• Title/Summary/Keyword: wireless communication service

Search Result 1,265, Processing Time 0.036 seconds

Recursive PCA-based Remote Sensor Data Management System Applicable to Sensor Network

  • Kim, Sung-Ho;Youk, Yui-Su
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.2
    • /
    • pp.126-131
    • /
    • 2008
  • Wireless Sensor Network(WSNs) consists of small sensor nodes with sensing, computation, and wireless communication capabilities. It has new information collection scheme and monitoring solution for a variety of applications. Faults occurring to sensor nodes are common due to the limited resources and the harsh environment where the sensor nodes are deployed. In order to ensure the network quality of service it is necessary for the WSN to be able to detect the faulty sensors and take necessary actions for the reconstruction of the lost sensor data caused by fault as earlier as possible. In this paper, we propose an recursive PCA-based fault detection and lost data reconstruction algorithm for sensor networks. Also, the performance of proposed scheme was verified with simulation studies.

A Study on Fast Handover Scheme in the Wireless Internet Service Network Based on IEEE 802.16e (IEEE 802.16e 기반무선 인터넷서비스 망에서의 고속 핸드오버 방안에 관한 연구)

  • Yang, Hyun-Ho;Cha, Jae-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1950-1956
    • /
    • 2007
  • IEEE 802.16e has many points to be improved. Among them, fast handover is essential when user moves in high speed. In this paper we proposed a fast handover scheme using handover candidate BS set. This scheme is based on IEEE 802.16e, however according to the performance evaluation results through simulation; our proposed scheme shows more than 30% of handover delay reduction and at least 5% of handover drop probability improvement.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

Improving QoS using Cellular-IP/PRC in Hospital Wireless Network (병원 무선망에서 Cellular-IP/PRC에 의한 QoS 개선)

  • Suk, Kyung Hyu;Kim, Sung-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.3
    • /
    • pp.188-194
    • /
    • 2008
  • In this paper, we propose for improving QoS in Hospital wireless network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP and propose for performance of realtime and non-real time handoff service using Handoff state machine Paging Route Cache. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it has its vulnerability in frequent handoff environment. This handoff state machine using differentiated handoff improves quality of services in Cellular-IP/PRC Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and moat of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.

  • PDF

The Multimedia Service Scheduling method applying AMC based on Cross Layer technique for Mobile Communication Systems (이동통신 시스템을 위한 크로스레이어 기반의 AMC를 적용한 멀티미디어 서비스 스케줄링 기법)

  • Kim, Kyung-Seok;Kim, Joo-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.9
    • /
    • pp.1238-1244
    • /
    • 2008
  • Each layer operates independently in the present network structure. However, the importance of designing cross layer, which adapt between different layers, is on the rise, because of adapt to the variable communication environments. In this paper, we investigate the scheduling techniques of the cross layer. we research conventional scheduling methods and propose the multimedia service scheduling method which will be applied in future wireless communication environments. This method considers the diversity of multimedia service and manages the radio resources efficiently Moreover, we apply AMC for flexibility and improve the performance of the scheduling method. The proposed method is verified through the simulation appying variable environments.

  • PDF

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

Improving QoS using Cellular-IP/PRC in Hospital Wireless Network

  • Kim, Sung-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.2
    • /
    • pp.120-126
    • /
    • 2006
  • In this paper, we propose for improving QoS in hospital wireless network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it has its vulnerability in frequent handoff environment. This handoff state machine using differentiated handoff improves quality of services in Cellular-IP/PRC. Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and most of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.

  • PDF

A Secure Protocol for Contents Service in IMT-2000 (IMT-2000 기반 컨텐츠 서비스를 위한 보안 프로토콜)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.241-252
    • /
    • 2003
  • IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

Design and implementation of e-mail extraction engine for mobile with image conversion facilities. (이미지 변환 엔진을 탑재한 모바일용 전자우편 추출 엔진의 설계 및 구현)

  • 정영지
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.638-645
    • /
    • 2003
  • In existing internet, e-mail protocols including POP3 and IMAP4, provide e-mail services fir exchanging messages with texts, hypertext and images as well. For the e-mail services in wireless mobile network, mobile e-mail service providers have to install a mobile exclusive e-mail server or have to convert e-mail to mobile exclusive e-mail with wireless application format in case of POP3 protocol. In the e-mail service of IMAP4 case known as web-mail, it is difficult to view e-mail directly from server without IMAP4 mobile client because e-mail is stored in mail server side with remote file server. In either case, it also has the problems of viewing the e-mail of hypertext and image information at mobile. This paper provides e-mail extraction engine with image and hypertext conversion facilities that can be applied in wireless mobile internet and it is optimized in mobile communication environments such as a small display, small size of memory with web-mail protocol based on IMAP4 as well as POP3 mail protocol.

Propagation Environment Analysis and Wireless Mesh Network Implementation for monitoring the Four Rivers (based on Hapcheon weir) (4대강 주변 하천모니터링을 위한 무선 메쉬 네트워크 전파환경 분석 및 구축(합천보 중심으로))

  • Hong, Sung-Taek;Jin, Ryeok-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.127-134
    • /
    • 2012
  • Four river project in the South Korea contributes to solve flood damages and water shortages. Also, it has purpose for creating water ecosystem and improving the level of people' cultural leisure and quality of life through inducing water quality improvement and river restoration. It is necessary to monitor a variety of observing data in river areas among dozens to hundreds of kilometer for safe river administration. The 20th construction area of the four river project is located on Hapcheon areas, where wireless mesh network was installed to manage the basin. In the process of network construction, the characteristic of surrounding areas is considered about embodying secure service by investing the least expense. Besides, transmission environment analysis is performed such as LOS tests and reception level analysis, and transmission speed measurement to create safe service. Reception level in all places is confirmed among -55 dBm ~ -70 dBm, and data transmission speed proves more than 20 Mbps.