• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

Spectrum- and Energy- Efficiency Analysis Under Sensing Delay Constraint for Cognitive Unmanned Aerial Vehicle Networks

  • Zhang, Jia;Wu, Jun;Chen, Zehao;Chen, Ze;Gan, Jipeng;He, Jiangtao;Wang, Bangyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1392-1413
    • /
    • 2022
  • In order to meet the rapid development of the unmanned aerial vehicle (UAV) communication needs, cooperative spectrum sensing (CSS) helps to identify unused spectrum for the primary users (PU). However, multi-UAV mode (MUM) requires the large communication resource in a cognitive UAV network, resulting in a severe decline of spectrum efficiency (SE) and energy efficiency (EE) and increase of energy consumption (EC). On this account, we extend the traditional 2D spectrum space to 3D spectrum space for the UAV network scenario and enable UAVs to proceed with spectrum sensing behaviors in this paper, and propose a novel multi-slot mode (MSM), in which the sensing slot is divided into multiple mini-slots within a UAV. Then, the CSS process is developed into a composite hypothesis testing problem. Furthermore, to improve SE and EE and reduce EC, we use the sequential detection to make a global decision about the PU channel status. Based on this, we also consider a truncation scenario of the sequential detection under the sensing delay constraint, and further derive a closed-form performance expression, in terms of the CSS performance and cooperative efficiency. At last, the simulation results verify that the performance and cooperative efficiency of MSM outperforms that of the traditional MUM in a low EC.

Analysis of Communication Performance Requirements for Initial-Phase UAM Services (UAM 초기 운영을 위한 통신 성능 요구도 도출)

  • Young-Ho Jung;HyangSig Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.109-115
    • /
    • 2024
  • The Concept of Operations (ConOps) document issued by the Korean Government (K-UAM ConOps) for urban air mobility (UAM) services takes into account not only aviation voice communication but also the use of 4G and 5G mobile communication to support the initial phase of UAM services. This paper studies a methodology to establish communication performance requirements for UAM traffic management and presents the analyzed results for communication performance requirements. To accomplish this, the operational scenarios of UAM developmental stages outlined in the K-UAM ConOps and FAA ConOps are scrutinized, and the diverse messages that must be communicated among various stakeholders for effective UAM operations are identified. A draft of communication performance requirements is also calculated by considering packet sizes, transmission frequencies, acceptable latencies, and availability. The outcomes of this study are expected to stand as a pioneering effort in defining communication requirements for UAM services, providing a crucial foundation for future initiatives such as the design of dedicated communication networks for UAM and the determination of required frequency bandwidth.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

Performance Evaluation of Networks with Buffered Switches (버퍼를 장착한 스위치로 구성된 네트워크들의 성능분석)

  • Shin, Tae-Zi;Nam, Chang-Woo;Yang, Myung-Kook
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.203-217
    • /
    • 2007
  • In this paper, a performance evaluation model of Networks with the multiple-buffered crossbar switches is proposed and examined. Buffered switch technique is well known to solve the data collision problem of the switch networks. The characteristic of a network with crossbar switches is determined by both the connection pattern of the switches and the limitation of data flow in a each switch. In this thesis, the evaluation models of three different networks : Multistage interconnection network, Fat-tree network, and other ordinary communication network are developed. The proposed evaluation model is developed by investigating the transfer patterns of data packets in a switch with output-buffers. Two important parameters of the network performance, throughput and delay, are evaluated. The proposed model takes simple and primitive switch networks, i.e., no flow control and drop packet, to demonstrate analysis procedures clearly. It, however, can not only be applied to any other complicate modern switch networks that have intelligent flow control but also estimate the performance of any size networks with multiple-buffered switches. To validate the proposed analysis model, the simulation is carried out on the various sizes of networks that uses the multiple buffered crossbar switches. It is shown that both the analysis and the simulation results match closely. It is also observed that the increasing rate of Normalized Throughput is reduced and the Network Delay is getting bigger as the buffer size increased.

A Multi-dimensional Range Query Index using Dynamic Zone Split in Sensor Networks (센서 네트워크에서 동적 영역 분할을 이용한 다차원 범위 질의 인덱스)

  • Kang Hong-Koo;Kim Joung-Joon;Hong Dong-Suk;Han Ki-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.52-54
    • /
    • 2006
  • 최근 데이타 중심 저장 방식의 센서 네트워크에서 다차원 범위 질의를 위한 인덱스들이 제시되고 있다. 기존에 제시된 다차원 범위 질의 인덱스는 일반적으로 다차원 속성 도메인과 센서 노드의 공간 도메인을 직접 매핑하여 데이타를 관리하는 구조로 되어있다. 그러나, 이러한 구조는 센서 노드의 공간 도메인을 정적으로 분할하기 때문에 센서 노드를 포함하지 않는 영역이 생성되어 데이타 저장 및 질의 처리에서 불필요한 통신이 발생하는 문제가 있다. 본 논문은 이러한 문제를 해결하기 위해 센서 노드의 공간 도메인이 센서 노드를 포함하도록 센서 네트워크 영역을 동적으로 분할하는 다차원 범위 질의 인덱스를 제안한다. 제안하는 인덱스는 센서 노드의 위치에 따라 센서 네트워크 영역을 동적으로 분할하여 데이타 저장 및 질의 처리시 목적 영역으로의 라우팅 경로를 최적화한다. 그리고, 분할된 영역은 모두 센서 노드를 포함함으로 센서 노드에서 발행하는 저장 부하를 분산시켜 전체 네트워크에서 발생하는 전체 통신비용을 줄인다. 실험 결과 제안한 인덱스는 DIM보다 전체 센서 네트워크와 hotspot의 통신비용에서 각각 최대 35%, 60%의 성능 향상을 보였다.

  • PDF

A retransmission method for the improvement of the transmission reliability in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 전송 신뢰성 개선을 위한 재전송 방법)

  • Lee, Won-Jin;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.93-99
    • /
    • 2008
  • Most of the current research works on high-technology is being carried on to provide ubiquitous services to people. To make that possible, ubiquitous computing networks should be deployed in the first place, where ubiquitous sensor network (USN) will take a very big role. This paper is devoted to introduce a new transmission technique to make USN more independent and reliable as an infra-structure for ubiquitous services. The proposed scheme can elevate the network performance by ensuring the reliability of data transmission. Especially, the proposed scheme can reduce network traffic and communication cost by detecting data error without additional data and communication. In addition, it has an advantage of using the legacy routing protocols.

  • PDF

Security Review of B-MAC Communication Protocol (B-MAC통신 프로토콜에서 보안 리뷰)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.447-452
    • /
    • 2013
  • Berkley Media Access Control (B-MAC) protocol is one of the well-known MAC protocols, which uses adaptive preamble sampling scheme and is designed for wireless sensor networks (WSN). In this paper, we are reviewed about security vulnerability in B-MAC, and analyzed the power which is consumed at each stage of B-MAC protocol according to vulnerability of denial of sleep(DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general B-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in B-MAC.

A Study on the Performance Analysis of Wireless Networks for Mobile Convergence in V2V Environments (차량간 통신 환경에서의 모바일 컨버전스를 위한 무선 네트워크 성능 분석에 관한 연구)

  • Cho, Ki-Young;Nam, Ho-Seok;Kim, Seung-Cheon;Kim, Jun-Nyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.161-168
    • /
    • 2011
  • This paper provides the performance measurement and analysis of Wireless LAN IEEE 802.11 in a mobile environment. The performances of IEEE802.11b/g and IEEE802.11p designed for Vehicle-to-Vehicle(V2V) communication are measured and analyzed. Diameter of communication and link access time are compared under variation of speed of the vehicle.

Towards a hierarchical global naming framework in network virtualization

  • Che, Yanzhe;Yang, Qiang;Wu, Chunming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1198-1212
    • /
    • 2013
  • Network virtualization enables autonomous and heterogeneous Virtual Networks (VNs) to co-exist on a shared physical substrate. In a Network Virtualization Environment (NVE), the fact that individual VNs are underpinned by diverse naming mechanisms brings about an obvious challenge for transparent communication across multiple VN domains due to the complexity of uniquely identifying users. Existing solutions were mainly proposed compatible to Internet paradigm with little consideration of their applications in a virtualized environment. This calls for a scalable and efficient naming framework to enable consistent communication across a large user population (fixed or mobile) hosted by multiple VNs. This paper highlights the underlying technical requirements and presents a scalable Global Naming Framework (GNF), which (1) enables transparent communication across multiple VNs owned by the same or different SPs; (2) supports communication in the presence of dynamics induced from both VN and end users; and (3) greatly reduces the network operational complexity (space and time). The suggested approach is assessed through extensive simulation experiments for a range of network scenarios. The numerical result clearly verifies its effectiveness and scalability which enables its application in a large-scale NVE without significant deployment and management hurdles.

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration

  • Chen, Hualiang;Cai, Yueming;Wu, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1057-1073
    • /
    • 2015
  • In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user's generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.