• Title/Summary/Keyword: Wireless Broadband Internet

Search Result 147, Processing Time 0.024 seconds

RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5189-5208
    • /
    • 2015
  • To address the contradiction between data aggregation and data security in wireless sensor networks, a Recoverable Privacy-preserving Integrity-assured Data Aggregation (RPIDA) scheme is proposed based on privacy homomorphism and aggregate message authentication code. The proposed scheme provides both end-to-end privacy and data integrity for data aggregation in WSNs. In our scheme, the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators, thus can verify the integrity of all sensing data. Besides, with these individual sensing data, base station is able to perform any further operations on them, which means RPIDA is not limited in types of aggregation functions. The security analysis indicates that our proposal is resilient against typical security attacks; besides, it can detect and locate the malicious nodes in a certain range. The performance analysis shows that the proposed scheme has remarkable advantage over other asymmetric schemes in terms of computation and communication overhead. In order to evaluate the performance and the feasibility of our proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate that RPIDA is feasible and efficient for resource-constrained sensor nodes.

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

A Study of Data Security System Based PKI on Wireless Internet Environment (무선 인터넷 환경에서의 PKI 기반 데이터 보호 시스템에 대한 연구)

  • Kim, Young-Ho;Chae, Cheol-Joo;Choi, Sang-Wook;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.233-236
    • /
    • 2008
  • Wire wireless integrated service of BcN(Broadband convergence Network) is expanding. Information Security issue is highlighted for opposing attack of getting information illegally on wire wireless network. The user of PKI(Public Key Infrastructure) cipher system among Information security technology receives various security services about authentication, confidentiality, integrity, non-repudiation and access control etc. A mobile client and server are loaded certificate and wireless internet cryptography module for trusted data send receive. And data sends receives to each other after certification process through validity check of certificate. Certificate and data security system is researched through PKI on wireless network environment and data security system in this paper.

  • PDF

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Characteristics of Individuals Influencing Adoption Intentions for Portable Internet Service

  • Kim, Moon-Koo;Jee, Kyoung-Yong
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.67-76
    • /
    • 2006
  • This study aims to identify the factors that influence adoption intentions towards portable Internet service, based on the individual characteristics that assist in creating markets and developing strategies. Two types of factors are defined: individual characteristics including demographics, existing services usages, prior knowledge, adoption attitudes, and service evaluations; and adoption intentions including the willingness to subscribe, subscription term, willingness to pay, usage type, and preferred terminal. The results indicate that the importance of demographic variables depends on adoption intentions, and that users of mobile Internet service and wireless LAN are probably targets for portable Internet service. Furthermore, the results demonstrate the need for an enhanced perception of the usefulness and ease of use of service, as well as an intensive marketing activity for potential users and a bearable innovation to stimulate the market for portable Internet service.

  • PDF

Implementation of Indoor Location-Aware System based on Probability Distribution of RSSI (RSSI 확률분포를 사용한 실내 위치 인식 시스템의 구현)

  • Kim, Myung Gwan;Kim, Jin Woo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.9-14
    • /
    • 2008
  • Ubiquitous implementation of indoor location-based technology is recognized that one of the important elements of the technology. Specifically, the hospital management of patients, the silver-town management, the implementation of the smart home for the indoors rather than outdoors in a range of broadband users for location-aware technology is needed. This paper in wireless devices with an indoor location awareness shows about the system's technical design and implementation. Location-based technology for wireless LAN users aware of the strength of radio signals (Received Signal Strength Indication, RSSI) using trilateration. Topographic mapping system will be implemented wireless devices and servers, Access Point (AP), which is the system's development and testing throughout the physical environment to determine the potential for real-life applications.

  • PDF

QoSCM: QoS-aware Coded Multicast Approach for Wireless Networks

  • Mohajer, Amin;Barari, Morteza;Zarrabi, Houman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5191-5211
    • /
    • 2016
  • It is essential to satisfy class-specific QoS constraints to provide broadband services for new generation networks. The present study proposes a QoS-driven multicast scheme for wireless networks in which the transmission rate and end-to-end delay are assumed to be bounded during a multiple multicast session. A distributed algorithm was used to identify a cost-efficient sub-graph between the source and destination which can satisfy QoS constraints of a multicast session. The model was then modified as to be applied for wireless networks in which satisfying interference constraints is the main challenge. A discrete power control scheme was also applied for the QoS-aware multicast model to accommodate the effect of transmission power level based on link capacity requirements. We also proposed random power allocation (RPA) and gradient power allocation (GPA) algorithms to efficient resource distribution each of which has different time complexity and optimality levels. Experimental results confirm that the proposed power allocation techniques decrease the number of unavailable links between intermediate nodes in the sub-graph and considerably increase the chance of finding an optimal solution.

Analysis on the Interference Effect of WLAN on WiBro (무선랜에 의한 WiBro 간섭 영향 분석)

  • Shim, Yong-Sup;Lee, Il-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.95-100
    • /
    • 2011
  • This paper analyzes the interference effect of WLAN(Wireless Local Area Network) service on WiBro(Wireless Broadband) service in adjacent frequency band by using Monte Carlo method. For the analysis, we make scenario that WLAN service operates on frequency band of 2401 MHz ~ 2423 MHz and WiBro service operates on frequency band of 698 MHz ~ 704 MHz. In case of WiBro receiver is close to WLAN AP(Access Point), the interference will be increased. So, we calculate the protection distance between WiBro receiver and WLAN AP to meet interference probability of 5 % below and required interference power of WLAN AP to meet interference probability of 5 % below in the case of fixed protection distance. As a result, the protection distance of 60 m and -9.5 dBm of required interference power of WLAN AP at 10 m of the fixed protection distance are analyzed.

A Study on Applying Information Security Requirement for WiBro System (와이브로 시스템의 정보보호 요구분석)

  • Kim, Min-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.2801-2808
    • /
    • 2010
  • The technology of WiBro, combining advantages of high speed internet and wireless internet provides the effectiveness and convenience provided by broadband and convergence. WiBro has developed due to supports of the related industries. The advancement of WiBro have created driving force for network advancement. WiBro is a niche market among high speed Internet, wireless LAN, Mobile phone, wireless internet. Through building relationship between market share and the existed telecommunication service, WiBro could improve the convenience of users. The security controls have to be built considering vulnerabilities of WiBro. Based on the study, the architecture of WiBro was suggested through reviewing the vulnerabilities and security controls in the wireless network and wire network. The appropriate security measures to be applied in the environment of WiBro. The outcomes of the study could improve the usage of WiBro.

A Broadband High Gain Planar Vivaldi Antenna for Medical Internet of Things (M-IoT) Healthcare Applications

  • Permanand, Soothar;Hao, Wang;Zaheer Ahmed, Dayo;Falak, Naz;Badar, Muneer;Muhammad, Aamir
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.245-251
    • /
    • 2022
  • In this paper, a high gain, broadband planar vivaldi antenna (PVA) by utilizing a broadband stripline feed is developed for wireless communication for IoT systems. The suggested antenna is designed by attaching a tapered-slot construction to a typical vivaldi antenna, which improves the antenna's radiation properties. The PVA is constructed on a low-cost FR4 substrate. The dimensions of the patch are 1.886λ0×1.42λ0×0.026λ0, dielectric constant Ɛr=4.4, and loss tangent δ=0.02. The width of the feed line is reduced to improve the impedance bandwidth of the antenna. The computed reflection coefficient findings show that the suggested antenna has a 46.2% wider relative bandwidth calculated at a 10 dB return loss. At the resonance frequencies of 6.5 GHz, the studied results show an optimal gain of 5.82 dBi and 85% optimal radiation efficiency at the operable band. The optometric analysis of the proposed structure shows that the proposed antenna can achieve wide enough bandwidth at the desired frequency and hence make the designed antenna appropriate to work in satellite communication and medical internet of things (M-IoT) healthcare applications.