RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

        Jian Shen,Haowen Tan,모상만,정일용,Qi Liu,Xingming Sun 한국통신학회 2015 Journal of communications and networks Vol.17 No.5

        Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients’ health. In BANs, the data of a patient’s vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

      • SCIESCOPUSKCI등재

        Flux Sliding-mode Observer Design for Sensorless Control of Dual Three-phase Interior Permanent Magnet Synchronous Motor

        Shen, Jian-Qing,Yuan, Lei,Chen, Ming-Liang,Xie, Zhen The Korean Institute of Electrical Engineers 2014 Journal of Electrical Engineering & Technology Vol.9 No.5

        A novel equivalent flux sliding-mode observer (SMO) is proposed for dual three-phase interior permanent magnet synchronous motor (DT-IPMSM) drive system in this paper. The DT-IPMSM has two sets of Y-connected stator three-phase windings spatially shifted by 30 electrical degrees. In this method, the sensorless drive system employs a flux SMO with soft phase-locked loop method for rotor speed and position estimation, not only are low-pass filter and phase compensation module eliminated, but also estimation accuracy is improved. Meanwhile, to get the regulator parameters of current control, the inner current loop is realized using a decoupling and diagonal internal model control algorithm. Experiment results of 2MW-level DT-IPMSM drives system show that the proposed method has good dynamic and static performances.

      • Routing Protocols in Delay Tolerant Networks

        Jian Shen,Sangman Moh,Ilyong Chung 대한전자공학회 2008 ITC-CSCC :International Technical Conference on Ci Vol.2008 No.7

        Delay Tolerant Networks (DTNs) are a class of emerging networks that experience frequent and longduration partitions. Compared with the conventional networks, the distinguished feature is that there is no endto-end connectivity between source and destination. The network topology may change dynamically and randomly, and the non-existence of an end-to-end path poses a number of challenges in routing in DTNs. In this paper, we survey the state-of-the-art routing protocols and give a comparison of them with respect to the important challenging issues in DTNs. The routing protocols are classified into two categories based on which property is used to find the destination: flooding families and forwarding families. The pros and cons as well as performance are disccused and compared for the routing protocols.

      • Location Based Routing Protocol for Delay Tolerant Networks

        Jian Shen,Sangman Moh,Ilyong Chung 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.1

        Delay Tolerant Networks (DTNs) are a class of emerging networks that experience frequent and long-duration partitions. In this paper, we present a location based routing protocol (LPR) for DTNs, which utilizes the location of nodes to deliver a message from source to destination. A node can get the location by receiving beacon packets periodically from anchor nodes and referring to received signal strength indicator (RSSI) for the beacon. This new routing protocol employs a scheme named transmission scheme, which take advantages of the nodes' information of the location to transmit the message and store the message into buffer space, respectively.

      • Enhanced Key Management Protocol in Body Area Networks

        Jian Shen,Sangman Moh,Ilyong Chung 한국멀티미디어학회 2010 한국멀티미디어학회 학술발표논문집 Vol.2010 No.2

        Body Area Networks (BANs) have emerged as an enabling technique for e-healthcare systems, in which the data of a patient’ vital body parameters and movements can be collected by small wearable or implantable sensors and communicated using short-range wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, adversaries can launch various attacks on the e-healthcare systems. The security and privacy issues of BANs are getting more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced key management protocol based on elliptic curve cryptography (ECC) and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented into the power and resource constrained sensor nodes in BANs. From the comparison results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with the previous protocols. We believe that our protocol is attractive to the applications of BANs.

      • A Comparative Survey on Routing Protocols Using Directional Antennas in Ad Hoc Networks

        Jian Shen,Dongmin Choi,Sangman Moh,Ilyong Chung 한국멀티미디어학회 2010 한국멀티미디어학회 학술발표논문집 Vol.2010 No.1

        Directional antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. Omni-directional nature of transmission restricts the network capacity, where distribution of energy in all directions other than the intended direction of the destination node not only generated unnecessary interference to other neighboring nodes but also decreases the potential range of transmission. Directional antenna systems are increasingly being recognized as a powerful way of increasing the capacity, connectivity, and covertness of MANETs. In this paper, we survey the state-of-the-art routing protocols and give a comparison result of them with respect to the important challenging issues. We study the advantages and disadvantages of the routing protocols using directional antenna and also highlight performance issues of each routing technique. At the end, an explicit comparison table is presented and discussed.

      • Buffer Scheme Optimization of Epidemic Routing in Delay Tolerant Networks

        Jian Shen,Ilyong Chung 한국멀티미디어학회 2010 한국멀티미디어학회 학술발표논문집 Vol.2010 No.1

        Delay Tolerant Networks (DTNs) are a class of emerging networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. In DTNs, epidemic routing is a well-known routing protocol, which utilizes the FIFO buffer management scheme to manage the queuing. However, epidemic routing is very sensitive to the buffer size and can only achieve good performance with respect to infinite buffer size. In epidemic routing, a node with infinite buffer size has enough space to store lots of messages such that it can carry these messages along for long periods of times until appropriate forwarding opportunities arise. Once there is not enough buffer size, then the performance of epidemic routing will fall down hastily. In this paper, an optimization of buffer scheme in epidemic routing is proposed based on the Lagrangian and dual problem models, which are the most effective and powerful methods in optimization design.

      • A Comparison of Routing Protocols in Delay Tolerant Networks

        Jian Shen,Miyoung Cho,Sangman Moh,Ilyong Chung 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1

        In this paper, we study lots of routing protocols in delay tolerant networks (DTNs). After understanding the properties of DTNs, we give a brief comparative research of these state-of-the-art routing protocols with respect to the important challenge issues in DTNs. Meanwhile some explicit comparison tables are presented in the end of this paper.

      • Routing Protocols in Underwater Sensor Networks : A Comparative Survey

        Jian Shen,Sangman Moh,Ilyong Chung 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.2

        Underwater sensor networks (UWSNs) are a class of emerging networks that experience variable and high propagation delays and limited available bandwidth. There are comprehensive applications in this area which are envisioned to enable applications for oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications. Hence, UWSNs has great potential and contains enormous values in economic and social field. Because of the different environment under the ocean, obviously, the whole protocol stack should be re-designed to fit for the surroundings. In this paper, however, we only focus on the routing protocols in the network layer. We survey the state-of-the-art routing protocols and give a comparison of them with respect to the important challenging issues in UWSNs. The routing protocols are classified into three categories: proactive, reactive and geographical routing protocols. The pros and cons as well as performance are discussed and compared for the routing protocols. Especially, we give a comparison study about the localization schemes in geographic routing protocols.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼