• Title/Summary/Keyword: Channel Scan

Search Result 86, Processing Time 0.025 seconds

An Efficient AP Channel Scanning Scheme for Real-time VoIP Streaming in Wireless LAN (WLAN 기반 실시간 VoIP Streaming을 위한 효율적 채널 스캐닝 기법)

  • Cheon, Young-Chang;Youn, Hee-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.595-598
    • /
    • 2014
  • In order to provide the Mobile Stations operating in IEEE 802.11 Wireless LAN network with seamless handover, a comprehensive study on the functions of handover considering various networking environments and characteristics of Mobile Stations is required. Note that the channel scan process finding a new AP takes the major portion of handover time, and this is the most significant issue with seamless handover for real-time multimedia service in WLAN environment. In this paper the functions required to provide seamless handover in IEEE 802.11 WLAN network are identified, and a new scanning technique is proposed with which the Mobile Stations can selectively scan the channels to reduce the channel scan time in various network environments. Here each Mobile Station awares of the channels the neighbor APs are using by scanning them in advance according to the proposed technique. Afterwards, when handover is actually required, the optimal AP is decided quickly by scanning only the predetemined group of channels and order of scan without unnecessary scan of all the channels. In addition, proposes to enter the Scan Trigger Value and Handover Threshold Value in mobile phones in order to prevent the phenomenon can not handover.

  • PDF

A New Key Protection Technique of AES Core against Scan-based Side Channel Attack (스캔 기반 사이드 채널 공격에 대한 새로운 AES 코아 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Park, Sung-Ju
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.33-39
    • /
    • 2009
  • This paper presents a new secure scan design technique to protect secret key from scan-based side channel attack for an Advanced Encryption Standard(AES) core embedded on an System-on-a-Chip(SoC). Our proposed secure scan design technique can be applied to crypto IF core which is optimized for applications without the IP core modification. The IEEE1149.1 standard is kept, and low area and power consumption overheads and high fault coverage can be achieved compared to the existing methods.

Low Power Testing in NoC(Network-on-Chip) using test pattern reconfiguration (테스트 패턴 재구성을 이용한 NoC(Network-on-Chip)의 저전력 테스트)

  • Jung, Jun-Mo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.2
    • /
    • pp.201-206
    • /
    • 2007
  • In this paper, we propose the efficient low power test methodology of NoC(Network-on chip) for the test of core-based systems that use this platform. To reduce the power consumption of transferring data through router channel, the scan vectors are partitioned into flits by channel width. The don't cares in unspecified scan vectors are mapped to binary values to minimize the switching rate between flits. Experimental results for full-scanned versions of ISCAS 89 benchmark circuits show that the proposed method leads to about 35% reduction in test power.

  • PDF

Design and Implementation of Low-power CSD Considering Beacon Period and Channel Scan Time (비컨 주기와 채널 탐색기간을 고려한 저전력 CSD의 설계 및 구현)

  • Kim, Taek-Hyun;Park, Se-Young;Choi, Hoon;Baek, Yun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.50-54
    • /
    • 2010
  • A Container Security Device (CSD) which is different existing RFID Tag strengthens the physical security as mounted inside the container and the information security as encrypts doubly a data. CSD must use the resources efficiently in order to operate with the battery. Therefore, it needs low-power mechanism which repeats the sleep period and channel scan period. However, by adjusting these periods, the trade-off occurs between energy efficiency and network connectivity. In this paper, we implement low-power CSD and resolve this problem by adjusting beacon period and channel scan time. As a result, We guarantee the network connectivity 95% or more and maximum life up to 16 days using common AA batteries.

1-Gb/s Readout Amplifier Array for Panoramic Scan LADAR Systems (파노라믹 스캔 라이다용 1-Gb/s 리드아웃 증폭기 어레이)

  • Kim, Dayeong;Park, Sung Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.3
    • /
    • pp.452-456
    • /
    • 2016
  • In this paper, a dual-channel readout amplifier array is realized in a standard $0.18{\mu}m$ CMOS technology for the applications of panoramic scan LADAR systems. Each channel consists of a PIN photodiode with 0.9 A/W responsivity and a 1.0 Gb/s readout amplifier(ROA). The proposed ROA shares the basic configuration of the previously reported feedforward TIA, except that it exploits a replica input to exclude a low pass filter(LPF), thus reducing chip area and improving integration level, and to efficiently reject common-mode noises. Measured results demonstrate that each channel achieves $70dB{\Omega}$ transimpedance gain, 829 MHz bandwidth, -22 dBm sensitivity for $10^{-9}BER$, -34 dB crosstalk between adjacent channels, and 45 mW power dissipation from a single 1.8 V supply.

The Scan-Based BIST Architecture for Considering 2-Pattern Test (2-패턴 테스트를 고려한 스캔 기반 BIST 구조)

  • 손윤식;정정화
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.10
    • /
    • pp.45-51
    • /
    • 2003
  • In this paper, a scan-based low power BIST (Built-In Self-Test) architecture is proposed. The proposed architecture is based on STUMPS, which uses a LFSR (Linear Feedback Shift Register) as the test generator, a MISR(Multiple Input Shift Register) as the reponse compactor, and SRL(Shift Register Latch) channels as multiple scan paths. In the proposed BIST a degenerate MISR structure is used for every SRL channel; this offers reduced area overheads and has less impact on performance than the STUMPS techniques. The proposed BIST is designed to support both test-per-clock and test-per-scan techniques, and in test-per-scan the total power consumption of the circuit can be reduced dramatically by suppressing the effects of scan data on the circuits. Results of the experiments on ISCAS 89 benchmark circuits show that this architecture is also suitable for detecting path delay faults, when the hamming distance of the data in the SRL channel is considered.

QoS-Aware Group Scan Scheduling in WiMAX Networks (WiMAX 네트워크에서 QoS 기반의 그룹 스캔 스케쥴링 기법)

  • Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.186-195
    • /
    • 2010
  • For the fast target base station channel decision in WiMAX networks, fast group scanning scheme was suggested, in which mobile stations in proximity of each other form a group and scan the candidate channels dispersively. However, the previous group scanning scheme does not consider the different QoS requirements of each MS in a group. In this paper we propose the enhanced group scanning scheme, so-called QoS-aware group scan scheduling scheme, that makes mobile stations in a group scan the candidate channels without deteriorating the QoS requirements. We introduce the QoS-aware channel scanning concept of a individual mobile station and show the different scanning latencies due to the different QoS requirements. With the help of the efficient channel allocation by the serving BS, in the proposed scanning scheme, a mobile station with relatively higher QoS in a group scans less amount of candidate channels than the others with relatively lower QoS, while the mobile stations in a group still guarantees the fast target base station decision. The performance results show that our proposed scanning scheme results in the fast target base station decision while considering the QoS requirements of each MS.

Generalized SCAN Bit-Flipping Decoding Algorithm for Polar Code

  • Lou Chen;Guo Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1296-1309
    • /
    • 2023
  • In this paper, based on the soft cancellation (SCAN) bit-flipping (SCAN-BF) algorithm, a generalized SCAN bit-flipping (GSCAN-BF-Ω) decoding algorithm is carried out, where Ω represents the number of bits flipped or corrected at the same time. GSCAN-BF-Ω algorithm corrects the prior information of the code bits and flips the prior information of the unreliable information bits simultaneously to improve the block error rate (BLER) performance. Then, a joint threshold scheme for the GSCAN-BF-2 decoding algorithm is proposed to reduce the average decoding complexity by considering both the bit channel quality and the reliability of the coded bits. Simulation results show that the GSCAN-BF-Ω decoding algorithm reduces the average decoding latency while getting performance gains compared to the common multiple SCAN bit-flipping decoding algorithm. And the GSCAN-BF-2 decoding algorithm with the joint threshold reduces the average decoding latency further by approximately 50% with only a slight performance loss compared to the GSCAN-BF-2 decoding algorithm.

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.

Performance of an Active Channel Scanning Scheme for Fast Handover in Mobile Wireless LAN Systems (이동무선 LAN 시스템의 고속핸드오버를 위해 능동적인 유효채널탐색방식의 성능분석)

  • Yoon, Hong;Lim, Jae-Myung;Yoon, Chong-Ho;Kim, Se-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.44-53
    • /
    • 2006
  • In this paper, we propose a new Active Channel Scanning scheme by scanning active channels employed by neighbor APs' with the handover counts and non overlap channel information for fast handover. Under the proposed scheme, the mobile which has finished handover to connect a new APsends the neighbor AP's channel information learned by itself during handover to the new AP. And then, the new AP relays the neighbor channel information to the old AP. It decides a priority by handover counts and non overlap channel information for building a Neighbor Channel Table(NCT), and also sends the table information to its associated mobile nodes, periodically. As a result each mobile can scan only active neighbor APs' channels when performs handover based on the referring to NCT information. Using NS-2 Simulator, we applied to supposed ACS that the result of simulation decides to sort by handover counts and non overlap channel information. we evaluate our proposed ACS scheme based on NCT along with the full scanning scheme and the selective scanning scheme. From simulation results, we show that the proposed scheme is advantageous over the other two schemes in terms of the number of scanning channels and the scanning latency.