• Title/Summary/Keyword: Machine-Type Communications

Search Result 39, Processing Time 0.025 seconds

Key Management for Group-based Device-to-Device Communications in LTE-Advanced (LTE-Advanced에서 그룹 기반의 단말 간 직접 통신을 위한 키 관리 기법)

  • Choi, Dae-Sung;Hong, Sung-Dae;Kim, Seung-Ryong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.541-543
    • /
    • 2013
  • 사람이 개입할 필요 없이 기기 및 사물들을 셀룰러 망으로 연결하여 언제 어디서나 다양한 서비스를 제공하는 MTC(Machine Type Communications)는 차세대 통신의 주요 이슈로 고려되고 있다. 하지만 MTC 환경은 다수의 단말들이 존재하기 때문에 LTE-Advanced 네트워크에 상당한 혼잡과 부하 문제를 줄 수 있다. 이 문제를 해결하기 위해 단말 간 직접 통신 기술이 등장하였다. 본 논문에서는 단말 간 직접 통신에서 eNB와의 통신을 줄이고, 그룹 간의 안전한 통신이 가능한 그룹 키 관리 기법을 제안하고, 이에 따른 연산 및 통신 오버헤드를 분석한다.

Proposal of USN Configuratation and Routing Scheme Inside a Ship (선박 내 센서 노드 구성 및 라우팅 제안)

  • Lee, Seong Ro;Jeong, Min-A;Kim, Yeongeun;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.660-666
    • /
    • 2014
  • In this paper, we consider a classification criteria of sensor nodes based on equipment function, and propose a routing search algorithm between node when an IP-USN is applied inside a ship. whereas a tree-type routing algorithm is applied to the limited mobile enviroment, such as engine room or machine room, a mesh-type routing alogrithm is to free mobile enviroment, such as passager corridor liviing quarters or restanrats areas. For mesh-type routing, it is necessary to maintain a seamless route path between a sink node and sensor nodes for which we consider a novel message exchange periodically. We proposed a new message, RDES message, which is issued periodically to update the topology of sensor node and check a connectivity between nodes.

Proposal and Throughput Analysis of a Management Scheme for MTC Device Clustering Service (MTC 장치 클러스터링 서비스 관리 방안 제안 및 성능분석)

  • Kim, Yeon Geun;Min, Sang Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.157-165
    • /
    • 2017
  • Intelligent transportation systems are currently being developed for elemental technology development of cooperative intelligent transport systems, which enable vehicles to communicate with each other or reduce the risk of traffic accidents, We have been defining and standardizing services according to the purpose of solving traffic safety problems depending on countries. Therefore, in this study, the developed countries of V2X(vehicle-to-everything) based on USA, Europe, Japan, etc., analyzed the service cases selected in the field demonstration stage after completion of the element technology devanalyzed the service cases selected in the field demonstration stage after completion of the element technology development, and to suggest the direction of futureelopment, and to suggest the direction of future policy direction.

Introducing the Latest 3GPP Specifications and their Potential for Future AMI Applications

  • Koumadi, Koudjo M.;Park, Byong-seok;Myoung, Nogil
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.2
    • /
    • pp.245-251
    • /
    • 2016
  • Despite the exponential throughput improvement in mobile communications systems, their ability to satisfy requirements of state-of-the-art and future applications of advanced metering infrastructure (AMI) is still under investigation. Challenges are mainly due to the inadequacy of third generation partnership project (3GPP) networks to support large amounts of devices simultaneously, while the number of AMI end-devices and the frequency of their data transmission increase with new AMI-based applications. In this introductory survey, innovative and future AMI applications and their communication requirements are first reviewed. Then, we identify challenges of 3GPP long term evolution (LTE) in enabling future AMI applications. More importantly, the latest improvements to LTE-A standard release 12 and 13 are reviewed and analyzed with regards to their potential to improve the quality of LTE-enabled AMI. It is found that 3GPP enhancements on machine type communications (MTC) standards will significantly enhance AMI communications. Beyond MTC specifications, non-MTC-specific enhancements such as carrier aggregation and multi-connectivity for user equipment will also contribute greatly to improving reliability and availability of AMI devices. The paper's focus is towards improved backhaul support for innovative and future AMI applications, beyond traditional automatic meter reading.

5G Wireless Communication Technology for Non-Terrestrial Network (비지상네트워크를 위한 5G 무선통신 기술)

  • Kim, J.H.;Yoon, M.Y.;You, D.H.;Lee, M.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.51-60
    • /
    • 2019
  • As a way to further expand and enable the 5G ecosystem, the $3^{rd}$ Generation Partnership Project (3GPP) is considering the development of a 5G new radio (NR)-based non-terrestrial network (NTN). These NTNs are expected to provide ubiquitous 5G services to user's equipment (especially, in Internet of Things/machine-type communications (IoT/MTC) public safety, and critical communications) by extending service coverage to areas not covered by 5G terrestrial networks. To this end, this NTN is developing scenarios to provide 5G services using spaceborne vehicles, such as geosynchronous and low-Earth orbit satellites, and airborne vehicles, such as unmanned aircraft systems, including high-altitude pseudo-satellites. In addition, various technologies are being studied to satisfy new requirements not considered in 5G NR, such as long propagation delay time, large cell coverage, large Doppler effect, and base station movement. In this paper, we present the scenarios, requirements, technical issues and solutions, and standardization planning for NR-based NTN in 3GPP.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

The Management and Security Plans of a Separated Virtualization Infringement Type Learning Database Using VM (Virtual Machine) (VM(Virtual Machine) 을 이용한 분리된 가상화 침해유형 학습 데이터베이스 관리와 보안방안)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.947-953
    • /
    • 2011
  • These days, a consistent and fatal attack attribute toward a database has proportionally evolved in the similar development form to that of security policy. Because of access control-based defensive techniques regarding information created in closed networks and attacks on a limited access pathway, cases of infringement of many systems and databases based on accumulated and learned attack patterns from the past are increasing. Therefore, the paper aims to separate attack information by its types based on a virtual infringement pattern system loaded with dualistic VM in order to ensure stability to limited certification and authority to access, to propose a system that blocks infringement through the intensive management of infringement pattern concerning attack networks, and to improve the mechanism for implementing a test that defends the final database, the optimal defensive techniques, and the security policies, through research.

AN ASSESSMENT OF PARALLEL PRECONDITIONERS FOR THE INTERIOR SPARSE GENERALIZED EIGENVALUE PROBLEMS BY CG-TYPE METHODS ON AN IBM REGATTA MACHINE

  • Ma, Sang-Back;Jang, Ho-Jong
    • Journal of applied mathematics & informatics
    • /
    • v.25 no.1_2
    • /
    • pp.435-443
    • /
    • 2007
  • Computing the interior spectrum of large sparse generalized eigenvalue problems $Ax\;=\;{\lambda}Bx$, where A and b are large sparse and SPD(Symmetric Positive Definite), is often required in areas such as structural mechanics and quantum chemistry, to name a few. Recently, CG-type methods have been found useful and hence, very amenable to parallel computation for very large problems. Also, as in the case of linear systems proper choice of preconditioning is known to accelerate the rate of convergence. After the smallest eigenpair is found we use the orthogonal deflation technique to find the next m-1 eigenvalues, which is also suitable for parallelization. This offers advantages over Jacobi-Davidson methods with partial shifts, which requires re-computation of preconditioner matrx with new shifts. We consider as preconditioners Incomplete LU(ILU)(0) in two variants, ever-relaxation(SOR), and Point-symmetric SOR(SSOR). We set m to be 5. We conducted our experiments on matrices from discretizations of partial differential equations by finite difference method. The generated matrices has dimensions up to 4 million and total number of processors are 32. MPI(Message Passing Interface) library was used for interprocessor communications. Our results show that in general the Multi-Color ILU(0) gives the best performance.

Simplification of Device-Triggered Reporting Procedure on 3GPP GERAN Cellular IoT Communications (3GPP GERAN CIoT 환경에서 디바이스 Triggering 기반 Reporting 절차 간소화 방안)

  • Kim, Jun Suk;Shin, Jung Wan;Chung, Min Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.1
    • /
    • pp.80-83
    • /
    • 2016
  • In this paper, a simplified uplink transmission procedure is proposed for reducing energy consumption and improving lifetime of CIoT devices. In the proposed procedure, the CIoT devices register information on their service and traffic to the networks, and the networks statically allocate pre-defined amounts of radio resources when the CIoT devices have requested permission for their uplink transmissions. This paper provides details of the proposed procedure comparing with those of the current GSM procedure, and defines detailed operations of the devices and the networks for the proposed one. This shows that the proposed scheme can effectively support CIoT services on GSM networks.