• Title/Summary/Keyword: Internet-enabling Device

Search Result 28, Processing Time 0.027 seconds

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

Things Recommendation Method using Social Relationship in Social Internet of Things (소셜 사물인터넷에서 소셜 관계를 이용한 사물 추천 기법)

  • Kim, Sung Rim;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.49-59
    • /
    • 2014
  • The Internet of Things(IoT) is a new promising technology made from a variety of technology. The IoT links the objects or people, then enabling anytime, anywhere connectivity for anything and not only for anyone. Social networking services have changed the way people communicate. Recently, new research challenges in many areas of Internet of things and social networking services are fired. In this paper, we propose things recommendation method using social relationship in social Internet of Things. We study previous researches about social network service, IoT, and social IoT. We proposed SIoT_FW(Social IoT Friendship Weight) using static and a dynamic social friendship weight. Also, our method considers four social relationships (Ownership Object Relationship, Co-Location Object Relationship, Social Object Relationship, Parental Object Relationship). We presents a music device scenario using our proposed method.

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin;Chen, Mingkai;Wei, Xin;Li, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1984-2002
    • /
    • 2020
  • With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

A Set-top Box with Virtual Platform Support for QoS Management in IMS Based Multiple Provider Networks

  • Siddiqui, Muhammad Shoaib;Hong, Choong-Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.886-905
    • /
    • 2012
  • Set-top Box (STB) has evolved from being a device just sitting on top of a TV shelf to a device providing a gateway to the Internet for a home network, receiving services from multiple content providers, and enabling and ensuring Quality of Service (QoS) for the streaming media. IP Multimedia Subsystem (IMS), with its promise to provide a converged access network for multimedia service delivery (such as Triple play & Quadruple play services), has to guarantee QoS support. To enable QoS in IMS-based networks, we have designed a set-top box which provides feedback to the service provider to ensure end-to-end QoS. Our set-top box is designed to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own multimedia streams and ensures the desired network performance for each flow. The set-top box also works as a Home Gateway and provides end-to-end QoS support to the client nodes.

Development of TPMS Device and Mobile App System for Marine Emergency Notification (해양 응급상황 알림을 위한 TPMS 디바이스와 모바일 앱 시스템 개발)

  • Dong-Hwan Gong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.49-53
    • /
    • 2024
  • Maritime safety is a critical factor in protecting lives from accidents at sea and fostering a safer marine environment. In this study, we developed a TPMS device aimed at enhancing maritime safety, providing technological solutions for detecting accidents at sea and enabling swift responses. The device utilizes a Tube Pressure Monitoring System (TPMS) to detect tube expansion and is designed to collect real-time data and communicate with surrounding devices for rapid responses. Experimental results confirm the effective detection of pressure by TPMS (Tube Pressure Monitoring System) and stable data transmission and reception with the main IoT device. Additionally, a mobile app capable of receiving emergency alert messages and accessing information for rapid responses in emergency situations was developed. The developed device and mobile app encompass technology applicable not only in the maritime safety field but also in various other application areas, with potential for expanded application in real-world scenarios in the future. These results are expected to contribute to enhancing safety in the marine environment.

DLNA Protocol Inspection Tool for Compatibility Analysis

  • Park, Se-Ho;Park, Yong-Suk;Seo, Jeong-Wook;Choi, Jun-Rim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2104-2117
    • /
    • 2014
  • The propagation of smart devices and the rapid expansion of wireless mobile networks have increased the need for ubiquitous device connectivity and contents access. DLNA is currently being used as the de facto standard for connectivity of consumer devices in the digital home. The guidelines provided by DLNA are intended to facilitate device and contents discovery, management, sharing and distribution. However, consumer experience with DLNA has been rather poor and usability not up to speed. Different problems and issues in limited compatibility have been reported due to manufacturer customizations. Such compatibility issues are often difficult to identify by average consumers who are not savvy in information communications and multimedia technology. In this paper, the design and implementation of a DLNA protocol inspection tool is presented for compatibility analysis among DLNA certified devices. The tool monitors the home network and performs analysis of the underlying protocols used by DLNA. The tool can be used for diagnostics and troubleshooting, enabling the user to identify compatibility issues between devices or problems in the network.

Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks

  • Sun, Guolin;Al-Ward, Hisham;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.514-535
    • /
    • 2019
  • Information-centric networks operate under the assumption that all network components have built-in caching capabilities. Integrating the caching strategies of information centric networking (ICN) with wireless virtualization improves the gain of virtual infrastructure content caching. In this paper, we propose a framework for software-defined information centric virtualized wireless device-to-device (D2D) networks. Enabling D2D communications in virtualized ICN increases the spectral efficiency due to reuse and proximity gains while the software-defined network (SDN) as a platform also simplifies the computational overhead. In this framework, we propose a joint virtual resource and cache allocation solution for latency-sensitive applications in the next-generation cellular networks. As the formulated problem is NP-hard, we design low-complexity heuristic algorithms which are intuitive and efficient. In our proposed framework, different services can share a pool of infrastructure items. We evaluate our proposed framework and algorithm through extensive simulations. The results demonstrate significant improvements in terms of visiting latency, end user QoE, InP resource utilization and MVNO utility gain.

Real time instruction classification system

  • Sang-Hoon Lee;Dong-Jin Kwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.212-220
    • /
    • 2024
  • A recently the advancement of society, AI technology has made significant strides, especially in the fields of computer vision and voice recognition. This study introduces a system that leverages these technologies to recognize users through a camera and relay commands within a vehicle based on voice commands. The system uses the YOLO (You Only Look Once) machine learning algorithm, widely used for object and entity recognition, to identify specific users. For voice command recognition, a machine learning model based on spectrogram voice analysis is employed to identify specific commands. This design aims to enhance security and convenience by preventing unauthorized access to vehicles and IoT devices by anyone other than registered users. We converts camera input data into YOLO system inputs to determine if it is a person, Additionally, it collects voice data through a microphone embedded in the device or computer, converting it into time-domain spectrogram data to be used as input for the voice recognition machine learning system. The input camera image data and voice data undergo inference tasks through pre-trained models, enabling the recognition of simple commands within a limited space based on the inference results. This study demonstrates the feasibility of constructing a device management system within a confined space that enhances security and user convenience through a simple real-time system model. Finally our work aims to provide practical solutions in various application fields, such as smart homes and autonomous vehicles.