• Title/Summary/Keyword: broadband wireless network

Search Result 186, Processing Time 0.11 seconds

광대역 통합망 기반 유비퀴터스 네트워크 (BcN Based Ubiquitous Network)

  • 신용식;박용길;정원석
    • 정보통신설비학회논문지
    • /
    • 제3권2호
    • /
    • pp.81-89
    • /
    • 2004
  • In this paper, we describe ubiquitous environments and the trend of convergence that is an evolution path of. current telecommunication, and show the concept of broadband convergence network, service feature and evolution path. In order to converge wire and wireless communication, telecommunication and broadcasting, voice and data efficiently, broadband convergence network divides a network into service layer, control layer, transport layer, ubiquitous access and terminal layer. Broadband convergence network will be a network that can provide and control broadband multimedia services with QoS and security of different and customized level. Then we depict characteristics and types of broadband multimedia service, and describe the characteristic of broadband convergence network. Finally, we show ubiquitous network based on the broadband convert- gence network to provide ubiquitous service which is a future telecommunication service. We also describe requirements of ubiquitous network such as an intelligent and context based platform, convergence terminals, ubi- quitous computing devices, etc.

  • PDF

메쉬 네트워크를 활용한 무선 네트워크망 설계에 관한 연구 (A Study on Design of Wireless Networks using Mesh Networks)

  • 최용석;노정규
    • 한국위성정보통신학회논문지
    • /
    • 제9권1호
    • /
    • pp.45-50
    • /
    • 2014
  • 본 논문에서는 한 도시(원주시)를 대상으로 안정적이면서 높은 경제 절감 효과를 얻을 수 있는 광대역 무선 Smart-city형 네트워크 커버리지를 제안하고자 한다. 이를 위하여 해당 지역에 대한 사전 지리적 조사를 실시하고 환경에 적합한 장비를 선택하여 네트워크망의 추가 및 복구가 쉬운 무선 메쉬 네트워크망을 설계하였고 시뮬레이션을 통해 기존에 구축되어 있는 네트워크망과 그 성능을 비교, 평가하고 고찰하였다. 본 논문이 추구하는 목표는 연구를 통해 무선 메쉬 네트워크의 경비 절감 효과 및 우수한 성능을 평가받고 이를 활용하여 그린 IT의 기초가 될 수 있는 미래지향적 도심 통합 네트워크를 제안하는데 있다.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Work chain-based inverse kinematics of robot to imitate human motion with Kinect

  • Zhang, Ming;Chen, Jianxin;Wei, Xin;Zhang, Dezhou
    • ETRI Journal
    • /
    • 제40권4호
    • /
    • pp.511-521
    • /
    • 2018
  • The ability to realize human-motion imitation using robots is closely related to developments in the field of artificial intelligence. However, it is not easy to imitate human motions entirely owing to the physical differences between the human body and robots. In this paper, we propose a work chain-based inverse kinematics to enable a robot to imitate the human motion of upper limbs in real time. Two work chains are built on each arm to ensure that there is motion similarity, such as the end effector trajectory and the joint-angle configuration. In addition, a two-phase filter is used to remove the interference and noise, together with a self-collision avoidance scheme to maintain the stability of the robot during the imitation. Experimental results verify the effectiveness of our solution on the humanoid robot Nao-H25 in terms of accuracy and real-time performance.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

이동통신망과 WiBro망과의 연동을 위한 네트워크 아키텍처와 구현방안 (Design and Implementation of Interworking Architecture between 3G Cellular Network and Wireless Broadband Network)

  • 우대식;박성수;이동학;유재황;임종태
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2006년도 하계학술대회
    • /
    • pp.47-52
    • /
    • 2006
  • In this paper, we suggested new network architecture to provide seamless service between the cellular system and new wireless broadband network such as IEEE 802.16e, called WiBro. The interworking technologies are very important issue because mobile operator should provide service connectivity between various wireless networks based on different access technologies. Moreover a change and modification on legacy network should be minimized for providing interworking with new wireless broad-band network. We implemented proposed interworking architecture between 3G cellular network and 802.16e network to provide seamless service including interworking unit in real test environment. Also, we performed performance evaluation in hybrid network environments.

  • PDF

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks

  • Zhang, Aiqing;Ye, Xinrong;Chen, Jianxin;Zhou, Liang;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2375-2393
    • /
    • 2016
  • Key agreement is paramount in secure wireless communications. A promising approach to address key agreement schemes is to extract secure keys from channel characteristics. However, because channels lack randomness, it is difficult for wireless networks with stationary communicating terminals to generate robust keys. In this paper, we propose a Robust Secure Key Agreement (RSKA) scheme from Received Signal Strength (RSS) in stationary wireless networks. In order to mitigate the asymmetry in RSS measurements for communicating parties, the sender and receiver normalize RSS measurements and quantize them into q-bit sequences. They then reshape bit sequences into new l-bit sequences. These bit sequences work as key sources. Rather than extracting the key from the key sources directly, the sender randomly generates a bit sequence as a key and hides it in a promise. This is created from a polynomial constructed on the sender's key source and key. The receiver recovers the key by reconstructing a polynomial from its key source and the promise. Our analysis shows that the shared key generated by our proposed RSKA scheme has features of high randomness and a high bit rate compared to traditional RSS-based key agreement schemes.

휴대인터넷망을 이용한 VoIP 서비스 구현 (VoIP Service Implementation over IEEE 802.16e Broadband Wireless Access System)

  • 김윤식;정미영;정현민;이성춘
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.359-360
    • /
    • 2008
  • As broadband wireless access systems are widely accepted, VoIP service over the wireless network is being requested. Because previous VoIP implementations are designed to provide service over wired network, they does not consider security problem sufficiently that is one of the most vulnerable aspects of wireless communication. Therefore, this paper describes how to implement secure VoIP service over wireless network with minimum overhead.

  • PDF

Channel Assignment, Link Scheduling, Routing, and Rate Control for Multi-Channel Wireless Mesh Networks with Directional Antennas

  • Roh, Hee-Tae;Lee, Jang-Won
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.884-891
    • /
    • 2016
  • The wireless mesh network (WMN) has attracted significant interests as a broadband wireless network to provide ubiquitous wireless access for broadband services. Especially with incorporating multiple orthogonal channels and multiple directional antennas into the WMN, each node can communicate with its neighbor nodes simultaneously without interference between them. However, as we allow more freedom, we need a more sophisticated algorithm to fully utilize it and developing such an algorithm is not easy in general. In this paper, we study a joint channel assignment, link scheduling, routing, and rate control problem for the WMN with multiple orthogonal channels and multiple directional antennas. This problem is inherently hard to solve, since the problem is formulated as a mixed integer nonlinear problem (MINLP). However, despite of its inherent difficulty, we develop an algorithm to solve the problem by using the generalized Benders decomposition approach [2]. The simulation results show the proposed algorithm provides the optimal solution to maximize the network utility, which is defined as the sum of utilities of all sessions.

광대역 무선 환경에서 VBR 트래픽 스무딩에 대한 연구 (Empirical Study on Smoothing of VBR Stream for Broadband Wireless Network)

  • 심보욱;원유집;송승호
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2002년도 봄 학술발표논문집 Vol.29 No.1 (A)
    • /
    • pp.130-132
    • /
    • 2002
  • In this work, we like to present the result of study obtained from actual experiment. We instrument the effect of smoothing on packet loss behavior in mobile terminal on broadband wireless network under various different system settings. This activity requires comprehensive streaming software suite including streaming server, CODEC, and streaming client.

  • PDF