• Title/Summary/Keyword: Wireless Network Management

Search Result 1,179, Processing Time 0.027 seconds

Fast and Secure Handoff Mechanism for IEEE 802.11i System (IEEE 802.11i 환경에서 신속하고 보안성 있는 핸드오프 메커니즘)

  • Park, Jae-Sung;Lim, Yu-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.159-167
    • /
    • 2006
  • IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLAN where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In this paper, we propose a fast and secure handoff scheme by reducing authentication and key management delay in the handoff process. When a user handoffs, security context established between the user and the previous access point (AP) is forwarded from the previous AP to the current AP, and the session key is reused before the handoff session terminates. The freshness of session key is maintained by regenerating session keys after handoff session is terminated. The proposed scheme can achieve considerable reduction in handoff delay with providing the same security level as 802.1X authentication by letting an AP authenticate a handoff user before making an robust security network association (RSNA) with it.

Cluster Head Selection Scheme Using Fluctuating Distance of Cluster Head (클러스터 헤드의 변동 거리를 고려한 클러스터 헤드 선출 기법)

  • Kim, Jin-Su;Choi, Seong-Yong;Han, Seung-Jin;Choi, Jun-Hyeog;Rim, Kee-Wook;Lee, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.77-86
    • /
    • 2008
  • Traditional cluster-based routing method is a representative method for increasing the energy efficiencies. In these cluster-based routing methods, the selected cluster head collect/aggregate the information and send the aggregated information to the base station. But they have to solve the unnecessary energy dissipation of frequent information exchange between the cluster head and whole member nodes in cluster. In this paper, we minimize the frequency of the information exchange for reducing the unnecessary transmit/receive frequencies as calculate the overlapped area or number of overlapped member nodes between the selected cluster head and previous cluster head in the setup phase. And besides, we consider the direction of super cluster head for optimal cluster formation. So, we propose the modified cluster selection scheme that optimizes the energy dissipation in the setup phase and reuses the saved energy in the steady phase efficiently that prolongs the whole wireless sensor network lifetime by uniformly selecting the cluster head.

Development of Real-time Underground Utilities Management System using Real-time Kinematics Systems and 3D Game Engines (RTK 시스템과 3차원 게임엔진을 이용한 실시간 지하 매설물 관리 시스템 개발)

  • Kim, Sung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.51-58
    • /
    • 2011
  • This paper describes a development of system that enables the user to manage and display from 3D viewer after at real-time saves attribute informations in DBMS using RTK systems and 3D game engines. The 3-dimensional game engines for this system will be input a attribute values of underground utilities which is measured from RTK systems with wireless network. This system which sees does to make be a possibility of managing creation, elimination, modification for the underground utilities from 3-dimensional viewer. The coordinates about the underground utilities measures with GPS. The base reference point for RTK systems uses one in reference points which are measured in existing. GPS coordinates revised a reference point in standard. The 3-dimensional game engines are having the function which manages the underground utilities with 3-dimensions. The function is the same as wireless network of RTK systems, 3-dimensional display for terrain and underground utilities, input and registration for attribute of underground utilities, etc. The system which sees will be able to prevent the various accident which is caused by in the spatial location coordinate which underground utilities is inaccurate. And the system which sees is accurate is a possibility of managing and the application possibility is high very. Finally, this system could be applied very usefully from the point of view which starts a new town development.

Improving QoS using Cellular-IP/PRC in Wireless Internet Environment (Cellular-IP/PRC에서 핸드오프 상태 머신에 의한 QoS 개선)

  • Kim Dong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1302-1308
    • /
    • 2005
  • Propose Cellular-IP/PRC network with united paging and Cellular IP special duality that use roof information administration cache to secure lake acceptance method in wireless Internet environment and QoS in lesser extent cell environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and moat of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.

An Emergency Management Architecture Using Personalized Emergency Policy for Smart Healthcare (스마트 헬스케어를 위한 사용자 맞춤형 응급 정책을 활용한 응급 관리 구조)

  • Chun, Seung-Man;Choi, Joo-Yeon;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.3-11
    • /
    • 2013
  • In smart healthcare service, the accurate and prompt emergency detection and notification are very critical to patients' lives. Since these detection and notification of emergency situation are usually performed by the medical staffs, it is difficult to simultaneously support many patients in real-time. This article presents a methodology for emergency bio-data transmission for smart healthcare using personalized emergency policy. It consists of three steps: In step 1, the bio-data is collected by wireless body area network. In step 2, the decision on emergency is made using personalized emergency policy. In step 3, the emergency message including the health condition information is converted between IEEE 11073 PHD message and HL7 CDA. By doing this, the emergency status of the individual bio-data collected from wireless body area network is detected automatically using personalized emergency policy. When the emergency is detected, the quick emergency rescue service can be provided to the patient by delivering to the emergency notification and the emergency bio-data. We have verified the service and functions of the proposed system architecture by realizing it.

The IEEE 802.15.4e based Distributed Scheduling Mechanism for the Energy Efficiency of Industrial Wireless Sensor Networks (IEEE 802.15.4e DSME 기반 산업용 무선 센서 네트워크에서의 전력소모 절감을 위한 분산 스케줄링 기법 연구)

  • Lee, Yun-Sung;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • The Internet of Things (IoT) technology is rapidly developing in recent years, and is applicable to various fields. A smart factory is one wherein all the components are organically connected to each other via a WSN, using an intelligent operating system and the IoT. A smart factory technology is used for flexible process automation and custom manufacturing, and hence needs adaptive network management for frequent network fluctuations. Moreover, ensuring the timeliness of the data collected through sensor nodes is crucial. In order to ensure network timeliness, the power consumption for information exchange increases. In this paper, we propose an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support, and we evaluate various performance metrics. The proposed algorithm adaptively assigns communication slots by analyzing the network traffic of each node, and improves the network reliability and timeliness. The experimental results indicate that the throughput of the DSME MAC protocol is better than the IEEE 802.15.4e TSCH and the legacy slotted CSMA/CA in large networks with more than 30 nodes. Also, the proposed algorithm improves the throughput by 15%, higher than other MACs including the original DSME. Experimentally, we confirm that the algorithm reduces power consumption by improving the availability of communication slots. The proposed algorithm improves the power consumption by 40%, higher than other MACs.

A Study on Routing Implementation and Performance Measurement Scheme among IPv6 Terminals (IPv6 단말간 라우팅 구현과 성능측정 구성 방안에 관한 연구)

  • Woo, Jung-Yoon;Yang, JaeSoo;Lee, Jong Won;Kim, Kangju
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.505-512
    • /
    • 2018
  • Internet demand has increased rapidly, and Internet Protocol Version 4, the main Internet protocol, can not cope with various types of network demand in the future. Therefore, it is urgent to spread IPv6-based stable network to solve the shortage of Internet address resources. Due to the proliferation of IoT and the increase in mobile devices, efficient and optimal IPv6 routing design is indispensable. In this paper, we have studied about characteristics of IPv6, address system of IPv6, structure analysis and efficient routing technology among IPv6 terminals. Furthermore, experimental results on routing packet analysis and convergence time are presented in network - based IPv6 routing implementation environment. In addition, we show the results of the experiment analysis by dividing the implementation of IPv6 routing, operation test, and fail over performance into three kinds of routing protocol methods. As a result, this study can be applied to the introduction of IPv6 system, test bed environment construction, and network design.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Development of Greenhouse Environment Monitoring & Control System Based on Web and Smart Phone (웹과 스마트폰 기반의 온실 환경 제어 시스템 개발)

  • Kim, D.E.;Lee, W.Y.;Kang, D.H.;Kang, I.C.;Hong, S.J.;Woo, Y.H.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.18 no.1
    • /
    • pp.101-112
    • /
    • 2016
  • Monitoring and control of the greenhouse environment play a decisive role in greenhouse crop production processes. The network system for greenhouse control was developed by using recent technologies of networking and wireless communications. In this paper, a remote monitoring and control system for greenhouse using a smartphone and a computer with internet has been developed. The system provides real-time remote greenhouse integrated management service which collects greenhouse environment information and controls greenhouse facilities based on sensors and equipments network. Graphical user interface for an integrated management system was designed with bases on the HMI and the experimental results showed that a sensor data and device status were collected by integrated management in real-time. Because the sensor data and device status can be displayed on a web page, transmitted using the server program to remote computer and mobile smartphone at the same time. The monitored-data can be downloaded, analyzed and saved from server program in real-time via mobile phone or internet at a remote place. Performance test results of the greenhouse control system has confirmed that all work successfully in accordance with the operating conditions. And data collections and display conditions, event actions, crops and equipments monitoring showed reliable results.

A Novel Idle Mode Operation in IEEE 802.11 WLANs: Prototype Implementation and Performance Evaluation (IEEE 802.11 WLAN을 위한 Idle Mode Operation: Prototype 구현 및 성능 측정)

  • Jin, Sung-Geun;Han, Kwang-Hun;Choi, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.152-161
    • /
    • 2007
  • IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet access, and new applications such as Voice over WLAM (VoWLAN) are fast emerging today. For the battery-powered VoWLAN devices, the standby time extension is a key concern for the market acceptance while today's 802.11 is not optimized for such an operation. In this paper, we propose a novel Idle Mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a Mobile Host (MH) does not need to perform a handoff within a predefined Paging Area (PA). Only when the MH enters a new PA, an idle handoff is performed with a minimum level of signaling. Due to the absence of such an idle mode operation, both IP paging and Power Saving Mode (PSM) have been considered the alternatives so far even though they are not efficient approaches. We implement our proposed scheme in order to prove the feasibility. The implemented prototype demonstrates that the proposed scheme outperforms the legacy alternatives with respect to energy consumption, thus extending the standby time.