• Title/Summary/Keyword: Wireless Access Point

Search Result 398, Processing Time 0.02 seconds

Enhancing IEEE 802.11 Power Saving Mechanism (PSM) with a Time Slotted Scheme (시분할 방법에 의한 IEEE 802.11 전력관리 메커니즘의 성능향상)

  • Lei, Xiaoying;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.679-686
    • /
    • 2013
  • Power efficiency becomes more important in wireless LANs as the mobile stations send more data with limited batteries. It has been known that the IEEE 802.11 PSM is not efficient in high load networks: AP cannot deliver buffered packets to a PS station immediately and it can lead the station to stay in active state quite long and result in energy waste. Moreover, it is inefficient that only one data frame is retrieved by a PS-POLL frame. In this paper, we propose a time slotted scheme to enhance the PSM, in which a mobile station can reserve time slots to receive data frames. Our mechanism can reduce collisions by reservation and decrease the channel occupancy by transmitting multiple data frames via one PS-POLL. The analytic model and simulation results show that proposed scheme reduces power consumption significantly and enhances the performance of PSM.

A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel (Wi-Fi를 이용한 스마트폰에서 사전 공격에 안전한 WPA-PSK 프로토콜)

  • Park, Geun-Duk;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1839-1848
    • /
    • 2012
  • Recently, smartphone communications using Wi-Fi channel are increasing rapidly to provide diverse internet services. The WPA security protocol was used for data protection between user and wireless AP. However, WPA-PSK protocol was known to be weak to the dictionary attack. In this paper, we proposed a secure WPA-PSK protocol to resist the dictionary attack. Since the proposed method was designed to generate a strong encryption key which is combined the Diffie-Hellman key agreement scheme with secrecy property of PSK(Pre-Shared Key), we can protect the Wi-Fi channel from Man-In-The-Middle attack and Rogue AP impersonation attack.

Design and Implementation of Sea Operation Monitoring System based on ENC (전자해도 기반의 해상작업 모니터링 시스템 설계 및 구현)

  • Jung Sung-Hun;Yim Jae-Hong
    • Journal of Navigation and Port Research
    • /
    • v.30 no.3 s.109
    • /
    • pp.189-195
    • /
    • 2006
  • Sea operation monitoring system is a system for the automatic ship operation that is used on the variety sea operations such as laying optical cables on the sea between the countries, laying cables on the seabed for a remote island, laying pipelines for the natural gas, and so forth. This system processes data which obtained through setting up environment and input from several sensors, and display GPS information with ENC data. And this system processes not only data of route file about sea operation, but also realtime information from PDA of client wirelessly connected with AP on wireless LAN. In addition, this system can improve efficiency of the operation as a result of enabling free movement within valid range. This paper design and implementation monitoring system from above appropriate to the embedded system, and improve competitive power of ship through prevention of a ship accident, to keep minimizing operation loads and support both the automatic ship operation and the safety voyage.

A Study on the Channel Handover Method for Super Wi-Fi Service Continuity in TV White Spaces (Super Wi-Fi 환경에서 서비스 연속성을 위한 끊김없는 채널이동 방안 연구)

  • Kim, Myeongyu;Jeon, Youchan;Park, Sangwon;Park, Jinwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1050-1057
    • /
    • 2012
  • Super Wi-Fi is a newly emerging wireless Internet technology, which constitutes Wi-Fi networks using TV white space. A key technical challenge in the Super Wi-Fi applications is how to provide a seamless Internet service even when a Super WiFi user should give up the channel in use to the active incumbent user which is activated in the same service area, preventing from the service continuity in Super Wi-Fi. In this paper, we propose a channel handover method to support service continuity of Super Wi-Fi, in which an AP selects a new operational channel and provides the channel information for MSs. Therefore, the AP and the MSs can carry out seamless handover for Super Wi-Fi service. A performance evaluation shows that the proposed scheme is superior to the conventional Wi-Fi in channel mobility delay.

System Optimization, Full Data Rate and Transmission Power of Decode-and-Forward Cooperative Communication in WSN (WSN환경에서 Decode-and-Forward 협력통신의 시스템 최적화 및 최대전송률과 저전력에 관한 연구)

  • Kim, Gun-Seok;Kong, Hyung-Yun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.597-602
    • /
    • 2007
  • In conventional cooperative communication data rate is 1/2 than non cooperative protocols. In this paper, we propose a full data rate DF (Decode and Forward) cooperative transmission scheme. Proposed scheme is based on time division multiplexing (TDM) channel access. When DF protocol has full data rate, it can not obtain diversity gain under the pairwise error probability (PEP) view point. If it increases time slot to obtain diversity gain, then data rate is reduced. The proposed algorithm uses orthogonal frequency and constellation rotation to obtain both full data rate and diversity order 2. Moreover, performance is analyzed according to distance and optimized components that affect the system performance by using computer simulation. The simulation results revealed that the cooperation can save the network power up to 7dB over direct transmission and 5dB over multi-hop transmission at BER of $10^{-2}$. Besides, it can improve date rate of system compared with the conventional DF protocol.

Estimation Algorithm of Receiver's Position and Angle Based on Tracking of Received Light Intensity for Indoor Visible Light Communication Systems (실내 가시광 무선 통신 시스템의 수신 광도 변화 추적 기반 단말기 위치 및 수신각 추정 알고리즘)

  • Hwang, Jun-Ho;Lee, Ji-Soo;Yoo, Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.60-67
    • /
    • 2011
  • Visible light communication system transmits data by controlling light emission of LED and receives data through photo detecter, which is considered as one of strong candidates of next generation wireless communication systems. The transmission capacity of visible light communication system depends on light intensity emitted from LED, sensitivity of PD, distance between transmitter and receiver, angle of incidence at the receiver. In particular, the receiver's vertical and horizontal movement changes distance between transmitter and receiver and angle of incidence, which may degrades transmission capacity of system. In this paper, we propose an estimation algorithm of receiver's position and angle based on tracking of received light intensity for indoor visible light communication systems. The performance evaluation of proposed algorithm confirms that the estimation algorithm of receiver's position and angle is quite important for visible light communication system to improve its transmission capacity.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

Interference Mitigation Technique for OFDMA-based Mesh Networks in Doubly Selective Channels (시간/주파수 선택적 채널환경에서 OFDMA 기반의 메쉬 네트워크를 위한 간섭 완화 기법)

  • Park, Chang-Hwan;Kong, Mi-Kyung;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1A
    • /
    • pp.17-24
    • /
    • 2012
  • In this paper, we described a received signal model in terms of the starting point of FFT window and derive a post-detection SINR for the receiver with MMSE filter and the corresponding filter coefficients in order to mitigate the effects of interferences caused by time and frequency selective fading channels and time difference of arrival (TDoA) in OFDMA-based Mesh Networks. In addition, we proposed an MMSE Bidirectional Successive Detection (BSD) technique which can suppress the effects of interferences among multi-nodes without any redundant FFT operations. It was shown by simulation that the proposed interference suppression technique has not an error floor at higher average SNR than 30dB in terms of 64QAM uncoded BER contrary to the conventional techniques.

A Mass-Processing Simulation Framework for Resource Management in Dense 5G-IoT Scenarios

  • Wang, Lusheng;Chang, Kun;Wang, Xiumin;Wei, Zhen;Hu, Qingxin;Kai, Caihong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4122-4143
    • /
    • 2018
  • Because of the increment in network scale and test expenditure, simulators gradually become main tools for research on key problems of wireless networking, such as radio resource management (RRM) techniques. However, existing simulators are generally event-driven, causing unacceptably large simulation time owing to the tremendous number of events handled during a simulation. In this article, a mass-processing framework for RRM simulations is proposed for the scenarios with a massive amount of terminals of Internet of Things accessing 5G communication systems, which divides the time axis into RRM periods and each period into a number of mini-slots. Transmissions within the coverage of each access point are arranged into mini-slots based on the simulated RRM schemes, and mini-slots are almost fully occupied in dense scenarios. Because the sizes of matrices during this process are only decided by the fixed number of mini-slots in a period, the time expended for performance calculation is not affected by the number of terminals or packets. Therefore, by avoiding the event-driven process, the proposal can simulate dense scenarios in a quite limited time. By comparing with a classical event-driven simulator, NS2, we show the significant merits of our proposal on low time and memory costs.

IEEE 802.22 WG에서의 CR응용: WRAN MAC설계

  • Go Gwang-Jin;Hwang Seong-Hyeon;Song Myeong-Seon;Kim Chang-Ju;Gang Beop-Ju
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.58
    • /
    • pp.38-49
    • /
    • 2006
  • In order to increase the spectrum efficiency, recently, there is the number of studies for CR technology. For instance, IEEE 802.22 WRAN(Wireless Regional Area Network) WG considered the CR technology as a solution of WRAN system to serve the high speed internet service(1.5 Mbps down stream and 384 kbps up stream) in 100 km overall coverage and 54 MHz-746 MHz band. Basically, in MAC point of view, the WRAN system have been standardizing based on the IEEE 802.16 MAC layer features such as Data transmission method, QoS provision and Bandwidth request schemes. Additionally, the WRAN system further include CR nature functions such as incumbent user protection, self coexistence which would be importantly considered. Also, the inherent WRAN functions are added such as channel bonding and fractional bandwidth usage. This paper mainly explained frame structure, IU protection, self coexistence which are key functions of WRAN system. Finally, in this paper, we expressed a prospect of IEEE 802.22 WRAN standardization.