• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

Build-in Wiretap Channel I with Feedback and LDPC Codes

  • Wen, Hong;Gong, Guang;Ho, Pin-Han
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.538-543
    • /
    • 2009
  • A wiretap channel I is one of the channel models that was proved to achieve unconditional security. However, it has been an open problem in realizing such a channel model in a practical network environment. The paper is committed to solve the open problem by introducing a novel approach for building wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while themain channel is error free. By taking advantage of the feedback and low density parity check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination for keeping an eavesdropper ignorant; on the other hand, redundancy is added and encoded by the LDPC codes such that a legitimate receiver can correctly receive and decode the signals. With the proposed approach, unconditionallysecure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.

Error Probability Expressions for Frame Synchronization Using Differential Correlation

  • Kim, Sang-Tae;Kim, Jae-Won;Shin, Dong-Joon;Chang, Dae-Ig;Sung, Won-Jin
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.582-591
    • /
    • 2010
  • Probabilistic modeling and analysis of correlation metrics have been receiving considerable interest for a long period of time because they can be used to evaluate the performance of communication receivers, including satellite broadcasting receivers. Although differential correlators have a simple structure and practical importance over channels with severe frequency offsets, closedform expressions for the output distribution of differential correlators do not exist. In this paper, we present detection error probability expressions for frame synchronization using differential correlation, and demonstrate their accuracy over channel parameters of practical interest. The derived formulas are presented in terms of the Marcum Q-function, and do not involve numerical integration, unlike the formulas derived in some previous studies. We first determine the distributions and error probabilities for single-span differential correlation metric, and then extend the result to multispan differential correlation metric with certain approximations. The results can be used for the performance analysis of various detection strategies that utilize the differential correlation structure.

A Study on the G-Node and Disconnected Edges to Improve the Global and Local Locating Heuristic for GOSST Problem (GOSST 문제에 대한 전역적 배치와 지역적 배치 휴리스틱의 개선을 위한 G-Node와 단절에 관한 연구)

  • Kim, In-Bum;Kim, Chae-Kak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.569-576
    • /
    • 2007
  • This paper is on the enhancement of our heuristics for GOSST problem that could apply to the design of communication networks offering graduated services. This problem hewn as one of NP-Hard problems finds a network topology meeting the G-Condition with minimum construction cost. In our prior research, we proposed two heuristics. We suggest methods of selecting G-Node and disconnections for Global or Local locating heuristic in this research. The ameliorated Local locating heuristic retrenches 17% more network construction cost saving ratio and the reformed Global locating heuristic does 14% more than our primitives.

Exploitation of Spatial Diversity in a Novel Cooperative Spectrum Sharing Method based on PAM and Modified PAM Modulation

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.280-292
    • /
    • 2014
  • This article presents a novel cooperative spectrum sharing (CSS) scheme. The primary transmitter transmits a complex Quadrature amplitude modulation (QAM) signal in the first phase, and CSS occurs in the second phase. The secondary transmitter with the largest forwarding channel gain among the nodes that successfully decode the primary signal in the first phase is selected for CSS. This selected node employs a pulse-amplitude modulation (PAM) signal for primary information message (IM) instead of the QAM signal, and it employs a modified PAM signal for the secondary IM. The proposed modified PAM signal depends on the amplitude of the primary PAM signal. This method results in no mutual interference and negligible primary interference constraint and allows a higher degree of exploitation of spatial diversity, thus enabling increase in secondary power to improve primary transmission. The outage performance is enhanced in both the primary and secondary systems. The critical region, in which the primary outage performance is enhanced with the proposed CSS scheme, can be adjusted and widened by varying either the modulation cooperation sharing factor or the number of secondary transmitters.

Mathematical Analysis for Efficiency of Eavesdropping Attack Using Directional Antenna in mmWave Band (밀리미터파 대역에서 지향성 안테나 사용에 의한 도청공격 대응 효율성의 수학적 분석)

  • Kim, Meejoung;Kim, Jeong Nyeo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1074-1077
    • /
    • 2013
  • This paper analyzes the benefit of using directional antennas against eavesdropping attack in millimeter wave (mmWave)-based networks. All devices are equipped with a directional antenna or an omni-directional antenna in a single-hop communications. The probability of a device being detected by an eavesdropper is analyzed based on the exposure region of a device. The relative detection rate is introduced to represent the benefit of using directional antenna. Numerical results show that there exists an optimal number of devices that maximizes the detection probability and it varies according to the parameters such as antenna beamwidth. It shows that the use of directional antenna enables to protect the devices from the detection by an eavesdropper for almost the whole situation in mmWave band communication.

Development of Stream Cipher using the AES (AES를 이용한 스트림 암호 개발)

  • Kim, Sung-Gi;Kim, Gil-Ho;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.972-981
    • /
    • 2013
  • Future aspects of the has turned into a network centric warfare(NCW). Organically combined wired and wireless networks in a variety of cross-of-the-art combat power factor utilization of information and communication technology is a key element of NCW implementation. At used various information in the NCW must be the confidentiality and integrity excellent then quick situation assessment through reliability the real-time processing, which is the core of winning the war. In this paper, NCW is one of the key technologies of the implementation of 128-bit output stream cipher algorithm is proposed. AES-based stream cipher developed by applying modified OFB mode the confidentiality and integrity as well as hardware implementation to the security and real-time processing is superior.

Block-Time of Arrival/Leaving Estimation to Enhance Local Spectrum Sensing under the Practical Traffic of Primary User

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.514-526
    • /
    • 2013
  • With a long sensing period, the inter-frame spectrum sensing in IEEE 802.22 standard is vulnerable to the effect of the traffic of the primary user (PU). In this article, we address the two degrading factors that affect the inter-frame sensing performance with respect to the random arrival/leaving of the PU traffic. They are the noise-only samples under the random arrival traffic, and the PU-signal-contained samples under the random leaving traffic. We propose the model in which the intra-frame sensing cooperates with the inter-frame one, and the inter-frame sensing uses the time-of-arrival (ToA), and time-of-leave (ToL) detectors to reduce the two degrading factors in the inter-frame sensing time. These ToA and ToL detectors are used to search for the sample which contains either the ToA or ToL of the PU traffic, respectively, which allows the partial cancelation of the unnecessary samples. At the final stage, the remaining samples are input into a primary user detector, which is based on the energy detection scheme, to determine the status of PU traffic in the inter-frame sensing time. The analysis and the simulation results show that the proposed scheme enhances the spectrum-sensing performance compared to the conventional counter-part.

A Low Power Consumption Management Scheme Based on Touch & Play for Smart Memory Tags (스마트 메모리 태그를 위한 Touch & Play 기반 저전력 소모 관리 기법)

  • Yun, Young-Sun;Ha, Sunju;Son, Kyung A;Eun, Seongbae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.3
    • /
    • pp.131-138
    • /
    • 2017
  • QR/NFC tags have been utilized in various fields like exhibition, museum, and so on, but they have a drawback that they are read-only fundamentally. We devise a novel device called a smart memory tag (below mem-tag) which is supplemented with the write function through combining a flash memory into a NFC tag. A mem-tag is composed of an NFC tag, an MCU, a flash memory, a bluetooth module, and a battery, and is inter-operating with smartphones via bluetooth communication. It can be used in a bulletin board to support writing replies and in a check-in service to verify the presence of the site. What matters is that users' inter-operations are borne to be asynchronous, which leads to the energy consumption to wait for users' actions. Sleep mechanisms and asynchronous MAC protocols used in ubiquotous sensor networks cannot avoid the consumption of battery. In this paper, we propose a touch and play scheme for minimizing the consumption of battery that the MCU wakes up and PLAY when a user TOUCH the mem-tag. We implemented the system to show that our scheme lets the mem-tag work 50 times longer than the sleep and wake-up scheme.

Error Resilient Performance Evaluation of MPEG-4 and H.264/AVC (MPEG-4 와 H.264/AVC의 에러 강인 기술 성능 평가)

  • 정봉수;황영휘;전병우;김명돈;최송인
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.5
    • /
    • pp.203-216
    • /
    • 2004
  • Recent advances in video coding technology have resulted in rapid growth of application in mobile communication, With this explosive growth reliable transmission and error resilient technique become increasingly necessary to offer high quality multimedia service. In this paper, we present the result of our investigation on the error resilient performance evaluation of the MPEG-4 simple profile under the H.324/M and the H.264/AVC baseline under the IP packet networks. Especially, we have tested error resilient tools of MPEG-4 simple profile such as resynchronization marker insertion, data partitioning, and of H.264/AVC baseline such as the flexible macroblock ordering (FMO) scheme. The objective quality of decoded video is measured in terms of rate and PSNR under various random bit and burst error conditions.

Coordinated Cognitive Tethering in Dense Wireless Areas

  • Tabrizi, Haleh;Farhadi, Golnaz;Cioffi, John Matthew;Aldabbagh, Ghadah
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.314-325
    • /
    • 2016
  • This paper examines the resource gain that can be obtained from the creation of clusters of nodes in densely populated areas. A single node within each such cluster is designated as a "hotspot"; all other nodes then communicate with a destination node, such as a base station, through such hotspots. We propose a semi-distributed algorithm, referred to as coordinated cognitive tethering (CCT), which clusters all nodes and coordinates hotspots to tether over locally available white spaces. CCT performs the following these steps: (a) groups nodes based on a modified k-means clustering algorithm; (b) assigns white-space spectrum to each cluster based on a distributed graph-coloring approach to maximize spectrum reuse, and (c) allocates physical-layer resources to individual users based on local channel information. Unlike small cells (for example, femtocells and WiFi), this approach does not require any additions to existing infrastructure. In addition to providing parallel service to more users than conventional direct communication in cellular networks, simulation results show that CCT can increase the average battery life of devices by 30%, on average.