• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.035 seconds

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

A Current Review on the Publicness of Electronic Communication Networks: Focused on the Idea of Transport Economics and Network Neutrality (전자 커뮤니케이션 네트워크의 사회적 공공성에 대한 시론: 교통 경제학과 네트워크 중립성 논의를 중심으로)

  • Lee, Young-Joo
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.7-41
    • /
    • 2006
  • This study criticizes the wave of liberalization, privatization, thoughtless and uncontrolled over-competition in the electronic communication networks area. This criticism is based on the 'transport economics' on one side, the 'network neutrality debate' on the other side. Through these standpoints, this study insists that it needs to deal with a social agenda related to the problems such as unplanned and unbalanced development of electronic communication networks, double/tripple-investment in the communication industry, conflicts among network companies and the decline of public values. Also does this study stress on the new ideas in the electronic communication network policy and planning to manage these problems. Electronic communication networks are converging and their borders are blurred. As a result of these flows, the field of information technology, media and contents is faced with radical changes. These changes could be so critical and complicated that nobody can diagnose their multi-level implications. However, the one thing sure is that we should start from the communication networks to think and control a communication system. Therefore, we should discuss and plan the now-and-future of communication infrastructure and its management. we need not only a market mentality but also a socio-cultural mentality. In this respect, this study does insist that it requires the vision of digital democracy and democratic communication ecology to put the steps toward social communication system.

  • PDF

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.

Remote Monitoring with Hierarchical Network Architectures for Large-Scale Wind Power Farms

  • Ahmed, Mohamed A.;Song, Minho;Pan, Jae-Kyung;Kim, Young-Chon
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1319-1327
    • /
    • 2015
  • As wind power farm (WPF) installations continue to grow, monitoring and controlling large-scale WPFs presents new challenges. In this paper, a hierarchical network architecture is proposed in order to provide remote monitoring and control of large-scale WPFs. The network architecture consists of three levels, including the WPF comprised of wind turbines and meteorological towers, local control center (LCC) responsible for remote monitoring and control of wind turbines, and a central control center (CCC) that offers data collection and aggregation of many WPFs. Different scenarios are considered in order to evaluate the performance of the WPF communications network with its hierarchical architecture. The communications network within the WPF is regarded as the local area network (LAN) while the communication among the LCCs and the CCC happens through a wide area network (WAN). We develop a communications network model based on an OPNET modeler, and the network performance is evaluated with respect to the link bandwidth and the end-to-end delay measured for various applications. As a result, this work contributes to the design of communications networks for large-scale WPFs.

Capacity Analysis of UWB Networks in Three-Dimensional Space

  • Cai, Lin X.;Cai, Lin;Shen, Xuemin;Mark, Jon W.
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.287-296
    • /
    • 2009
  • Although asymptotic bounds of wireless network capacity have been heavily pursued, the answers to the following questions are still critical for network planning, protocol and architecture design: Given a three-dimensional (3D) network space with the number of active users randomly located in the space and using the wireless communication technology, what are the expected per-flow throughput, network capacity, and network transport capacity? In addition, how can the protocol parameters be tuned to enhance network performance? In this paper, we focus on the ultra wideband (UWB) based wireless personal area networks (WPANs) and provide answers to these questions, considering the salient features of UWB communications, i.e., low transmission/interference power level, accurate ranging capability, etc. Specifically, we demonstrate how to explore the spatial multiplexing gain of UWB networks by allowing appropriate concurrent transmissions. Given 3D space and the number of active users, we derive the expected number of concurrent transmissions, network capacity and transport capacity of the UWB network. The results reveal the main factors affecting network (transport) capacity, and how to determine the best protocol parameters, e.g., exclusive region size, in order to maximize the capacity. Extensive simulation results are given to validate the analytical results.

The Development of LED Lighting Controller based on the PAN (PAN 기반의 LED 조명 제어 장치 개발)

  • Ohm, Woo-Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.145-152
    • /
    • 2016
  • The usage of LED(Light Emitting Diode) has been rapidly increased and energy efficient management of LED light system is regarded as an important technology to enhance the energy efficiency. In this paper, we design and implementation of LED lighting controller which can control the LED lighting by using the wire and wireless communication technology based on the LAN(Local Area Network) and PAN(Personal Area Network). The implemented system can reduce the cost of LED lighting installing and avoids complicated wiring problem. And it is possible to minimize power consumption through automatic or manual LED control that they wished. In experimental results, the implemented LED lighting controller was satisfactory for all of the desired functions.

Channel Characterization and Transmission Efficiency Analysis of Wireless Body Area Network (WBAN 채널 특성과 전송 효율 분석)

  • Ahn, Byoung-Jik;Song, Seong-Moo;Kim, Sun-Woo;Choi, Jae-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.985-994
    • /
    • 2012
  • This paper presents the real channel measurements and investigates their statistical characterization in wireless body area network(WBAN). In on-/off body channel, the measurements are performed with some representative human movements for considering human movements. Moreover, three signal transmission schemes with outage constraint are studied for getting total power consumption in each transmission scheme. Using the real channel measurements, between theoretical and realistic simulation are compared. This paper shows that power efficiency is improved through cooperative communication, and how much position of sensor node and human movement affect signal transmission power.