• Title/Summary/Keyword: 5G Network

Search Result 706, Processing Time 0.026 seconds

Probability-based IoT management model using blockchain to expand multilayered networks (블록체인을 이용하여 다층 네트워크를 확장한 확률 기반의 IoT 관리 모델)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2020
  • Interest in 5G communication security has been growing recently amid growing expectations for 5G technology with faster speed and stability than LTE. However, 5G has so far included disparate areas, so it has not yet fully supported the issues of security. This paper proposes a blockchain-based IoT management model in order to efficiently provide the authentication of users using IoT in 5G In order to efficiently fuse the authentication of IoT users with probabilistic theory and physical structure, the proposed model uses two random keys in reverse direction at different layers so that two-way authentication is achieved by the managers of layers and layers. The proposed model applied blockchain between grouped IoT devices by assigning weights to layer information of IoT information after certification of IoT users in 5G environment is stratified on a probabilistic basis. In particular, the proposed model has better functions than the existing blockchain because it divides the IoT network into layered, multi-layered networks.

Data Error Compensation Estimation Technology for Providing High Quality Contents in IoT Environment (IoT 환경에서 고품질 콘텐츠 제공을 위한 데이터 오류 보상 추정 기술)

  • Kim, Jeong Su
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.333-338
    • /
    • 2019
  • Cultural contents are the most important factor in high speed and high quality data communication. High-quality content includes VR and AR technology, and a variety of high-quality content can be streamed over wireless mobile phones via smartphones. In addition, network and wired/wireless communication are inevitably required in an Internet of Things (IoT) environment in which things are connected to a wireless Internet. IoT is used in various network technologies such as 4G, 5G mobile communication, WIFI wireless LAN, Bluetooth and so on. It is a technology that can use the connection between things anytime, anywhere, and can be achieved in a wireless mobile communication environment. Therefore, in this paper, we study data error compensation estimation method which can reduce data error based on mobile communication channel environment analysis so that high quality contents can be serviced even in high speed mobile environment.

Communication Structure for Smart Railway Network (스마트 철도 네트워크를 위한 통신 구조)

  • Kim, Young-dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.197-199
    • /
    • 2021
  • High speed railway system is progressed to SRN(Smart Railway Network) having entirely automation function beyond each componet automations. It is necessity to use mobile communication technology of LTE-R(Long Term Evolution - Railway) and 5G-R(5th Generation - Railway) and information technology of convergence based on AI, Big Data, Deep Learning to construct this smart railway networks. In this paper, a communication structure is suggested for SRN. This suggested communication structure for SRN is composed to include safety operation of high speed train, railway system management and customer services, and also have complexing function of these each functions. Results of this study can be used for SRN construction and opeation, and development of railway communication standards.

  • PDF

A Study on the 5G Spectrum Auction Cases of 3.7 GHz Spectrum Band (해외 5G 주파수 경매사례 분석: 3.7GHz 대역을 중심으로)

  • Cho, C.W.;Lee, S.J.;Yu, J.E.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.70-81
    • /
    • 2022
  • This study derived implications regarding competition policy to establish a reasonable spectrum allocation draft of a 3.7 GHz spectrum band by indepth analysis of 5G spectrum auctions. The following general features were identified by examining auctions of three countries, including the United States, United Kingdom, and Denmark, were completed in 2021. First, securing the minimum bandwidth that is essential for service competition was guaranteed by applying the spectrum cap. Second, a continuous spectrum band was allocated to all mobile network operators. Third, certain requirements were implemented to encourage the expansion of 5G service coverage. The spectrum cap that was implemented in Korea during the most recent spectrum auction was ineffective regarding competition policy. Additionally, it is anticipated that the allocation of 3.7-4.0 GHz spectrum will considerably impact market competition because the continuity of spectrum band is different among mobile service operators. Therefore, it is time to discuss promoting the 5G service competition in Korea by revising related laws.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

Tier-based Proactive Path Selection Mode for Wireless Mesh Networks

  • Fu-Quan, Zhang;Joe, In-Whee;Park, Yong-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1303-1315
    • /
    • 2012
  • In the draft of the IEEE 802.11s standard, a tree topology is established by the proactive tree-building mode of the Hybrid Wireless Mesh Protocol (HWMP). It is used for cases in which the root station (e.g., gateway) is an end point of the majority of the data connections. In the tree topology, the root or central stations (e.g., parent stations) are connected to the other stations (e.g., leaves) that are one level lower than the central station. Such mesh stations are likely to suffer heavily from contention in bottleneck links when the network has a high traffic load. Moreover, the dependence of the network on such stations is a point of vulnerability. A failure of the central station (e.g., a crash or simply going into sleep mode to save energy) can cripple the whole network in the tree topology. This causes performance degradation for end-to-end transmissions. In a connected mesh topology where the stations having two or more radio links between them are connected in such a way that if a failure subsists in any of the links, the other link could provide the redundancy to the network. We propose a scheme to utilize this characteristic by organizing the network into concentric tiers around the root mesh station. The tier structure facilitates path recovery and congestion control. The resulting mode is referred to as Tier-based Proactive Path Selection Mode (TPPSM). The performance of TPPSM is compared with the proactive tree mode of HWMP. Simulation results show that TPPSM has better performance.

VoIP Performance Improvement with Packet Aggregation over MANETs (MANET에서 패킷취합을 이용한 VoIP 성능 개선)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.3
    • /
    • pp.275-280
    • /
    • 2010
  • In this paper, VoIP(Voice over Internet Protocol) transmission performance for MANET(Mobile Ad-hoc Networks) is improved and analyzed with packet aggregation scheme which is aggregating some of short length packets to one large packet and sending to networks. VoIP simulator based on NS(Network Simulator)-2 is implemented and used to measure performance of VoIP traffic transmission. In this simulation, VoIP traffics are generated with parameters of some codes such as G.711, G.729A, GSM.AMR and iBLC. MOS(Mean Opinion Score), end-to-end network delay, packet loss rate and transmission bandwidth are measured. Performance improvements of 98% for MOS, 6.4times for end-to-end network delay, 32times for packet loss rate is shown as simulation results. On the other hand, transmission bandwidth is increased about maximum 10%. Finally, VoIP implementation guide for the performance with packet aggregation is suggested.

Full-Duplex Operations in Wireless Powered Communication Networks

  • Ju, Hyungsik;Lee, Yuro;Kim, Tae-Joong
    • ETRI Journal
    • /
    • v.39 no.6
    • /
    • pp.794-802
    • /
    • 2017
  • In this paper, a wireless powered communication network (WPCN) consisting of a hybrid access point (H-AP) and multiple user equipment (UE), all of which operate in full-duplex (FD), is described. We first propose a transceiver structure that enables FD operation of each UE to simultaneously receive energy in the downlink (DL) and transmit information in the uplink (UL). We then provide an energy usage model in the proposed UE transceiver that accounts for the energy leakage from the transmit chain to the receive chain. It is shown that the throughput of an FD WPCN using the proposed FD UE (FD-WPCN-FD) can be maximized by optimal allocation of the UL transmission time to the UE by solving a convex optimization problem. Simulation results reveal that the use of the proposed FD UE efficiently improves the throughput of a WPCN with a practical self-interference cancellation capability at the H-AP. Compared to the WPCN with FD H-AP and half-duplex (HD) UE, FD-WPCN-FD achieved an 18% throughput gain. In addition, the throughput of FD-WPCN-FD was shown to be 25% greater than that of WPCN in which an H-AP and UE operated in HD.

Investigation of Linear Viscoelastic Properties of Xanthan-Carob Mixture in Sol and Gel States

  • Yoon, Won-Byong;Gunasekaran, Sundaram
    • Food Science and Biotechnology
    • /
    • v.18 no.3
    • /
    • pp.618-623
    • /
    • 2009
  • Synergistic interactions between xanthan (X) and carob (C) were investigated by studying the linear viscoelastic behavior of X, C, and X/C mixtures at sol and gel states. At the solution state, storage modulus (G') dominates the linear viscoelastic properties of X/C mixtures. The gelation temperature (52 to $57^{\circ}C$) was weakly dependent on the xanthan fraction (${\phi}x$) in the mixture. The ${\phi}x$ also had a strong effect on G' until ${\phi}x=0.5$. The elastic active network concentration (EANC) of X/C gels was estimated from the pseudo-equilibrium modulus. The EANC for systems with ${\phi}x=0.25$, 0.5, 0.75, and 1 at 1% total concentration was 2.3, 4.4, 4.1, and 0.32 (${\times}10^{-3}\;mol/m^3$), respectively. The maximum synergistic effect was observed at about ${\phi}x=0.5$. The G' at the transition state of X/C mixed gel was proportional to ${\omega}^{3/2}$ at ${\omega}$>${\omega}_{tr}$ (the onset transition frequency) compared to the theoretical limit of ${\omega}^{1/2}$.

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).