• Title/Summary/Keyword: Device-to-device communications

Search Result 756, Processing Time 0.026 seconds

Multi-Device-to-Multi-Device Communication for Efficient Contents Distribution on Board the Ship (선박 내 효과적인 콘텐츠 분배를 위한 다중 단말 간 직접통신)

  • You, Dongho;Kwon, Eunjeong;Kim, Dong Ho;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.681-687
    • /
    • 2014
  • Internet traffic is rapidly increasing due to the spread of personal smart devices. It causes serious burden on base stations and access points which are installed in buildings, buses, trains, and ships. We consider a communication scenario aboard a cruise ship and propose efficient contents distribution schemes to alleviate the burden of access points with multi-device-to-multi-device(MD2MD) communication. The proposed transmission method is based on the hybrid STBC-SM scheme. We compare the error performance of MD2MD communication system on the cruise ship using space-time block coding (STBC) scheme, spatial multiplexing (SM) scheme. The proposed MD2MD communication system is expected to adopt in the ship-area-network (SAN) with efficient contents distribution and reliable communication.

Transmitting/Receiving of Standard Health Data Using Bluetooth HDP on the Android Platform (안드로이드에서 블루투스 HDP를 이용한 표준건강정보의 송수신)

  • Park, Young-Jin;Cho, Hui-Sup;Son, Jong-Wuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.464-470
    • /
    • 2013
  • These days, with increasing interest about the health care, research about standard for transmitting/receiving data of health device has been actively conducted. Standardization and testing / certification is underway through the IEEE 11073 PHD, Health Level Seven and the Continua Health Alliance, it'll continue to be more research and experiments in the future. In this paper, we introduce the IEEE 11073 PHD standards for exchange of remote health information and the Bluetooth Health Device Profile(HDP) for health device profile of the Bluetooth technology, also we conducted experiments about exchange health information between health device and smart device which are adapted the IEEE 11073 PHD and Bluetooth HDP. Transmitting/receiving of the IEEE 11073 PHD standard protocol using the Bluetooth HDP profile between health device and smart device can be known by this experiment, and it expect to implement variety of remote medical services through health device supporting these standards in future.

Shared Relay-Based Interference Management Schemes for Device-to-Device Radio Underlaying Cellular Networks (셀룰러 네트워크상의 D2D 통신을 위한 공유릴레이 기반 간섭 관리 기법)

  • Yang, Mochan;Wu, Shanai;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.371-380
    • /
    • 2013
  • D2D (Device-to-Device) communication on an underlying cellular infrastructure which exploits the same spectrum has several advantages such as increased resource utilization and improved cellular coverage. However, D2D communication system needs to cope with ICI (Inter-Cell Interference) and interference between cellular and D2D links. As a result, macro UEs (User Equipments), especially those located near cell edge, will suffer from serious link performance degradation. We propose a novel interference avoidance mechanism assisted by SRN (Shared Relay Node) in this paper. SRN not only performs data re-transmission as a usual Type II relay but also has several features newly defined to avoid interference between cellular and D2D links. In particular, we suggest resource allocation methods based on the SRN for effective interference avoidance, and evaluate their performance through computer simulations.

Study on Separation Distance to Protect Radio Service from Inductive System (유도성 시스템으로부터 무선기기 보호를 위한 이격 거리에 관한 연구)

  • Lee, Il-Kyoo;Shim, Yong-Sup;Min, Kyoung-Il;Cha, Jae-Sang;Lee, Kyong-Gun
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.1
    • /
    • pp.103-108
    • /
    • 2011
  • This paper is related radio interference from inductive system to radio device in home and industrial environment according to increasing the usage of inductive system. In order to analyze interference from magnetic field strength of inductive system, interference model was suggested and explain the method to calculate separation distance by using conversion that from magnetic field strength to magnetic dipole moment based on suggested interference model. Also, scenario that interference occur between inductive system and radio device was shown and the separation distance between inductive system and radio device was calculate with that scenario. The suggested method in this paper will be used to secure the compatibility between inductive system and radio device.

Effective Interference Alignment for Device-to-Device Communication Underlaid in Multi-Cell Interference Network (다중셀 간섭 네트워크와 중첩된 D2D 통신을 위한 효과적인 간섭 정렬 기법)

  • Qu, Xin;Kang, Chung Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.3
    • /
    • pp.161-163
    • /
    • 2014
  • We consider the device-to-device (D2D) communication underlaying multi-cell interference system, in which the cellular downlink (DL) resource is reused by K cells and two D2D transmission links within each cell. In this paper, it has been shown that the downlink intra-cell and inter-cell interference can be effectively handled by interference alignment (IA) technique, as long as the simultaneous D2D links are properly selected or power-controlled so that they may not incur interference to the base stations in the same and neighbor cells. In particular, we provides the IA technique that can achieve the theoretically maximum possible degree of freedom (DOF), demonstrating that a total of (K+1)M degrees of freedom (DOFs) can be achieved for K-cell interference system with two underlaying D2D links, where base stations, cellular UE's, and D2D UE's all have M transmit and receive antennas.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

Frequency Resource Obtaining Method Based on D2D Device Discovery in Public Safety Communication Networks (재난 무선통신을 위한 D2D 단말탐색 기반 주파수 자원 확보 기술)

  • Wu, Shanai;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1440-1442
    • /
    • 2016
  • As long term evolution (LTE) is the most widely deployed broadband communication technology so far, efforts are being made to develop LTE-based mission critical public safety (PS) communication systems. In this paper, we propose a device-to-device (D2D) discovery-based radio resource acquisition scheme to support the LTE D2D communication to PS systems and the realization of resource forwarding for user equipments in emergency area.

Effective Parent-Child Key Establishment Algorithm used ZigBee Sensor Network (ZigBee 센서네트워크에서 효율적인 Parent - Child 키 연결 알고리즘)

  • Seo, Dae-Youl;Kim, Jin-Chul;Kim, Kyoung-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.35-45
    • /
    • 2006
  • Coordinator is defining so that function as most trust center that is point in security in ZigBee Alliance. Because must do height connection with coordinator in device signing to PAN newly, coordinator has shortcoming that subordinate is revealed to danger directly to Centered and cattish device. When do height connection some device, do not become problem, but if network is huge, coordinator's subordinate shall increase as traffic quantity which happen in coordinator increases. Also, in ZigBee security to link network kina of transmission and mutually certification in ZigBee Alliance standard include, but I do not provide method to deliver master key in each node safely. Because process that transmit master key passes through channel that do not secure, master key has shortcoming that is revealed directly. In this paper, I suggested Parent-Child key establishment algorithm to solve these problem. Proposed algorithm consists of two structures. Master key establishment algorithm and device that sign to PAN newly that can use one-way Hash chain and transmit master key safety are consisted of Parent-Child network key establishment algorithm that do child node and parent node key establishment as can do key establishment efficiently. Method that device proposes in case method that propose in case have master key establishment time was shown better performance $200{\sim}1300ms$ than existing method, and device does not have master key than existing method height connect time about $400{\sim}500ms$ better performance see.

Development of UAV Teleoperation Virtual Environment Based-on GSM Networks and Real Weather Effects

  • AbdElHamid, Amr;Zong, Peng
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.16 no.3
    • /
    • pp.463-474
    • /
    • 2015
  • Future Ground Control Stations (GCSs) for Unmanned Aerial Vehicles (UAVs) teleoperation targets better situational awareness by providing extra motion cues to stimulate the vestibular system. This paper proposes a new virtual environment for long range Unmanned Aerial Vehicle (UAV) control via Non-Line-of-Sight (NLoS) communications, which is based on motion platforms. It generates motion cues for the teleoperator for extra sensory stimulation to enhance the guidance performance. The proposed environment employs the distributed component simulation over GSM network as a simulation platform. GSM communications are utilized as a multi-hop communication network, which is similar to global satellite communications. It considers a UAV mathematical model and wind turbulence effects to simulate a realistic UAV dynamics. Moreover, the proposed virtual environment simulates a Multiple Axis Rotating Device (MARD) as Human Machine Interface (HMI) device to provide a complete delay analysis. The demonstrated measurements cover Graphical User Interface (GUI) capabilities, NLoS GSM communications delay, MARD performance, and different software workload. The proposed virtual environment succeeded to provide visual and vestibular feedbacks for teleoperators via GSM networks. The overall system performance is acceptable relative to other Line-of-Sight (LoS) systems, which promises a good potential for future long range, medium altitude UAV teleoperation researches.

A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment

  • Konidala M. Divyan;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.669-685
    • /
    • 2003
  • Nowadays mobile phones and PDAs are part and parcel of our lives. By carrying a portable mobile device with us all the time we are already living in partial Pervasive Computing Environment (PCE) that is waiting to be exploited very soon. One of the advantages of pervasive computing is that it strongly supports the deployment of Location-Based Service(s) (LBSs). In PCE, there would be many competitive service providers (SPs) trying to sell different or similar LBSs to users. In order to reserve a particular service, it becomes very difficult for a low-computing and resource-poor mobile device to handle many such SPs at a time, and to identify and securely communicate with only genuine ones. Our paper establishes a convincing trust model through which secure job delegation is accomplished. Secure Job delegation and cost effective cryptographic techniques largely help in reducing the burden on the mobile device to securely communicate with trusted SPs. Our protocol also provides users privacy protection, replay protection, entity authentication, and message authentication, integrity, and confidentiality. This paper explains our protocol by suggesting one of the LBSs namely“Secure Automated Taxi Calling Service”.

  • PDF