• 제목/요약/키워드: Relay Using Scheme

Search Result 214, Processing Time 0.022 seconds

Security Analysis on NFC-based M-coupon Protocols and its Countermeasure (NFC에 기반한 모바일 쿠폰 프로토콜에 대한 안전성 분석 및 대응 방안)

  • Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1388-1397
    • /
    • 2015
  • Recently, an application business model was proposed to implement an M-coupon system using the NFC-based mobile devices. In this paper, the security requirements were surveyed for a secure M-coupon system and to analyze the threats on the existing NFC-based M-coupon protocols. After considering the implementation efficiency and security, this paper presents a novel M-coupon protocol based on the Diffie-Hellman key agreement scheme. This protocol can be an alternative to solve the security problems related to the PKI (Public Key Infrastructure) and secret key distribution. Furthermore, this M-coupon protocol is designed to provide user authentication and counteract the relay attack.

Time Switching-based Analog Network Coding for Maximizing the Minimum Required Secrecy Capacity in Energy Harvesting Networks (에너지 하베스팅 네트워크에서 최소 요구 보안 용량을 최대화하기 위한 시간 전환 기반의 아날로그 네트워크 코딩)

  • Lee, Kisong;Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2022-2028
    • /
    • 2017
  • Recently, the energy shortage of sensors and the leakage of private information are considered as serious problems as the number of sensors is increasing due to the technological advance in Internet-of-Things. RF energy harvesting, in which sensors collect energy from external RF signals, and physical layer security become increasingly important to solve these problems. In this paper, we propose a time switching-based network analog coding for improving information security in wireless networks where the relay can harvest energy from source signals. We formulate 2-hop relay networks where an eavesdropper tries to overhear source signals, and find an optimal time switching ratio for maximizing the minimum required secrecy capacity using mathematical analysis. Through simulations under various environments, it is shown that the proposed scheme improves the minimum required secrecy capacity significantly, compared to the conventional scheme.

A Request Scheduling Strategy using Client's Buffer in VOD Systmes (주문형 비디오 시스템에서 클라이언트 버퍼를 활용한 요구 스케쥴링 기법)

  • Han, Kum-Hee;Kim, Jong-Hoon;Won, Yoo-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.337-346
    • /
    • 2000
  • In a Vod(video0on-demand) system, a scheduling strategy is designed to increase the system efficiency and to eatisfy the isochronous requirements of showing a video to multiple viewers with one disk access. In this paper, we have proposed the Stream Relay Scheme (SRS) which utilizes the client's buffer space to reduce the server's disk I/O, buffer consumption, and stream capacity. Under the SRS which we have proposed in this paper, the server does not service all the requests directly but forwards the new request selectively to the client who is being served currently in order to reduce the initial latency and increase the system throughput. The SRS-BAT which integrated the SRS with the Batching technique is introduced. The results of the simulated experiments which compared the SRS with the conventional technique have shown the noticeable performance improvements in terms of initial latency and the server throughput.

  • PDF

Adaptive Power allocation inenergy-constrained wireless ad-hoc networks (전력 제한된 무선 애드혹 네트워크에서의 적응적 전력할당기법)

  • Gao, Xiang;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.336-342
    • /
    • 2008
  • We proposed a simple power allocation scheme to maximize network lifetime for "amplify and forward(AF)" and "decode and forward(DF)". To maximize network lifetime, it is important to allocate power fairly among nodes in a network as well as to minimize total transmitted power. In the proposed scheme, the allocated power is proportional to the residual power and also satisfies the required SNR at destination node. In this paper, we calculate power allocation in model of AF and DF. We evaluated the proposed power allocation scheme using extensive simulation and simulation results show that proposed power allocation obtains much longer network lifetime than the equal power allocation.

Multi-hop Relay System for Multicast and Broadcast Service over Mobile WiMAX (멀티캐스트와 브로드캐스트 서비스의 성능 향상을 위한 모바일 와이맥스 중계 시스템)

  • Cho, Chi-Hyun;Youn, Hee-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.227-234
    • /
    • 2008
  • The development of wireless network technology allows high data rate seamless communication irrespective of the place and time in various emerging mobile service environment. Unlike wired networks, however, wireless networks utilize expensive limited bandwidth. MBS(Multicast Broadcast Service), which is supported by mobile WiMAX system based on IEEE802.16e, overcomes this problem using a shared downlink channel for efficiently supporting a number of users. However. the coverage and throughput of the system are significantly affected by the channel condition. In this paper we propose on MBS system employing Mobile Multi-Hop Relay(MMR) and adaptive modulation and coding(AMC) scheme. The result of NS-2 computer simulation shows that the throughput and transmission time are substantially improved by the proposed approach compared to the existing MBS system.

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.

A real -time digital protection for transformer using percentage differential characteristic (비율차동특성을 이용한 변압기의 실시간 디지탈보호)

  • Suh, Hee-Seok;Shin, Myong-Chul;Yoon, Man-Chul;Kim, Il-Dong
    • Proceedings of the KIEE Conference
    • /
    • 1992.07a
    • /
    • pp.63-66
    • /
    • 1992
  • This paper presents the real time digital differential protection scheme for transformer. Inrush and Internal fault conditions are distinguished by the relative magnitudes of fundamental and second harmonic components which are extracted from differential currents. The algorithm is simulated and implemented using a prototype relay which is made up of Intel 80286 CPU and Motorola DSP-56001. The testing data of inrush and Internal fault signals which are sampled at a rate of 12 times a cycle are obtained by EMTP, and tested In real time using simulator which downloaded those data.

  • PDF

Internal Fault Classification in Transformer Windings using Combination of Discrete Wavelet-Transforms and Back-propagation Neural Networks

  • Ngaopitakkul Atthapol;Kunakorn Anantawat
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.3
    • /
    • pp.365-371
    • /
    • 2006
  • This paper presents an algorithm based on a combination of Discrete Wavelet Transforms and neural networks for detection and classification of internal faults in a two-winding three-phase transformer. Fault conditions of the transformer are simulated using ATP/EMTP in order to obtain current signals. The training process for the neural network and fault diagnosis decision are implemented using toolboxes on MATLAB/Simulink. Various cases and fault types based on Thailand electricity transmission and distribution systems are studied to verify the validity of the algorithm. It is found that the proposed method gives a satisfactory accuracy, and will be particularly useful in a development of a modern differential relay for a transformer protection scheme.

Efficient Cognitive and Cooperative Communication Scheme for Multiuser OFDMA Systems using Relays (중계기를 사용하는 다중 사용자 OFDMA 시스템을 위한 효율적인 인지 협력 통신 기법)

  • Kang, Min-Gyu;Sang, Young-Jin;Ko, Byung-Hoon;Kim, Kwang-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.235-243
    • /
    • 2009
  • In this paper, we investigate the cognitive and cooperative communication scheme to improve the spectral efficiency in multiuser OFDMA systems using wireless relays. First, we propose the frame structure in which the efficient frequency reuse scheme with the cognitive technique is performed to increase the system throughput. And in the case where the THP (Tomlinson-Harashima preceding) is used for the elimination of interference from the relay, we derive the effective signal to noise ratio of the link largely affected by the channel quantization error. From the system level simulation results, it is shown that the proposed cognitive and cooperative communication scheme increases the overall system performance including the feedback overhead.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.