• Title/Summary/Keyword: wireless communication service

Search Result 1,265, Processing Time 0.028 seconds

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification (다각적이고 계층적인 트래픽 분석을 위한 트래픽 분류 체계에 관한 연구)

  • Yoon, Sung-Ho;An, Hyun-Min;Kim, Myung-Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.47-56
    • /
    • 2014
  • Internet traffic has rapidly increased due to the supplying wireless devices and the appearance of various applications and services. By increasing internet traffic rapidly, the need of Internet traffic classification becomes important for the effective use of network resource. However, the traffic classification scheme is not much studied comparing to the study for classification method. This paper proposes novel classification scheme for multilateral and hierarchical traffic identification. The proposed scheme can support multilateral identification with 4 classification criteria such as service, application, protocol, and function. In addition, the proposed scheme can support hierarchical analysis based on roll-up and drill-down operation. We prove the applicability and advantages of the proposed scheme by applying it to real campus network traffic.

Encoding Method for Olfactory Information (후각 정보의 부호화 방법)

  • Lee, Keun-Hee;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1275-1282
    • /
    • 2007
  • With the rapid spread of smart mobile products and practical use of wireless network, it became possible to offer the computing environment people can use anytime anywhere and it is predicted that portable computer as the next generation computing is to be put to practical use. This computer will be expected to have the new interface which provides realistic service through human's five senses as well as the interface through the visual and auditory senses. Accordingly, in this study, we are going to talk about the technology that expresses and reproduces what is based on olfactory information - closely related with memory among honan's five senses - in order to embody the lifelike user interface.

5G Wireless Communication Technology for Non-Terrestrial Network (비지상네트워크를 위한 5G 무선통신 기술)

  • Kim, J.H.;Yoon, M.Y.;You, D.H.;Lee, M.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.51-60
    • /
    • 2019
  • As a way to further expand and enable the 5G ecosystem, the $3^{rd}$ Generation Partnership Project (3GPP) is considering the development of a 5G new radio (NR)-based non-terrestrial network (NTN). These NTNs are expected to provide ubiquitous 5G services to user's equipment (especially, in Internet of Things/machine-type communications (IoT/MTC) public safety, and critical communications) by extending service coverage to areas not covered by 5G terrestrial networks. To this end, this NTN is developing scenarios to provide 5G services using spaceborne vehicles, such as geosynchronous and low-Earth orbit satellites, and airborne vehicles, such as unmanned aircraft systems, including high-altitude pseudo-satellites. In addition, various technologies are being studied to satisfy new requirements not considered in 5G NR, such as long propagation delay time, large cell coverage, large Doppler effect, and base station movement. In this paper, we present the scenarios, requirements, technical issues and solutions, and standardization planning for NR-based NTN in 3GPP.

Implementation of automatic detection system of IoT based sensor device (Considering the application service of reduction of consumption current)

  • Kwon, Myung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.113-122
    • /
    • 2018
  • In this paper, IoT(Internet of things) technology, which is the core of the 4th industrial revolution, was applied to the study of reduction of consumption current. The IoT is a sensor that collects data, a sensor communication, a gateway that processes and stores the collected data. Data application of IoT technology is applied to smart home, smart city, healthcare, smart factory, etc. and it needs to be applied to various industrial fields. By sensing the location of the sensor device, the specific functions of the gateway and the platform are turned ON and OFF to reduce the consumption current of the equipment during the OFF period. When the sensor device accesses the gateway, the specific function of the gateway is turned ON and When the device is separated from the gateway, it senses the sensitivity of the wireless signal and automatically turns off the certain functions. As a resurt, it has reduced the consumption of current. In this paper, we propose a novel system for detecting the location of sensor devices by applying IoT technology. The system implementation is realized by software based, and defines the requirements for the implementation of the sensor device gateway. The gateway automatically detects the location, movement of the device and performs necessary functions. Finally verifies the automatic detection performance of the gateway according to the location of the device. It will contribute greatly to the development of the smart city and office.

Implementation of platform for long-term evolution cell perspective resource utilization analysis

  • Um, Jungsun;Kim, Igor;Park, Seungkeun
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.232-245
    • /
    • 2021
  • As wireless communication continues to develop in limited frequency resource environments, it is becoming important to identify the state of spectrum utilization and predict the amount needed in future. It is essential to collect reliable information for data analysis. This paper introduces a platform that enables the gathering of the scheduling information of a long-term evolution (LTE) cellular system without connecting to the network. A typical LTE terminal can confirm its assigned resource information using the configuration parameters delivered from a network. However, our platform receives and captures only the LTE signal over the air and then enables the estimation of the data relevant to scheduling for all terminals within an LTE cell. After extracting the control channel signal without loss from all LTE subframes, it detects valid downlink control information using the proposed algorithm, which is based on the error vector magnitude of depatterned symbols. We verify the reliability of the developed platform by comparing it with real data from mobile phones and service operators. The average difference in resource block utilization is only 0.28%.

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen;Gao, Yuanyuan;Sha, Nan;Zang, Guozhen;Wang, Shijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2204-2224
    • /
    • 2021
  • This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

An Integrated E-model Implementation for Speech Quality Measurement in VoIP and VoLTE (VoIP와 VoLTE 음성 품질 측정을 위한 통합 E-model 구현)

  • Kim, Bog-Soon;Baek, Kwang-Hyun;Cho, Gi-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.10-18
    • /
    • 2013
  • With advancing of mobile communication services and commercializing of VoLTE (Voice of LTE), it is getting to pay attention on QoS of VoLTE. This paper proposes an integrated E-model in which some factors influenced to service quality of VoIP and VoLTE based voice communication system are considered in calculating the voice quality of Wideband Codec. The model aims to calculate R value which reflects the situations of access network, network characteristics, terminals' usage and mobility. We mainly deal with the integrated E-model's structure, related algorithms and optimal parameters for VoLTE. Some experiments show that the voice quality difference between VoIP and VoiceChecker, and VoLTE and POLQA, is below 10%. With the proposed model, we can calculate the voice quality by making use of the factors directly affected to service quality and the environment of VoLTE terminal and network. As a result, we can estimate the service quality in advance, without measuring it in real wireless environment.

An Implementation of an Intelligent Access Point System Based on a Feed Forward Neural Network for Internet of Things (사물인터넷을 위한 신경망 기반의 지능형 액세스 포인트 시스템의 구현)

  • Lee, Youngchan;Lee, SoYeon;Kim, Dae-Young
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.95-104
    • /
    • 2019
  • Various kinds of devices are used for the Internet of Things (IoT) service, and IoT devices mainly use communication technology that uses the frequency of the unlicensed band. There are several types of communication technology in the unlicensed band, but WiFi is most commonly used. Devices used for IoT services vary in computing resources from devices with limited capabilities to smartphones and provide services over wireless networks such as WiFi. Most IoT devices can't perform complex operations for network control, thus they choose a WiFi access point (AP) based on signal strength. This causes a decrease in IoT service efficiency. In this paper, an intelligent AP system that can efficiently control the WiFi connection of the IoT devices is implemented. Based on the network information measured by the IoT device, the access point learns using a feed forward neural network algorithm, and predicts a network connection state to control the WiFi connection. By controlling the WiFi connection at the AP, the service efficiency of the IoT device can be improved.

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.