• Title/Summary/Keyword: Wireless Network Management

Search Result 1,172, Processing Time 0.028 seconds

u-Mart Network using RFID/USN based Movement-Reader Device for Effective Shopping of Customer (고객의 효율적인 쇼핑을 위한 RFID/USN 기반 이동형리더기를 이용한 u-마트 네트워크)

  • Diao, Jianhua;Yang, Jin-Ho;Ahn, Byeong-Tae;Kang, Hyun-Syug
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.104-112
    • /
    • 2008
  • RFID/USN is considered important basic infra of ubiquitous community and tried practical adaption through various research. Specially, there is during researcher progresses for stock and state management of logistics to let you get at u-mart systems. It discern thing from warehouse to deliver as adhere RFID tag of palette in keeping unit of article and construct form of thing to analyze information of environment status using sence module based on function of wireless communication. in the paper, propose composition of customer satisfaction system using RFID chip in u-Mart status management system based on RFID/USN and according to analysis specific information of commodity, propose movement reader device to offer real-time information from customer. And it presents the improvement program for the provision of product information which is appropriate uses the RFID chip and the provision of control information in the customer who is a core of consuming.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

Design and Implementation of RFID based Tree History Information System for Cultural Heritage Restoration (RFID 기반 문화재 복원용 임목 이력 정보 시스템의 설계 및 구현)

  • Kim, Sam-Geun;Moon, Il-Hwan;Park, Jae-Pyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1360-1368
    • /
    • 2010
  • Recently, as the development of Radio Frequency Identification (RFID) technology becomes active, the demand for services which can electronically manage the history and location information of major trees, including trees for cultural heritage restoration and nurse trees, has been increased. This information has been managed by separated drawings and documents or storing its information into PDAs and then structuring data files through input and computation. But, these methods imply limitations in terms of its extensibility and scalability. This paper has designed and implemented an RFID based Tree History Information System (THIS) for cultural heritage restoration. The purpose of the proposed system is to support to be able to effectively and consistently manage historical information of major trees and improve working processes by implementing mobile RFID services through wireless Internet or Local Area Network (LAN) as mobile communication networks. Through implementation, it is confirmed that the proposed system can manage the historical information of major trees more effectively than conventional methods and also improve previous field working conditions.

A Study on Measurement Error Reduction of Indoor and Outdoor Location Determination in Fingerprint Method (실내외 위치측위를 위한 Fingerprint 기반 측정오차 감소 방안 연구)

  • Kwon, Dae-Woo;Lee, Doo-Yong;Song, Young-Keun;Jang, Jung-Hwan;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Location-Based Service(LBS) is a service that provides a variety of convenience in life using location information that can be obtained by mobile communication network or satellite signal. In order to provide LBS precisely and efficiently, we need the location determination technology, platform technology and server technology. In this study, we studied on how we can reduce the error on location determination of objects such people and things. Fingerprint location determination method was applied to this study because it can be used at current wireless communication infrastructure and less influenced by a variety of noisy environment than other location determination methods. We converted the probability value to logarithmic scale value because using the sum of k probability values is not suitable to be applied to weight determination. In order to confirm the performance of suggested method, we developed location determination test program with Visual Basic 6.0 and performed the test. According to indoor and outdoor test results, the suggested stochastic method reduced the distance error by 17%, 18% and 9% respectively at indoor environment and 25%, 11% and 4% at outdoor environment compared with deterministic NN, kNN and kWNN fingerprint methods.

A Study on Development based on ToA Method of Location Determination System in Indoor (ToA 기반 실내 위치측위 시스템 개발에 관한 연구)

  • Lee, Doo-Yong;Piao, Xue-Hua;Song, Young-Keun;Jang, Jung-Hwan;Jho, Yong-Chul;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.99-105
    • /
    • 2011
  • Location-Based Service(LBS) is a service that provides a variety of convenience in life using location information that can be obtained by mobile communication network or satellite signal. In order to provide LBS precisely and efficiently, we have to need technologies such as location determination technology, platform technology and server technology first. In this study, we studied on how we can reduce the error on location determination of objects such people and things. Fingerprint location determination method was applied to this study because it can be used at current wireless communication infrastructure and less influenced by a variety of noisy environment than other location determination methods. We used the time of arrival(ToA) method in fingerprint location determination method. In order to confirm the performance of suggested method, we developed location determination test program with LAbVIEW 2010 and performed the test. According to indoor test results, the suggested method reduced the distance error by 24%, 34% and 19% respectively at indoor environment compared with deterministic kWNN and Rice Gaussian fingerprint methods.

Popularity-Based Pushing Scheme for Supporting Content Provider Mobility in Content-Centric Networking (콘텐츠 중심 네트워크에서 정보제공자의 이동성 지원을 위한 인기도 기반 푸싱 기법)

  • Woo, Taehee;Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.78-87
    • /
    • 2015
  • Content-Centric Networking(CCN) is a new networking paradigm to search for the routing information needed to find a data from the content name, unlike conventional IP networks. In CCN, the mobility management, one of the CCN challenges, is consists of consumer mobility and content provider mobility. Among both, in the case of the content provider mobility, it requires too much overhead and time to update routing information on the corresponding routers. In this paper, we propose Popularity-based Pushing CCN(PoPCoN) which considers the content popularity to support effective mobility of content provider in CCN. Our proposed algorithm shortens content download time for the consumer and reduces the network overhead during mobility as compared to the existing approaches.

LED Lighting Monitoring System Using Bluetooth BLE (Bluetooth BLE를 활용한 LED 조명 관제시스템에 관한 연구)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.367-372
    • /
    • 2017
  • LED illumination has been developed from simple illumination to human oriented multi-functional system depending on the IT convergence trends. Thus, the convergence of IT technology such as various types of sensor and communication functions with application software can make saving of energy, and there are also several needs about the tailor-made illuminations requirements for the diverse users who want to take their own colors, strengths of the light. For the adaption of these kinds of intelligent system illumination, user oriented sensor and control should be possible. The LED lighting control system transmits and receives data via the Bluetooth mesh network and provides functions such as LED lighting control, LED lighting condition monitoring, energy usage monitoring, and energy peak point management. Therefore, in this paper, we suggest wireless communication platform and control system for the LED illumination control. We can expect life extension of LED illumination, and energy saving through this suggested system.

Efficient Radio Resource Allocation for Cognitive Radio Based Multi-hop Systems (다중 홉 무선 인지 시스템에서 효과적인 무선 자원 할당)

  • Shin, Jung-Chae;Min, Seung-Hwa;Cho, Ho-Shin;Jang, Youn-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5A
    • /
    • pp.325-338
    • /
    • 2012
  • In this paper, a radio resource allocation scheme for a multi-hop relay transmission in cognitive radio (CR) system is proposed to support the employment of relay nodes in IEEE 802.22 standard for wireless regional area network (WRAN). An optimization problem is formulated to maximize the number of serving secondary users (SUs) under system constraints such as time-divided frame structure for multiplexing and a single resource-unit to every relay-hop. However, due to mathematical complexity, the optimization problem is solved with a sub-optimal manner instead, which takes three steps in the order of user selection, relay/path selection, and frequency selection. In the numerical analysis, this proposed solution is evaluated in terms of service rate denoting as the ratio of the number of serving SUs to the number of service-requesting SUs. Simulation results show the condition of adopting multi-hop relay and the optimum number of relaying hops by comparing with the performance of 1-hop system.

Technology and Policy for Blockchain-based Spectrum Sharing (블록체인 기반의 전파 공유 기술과 전파 정책)

  • Shin, Na Yeon;Nam, Ji-Hyun;Choi, Ye Jin;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.13-21
    • /
    • 2019
  • The restricted network or the unbalanced distribution of spectrum is causing the problems of lack of spectrum resources and deterioration of the service quality. In addition, the existing centralized radio sharing method has not been a fundamental solution for radio sharing and is inefficient in terms of cost, convenience, and security. In this paper, we propose a blockchain-based spectrum sharing as a low-cost, trustworthy, high-efficiency platform that can distribute and share spectrum resources, and propose policies to realize this. In the spectrum sharing platform, spectrum information about Wi-Fi AP and LTE mobile hotspot is registered in the blockchain, and spectrum sharers and users can conclude peer-to-peer spectrum sharing contract quickly and efficiently through smart contract. The pay for the shared spectrum resources and reward for spectrum quality management open platform ecosystem to activate the circulation-sharing and it can provide a convenient and efficient public wireless infrastructure.

Development of Traffic Safety Monitoring Technique by Detection and Analysis of Hazardous Driving Events in V2X Environment (V2X 환경에서 위험운전이벤트 검지 및 분석을 통한 교통안전 모니터링기법 개발)

  • Jeong, Eunbi;Oh, Cheol;Kang, Kyeongpyo;Kang, Younsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.1-14
    • /
    • 2012
  • Traffic management centers (TMC) collect real-time traffic data from the field and have powerful databases for analysing, recording, and archiving the data. Recent advanced sensor and communication technologies have been widely applied to intelligent transportation systems (ITS). Regarding sensors, various in-vehicle sensors, in addition to global positioning system (GPS) receiver, are capable of providing high resolution data representing vehicle maneuverings. Regarding communication technologies, advanced wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-vehicle infrastructure (V2I), which are generally referred to as V2X, have been widely used for traffic information and operations (references). The V2X environment considers the transportation system as a network in which each element, such as the vehicles, infrastructure, and drivers, communicates and reacts systematically to acquire information without any time and/or place restrictions. This study is motivated by needs of exploiting aforementioned cutting-edge technologies for developing smarter transportation services. The proposed system has been implemented in the field and discussed in this study. The proposed system is expected to be used effectively to support the development of various traffic information control strategies for the purpose of enhancing traffic safety on highways.