• Title/Summary/Keyword: Cooperative Networks

Search Result 532, Processing Time 0.026 seconds

A Cooperative Spectrum Sensing Method based on Eigenvalue and Superposition for Cognitive Radio Networks (인지무선네트워크를 위한 고유값 및 중첩기반의 협력 스펙트럼 센싱 기법)

  • Miah, Md. Sipon;Koo, Insoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.39-46
    • /
    • 2013
  • Cooperative spectrum sensing can improve sensing reliability, compared with single node spectrum sensing. In addition, Eigenvalue-based spectrum sensing has also drawn a great attention due to its performance improvement over the energy detection method in which the more smoothing factor, the better performance is achieved. However, the more smoothing factor in Eignevalue-based spectrum sensing requires the more sensing time. Furthermore, more reporting time in cooperative sensing will be required as the number of nodes increases. Subsequently, we in this paper propose an Eigenvalue and superposition-based spectrum sensing where the reporting time is utilized so as to increase the number of smoothing factors for autocorrelation calculation. Simulation result demonstrates that the proposed scheme has better detection probability in both local as well as global detection while requiring less sensing time as compared with conventional Eigenvalue-based detection scheme.

Performance Evaluation of Cooperative Spectrum Sensing in Maritime Cognitive Radio Networks (해양 인지 무선 네트워크에서 협력적 센싱 기법의 성능 평가)

  • Nam, Yujin;Lee, Yundong;Lee, Seong Ro;Jeong, Min-A;So, Jaewoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1192-1200
    • /
    • 2014
  • This paper proposes a cooperative spectrum sensing algorithm in a maritime cognitive radio network and evaluates the performance of proposed algorithm. In the proposed algorithm, the secondary ships decide whether to transmit the feedback information or not on the basis of the threshold when the number of available feedback information of the ships is limited. The fusion ship detects whether the channel is available or not on the basis of the feedback information. This paper evaluates the proposed algorithm in terms of the detection probability and the number of secondary ships that are fed back in the maritime cognitive radio network. The simulation results show the proposed algorithm significantly reduces the feedback overhead even though the detection probability is somewhat declined.

Cooperative Video Streaming and Active Node Buffer Management Technique in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.11-19
    • /
    • 2019
  • Recently, hybrid CDN/P2P video streaming architecture is specially designed and deployed to achieve the scalability of P2P networks and the desired low delay and high throughput of CDNs. In this paper, we propose a cooperative video streaming and active node buffer management technique in hybrid CDN/P2P architecture. The key idea of this streaming strategy is to minimize network latency such as jitter and packet loss and to maximize the QoS(quality of service) by effectively and efficiently utilizing the information sharing of file location in CDN's proxy server which is an end node located close to a user and P2P network. Through simulation, we show that the proposed cooperative video streaming and active node buffer management technique based on CDN and P2P network improves the performance of realtime video streaming compared to previous methods.

Cooperative Priority-based Resource Allocation Scheduling Scheme for D2D Communications Underlaying 5G Cellular Networks (5G 셀룰러 네트워크 하의 D2D통신을 위한 협력적 우선순위 기반의 자원할당 스케줄링)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.225-232
    • /
    • 2020
  • The underlaying communication scheme in 5G cellular network is a very promising resource sharing scheme, and it is an effective scheme for improving service performance of 5G and reducing communication load between a cellular link and a device to device (D2D) link. This paper proposes the algorithm to minimize the resource interference that occurs when performing 5G-based multi-class service on gNB(gNodeB) and the cooperative priority-based resource allocation scheduling scheme (CPRAS) to maximize 5G communication service according to the analyzed control conditions of interference. The proposed CPRAS optimizes communication resources for each device, and it optimizes resource allocation according to the service request required for 5G communication and the current state of the network. In addition, the proposed scheme provides a function to guarantee giga-class service by minimizing resource interference between a cellular link and a D2D link in gNB. The simulation results show that the proposed scheme is better system performance than the Pure cellular and Force cellular schemes. In particular, the higher the priority and the higher the cooperative relationship between UE(User Equipment), the proposed scheme shows the more effective control of the resource interference.

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Paramasivan, Balasubramanian;Viju Prakash, Maria Johan;Kaliappan, Madasamy
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.75-83
    • /
    • 2015
  • In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.

Power Allocation and Mode Selection in Unmanned Aerial Vehicle Relay Based Wireless Networks

  • Zeng, Qian;Huangfu, Wei;Liu, Tong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.711-732
    • /
    • 2019
  • Many unmanned aerial vehicle (UAV) applications have been employed for performing data collection in facilitating tasks such as surveillance and monitoring objectives in remote and dangerous environments. In light of the fact that most of the existing UAV relaying applications operate in conventional half-duplex (HD) mode, a full-duplex (FD) based UAV relay aided wireless network is investigated, in which the UAV relay helps forwarding information from the source (S) node to the destination (D). Since the activated UAV relays are always floating and flying in the air, its channel state information (CSI) as well as channel capacity is a time-variant parameter. Considering decode-and-forward (DF) relaying protocol in UAV relays, the cooperative relaying channel capacity is constrained by the relatively weaker one (i.e. in terms of signal-to-noise ratio (SNR) or signal-to-interference-plus-noise ratio (SINR)) between S-to-relay and relay-to-D links. The channel capacity can be optimized by adaptively optimizing the transmit power of S and/or UAV relay. Furthermore, a hybrid HD/FD mode is enabled in the proposed UAV relays for adaptively optimizing the channel utilization subject to the instantaneous CSI and/or remaining self-interference (SI) levels. Numerical results show that the channel capacity of the proposed UAV relay aided wireless networks can be maximized by adaptively responding to the influence of various real-time factors.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

A Study on Examples of Eco Design Approach: Focused on Taller Flora

  • Chun, Hei-Jung
    • International Journal of Costume and Fashion
    • /
    • v.12 no.1
    • /
    • pp.83-95
    • /
    • 2012
  • This study aims to develop the 21st century eco design-based fashion products by examining Taller Flora products and presenting eco design approaches. Eco design terms were examined based on literature, and Taller Flora products were explored based on literature and websites. The following research issues were discussed. First, eco design terms are totally handled, thus defining the eco design. Second, eco design-oriented Taller Flora products are examined to explore design approaches. Eco design aims to conserve and heal the global environment with focus on a greater understanding of and interest in nature. As such, eco design is based on a new modern concept of aestheticism that seeks to minimize environmental damage caused by the three processes of production and distribution use and disposal, to take social and moral responsibilities for such activities, and to avoid hurting the environment. Taller Flora brands seek to produce products by keeping close ties with indigenous communities in various nations, and by emphasizing and embracing indigenous people's craftsmanship spirit and creativity Indigenous people use eco-friendly materials and produce products with craftsmanship spirit, and their cooperation by linking different cooperative networks is a good model for strengthening fair trade networks. These addresses the problem of expanding design work through traditional crafting. Therefore, the features of Taller Flora brands presented a new method to approach the eco fashion. The research findings are expected to help develop the eco design of fashion products.

Relay Transmission Protocol for QoS Enhancement in WiMedia Distributed MAC/WUSB Systems (WiMedia Distributed MAC 통신 시스템에서 QoS 성능 향상을 위한 릴레이 통신 프로토콜)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.692-700
    • /
    • 2012
  • The WiMedia Alliance has specified a Distributed Medium Access Control (D-MAC) protocol based on UWB for high speed wireless home networks and Wireless USB. In this paper, firstly, the fair SoQ-based Distributed Reservation Protocol (DRP) for D-MAC is analyzed. And a novel SoQ-based relay transmission protocol is proposed to overcome DRP conflicts fast. In the proposed protocol, each device executes the Satisfaction of QoS (SoQ) time slot allocation algorithm independently. And, in order to give the loser device due to DRP conflicts another chance to maintain QoS resources, the proposed relay transmission protocol helps the device reserve another indirect link maintaining the required QoS resources via a relay node.

V2I Authentication Protocol using Error Correcting Code in VANET Environment (VANET 환경에서 오류수정부호를 사용한 V2I 인증 프로토콜)

  • Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.37-44
    • /
    • 2011
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many field. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehicles shoul d be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. This paper proposes V2I(Vehicular to Infra structure) authentication protocol that anonymity and untraceability of vehicular using Error Correcting Code that ge nerate encoding certification using generation matrix. The proposed scheme based on ECC resolves overhead problems of vehicular secure key management of KDC.