• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Quality of Service and Network Performance for the IMT-2000 Services (IMT-2000 에서의 서비스품질 및 네트워크 성능 체계)

  • Cho, Kee-Sung;Jang, Hee-Seon;Lim, Seog-Ku;Kim, Yeoung-Sun
    • IE interfaces
    • /
    • v.15 no.3
    • /
    • pp.256-262
    • /
    • 2002
  • In this paper, we develop a framework for identifying the quality of service(QoS) and network performance (NP) in the IMT-2000 services, and analyze the QoS/NP system in the 3GPP IMT-2000 services. Based on the ITU-T E.800, the QoS is classified into customer, technical, contents, telecommunications quality, and internet communication quality, and the NP consists of the service access/transmission, reliability/operating & maintenance, charging performance, and mobility management performance. Under the basic framework, the major parameters in the IMT-2000 services are identified for each QoS/NP criterion. The QoS framework in the IMT-2000 user aspects is also introduced to determine the major QoS parameters. Finally, to define the performance factors of the network elements in the NP system, the various control parameters for the wireless and core networks are presented.

A Randomized Path-Hash Node Authentication Protocol based on Trust Relationship in Wireless Sensor Networks (무선 센서 네트워크 상에서 신뢰기반 Randomized Path-Hash노드 인증 프로토콜)

  • Kim Jin-Hwan;Park Seon-Ho;Jung Sung-Min;Eom Jung-Ho;Chung Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.849-852
    • /
    • 2006
  • 본 논문은 무선 센서 네트워크 라우팅 프로토콜에서 일어날 수 있는 보안 위협 요소들에 대해 알아보고 상호인증에 관한 문제를 해결할 수 있는 Randomized Path-Hash 노드 인증 프로토콜(RPHAP)을 제안한다. 이 프로토콜은 노드 간 상호인증을 제공하며 센서 추적에 대한 안전성까지 제공한다. 또한 간단한 연산 능력의 Hash를 이용하기 때문에 전력 소모에 대한 오버헤드가 적어 모든 센서 네트워크의 프로토콜에서 활용이 가능한 장점을 갖는다.

  • PDF

Implementation of Process System and Intelligent Monitoring Environment using Neural Network

  • Kim, Young-Tak;Kim, Gwan-Hyung;Kim, Soo-Jung;Lee, Sang-Bae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.1
    • /
    • pp.56-62
    • /
    • 2004
  • This research attempts to suggest a detecting method for cutting position of an object using the neural network, which is one of intellectual methods, and the digital image processing method. The extraction method of object information using the image data obtained from the CCD camera as a replacement of traditional analog sensor thanks to the development of digital image processing. Accordingly, this research determines the threshold value in binary-coding of an input image with the help of image processing method and the neural network for the real-time gray-leveled input image in substitution for lighting; as a result, a specific position is detected from the processed binary-coded image and an actual system designed is suggested as an example.

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network

  • Hsu, Chien-Lung;Lin, Han-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2928-2940
    • /
    • 2013
  • Key exposure is a major threat to secure cryptosystems. To mitigate the impact caused by key-compromise attacks, a key-insulated cryptographic mechanism is a better alternative. For securing the large message communication in peer-to-peer networks, in this paper, we propose the first novel identity-based key-insulated encryption (IB-KIE) scheme with message linkages. Our scheme has the properties of unbounded time periods and random-access key-updates. In the proposed scheme, each client can periodically update his private key while the corresponding public one remains unchanged. The essential security assumption of our proposed scheme is based on the well-known bilinear Diffie-Hellman problem (BDHP). To ensure the practical feasibility, we also formally prove that the proposed scheme achieves the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) in the random oracle model.

Development of Low Voltage AMI(Advanced Metering Infrastructure) System using PLC (PLC를 이용한 저압 AMI(Advanced Metering Infrastructure) 시스템 구축)

  • Jung, Joon-Hong;Kim, Sung-Man;Jung, Su-Mi;Kim, Kwang-Young;Kim, Hong-San
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.743-744
    • /
    • 2011
  • Currently, the major issue in power system is construction of smart grid. Unlike conventional electricity grids, smart grid allows two-way communication between electricity suppliers and consumers, as well as enabling more dispersed generation and storage of power. The AMI(advanced metering infrastructure) system is the core technology of smart grid and this paper deals with the design methodology of AMI System using PLC(power line communication) networks.

  • PDF

Performance Analysis on Wireless Sensor Network using LDPC Codes over Node-to-node Interference

  • Choi, Sang-Min;Moon, Byung-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.77-80
    • /
    • 2005
  • Wireless sensor networks(WSN) technology has various applications such as surveillance and information gathering in the uncontrollable area of human. One of major issues in WSN is the research for reducing the energy consumption and reliability of data. A system with forward error correction(FEC) can provide an objective reliability while using less transmission power than a system without FEC. In this paper, we propose to use LDPC codes of various code rate(0.53, 0.81, 0.91) for FEC for WSN. Also, we considered node-to-node interference in addition to AWGN channel. The proposed system has not only high reliable data transmission at low SNR, but also reduced transmission power usage.

  • PDF

Performance of VoIP Traffics over MANETs under DDoS Intrusions (DDoS 침해가 있는 MANET에서 VoIP 트래픽의 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.493-498
    • /
    • 2011
  • In this paper, Transmission performance over MANET(Mobile Ad-hoc Networks) under DDoS Intrusions is evaluated. Intrusion counterplan requirement, which have to be used for MANET under DDoS intrusions, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. MOS, network delay, packet loss rate and call connection rate is measured with this simulation. Finally, requirement of intrusion continuing time shorter then 10 seconds is suggested for VoIP service over MANETs under DDoS intrusions.

Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network (SCADA 시스템 정보보안들 위한 대칭키 암호 적용)

  • Kang, Dong-Joo;Kim, Hak-Man
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.291-293
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) SCADA refers to the combination of telemetry and data acquisition [1]. SCADA system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. Electric Power system is a representative system using SCADA network for its communication. Integration between many networks and increasing threatens of terrorism have made the potential risk by cyber attacks real and bigger in power system. Recently, many researching efforts have been made on SCADA network for improving its security. In general aspect, there are already several ways to secure the system like encryption, firewall, authentication, etc. In this paper, we focus on symmetric encryption method and propose the proper key distribution method to reflect the unique characteristics of SCADA network communication.

  • PDF

Impacts of Radio Propagation Model on Mobile Ad-hoc Network (MANET) Performance in Group Mobility Environments

  • Yeo, In-ho;Yang, Hyo-sik;Rhee, JongMyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.62-72
    • /
    • 2010
  • As the applications for Mobile Ad-hoc NETworks (MANETs) have varied, performance analysis has become one of the main research areas. They commonly offer only simple radio propagation models that neglect obstacles of a propagation environment. The radio wave propagation model has a strong impact on the results of the simulation run. In this paper we present the new experimental results of the impacts of the various propagation models on MANETs' performance. Intensive simulations have been presented using the group mobility which models typical ad-hoc situations such as military movements or disaster recovery activities under the supervision of a group leader. Comparisons of conventional simple models with more complicated models, i.e., shadowing, Raleigh, and Ricean models, show that, in spite of the models' popularity, the free space and two-ray ground models are too optimistic in describing real ad-hoc group mobility situations.

  • PDF

A study on monitor filter PLC monitor device PON system (PON 시스템 감시 모니터용 PLC 소자)

  • Choi, Young-Bok;Park, Soo-Jin;Koh, Seok-Bong;Lee, Bong-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.22-26
    • /
    • 2007
  • In the fibre to the home (FTTH) era, it is expected that broadband network provisioning will require thousands of optical fibres to be accommodated in a central office for optical access networks. An optical fibre line testing system could be used to reduce maintenance costs and improve service availability depending on the PON's element manager capabilities and the maintenance procedures adopted by the network supplier. When monitoring optical fibres transmitting communication lights, a wavelength of 1625 nm is used for maintenance testing. The splitter installed optical filters allow the communication light to pass but that cut off the test light in the front of optical line terminals (OLTs) and optical network terminals (ONTs). In the economic point of view, We design new planer lightwave circuit splitter embedded filtter and study it optical property.

  • PDF