• Title/Summary/Keyword: Ping Pong algorithm

Search Result 11, Processing Time 0.027 seconds

Ping Pong Stream cipher of Using Logistic Map (로지스틱 맵을 활용한 Ping Pong 스트림 암호)

  • Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.326-329
    • /
    • 2017
  • Most modern computer communications and storage media support encryption technology. Many of the Ping Pong algorithms are stream ciphers that generate random numbers in the LFSR core structure. The LFSR has a structure that guarantees the maximum period of a given size, but it has a linear structure and can be predicted. Therefore, the Ping Pong algorithm has a feature of making the linearity of the LFSR into a nonlinear structure through variable clocks and functions. In this paper, we try to improve the existing linearity by replacing the linear disadvantages of LFSR with logistic maps.

  • PDF

An Image forgery protection for real-time vehicle black box using PingPong-256MAC (PingPong-256MAC을 이용한 차량용 블랙박스 실시간 영상 위변조 방지 기술)

  • Kim, HyunHo;Kim, Min-Kyu;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.241-244
    • /
    • 2018
  • Domestic vehicle registration is continuously increasing every year, traffic accidents are also increasing by an increase in the number of vehicles. In the event of a traffic accident, the perpetrator and the victim should be judged and handled appropriately. When judging the accident situation, the black box is what evidence can be except for witness who is at the accident scene. The black box becomes an essential role in order to prevent traffic accidents. However, there is no way to prove integrity by evidence corruption, fabrication and etc. For this reason, we propose a method to guarantee the integrity of image through hash value generated by using PingPong 256 encryption algorithm for integrity verification in this paper.

  • PDF

A novel heuristic for handover priority in mobile heterogeneous networks based on a multimodule Takagi-Sugeno-Kang fuzzy system

  • Zhang, Fuqi;Xiao, Pingping;Liu, Yujia
    • ETRI Journal
    • /
    • v.44 no.4
    • /
    • pp.560-572
    • /
    • 2022
  • H2RDC (heuristic handover based on RCC-DTSK-C), a heuristic algorithm based on a highly interpretable deep Takagi-Sugeno-Kang fuzzy classifier, is proposed for suppressing the mobile heterogeneous networks problem of frequent handover and handover ping-pong in the multibase-station scenario. This classifier uses a stack structure between subsystems to form a deep classifier before generating a base station (BS) priority sequence during the handover process, and adaptive handover hysteresis is calculated. Simulation results show that H2RDC allows user equipment to switch to the best antenna at the optimal time. In high-BS density load and mobility scenarios, the proposed algorithm's handover success rate is similar to those of classic algorithms such as best connection (BC), self tuning handover algorithm (STHA), and heuristic for handover based on AHP-TOPSIS-FUZZY (H2ATF). Moreover, the handover rate is 83% lower under H2RDC than under BC, whereas the handover ping-pong rate is 76% lower.

A Trip Mobility Analysis using Big Data (빅데이터 기반의 모빌리티 분석)

  • Cho, Bumchul;Kim, Juyoung;Kim, Dong-ho
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.85-95
    • /
    • 2020
  • In this study, a mobility analysis method is suggested to estimate an O/D trip demand estimation using Mobile Phone Signaling Data. Using mobile data based on mobile base station location information, a trip chain database was established for each person and daily traffic patterns were analyzed. In addition, a new algorithm was developed to determine the traffic characteristics of their mobilities. To correct the ping pong handover problem of communication data itself, the methodology was developed and the criteria for stay time was set to distinguish pass by between stay within the influence area. The big-data based method is applied to analyze the mobility pattern in inter-regional trip and intra-regional trip in both of an urban area and a rural city. When comparing it with the results with traditional methods, it seems that the new methodology has a possibility to be applied to the national survey projects in the future.

ZEUS: Handover algorithm for 5G to achieve zero handover failure

  • Park, Hyun-Seo;Lee, Yuro;Kim, Tae-Joong;Kim, Byung-Chul;Lee, Jae-Yong
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.361-378
    • /
    • 2022
  • In 5G, the required target for interruption time during a handover (HO) is 0 ms. However, when a handover failure (HOF) occurs, the interruption time increases significantly to more than hundreds of milliseconds. Therefore, to fulfill the requirement in as many scenarios as possible, we need to minimize HOF rate as close to zero as possible. 3GPP has recently introduced conditional HO (CHO) to improve mobility robustness. In this study, we propose "ZEro handover failure with Unforced and automatic time-to-execute Scaling" (ZEUS) algorithm to optimize HO parameters easily in the CHO. Analysis and simulation results demonstrate that ZEUS can achieve a zero HOF rate without increasing the ping-pong rate. These two metrics are typically used to assess an HO algorithm because there is a tradeoff between them. With the introduction of the CHO, which solves the tradeoff, only these two metrics are insufficient anymore. Therefore, to evaluate the optimality of an HO algorithm, we define a new integrated HO performance metric, mobility-aware average effective spectral efficiency (MASE). The simulation results show that ZEUS provides higher MASE than LTE and other CHO variants.

Reliable and Secure Voice Encryption over GSM Voice Channel

  • Lee, Hoon-Jae;Jang, Won-Tae;Kim, Tae-Yong
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.64-70
    • /
    • 2010
  • In this paper, we study and develope a special secure Dongle to be adapted in GSM SmartPhone for secure voice communication to the serial 20-pin connector in SmartPhone. We design and implement the Dongle module hardware, firmware, and software including cipher crypto-synchronization and cipher algorithm. Also we study and emulate the SmartPhone GUI software interface including communication software module to the Dongle. Finally, we analyze the performances of crypto-synchronization in some noisy environment and also we test the secure Dongle module.

A study of Implementation of Motion Estimation with ADSP-21020 (ADSP-21020을 이용한 Motion Estimation의 구현에 관한 연구)

  • Kim, Sang-Ki;Kim, Jae-Young;Byun, Chae-Ung;Chung, Chin-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.1380-1382
    • /
    • 1996
  • In this paper, a motion estimation module is made with ADSP-21020 based on MPEG-2 which is an international standard for moving picture compression. And, the block matching algorithm used as motion estimation method is easy for an hardware implementation. The ADSP-21020 of Analog Device is used for a main control processor. We used three block matching method (exhaustive search method, 2D-logarithmic search method, three step search method) for software simulation and implemented the three step search method to hardware. For the test of the estimation module, we used ping pong image sequences and mobile and calendar image sequences.

  • PDF

A New Frame Offset Assignment Algorithm For Reducing the Soft Handoff Blocking Probability Due to Lack of Frame Offset Capacity (Frame Offset의 불일치로 인하여 발생하는 Soft Handoff Blockig Probability를 줄이기 위한 새로운 Frame Offset Assignment Algorithm)

    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1624-1630
    • /
    • 1999
  • Code division multiple access (CDMA) is a promising air interface technique for cellular systems. When an MS (Mobile Station) moves to an adjacent cell, the handoff between the serving cell and the target cell is needed. Compared with the hard handoffs, the soft handoffs between two CDMA channels with the identical frequency assignments and frame offsets can provide a better quality of service by minimizing the undesirable ping pong phenomenon of back-and forth handoffs between two adjacent cells in conventional hard handoffs. For the soft handoff of a call to an adjacent cell to be successful, the adjacent cell should assign to the call the same frame offset as that being used in the original cell by the call. In this paper, considering the assignment states of the frame offsets of the adjacent cells, a frame offset assignment algorithm for the originated call is proposed. And analytic method for the handoff blocking probability due to the lack of the frame offset capacity is also presented to show the advantage of the proposed algorithm with respect to the soft handoff blocking probability.

  • PDF

Handover performance evaluation by a IEEE 802.11p based handover algorithm and its parameter under high-speed driving environments (고속주행환경에서 IEEE802.11p 기반 통신 핸드오버 알고리즘 파라미터 값에 따른 핸드오버 성능 분석)

  • Song, Yoo-Seung;Oh, Hyun-Seo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.5
    • /
    • pp.52-60
    • /
    • 2013
  • ITS technologies are in the research and development around the world as a solution for maximizing the efficiency of the existing road infrastructure, solving the complex traffic problems and providing the convenient driving services. The core of these ITS technologies is to provide the information for the requesting users in fast and accurate way from the server. In real driving conditions, there are many communication barriers around the vehicles and the base stations so that an accurate and robust handover technology is needed in order to ensure seamless ITS services. This paper introduced an WAVE handover algorithm implemented in a real communication device and five parameters mainly affecting the handover performance are evaluated. The handover performance is measured by changing the parameter values at a highway testbed. The test results show that the handover algorithm parameter values should be configured carefully to remove the handover ping-pong problems.

Analysis and study of Deep Reinforcement Learning based Resource Allocation for Renewable Powered 5G Ultra-Dense Networks

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.226-234
    • /
    • 2024
  • The frequent handover problem and playing ping-pong effects in 5G (5th Generation) ultra-dense networking cannot be effectively resolved by the conventional handover decision methods, which rely on the handover thresholds and measurement reports. For instance, millimetre-wave LANs, broadband remote association techniques, and 5G/6G organizations are instances of group of people yet to come frameworks that request greater security, lower idleness, and dependable principles and correspondence limit. One of the critical parts of 5G and 6G innovation is believed to be successful blockage the board. With further developed help quality, it empowers administrator to run many systems administration recreations on a solitary association. To guarantee load adjusting, forestall network cut disappointment, and give substitute cuts in case of blockage or cut frustration, a modern pursuing choices framework to deal with showing up network information is require. Our goal is to balance the strain on BSs while optimizing the value of the information that is transferred from satellites to BSs. Nevertheless, due to their irregular flight characteristic, some satellites frequently cannot establish a connection with Base Stations (BSs), which further complicates the joint satellite-BS connection and channel allocation. SF redistribution techniques based on Deep Reinforcement Learning (DRL) have been devised, taking into account the randomness of the data received by the terminal. In order to predict the best capacity improvements in the wireless instruments of 5G and 6G IoT networks, a hybrid algorithm for deep learning is being used in this study. To control the level of congestion within a 5G/6G network, the suggested approach is put into effect to a training set. With 0.933 accuracy and 0.067 miss rate, the suggested method produced encouraging results.