Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 37C, Issue 12 - Dec 2012
Volume 37B, Issue 12 - Dec 2012
Volume 37A, Issue 12 - Dec 2012
Volume 37C, Issue 11 - Nov 2012
Volume 37B, Issue 11 - Nov 2012
Volume 37A, Issue 11 - Nov 2012
Volume 37C, Issue 10 - Oct 2012
Volume 37B, Issue 10 - Oct 2012
Volume 37A, Issue 10 - Oct 2012
Volume 37C, Issue 9 - Sep 2012
Volume 37B, Issue 9 - Sep 2012
Volume 37A, Issue 9 - Sep 2012
Volume 37, Issue 8C - Aug 2012
Volume 37, Issue 8B - Aug 2012
Volume 37, Issue 8A - Aug 2012
Volume 37, Issue 7C - Jul 2012
Volume 37, Issue 7B - Jul 2012
Volume 37, Issue 7A - Jul 2012
Volume 37, Issue 6C - Jun 2012
Volume 37, Issue 6B - Jun 2012
Volume 37, Issue 6A - Jun 2012
Volume 37, Issue 5C - May 2012
Volume 37, Issue 5B - May 2012
Volume 37, Issue 5A - May 2012
Volume 37, Issue 4C - Apr 2012
Volume 37, Issue 4B - Apr 2012
Volume 37, Issue 4A - Apr 2012
Volume 37, Issue 3C - Mar 2012
Volume 37, Issue 3B - Mar 2012
Volume 37, Issue 3A - Mar 2012
Volume 37, Issue 2C - Feb 2012
Volume 37, Issue 2B - Feb 2012
Volume 37, Issue 2A - Feb 2012
Volume 37, Issue 1C - Jan 2012
Volume 37, Issue 1B - Jan 2012
Volume 37, Issue 1A - Jan 2012
Selecting the target year
A Hybrid Authentication Scheme for Wireless MSAP Mesh Networks in the Next-Generation TMCS
Bae, Byoung-Gu ; Yoon, Sun-Joong ; Ko, Young-Bae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1011~1019
DOI : 10.7840/kics.2012.37C.11.1011
This paper presents a novel hybrid authentication scheme in the next-generation Tactical Mobile Communication Systems(TMCS) with wireless MSAP mesh networks. The existing centralized and distributed authentication methods for security between MSAPs may have their pros and cons. The centralized authentication method induces overhead from frequent MSAP association which leads to long authentication delay. On the other hand, the distributed authentication method requires initial sharing of the authentication information. Therefore, a more efficient authentication scheme is needed to protect the network from malicious MSAPs and also maximize efficiency of the network security. The proposed scheme provides a hybrid method of efficiently managing the authentication keys in the wireless MSAP mesh network to reduce the induced authentication message exchange overhead. Also, as the authentication method between MSAP and TMFT is different, a method of utilizing the ACR for handling the EAP packets is proposed. In overall, the proposed scheme provides efficient mutual authentication between MSAPs especially for tactical environments and is analyzed through performance evaluation to prove its superiority.
A Development of Multi-Sensors LED Streetlight Lighting Control System Based on RTOS
In, Chi-Goog ; Lin, Chi-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1020~1026
DOI : 10.7840/kics.2012.37C.11.1020
In this paper, we proposed a RTOS-based lighting control system to improve energy efficiency. This proposed system, real time process was designed to the specified division of the LED streetlight control module for the RTOS-based lighting control into three different tasks. The first task transmits LED lighting signal by measuring illuminance, and the second task transmits motion detecting signal using motion detector. In the third task, lighting control to LED was designed through passed control signal from other tasks The execution status was examined ports that are directly to the ATmega128 MCU for the verification of the system, and illuminance distribution and operating conditions were verified through LED street field test. The proposed RTOS-based lighting control system has brought improving system performance and also facilitate an addition of other functions, and it was possible to optimize energy saving by intelligent lighting pattern control.
A Study of Security Authentication for Cloud Computing Based on Smart Phone
Jeong, Yoon-Su ; Kim, Yong-Tae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1027~1035
DOI : 10.7840/kics.2012.37C.11.1027
Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user`s identity and access control to effectively use the current cloud computing system.
Analysis of Transmission Delay and Fault Recovery Performance with EtherCAT for In-Vehicle Network
Kim, Dong-Gil ; Jo, Youngyun ; Lee, Dongik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1036~1044
DOI : 10.7840/kics.2012.37C.11.1036
Thanks to progressive development of IT technology, the number of intelligent devices communicating each other through an In-Vehicle Network(IVN) has been steadily increasing. It is expected that the required network bandwidth and network nodes for vehicle control in 2015 will be increased by two times and one and half times as compared to in 2010, respectively. As a result, many researchers in automotive industry has showed a significant interest on industrial Ethernets, such as EtherCAT and TTEthernet. This paper addresses an analysis on transmission delay and fault recovery performance with an EtherCAT network which is being considered as an IVN. A mathematical model based on the analysis is verified through a set of experiments using an experimental network setup.
Reliable Dynamic TDMA Scheme with new Packing method for Image Transmission over Link-16
Baek, Hoki ; Lim, Jaesung ; Koo, Jayeul ; Jin, Jeonghwan ; Chun, Philseong ; Oh, Ilhyuk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1045~1053
DOI : 10.7840/kics.2012.37C.11.1045
Link-16 is a widely used TDL (Tactical Data Link) which uses TDMA (Time Division Multiple Access). Link-16 is a very low rate system, so it supports small size of data like tactical message and voice. However, there are related works to transmit situation awareness information like image due to the increasing interest about EBO(Effect-Based Operation), recently. Special TDMA scheduling is needed not static TDMA of Link-16 for image transmission because image data has much larger size than the existing tactical data. In this paper, we proposed Link-16K which enhances the Link-16 MAC. The proposed Link-16K is compatible with Link-16, and includes dynamic TDMA, new packing method, and an efficient retransmission scheme for image transmission effectively. We can see that image transmission delay is reduced and channel utilization is increased through simulation results of proposed idea.
Unequal Error Protection: Survey and Standardization Prospect
Park, Ki-Hyeon ; Nam, Mi-Young ; Park, Jin-Soo ; Song, Hong-Yeop ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1054~1063
DOI : 10.7840/kics.2012.37C.11.1054
In this paper, we introduce basic theories, effects and applications of the unequal error protection (UEP) system that is expected to play a major role in the future multi-layered broadcast system. Also we show results of surveys on the various previous studies and standards about the UEP systems, and we give prospects of standardizations and future applications of UEP based on the surveys.
Determinants of International Standardization: An Empirical Analysis in the ICT field
Kim, Bum-Hoan ; Park, Jongbong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1064~1076
DOI : 10.7840/kics.2012.37C.11.1064
This study is an attempt to identify factors determining the success of international standardization and understand the relationship between the factors, such as government-driven standardization activities. Six factors were identified through factor analysis; namely, `Direct government support`, `Indirect government support`, `Utilization of standardization bodies`, `Standardization strategy`, `Attainment of a dominant market power`, and `Adoption as an international standard.` The results showed that firstly, support from the government, whether direct or indirect, had no direct effect on the outcome of international standardization efforts, but produced an indirect influence on it through mediating factors such as the attainment of a dominant market power. Secondly, the attainment of a dominant market power proved to be the most important success factor of international standardization, suggesting that the government must direct its efforts to help boost the market power of target standards through measures like promoting a timely market entry and the development of high-quality standards, in a manner to induce market satisfaction, increasing lock-in effects and building a quasi-vertical integration system. Thirdly, direct support from the government holds the key to the success of international standardization with de jure standardization bodies, while the strategic use of standardization bodies appears the most important for the positive outcome of standardization concerning de facto standardization bodies.
Design of 2D MUSIC Algorithm to Reduce Computational Burden
Choi, Yun Sub ; Jin, Mi Hyun ; Choi, Heon Ho ; Lee, Sang Jeong ; Park, Chansik ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1077~1083
DOI : 10.7840/kics.2012.37C.11.1077
The jamming countermeasures in GNSS includes anti-jamming technique and jammer localization technique. In both techniques, direction of jamming signal is important and generally the MUSIC algorithm is used to find the direction of jamming signal. The MUSIC is super-resolution algorithm for detecting incident direction of signal. But, the search time of MUSIC algorithm is too long because all candidates of incidence angle are searched. This paper proposes the new method that has less computational burdens and therefore faster than the conventional MUSIC algorithm. The proposed method improves performance speed by reducing unnecessary calculations. In the proposed method, the cost function of conventional MUSIC algorithm is decomposed into the sum of squares and if the partial sum of cost function is larger than the minimum cost function so far, then the candidate is rejected and next candidates are searched. If the computed cost function is less than the minimum cost function so far, the minimum cost function so far is replaced with newly computed value. The performance of the proposed method was compared with the conventional MUSIC algorithm using the simulation. The accuracy of the estimaed direction of jamming signal was same as the conventional MUSIC while the search speed of the proposed method was 1.15 times faster than the conventional MUSIC.
Cooperative Analog and Digital (CANDI) Time Synchronization for Large Multihop Network
Cho, Sung-Hwan ; Ingram, Mary Ann ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1084~1093
DOI : 10.7840/kics.2012.37C.11.1084
For large multihop networks, large time synchronization (TS) errors can accumulate with conventional methods, such as TPSN, RBS, and FTSP, since they need a large number of hops to cover the network. In this paper, a method combining Concurrent Cooperative Transmission (CCT) and Semi- Cooperative Spectrum Fusion (SCSF) is proposed to reduce the number of hops to cover the large network. In CCT, cooperating nodes transmit the same digitally encoded message in orthogonal channels simultaneously, so receivers can benefit from array and diversity gains. SCSF is an analog cooperative transmission method where different cooperators transmit correlated information simultaneously. The two methods are combined to create a new distributed method of network TS, called the Cooperative Analog and Digital (CANDI) TS protocol, which promises significantly lower network TS errors in multi-hop networks. CANDI and TPSN are compared in simulation for a line network.
An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method
Shim, Jun-Yong ; Wi, Soung-Hyouk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1094~1103
DOI : 10.7840/kics.2012.37C.11.1094
Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state`s military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S`s core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.
Inter-Transmitter Distance-Based Guard Time Control Scheme in Airborne Tactical TDMA Networks with Long Propagation Delay
Baek, Hoki ; Lim, Jaesung ; Koo, Jayeul ; Oh, Ilhyuk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1104~1111
DOI : 10.7840/kics.2012.37C.11.1104
Airborne tactical networks is used to air-to-air or air-to-ground operation and have a large propagation delay. All nodes share the data by using TDMA-based broadcasting. In airborne tactical networks, each time slot needs the guard time to ensure the broadcasting because the collisions occur due to the large propagation delay. However, the channel utilization of the networks can be greatly degraded due to the waste of guard time. In this paper, we propose Inter-Transmitter Distance-Based TDMA (ID-TDMA) scheme which ensures the broadcasting while improving the channel utilization by reducing the guard time with the inter-transmitter distance information. The proposed scheme shows the effectiveness through the performance evaluation.
Fast and Reliable Dynamic Common Channel Setup and Reconstruction Method for the Point-to-Point Communications in Military CR Networks
Kim, Min-Gyu ; Choi, Jae-Kark ; Yoo, Sang-Jo ; Jang, Young-Up ; Jeong, Kilsoo ; Lee, Kwang-Eog ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1112~1128
DOI : 10.7840/kics.2012.37C.11.1112
In cognitive radio networks, secondary users are allowed to utilize the channels currently not occupied by primary users opportunistically. Secondary users can communicate with each other using the commonly available channels (common channels) which may change dynamically based on the activity of the primary users. Even though many studies have dealt with cognitive radio behaviors, the detailed procedures for common channel configuration have not been paid much attention. In this paper, the fast and reliable dynamic common channel setup and reconstruction method for the point-to-point communications in military cognitive radio networks is proposed. The detailed time parameters are considered for common channel setup and reconstruction, such as the packet exchange time, channel request waiting time, and rendezvous time. Through numerical analyses, the delay and throughput performance of the proposed method is derived and evaluated.
A Performance Analysis of CSMA in Wireless Networks Based on MIL-STD-188-220
Seo, NanSol ; Joo, JaeWoo ; Jang, DohngWoon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1129~1137
DOI : 10.7840/kics.2012.37C.11.1129
The wireless link of tactical datalink system provides a communication network to share digitalized tactical data in real-time. Also MAC(Multiple Access Control) of this system is subject to TDMA or CSMA according to a operated circumstance of target nodes to exchange the data reliably. In this paper, we verify the operability when we use CSMA scheme based on MIL-STD-188-220 in tactical datalink system which is basically designed with TDMA, and provide a mathematical analysis scheme to verify the operability and performance. Finally, by implementing CSMA scheme to a tactical datalink equipment we obtain practical results which can be compared with theoretical results.
A Power Control-Based MF-TDMA Resource Allocation Scheme for Next Generation Military Satellite Communication Systems
Woo, Soon ; Park, Hyung-Won ; Lee, Ho-Sub ; Yoo, Youn-Sang ; Jung, Byung-Gi ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1138~1147
DOI : 10.7840/kics.2012.37C.11.1138
In this paper, an efficient power control based MF-TDMA resource allocation scheme is proposed for next generation military satellite communication systems. The proposed scheme has the flexibility is used to support heterogeneous terminals with differ in transmission capabilities. The method can be divided into two parts : burst size calculation and burst structure determination. At first, we estimate the link budget taken into account a dynamic satellite link state variation. Then, applicable ACM level and burst size is chosen. In burst structure determination phase, we reorganize the burst structure in time-frequency domain by controlling limited power, bandwidth, time resources. In particular, we compensate the power spectral density among different terminals to integrate them in same transponder, Furthermore, we increase the packing efficiency by controlling the ACM level of the burst in applicable power spectral density range. Simulation results show that the method increase the spectral efficiency and burst packing efficiency. In addition, slot allocation rejection ratio is successfully reduced.
Location Based Reliable Routing Protocol for Tactical Mobile Ad-Hoc Networks
Youn, Myungjune ; Kang, Tae Hun ; Jeon, HahnEarl ; Lee, Jaiyong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1148~1161
DOI : 10.7840/kics.2012.37C.11.1148
Recently, developments in the field of communication and network technologies induced new paradigm in the defense weapon system. As a consequence, military authorities develop the Tactical Information Communication Network(TICN) system to adapt to the changing paradigm. One of the most important functions of TICN is real-time communication. As a result, TICN system needs to receive real-time information from the battlefield, and the key technology to support these features is MANET(Mobile Ad-Hoc Network) routing protocol. In this paper, we analyze problems of the shortest path scheme in tactical Ad-Hoc networks, which is widely used in common Ad-Hoc networks. We propose efficient routing protocol for tactical MANET by considering the environment of small combat units, such as node position, speed and data size. The proposed algorithm shows reliable data transfer and low latency in battlefield.
A Novel Implementation of Fault-Tolerant Ethernet NIC (Network Interface Card) Using Single MAC
Kim, Se-Mog ; Pham, Hoang-Anh ; Lee, Dong-Ho ; Rhee, Jong Myung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1162~1169
DOI : 10.7840/kics.2012.37C.11.1162
One of the important operational requirements for mission critical Ethernet networked system is having the fault tolerant capability. Such capability can be obtained by equipping multiport Network Interface Card (NIC) in each node in the system. Conventional NIC uses two or more Media Access Controls (MACs) and a co-processor for the MAC switching whenever an active port fails. Since firmware is needed for the co-processor, longer fail-over switching and degraded throughput can be generally expected. Furthermore the system upgrading requiring the firmware revision in each tactical node demands high cost. In this paper we propose a novel single MAC based NIC that does not use a co-processor, but just use general discrete building blocks such as MAC chip and switching chip, which results in better performances than conventional method. Experimental results validate our scheme.
Energy Efficient Clustering Algorithm for Surveillance and Reconnaissance Applications in Wireless Sensor Networks
Kong, Joon-Ik ; Lee, Jae-Ho ; Kang, Jiheon ; Eom, Doo-Seop ;
The Journal of Korean Institute of Communications and Information Sciences, volume 37C, issue 11, 2012, Pages 1170~1181
DOI : 10.7840/kics.2012.37C.11.1170
Wireless Sensor Networks(WSNs) are used in diverse applications. In general, sensor nodes that are easily deployed on specific areas have many resource constrains such as battery power, memory sizes, MCUs, RFs and so on. Hence, first of all, the efficient energy consumption is strongly required in WSNs. In terms of event states, event-driven deliverly model (i.e. surveillance and reconnaissance applications) has several characteristics. On the basis of such a model, clustering algorithms can be mostly used to manage sensor nodes` energy efficiently owing to the advantages of data aggregations. Since a specific node collects packets from its child nodes in a network topology and aggregates them into one packet to relay them once, amount of transmitted packets to a sink node can be reduced. However, most clustering algorithms have been designed without considering can be reduced. However, most clustering algorithms have been designed without considering characteristics of event-driven deliverly model, which results in some problems. In this paper, we propose enhanced clustering algorithms regarding with both targets` movement and energy efficiency in order for applications of surveillance and reconnaissance. These algorithms form some clusters to contend locally between nodes, which have already detected certain targets, by using a method which called CHEW (Cluster Head Election Window). Therefore, our proposed algorithms enable to reduce not only the cost of cluster maintenance, but also energy consumption. In conclusion, we analyze traces of the clusters` movements according to targets` locations, evaluate the traces` results and we compare our algorithms with others through simulations. Finally, we verify our algorithms use power energy efficiently.