Public wireless LAN services have been increasing recently. These are convenient services for carrier
companies particularly. And carrier companies and the user can disperse traffic. However in order to
improve the convenience, the services do not often use the encryption key or do not change the encryption
key that has already been set. Therefore, the services have a problem in safety. This paper solves this
problem using the visible light communication.
The visible light communication sends a signal by blinking the light. One of the visible light communication
features is that we can see the transmission area. The visible light communication can use lighting
equipments as the transmitter unlike infrared or conventional radio communications. Further, visible light
communication can separate to clarify the transmission range by using light.
We propose the distribution of the encryption key and the SSID using visible light communication. Visible
light communication can easily prepare a small network, such as a partition or per a room basis. For
malicious users connecting to the network is necessary to enter in the service provided area. Thus the
administrator is able to easily manage legitimate users. In addition, it is possible to update the SSID and
the encryption key by visible light communication easily for an administrator. Thus if malicious users get
the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal
users may only need to run the shell script for receiving information from the receiver. Therefore,
convenience is good.
In order to confirm the improved convenience, we measured the time it takes for a user to connect to the
network. Conventional methods are methods that use or do not use the encryption key. As a result, users
can connect to the network in a short time compared with the conventional methods. The system becomes
stronger than conventional methods because it is possible to update the encryption key and SSID
automatically in the security aspect.
A survey on hiding user privacy in location based services through clusteringeSAT Journals
Abstract Smartphone’s are being more and more popular as the technology being evolve. The Smartphone’s are capable of providing the location aware services like GPS. They share all the location information with the central location server. When user submit any query then these query also carries some personal information of the user. This query and information is then submitted to the LGS server. At the LBS server this information is not much confidential. Someone can use this information to make user panic. To overcome this we are proposing the new collaborative approach to hide user’s personal data from the LBS server. Our approach does not lead to make changes in the architecture of the LBS server. And we are also not going to use the third party server. Here we are going to use the other user’s device to search other users query so that other user can be get hide from the LBS server. Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models
This document presents ActivFi, a proof of concept for using Wi-Fi signals to recognize human activity. The researchers implemented an Android application that collects Received Signal Strength Indicator (RSSI) values from Wi-Fi nodes placed on the body. Their preliminary results found that different activities (sitting, standing, walking) produced distinct RSSI fluctuation patterns that could potentially be used to train a classifier. The researchers conclude that Wi-Fi signals contain patterns related to human movement and activity recognition may be possible using a Wi-Fi based sensor network.
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
This document provides an overview of the requirements for developing a mobile application called "Free Park" to help disabled users locate parking spaces. The application will allow users to view available parking locations, prices, and reserve spaces for a chosen duration. It will connect to a SQLite database to store user data and parking information. The application will be created in Java using Android SDK and will integrate with Google Maps and the Liverpool government website for additional parking details. Security measures like WPA2 encryption will also be implemented once the basic application functionality is established. The goal is to create a user-friendly mobile solution to help disabled individuals more easily find and reserve accessible parking spots.
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
This document describes a proposed smart library system that uses LiFi (Light Fidelity) for data transmission. LiFi uses light from LED bulbs to transmit data wirelessly by varying the light intensity at very high speeds. The proposed system would transmit data between computers and access points in a library using LiFi transmitters and receivers, allowing users to access digital library resources and texts. Key features of the system include transmitting data without flashing lights, equal upload and download speeds for high data transfer rates, and text-to-speech technology to allow digital texts to be read aloud to users. The system is simulated using Proteus simulation software to test the LiFi networking components and data transmission capabilities.
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGYSuswara Goli
1. 1G technology, developed in the 1980s, was based on analog systems with speeds up to 2.4 kbps. It allowed basic voice calls but had poor voice quality, battery life, and size.
2. 2G technology, developed in the late 1980s-1990s, was based on digital systems with speeds up to 64 kbps. It provided clearer digital voice and SMS but required strong signals and could not handle more complex data like videos.
3. 3G technology, developed from the late 1990s to present, had transmission speeds from 125 kbps to 2 Mbps and allowed services like video calls, email, banking, and games but was expensive to build and required high bandwidth
Wireless networks are vulnerable to several security threats. Unauthorized users can access networks through accidental or malicious association if wireless networks have poor security settings like default SSIDs and no encryption. Ad-hoc peer-to-peer networks between devices also lack protections. Attackers can perform man-in-the-middle attacks using rogue access points or spoof MAC addresses to steal network access. Organizations need policies and training to secure wireless networks and prevent identity theft and unauthorized access.
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
This document presents a technique for classifying network traffic and detecting unknown flows in wireless sensor networks. The technique aims to improve on previous work by using fewer labeled training samples and investigating flow correlation in real-world network environments. It proposes a method that selects a sender and receiver node, establishes a path between them by avoiding faulty nodes, and evaluates the system based on propagation rate, training purity, and accuracy. The results show the proposed method achieves higher propagation rate, training purity, and overall accuracy compared to an existing semi-supervised technique.
The telecommunication numbering system in Indonesia currently complies to the International TelecommunicationUnion (ITU) standard, that is ITU-T E.164. In accordance to both technology development and the growing of network users, ITU has also been designing future infrastructure network concept, namely Next Generation Network Infrastructure (NGNI). In its technical paper, ITU discusses future generation’s specification as well as current network migration scenarios towards NGN in developing countries and its impact on regulations, business processes, and the numbering system. The scenario described in the concept is yet universal and the implementation would be highly depending on the conditions of ones country. This paper proposes the roadmap of numbering system from the current state into NGN numbering for the case of Indonesia. It is important since Indonesia has unique circumstances compared to other developing countries. It needed a roadmap that is relevant with its numbering system transformation condition towards NGN numbering. The method used in this paper are benchmarking with several countries that have started with the transformation process, forecasting with regression method based on the existing trends and descriptive analysis. This paper has proposed the stages of numbering roadmap towards NGN numbering system, the achievement parameters, and the indicators that are suitable for Indonesia.
Study of Various Techniques to Filter Spam EmailsIRJET Journal
This document discusses techniques for filtering spam emails. It begins with an introduction explaining the rise of spam emails due to increased internet and email usage. It then describes various techniques used to filter spam, including machine learning methods like Bayesian classification and non-machine learning methods like blacklists, whitelists, and header analysis. Next, it covers how data mining techniques like clustering, classification, and association rule mining can be applied to identify spam emails. Finally, it reviews several papers that have compared the performance of techniques like Naive Bayes, SVM, KNN, and neural networks for spam filtering.
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
The past several years have witnessed a rapid development in the wireless network area. So far wireless networking has been focused on high-speed and long range applications. Zigbee technology was developed for a Wireless Personal Area Networks (WPAN), aimed at control and military applications with low data rate and low power consumption. Zigbee is a standard defines the set of communication protocols for low-data-rate short-range wireless networking. Zigbee-based wireless devices operate in 868 MHz, 915 MHz, and 2.4 GHz frequency bands. The maximum data rate is 250K bits per second. Zigbee is mainly for battery-powered applications where low data rate, low cost, and long battery life are main requirements. This paper explores Verilog design for various blocks in Zigbee Transmitter architecture for an acknowledgement frame. The word digital has made a dramatic impact on our society. Developments of digital solutions have been possible due to good digital system design and modeling techniques. Further developments have been made and introduced VLSI in order to reduce size of the architecture, to improve speed of operation, improvements in predictability of the circuit behavior. Digital Zigbee Transmitter comprises of Cyclic Redundancy Check, Bit-to-Symbol block, Symbol-to-chip block, Modulator and Pulse shaping block. The work here is to show how we can design Zigbee transmitter with its specifications by using Verilog with less number of slices and Look up tables (LUTs).
This seminar presentation discusses the development of a mobile distributed system for personal security. The system uses GPS and LBS technologies to track a user's location and send emergency alerts via SMS or email with their coordinates. It has a client-server architecture with the mobile phone as the client and synchronization between servers. The system aims to provide location tracking and alerts even when GPS is unavailable by using cell tower or WiFi access point information to determine approximate location. It addresses the problem of location tracking without GPS through a combination of existing technologies and custom developments.
This document provides details on network design for a commercial company with four sites across a city. It summarizes the key findings of the network design, which includes provision of connectivity between the four sites and to the internet. It then discusses various aspects of the network design such as collision domains, broadcast domains, physical media, VPN configuration, and suitable network topologies. Star topology is identified as most suitable for the VPN configuration, with a centralized VPN concentrator creating secure tunnels to remote hosts.
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
This document discusses a wireless LAN intrusion detection and prevention system for malicious access points. It aims to automatically detect and block rogue access points on a network, while also protecting unprotected clients. The system uses a whitelist containing authorized clients and compares IP addresses, SSIDs, detection/prevention times, and MAC addresses of access points and clients to identify unauthorized ones. It examines different techniques for detecting malicious access points and implements a lightweight server-side and client-side solution to efficiently detect and prevent malicious access points and protect unprotected clients, including detecting live attacks. The system aims to address limitations of prior work that only protected the client-side or server-side individually.
Automatic recognition of the digital modulation types using the artificial ne...IJECEIAES
As digital communication technologies continue to grow and evolve, applications for this steady development are also growing. This growth has generated a growing need to look for automated methods for recognizing and classifying the digital modulation type used in the communication system, which has an important effect on many civil and military applications. This paper suggests a recognizing system capable of classifying multiple and different types of digital modulation methods (64QAM, 2PSK, 4PSK, 8PSK, 4ASK, 2FSK, 4FSK, 8FSK). This paper focuses on trying to recognize the type of digital modulation using the artificial neural network (ANN) with its complex algorithm to boost the performance and increase the noise immunity of the system. This system succeeded in recognizing all the digital modulation types under the current study without any prior information. The proposed system used 8 signal features that were used to classify these 8 modulation methods. The system succeeded in achieving a recognition ratio of at least 68% for experimental signals on a signal to noise ratio (SNR=5dB) and 89.1% for experimental signals at (SNR=10dB) and 91% for experimental signals at (SNR=15dB) for a channel with additive white gaussian noise (AWGN).
This document provides an overview of Bluetooth technology. It begins with acknowledgements to sources that informed the content. It then discusses wireless networks in general and how Bluetooth fits within infrastructure-based and ad hoc wireless networks. The rest of the document details Bluetooth-specific topics like the architecture, standards, protocols, connection process, profiles, and improvements across Bluetooth versions.
Wireless communication involves data transfer between devices without physical connections like wires. It includes technologies like cellular networks, radio, and satellite that allow continuous connection to a base network from mobile devices. Mobile computing uses untethered devices like laptops and smartphones that can access networks wirelessly or connect to a base location intermittently without needing to remain physically tethered.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
This document summarizes a research paper that proposes a distributed flow-based access scheme for slotted-time protocols in ad-hoc wireless networks. The scheme aims to provide proportional fairness between end-to-end flows while constraining buffer overflow probabilities at each node. It formulates the problem as a nonlinear program and presents a distributed dual approach with low computational overhead. Simulation results support that the proposed scheme converges to the unique global optimum and satisfies fairness and quality of service objectives.
Ctcp a cross layer information based tcp for manetijasuc
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and
considers every packet loss as congestion. This results in severe degradation of TCP performance. In this
research work, we modified the operations of TCP to adapt to network states. The cross-layer notifications
are used for adapting the congestion window and achieving better performance. We propose Cross-layer
information based Transmission Control Protocol (CTCP) which consists of four network states.
Decelerate state to recover from contention losses, Cautionary state to deal with route failures, Congested
state to handle network congestion and Normal state to be compatible with traditional TCP. Decelerate
state makes TCP slow down if the packet loss is believed to be due to contention rather than congestion.
Cautionary state suspends the TCP variables and after route reestablishment resumes with conservative
values. Congestion state calls congestion control when network is actually congested and normal state
works as standard TCP. Simulation results show that network state based CTCP is more appropriate for
MANET than packet loss based traditional TCP.
Enmat v2.2 presentation september 2014ENMAT Energy
Envantage ENMAT offer a Monitoring and Targeting (M&T) service to enable organisations to save energy and cut costs. The use of this platform means that we can deliver a bespoke solutions to meet your needs.
Aimed at industrial/commercial SMEs and multi-site retailers, the Envantage ENMAT service utilises the latest software technologies to obtain a full picture of customer energy usage across single or multiple sites
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
In this paper, we propose a novel Distributed MANET Management System (DMMS) approach to use cross layer models to demonstrate a simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for different applications. In the proposed DMMS architecture, each network resource maintains a set of Management Information Base (MIB) elements and stores resource activities in their abstraction in terms of counters, timer, flag and threshold values. The abstract data is exchanged between different management agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. However, in traditional network management systems, they collect statistical data such as resource usage and performance by spoofing of resources. The amount of data that is exchanged with other resources through management protocols that can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for management functions increases and become inefficient as it increases the power usage for processing. Our proposed scheme targets at solving the problems.
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
This paper demonstrates the concept of using Heterogeneous networks (HetNets) to improve Long Term Evolution (LTE) system by introducing the LTE Advance (LTE-A). The type of HetNets that has been chosen for this study is Macro with Pico cells. Comparing the system performance with and without Pico cells has clearly illustrated using three well-known scheduling algorithms (Proportional Fair PF, Maximum Largest Weighted Delay First MLWDF and Exponential/Proportional Fair EXP/PF). The system is judged based on throughput, Packet Loss Ratio PLR, delay and fairness.. A simulation platform called LTE-Sim has been used to collect the data and produce the paper’s outcomes and graphs. The results prove that adding Pico cells enhances the overall system performance. From the simulation outcomes, the overall system performance is as follows: throughput is duplicated or tripled based on the number of users, the PLR is almost quartered, the delay is nearly reduced ten times (PF case) and changed to be a half (MLWDF/EXP cases), and the fairness stays closer to value of 1. It is considered an efficient and cost effective way to increase the throughput, coverage and reduce the latency.
This document summarizes the design and performance evaluation of a two-unit Yagi-Uda antenna array for UHF satellite communication. Simulations were conducted using 4NEC2 software to optimize the design for a gain of 18.6 dBi at 437.025 MHz. Field tests validated the antenna array achieved high gain and front-to-back ratio while maintaining low standing wave ratio across the UHF band. The two-unit circularly polarized crossed Yagi array design successfully improved communication link margins for small cube satellites operating with stringent power budgets.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
A novel energy efficient routing algorithm for wireless sensor networks using...ijwmn
There are numerous applications for wireless sensor networks which are inevitable now a day in our daily
life. Majority of such applications which use wireless sensor networks will be in areas where the direct
human intervention is impossible. So the limited energy available in such sensors is a threat for prolonging
the life of the entire network. The need of energy efficiency in wireless sensor networks is a hot research
topic in which lot of new strategies for improvement in energy efficiency has been sought after. As
communication process consumes more energy, an energy efficient routing strategy can probably reduce
the energy consumption to a great extend. This paper gives an overview of the different routing techniques
in which mobile sinks are used to facilitate the routing process which can effectively reduce the energy use.
A new routing strategy with mobile sinks and a static sink is proposed and is compared based on the
matrices life time and average energy of the nodes with the existing Shortest Hop path (SH) algorithm. The
simulation results shows the proposed algorithm is more energy efficient than the existing one.
Data mining is important process to extract the useful information and pattern from huge amount of data.
NS-2 is an efficient tool to build the environment of network. The results from simulate these environment
in NS-2 is trace file that contains several columns and lines represent the network events. This trace file
can be used to analyse the network according to performance metrics but it has redundant columns and
rows. So, this paper is to perform the data mining in order to find only the necessary information in
analysis operation to reduce the execution time and the storage size of the trace file.
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
This document summarizes a new Energy-Degree Distance (EDD) Clustering Algorithm for wireless sensor networks. The algorithm aims to minimize energy consumption and balance energy usage among nodes. Key aspects of the EDD algorithm include electing cluster heads based on a node's remaining energy, degree, and distance to the base station. Simulation results show the EDD algorithm outperforms the LEACH algorithm in terms of network lifetime and energy efficiency. Both dynamic and static clustering methods are evaluated, with dynamic clustering showing better performance overall.
Wireless sensor nodes are usually deployed in not easily accessible places to provide solution to a wide
range of application such as environmental, medical and structural monitoring. They are spatially
distributed and as a result are usually powered from batteries. Due to the limitation in providing power
with batteries, which must be manually replaced when they are depleted, and location constraints in
wireless sensor network causes a major setback on performance and lifetime of WSNs. This difficulty in
battery replacement and cost led to a growing interest in energy harvesting. The current practice in energy
harvesting for sensor networks is based on practical and simulation approach. The evaluation and
validation of the WSN systems is mostly done using simulation and practical implementation. Simulation is
widely used especially for its great advantage in evaluating network systems. Its disadvantages such as the
long time taken to simulate and not being economical as it implements data without proper analysis of all
that is involved ,wasting useful resources cannot be ignored. In most times, the energy scavenged is directly
wired to the sensor nodes. We, therefore, argue that simulation – based and practical implementation of
WSN energy harvesting system should be further strengthened through mathematical analysis and design
procedures. In this work, we designed and modeled the energy harvesting system for wireless sensor nodes
based on the input and output parameters of the energy sources and sensor nodes. We also introduced the
use of supercapacitor as buffer and intermittent source for the sensor node. The model was further tested in
a Matlab environment, and found to yield a very good approach for system design.
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Wireless mesh networking gained an international interest over the years as a result to high recognition in
the wireless industry as a cost effective, scalable, wider coverage and capacity capable wireless technology.
The contention based distributed medium access in wireless networks has advanced not only in supporting
the quality of multimedia but also achieving high throughput and to minimize packet delay overheads in
legacy systems. Unfortunately, the impact of such enhancement has not been fully justified with mesh
network environments yet. The medium access frames are required to be contended over multi-hops to
overcome the challenges of improving overall system performance through concurrent transmissions. The
goal of this paper is to discuss the issues and challenges of transmission fairness and the effect of
concurrent transmission on system performance. To mitigate transmission fairness issues, we review
existing open literature on mesh networking and provide guidelines for better system design and
deployment. Finally, we conclude the paper with future research directions. This study may help network
designer and planner to overcome the remaining challenging issues in the design and deployment of WMNs
worldwide.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with traditional wide beam antennas for wider coverage in the
cell, but future capacity demands cannot be achieved by using them only. It is required to achieve maximum
practical capacity from macro cells by employing higher order sectorization and by utilizing all possible
antenna solutions including smart antennas. This paper presents enhanced tessellation for 6-sector sites
and proposes novel layout for 12-sector sites. The main target of this paper is to compare the performance
of conventional wide beam antenna, switched beam smart antenna, adaptive beam antenna and different
network layouts in terms of offering better received signal quality and user throughput. Splitting macro cell
into smaller micro or pico cells can improve the capacity of network, but this paper highlights the
importance of higher order sectorization and advance antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with improved network capacity. Monte Carlo simulations at
system level were done for Dual Cell High Speed Downlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interval (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of using smart antennas and higher order sectorization with
proposed network layout.
Zigbee based voice controlled wireless smart home systemijwmn
In this paper a voice controlled wireless smart home system has been presented for elderly and disabled
people. The proposed system has two main components namely (a) voice recognition system, and (b)
wireless system. LabView software has been used to implement the voice recognition system. On the other
hand, ZigBee wireless modules have been used to implement the wireless system. The main goal of this
system is to control home appliances by using voice commands. The proposed system can recognize the
voice commands, convert them into the required data format, and send the data through the wireless
transmitter. Based on the received data at the wireless receiver associated with the appliances desired
switching operations are performed. The proposed system is a low cost and low power system because
ZigBee is used. Additionally the proposed system needs to be trained of voice command only once. Then the
system can recognize the voice commands independent of vocabulary size, noise, and speaker
characteristics (i.e., accent).
A comparative study in wireless sensor networksijwmn
This document summarizes and compares several routing algorithms proposed for wireless sensor networks. It discusses algorithms that aim to improve reliability, power efficiency, lifetime, and fault tolerance. The evaluation section compares how each algorithm addresses challenges like reliability, energy conservation, and adapting to topology changes. While various algorithms achieve improvements in areas like power efficiency and lifetime, most still have limitations and do not fully address all the key challenges for wireless sensor networks.
Tollan xicocotitlan a reconstructed city by augmented reality ( extended )ijdms
Work In Terminal presents the analysis, design, implementation and results of Reconstruction Xicocotitlan
Tollan-through augmented reality (Extended), which will release information about the Toltec capital
supplemented by presenting an overview of the main premises of the Xicocotitlan Tollan city supported
dimensional models based on the augmented reality technique showing the user a virtual representation of
buildings in Tollan phase.
This document provides an introduction to computer networking concepts. It discusses what a network is and some key advantages and disadvantages of networking. It then describes different types of networks including LAN, WAN, MAN, and WLAN. It also covers network addressing schemes including network classes and subnetting. Finally, it discusses the hierarchical IP addressing scheme used to efficiently route traffic on large networks like the Internet.
This document discusses the hierarchical structure of network software and protocols. It explains that networks are organized into layers, with each layer communicating with the same layer on other machines using protocols. Data is passed between layers down the hierarchy, with each layer able to add header information. The layers, protocols, and interfaces together make up the network architecture. Key issues addressed by different layers include addressing, error control, flow control, multiplexing/demultiplexing, and routing. Connection-oriented and connectionless services are described, as well as the service primitives each uses. Finally, the relationship between services and protocols is explained.
This document outlines a project to improve security and efficiency in mobile computing networks. It discusses issues like limited physical security of wireless networks and constrained bandwidth. The project will use mobile agents to distribute tasks across nodes, reducing unnecessary data transmission loads. Mobile agents can migrate between nodes as needed to complete tasks, without requiring constant client connection. This helps prevent increased workloads from network expansion. The document also lists benefits like increased productivity and flexibility from mobile computing. It proposes a key management and access control method for mobile agents to enhance security and performance efficiency.
This document discusses the challenges facing next-generation networks. It describes how current networks are struggling to handle the exponential growth in data usage and number of users. Next-generation networks aim to address this by improving network capabilities. However, developing these advanced networks presents challenges such as maintaining energy efficiency, addressing environmental impacts, and dealing with security and software issues. Specific challenges mentioned include utilizing spectrum efficiently using technologies like cognitive radio, reducing carbon emissions, and handling problems associated with software-defined networking.
This document presents information on 4G wireless networks, including their opportunities and challenges. It discusses how 4G networks are designed to improve wireless capabilities and network speeds over 3G. Some key opportunities mentioned include enhanced multimedia services, data transfer rates of 100 Mbps for mobile users and 1 Gbps for fixed users. However, 4G networks also face challenges such as ensuring security and privacy with increased data transmission, maintaining high quality of service, developing a complex network architecture, and enabling multi-mode devices that can access different networks.
Performance Evaluation Of A Wimax TestbedAlison Reed
This article analyzes SDN traffic engineering focusing on four key areas: flow management, fault tolerance, topology updates, and traffic analysis. It discusses challenges in SDN traffic engineering solutions and research efforts to address these challenges. For flow management, it discusses load balancing schemes for the control and data planes. For fault tolerance, it covers failure recovery mechanisms in the data plane like restoration and protection. It also discusses topology update strategies in SDN.
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The common challenges of mobile internet for up coming generationeSAT Journals
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
It a a complete ppt explaining the basics of computer networking. It Includes topics like :
1. Types of Network
2. Protocols
3. Threats to network
4. Security of Network
etc
The document describes a proposed Wi-Fi calling system called Wi-Call that allows voice and data communication between Wi-Fi enabled devices on a local area network (LAN) without using an internet or cellular connection. It works by converting voice signals to IP packets and transmitting them over the LAN. The system uses a web application to register users and map their IP addresses so calls can be routed properly within the dynamic IP environment of a LAN. It aims to reduce communication costs for organizations by providing free calling and data transmission within the LAN.
Wireless Communication Systems Are Developing Rapidly EssayApril Dillard
Wireless communication technologies are developing rapidly to meet increasing demands. Vehicular ad-hoc networks (VANETs) are a type of mobile ad-hoc network used for vehicle communication. Conventional routing protocols are not suitable for most VANET applications due to factors like high vehicle speed and mobility constraints. This document discusses existing VANET broadcasting protocols and their advantages and disadvantages. It focuses on protocols like Traffic View and AMB (Adhoc Multicast Protocol) that aim to minimize bandwidth usage and disseminate road traffic information.
The document discusses developing an automated toll collection system using near-field communication (NFC) technology to allow drivers to pay tolls using their NFC-enabled smartphones. It describes the existing manual toll collection system and proposes a new system where drivers can pay tolls automatically by waving their phone at the toll booth. The system would also log all transactions and track vehicles that do not pay their tolls.
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
Mobile Adhoc Network (MANET) is network of a no. of mobile routers and associated hosts, organized in a random
fashion via wireless link. MANET has been widely used for not only military purposes but for search-and- rescue operations,
intelligent transportation system, data collection, virtual classrooms and ubiquitous computing. There are various Issues in MANET
like Routing, MAC Layer issues, Transport protocol, QoS, Data Mgt. And Security etc. from them Service Discovery is one of the
most important issues in MANET. Service discovery technologies are exploited to enable services to advertise their existence in a
dynamic way, and can be discovered, configured and used by other devices with a minimum of manual efforts. Most of the service
discovery protocols such as DEAPspace, UPnP, Konark, Salutation, Jini, and SLP. These protocols don’t provide an appropriate route
from consumer to service provider. Hence after services are discovered, a route request needs to be initiated in order to access the
service. In this paper proposing an efficient, robust and flexible approach to service discovery for MANET that not only discovers a
service provider, but at the same time, it also provides a route to access the service.
This document provides an overview of a course on routers and routing basics. The course introduces networking concepts and protocols, and teaches how to configure routers and switches. It is a 3-credit course offered online or offline that aims to help students learn about IP addressing, routing, and basic router and switch configuration.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
Automatic Detection of Stronger Wi-Fi NetworksIRJET Journal
This document proposes a system to automatically detect and connect to the strongest available Wi-Fi network with minimal user intervention. Currently, devices can only connect to one Wi-Fi network at a time, requiring users to manually check each available network's signal strength. The proposed system uses virtualization to create two virtual network interfaces on a single physical network card. One interface would remain connected to the current network while the other iterates through nearby networks, checking their signal strengths. If a stronger network is detected, the system would automatically switch the primary connection and resume any paused downloads or processes. This allows devices to continuously monitor for and connect to the best local Wi-Fi network without needing user involvement.
Similar to The key providing system for wireless (20)
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
DOI : 10.5121/ijasuc.2014.5302 13
THE KEY PROVIDING SYSTEM FOR WIRELESS
LAN USING VISIBLE LIGHT COMMUNICATION
Kuniyoshi Okuda1
, Takuya Yamamoto2
, Tomoo Nakamura1
and Wataru Uemura1
1
Department of Electronics Informatics, Ryukoku University, Shiga, Japan
2
Graduate School for Creative Cities, Osaka City University, Osaka, Japan
ABSTRACT
Public wireless LAN services have been increasing recently. These are convenient services for carrier
companies particularly. And carrier companies and the user can disperse traffic. However in order to
improve the convenience, the services do not often use the encryption key or do not change the encryption
key that has already been set. Therefore, the services have a problem in safety. This paper solves this
problem using the visible light communication.
The visible light communication sends a signal by blinking the light. One of the visible light communication
features is that we can see the transmission area. The visible light communication can use lighting
equipments as the transmitter unlike infrared or conventional radio communications. Further, visible light
communication can separate to clarify the transmission range by using light.
We propose the distribution of the encryption key and the SSID using visible light communication. Visible
light communication can easily prepare a small network, such as a partition or per a room basis. For
malicious users connecting to the network is necessary to enter in the service provided area. Thus the
administrator is able to easily manage legitimate users. In addition, it is possible to update the SSID and
the encryption key by visible light communication easily for an administrator. Thus if malicious users get
the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal
users may only need to run the shell script for receiving information from the receiver. Therefore,
convenience is good.
In order to confirm the improved convenience, we measured the time it takes for a user to connect to the
network. Conventional methods are methods that use or do not use the encryption key. As a result, users
can connect to the network in a short time compared with the conventional methods. The system becomes
stronger than conventional methods because it is possible to update the encryption key and SSID
automatically in the security aspect.
KEYWORDS
Wireless LAN, SSID, encryption key, visible light communication
1. INTRODUCTION
Recently, a network environment has become familiar. Now we can connect to the network
anywhere. Such a condition is called ubiquitous. The ubiquitous means interface, environment,
and technology. It may benefit at any time anyone everywhere. And a ubiquitous mobile
communication is especially important. The traffic is increasing all the time. Carrier companies
have strengthened the network to support the traffic. However it is not enough. So the wireless
LAN has drawn attention. Wireless LAN is a communication system for a small area. Wireless
LAN does not require a line. The user can connect to the network by simply setting the terminal.
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
14
Communication speed of wireless LAN is faster than the line of mobile phones. It is supported by
a wired communication. And the communication speed becomes faster year by year. Effective
speed of the current is approximately 1Gbps or more. Communication speed is reduced by the
user increases. However, it is much faster as compared to the line of mobile phones. Therefore we
can expect high-speed communication in a specific area in the wireless LAN. Therefore carrier
companies have supported the traffic by providing wireless LAN services. This service can be
enjoyed by people who are only contracted with the carrier company basically. And rather than
covering a wide range in a single access point, it is better to cover the specific range of the access
point some better network efficiency [1]. Recently a public wireless LAN service becomes also
popular (Figure 1). The services are provided at the place where many people gather. These are
airports, restaurants and stations. The public wireless LAN service is an important service to
foreigners, because communication of complicated content is the burden for foreigners. In
addition, in some cases network of career companies are not required when the stay is short like
transit. The public wireless LAN service is particularly effective in such case. There is a fee or
free in the public wireless LAN services. This paper focuses on the free wireless LAN service that
anyone can use.
Figure 1: public wireless LAN services
2. PROBLEM OF WIRELESS LAN SERVICES
Some methods are required in order to connect the wireless LAN service. They depend on the
method of service. We describe three procedures.
The first method is the method that does not use the encryption key. It can be connected by
anyone. The procedure of the connection is easy. Users can connect the network by selecting a
SSID (Service Set Identifier).
The second method is the first method with some options. The options require a license
agreement or show them advertising for users. The service requires the same procedure again
after a certain interval time. Convenience of these services is the better than other methods.
However these methods have some problems. Malicious users can easily access to public wireless
LAN, because anyone can connect to the wireless LAN. In addition, this system does not use an
encryption method. Therefore persons who have some techniques can see another person's
communication contents.
The third method is the methods that an administrator gives both the SSID and the encryption key
to users. The SSID and the encryption key are told in the poster for bulletin board. The user can
connect to the network using them. This method is often used at the hotel. The SSID and the
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
15
encryption key are posted in the private room and lobby. Convenience of this method is worse
than the first method, however security is better. This method essentially does not change the
SSID and the encryption key. If malicious users know the SSID and the encryption key even
once, they can connect to the network easily.
In addition to these methods there is an option that requires a users' authentication. It is necessary
to pre-register for users. Users select the SSID to connect to the network. Then, they are guided to
the top page through the browser. And they will enter a username and a password. The
convenience is bad and the security is good, and to connect the network is difficult for malicious
users. However, if the administrator does not use an encryption key, there is a possibility that the
communication contents are analyzed.
In addition to users authentication, to change the encryption key frequently is effective for
malicious users. Changing the encryption key is not performed basically in the public wireless
LAN service, because the convenience is reduced. However, using network and analysis of
communication content for malicious users is difficult by changing the encryption key frequently.
We show the relationship between the convenience and the encryption key and the security in
Table 1.
Table 1. The relationship between convenience and encryption key and security
Convenience Security
Without encryption key Good Bad
With checking the license
agreement or showed ads
Good Bad
With encryption key Bad Good
In the conventional method, the second method uses the encryption key. By the second method to
change the encryption key frequently, it is possible to achieve both security and convenience. In
this case, the burden of administrators and users must not be small when changing the encryption
key. In addition if the area of transmitted encryption key is minimum, the availability of the
encryption key is difficult to malicious users, because the administrator can easily monitor user.
Therefore, to deliver a new encryption key periodically in limiting the service providing area is
required. There are methods using radio waves, infrared and visible light communication [2-4]
(shown in Figure 2) in the information delivery. The communication area of infrared and radio
waves is unclear, because we cannot see the infrared and radio waves. That is, it is impossible for
the administrator to understand the transmission range of the encryption key. It is a benefit to a
malicious user. Therefore, with the use of a visible light communication, it is possible to lower
the potential to provide an encryption key to the malicious user. Visible light communication
transmits a signal by blinking the visible light. Characteristic of visible light communication is to
look for human eyes. The communication range is illuminated by the transmitter. The
administrator is able to recognize the transmission range easily. Further, the visible light
communication can use the lighting equipment as a transmitter. Recently the lighting equipment
using LEDs has been increasing. A response speed of LEDs is faster than that of the conventional
illumination as incandescent lamps or fluorescent lamps. When the encryption key is delivered by
the visible light communication by the lighting equipment, users in lighting area may be able to
enjoy the service. If this system can send the encryption key, sending SSID is easily. The
selection of SSID is the procedure for connecting to the network.
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
16
Figure 2: Visible light communication
3. THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE
LIGHT COMMUNICATION
We propose the distribution system of the SSID and the encryption key using visible light
communication. We show the system overview in Figure 3. The proposed system uses the
lighting equipment as a transmitter. In order to use the illumination device as the transmitter, the
brightness should be constant. Therefore, the proposed system uses the PPM (pulse position
modulation) [5-6].
At first the router transmits the SSID and the encryption key to the lighting equipment. The
transmitter distributes the SSID and the encryption key by visible light communication [7].
Therefore users only in the lighting area can get the signal using a receiver of visible light
communication. The receiver gets the signal by the visible light communication and decodes the
signal. In this way users can know the SSID and the encryption key. And the router changes the
SSID and encryption key on a regular basis. In that case, the proposed system repeats from the
first step.
Traditional public wireless LAN services do not use the encryption key, or they continue to use
the encryption key determined once more. Because changing the encryption key is the burden for
the administrator and users. The proposed system can change the encryption key easily, because
the proposed system can change the encryption key without the burden of the administrator and
users. In addition, it is easy for us to set an SSID to each room, because we can block the visible
light communication by providing a partition or a wall easily. The proposed system by preparing
a plurality of small-scale network is expected to be high-speed communication. The proposed
system can be expected to improve convenience and security. And the proposed method can make
multiple small network.
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
17
Figure 3: Overview of proposed system
4. EXPERIMENT
We show whether the proposed system can provide and change the encryption key without the
burden for the administrator and users. We compare the time it takes to connect the network of
proposed method and the two methods in the conventional methods. The first method in the
conventional method is the type that does not use the encryption key. The second method in the
conventional method is the type that uses the encryption key. Last method is our proposed
method. We use fabricated the transmitter and the receiver in the experiment (Figure 4, 5). We
make a shell script that receives the SSID and the encryption key from the receiver. The subjects
are 5 men who are 20 years old are accustomed to the operation of the smart phone and computer.
Figure 4: Visible light transmitter
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
18
Figure 5: Visible light receiver
Figure 6: Experimental result
We show the experimental results in Figure 6. The vertical axis represents the time it took to
connect the network. The method of shortest time to connect the network was our proposed
method. Time of the method of longest time to connect the network was the method of using the
encryption key. Because this is the labor required for the connection's associated with time. At the
proposed method the computer get the SSID and the encryption key using the shell script from
the receiver connected by USB. The effort of the users is only to connect the receiver and run the
shell script. Time of users touching the keyboard is short. Therefore the time that takes for the
connection is short. Users need only to select the SSID in the method that does not use an
encryption key. However it is necessary to launch a network manager and select the SSID. In
addition to it, the method that uses the encryption key requires the input of the encryption key.
Thus, if time to touch the keyboard is short, we can reduce the time to require for connection.
In addition, the proposed method changes the SSID and the encryption key automatically. We
switched the SSID and the encryption key every 60 seconds in this experiment. WPA2 which is
one of the encryption methods encrypt the information by using the SSID and the encryption key.
If the encryption key and SSID are immutable, WPA2 was weak for attack to prepare a dictionary
in advance. However for changing the SSID and the encryption, the proposed system is strong for
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
19
such attacks. By using the proposed system and the conventional encryption, we can construct a
secure and convenient network.
5. CONCLUSION
We proposed the distribution of encryption key and SSID using visible light communication. The
public wireless LAN service has been increasing recently. It is a convenient service for short stay
travelers particularly. However in order to improve the convenience, the services do not often use
the encryption key or do not change the encryption key that has already been set. Therefore, the
service has a problem in safety. We solve the problem using the visible light communication.
The visible light communication sends the signal by blinking the light. The visible light commu-
nication sends the signal by blinking the light. The visible light communication can use lighting
equipments as the transmitter unlike infrared or radio communications conventional. Further,
visible light communication can separate to clarify the transmission range by using light.
We proposed the distribution of encryption key and SSID using visible light communication.
Visible light communication can easily prepare a small network, such as the partition or per room
basis. For malicious users to connect the network is necessary to enter in the service provider area.
Thus the administrator is able to easily manage users. In addition, it is possible to update the
SSID and the encryption key by visible light communication easily for the proposed system. Thus
if malicious users get the SSID and the encryption key, they cannot use the SSID and the
encryption key immediately. Normal users may only need to run the shell script. Therefore,
convenience is a good.
We fabricated the transmitter and the receiver in the experiment. In order to confirm the improved
convenience, we measured the time it takes for a user to connect to the network. Comparison
methods are methods that use or do not use the encryption key. As a result, users can to connect
to the network in a short time compared with the conventional method. The system became very
strong because it is possible to update the encryption key and SSID automatically in the security
aspect.
REFERENCES
[1] Mostafa Azami, “Increasing the Network life Time by Simulated Annealing Algorithm in WSN with
Point ", IJASUC Vol.4, No.2, 2013.
[2] S. Haruyama,"Visible light communication", Journal of IEICE, 94(12), D, pp. 1055-1059, 2011.
[3] Rajan Sagotra, "Visible Light Communication", International Journal of Computer Trends and
Technology (IJCTT) volume4 Issue4, pp. 906-910, 2013.
[4] Dominic C. O'Brien, "Visible Light Communications: challenges and possibilities", PIMRC 2008.
IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.15-
18, 2008.
[5] T. Saito, "A Study for flicker on Visible Light Communication", Technical Report of IEICE CS, vol.
106, No. 450, pp. 31-35, 2007.
[6] I. Shouichi, "Reduction of Flicker by Coding and Modulation for Visible-Light Communication"
Technical Report of IEICE OCS, vol. 108, No. 39, pp. 1-4, 2008.
[7]Xin Lin, "Development of Visible-Light Wireless LAN Accesspoint with Illumination Fuction" IEICE
Technical Report 109(245), pp.63-68, 2009.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
20
AUTHORS
Kuniyoshi Okuda (b.1986) is a student of Ryukoku University in Japan. After studying
Electronics and Informatics at Ryukoku University, he completed his Master of
Engineering at Osaka City University. Now he is a doctor course student at Ryukoku
University.
Takuya Yamamoto received B.E, M.E. and D.E. degrees from Ryukoku University
and Osaka City University, in 2010 and 2012, respectively.
Tomoo Nakamura was born in 1948, and received B.E, M.E. and D.E. degrees from
Kyoto University, in 1970, 1972, and 1988. He is a professor of Ryukoku University in
Shiga, Japan.
Wataru Uemura was born in 1977, and received B.E, M.E. and D.E. degrees
from Osaka City University, in 2000, 2002, and 2005. He is an associate
professor of the Department of Electronics and Informatics, Faculty of
Engineering Science, Ryukoku University in Shiga, Japan. He is a member of
IEEE, RoboCup and others.