• Title/Summary/Keyword: 인지 무선

Search Result 531, Processing Time 0.036 seconds

Wireless Network Safety Management System on LPWA-based Tram Roads (LPWA 기반 트램 노면의 무선통신망 안전관리 시스템)

  • Jung, Ji-Sung;Lee, Jae-Ki;Park, Jong-Kweon
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.12
    • /
    • pp.57-68
    • /
    • 2018
  • A system to prevent disasters by collecting and analyzing environmental information such as road surface sedimentation, sinkholes, collapse risk of bridges, temperature and humidity around tram station is continuously monitored by monitoring the condition of road surface when constructing tram which is one of the urban railways. In this paper, we propose a wireless network security management system for tram roads based on LPWA that can recognize risk factors of road surface, bridge and tram station of tram in advance and prevent risk. The proposed system consists of a sensor node that detects the state of the tram road surface, a gateway that collects sensor information, and a safety management system that monitors the safety and environmental conditions of the tram road surface, and applies the low power long distance communication technology. As a result of comparing the proposed system with the LTE system in the field test, it was confirmed that there is no significant difference between the sensor information value and the critical alarm level in the monitoring system.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

A study on the design of a general-purpose automatic fire detection system based on a private wireless network of the fire fighting communication frequency band (소방통신 주파수 대역 자가 무선망 기반 범용 자동 화재 탐지 시스템 설계를 위한 연구)

  • Kim, Minyoung;Choi, Donggyu;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.246-248
    • /
    • 2021
  • This paper proposes a new general-purpose automatic fire detection system. And it deals with the contents of related research on how to design and develop for this system. The proposed system automatically notifies the user and the nearby fire department when a fire breaks out in a place where a fire alarm is installed. If this is the case, the nearby fire department can quickly confirm this fact and extinguish the fire at an early stage, thereby reducing human and property damage. The main targets of this system are houses and small buildings. The proposed fire alarm functions as a conventional fire alarm, and if a fire occurs, this fact is immediately transmitted to a nearby receiver through wireless data communication. The receiver in this paper communicates data using Korea's firefighting communication frequency band, and establishes one own network by installing it in various places to quickly receive fire alarm data at any time.

  • PDF

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

Development and Effect of HTE-STEAM Program: Focused on Case Study Application for Free-Learning Semester (HTE-STEAM(융합인재교육) 프로그램 개발 및 효과 : 자유학기제 수업 활용 사례를 중심으로)

  • Kim, Yonggi;Kim, Hyoungbum;Cho, Kyu-Dohng;Han, Shin
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.11 no.3
    • /
    • pp.224-236
    • /
    • 2018
  • The purpose of this study was to develop a reasoning-based HTE-STEAM program for the development of the cognitive capacity of middle school students and enhancement of their STEAM literacy, and to investigate the effectiveness of this study in the school setting. The subjects of this study were the students of two middle schools located in the central region of Korea. The students participated in the HTE-STEAM program during their free-learning semesters and 202 of them were selected by random sampling method. Main findings were as follows: First, pre- and post-HTE-STEAM program has shown a significant value in statistical verification (p<.05) and the level of logical thinking ability of the research participants improved after the class compared to before the class. Second, the paired samples t-test comparing the difference between the pre and post scores of the STEAM attitude test has shown a significant value in statistical verification (p<.05), and the HTE-STEAM program has turned out to have a positive effect on the STEAM literacy of the research participants. Third, in the HTE-STEAM satisfaction scale test, the mean value of the sub-construct stood at 3.27~4.12, showing a positive overall response. Therefore, the HTE-STEAM program under the topic of earth science of 'Disaster and Safety' developed at the final stage of this study has proven to have a positive influence on the research participants in terms of the development of cognitive capacity by reasoning and collaborative learning, an important quality of communication and consideration necessary for STEAM literacy.

Link-layer Assisted Seamless Media Streaming over Mobile IP-enabled Wireless LAN (Mobile IP 지원 무선 랜 상에서 링크 계층의 지원을 통한 연속적인 미디어 스트리밍)

  • Lee, Chul-Ho;Lee, Dong-Wook;Kim, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.9
    • /
    • pp.626-636
    • /
    • 2009
  • In Mobile IP-enabled wireless LAN (WLAN), packet flows are corrupted due to the handoff of a mobile node (MN) at the link and network layers, which results in burst packet losses and can cause temporary buffer underflow in a streaming client at the MN. This transient behavior hurts time-sensitive streaming media applications severely. Among many suggestions to address this handoff problem, few studies are concerned with empirical issues regarding the practical validation of handoff options on the time-sensitive streaming media applications. In this paper, targeting seamless streaming over Mobile IP-enabled WLAN, we introduce a seamless media streaming framework that estimates accurate pre-buffering level to compensate the handoff latency. In addition, we propose a link-layer (L2) assisted seamless media streaming system as a preliminary version of this framework. The proposed system is designed to reduce the handoff latency and to overcome the playback disruption from an implementation viewpoint. A packet buffering and forwarding mechanism with L2 trigger is implemented to reduce the handoff latency and to eliminate burst packet losses generated during the handoff. A pre-buffering adjustment is also performed to compensate the handoff latency. The experimental results show that the proposed approach eliminates packet losses during the handoff and thus verify the feasibility of seamless media streaming over Mobile IP-enabled WLAN.

User Mobility Management Scheme for Effective Inter-working with Overlay Convergent Networks (중첩 융합 네트워크에서 효과적 연동을 위한 위치정보 관리방법)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • In this paper, the new user mobility management scheme which can be utilized to register user's location for interworking with heterogeneous overlay convergent networks under the time-varying radio propagation environment has been proposed. Thus the user mobility management can be considered in order to model and to evaluate the behaviors of users in the overlay convergent networks. This mobility management scheme will be very useful in characterizing the user mobility behaviors and can be used to estimate the signaling traffic and frequency spectrum demands for massive data transfer for the heterogeneous overlay convergent networks.

Active Secondary User Selection Algorithm of Opportunistic Spatial Orthogonalization Considering Interference by a Primary User (주 사용자의 간섭을 고려한 Opportunistic Spatial Orthogonalization의 활성 부 사용자 선택 알고리즘)

  • Yoo, Kang-Hyun;Kim, Yong-Hwa;Lee, Han-Byul;Kim, Seong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.892-902
    • /
    • 2011
  • The opportunistic spatial orthogonalization (OSO) scheme, proposed by Cong Shen and Michael P. Fitz, allows the existence of secondary users during the period in which the primary user is occupying all licensed bands. This paper introduces an active secondary user selection algorithm which mitigates the interference from the primary user transmitter to the secondary user receiver based on single-input multi-output system without altering a primary user's transmission strategy. A proposed algorithm guarantees the minimum average throughput of the primary user and overcomes the average sum throughput of a conventional OSO. We have numerically analyzed the average throughput under various constraints.

Localization Method for Multiple Robots Based on Bayesian Inference in Cognitive Radio Networks (인지 무선 네트워크에서의 베이지안 추론 기반 다중로봇 위치 추정 기법 연구)

  • Kim, Donggu;Park, Joongoo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.2
    • /
    • pp.104-109
    • /
    • 2016
  • In this paper, a localization method for multiple robots based on Bayesian inference is proposed when multiple robots adopting multi-RAT (Radio Access Technology) communications exist in cognitive radio networks. Multiple robots are separately defined by primary and secondary users as in conventional mobile communications system. In addition, the heterogeneous spectrum environment is considered in this paper. To improve the performance of localization for multiple robots, a realistic multiple primary user distribution is explained by using the probabilistic graphical model, and then we introduce the Gibbs sampler strategy based on Bayesian inference. In addition, the secondary user selection minimizing the value of GDOP (Geometric Dilution of Precision) is also proposed in order to overcome the limitations of localization accuracy with Gibbs sampling. Via the simulation results, we can show that the proposed localization method based on GDOP enhances the accuracy of localization for multiple robots. Furthermore, it can also be verified from the simulation results that localization performance is significantly improved with increasing number of observation samples when the GDOP is considered.