• Title/Summary/Keyword: broadband wireless

Search Result 465, Processing Time 0.034 seconds

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

  • PDF

On the Selection of Burst Preamble Length for the Symbol Timing Estimate in the AWGN Channel

  • Lee, Seung-Hwan;Kim, Nam-il;Kim, Eung-Bae
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.2059-2062
    • /
    • 2002
  • For detection of digitally modulated signals, the receiver must be provide with accurate carrier phase and symbol timing estimates. So far, tots of algorithms have been suggested for those purposes. In general, a interpolation filter with TED(Timing Error Detection) like Gardner algorithm is popularly used for symbol timing estimate of digital communication receiver. Apart from the performance point of view, a multiplicative operation of any interpolation filter limits the symbol rate of the system. Hence, we suggest a new symbol timing estimate algorithm for high speed burst-mode fixed wireless communication system and analyze its performance in the AWGN channel.

  • PDF

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Work chain-based inverse kinematics of robot to imitate human motion with Kinect

  • Zhang, Ming;Chen, Jianxin;Wei, Xin;Zhang, Dezhou
    • ETRI Journal
    • /
    • v.40 no.4
    • /
    • pp.511-521
    • /
    • 2018
  • The ability to realize human-motion imitation using robots is closely related to developments in the field of artificial intelligence. However, it is not easy to imitate human motions entirely owing to the physical differences between the human body and robots. In this paper, we propose a work chain-based inverse kinematics to enable a robot to imitate the human motion of upper limbs in real time. Two work chains are built on each arm to ensure that there is motion similarity, such as the end effector trajectory and the joint-angle configuration. In addition, a two-phase filter is used to remove the interference and noise, together with a self-collision avoidance scheme to maintain the stability of the robot during the imitation. Experimental results verify the effectiveness of our solution on the humanoid robot Nao-H25 in terms of accuracy and real-time performance.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

A Cell Plan Study for Local Wireless Construction in a New Demand Area (신규지역에서의 지역무선 구축을 위한 셀 설계 연구)

  • Lee Jae-Wan;Ko Nam-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.764-771
    • /
    • 2005
  • As high-speed class broadband communication services have come in earnest broadband communication services are well regularized, utilizing not only wire but also wireless. One of wireless communication systems named B-WLL system, which provides high-speed broadband communication services, gives users inconvenience because it utilizes wire in the service area. In order to overcome this drawback, local wireless construction with ubiquitous environment has been considered in a new service demand area. We bring forth a scheme of cell Planning with 2 GHz frequency for wireless LAN construction which provides connection and mobility with no restrictions in time and locations.

Analysis of Traffic Characteristics in Broadband Wireless Access (광대역 무선 액세스 환경에서의 트래픽 특성분석)

  • Koo Hye-Ryun;Lim Seog-Ku
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.346-351
    • /
    • 2005
  • 인터넷의 급속한 보급과 대용량 멀티미디어 서비스에 대한 요구 증가로 댁내 또는 중소사업장에 대한 광대역 무선 액세스(Broadband Wireless Access) 수요가 증가하고 있다. 기존의 무선랜은 도달거리가 짧아서 이동 중일 때나 AP(Access Point)에서 멀어지면 통화품질이 저하되고, 무선인터넷은 사용 비용이 높다. 이를 보안한 광대역 무선 인터넷 시스템인 와이브로(WiBro: Wireless Broadband Internet)는 휴대폰과 무선랜의 중간 영역에 위치한 이동초고속인터넷서비스이다. 본 논문에서는 IEEE 802.16 BWA을 기반으로 멀티미디어 서비스를 제공하기 위해서 서비스별 트래픽 모델과 특성을 분석하고, 다양한 트래픽 혼합 비율에 따라 시뮬레이션을 수행하였으며, 이를 토대로 최종적으로는 WiBro 시스템에서 수용 가능한 최대 가입자 수를 산출하였다.

  • PDF

광대역 무선인터넷의 고객수용 의향분석 및 서비스 제공전략

  • 지경용;김문구;임상민
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.55-65
    • /
    • 2003
  • Since 1990s, despite the emergence of innovative telecommunication services in accordance with technological changes, only few services have attained satisfactory number of subscribers, and create revenues. As with other products or services, the possibility for the success of new telecommunication services is low, thus a systematic business strategy by businesses is required to achieve market success with broadband wireless Internet. For the current broadband wireless Internet to successfully enter the early market with an early growth, a customer oriented market strategy and service provisioning strategy is inevitable. In this study based on the market survey of individuals and business customers, the customer demand and related needs of broadband wireless Internet have been analyzed in depth. Then with the analysis and establishment of the killer applications and market segmentation, market development strategy is proposed.

  • PDF

Performance of Turbo Coded OFDM/FHMA Hybrid Systems in Impulsive Interference and Broadband Wireless Communication Channel (임펄스 간섭과 광대역 무선통신 채널에서 터보 부호를 적용한 OFDM/FHMA 하이브리드 시스템의 성능)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.213-218
    • /
    • 2006
  • In this paper, we analyzed the performance of orthogonal frequency division multiplexing/ frequency hopping multiple access(OFDM/FHMA) hybrid system that in impulsive interference and broadband wireless communication channel then we applied the turbo code scheme to make satisfied in data and voice transmission service. Also, we compared the bit error rate(BER) performance of turbo coded diversity scheme in the OFDM/FHMA hybrid system. As a result of simulation, proposed OFDM/FHMA hybrid system shows the enhancement of 10 times compared to the general OFDM/FHMA system.

  • PDF

An IPv6 based Fast Handover Deployment Scheme for WiBro Networks (광대역 무선 인터넷 망에서 IPv6 기반의 고속 핸드오버 도입을 위한 방안)

  • Shim, Min-Sik;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1101-1112
    • /
    • 2006
  • With the recent growth in demand for high-data rate multimedia services in the wireless environments, the Mobile Broadband Wireless Access (MBWA) technologies, such as WiBro (Wireless Broadband internet) system, are gradually coming into the spotlight. Unlike the conventional mobile communication networks based on cellular system, the WiBro system basically consists of IP based backbone networks that will be ultimately deployed by Ipv6 (IP version six) based backbone networks according to the All-IP trend for the network evolution. In such wireless mobile environments, it is needed to support the mobility management protocol on network layer as well as physical layer and Medium Access Control (MAC) layer in WiBro system. Accordingly, in this paper, we propose a fast handover scheme for improving the handover performance in IPv6 based WiBro system and show that the proposed scheme achieves loss-free and low handover latency during inter-subnet movement of the mobile stations through the simulation.