Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 35, Issue 12C - Dec 2010
Volume 35, Issue 12B - Dec 2010
Volume 35, Issue 12A - Dec 2010
Volume 35, Issue 11C - Nov 2010
Volume 35, Issue 11B - Nov 2010
Volume 35, Issue 11A - Nov 2010
Volume 35, Issue 10C - Oct 2010
Volume 35, Issue 10B - Oct 2010
Volume 35, Issue 10A - Oct 2010
Volume 35, Issue 9C - Sep 2010
Volume 35, Issue 9B - Sep 2010
Volume 35, Issue 9A - Sep 2010
Volume 35, Issue 8C - Aug 2010
Volume 35, Issue 8B - Aug 2010
Volume 35, Issue 8A - Aug 2010
Volume 35, Issue 7C - Jul 2010
Volume 35, Issue 7B - Jul 2010
Volume 35, Issue 7A - Jul 2010
Volume 35, Issue 6C - Jun 2010
Volume 35, Issue 6B - Jun 2010
Volume 35, Issue 6A - Jun 2010
Volume 35, Issue 5C - May 2010
Volume 35, Issue 5B - May 2010
Volume 35, Issue 5A - May 2010
Volume 35, Issue 4C - Apr 2010
Volume 35, Issue 4B - Apr 2010
Volume 35, Issue 4A - Apr 2010
Volume 35, Issue 3C - Mar 2010
Volume 35, Issue 3B - Mar 2010
Volume 35, Issue 3A - Mar 2010
Volume 35, Issue 2C - Feb 2010
Volume 35, Issue 2B - Feb 2010
Volume 35, Issue 2A - Feb 2010
Volume 35, Issue 1C - Jan 2010
Volume 35, Issue 1B - Jan 2010
Volume 35, Issue 1A - Jan 2010
Selecting the target year
A Scalable Content-Based Routing Scheme Considering Group Mobility in Tactical Mobile Ad-hoc Networks
Ko, Kwang-Tae ; Kang, Kyung-Ran ; Cho, Young-Jong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 721~733
In this paper, we propose a scalable content-based routing scheme for the tactical mobile ad-hoc networks where the nodes usually move together forming a group. Our scheme is classified as a content-based routing scheme based on publish and subscribe model. The nodes compose a cluster according to their position and interest. Our scheme allows multi-level cluster nesting. As a publish/subscribe model does, each node announces its interest to the cluster head who aggregates and announces the interests from cluster members to its neighbor cluster head. Actual data messages are delivered to the end node via cluster header in the reverse direction of the interest announcement. Using Qualnet simulator, we evaluated the performance of our scheme in comparison with two well-known content-based routing schemes. Simulation results show that our scheme maintains higher message delivery ratio as number of nodes increases whereas the two schemes show much lower delivery ratio. In addition, as the group mobility gets faster our scheme incurs less or similar control message overhead compared with the two schemes.
Energy Efficient Multiple Path Routing Algorithm for Wireless Ad Hoc Networks
Lee, Ki-Seop ; Kim, Sung-Wook ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 734~740
In this paper, we propose an effective energy management algorithm for wireless networks. The proposed algorithm sets the multiple routing paths and transmits routing packets based on the cooperative game model. This approach can enhance the network performance under different and diversified network situations. The simulation results demonstrate that the proposed algorithm generally exhibits superior performance compared with the other existing scheme under light to heavy traffic loads.
Handover Control for WCDMA Femtocell Networks
Chowdhury, Mostafa Zaman ; Jang, Yeong-Min ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 741~752
The ability to seamlessly switch between the macro networks and femtocell networks is a key driver for femtocell network deployment. The handover procedures for the integrated femtocell/macrocell networks differ from the existing handovers. Some modifications of existing network and protocol architecture for the integration of femtocell networks with the existing macrocell networks are also essential. These modifications change the signal flow for handover procedures due to different 2-tier cell (macrocell and femtocell) environment. The handover between two networks should be performed with minimum signaling. A frequent and unnecessary handover is another problem for hierarchical femtocell/macrocell network environment that must be minimized. This work studies the details mobility management schemes for small and medium scale femtocell network deployment. To do that, firstly we present two different network architectures for small scale and medium scale WCDMA femtocell deployment. The details handover call flow for these two network architectures and CAC scheme to minimize the unnecessary handovers are proposed for the integrated femtocell/macrocell networks. The numerical analysis for the proposed M/M/N/N queuing scheme and the simulation results of the proposed CAC scheme demonstrate the handover call control performances for femtocell environment.
Identified Slot Scan-based Tag Collection Algorithm for Active RFID Systems
Yoon, Won-Ju ; Chung, Sang-Hwa ; Kwon, Yoon-Geun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 753~761
In this paper, we propose a novel tag collection algorithm to improve tag collection performance in active RFID systems. In the proposed algorithm, the reader detects the occurrence of empty slots and collided slots through the identified slot scan process and reduces the time wasted by empty slots and collided slots, resulting in improvement of tag collection performance. To evaluate the performance improvement by the proposed tag collection algorithm via the experiments in a real-world environment, we implemented an active RFID reader and tags. The experimental results with the reader and 60 tags showed that the proposed algorithm could reduce the average tag collection time by 21.7% and improve the average identification throughput by 28.3%, compared with the standard tag collection algorithm in ISO/IEC 18000-7. In addition, the proposed algorithm reduced the average battery consumption on tags by 22.7% in the battery consumption experiment with 20 tags.
Low Power MAC Protocol Design of an Efficient Preamble Exploiting Virtual Synchronization Scheme for Wireless Sensor Networks
Lee, Sung-Hun ; Hwang, Se-Wook ; Lee, Hyuk-Joon ; Lee, Hyung-Geun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 762~770
The researches about energy efficieny of wireless sensor MAC protocol is an issue in present days. Therefore, MAC and routing protocols for reducing energy consumption at sensor nodes is needed. In this study, a low-power MAC protocol for sensor network is proposed, which in based on X-MAC by exploiting virtual synchronization. The virtual synchronization technique lets senders postpone packet transmission until receivers' wake-up time, so that senders transmit only one or two short preambles. Using NS-2, a proposed MAC protocol improve the energy efficiency by 10% compared with the X-MAC protocol.
A Multicasting based Efficient Control Message Transmission for Quality of Service in Asymmetric 10G-EPONs
Yang, Yeon-Mo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 771~776
In this paper, we present an efficient centralized dynamic bandwidth allocation scheme with multicasting for asymmetric 10G-Ethernet Passive Optical Networks (10G-EPONs). The proposed scheme is based on multicast-burst polling and provides quality of service (QoS) with class of service (CoS) to different lasses of packets. It is shown that a well-known conventional interleaved polling scheme severely decreases downstream channel capacity for user traffic when the upstream network load is low (avalanche gate frequency). To overcome this problem, we have proposed a multicast burst polling scheme which shows impressively lower downstream bandwidth consumption compare to IPACT and moreover it did not show the light load penalty problem. Simulation results using an OPNET tool show that the multicast burst polling effectively eliminates light-load penalty and minimizes downstream bandwidth consumption under avalanche gate frequencies.
A Study on the Reform of A Defence IT Governance System
Yang, Ho-Kyung ; Park, Hyun-Kyoo ; Cha, Hyun-Jong ; Cho, Yong-Gun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 777~784
In modern information society, the necessity arose of having to manage overall information technology as information technology is introduced to companies and public organizations while the necessity of joining the goals of business and IT is increasing. Also, there has been an increase in organizations which are preventing the overlapping of IT investigations and pursuing ROI. Hereupon, many developed companies created the concept of IT governance. IT governance indicates the structure and dynamic behavior of companies' business and the structural affecting factors influencing IT, and this is expressed as business, the business & IT related committees and departments inside and outside, the framework representing their relationship and range of activity, organizational diagram and process composition. Intermingled with such external factors, the reestablishment of defense IT governance in order to reach the vision and goal of our current military defense has become a requirement. This study aims to describe core strategy for building defense IT governance framework. In order to support these claims, the comprehensive IT governance and information technology are mentioned, domestic and overseas military cases are analyzed, and core strategy for building defense IT governance framework is analyzed as well.
The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader
Park, Nam-Je ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 785~793
The current excessive limitations to mobile RFID tags and readers make it impossible to apply present codes and protocols. The technology for information and privacy protection should be developed in terms of general interconnection among elements and their characteristics of mobile RFID in order to such technology that meets the RFID circumstances. In this paper, transplanting and extending security library for protecting mobile RFID information in secure mobile RFID terminal S/W platform system to support security application on the path of all data from RFID reader to application server.
Efficient Processing of Multidimensional Sensor stream Data in Digital Marine Vessel
Song, Byoung-Ho ; Park, Kyung-Woo ; Lee, Jin-Seok ; Lee, Keong-Hyo ; Jung, Min-A ; Lee, Sung-Ro ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 794~800
It is necessary to accurate and efficient management for measured digital data from various sensors in digital marine vessel. It is not efficient that sensor network process input stream data of mass storage stored in database the same time. In this paper, We propose to improve the processing performance of multidimensional stream data continuous incoming from multiple sensor. We propose that we arrange some sensors (temperature, humidity, lighting, voice) and process query based on sliding window for efficient input stream and found multiple query plan to Mjoin method and we reduce stored data using SVM algorithm. We automatically delete that it isn't necessary to the data from the database and we used to ship diagnosis system for available data. As a result, we obtained to efficient result about 18.3% reduction rate of database using 35,912 data sets.
LECEEP : LEACH based Chaining Energy Efficient Protocol
Yoo, Wan-Ki ; Kwon, Tae-Wook ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 801~808
LEACH, one of hierarchical based routing protocols, was proposed for energy efficiency which is the most important requirement of Wireless Sensor Network(WSN). LEACH protocol is composed of a cluster of certain large number of clusters, which have a cluster head and member nodes. Member nodes send sensing data to their cluster heads, and the cluster heads aggregate the sensing data and transmit it to BS. The challenges of LEACH protocol are that cluster heads are not evenly distributed, and energy consumption to transmit aggregated data from Cluster heads directly to BS is excessive. This study, to improve LEACH protocol, suggests LECEEP that transmit data to contiguity cluster head that is the nearest and not far away BS forming chain between cluster head, and then the nearest cluster head from BS transmit aggregated data finally to BS. According to simulation, LECEEP consumes less energy and retains more number of survival node than LEACH protocol.
An Adaptive Equalizer for Error Free 40GbE Data Transmission on 40 inch High-Speed Backplane Channel
Yang, Choong-Reol ; Kim, Kwang-Joon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 809~815
This paper proposes the structures and algorithms for the adaptive equalizer that are required to allow high speed signaling over 40 Gb/s across a backplane channel. The proposed adaptive DFE has a fast convergence and low computational complexity. Simulations with a 40 Gb/s show that our adaptive equalizer can meet the IEEE 802.3ba requirement for backplane strip line up to 40 inches.
The Study of Sensor Network for Information Retrieval and Communication Protocol High Performance Algorithm
Kang, Jeong-Yong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 816~823
Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.
A Bridge Management System Using Wireless Sensor Networks
Park, Chan-Heum ; Kim, Young-Rag ; Kim, Geum-Deok ; Park, Hee-Joo ; Kim, Chong-Gun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 824~832
In construction structure management, the effects of investigation by the professional manager is dependent on the cost, the inspection periods and methods. Therefore, effective and automated maintenance system for the target structure is required. Although some bridge monitoring systems are operating using wire based networks, the performance is not good enough to show sufficient ability as integrated bridge management system. In this paper, we design and implement an integrated bridge management system based on sensor networks. Two expert modules for bridge management and the integrated system management are provided. Moreover, web-based monitoring system is also designed for users at anywhere. The results show that the system is effective and readily available.
Efficient Mobile Node Authentication in WSN
Shon, Tae-Shik ; Han, Kyu-Suk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 833~839
Mobility of sensor node is one of the rising issues in Wireless Sensor Networks (WSN). However, current security researches on WSN only consider static environments. Thus they are not sufficient to be deployed in the dynamic environment where the resource is limited. In this paper, we propose the efficient node authentication and key exchange protocol that reduces the overhead in node re-authentication.
A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments
Chae, Kang-Suk ; Choi, Jae-Duck ; Jung, Sou-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 840~848
This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.
Anonymity Guaranteed Payment Protocol in Vehicular Ad Hoc Network Environments
Na, Jin-Han ; Park, Young-Ho ; Moon, Sang-Jae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 5B, 2010, Pages 849~857
Security is essential to make use of application service securely in VANET environments. This paper proposes payment protocol which supports user's anonymity. The proposed protocol is designed to use a charge card as a payment method and performs pre-registration, renewal and payment phase. The user's anonymity and disclosure of charge card information is protected through the pre-registration and renewal phase, and also fast computing operation is supported by minimizing the computational load on vehicles.