• 제목/요약/키워드: Wireless Information Technology

검색결과 3,282건 처리시간 0.037초

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Human Motion Tracking With Wireless Wearable Sensor Network: Experience and Lessons

  • Chen, Jianxin;Zhou, Liang;Zhang, Yun;Ferreiro, David Fondo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.998-1013
    • /
    • 2013
  • Wireless wearable sensor networks have emerged as a promising technique for human motion tracking due to the flexibility and scalability. In such system several wireless sensor nodes being attached to human limb construct a wearable sensor network, where each sensor node including MEMS sensors (such as 3-axis accelerometer, 3-axis magnetometer and 3-axis gyroscope) monitors the limb orientation and transmits these information to the base station for reconstruction via low-power wireless communication technique. Due to the energy constraint, the high fidelity requirement for real time rendering of human motion and tiny operating system embedded in each sensor node adds more challenges for the system implementation. In this paper, we discuss such challenges and experiences in detail during the implementation of such system with wireless wearable sensor network which includes COTS wireless sensor nodes (Imote 2) and uses TinyOS 1.x in each sensor node. Since our system uses the COTS sensor nodes and popular tiny operating system, it might be helpful for further exploration in such field.

A Three-way Handshaking Access Mechanism for Point to Multipoint In-band Full-duplex Wireless Networks

  • Zuo, Haiwei;Sun, Yanjing;Lin, Changlin;Li, Song;Xu, Hongli;Tan, Zefu;Wang, Yanfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3131-3149
    • /
    • 2016
  • In-band Full-duplex (IBFD) wireless communication allows improved throughput for wireless networks. The current Half-duplex (HD) medium access mechanism Request to Send/Clear to Send (RTS/CTS) has been directly applied to IBFD wireless networks. However, this is only able to support a symmetric dual link, and does not provide the full advantages of IBFD. To increase network throughput in a superior way to the HD mechanism, a novel three-way handshaking access mechanism RTS/SRTS (Second Request to Send)/CTS is proposed for point to multipoint (PMP) IBFD wireless networks, which can support both symmetric dual link and asymmetric dual link communication. In this approach, IBFD wireless communication only requires one channel access for two-way simultaneous packet transmissions. We first describe the RTS/SRTS/CTS mechanism and the symmetric/asymmetric dual link transmission procedure and then provide a theoretical analysis of network throughput and delay using a Markov model. Using simulations, we demonstrate that the RTS/SRTS/CTS access mechanism shows improved performance relative to that of the RTS/CTS HD access mechanism.

Web-based Real Environment Monitoring Using Wireless Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Kim, Min-Ah;Byeon, Ok-Hwan
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.207-210
    • /
    • 2005
  • Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the $21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies.

  • PDF

Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks

  • Han, Longzhe;Nguyen, Dinh Han;Kang, Seung-Seok;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.3775-3788
    • /
    • 2014
  • With the increasing number of the wireless and mobile networks, the way that people use the Internet has changed substantively. Wireless multimedia services, such as wireless video streaming, mobile video game, and mobile voice over IP, will become the main applications of the future wireless Internet. To accommodate the growing volume of wireless data traffic and multimedia services, cognitive radio (CR) and Information-Centric Network (ICN) have been proposed to maximize the utilization of wireless spectrum and improve the network performance. Although CR and ICN have high potential significance for the future wireless Internet, few studies have been conducted on collaborative operations of CR and ICN. Due to the lack of infrastructure support in multi-hop ad hoc CR networks, the problem is more challenging for video streaming services. In this paper, we propose a Cross-layer Video Streaming Mechanism (CLISM) for Cognitive Radio Ad Hoc Information Centric Networks (CRAH-ICNs). The CLISM included two distributed schemes which are designed for the forwarding nodes and receiving nodes in CRAH-ICNs. With the cross-layer approach, the CLISM is able to self-adapt the variation of the link conditions without the central network controller. Experimental results demonstrate that the proposed CLISM efficiently adjust video transmission policy under various network conditions.

Wireless Network Health Information Retrieval Method Based on Data Mining Algorithm

  • Xiaoguang Guo
    • Journal of Information Processing Systems
    • /
    • 제19권2호
    • /
    • pp.211-218
    • /
    • 2023
  • In order to improve the low accuracy of traditional wireless network health information retrieval methods, a wireless network health information retrieval method is designed based on data mining algorithm. The invalid health information stored in wireless network is filtered by data mapping, and the health information is clustered by data mining algorithm. On this basis, the high-frequency words of health information are classified to realize wireless network health information retrieval. The experimental results show that exactitude of design way is significantly higher than that of the traditional method, which can solve the problem of low accuracy of the traditional wireless network health information retrieval method.

Binary CDMA 기반의 무선 CCTV 시스템 설계 및 구현 (Design and Implementation of a Wireless CCTV System based on the Binary-CDMA Technology)

  • 최재원
    • 한국정보통신학회논문지
    • /
    • 제16권1호
    • /
    • pp.72-80
    • /
    • 2012
  • Binary CDMA는 음성 영상 등의 멀티미디어 데이터를 초고속으로 우수한 전송품질로 통신할 수 있는 우리나라가 개발한 새로운 표준 무선통신 기술이다. 본 논문에서는 케이블의 설치나 매설 작업 없이 원하는 장소에 자유롭게 설치할 수 있는 Binary CDMA 기반의 무선 CCTV 시스템 개발을 위한 시스템의 설계 및 구현방법에 관해 연구하였다. 멀티미디어 통신보드와 RF 모듈을 개발하고, 무선 영상전송기와 CCTV 중계기의 응용프로그램을 구현하여 Binary-CDMA 무선 CCTV 시스템의 시제품을 개발하였다.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • 제10권2호
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

무선통신기술의 진화: 무선통신산업 경쟁하의 기술 경로 탐색 (Evolution of Wireless Technologies: Exploring the Technology Trajectory in Competitive Wireless Industry)

  • 김학주
    • 경영정보학연구
    • /
    • 제13권2호
    • /
    • pp.43-54
    • /
    • 2011
  • 이 논문은 무선통신 산업에 있어서 경쟁하의 무선통신기술의 진화 경로를 밝히고자 하였습니다. 저자는 과거 자료를 분석하기위해 로가렛분석(Loglet Analysis) 기법을 도입하였습니다. 초기 연구결과는 기술경로상에서 네트워크 효과와 대체효과가 존재한다는 것입니다. 이 논문의 결과는 무선통신 서비스 사업자에게 그들의 네트워크에서 이익을 최대화할 수 있는 방향과 차세대 무선통신기술 이전 전략을 수립하는데 이용될 수 있을 것입니다.