• Title/Summary/Keyword: IEEE802.16

Search Result 499, Processing Time 0.028 seconds

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak;Lee, Taek;Yoon, Byung-Sik;Kim, Hyo-Gon;In, Hoh Peter
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.626-633
    • /
    • 2009
  • Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

IEEE 802.16j MMR System for cost-efficient coverage extension (비용 효율적 커버리지 확장을 위한 IEEE 802.16j 모바일 멀티-홉 릴레이 시스템)

  • Lee, Ju-Ho;Lee, Goo-Yeon;Jeong, Choong-Kyo
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.191-197
    • /
    • 2013
  • To complete the "anywhere" mobile service there should not be shaded areas. However, it is never economical to deploy BS's (Base Stations) in a low population density area due to the low resource utilization. We propose a design technique to install RS's(Relay Stations) which are cheaper than BS's and find the condition in which the proposed technique is acceptible. The proposed design technique aims to allocate the frequency and time resources to RS's to minimize the transmission rate degradation due to interferences between RS's as well as to maximize the parallelism in transmission. We showed by simulation that the proposed technique achieves cost benefits when the expected traffic is less than 20.32 percent of the total BS capacity. The proposed technique is compatible with the IEEE 802.16j, thus can be extended to multi-hop configuration.

Fairness-insured Aggressive Sub-channel Allocation and Efficient Power Allocation Algorithms to Optimize the Capacity of an IEEE 802.16e OFDMA/TDD Cellular System

  • Ko, Sang-Jun;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.4
    • /
    • pp.385-398
    • /
    • 2009
  • This paper aims to find a suitable solution to joint allocation of sub-channel and transmit power for multiple users in an IEEE 802.16e OFDMA/TDD cellular system. We propose the FASA (Fairness insured Aggressive Sub-channel Allocation) algorithm, which is a dynamic channel allocation algorithm that considers all of the users' channel state information conditionally in order to maximize throughput while taking into account fairness. A dynamic power allocation algorithm, i.e., an improved CHC algorithm, is also proposed in combination with the FASA algorithm. It collects the extra downlink transmit power and re-allocates it to other potential users. Simulation results show that the joint allocation scheme with the improved CHC power allocation algorithm provides an additional increase of sector throughput while simultaneously enhancing fairness. Four frames of time delay for CQI feedback and scheduling are considered. Furthermore, by addressing the difference between uplink and downlink scheduling in an IEEE 802.16e OFDMA TDD system, we can employ the uplink channel information directly via channel sounding, resulting in more accurate uplink dynamic resource allocation.

Adaptive Scanning Scheme for Mobile Broadband Wireless Networks based on the IEEE 802.16e Standard (802.16e 표준 기반 광대역 무선 이동 망을 위한 동적 스캐닝 기법)

  • Park, Jae-Sung;Lim, Yu-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.151-159
    • /
    • 2008
  • Mobile broadband wireless network is emerging as one of the hottest research areas due to technical advances, and the demands of users who wish to enjoy the same network experience on the move. In this paper, we investigate the handover process at the medium access control (MAC) layer in an IEEE 802.16e-based system. In particular, we identify problems concerned with the scan initiation Process called cell reselection and propose a received signal strength (RSS) estimation scheme to dynamically trigger a scanning process. We show how the RSS estimation scheme can timely initiate a scanning process by anticipating RSS values considering scan duration required.

  • PDF

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

Bridging Solutions for a Heterogeneous WiMAX-WiFi Scenario

  • Fantacci, Romano;Tarchi, Daniele
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.369-377
    • /
    • 2006
  • Recently, the metropolitan area network (MAN) has attracted much attention in telecommunication research and has emerged as one of the most important research topics in the community. Several standards representing the first step for developing metropolitan networks have been published; IEEE 802.16 (WiMAX) has taken a relevant role in reaching the goal of realizing a full-service network all over a urban and suburban area. At the same time, the wireless local area networks (WLAN) have been widely used for in-home or short range communications, mainly basing on the IEEE 802.11 (WiFi) standard. A consequence is the increasing interest in interworking technology, that allows an interconnection between different standards by maintaining certain properties, mainly in terms of quality of service (QoS). One of the major issues is to design bridging devices capable of transparently interconnect different wireless technologies. In this paper, we propose two interconnection bridging solutions between WiMAX and WiFi links; the first is more based on the concept of maintaining a certain end-to-end QoS level independently from the wireless technologies used. The second method is more devoted to the reduction of the implementation complexity at the cost of no QoS assurance. The performance of the two methods are compared by resorting to computer simulations showing the advantages of each one technique.

Development of Embedded RFID R/W System based on Wibro for Constructing u-Transportation (u-Transportation 구축을 위한 교통카드 연동 Wibro 기반 임베디드 RFID R/W 시스템 개발)

  • Chang, Won-Tae;Kim, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.459-462
    • /
    • 2008
  • By using RFID technology in order to manage public traffic management, RFID system and middleware software with PXA255 ARM chip is developed and is capable of operating the traffic card. The developed RFID system consists of 13.56MHz RFID R/W, wireless LAN (IEEE802.11.a/b), Wibro (IEEE802.16), TFT-LCD to display information, and embedded system to collect a charge information, etc. By applying developed system, basic infra-structure capable of supporting various service of u-Traffic can be effectively applied.

  • PDF

Design and Verification of IEEE 802.15.4 LR-WPAN 2.4GHz Base-band for Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 위한 IEEE 802.15.4 LR-WPAN 2.4GHz 베이스 밴드 설계 및 검증)

  • Lee Seung-Yerl;Kim Dong-Sun;Kim Hyun-Sick;Chung Duck-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.49-56
    • /
    • 2006
  • This paper describes the design and the verification of IEEE 802.15.4 LR-WPAN 2.4GHz Physical layer for Ubiquitous Sensor Network(USN). We designed the Carrier Frequency Offset(CFO) compensation satisfied the frequency tolerance of IEEE 802.15.4 LR-WPAN and the adaptive matched filter that re-setting of the threshold for the symbol synchronization of the various USN environment. The multiplications is reduced 1/16 by this method each other at i, q phases and has 0.5dB performance improvement in detection probability. Proposed baseband system is designed with verilog HDL and implemented using FPGA prototype board.

Joint Control of Duty Cycle and Beacon Tracking in IEEE 802.15.4 LR-WPAN (IEEE 802.15.4 저속 WPAN에서 듀티 사이클과 비콘 추적의 통합 제어)

  • Park, Sung-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.1
    • /
    • pp.9-16
    • /
    • 2016
  • Since most of devices in the IEEE 802.15.4 LR-WPAN are expected to operate on batteries, they must be designed to consume energy in a very conservative way. Two energy conservation algorithms are proposed for the LR-WPAN: DDC (Dynamic Duty Cycle) and DBT (Dynamic Beacon Tracking). The DDC algorithm adjusts duty cycle dynamically depending on channel conditions. The DBT algorithm switches beacon tracking mode on and off adaptively depending on traffic conditions. Combining the two algorithms reduces energy consumption more efficiently for a wide range of input loads, while maintaining frame delivery ratio and average delay at satisfactory levels.