• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.027 seconds

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

Social Network Characteristics and Body Mass Index in an Elderly Korean Population

  • Lee, Won Joon;Youm, Yoosik;Rhee, Yumie;Park, Yeong-Ran;Chu, Sang Hui;Kim, Hyeon Chang
    • Journal of Preventive Medicine and Public Health
    • /
    • v.46 no.6
    • /
    • pp.336-345
    • /
    • 2013
  • Objectives: Research has shown that obesity appears to spread through social ties. However, the association between other characteristics of social networks and obesity is unclear. This study aimed to identify the association between social network characteristics and body mass index (BMI, $kg/m^2$) in an elderly Korean population. Methods: This cross-sectional study analyzed data from 657 Koreans (273 men, 384 women) aged 60 years or older who participated in the Korean Social Life, Health, and Aging Project. Network size is a count of the number of friends. Density of communication network is the number of connections in the social network reported as a fraction of the total links possible in the personal (ego-centric) network. Average frequency of communication (or meeting) measures how often network members communicate (or meet) each other. The association of each social network measure with BMI was investigated by multiple linear regression analysis. Results: After adjusting for potential confounders, the men with lower density (<0.71) and higher network size (4-6) had the higher BMI (${\beta}$=1.089, p=0.037) compared to the men with higher density (>0.83) and lower size (1-2), but not in the women (p=0.393). The lowest tertile of communication frequency was associated with higher BMI in the women (${\beta}$=0.885, p=0.049), but not in the men (p=0.140). Conclusions: Our study suggests that social network structure (network size and density) and activation (communication frequency and meeting frequency) are associated with obesity among the elderly. There may also be gender differences in this association.

Performance of Interference Mitigation for Visible Light Communi cation System (가시광 통신 시스템의 간섭 완화 성능)

  • Park, In-Hwan;Kim, Yoon-Hyun;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.1
    • /
    • pp.57-62
    • /
    • 2011
  • The VLC (visible light communication) system is communication technology using visible rays (RGB) that come out in LED device. It is energy curtailment effect and possible in ubiquitous network service applications. Also, VLC system has the above advantage about that the communication throughout the whole room is enabled by high power lighting and lighting equipment with white colored LED which are easy to install and have good outward appearance. However, the signal detection performance for the receiver near the network of transmitter boundary is severely degraded and the transmission efficiency decreased due to the influence of the interference signal from the adjacent networks. In this paper, we propose an interference mitigation method with optical beamforming in VLC systems, and evaluate the reception performance. For the system BER, the proposed optical beamforming transmission demonstrates the performance enhancement compared to the not using the optical beamforming scheme, and up to about 5~6dB SNR performance gain is achieved.

An Effective Installation Method of lightning Protective Devices for Information and Communication Facilities (정보통신설비용 뇌서지 보호장치의 효과적인 설치기법)

  • 이복희;이동문;강성만;엄주홍;이승칠
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.5
    • /
    • pp.90-96
    • /
    • 2002
  • The AC power lines and signal lines of info-communication networks are muted on overhead poles and are exposed to lightning strikes. Due to the potential difference between groundings of the AC power lines and telecommunication lines, the electronic equipments connected to the telecommunication lines can easily be damaged by lightning surges. In this work, in order to develop the reliable ways to protect information and communication facilities from lightning surges, the reliability and performance of surge protective devices were experimentally investigated in actual-sized test circuit. The operation behaviors of surge protective devices against lightning surges from the AC power lines and telecommunication lines and the coordination effects of SPD installation method were evaluated. As a consequence, it was confirmed that the bypass arrester and common grounding system is very effective.

A Study on the Design of Secure Messenger Using ECC of ElGamal Method in PKI Environment (PKI환경에서 ElGamal 방식의 ECC를 이용한 안전한 메신저 설계에 관한 연구)

  • Park Su-Young;Choi Kwang-Mi;Jung Choi-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1443-1448
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information but messengers are gaining popularity abroad and domestically because of their nature of getting immediate responses. Information leakage by invasion that is enemy of evil in communication of communications division Server and Agent between each agents that become burden of communication for effective administration of data for most of existing messenger is becoming an issue. In this paper, we design a secure messenger system that could be obtained maximum security. It use ECC based on ElGamal methodology using PKI for secure communication. For the message encryption and decryption between the same group non, each group is kept distinct by drawing an elliptic curve and an arbitrary point is chosen on the curve.

Implement of Call blocking Probabilities in Mobile Communication Networks (이동통신 네트워크에서 호 블록킹 확률의 개선 방안)

  • Park, Sang-Hyun;Oh, Youn-Chil;Lee, Young-Seok;Yang, Hae-Kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.67-74
    • /
    • 2009
  • This paper presents a method of improving the service availability by distributing the traffic of voice/data calls over the multi-layer cells in a mobile communication network. The traffic model is described and the call handling performance is analyzed. In our method, a fast moving call is moved to and serviced in the upper layer cell. A call is also moved upward when an overflow occurs. But unlike other methods, the call that is moved upward in the overflow case is the one which has the longest sojourn time in the cell. Moreover, when the call that was moved upward due to overflow condition stays longer than a certain period of time in the upper layer cell, the system moves the call back to the lower layer in order to save the more expensive resources of the upper layer cell. Call handling performance of this method evaluated from M/M/C/K models shows clear improvement with respect to call blocking probability and forced termination probability.

Design and Implementation of Interference-Immune Architecture for Digital Transponder of Military Satellite (군통신위성 디지털 중계기의 간섭 회피 처리 구조 설계 및 구현)

  • Sirl, Young-Wook;Yoo, Jae-Sun;Jeong, Gun-Jin;Lee, Dae-Il;Lim, Cheol-Min
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.7
    • /
    • pp.594-600
    • /
    • 2014
  • In modern warfare, securing communication channel by combatting opponents' electromagnetic attack is a crucial factor to win the war. Military satellite digital transponder is a communication payload of the next generation military satellite that maintains warfare networks operational in the presence of interfering signals by securely relaying signals between ground terminals. The transponder in this paper is classified as a partial processing transponder which performs cost effective secure relaying in satellite communication links. The control functions of transmission security achieve immunity to hostile interferences which may cause malicious effects on the link. In this paper, we present an efficient architecture for implementing the control mechanism. Two major ideas of pipelined processing in per-group control and software processing of blocked band information dramatically reduce the complexity of the hardware. A control code sequence showing its randomness with uniform distribution is exemplified and qualification test results are briefly presented.

Realtime No-Reference Quality-Assessment Over Packet Video Networks (패킷 비디오 네트워크상의 실시간 무기준법 동영상 화질 평가방법)

  • Sung, Duk-Gu;Kim, Yo-Han;Hana, Jung-Hyun;Shin, Ji-Tae
    • Journal of Broadcast Engineering
    • /
    • v.14 no.4
    • /
    • pp.387-396
    • /
    • 2009
  • No-Reference video-quality assessments are divided into two kinds of metrics based on decoding pixel domain or the bitstream one. Traditional full-/reduced- reference methods have difficulty to be deployed as realtime video transmission because it has problems of additional data, complexity, and assessment accuracy. This paper presents simple and highly accurate no-reference video-quality assessment in realtime video transmission. Our proposed method uses quantization parameter, motion vector, and information of transmission error. To evaluate performance of the proposed algorithm, we perform subjective test of video quality with the ITU-T P.910 Absolute Category Rating(ACR) method and compare our proposed algorithm with the subjective quality assessment method. Experimental results show the proposed quality metric has a high correlation (85%) in terms of subjective quality assessment.

A Decentralized Frame Synchronization System for Ad-hoc Inter-Vehicle Communication Networks (Ad-hoc 차량통신 네트워크를 위한 자율분산 동기화 시스템)

  • Kim, Young-An;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.166-172
    • /
    • 2008
  • This paper proposes an autonomous decentralized frame synchronization system for Ad-hoc Inter-Vehicle Communication Network (IVCN). We have to consider the feature of Ad-hoc IVCN: "time variant" about the number and the location of vehicles and receive power in IVCN, frame timing, and fading. Proposed scheme is different from other decentralized synchronization systems that have association with a fixed base station, and from centralized Personal Communication Systems. This system includes an autonomous decentralized frame synchronization scheme for Ad-hoc IVCN, a high-speed algorithm, a protocol for a newly joining subscriber in IVCN, and a utilization of spread spectrum ranging for frame timing error of the system under highway conditions. Performance evaluation of proposed scheme is validated through simulation. It is shown that Ad-hoc IVCN can be carried out among one and surrounding vehicles in such environment.

A Deterministic Resource Discovery Algorithm in Distributed Networks (분산 망에서 자원발견을 위한 결정 알고리즘)

  • Park, Hae-Kyeong;Ryu, Kwan-Woo
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.455-462
    • /
    • 2001
  • In this paper, we propose a deterministic algorithm to solve the resource discovery problem, that is, some subset of machines to learn the existence of each other in a large distributed network. Harchol et al. proposed a randomized algorithm solving this problem within O($log^2\;n$) rounds with high probability, which requires O($nlog^2\;n$) connection communication complexity and O($n^2log^2\;n$) pointer communication complexity, where n is the number of machines in the network. His solution is based on randomization method and it is difficult to determine convergence time. We propose an efficient algorithm which improve performance and the non-deterministic characteristics. Our algorithm requires O(log n) rounds which shows O(mlog n) connection communication complexity and O($n^2log\;n$) pointer communication complexity, where m is the number of links in the network.

  • PDF