• Title/Summary/Keyword: 4S communication network

Search Result 768, Processing Time 0.03 seconds

Public Diplomacy, Propaganda, or What? China's Communication Practices in the South China Sea Dispute on Twitter

  • Nip, Joyce Y.M.;Sun, Chao
    • Journal of Public Diplomacy
    • /
    • v.2 no.1
    • /
    • pp.43-68
    • /
    • 2022
  • Multiple modes of communication on social media can contribute to public diplomacy in informing, conversing, and networking with members of foreign publics. However, manipulative behaviours on social media, prevalent especially in high tension contexts, create disruptions to authentic communication in what could be grey/black propaganda or information warfare. This study reviews existing literature about models of public diplomacy to guide an empirical study of China's communication in the #SouthChinaSea conversation on Twitter. It uses computational methods to identify, record, and analyze one-way, two-way, and network communication of China's actors. It employs manual qualitative research to determine the nature of China's actors. On that basis, it assesses China's Twitter communication in the issue against various models of public diplomacy.

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

The Efficient Scenario of Solving NAT Traversal in the IMS (IMS에서 효율적인 NAT Traversal 해결 시나리오)

  • Han, Seok-Jun;Lee, Jae-Oh;Kang, Seung-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1935-1941
    • /
    • 2013
  • We can use NAT(Network Address Translation) technology to solve the lack of IP address. The problem of NAT traversal is happened when the filtering characteristics of NAT remove the packet that has no binding in the address translation table of NAT. There were many kinds of way to solve these problems by using additional device. Lately, network market is changed into integrating wired and wireless network by the IMS(IP Multimedia Subsystem). The IMS integrates to control network of wired and wireless network, has emerged to control convergence network effectively. Lately, the additional devices like IBCF(Interconnection Border Control Function) and IBGF(Interconnection Border Gateway Function) are used to solve the NAT traversal problem in the IMS. In this paper, we propose the solution of NAT traversal using P-CSCF without any additional equipment in the IMS.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

Implementation of AI-based Disaster Safety Communication Network protect (AI 기반 재난안전통신망 프로텍트 구현)

  • Bae, Se-jin;Ahn, Jung-hyun;Rhee, Jung-soo;Park, Jung-soo;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.655-656
    • /
    • 2021
  • April 2021, Disaster Safety Communication Network services have been launched, but security functions are weak at the beginning of the service. The current security method for Android-based APP is using Google Protect's technology to detect malware. Malware is difficult to detect directly because there are various types, so by applying malware detection technology that combines AI and Google Protect technology to Disaster Safety Communication Networks, research on how to implement 'AI-based Disaster Satety Communication Network Protect'.

  • PDF

HetNet Characteristics and Models in 5G Networks

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.27-32
    • /
    • 2022
  • The fifth generation (5G) mobile communication technology is designed to meet all communication needs. Heterogeneous networks (HetNets) are a new emerging network structure. HetNets have greater potential for radio resource reuse and better service quality than homogeneous networks since they can evolve small cells into macrocells. Effective resource allocation techniques reduce inter-user interference while optimizing the utilization of limited spectrum resources in HetNets. This article discusses resource allocation in 5G HetNets. This paper explains HetNets and how they work. Typical cell types in HetNets are summarized. Also, HetNets models are explained in the third section. The fourth component addresses radio resource control and mobility management. Moreover, future study in this subject may benefit from this article's significant insights on how HetNets function.

Design and Performance Evaluation of Cross-layer ARQ Mechanism Using Local Re-transmission Agent in Next Generation Mobile Networks (차세대 이동 망에서 지역 재전송 에이전트를 이용한 Cross-layer ARQ 메커니즘 설계 및 성능 평가)

  • So, Sang-Gp;Park, Man-Kyu;Lee, Jae-Yong;Kim, Byung-Chul;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.50-58
    • /
    • 2009
  • Fourth generation mobile communication network have the technology of extensive form include basic service technology and it has been developed from the radio access technology and network topology. Not only fourth generation mobile communication network have basically done new highspeed radio access technology which is suitable to high and low speed environment of transfer, but also it is possible that they have been made for freely vertical handover. ETRI also has made fourth generation mobile communication network which is WiNGS(Wireless Initiative for Next Generation Service) satisfied that demand. This paper is made by lossless handover method through the local retransmission ARQ agent that is one of the main technology of fourth generation mobile communication network. Lossless handover method through local retransmission ARQ agent has been basically made by WiNGS and it was better than original local retransmission of layer by simulation.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

A Study on the Establishment of Redundancy for Stable Operation of Integrated Railway Network (LTE-R) (철도통합무선망(LTE-R)의 안정적인 운영을 위한 이중화 구축 방안 연구)

  • Pyo, Seung-ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.51-58
    • /
    • 2019
  • The LTE system decided to build an integrated disaster safety communication network in order to cope with disasters quickly after the April 16, 2014 disaster, and 333 agencies in 8 areas will build a unified disaster safety communication network. It plans to integrate LTE-R, a railway integrated wireless network, and LTE-M, a land-based communication network, in the 700MHz band. LTE-R, a wireless integrated network, and the Ministry of Land, Transport and Maritime Affairs, are currently using VHF and TRS, which are voice communication-oriented communication systems, in order to cope with demand for high-speed railway service, With this possible LTE-R, it is possible to provide advanced services such as radio-based train control and improve railway safety. The company plans to invest KRW 1.1 trillion in new routes to be launched in 2018 and the existing route to be improved in the future, and to build up all routes of general and high-speed railways to LTE-R by 2027.

802.15.4a DBO-CSS의 Coexistence향상을 위한 새로운 Sinusoidal Interference Cancellation 알고리즘

  • Oh, Dae-Gun;Chong, Jong-Wha
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.129-130
    • /
    • 2006
  • As the research of wireless personal area network (WPAN) is more activated, various communication systems operating on 2.4Ghz are being developed. Systems such as Bluetooth, 802.11b, Zigbee and DBO-CSS are operating on 2.4Ghz. In addition to these communication systems, microwave oven resides in 2.4Ghz, so co-existance between each of these communication systems and microwave Oven is considered important factor of system performance. The effect of microwave oven on these communication systems is so critical that these systems are recommended to avoid the impact of microwave oven by allocation of different channel. In this paper, based on the DBO-CSS operating on 2.4Ghz, we propose a new algorithm of reducing the effect of microwave oven to develop robust communication system against microwave oven.

  • PDF