• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.032 seconds

Robust Relative Localization Using a Novel Modified Rounding Estimation Technique

  • Cho, Hyun-Jong;Kim, Won-Yeol;Joo, Yang-Ick;Seo, Dong-Hoan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.2
    • /
    • pp.187-194
    • /
    • 2015
  • Accurate relative location estimation is a key requirement in indoor localization systems based on wireless sensor networks (WSNs). However, although these systems have applied not only various optimization algorithms but also fusion with sensors to achieve high accuracy in position determination, they are difficult to provide accurate relative azimuth and locations to users because of cumulative errors in inertial sensors with time and the influence of external magnetic fields. This paper based on ultra-wideband positioning system, which is relatively suitable for indoor localization compared to other wireless communications, presents an indoor localization system for estimating relative azimuth and location of location-unaware nodes, referred to as target nodes without applying any algorithms with complex variable and constraints to achieve high accuracy. In the proposed method, the target nodes comprising three mobile nodes estimate the relative distance and azimuth from two reference nodes that can be installed by users. In addition, in the process of estimating the relative localization information acquired from the reference nodes, positioning errors are minimized through a novel modified rounding estimation technique in which Kalman filter is applied without any time consumption algorithms. Experimental results show the feasibility and validity of the proposed system.

EAP Using Split Password-based Authenticated Key Agreement Protocol for IEEE Std 802.1x User Authentication (IEEE Std 802.1x 사용자 인증을 위한 분할된 패스워드 인증 기반 EAP)

  • Ryu, Jong-Ho;Seo, Dong-Il;Youm, Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.27-43
    • /
    • 2005
  • EAP provides authentication for each entity based on IEEE Std 802.1x Wireless lAN and RADIUS/DIAMETER protocol, and it uses certificate, dual scheme(e.g., password and token) with the authentication method. The password-based authentication scheme for authenticated key exchange is the most widely-used user authentication method due to various advantages, such as human-memorable simplicity, convenience, mobility, A specific hardware device is also unnecessary, This paper discusses user authentication via public networks and proposes the Split Password-based Authenticated Key Exchange (SPAKE), which is ideal for both authenticating users and exchanging session keys when using a subsequent secure communication over untrusted network, And then we provides EAP authentication framework EAP-SPAKE by using it.

  • PDF

Improvement of Underlay Cooperative Cognitive Networks Bandwidth Efficiency under Interference and Power Constraints

  • Al-Mishmish, Hameed R.M.;Preveze, Barbaros;Alkhayyat, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5335-5353
    • /
    • 2019
  • The definition of the bandwidth efficiency (BE) of cognitive cooperative network (CCN) is the ratio between a number of the licensed slot(s) or sub-channel(s) used by the unlicensed users to transmit a single data packet from the unlicensed transmitter to unlicensed destination, and from unlicensed relay(s) to unlicensed destination. This paper analyzes and improves the BE in the underlay CCN with a new reactive relay selection under interference and power constraints. In other words, this paper studies how unlicensed cooperative users use the licensed network slot(s) or sub-channel(s) efficiently. To this end, a reactive relay selection method named as Relay Automatic Repeat Request (RARQ) is proposed and utilized with a CCN under interference and power constraints. It is shown that the BE of CCN is higher than that of cooperative transmission (CT) due to the interference and power constraint. Furthermore, the BE of CCN is affected by the distance of the interference links which are between the unlicensed transmitter to the licensed destination and unlicensed relay to the licensed destination. In addition, the BE for multiple relays selection over a CCN under interference and power constraints is also analyzed and studied, and it is shown that the BE of CCN decreases as the number of relays increases.

Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic

  • Zhao, Dongyan;Long, Keping;Wang, Dongxue;Zheng, Yichuan;Tu, Jiajing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1392-1403
    • /
    • 2015
  • The rapid development of both communication traffic and increasing optical network sizes has increased energy consumption. Traditional algorithms and strategies don't apply to controlling the expanded network. Immunization algorithms originated from the complex system theory are feasible for large-scale systems based on a scale-free network model. This paper proposes the immunization strategy for complex systems which includes random and targeted immunizations to solve energy consumption issues and uses traffic to judge the energy savings from the node immunization. The simulation results verify the effectiveness of the proposed strategy. Furthermore, this paper provides a possibility for saving energy with optical transmission networks.

Collective Prediction exploiting Spatio Temporal correlation (CoPeST) for energy efficient wireless sensor networks

  • ARUNRAJA, Muruganantham;MALATHI, Veluchamy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2488-2511
    • /
    • 2015
  • Data redundancy has high impact on Wireless Sensor Network's (WSN) performance and reliability. Spatial and temporal similarity is an inherent property of sensory data. By reducing this spatio-temporal data redundancy, substantial amount of nodal energy and bandwidth can be conserved. Most of the data gathering approaches use either temporal correlation or spatial correlation to minimize data redundancy. In Collective Prediction exploiting Spatio Temporal correlation (CoPeST), we exploit both the spatial and temporal correlation between sensory data. In the proposed work, the spatial redundancy of sensor data is reduced by similarity based sub clustering, where closely correlated sensor nodes are represented by a single representative node. The temporal redundancy is reduced by model based prediction approach, where only a subset of sensor data is transmitted and the rest is predicted. The proposed work reduces substantial amount of energy expensive communication, while maintaining the data within user define error threshold. Being a distributed approach, the proposed work is highly scalable. The work achieves up to 65% data reduction in a periodical data gathering system with an error tolerance of 0.6℃ on collected data.

Joint Relay Selection and Resource Allocation for Cooperative OFDMA Network

  • Lv, Linshu;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.3008-3025
    • /
    • 2012
  • In this paper, the downlink resource allocation of OFDMA system with decode-and-forward (DF) relaying is investigated. A non-convex optimization problem maximizing system throughput with users' satisfaction constraints is formulated with joint relay selection, subcarrier assignment and power allocation. We first transform it to a standard convex problem and then solve it by dual decomposition. In particular, an Optimal resource allocation scheme With Time-sharing (OWT) is proposed with combination of relay selection, subcarrier allocation and power control. Due to its poor adaption to the fast-varying environment, an improved version with subcarrier Monopolization (OWM) is put forward, whose performance promotes about 20% compared with that of OWT in the fast-varying vehicular environment. In fact, OWM is the special case of OWT with binary time-sharing factor and OWT can be seen as the tight upper bound of the OWM. To the best of our knowledge, such algorithms and their relation have not been accurately investigated in cooperative OFDMA networks in the literature. Simulation results show that both the system throughput and the users' satisfaction of the proposed algorithms outperform the traditional ones.

Circuit Modelling and Eigenfrequency Analysis of a Poly-Si Based RF MEMS Switch Designed and Modelled for IEEE 802.11ad Protocol

  • Singh, Tejinder;Pashaie, Farzaneh
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.3
    • /
    • pp.129-136
    • /
    • 2014
  • This paper presents the equivalent circuit modelling and eigenfrequency analysis of a wideband robust capacitive radio frequency (RF) microelectromechanical system (MEMS) switch that was designed using Poly-Si and Au layer membrane for highly reliable switching operation. The circuit characterization includes the extraction of resistance, inductance, on and off state capacitance, and Q-factor. The first six eigenfrequencies are analyzed using a finite element modeler, and the equivalent modes are demonstrated. The switch is optimized for millimeter wave frequencies, which indicate excellent RF performance with isolation of more than 55 dB and a low insertion loss of 0.1 dB in the V-band. The designed switch actuates at 13.2 V. The R, L, C and Q-factor are simulated using Y-matrix data over a frequency sweep of 20-100 GHz. The proposed switch has various applications in satellite communication networks and can also be used for devices that will incorporate the upcoming IEEE Wi-Fi 802.11ad protocol.

Model Based Design and Validation of Control Systems using Real-time Operating System (실시간 운영체제를 적용한 제어시스템의 모델기반 설계 및 검증)

  • Youn, Jea-Myoung;Ma, Joo-Young;SunWoo, Myoung-Ho;Lee, Woo-Taik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.16 no.2
    • /
    • pp.8-17
    • /
    • 2008
  • This paper presents the Matlab/Simulink-based software-in-the-loop simulation(SILS) environment which is the co-simulator for temporal and functional simulations of control systems. The temporal behavior of a control system is strongly dependent on the implemented software and hardware such as the real-time operating system, the target CPU, and the communication protocol. The proposed SILS abstracts the system with tasks, task executions, real-time schedulers, and real-time networks close to the implementation. Methods to realize these components in graphical block representations are investigated with Matlab/Simulink, which is most commonly used tool for designing and simulating control algorithms in control engineering. In order to achieve a seamless development from SILS to rapid control prototyping (RCP), the SILS block-set is designed to support automatic code generation without tool changes and block modifications.

Design of Controller for Nonlinear Multivariable System Using Neural Network Sliding Surface (신경망 슬라이딩 곡면을 이용한 비선형 다변수 시스템의 제어기 설계)

  • Ku, Gi-Jun;Cho, Hyun-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2634-2638
    • /
    • 2009
  • The variable structure control(VSC) with sliding mode is the discontinuous control law in leads to undesirable chattering in practice. As a method solving this problem, in this paper, we propose a scheme of the VSC with neural network sliding surface. A neural network sliding surface with boundary layer is employed to solve discontinuous control law. The proposed controller can eliminate the chattering problem of the conventional VSC. The effectiveness of the proposed control scheme is verified by simulation results.

Authentication and Key Agreement using Delegating Authority for a Secure Mobile Payment Protocol (안전한 모바일 결제 프로토콜을 위한 위임기관을 사용한 인증과 키 동의)

  • Sung, Soon-Hwa
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • Mobile payment system has many problems in real mobile payment networks because of the characteristics of mobile device and the security of mobile payment process. Specially, the previous suggested mobile payment protocol can not verify a trust of issuing bank. Therefore, this paper has analyzed the efficiency of a mobile payment with a delegating authority for an issuing bank to trust issuing bank. As a result, the mobile payment protocol with a delegating authority for a payment verification of an issuing bank has improved the time complexities for key computation and communication resilience.