• Title/Summary/Keyword: Wireless Communication Systems

Search Result 2,142, Processing Time 0.033 seconds

Implementation of low power algorithm for near distance wireless communication and RFID/USN systems

  • Kim, Song-Ju;Hwang, Moon-Soo;Kim, Young-Min
    • International Journal of Contents
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • A new power control algorithm for wireless communication which can be applied to various near distance communications and USN/RFID systems is proposed. This technique has been applied and tested to lithium coin battery operated UHF/microwave transceiver systems to show extremely long communication life time without battery exchange. The power control algorithm is based on the dynamic prediction method of arrival time for incoming packet at the receiver. We obtain 16mA current consumption in the TX module and 20mA current consumption in the RX module. The advantage provided by this method compared to others is that both master transceiver and slave transceiver can be low power consumption system.

Discovered Pilot Designs in MIMO OFDM System with optimization algorithms

  • JunYoung Son
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.44-50
    • /
    • 2023
  • For Wi-Fi and IoT wireless systems, high-capacity wireless communication technology is being applied using MIMO OFDM. Because of virtu0al subcarriers in the practical MIMO OFDM system, the pilot subcarriers cannot be spaced equally. Thus, it is difficult to obtain a good mean square error (MSE) performance of the channel estimate. This paper proposes applicable methods and the newly discovered locations of pilot subcarriers in four transmitted antennas resulting in a good MSE performance with proposed optimization algorithms.

A Study On The Characteristics Of The Medium Voltage Power Distribution Line Channel By Wideband Channel Impulse Response Measurement Using PN Sequence (PN 시퀀스 방식의 광대역 임펄스 응답 측정을 통한 고압 배전선로 채널 특성 연구)

  • Oh Hui-Myoung;Choi Sung-Soo;Lee Jae-Jo;Kim Kwan-Ho;Whang Keum-Chan
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.1
    • /
    • pp.56-60
    • /
    • 2005
  • In the power-line communication(PLC) systems, the power line is a wired medium. However, the power line channel has the multi-path fading characteristics like the wireless channel in the wireless communication systems because it has the signal reflection and divergence by the impedance mismatching between many branch lines and loads. So the analysis of the multi-path characteristics is very important, and it has been doing by the several measurement methods for the impulse response between the transmitter and the receiver. PN sequence method has originally been used as a wideband impulse response measurement mettled for wireless channel, but it is recently being applied to not only the wireless channel but also the wired channel like the power line channel. This method is more useful and effective for the long distance communication channel like the medium voltage power distribution line with the multi-paths[1]. In this thesis, we have measured impulse response for the medium voltage power distribution line channel by the wideband measurement method using PN sequence, analytically studied the measured data and presented the results.

Resource allocation in downlink SWIPT-based cooperative NOMA systems

  • Wang, Longqi;Xu, Ding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.20-39
    • /
    • 2020
  • This paper considers a downlink multi-carrier cooperative non-orthogonal multiple access (NOMA) transmission, where no direct link exists between the far user and the base station (BS), and the communication between them only relies on the assist of the near user. Firstly, the BS sends a superimposed signal of the far and the near user to the near user, and then the near user adopts simultaneous wireless information and power transfer (SWIPT) to split the received superimposed signal into two portions for energy harvesting and information decoding respectively. Afterwards, the near user forwards the signal of the far user by utilizing the harvested energy. A minimum data is required to ensure the quality of service (QoS) of the far user. We jointly optimize power allocation, subcarrier allocation, time allocation, the power allocation (PA) coefficient and the power splitting (PS) ratio to maximize the number of data bits received at the near user under the energy causality constraint, the minimum data constraint and the transmission power constraint. The block-coordinate descent method and the Lagrange duality method are used to obtain a suboptimal solution of this optimization problem. In the final simulation results, the superiority of the proposed NOMA scheme is confirmed compared with the benchmark NOMA schemes and the orthogonal multiple access (OMA) scheme.

ARM: Adaptive Resource Management for Wireless Network Reliability (무선 네트워크의 신뢰성 보장을 위한 적응적 자원 관리 기법)

  • Lee, Kisong;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2382-2388
    • /
    • 2014
  • To provide network reliability in indoor wireless communication systems, we should resolve the problem of unexpected network failure rapidly. In this paper, we propose an adaptive resource management (ARM) scheme to support seamless connectivity to users. In consideration of system throughput and user fairness simultaneously, the ARM scheme adaptively determines the set of healing channels, and performs scheduling and power allocation iteratively based on a constrained non-convex optimization technique. Through intensive simulations, we demonstrate the superior performance results of the proposed ARM scheme in terms of the average cell capacity and user fairness.

P2HYMN: Hybrid Network Systems for Maintenance Support in Power Plants (P2HYMN: 발전소 정비지원 하이브리드 네트워크 시스템)

  • Jin, Young-Hoon;Choo, Young-Yeol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.7
    • /
    • pp.782-787
    • /
    • 2014
  • Due to the complicated steel structure and safety concern, it is very difficult to deploy wireless networks in power plants. This paper presents a hybrid network, named as $P^2HYMN$ (Power Plant HYbrid Maintenance Network), encompassing PLC (Power Line Communication), TLC (Telephone Line Communication), and Wireless LAN. The design goal of $P^2HYMN$ is to integrate multimedia data such as design drawings of control equipment, process data, and video image data for maintenance operation in electric power plants. A Multiplex Line Communication (MLC) device was designed and implemented to integrate PLC, TLC, and Wireless LAN into $P^2HYMN$. Performance test of $P^2HYMN$ has been conducted on a testbed under various conditions. The throughput of TLC was shown as 39 Mbps. Because the bandwidth requirement per camera is 8.5 Mbps on average, TLC is expected to support more thant four video camera at the same time.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Resource Allocation in Multi-User MIMO-OFDM Systems with Double-objective Optimization

  • Chen, Yuqing;Li, Xiaoyan;Sun, Xixia;Su, Pan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2063-2081
    • /
    • 2018
  • A resource allocation algorithm is proposed in this paper to simultaneously minimize the total system power consumption and maximize the system throughput for the downlink of multi-user multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems. With the Lagrange dual decomposition method, we transform the original problem to its convex dual problem and prove that the duality gap between the two problems is zero, which means the optimal solution of the original problem can be obtained by solving its dual problem. Then, we use convex optimization method to solve the dual problem and utilize bisection method to obtain the optimal dual variable. The numerical results show that the proposed algorithm is superior to traditional single-objective optimization method in both the system throughput and the system energy consumption.

A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices (산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구)

  • Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.757-770
    • /
    • 2020
  • Industrial Control System(ICS) is a system that measures, monitors, and controls various distributed assets, and is used in industrial facilities such as energy, chemical, transportation, water treatment, and manufacturing plants or critial infrastructure. Because ICS system errors and interruptions can cause serious problem and asset damage, research on prevention and minimization of security threats in industrial control systems has been carried out. Previously wireless communication was applied in limited fields to minimize security risks, but the demand for industrial wireless communication devices is increasing due to ease of maintenance and cost advantages. In this paper, we analyzed the security threats of industrial wireless communication devices supporting WirelessHART and ISA100.11a. Based on the analysis results, we proposed the security requirements for adopting and operating industrial wireless communication devices. We expect that the proposed requirements can mitigate security threats of industrial wireless devices in ICS.

Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3557-3571
    • /
    • 2014
  • We develop a secret key generation scheme using phase estimation in ultra-wideband (UWB) wireless fading channels. Based on the reciprocity theorem, two terminals extract the phase of the channel as a common random source to generate secret bits. Moreover, we study the secret key rate by a pair of nodes observing correlated sources and communicating to achieve secret key agreement over public communication channels. As our main results, we establish a more practical upper bound from Cramer-Rao bound (CRB) and compare it with a universally theoretical upper bound on the shared maximum key rate from mutual information of correlated random sources. Derivation and numerical examples are presented to demonstrate the bound. Simulation studies are also provided to validate feasibility and efficiency of the proposed scheme.