• 제목/요약/키워드: Deployment devices

검색결과 121건 처리시간 0.025초

자바카드 플랫폼상에서 자바 클래스 파일의 최적화 연구 (A Study On The Optimization of Java Class File under Java Card Platform)

  • 김도우;정민수
    • 한국멀티미디어학회논문지
    • /
    • 제6권7호
    • /
    • pp.1200-1208
    • /
    • 2003
  • 자바카드 기술은 스마트카드나 메모리 제한적인 장치에서 자바 프로그래밍 언어로 작성된 응용프로그램을 동작 가능하게 한다. 자바카드 기술은 높은 안전성, 이식성, 다중의 응용프로그램을 관리하고 저장하는 기능을 제공한다. 그러나 자바카드 플랫폼의 제한적인 메모리 자원은 다양한 용도로 자바카드가 보급되는데 저해 요인으로 작용하고 있다. 따라서 본 논문에서는 자바카드의 효율적인 메모리 사용을 위해서 바이트코드 최적화 알고리즘을 제안한다. 이 알고리즘은 예외처리 구문 try-catch-finally에서 catch절의 매개변수에 대한 기억장소를 공유하게 함으로써 생성되는 바이트코드의 크기를 줄일 수 있다.

  • PDF

무선 네트워크망의 정보보호를 위한 시스템 설계 (Security Design of Information Security for Wireless Local Area Network)

  • Kim, Jung-Tae;Jung, Sung-Min
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 춘계종합학술대회
    • /
    • pp.729-732
    • /
    • 2003
  • 무선 통신망의 데이터를 보호하기 위한 암호화의 방법 및 비밀 통신을 위한 인중 메카니즘에 대한 방법을 제안하였다. 무선 통신망의 경우 기존의 유선망에 비해, 설치, 이동성 등이 우수하여 많은 기술적인 발전을 보이고 있다. 따라서 이에 대한 데이터의 보호에 대한 관심이 고조되고 있다. 본 논문에서는 가정, 사무실, 건물과 같은 전형적인 외부 환경에 대해 정보를 보호할 수 있는 시스템의 구조를 설계하여 제안하였다.

  • PDF

A Simple Energy Harvesting Algorithm for Wireless Sensor Networks

  • Encarnacion, Nico N.;Yang, Hyunho
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.359-364
    • /
    • 2012
  • Harvesting energy from the environment is essential for many applications to slow down the deterioration of energy of the devices in sensor networks and in general, the network itself. Energy from the environment is an inexhaustible supply which, if properly managed and harvested from the sources, can allow the system to last for a longer period - more than the expected lifetime at the time of deployment, or even last indefinitely. The goal of this study is to develop a simple algorithm for ns-2 to simulate energy harvesting in wireless sensor network simulations. The algorithm is implemented in the energy module of the simulator. Energy harvesting algorithms have not yet been developed for ns-2. This study will greatly contribute to the existing knowledge of simulating wireless sensor networks with energy harvesting capabilities in ns-2. This paper will also serve as a basis for future research papers that make use of energy harvesting.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • 제1권1호
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

Security Concerns on e-Healthcare System with Countermeasures Applied

  • ;김현호;박제훈;김창균;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.256-259
    • /
    • 2013
  • Data and network security for e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack. Moreover, an efficient and cost effective approach for countermeasures is discussed for the delivery of secure services.

  • PDF

Propagation Measurements and Estimation of Channel Propagation Models in Urban Environment

  • Zakaria, Yahia;Ivanek, Lubomir;Glesk, Ivan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2453-2467
    • /
    • 2017
  • Wireless communication is a telecommunication technology, which enables wireless transmission between the portable devices to provide wireless access in all types of environments. In this research, the measurements and various empirical models are analysed and compared in order to find out a suitable propagation model to provide guidelines for cell planning of wireless communication systems. The measured data was taken in urban region with low vegetation and some trees at 900 MHz frequency band. Path loss models are useful planning tools, which permit the designers of cellular communication to obtain optimal levels for the base station deployment and meeting the expected service level requirements. Outcomes show that these empirical models tend to overestimate the propagation loss. As one of the key outputs, it was observed that the calculations of Weissberger model fit with the measured data in urban environment.

CATV Overlay를 위한 EPON 망 구조에 대한 분석 (Analyzing the Architecture of EPON Network for CATV Overlay)

  • 이상연;김용태;이재정;이형섭
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 통신소사이어티 추계학술대회논문집
    • /
    • pp.117-120
    • /
    • 2003
  • PON (Passive Optical Network) is an emerging local subscriber access architecture that provides more bandwidth and services to subscriber than DSL (Digital Subscriber Line and HFC (Hybrid-Fiber Coaxial) network. A PON is a point-to-multipoint optical network with no active elements in the signals' path from source to destination. Advantages of using PON for a subscriber access network include large coverage area, reduced fiber deployment, multicast and broadcast capabilities, reduced cost of maintenance (due to devices being passive), and ease of upgrades to higher bit rate or additional wavelengths. PON uses WDM (Wavelength Division Multiplexing) technique that transmits the downstream and upstream data at each different wavelength. For transmitting the CATV (Community Antenna television) service through PON network, we give out additional wavelength. This study shows the available TPS (Triple play service) architecture using CATV overlay EPON (Ethernet PON) architecture and analyzes the effects of EPON-based CATV transmission by measuring the power loss fur each wavelength and the power range of the available analog wavelength and RF.

  • PDF

MIMO Precoding in 802.16e WiMAX

  • Li, Qinghua;Lin, Xintian Eddie;Zhang, Jianzhong (Charlie)
    • Journal of Communications and Networks
    • /
    • 제9권2호
    • /
    • pp.141-149
    • /
    • 2007
  • Multiple-input multiple-output (MIMO) transmit pre-coding/beamforming can significantly improve system spectral efficiency. However, several obstacles prevent precoding from wide deployment in early wireless networks: The significant feedback overhead, performance degradation due to feedback delay, and the large storage requirement at the mobile devices. In this paper, we propose a precoding method that addresses these issues. In this approach, only 3 or 6 bits feedback is needed to select a precoding matrix from a codebook. There are fifteen codebooks, each corresponding to a unique combination of antenna configuration (up to 4 antennas) and codebook size. Small codebooks are prestored and large codebooks are efficiently computed from the prestored codebook, modified Hochwald method and Householder reflection. Finally, the feedback delay is compensated by channel prediction. The scheme is validated by simulations and we have observed significant gains comparing to space-time coding and antenna selection. This solution was adopted as a part of the IEEE 802.16e specification in 2005.

Location Privacy and Authentication for Low-cost Sensor Node Devices Using Varying Identifiers

  • Hamid Abdul;HONG Choong Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.412-414
    • /
    • 2005
  • Because a sensor node must operate on a tiny battery, the goal to eliminate energy inefficiencies leads the current researchers excavating for new techniques to advocate. As sensor networks edge closer towards wide spread deployment, security issues become a central concern. So far much research has focused on making sensor networks feasible and useful, and has not concentrated much on security issues especially computationally inexpensive techniques. In this paper we introduce a simple scheme relying on one-way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange. Thereby the scheme is safe from many threats like eavesdropping, message interception, spoofing, and replay attacks.

  • PDF