• Title/Summary/Keyword: communication networks

Search Result 5,474, Processing Time 0.031 seconds

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

A Handover Mechanism Between Local Mobility Anchors in Proxy Mobile IPv6-based Vehicular Communication Networks (Proxy Mobile IPv6 기반 차량통신망에서 Local Mobility Anchor간 핸드오버 기법)

  • Lim, Yu-Jin;Ahn, Sang-Hyun;Cho, Kwon-Hee
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.243-250
    • /
    • 2010
  • Vehicular communication networking is one of the most important building blocks of Intelligent Transportation System (ITS). The vehicular communication network is a wireless communication system enabling vehicles to communicate with each other as well as with roadside base stations. Mobility management of vehicles which move at high speeds and occasionally make a long journey is an interesting research area of vehicular communication networks. Recently, The Proxy Mobile IPv6 (PMIPv6) protocol is proposed for network-based mobility management to reduce the overhead of mobile nodes. PMIPv6 shifts the burden of the mobility management from mobile nodes to network agents to decrease the overhead and latency for the mobility management. In this paper, we derive the scenario of deploying PMIPv6 in vehicular communication networks and propose a new LMA handover mechanism for realizing the scenario. By carrying out the ns-2 based simulations, we verify the operability of the proposed mechanism.

A Study for Sales and Demand Forecasting Model Using Wavelet Neural Networks (웨이블렛 신경회로망을 이용한 상품 수요 예측 모형에 관한 연구)

  • Lee, Jae-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.131-136
    • /
    • 2014
  • In this paper, we develop a fashion products demand forecasting algorithm using ARIMA model and Wavelet Neural Networks model. To show effectiveness of the proposed method, we analyzed characteristics of time-series data collected in "H" company during 2008-2012 and then performed the proposed method through various analyses. As noted in experimental results, the performance of three types model such as ARIMA, Wavelet Neural Networks and ARIMA + Wavelet Neural Networks show 5.179%, 4.553%, and 4.448.% with respect to MAPE(Mean Absolute Percentage Error), respectively. Thus, it is noted that the proposed method can be used to predict fashion products demand for efficient of operation.

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.2
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

Developing a new MAC Protocol for Multi-hop Underwater Acoustic Sensor Networks (다중 홉 수중 음향 센서네트워크를 위한 MAC 프로토콜 설계)

  • Lim, Chansook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.97-103
    • /
    • 2008
  • T-Lohi, a MAC protocol for underwater acoustic sensor networks, has been designed to support dense networks consisting of short-range acoustic modems. However when T-Lohi is applied to large networks in which multi-hop routing is necessary, it suffers a lot of packet collisions due to the hidden terminal problem. To combat this problem, we propose a new MAC protocol which employs RTS/CTS handshaking. To our knowledge, this protocol is the first to adopt both a tone-based approach and RTS/CTS handshaking for dense underwater acoustic sensor networks. Simulation results show that this new protocol drastically reduces packet collisions while achieving good network utilization.

  • PDF

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1313-1327
    • /
    • 2013
  • How to make people keep both the confidentiality of the sensitive data and the privacy of their real identity in communication networks has been a hot topic in recent years. Researchers proposed privacy-preserving authenticated key exchange protocols (PPAKE) to answer this question. However, lots of PPAKE protocols need users to remember long secrets which are inconvenient for them. In this paper we propose a lightweight three-party privacy-preserving authentication key exchange (3PPAKE) protocol using smart card to address the problem. The advantages of the new 3PPAKE protocol are: 1. The only secrets that the users need to remember in the authentication are their short passwords; 2. Both of the users can negotiate a common key and keep their identity privacy, i.e., providing anonymity for both users in the communication; 3. It enjoys better performance in terms of computation cost and security. The security of the scheme is given in the random oracle model. To the best of our knowledge, the new protocol is the first provably secure authentication protocol which provides anonymity for both users in the three-party setting.

Design and Implementation of Real-Time Vehicle Safety System based on Wireless Sensor Networks (무선 센서 네트워크 기반의 실시간 차량 안전 시스템 설계 및 구현)

  • Hong, YouSik;Oh, Sei-JIn;Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.57-65
    • /
    • 2008
  • Wireless sensor networks achieve environment monitoring and controlling through use of small devices of low cost and low power. Such network is comprised of several sensor nodes, each having a microprocessor, sensor, actuator and wired/wireless transceiver inside a small device. In this paper, we employ the sensor networks in order to design and implement a real-time vehicle safety system. Such system can inform the safe velocity in a specific weather condition to drivers in advance through analyzing the weather data collected from sensor networks. As a result, the drivers can prevent effectively accidents by controlling their car speed.

  • PDF

Improving TCP Performance in Multipath Packet Forwarding Networks

  • Lee, Youngseok;Park, Ilkyu;Park, Yanghee
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.148-157
    • /
    • 2002
  • This paper investigates schemes to improve TCP performance in multipath forwarding networks. In multipath routing, packets to the same destination are sent to multiple next-hops in either packet-level or flow-level forwarding mode. Effective bandwidth is increased since we can utilize unused capacity of multiple paths to the destination. In packet-level multipath forwarding networks, TCP performance may not be enhanced due to frequent out-of-order segment arrivals at the receiver because of different delays among paths. To overcome this problem, we propose simple TCP modifications. At the sender, the fast retransmission threshold is adjusted taking the number of paths into consideration. At the receiver, the delayed acknowledgment scheme is modified such that an acknowledgment for an out-of-order segment arrival is delayed in the same way for the in-order one. The number of unnecessary retransmissions and congestion window reductions is diminished, which is verified by extensive simulations. In flow-level multipath forwarding networks, hashing is used at routers to select outgoing link of a packet. Here, we show by simulations that TCP performance is increased in proportion to the number of paths regardless of delay differences.

Semi-distributed dynamic inter-cell interference coordination scheme for interference avoidance in heterogeneous networks

  • Padmaloshani, Palanisamy;Nirmala, Sivaraj
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.175-185
    • /
    • 2020
  • Inter-cell interference (ICI) is a major problem in heterogeneous networks, such as two-tier femtocell (FC) networks, because it leads to poor cell-edge throughput and system capacity. Dynamic ICI coordination (ICIC) schemes, which do not require prior frequency planning, must be employed for interference avoidance in such networks. In contrast to existing dynamic ICIC schemes that focus on homogeneous network scenarios, we propose a novel semi-distributed dynamic ICIC scheme to mitigate interference in heterogeneous network scenarios. With the goal of maximizing the utility of individual users, two separate algorithms, namely the FC base station (FBS)-level algorithm and FC management system (FMS)-level algorithm, are employed to restrict resource usage by dominant interference-creating cells. The distributed functionality of the FBS-level algorithm and low computational complexity of the FMS-level algorithm are the main advantages of the proposed scheme. Simulation results demonstrate improvement in cell-edge performance with no impact on system capacity or user fairness, which confirms the effectiveness of the proposed scheme compared to static and semi-static ICIC schemes.

Effectiveness of DUPACK-independent TCP in Coded Wireless Mesh Networks (중복 승인을 사용하지 않는 TCP의 코드화된 무선 메쉬 망에서의 효과)

  • Lim, Chan-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.7-13
    • /
    • 2011
  • While the TCP throughput degradation problem in coded wireless mesh networks is well-known, few effective solutions have been proposed. Most schemes proposed attempts to mask packet reordering by ordering packets at a lower layer or to adjust a packet transmission rate to solve the scarcity problem of coding opportunities. Through the throughput comparison of traditional standard TCP variants, we show that losses and duplication of TCP acknowledgements in coded wireless mesh networks can impact throughput. In addition, we show that a TCP variant that does not rely on duplicate acknowledgements is more suitable for coded wireless mesh networks.