• 제목/요약/키워드: communication networks

Search Result 5,470, Processing Time 0.026 seconds

Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks

  • Cao, Yuanlong;Liu, Qinghua;Zuo, Yi;Huang, Minghe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2354-2370
    • /
    • 2015
  • The advantages of employing SCTP-based Concurrent Multipath Transfer (CMT) have been demonstrated to be very useful for data delivery over multi-homed wireless networks. However, there is still significant ongoing work addressing some remaining limitations and challenges. The most important concern when applying CMT to data delivery is related to handling packet reordering and buffer blocking. Another concern on this topic is that current sender-based CMT solutions seldom consider balancing the overhead and sharing the load between the sender and receiver. This paper proposes a novel Receiver-driven Cooperation-based Concurrent Multipath Transfer solution (CMT-Rev) with the following aims: (i) to balance overhead and share load between the sender and receiver, by moving some functions including congestion and flow control from the sender onto receiver; (ii) to mitigate the data reordering and buffer blocking problems, by using an adaptive receiver-cooperative path aggregation model, (iii) to adaptively transmit packets over multiple paths according to their receiver-inspired sending rate values, by employing a new receiver-aware data distribution scheduler. Simulation results show that CMT-Rev outperforms the existing CMT solutions in terms of data delivery performance.

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Topology Design for Integrated Management Network (통합관리망의 토폴로지설계)

  • Song, Myeong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1207-1213
    • /
    • 2009
  • A design method of network Topology for Integrated Management of various Networks is prposed and an example is shown. The TMN-DCN devices are assigned for each of the various networks. These devices have functions of network management. Also we propose the simple design methods of the network topology with survivability as one of the network management elements. The design methods are very simple but very useful. Because there is no general design algorithm for optimal topology with network survivability.

Communication Optimization for Energy-Efficient Networks-on-Chips (저전력 네트워크-온-칩을 위한 통신 최적화 기법)

  • Shin, Dong-Kun;Kim, Ji-Hong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.3
    • /
    • pp.120-132
    • /
    • 2008
  • Networks-on-Chip (NoC) is emerging as a practical development platform for future systems-on-chip products. We propose an energy-efficient static algorithm which optimizes the energy consumption of task communications in NoCs with voltage scalable links. In order to find optimal link speeds, the proposed algorithm (based on a genetic formulation) globally explores the design space of NoC-based systems, including network topology, task assignment, tile mapping, routing path allocation, task scheduling and link speed assignment. Experimental results show that the proposed design technique can reduce energy consumption by 28% on average compared with existing techniques.

Analysis of Technical Trend in Electronic Trade (전자무역의 기술 동향 분석)

  • Kim Myung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.428-437
    • /
    • 2005
  • The trend of the electronic trade related with technology has been developed into the steps of service, application networks in its technical skill and scopes. But most fields for the steps were established before the electronic proliferation of the electronic trade and so the existing systems have had a limit in including the viewpoints for the international trade. Accordingly, to cover the limit, the policies for the new technical trend are necessary. In this article, the international networks, problems and improvement plans including the integration between companies in the technical sides are presented. And further the possibility and effects on the companies which are given by the electronic trade in the new technical circumstance are also presented.

A design of the security protocol in Optical Burst Switching Networks (OBS 기반 광 네트워크에서 정보보호 프로토콜 설계)

  • Kim Soo-hyeon;No Sik-sun;Ahn Joung-chol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1518-1523
    • /
    • 2005
  • With the expansion of service over the internet, the recent network demands the amount of the more bandwidth and fast transfer rate. Optical Burst Switching has considered as a promising solution for supporting high-speed Internet Service. Because of OBS architecture, it has the security threats such as eavesdropping, masquerading, denial of service and so on. In this Paper, We analyze OBS-specific security threats and requirement for supporting security protocol n OBS networks. We propose an authentication and key exchange protocol for supporting the security service. This protocol supports explicit key authentication by using the control messages and protects the control message by using the session key.

An Architecture Design of Military Operation System Utilizing Cellular Networks (군작전 효율화를 위한 셀룰라망 연동구조 설계)

  • Kim, Jae-Cheol;Kim, In-Taek;Park, Jong-Bum;Jung, Chang-Uk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.74-83
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

Efficient Multi-hop Resource Reservation Scheme in WiMedia D-MAC for Multi-hop N-Screen Services (멀티 홉 N-스크린 서비스를 위한 WiMedia D-MAC에서의 효율적인 멀티 홉 자원 예약 기술)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1091-1096
    • /
    • 2015
  • In this paper, WiMedia Distributed-MAC protocol is adopted for development of multi-hop N-screen wireless services. Furthermore, to provide the multi-hop OSMU (One Source Multi Use) N-screen service through P2P streaming in the D-MAC protocol, a new multi-hop resource reservation scheme is proposed and analyzed to reduce end to end delay. For this Multi-hop resource reservation scheme, a new MSCDRP (Multi-Stage Cooperative DRP) IE is proposed. Simulation results show that our multi-hop MSCDRP scheme reduces the end to end delay and increases throughput at various multi-hop N-screen network environment.

Performance analysis on the interference suppression method for WLAN system in the presence of WPAN system for Broadband Multimedia system (광대역 멀티미디어 시스템을 위한 WLAN 시스템의 간섭신호 억제방안에 대한 성능분석)

  • Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2129-2135
    • /
    • 2011
  • The WLAN and WPAN systems employed on 2.4GHz ISM band wireless networks provide complementary services within the same environments. Coexistence between the networks will be impaired, if the mutual packets are uncertainty associated the timing or gaussian distance. This paper analyzes the impact of the mutual interference on the services performance and in order to minimize the effect of WPAN system signals on the WLAN system, proposed a method of suppressing the interference on the WLAN system. The analysis is illustrated by examining the symbol error rate versus signal to noise interference ratio in terms of the carrier frequency offset.

A study on Public Key Authentication using Polynomial Secret Sharing in WSN (무선센서네트워크에서 다항식 비밀분산을 이용한 공개키 인증방식에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2479-2487
    • /
    • 2009
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. This paper proposes a new concept of public key-based authentication using Polynomial Secret Sharing that can be effectively applied to sensor networks and a detection of malicious node using the hash function. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t,n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability.