• Title/Summary/Keyword: Trustworthy

Search Result 242, Processing Time 0.024 seconds

Joint Destination-Relay Selection and Antenna Mode Selection in Full-Duplex Relay Network

  • Tang, Yanan;Gao, Hui;Su, Xin;Lv, Tiejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2831-2847
    • /
    • 2017
  • In this paper, a joint destination-relay selection and antenna mode selection scheme for full-duplex (FD) relay network is investigated, which consists of one source node, N FD amplify-and-forward (AF) relays and M destination nodes. Multiple antennas are configured at the source node, and beamforming technique is adopted. Two antennas are employed at each relay, one for receiving and the other for transmitting. Only one antenna is equipped at each destination node. In the proposed scheme, the best destination node is firstly selected according to the direct links between the source node and destination nodes. Then the transmit and receive mode of two antennas at each relay is adaptively selected based on the relaying link condition. Meanwhile, the best relay with the optimal Tx/Rx antenna configuration is selected to forward the signals. To characterize the performance of the proposed scheme, the closed-form expression of the outage probability is derived; meanwhile, the simple asymptotic expressions are also obtained. Our analysis shows that the proposed scheme obtains the benefits of multi-relay diversity and multi-destination diversity. Moreover, extra space diversity in the medium SNR region can be achieved due to the antenna selection at the relay. Finally, Monte-Carlo simulations are provided to consolidate the analytical results, and show the effectiveness of the proposed scheme.

Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization

  • Long, Wei;Gao, Hui;Lv, Tiejun;Yuen, Chau
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4305-4323
    • /
    • 2014
  • In this paper, we investigate the degrees of freedom (DOF) of the Y channel consisting of three single-antenna users and a two-antenna common access relay, where each user intends to exchange independent messages with the other two users with the assistance of the relay. We show that the DOF of this particular scenario is 1.5. In order to prove this result, we firstly derive a DOF upper bound based on cut-set bound by allowing cooperation among users, which shows that the total DOF is upper bounded by 1.5. Then we propose a novel transmission scheme based on asymmetric signal space alignment (ASSA) to demonstrate the achievability of the upper bound. Theoretical evaluation and numerical results confirm that the upper bound can be achieved by utilizing ASSA, which also proves the optimality of the ASSA-based scheme in terms of DOF. Combining the upper bound and achievability, we conclude that the exact DOF is 1.5. Moreover, we present a novel iterative joint beamforming optimization (I-JBO) algorithm to further improve the sum rate. Numerical simulations have been provided to demonstrate the convergence speed and performance advantage of the I-JBO algorithm.

Evaluating Impressions of Robots According to the Robot's Embodiment Level and Response Speed (로봇의 외형 구체화 정도 및 반응속도에 따른 로봇 인상 평가)

  • Kang, Dahyun;Kwak, Sonya S.
    • Design Convergence Study
    • /
    • v.16 no.6
    • /
    • pp.153-167
    • /
    • 2017
  • Nowadays, as many robots are developed for desktop, users interact with the robots based on speech. However, due to technical limitations related to speech-based interaction, an alternative is needed. We designed this research to design a robot that interacts with the user by using unconditional reflection of biological signals. In order to apply bio-signals to robots more effectively, we evaluated the robots' overall service evaluation, perceived intelligence, appropriateness, trustworthy, and sociability according to the degree of the robot's embodiment level and the response speed of the robot. The result showed that in terms of intelligence and appropriateness, 3D robot with higher embodiment level was more positively evaluated than 2D robot with lower embodiment level. Also, the robot with faster response rate was evaluated more favorably in overall service evaluation, intelligence, appropriateness, trustworthy, and sociability than the robot with slower response rate. In addition, in service evaluation, trustworthy, and sociability, there were interaction effects according to the robot's embodiment level and the response speed.

Are Negative Online Consumer Reviews Always Bad? A Two-Sided Message Perspective

  • Lee, Jumin;Park, Se-Bum;Lee, Sangwon
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.784-804
    • /
    • 2015
  • This study investigates the effects of a two-sided message on product attitude and purchase intention by using a message structure variable, such as attribute importance in the context of online consumer reviews (OCRs). Study 1 explains the previous inconsistent results of a two-side message by comparing a one-side message and a two-side message by using the attribute importance in negative reviews. Study 2 determines the reasons for the inconsistent results of a refutational two-sided message research by using the attribute importance in negative reviews and website trust. Two experiments are designed to test our hypotheses. The first experiment is a $2{\times}2$ factorial design with 84 participants. The second experiment uses a $2{\times}2{\times}2$ factorial design with 196 participants. In study 1, two-sided OCRs are more credible than one-sided OCRs, and two-sided OCRs that use low important attributes are more effective in making favorable product attitude/purchase intention. In study 2, refutational two-sided OCRs that use high attribute importance render positive effects on product attitudes in trustworthy websites. However, the refutation could negatively affect product attitude/purchase intention in low trustworthy websites.

Continuous Usage Intention of Twitter's Informations Focus on Elaboration Likelihood Model (트위터의 정보가 지속사용의도에 미치는 영향 : 정교화 가능성 모델을 중심으로)

  • Kim, Ee-Hwan;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.49-65
    • /
    • 2012
  • This study aims to investigate the factors influencing followers' continuous usage intention of twitter based on Elaboration Likelihood Model. In particular, central route(information itself) and peripheral route(twitterian's trustworthiness) are tested to reveal which has a more influential role in effecting the continuous usage intention of power-twitter. Furthermore, this study tests the relationship of users' attitude and continuous usage intention. The results indicate that argument quality, accuracy(central route), source expertise and source trustworthiness (peripheral route) have an influence on attitude. However, trustworthy on central route is not significant. Argument quality, trustworthy, accuracy(central route) and source expertise(peripheral route) have an influence on perceived usefulness. But source trustworthiness on peripheral is not significant. Attitude has an influence on perceived usefulness, and attitude and perceived usefulness both have an influence on perceived usefulness. In conclusion, central route is more influential than peripheral route in forming a positive attitude towards arguments, which in turn leads to the perception of twitter's usefulness, and in the end brings the continuous usage intention of twitter.

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

A Study on the ICA Rules of Arbitration to be compared with KCAB International Rules of Arbitration (대한상사중재원 국제중재규칙과 인도중재원 중재규칙 비교 연구)

  • Park, Yang-Sup
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.35
    • /
    • pp.125-144
    • /
    • 2007
  • The objective of this study is to find out whether Korean companies which are doing a lot of commercial transactions with Indian companies can consider appointing ICA as a trustworthy institution and using ICA arbitration rules as a governing arbitration rule, when a dispute between Korean companies and Indian companies occurs. Up to now, in the case of dispute with Indian companies, Korean companies are hesitant to utilize ICA as well as ICA arbitration rules as a alternative dispute resolution, owing to lack of understanding on its rules. But, it is obvious that Korean companies which come to have better knowledge on ICA and its rules may consider more positively using ICA as well as ICA arbitration rules as a dispute resolution rather than using other arbitration institutions like ICC and KCAB etc. in the case of disputes with Indian companies because ICA arbitration rules are very objective and similar to other arbitration rules like ICC rules as well as KCAB(Korean Commercial Arbitration Board) international arbitration rules which are frequently being used by Korean companies and also have other several advantages like cheaper cost of arbitration and fast track arbitration procedures. In conclusion, ICA and its rules can also be recommended as a public-trustworthy arbitration option if Korean companies want to resolve some dispute cases with Indian companies.

  • PDF

Trends in Trustworthy Communication for the Next-Generation (차세대 신뢰통신 연구동향)

  • Kim, T.H.;Hong, J.H.;Jung, H.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.129-139
    • /
    • 2015
  • 현재의 인터넷은 40여 년 전에 신뢰할 수 있는 호스트 간의 통신을 기반으로 설계되어 식별성(Identity)과 기밀성(Privacy)등의 보안성에 대한 특별한 요구사항이 없었다. 추후 인터넷이 전 세계적으로 확장함에 따라 신뢰할 수 없는 호스트가 통신에 참여하게 되었고 이에 대한 보안 요구사항이 새롭게 등장하였다. 이러한 요구사항을 만족시키기 위한 인터넷의 보안 기술은 키(Key)에 매우 의존적으로 발전하여 현재 모든 인증 관련 기술과 보안 기술들은 공개키 기반 구조(Public Key Infrastructure: PKI)와 같이 키를 기반으로 하고 있다. 이러한 연구 동향은 미래인터넷의 보안 연구에서도 여전히 반영되어 미국에서 진행 중인 eXpressive Internet Architecture(XIA)나 다른 미래 인터넷 프로젝트에서도 키 기반의 보안기술 연구를 진행하고 있다. 하지만 모든 통신을 의심하고 이를 감시하기 위한 기존의 인터넷 보안 기술과 달리 미래인터넷 보안 연구는 상호 신뢰를 기반으로 네트워크에 대한 공격 자체를 원천적으로 차단할 수 있는 신뢰통신(Trustworthy communication)을 목적으로 하고 있으며 이에 대한 새로운 연구 결과가 등장하고 있다. 본고에서는 차세대 보안연구 분야인 신뢰통신의 연구동향과 성과를 소개하고 장단점을 분석한다. 특히 미래인터넷의 신뢰통신 연구 중 대중적으로 인정받고 있는 공개키를 이용한 자가인증(Self-certifying)과 이를 뒷받침하기 위한 공개키 검증 시스템 연구 및 신뢰경로 구축 연구를 중심으로 미래인터넷의 신뢰통신 연구가 진행된 과정을 중점적으로 소개한다.

  • PDF

Smart Glasses Technologies for Trustworthy, Augmented Reality, See-Through Eyes-Direct Communications as Substitute for Smart Phones (스마트폰 대체재로서의 신뢰증강보는통신용 스마트안경 기술)

  • Song, K.B.;Lee, J.K.;Kim, K.Y.;Kim, G.W.;Park, S.H.;Kim, T.Y.;Yoon, H.S.;Lee, J.H.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.58-70
    • /
    • 2019
  • In this paper, we present the R&D status of ETRI's Trusted Reality (TR) project and its core technologies. ETRI's TR project focuses on the next-generation paradigm of smart phones, ETRI-TR Smart Glasses, which aims to provide the same features as those of smart phones without the involvement of any handheld device. Furthermore, they are characterized by additional features enabled by trustworthy VR/AR/MR/XR, such as privacy masking/unmasking, distributed structure of thin-client computing/networking among TR-Glasses, TR-LocalEdge, and TR-RemoteEdge, with novel see-through eyes-direct communication between IoT real/virtual objects and human eyes. Based on these core technologies of the ETRI's TR project, the human-held ETRI-TR Smart Glasses is expected to aid in the realization of XR vision with particularly more XR's safe_privacy on social life in the near future.