• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.032 seconds

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.

Handling Of Sensitive Data With The Use Of 3G In Vehicular Ad-Hoc Networks

  • Mallick, Manish;Shakya, Subarna;Shrestha, Surendra;Shrestha, Bhanu;Cho, Seongsoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.49-54
    • /
    • 2016
  • Data delivery is very challenging in VANETs because of its unique characteristics, such as fast topology change, frequent disruptions, and rare contact opportunities. This paper tries to explore the scope of 3G-assisted data delivery in a VANET within a budget constraint of 3G traffic. It is started from the simple S_Random (Srand) and finally reached the 3GSDD, i.e., the proposed algorithm. The performance evaluation of different algorithms is done through the two metrics delivery ratio and average delay. A third function utility is created to reflect the above two metrics and is used to find out the best algorithm. A packet can either be delivered via multihop transmissions in the VANET or via 3G. The main challenge is to decide which set of packets should be selected for 3G transmissions and when to deliver them via 3G. The aim is to select and send those packets through 3G that are most sensitive and requiring immediate attention. Through appropriate communication mechanism, these sensitive information are delivered via VANET for 3G transmissions. This way the sensitive information which could not be transmitted through normal VANET will certainly find its destination through 3G transmission unconditionally and with top priority. The delivery ratio of the packets can also be maximized by this system.

The Softest handoff Design using iterative decoding (Turbo Coding)

  • Yi, Byung-K.;Kim, Sang-G.;Picknoltz, Raymond-L.
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.76-84
    • /
    • 2000
  • Communication systems, including cell-based mobile communication systems, multiple satellite communication systems of multi-beam satellite systems, require reliable handoff methods between cell-to-cell, satellite-to-satellite of beam-to-team, respectively. Recent measurement of a CDMA cellular system indicates that the system is in handoff at about 35% to 70% of an average call period. Therefore, system reliability during handoff is one of the major system performance parameters and eventually becomes a factor in the overall system capacity. This paper presents novel and improved techniques for handoff in cellular communications, multi-beam and multi-satellite systems that require handoff during a session. this new handoff system combines the soft handoff mechanism currently implemented in the IS-95 CDMA with code and packet diversity combining techniques and an iterative decoding algorithm (Turbo Coding). the Turbo code introduced by Berrou et all. has been demonstrated its remarkable performance achieving the near Shannon channel capacity [1]. Recently. Turbo codes have been adapted as the coding scheme for the data transmission of the third generation international cellular communication standards : UTRA and CDMA 2000. Our proposed encoder and decoder schemes modified from the original Turbo code is suitable for the code and packet diversity combining techniques. this proposed system provides not only an unprecedented coding gain from the Turbo code and it iterative decoding, but also gain induced by the code and packet diversity combining technique which is similar to the hybrid Type II ARQ. We demonstrate performance improvements in AWGN channel and Rayleigh fading channel with perfect channel state information (CSI) through simulations for at low signal to noise ratio and analysis using exact upper bounding techniques for medium to high signal to noise ratio.

  • PDF

Interference Aware Receiver Filtering for Wireless Ad Hoc Networks (무선 애드혹 네트워크에서의 간섭 제어 수신 기법)

  • Shin, Sungpil;Lee, Byungju;Park, Sunho;Shim, Byonghyo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Recent works on ad hoc network study have shown that achievable throughput can be made to scale linearly with the number of receive antennas even if the transmitter has only a single antenna. In this paper, we propose a non-parametric linear minimum mean square error (MMSE) receiver for achieving further gain in performance when the channel state information at receiver (CSIR) of interferers is imperfect. The key feature to make our approach effective is to exploit the autocorrelation of the received signal. In fact, by incorporating the desired channel information on top of the observations including interference and noise only, the proposed method achieves large fraction of the optimal MMSE transmission capacity without transmission rate loss. From the SINR analysis as well as transmission capacity simulations in realistic ad hoc network system, we show that the proposed non-parametric linear MMSE receiver brings substantial performance gain over existing multiple receive antenna algorithms.

Bird's-Eye View Service under Ubiquitous Transportation Sensor Network Environments (Ubiquitous Transportation Sensor Network에서 Bird's-Eye View 서비스)

  • Kim, Joohwan;Nam, Doohee;Baek, Sungjoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.225-231
    • /
    • 2013
  • A bird's-eye view is an elevated view of an object from above, with a perspective as though the observer were a bird, often used in the making of blueprints, floor plans and maps. It can be used under severe weather conditions when visibility is poor. Under low visibility environments, drivers can communicate each other using V2V communication to get each vehicle's status to prevent collision and other accidents. Ubiquitous transportation sensor networks(u-TSN) and its application are emerging rapidly as an exciting new paradigm to provide reliable and comfortable transportatione services. The ever-growing u-TSN and its application will provide an intelligent and ubiquitous communication and network technology for traffic safety area.

Efficient Power Allocation Algorithm for Wireless Networks (무선망의 효율적 전력 할당 알고리즘)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.103-108
    • /
    • 2016
  • In communication systems the solution of the problem of maximizing the mutual information between the input and output of a channel composed of several subchannels under total power constraint has a waterfilling structure. OFDM and MIMO can be decomposed into parallel subchannels with CSI. Waterfilling solves the problem of optimal power allocation to these subchannels to achieve the rate approaching the channel capacity under total power constraint. In waterfilling, more power is alloted to good channels(high SNR) and less or no power to bad channels to increase the rate of good channels, resulting in channel capacity. Waterfilling finds the exact water level satisfying the power constraint employing an iterative algorithm to estimate and update the water level. In this process computation of partial sums of inverse of square of subchannel gain is repeatedly required. In this paper we reduced the computation time of waterfilling algorithm by replacing the partial sum computation with reference to an array which contains the precomputed partial sums in initialization phase.

Analysis of Network Log based on Hadoop (하둡 기반 네트워크 로그 시스템)

  • Kim, Jeong-Joon;Park, Jeong-Min;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.125-130
    • /
    • 2017
  • Since field control equipment such as PLC has no function to log key event information in the log, it is difficult to analyze the accident. Therefore, it is necessary to secure information that can analyze when a cyber accident occurs by logging the main event information of the field control equipment such as PLC and IED. The protocol analyzer is required to analyze the field control device (the embedded device) communication protocol for event logging. However, the conventional analyzer, such as Wireshark is difficult to process the data identification and extraction of the large variety of protocols for event logging is difficult analysis of the payload data based and classification. In this paper, we developed a system for Big Data based on field control device communication protocol payload data extraction for event logging of large studies.

Determinants of Media Repertoires based on New Services and Technologies (신규 미디어 서비스/기기 레퍼토리 구조 결정 요인)

  • Chon, Bum-Soo;Park, Joo-Yeun
    • Korean journal of communication and information
    • /
    • v.49
    • /
    • pp.20-38
    • /
    • 2010
  • This paper was attempting to identify determinants of media repertoires based on new services and technologies. Using the regression and discriminant models, this study examined determinants that included five independent factors such as the degree of innovation, social networks, social influences, demographic variables and media uses. The analyses revealed that all of independent variables except the degree of innovation were significant determinants of media repertoires. Secondly, the results of discriminant analyses showed that terrestrial television use, age, disposable income were significant factors discriminating new media service adopters from the sample. For new media related technologies adopters, family income, and media uses such as newspaper, Internet and radio were significant discriminant variables.

  • PDF

The Underwater Environment Monitoring System based on Ocean Oriented WSN(Wireless Sensor Network) (해양 적응형 무선센서네트워크 기반의 수중 환경 모니터링 시스템)

  • Yun, Nam-Yeol;NamGung, Jung-Il;Park, Hyun-Moon;Park, Su-Hyeon;Kim, Chang-Hwa
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.122-132
    • /
    • 2010
  • The analysis of ocean environment offers us essential information for ocean exploration. But ocean environment has a lot of environmental variables such as the movements of nodes by an ocean current, corrosion by salt water, attenuation of radio wave, occurrences of multi-path and difficulty of sensor nodes' deployment. It is accordingly difficult and complex to gather and process the environmental information through ocean data communication due to these constraints of ocean environment unlike the terrestrial wireless networks. To overcome these problems, we organized ocean communication network for monitoring underwater environment by real experiment in Gyeongpoho similar to ocean environment. Therefore, this paper aims at overcoming major obstacles in ocean environment, effectively deploying sensor nodes for ocean environment monitoring and defining an efficient structure suitable for communication environment by the implementation of ocean environment monitoring system in Gyeongpoho.

Study on the Next Disaster Safety Communication Network in M2M Communication (사물지능통신을 이용한 차세대 재난안전통신망에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.585-590
    • /
    • 2011
  • In the past few years, M2M (Machine-to-Machine) applications have become a hot topic in the wireless industry. While M2M applications can be used for many purposes (smart homes, smart metering/electricity meter reading, fleet management, mobile workforce, automobile insurance, vending machines, etc), and in many sectors (healthcare, agriculture, commercial, industrial, retail, utility, etc.), smart metering applications or smart grids present the biggest growth potential in the M2M market today. M2M platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. The promising technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. In this paper the information communication technique based on the disaster prevention system's for the M2M, concepts and its requirement technology and application are studied.