• Title/Summary/Keyword: Key Issues

Search Result 1,704, Processing Time 0.026 seconds

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.

STABILIZATION AND RECLAMATION OF OLD LANDFILL DISPOSAL SITES

  • Kemper P.E., Charles C.
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 1996.12a
    • /
    • pp.87-95
    • /
    • 1996
  • The stabilization and reclamation of old disposal sites is becoming more important as significant numbers of disposal sites are closed and abandoned. This technical paper covers an overview of the key issues and methodologies for stabilizing and constructing facilities on old landfills. The slide portion of this presentation also include photographs showing actual construction activities. The key issues that are prevalent in remediating and closing old landfills are : correcting the stormwater flow, leachate breakout, constructing cover caps, controlling landfill gas migration and odors, cleanup groundwater and stabilizing side slopes. Some key techniques for constructing facilities on old landfills include: use of piling, installation of active landfill gas systems, providing LFG barriers under buildings, using utilidors and flexible utility interfaces and designing for site settlement. This Paper provides proven conceptual methods for solving these problems.

  • PDF

Quorum based Peer to Peer Key Sharing Protocol over Wireless Sensor Networks

  • Yang, Soong-Yeal;Won, Nam-Sik;Kim, Hyun-Sung;Lee, Sung-Woon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.445-448
    • /
    • 2008
  • The key establishment between nodes is one of the most important issues to secure the communication in wireless sensor networks. Some researcher used the probabilistic key sharing scheme with a pre-shared key pool to reduce the number of keys and the key disclosure possibility. However, there is a potential possibility that some nodes do not have a common share in the key pool. The purpose of this paper is to devise a peer to peer key sharing protocol (PPKP) based on Quorum system and Diffie-Hellman key exchange scheme (DHS). The PPKP establishes a session key by creating a shared key using the DHS and then scrambles it based on Quorum system to secure that. The protocol reduces the number of necessary keys than the previous schemes and could solve the non-common key sharing possibility problem in the probabilistic schemes.

  • PDF

Distribution System and the Environment (환경과 유통시스템)

  • Sejo Oh;Lim, Young-Kyun
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2000.10a
    • /
    • pp.183-185
    • /
    • 2000
  • A proactive approach on environmental issues may be one of critical competitive factors for global business in near future. Especially, distribution systems are very related to the various environmental issues, including development of green products and packaging, selection of the transportation vehicles and pallets, design of retail stores and distribution facilities, participation for solving the local environmental problems, and so on. In order to approach the environmental issues on distribution systems, for the first time managers need to understand the strategic framework for green management and then, to find the key success factors of leading companies in this field. Finally, future directions of strategic green management on distribution systems are discussed and shared.

  • PDF

Traffic control issues for ATM networks (ATM 망에 대한 트래픽 제어의 문제점 분석)

  • 최영철;조유제;최문기
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.179-182
    • /
    • 1991
  • In this paper, we survey traffic control issues for the B-ISDN based on the ATM. We first investigate traffic descriptors to represent the characteristics of various ATM traffics in a standardized form. Also, we examine key issues related to the connection admission control, usage parameter control, network parameter control, priority control, and congestion control.

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.