본 논문은 이러한 기존 핸드오버 기법의 취약점을 개선하기 위해서 사용자의 인증서와 Timestamp값을 통한 IEEE 802.16e/와이브로 망에서 안전한 핸드오버 적용 방안에 대해 제안한다.

  • PDF

A study on the Digital Signage using Wireless Networks (무선 네트워크를 이용한 디지털 사이니지에 대한 연구)

  • Lee, Dong-Woo;Lee, Hak-Jae;Ko, Kyu-Cheon;Na, Jong-Whoa
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.412-418
    • /
    • 2011
  • In the airport, digital signage is used to provide the flight-related information for the passengers. Because the current digital signage is based on wired networking or storage medium, its use is limited in terms of the location and the usage of the digital signage. In order to overcome these limitation, we present a WiBro-based digital signage for the wireless broadband networking and the mobility of the digital signage. We perform comparative experiments with the WiBro-based digital signage and WLAN-based digital signage under various locations, datarate, advertisement contents. The experimental results showed that the WiBro-based digital signage is preferred when the mobility is required, while the WLAN-based digital signage has advantage in datarate.

A Design of AES-based Key Wrap/Unwrap Core for WiBro Security (와이브로 보안용 AES기반의 Key Wrap/Unwrap 코어 설계)

  • Kim, Jong-Hwan;Jeon, Heung-Woo;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1332-1340
    • /
    • 2007
  • This paper describes an efficient hardware design of key wrap/unwrap algorithm for security layer of WiBro system. The key wrap/unwrap core (WB_KeyWuW) is based on AES (Advanced Encryption Standard) algorithm, and performs encryption/decryption of 128bit TEK (Traffic Encryption Key) with 128bit KEK (Key Encryption Key). In order to achieve m area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented by using field transformation technique. As a result, the gate count of the WB_KeyWuW core is reduced by about 25% compared with conventional LUT (Lookup Table)-based design. The WB_KeyWuW con designed in Verilog-HDL has about 14,300 gates, and the estimated throughput is about $16{\sim}22-Mbps$ at 100-MHz@3.3V, thus the designed core can be used as an IP for the hardware design of WiBro security system.

A Market Development Strategy for WiBro Service (와이브로 서비스(WiBro service) 상용화를 위한 시장개발전략)

  • Kim, Youngchan;Jee, Kyoung-Yong;Kim, Moon-Koo;Kim, Jiyeon
    • Asia Marketing Journal
    • /
    • v.7 no.2
    • /
    • pp.71-92
    • /
    • 2005
  • Given the rapid changes in consumer tastes, technology, and competition, companies must develop a steady stream of new products and services. To be a successful product or service and explore the available market, the target market consumers need to be fully acknowledged a new product or service's value or benefit. And at the same time, the presented benefit should satisfy the customer's needs and wants. Therefore, a firm must investigate the target consumers' needs and wants before launching the new product or service. In this paper, we suggest the marketing strategy for newly developed WiBro service in telecommunication industry. We focus on consumer-oriented marketing strategy as well as the technology development process. To explore the customer's value scheme, we employ a self-explicated approach for estimating the customer's part-worth of the different target market in the process of market development stage. And we present the marketing strategy for each market development stages as well.

  • PDF