Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 34, Issue 12C - Dec 2009
Volume 34, Issue 12B - Dec 2009
Volume 34, Issue 12A - Dec 2009
Volume 34, Issue 11C - Nov 2009
Volume 34, Issue 11B - Nov 2009
Volume 34, Issue 11A - Nov 2009
Volume 34, Issue 10C - Oct 2009
Volume 34, Issue 10B - Oct 2009
Volume 34, Issue 10A - Oct 2009
Volume 34, Issue 9C - Sep 2009
Volume 34, Issue 9B - Sep 2009
Volume 34, Issue 9A - Sep 2009
Volume 34, Issue 8C - Aug 2009
Volume 34, Issue 8B - Aug 2009
Volume 34, Issue 8A - Aug 2009
Volume 34, Issue 7C - Jul 2009
Volume 34, Issue 7B - Jul 2009
Volume 34, Issue 7A - Jul 2009
Volume 34, Issue 6C - Jun 2009
Volume 34, Issue 6B - Jun 2009
Volume 34, Issue 6A - Jun 2009
Volume 34, Issue 5C - May 2009
Volume 34, Issue 5B - May 2009
Volume 34, Issue 5A - May 2009
Volume 34, Issue 4C - Apr 2009
Volume 34, Issue 4B - Apr 2009
Volume 34, Issue 4A - Apr 2009
Volume 34, Issue 3C - Mar 2009
Volume 34, Issue 3B - Mar 2009
Volume 34, Issue 3A - Mar 2009
Volume 34, Issue 2C - Feb 2009
Volume 34, Issue 2B - Feb 2009
Volume 34, Issue 2A - Feb 2009
Volume 34, Issue 1C - Jan 2009
Volume 34, Issue 1B - Jan 2009
Volume 34, Issue 1A - Jan 2009
Selecting the target year
Power Saving Scheme for MS in IEEE 802.16e system
Sim, Yu-Seung ; Kang, Jae-Eun ; Lee, Jong-Kyu ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 319~328
IEEE 802.16e standard defines different Sleep Mode Operations according to kind of services which aims at saving energy for MS efficiently. The previous study of Sleep Mode Operation is limited for single service environment, real sleep interval is decreased because different Sleep Mode Operations are applied at once when MS is on multi service. The proposed Enhanced Sleep Mode Operation increasing real sleep interval of this paper guarantees QoS(Quality of Services) which is same as standard, minimizes energy consumption when different Sleep Mode Operations are applied at once. Therefore Enhanced Sleep Mode Operation of this paper will be useful in case of increase battery life time as well as guaranteeing QoS for MS in IEEE 802.16 system.
Energy Efficient Sleep Scheme for Downlink Elastic Traffic in Wireless Networks
Lee, Jong-Wook ; Bahk, Sae-Woong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 329~337
In wireless networks, maximizing throughput and minimizing energy consumption are two conflicting objectives. For elastic traffic, it is important to enhance the throughput since it directly affects the quality-of-service(QoS) of users. At the same time, the energy consumption should be minimized in order to prolong the battery lifetime of the mobile station. In this paper, we propose an energy efficient sleep scheme that considers throughput and energy saving simultaneously. The proposed scheme is designed for an efficient tradeoff between throughput and energy saving when receiving elastic traffic. Through extensive simulations, we compare the proposed scheme with the conventional scheme. Our proposed scheme outperforms the conventional one in terms of utility, i.e., user satisfaction, which is defined as inversely proportional to the weighted multiplication of service completion time and energy consumption.
Mobile Sensor Relocation to Prolong the Lifetime of Wireless Sensor Networks
Yoo, Young-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 338~348
The Wireless Sensor Network (WSN) has recently attracted considerable attention due to the low price and ease to deploy it. In particular, in a hostile or harsh regions where sensors cannot be deployed manually, WSNs can be established just by dropping sensors from the air. In this case, however, most likely sensors are not placed at optimal positions, although the location of sensors does have a drastic impact on the WSN performance. Moreover, randomized deployment algorithm can leave holes in terms of coverage in the sensing area. This paper proposes a sensor relocation scheme where mobile sensors move to patch up the holes by appropriate coverage. Simulation results show that the proposed algorithm outperforms prior existing schemes in terms of coverage and lifespan of WSNs.
Stereo-video Synchronization for 3D Video Transmission
Lee, Dong-Jin ; Lee, Seon-Oh ; Sim, Dong-Gyu ; Lee, Hyuk-Joon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 349~359
In this paper, we propose a stereo-video transmission method for reduction of delay and maximization of 3D effect. Conventional multimedia synchronization algorithms were designed to achieve minimum delay and synchronize multiple video and audio streams, however, they could not be effective for 3D video transmission. In this paper, we proposed a synchronization algorithm by considering the minimum error of time difference between streams for 3D effect. The minimum error of time difference for 3D effect was derived based on a 3D subjective quality test. We compute display time of the delivered videos within the allowed time-difference and the video are displayed according to the display time. To evaluate the performance of the proposed algorithm, we implemented a real-time video communication system and subjective quality test has been conducted with the proposed system. We found that video quality displayed by the proposed system. We found that video quality displayed by the proposed algorithm ranks 'good' and 'excellent' in the DMOS (Differential Mean Opinion Score) scale, based on the MOS (Mean Opinion Score) test.
Implementation of IEEE 802.11n MAC using Design Methodology
Chung, Chul-Ho ; Lee, Sun-Kee ; Jung, Yun-Ho ; Kim, Jae-Seok ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 360~367
In this paper, we propose a design methodology of IEEE 802.11n MAC which aims to achieve the higher throughput of more than 100Mbps in downlink as measured at the MAC-SAP and present the implementation results of MAC using the proposed design methodology. With our proposed methodology, different from the conventional design flow which has the separate codes for the protocol validation, for the network simulation, and for the system implementation, the unified code can be used for the network simulation and the implementation of software and hardware. Our MAC architecture is partitioned into two parts, Upper-layer MAC and Lower-layer MAC, in order to achieve the high efficiency for the new features of IEEE 802.11n standard. They are implemented in software and hardware respectively. The implemented MAC is tested on ARM based FPGA board.
An Efficient SVC Transmission Method in an If Network
Lee, Suk-Han ; Kim, Hyun-Pil ; Jeong, Ha-Young ; Lee, Yong-Surk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 368~376
Over recent years, the development of multimedia devices has meant that a wider multimedia streaming service can be supported, and there are now many ways in which TV channels can communicate with different terminals. Generally, scalable video streaming is known to provide more efficient channel capacity than simulcast video streaming. Simulcast video streaming requires a large network bandwidth for all resolutions, but scalable video streaming needs only one flow for all resolutions. On the contrary, to preserve the same video quality, SVC(Sealable Video Coding) needs a higher bit-rate than AVC(non-layered Video Coding) due to the coding penalty(
). In previous research, scalable video streaming has been compared with simulcast video streaming for network channel capacity, in two-user simulation environments. The simulation results show that the channel capacity of SVC is
smaller than AVC, but scalable video streaming is not efficient because of the limit of the present network framework. In this paper, we propose a new network framework with a new router using EDE(Extraction Decision Engine) and SVC Extractor to improve network performance. In addition, we compare the SVC environment in the proposed framework with previous research on the same way subject. The proposed network framework shows a channel capacity 50%(maximum) lower than that found in previous research studies.
User Authentication Mechanism for using a Secure IPTV Service in Mobile Device
Jeong, Yoon-Su ; Kim, Yong-Tae ; Park, Gil-Cheol ; Lee, Sang-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 377~386
IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.
A Study of Performance Measurement of QoS on VoIP Networks
Park, Jin-Sam ; Min, Sang-Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 387~393
In this paper, we have considered the network performance of the VoIP service with the measurement by an emulator, and analyzed the major factors to affect its performance. Also, we have used the measured values to investigate the traffic variations, where their values were observed in the commercial operated network after the delay, jitter and packet loss, and loss compensation methods were applied as the dominant elements. It is expected that our presented results will be a good data to provide the high-quality of voice service in the Internet.
Analytical Model for Multi-Fiber WDM Networks with Sparse and Limited Wavelength Conversion
Jeong, Han-You ; Seo, Seung-Woo ; Choi, Yoon-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 394~402
In this paper, we present a new analytical model for estimating the blocking performance of multi-fiber WDM networt:s with sparse and limited wavelength conversion (SLWC). The proposed model is a reduced-load approximation model that can obtain accurate estimates of blocking probability of such networks. Our model employs three new recurrence formulae to obtain the free wavelength distribution on a multi-fiber link, the free wavelength distribution after limited-range wavelength conversion and the end-to-end blocking probability of a multi-hop path, respectively. From the numerical results on the NSFNET, we demonstrate that the blocking performance of two-fiber NSFNET with three wavelength-convertible nodes, each of which translates an input wavelength to its adjacent output wavelengths, closely approximates the blocking performance of full wavelength conversion.
Binary Search on Levels Using Bloom filter for IPv6 Address Lookup
Park, Kyong-Hye ; Lim, Hye-Sook ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 403~418
IP version 6 (IPv6) is a new If addressing scheme that has 128-bit address space. IPv6 is proposed to solve the address space problem of IP version 4 (IPv4) which has 32-bit address space. For a given IPv6 routing set, if a forwarding table is built using a trio structure, the trio has a lot more levels than that for IPv4. Hence, for IPv6 address lookup, the binary search on trio levels would be more appropriate and give better search performance than linear search on trio levels. This paper proposes a new IPv6 address lookup algorithm performing binary search on trio levels. The proposed algorithm uses a Bloom filter in pre-filtering levels which do not have matching nodes, and hence it reduces the number of off-chip memory accesses. Simulation has been performed using actual IPv6 routing sets, and the result shows that an IPv6 address lookup can be performed with 1-3 memory accesses in average for a routing data set with 1096 prefixes.
A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment
Jeong, Eun-Hee ; Lee, Byung-Kwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 419~427
This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.
Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System
Kim, Ik-Su ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 428~434
Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.
A Design of One-time Password Verification System with Enhanced Security Using Certificate
Kim, Hyun-Chul ; Lee, Chang-Soo ; Lee, Kyung-Seok ; Jun, Moon-Seog ;
The Journal of Korean Institute of Communications and Information Sciences, volume 34, issue 4B, 2009, Pages 435~441
The one-time password system solves the problem concerning password reuse caused by the repeated utilization of an identical password. The password reuse problem occurs due to the cyclic repetition at the time of password creation, and authentication failure can occur due to time deviation or non-synchronization of the number of authentication. In this study, the password is created asynchronously and exchanged with the user, who then signs using a digital signature in exchange for the password and a valid verification is requested along with the certificate to ensure non-repudiation. Besides this, a verification system for one-time password is proposed and designed to improve security by utilizing the validity verification that is divided into certificate verification and password verification. Comparative analysis shows that the mechanism proposed in this study is better than the existing methods in terms of replay attack, non-repudiation and synchronization failure.