• Title/Summary/Keyword: Broadband Wireless Network

Search Result 186, Processing Time 0.023 seconds

BcN Based Ubiquitous Network (광대역 통합망 기반 유비퀴터스 네트워크)

  • Shin, Yong-Sik;Park, Yong-Gil;Chung, Won-Suk
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.81-89
    • /
    • 2004
  • In this paper, we describe ubiquitous environments and the trend of convergence that is an evolution path of. current telecommunication, and show the concept of broadband convergence network, service feature and evolution path. In order to converge wire and wireless communication, telecommunication and broadcasting, voice and data efficiently, broadband convergence network divides a network into service layer, control layer, transport layer, ubiquitous access and terminal layer. Broadband convergence network will be a network that can provide and control broadband multimedia services with QoS and security of different and customized level. Then we depict characteristics and types of broadband multimedia service, and describe the characteristic of broadband convergence network. Finally, we show ubiquitous network based on the broadband convert- gence network to provide ubiquitous service which is a future telecommunication service. We also describe requirements of ubiquitous network such as an intelligent and context based platform, convergence terminals, ubi- quitous computing devices, etc.

  • PDF

A Study on Design of Wireless Networks using Mesh Networks (메쉬 네트워크를 활용한 무선 네트워크망 설계에 관한 연구)

  • Choi, Yong-Seok;Rho, Jung-Kyu
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.1
    • /
    • pp.45-50
    • /
    • 2014
  • In this paper, broadband wireless smart city network coverage was implemented targeting a city (Wonju) using the wireless mesh network. Through this, we could provide wireless network that can easily add network and be repaired easily and have high economic effect. In order to implement broadband wireless smart city network coverage, wireless mesh network has been designed through pre-survey of the region and appropriate selecting of equipment. In addition, the designed network is examined, evaluated and compared with existing network though simulation. The aim of this paper is to prove high cost saving effect of wireless mesh network and its superior performance and to suggest future oriented integrated network of Green IT though research.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Work chain-based inverse kinematics of robot to imitate human motion with Kinect

  • Zhang, Ming;Chen, Jianxin;Wei, Xin;Zhang, Dezhou
    • ETRI Journal
    • /
    • v.40 no.4
    • /
    • pp.511-521
    • /
    • 2018
  • The ability to realize human-motion imitation using robots is closely related to developments in the field of artificial intelligence. However, it is not easy to imitate human motions entirely owing to the physical differences between the human body and robots. In this paper, we propose a work chain-based inverse kinematics to enable a robot to imitate the human motion of upper limbs in real time. Two work chains are built on each arm to ensure that there is motion similarity, such as the end effector trajectory and the joint-angle configuration. In addition, a two-phase filter is used to remove the interference and noise, together with a self-collision avoidance scheme to maintain the stability of the robot during the imitation. Experimental results verify the effectiveness of our solution on the humanoid robot Nao-H25 in terms of accuracy and real-time performance.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

Design and Implementation of Interworking Architecture between 3G Cellular Network and Wireless Broadband Network (이동통신망과 WiBro망과의 연동을 위한 네트워크 아키텍처와 구현방안)

  • Woo Dae-Sic;Park Seong-Soo;Lee Dong-Hahk;Yu Jae-Hwang;Ihm Jong-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.47-52
    • /
    • 2006
  • In this paper, we suggested new network architecture to provide seamless service between the cellular system and new wireless broadband network such as IEEE 802.16e, called WiBro. The interworking technologies are very important issue because mobile operator should provide service connectivity between various wireless networks based on different access technologies. Moreover a change and modification on legacy network should be minimized for providing interworking with new wireless broad-band network. We implemented proposed interworking architecture between 3G cellular network and 802.16e network to provide seamless service including interworking unit in real test environment. Also, we performed performance evaluation in hybrid network environments.

  • PDF

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks

  • Zhang, Aiqing;Ye, Xinrong;Chen, Jianxin;Zhou, Liang;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2375-2393
    • /
    • 2016
  • Key agreement is paramount in secure wireless communications. A promising approach to address key agreement schemes is to extract secure keys from channel characteristics. However, because channels lack randomness, it is difficult for wireless networks with stationary communicating terminals to generate robust keys. In this paper, we propose a Robust Secure Key Agreement (RSKA) scheme from Received Signal Strength (RSS) in stationary wireless networks. In order to mitigate the asymmetry in RSS measurements for communicating parties, the sender and receiver normalize RSS measurements and quantize them into q-bit sequences. They then reshape bit sequences into new l-bit sequences. These bit sequences work as key sources. Rather than extracting the key from the key sources directly, the sender randomly generates a bit sequence as a key and hides it in a promise. This is created from a polynomial constructed on the sender's key source and key. The receiver recovers the key by reconstructing a polynomial from its key source and the promise. Our analysis shows that the shared key generated by our proposed RSKA scheme has features of high randomness and a high bit rate compared to traditional RSS-based key agreement schemes.

VoIP Service Implementation over IEEE 802.16e Broadband Wireless Access System (휴대인터넷망을 이용한 VoIP 서비스 구현)

  • Kim, Yun-Sik;Jung, Mi-Young;Jung, Hyun-Meen;Lee, Sung-Choon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.359-360
    • /
    • 2008
  • As broadband wireless access systems are widely accepted, VoIP service over the wireless network is being requested. Because previous VoIP implementations are designed to provide service over wired network, they does not consider security problem sufficiently that is one of the most vulnerable aspects of wireless communication. Therefore, this paper describes how to implement secure VoIP service over wireless network with minimum overhead.

  • PDF

Channel Assignment, Link Scheduling, Routing, and Rate Control for Multi-Channel Wireless Mesh Networks with Directional Antennas

  • Roh, Hee-Tae;Lee, Jang-Won
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.884-891
    • /
    • 2016
  • The wireless mesh network (WMN) has attracted significant interests as a broadband wireless network to provide ubiquitous wireless access for broadband services. Especially with incorporating multiple orthogonal channels and multiple directional antennas into the WMN, each node can communicate with its neighbor nodes simultaneously without interference between them. However, as we allow more freedom, we need a more sophisticated algorithm to fully utilize it and developing such an algorithm is not easy in general. In this paper, we study a joint channel assignment, link scheduling, routing, and rate control problem for the WMN with multiple orthogonal channels and multiple directional antennas. This problem is inherently hard to solve, since the problem is formulated as a mixed integer nonlinear problem (MINLP). However, despite of its inherent difficulty, we develop an algorithm to solve the problem by using the generalized Benders decomposition approach [2]. The simulation results show the proposed algorithm provides the optimal solution to maximize the network utility, which is defined as the sum of utilities of all sessions.

Empirical Study on Smoothing of VBR Stream for Broadband Wireless Network (광대역 무선 환경에서 VBR 트래픽 스무딩에 대한 연구)

  • 심보욱;원유집;송승호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.130-132
    • /
    • 2002
  • In this work, we like to present the result of study obtained from actual experiment. We instrument the effect of smoothing on packet loss behavior in mobile terminal on broadband wireless network under various different system settings. This activity requires comprehensive streaming software suite including streaming server, CODEC, and streaming client.

  • PDF