• Title/Summary/Keyword: Device-to-device communications

Search Result 756, Processing Time 0.024 seconds

Key Management for Group-based Device-to-Device Communications in LTE-Advanced (LTE-Advanced에서 그룹 기반의 단말 간 직접 통신을 위한 키 관리 기법)

  • Choi, Dae-Sung;Hong, Sung-Dae;Kim, Seung-Ryong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.541-543
    • /
    • 2013
  • 사람이 개입할 필요 없이 기기 및 사물들을 셀룰러 망으로 연결하여 언제 어디서나 다양한 서비스를 제공하는 MTC(Machine Type Communications)는 차세대 통신의 주요 이슈로 고려되고 있다. 하지만 MTC 환경은 다수의 단말들이 존재하기 때문에 LTE-Advanced 네트워크에 상당한 혼잡과 부하 문제를 줄 수 있다. 이 문제를 해결하기 위해 단말 간 직접 통신 기술이 등장하였다. 본 논문에서는 단말 간 직접 통신에서 eNB와의 통신을 줄이고, 그룹 간의 안전한 통신이 가능한 그룹 키 관리 기법을 제안하고, 이에 따른 연산 및 통신 오버헤드를 분석한다.

A Interval Distance Calculation and Forward Collision Warning Algorithm for Vehicle Safety Communications on a Highway (고속도로에서 차량 안전 통신을 위한 거리 계산과 전방충돌사고경보 알고리즘)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.295-300
    • /
    • 2012
  • Various forward collision warning algorithms have studied in order to protect a car accident. For this, in general, algorithms using an external device such as a camera and sensor generate a forward collision warning. However, if using the external device, it can occur errors due to device characteristics when there is rain or fog. Also, the prevention of a chain-reaction collision is insufficient because the system generates a warning in case of only vehicle having a forward collision danger. If it combines the vehicle safety communications, the method becomes a solution to protect a chain-reaction collision. So, In this paper, we proposes a improved forward collision warning algorithm using the wireless communication technique, driver's information, breaking distance, and velocity. And we compare and analyze our algorithm and previous algorithms.

A Beamforming-Based Video-Zoom Driven Audio-Zoom Algorithm for Portable Digital Imaging Devices

  • Park, Nam In;Kim, Seon Man;Kim, Hong Kook;Kim, Myeong Bo;Kim, Sang Ryong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.1
    • /
    • pp.11-19
    • /
    • 2013
  • A video-zoom driven audio-zoom algorithm is proposed to provide audio zooming effects according to the degree of video-zoom. The proposed algorithm is designed based on a super-directive beamformer operating with a 4-channel microphone array in conjunction with a soft masking process that uses the phase differences between microphones. The audio-zoom processed signal is obtained by multiplying the audio gain derived from the video-zoom level by the masked signal. The proposed algorithm is then implemented on a portable digital imaging device with a clock speed of 600 MHz after different levels of optimization, such as algorithmic level, C-code and memory optimization. As a result, the processing time of the proposed audio-zoom algorithm occupies 14.6% or less of the clock speed of the device. The performance evaluation conducted in a semi-anechoic chamber shows that the signals from the front direction can be amplified by approximately 10 dB compared to the other directions.

  • PDF

Effective ToA-Based Indoor Localization Method Considering Accuracy in Wireless Sensor Networks (무선 센서 네트워크 상에서 정확도를 고려한 효과적인 도래시간 기반 무선실내측위방법)

  • Go, Seungryeol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.640-651
    • /
    • 2016
  • We propose an effective ToA-based localization method considering accuracy in indoor environments. The purpose of the localization system is to estimate the coordinates of the geographic location of target device. In indoor environments, accurately estimating the location of a target device is not easy due to various errors. The accuracy of wireless localization is influenced by NLOS errors. ToA-based localization measures the location of a target device using the distances between a mobile device and three or more base stations. However, each of the NLOS errors along a distance estimated from a target device to a base station is different because of dissimilar obstacles. To accurately estimate the target's location, an optimized localization process is needed in indoor environments. In this paper, effective ToA-based localization method process is proposed for improving accuracy in wireless sensor networks. Performance evaluations are presented, and the experimental localization system results are proved through comparisons of various localization methods with the proposed methods.

Modeling of FBAR Devices with Bragg Reflectors

  • Lee, Jae-Young;Yoon, Gi-Wan;Linh, Mai
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.3
    • /
    • pp.108-110
    • /
    • 2006
  • Film bulk acoustic resonators for radio frequency wireless applications are presented. Various simulations and modeling were carried out. The impedance of a five-layered FBAR showed almost the same trend of the wideband characteristics as that of an ideal FBAR, but the characteristics of the higher modes appear to be much more suppressed. In addition, the wideband impedance decreased with increasing device size. The resonance characteristics depend strongly on the physical dimensions.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device (모바일 단말을 이용한 Whitelist 기반 비인가 AP 탐지 및 접속 차단 기법)

  • Park, Jungsoo;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.632-640
    • /
    • 2013
  • In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.

Energy-Efficient Storage with Flash Device in Wireless Sensor Networks (무선 센서 네트워크에서 플래시 장치를 활용한 에너지 효율적 저장)

  • Park, Jung Kyu;Kim, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.975-981
    • /
    • 2017
  • In this paper, we propose a method for efficient use of energy when using flash device in WSN environment. Typical Flash devices have a drawback to be an energy efficient storage media in the energy-constrained WSNs due to the high standby energy. An energy efficient approach to deploy Flash devices into WSNs is simply turning the Flash device off whenever idle. In this regard, we make the simple but ideal approach realistic by removing these two obstacles by exploiting nonvolatile RAM (NVRAM), which is an emerging memory technology that provides both non-volatility and byte-addressability. Specifically, we make use of NVRAM as an extension of metadata storage to remove the FTL metadata scanning process that mainly incurs the two obstacles. Through the implementation and evaluation in a real system environment, we verify that significant energy savings without sacrificing I/O performance are feasible in WSNs by turning off the Flash device exploiting NVRAM whenever it becomes idle. Experimental results show that the proposed method consumes only about 1.087% energy compared to the conventional storage device.

A Secure BLE Integration Authentication System for a BLE Device Control Server based on Physical Web and Eddystone (Physical Web과 Eddystone 기반 BLE 디바이스 컨트롤 서버를 위한 안전한 BLE 통합 인증 시스템)

  • Nam, ChoonSung;Jung, Hyunhee;Shin, Dongryeol
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1094-1103
    • /
    • 2016
  • Physical Web and Eddystone can be serviced by a single integrated application on the device by using their servers' URL. However, they have a limitation that their servers must be customized for service characteristics on a case by case basis. In other words, regardless of the service selected for BLE, it should have a modified linkage application for each device. Hence, we think that a new integrated service platform, which is able to link and support its Beacon from the central server and is also able to support its application, is needed for achieving better service quality. This platform consists of push (Broadcasting for Beacon service) parts and pull (Connection) parts to establish communication. Especially, Pull should be operated and controlled under the authorization (secure) management for safe and trustable communication. It means that BLE must have its new authorization communications protocol to protect its data as much as possible. In this paper, we propose a BLE integrated authorization protocol for a BLE device control server based on Physical Web and Eddystone.

Belongings Position Tracking System using RFID (RFID를 이용한 소지품 위치추적 시스템)

  • Kwun, Jungho;Kim, Jinsu;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.75-81
    • /
    • 2012
  • RFID is new recognition technology which can trace IC chip(built in information) with wireless frequency. The present RFID is used in parcel service, missing child potection system, bus card, and extensive areas. This paper proposes and designs a belongings position tracking system using RFID with GPS. The main features of the proposed system are as follows. First, the system can in real time track the lost belongings. Second, the system can provide lost belonging location information to the users. The performance evaluation of the proposed system is performed by using AVD(Android Virture Device).