• 제목/요약/키워드: wireless communication service

Search Result 1,265, Processing Time 0.029 seconds

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

Packet Data Performance Evaluation in TETRA Wireless Back-bone Network (TETRA 무선 기간망에서 Packet Data 성능 평가)

  • Song, Byeong-Kwon;Kim, Sai-Byuck;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.379-381
    • /
    • 2008
  • TETRA(Terrestrial Trunked Radio) is a digital trunked radio standard developed by the ETSI(European Telecommunications Standards Institute). Currently, TETRA was set Digital TRS in electric power If wireless backbone network. In this time, we use many company's TETRA modem. So, TETRA modem performance evaluation is very important. TETRA modem use two type of Data transfer mode. One is Packet Data using UDP/IP. and the other is SDS(Short Data Service). In this paper, We generate Packet Data using Traffic Generator module. Packet Data transfer 1000 times each 10 bytes to 400 bytes. We analyze transmission delay time, success rate and standard deviation.

  • PDF

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

BcN based Ubiquitous Network and Service (BcN기반 유비퀴터스 네트워크 및 서비스)

  • Shin, Yong-Sik;Park, Yong-Gil
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.290-296
    • /
    • 2005
  • In this paper, we describe ubiquitous environments and the trend of convergence that is an evolution path of current telecommunication, and show the concept of broadband convergence network, service feature and evolution path. In order to converge wire and wireless communication, telecommunication and broadcasting, voice and data efficiently, broadband convergence network divides a network into service layer, control layer, transport layer, ubiquitous access and terminal layer. Broadband convergence network will be a network that can provide and control broadband multimedia services with QoS and securityof different and customized level. Then we depict characteristics and types of broadband multimedia service, and describe the characteristic of broadband convergence network. Finally, we show ubiquitous network based on the broadband convergence network to provide ubiquitous service which is a future telecommunication service. We also describe requirements of ubiquitous network such as an intelligent and context based platform, convergence terminals, ubiquitous computing devices, etc., and give various emerging technologies and those applications.

  • PDF

Service Realization of WAVE based Vehicular Communication Systems in the Testbed (테스트베드상에서 WAVE기반 차량통신 시스템의 서비스 구현)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1589-1594
    • /
    • 2013
  • Vehicular communication is one of representative convergence technology which combines information technology and vehicle industry. Wireless Access in Vehicular Environments (WAVE) technology is vehicular communication standard which is widely used in the world. In this paper, we introduce service realization of WAVE based vehicular communication systems in the practical testbed. We review the overall WAVE based systems in brief and introduce the testbed. Then, we investigate various applications using vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. Based on realization of systems, we discuss practical implementation issues and the convergence area of WAVE systems.

Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting (WAP 게이트웨이 용량 산출과 트래픽 예측 기법)

  • Park, Chul-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.576-583
    • /
    • 2010
  • Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.

A Policy Direction for Promoting Wireless Industry by the Widespread Utilization of Radio Waves (전파이용 확산에 따른 전파 산업 활성화 방향)

  • Park, Seok-Ji;Park, Duk-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.7
    • /
    • pp.701-709
    • /
    • 2013
  • In this paper, we studied a policy direction for promoting wireless industry. For this, we defined the concept of wireless industry and classified their structure and suggested a growth model of wireless industry and policy elements, which is composed of technology development, service development, advancement of law and regulations, business model development, assistance of production and use, publicity enforcement for promotion. Also, we had a survey on the policy elements for promoting the industry by experts interview. We drew some policy directions for promotion of wireless industry from survey results.

A Study on the WSN Construction Factors for Implementation of U-Disaster Prevention (u-방재 기술 구현을 위한 WSN 구축요소에 관한 연구)

  • Lee, Seok-Cheol;Jeon, Tae-Gun;Sim, Hye-In;Kim, Chang-Soo
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.361-364
    • /
    • 2008
  • The Application Model in Wireless Sensor Networks(WSNs) consist of wireless sensor network based on sensor hardwares which is combined the micro-controller, chipset for wireless communication and sensors, middleware for dealing with data processing and user application for common service. Applications in WSN have been applied for environmental monitoring, smart factory and have concentrated the services based on remote monitoring applications which is difficult to watch the situation by human. In this paper, we described the construction model for applying for the Ubiquitous disaster prevention system and deal with its conformity. The proposed system includes the selecting the wireless sensor hardware, routing technique for u-Disaster Prevention, composition of middleware and web-interface for application services.

  • PDF

Performance Evaluation of a Pilot Interference Cancellation Scheme in a WCDMA Wireless Repeater (WCDMA 무선 중계기에서 파일럿 간섭제거 기법의 성능평가)

  • Kim, Sun-Ho;Shim, Hee-Sung;Im, Sung-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.111-117
    • /
    • 2009
  • In the wideband code division access (WCDMA) systems, a pilot channel is used to determine WCDMA network coverage, cell identification, synchronization, timing acquisition and tracking, user-set handoff, channel estimation, and so on. A wireless repeater, which is deployed in the urban area for the WCDMA system to meet the growing demand on wireless communication services, has the possibility to receive several pilot signals from a large number of base stations, however, cannot distinguish its service base station's signal among them. This pilot interference results in frequent handoffs in the user equipment, which degrades the radio reception, transmission efficiency, quality of service, and channel capacity and increases the unwanted power consumption. In this paper, thus, we propose a pilot pollution interference cancellation scheme using one of the adaptive estimation algorithms, normalized least mean square (NLMS), which is applicable to a wireless repeater. We carried out link-level and network-level computer simulations to evaluate the performance of the proposed scheme in a wireless repeater. The simulation results verify the bit error rate (BER) improvement in the link level and the call drop probability improvement in the network level.