• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.029 seconds

Extension of ReInForM Protocol for (m,k)-firm Real-time Streams in Wireless Sensor Networks

  • Li, Bijun;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.3
    • /
    • pp.231-236
    • /
    • 2012
  • For real-time wireless sensor network applications, it is essential to provide different levels of quality of service (QoS) such as reliability, low latency, and fault-tolerant traffic control. To meet these requirements, an (m,k)-firm based real-time routing protocol has been proposed in our prior work, including a novel local transmission status indicator called local DBP (L_DBP). In this paper, a fault recovery scheme for (m,k)-firm real-time streams is proposed to improve the performance of our prior work, by contributing a delay-aware forwarding candidates selection algorithm for providing restricted redundancy of packets on multipath with bounded delay in case of transmission failure. Each node can utilize the evaluated stream DBP (G_DBP) and L_DBP values as well as the deadline information of packets to dynamically define the forwarding candidate set. Simulation results show that for real-time service, it is possible to achieve both reliability and timeliness in the fault recovery process, which consequently avoids dynamic failure and guarantees meeting the end-to-end QoS requirement.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

  • Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1817-1827
    • /
    • 2014
  • As a new type of wireless network, Ad hoc network does not depend on any pre-founded infrastructure, and it has no centralized control unit. The computation and transmission capability of each node are limited. In this paper, a self-updating one-time password mutual authentication protocol for Ad hoc network is proposed. The most significant feature is that a hash chain can update by itself smoothly and securely through capturing the secure bit of the tip. The updating process does not need any additional protocol or re-initialization process and can be continued indefinitely to give rise to an infinite length hash chain, that is, the times of authentication is unlimited without reconstructing a new hash chain. Besides, two random variable are added into the messages interacted during the mutual authentication, enabling the protocol to resist man-in-the-middle attack. Also, the user's identity information is introduced into the seed of hash chain, so the scheme achieves anonymity and traceability at the same time.

Evolutionary game theory-based power control for uplink NOMA

  • Riaz, Sidra;Kim, Jihwan;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2697-2710
    • /
    • 2018
  • Owing to the development of Internet of Things (IoT), the fifth-generation (5G) wireless communication is going to foresee a substantial increase of mobile traffic demand. Energy efficiency and spectral efficiency are the challenges in a 5G network. Non-orthogonal multiple access (NOMA) is a promising technique to increase the system efficiency by adaptive power control (PC) in a 5G network. This paper proposes an efficient PC scheme based on evolutionary game theory (EGT) model for uplink power-domain NOMA system. The proposed PC scheme allows users to adaptively adjusts their transmit power level in order to improve their payoffs or throughput which results in an increase of the system efficiency. In order to separate the user signals, a successive interference cancellation (SIC) receiver installed at the base station (BS) site. The simulation results demonstrate that the proposed EGT-based PC scheme outperforms the traditional game theory-based PC schemes and orthogonal multiple access (OMA) in terms of energy efficiency and spectral efficiency.

A remote vehicle diagnosis and control system based on mobile cellular network (이동 통신망 기반의 차량 원격 진단 및 제어 시스템)

  • Choi Yong-Wun;Hong Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.69-76
    • /
    • 2006
  • Telematics, which is a compound word of a telecommunication and informatics, provides drivers with useful driving information such as driving path guidance, accident or robbery detection, traffic conditions and other valuable data at real time. This paper proposes and implements how to build a telematics terminal equipped with CDMA and GPS running embedded Linux, to check a vehicle's state through communication between telematics server and vehicle terminals using a cellular phone and to control a vehicle using SMS as shown in Figure 1. In order to do this, we use the SK-VM platform which is mobile terminal platform based on JAVA to design, implement and evaluate it.

  • PDF

Development of Operation System for Network of Multiple UAVs (복수 무인기 네트워크 통합 운영 시스템 개발)

  • Kim, Sung-Hwan;Cho, Sang-Ook;Kim, Sung-Su;Ryoo, Chang-Kyung;Choi, Kee-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.11
    • /
    • pp.1042-1051
    • /
    • 2011
  • In this paper, a total operating environment equipped with onboard wireless communication systems and ground-based mission control systems is proposed for simultaneous operation of multiple UAVs. A variety of operating structures are studied and classified systematically based on types and usages of the components. For each operating system, the strength, weakness and reliability aspects are investigated. Based on these results, a proper operating system configuration is determined and components are developed for mission formation flight. Proposed system can make a formation flight of various UAVs, execute complex missions decentralizing mission to several UAVs and cooperate several missions.

A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network (Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구)

  • Choi, Young-Min;Sung, Bo Hyon;Youn, Jong Taek;Kim, Young-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

Implementation of platform for long-term evolution cell perspective resource utilization analysis

  • Um, Jungsun;Kim, Igor;Park, Seungkeun
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.232-245
    • /
    • 2021
  • As wireless communication continues to develop in limited frequency resource environments, it is becoming important to identify the state of spectrum utilization and predict the amount needed in future. It is essential to collect reliable information for data analysis. This paper introduces a platform that enables the gathering of the scheduling information of a long-term evolution (LTE) cellular system without connecting to the network. A typical LTE terminal can confirm its assigned resource information using the configuration parameters delivered from a network. However, our platform receives and captures only the LTE signal over the air and then enables the estimation of the data relevant to scheduling for all terminals within an LTE cell. After extracting the control channel signal without loss from all LTE subframes, it detects valid downlink control information using the proposed algorithm, which is based on the error vector magnitude of depatterned symbols. We verify the reliability of the developed platform by comparing it with real data from mobile phones and service operators. The average difference in resource block utilization is only 0.28%.

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments

  • Jung, Young-Jin;Park, Chang Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3753-3771
    • /
    • 2016
  • Increasingly, numerous and various Internet-capable devices are connected in end user networks, such as a home network. Most devices use the combination of TCP and 802.11 DCF as a system platform, but whereas some devices such as a streaming video persistently generate traffic, others such as a motion sensor do so only intermittently with lots of pauses. This study addresses the issue of performance in this heterogeneous traffic wireless LAN environment from the perspective of fairness. First, instantaneous fairness is introduced as a notion to indicate how immediately and how closely a user obtains its fair share, and a new time-based metric is defined as an index. Second, extensive simulation experiments have been made with TCP Reno, Vegas, and Westwood to determine how each TCP congestion control corresponds to the instantaneous fairness. Overall, TCP Vegas yields the best instantaneous fairness because it keeps the queue length shorter than the other TCPs. In the simulations, about 60% of a fair share of the effective user bandwidth is immediately usable in any circumstance. Finally, we introduce two simple strategies for adjusting TCP congestion controls to enhance instantaneous fairness and validate them through simulation experiments.