• Title/Summary/Keyword: Personal Communication Networks

Search Result 157, Processing Time 0.023 seconds

Tuning Backoff Period for Enhancing System Throughput with Estimating Number of Devices in IEEE 802.15.4 Slotted CSMA/CA (IEEE 802.15.4 슬롯 기반 CSMA/CA에서 시스템 처리율 향상을 위한 단말 수 추정을 통한 백오프 기간 튜닝 기법)

  • Lee, Won Hyoung;Hwang, Ho Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1243-1249
    • /
    • 2018
  • In this paper, we propose a scheme that tunes the backoff period for enhancing the system throughput with estimating the number of devices in IEEE 802.15.4 slotted carrier sense multiple access with collision avoidance (CSMA/CA) networks. Since each device does not sense the channel always in IEEE 802.15.4 slotted CSMA/CA networks, a personal area network (PAN) coordinator is used to estimate the number of active devices. The PAN coordinator broadcasts an optimal backoff period for the estimated number of devices through a beacon frame. In order to estimate the number of devices in run time, a simple moving average filter is utilized. We show the performance of our proposed scheme in terms of the estimated number of devices and the system throughput. The simulation results show that our proposed scheme can obtain higher system throughput than the IEEE 802.15.4 standard.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

A Study on the Structure and Characteristics of Social Games (소셜 게임의 구조와 특징에 대한 연구)

  • Jeon, Gyong-Ran
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.13-22
    • /
    • 2011
  • In the digital media environment, the convergence is in the progress creating the new service and contents by users and developing the new needs of users by the service and contents as well. Social games are actualizing the new meaning of convergence. shows not only a new situation blurring the boundary of work and leisure, labor and playing and private and public sector, but how meaningful it is to make connection of social interactions and social assets a solid network. As the most popular social game text, reveals how the personal connections and personal networks constructs the social capital by making the ritual communication more interesting and flexible to the social gamers.

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.

The Interaction Effects between Synchronous CMC Technology and Task Networks : A Perspective of Media Synchronicity Theory

  • Yang, Hee-Dong;Kim, Min-Soo;Park, Chul-Woo
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.479-491
    • /
    • 2008
  • A "task network" is a type of social network that consists of experts who exchange professional help and advice regarding executing tasks. In this study, we investigate the task network used within the IS department of a national bank in Korea. We identify how this network moderates the influence of computer-mediated communication (CMC) technology on an individual s task performance. Size, density, and centrality were measured as the characteristics of a personal task networks. Size equates to the total number of colleagues who work with a specific member for a certain project. Density is the ratio of the number of actual relationships to the total number of available relationships. Centrality defines whether an individual s position is in the exact center of whole network, and is measured by betweenness centrality, meaning the position one member holds between others in a network. Our findings conclude that the conditions - the larger the size of the task network, the smaller its density and the higher its level of centrality - lead to more benefits of using CMC media. Further, this positive effect of CMC is more noticeable when it provides synchronicity.

  • PDF

A Design of Wireless Sensor Node Using Embedded System (임베디드 시스템을 활용한 무선 센서 노드설계)

  • Cha, Jin-Man;Lee, Young-Ra;Park, Yeon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.623-628
    • /
    • 2009
  • The emergence of compact and low-power wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage allows for entirely the new kinds of embedded systems. These systems are distributed and deployed in environments where they may have been designed into a particular control method, and are often very dynamic. Collection of devices can communicate to achieve a higher level of coordinated behavior. Wireless sensor nodes deposited in various places provide light, temperature, and activity measurements. Wireless sensor nodes attached to circuits or appliances sense the current or control the usage. Together they form a dynamic and multi-hop routing network connecting each node to more powerful networks and processing resources. Wireless sensor networks are a specific-application and therefore they have to involve both software and hardware. They also use protocols that relate to both applications and the wireless network. Wireless sensor networks are consumer devices supporting multimedia applications such as personal digital assistants, network computers, and mobile communication devices. Wireless sensor networks are becoming an important part of industrial and military applications. The characteristics of modem embedded systems are the capable of communicating adapting the different operating environments. In this paper, We designed and implemented sensor network system which shows through host PC sensing temperature and humidity data transmitted for wireless sensor nodes composed wireless temperature and humidity sensor and designs sensor nodes using embedded system with the intention of studying USN.

SNS disclosure of personal information in M2M environment threats and countermeasures (M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안)

  • Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.

Performance Evaluation of Signal Detection Algorithms for MB-OFDM (MB-OFDM을 위한 신호 획득 알고리즘 성능 평가)

  • Kim, Hae-Lyong;Lee, Yu-Sung;Park, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.15-18
    • /
    • 2004
  • A high data rate Wireless Personal Area Networks (WPAN) system is a hot issue in wireless communication communities and being standardized. Multi-band Orthogonal Frequency Division Multiplexing (MB-OFDM) is one of the candidates for WPAN standard. In this paper, we discuss the PLCP (Physical Layer Convergence Protocol) structure for MB-OFDM. Also we evaluate the performance of two signal detection algorithms, which are the method of cross-correlation with the original preamble and the signed preamble. The latter has a low complexity with a little degradation.

  • PDF

Time-Slotted Scheduling Schemes for Multi-hop Concurrent Transmission in WPANs with Directional Antenna

  • Bilal, Muhammad;Kang, Moonsoo;Shah, Sayed Chhattan;Kang, Shin-Gak
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.374-384
    • /
    • 2014
  • To achieve high-speed (giga-bit) connectivity for short-range wireless multimedia applications, the millimeter-wave (mmWave) wireless personal area networks with directional antennas are gaining increased interest. Due to the use of directional antennas and mmWave communications, the probability of non-interfering transmissions increases in a localized region. Network throughput can be increased immensely by the concurrent time allocation of non-interfering transmissions. The problem of finding optimum time allocation for concurrent transmissions is an NP-hard problem. In this paper, we propose two enhanced versions of previously proposed multi-hop concurrent transmission (MHCT) schemes. To increase network capacity, the proposed schemes efficiently make use of the free holes in the time-allocation map of the MHCT scheme; thus, making it more compact.

Performance study for collision in non-beacon mode and beacon mode of IEEE 802.15.4 wireless network (IEEE 802..15.4 무선 네트워크의 non-beacon 모드와 beacon 모드에서의 collision에 관한 성능 연구)

  • Lee, Yoo-Jin;Nam, Heung-Woo;An, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.616-620
    • /
    • 2006
  • IEEE 802.15.4 is designed for low-rate wireless personal area networks (LR_WPAN) and it attempts to provide a low data rate, low power, low cost wireless networking on the device-level communication. In this paper, I have established a realistic environment for the effect of collision in nonbeacon-enabled mode and beacon enabled mode. The data throughput and delivery ratio are investigated as the performance metrics.

  • PDF