Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Győző Gódor is active.

Publication


Featured researches published by Győző Gódor.


wireless communications, networking and information security | 2010

Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations

Győző Gódor; Norbert Giczi; Sándor Imre

RFID technology can be found in the most fields of our daily life, e.g. personal identification, supply-chain management, access control etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too. In order to measure the performance characteristics of our proposed ECC based authentication protocol and to make a comparison with others we implemented these algorithms in OMNeT++.


Computer Networks | 2015

A survey of handover management in LTE-based multi-tier femtocell networks

Győző Gódor; Zoltán Jakó; Ádám Knapp; Sándor Imre

Ubiquitous mobile communication requires increased capacity and appropriate quality guarantee for services. To meet these demands next-generation mobile network operators will deploy small cells next to conventional base station structure intensively to enhance capacity and service coverage for customers. Implementation of seamless handover between first tier (macrocell layer) and second tier (small cells) is one of the key challenges to fulfill the QoS requirements. In this paper we introduce the reader to the details of the handover procedure: information gathering, decision strategies and the base station exchange process. All these three phases face difficulties in multi-tier networks. High dense femtocell deployment makes handover related information gathering very hard, efficient handover decision mechanisms are vital to reduce the number of unnecessary handovers and avoid ping-pong effect. Last but not least base station exchange has to be accelerated to achieve appropriate system performance. Next a comprehensive survey of state of the art handover optimization solutions in 3GPP LTE/LTE-A Home eNodeB handover management is presented which includes the actual version of 3GPP LTE/LTE-A HeNB handover procedure.


international conference on rfid | 2011

Elliptic curve cryptography based authentication protocol for low-cost RFID tags

Győző Gódor; Sándor Imre

In these days the RFID technology is used widespread. This technology can be found in the utmost fields of our daily life, e.g. supply-chain management, libraries, access management etc. Since the first RFID Tags possessed very small computational capacity only mathematical and logical operations and one-way hash functions could be used. However, in the last years RFID technology achieved that CPU speed on which PKI systems can be run. In this paper we present our elliptic curve cryptography based authentication protocol which proofs against the well-known attacks. Furthermore, we introduce a performance analysis and a comparison with other EC based protocols. By examining the simulation results we prove that our protocol has better performance characteristics than others or at least equals them.


Meeting of the European Network of Universities and Companies in Information and Communication Engineering | 2012

Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems

Győző Gódor; Sándor Imre

In the last decade RFID technology has become widespread. It can be found in various fields of our daily life. Due to the rapid development more and more security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. However, the earlier suggested algorithms do not satisfy all of the security requirements.


international conference on software, telecommunications and computer networks | 2014

The effect of a new hybrid decision handover algorithm on QoS in two-tier LTE-A network

Ádám Knapp; Győző Gódor

New sophisticated solutions are required in next generation networks to provide appropriate quality of service for users. The introduction of small cells in Long Term Evolution (LTE) raises numerous problems along with undoubted advantages to the engineers and researchers. In this paper a new handover decision algorithm is described for two-tier macrocell-small cell LTE-Advanced (LTE-A) using network map, i.e. positioning service and additional network provided information. The proposed algorithm processes information on the reported RSSI, the speed of users and the actual load of cells extended with a sliding averaging window on RSSI. Simulation results focus on QoS parameters and show that the new decision procedure ensures higher system throughput and lower delay than the legacy, strongest cell algorithm in most scenarios.


Meeting of the European Network of Universities and Companies in Information and Communication Engineering | 2012

Investigation of WLAN Access Point Placement for Indoor Positioning

Árpád Huszák; Győző Gódor; Károly Farkas

Wireless indoor positioning has been a popular research topic for years because it provides the basis for a broad domain of location-based applications. Especially the usage of WLAN (Wireless Local Area Network) technology is widespread to build an indoor positioning system due to the reuse of existing and almost ubiquitous WLAN infrastructure worldwide lowering the costs. However, these WLAN systems were not originally designed for positioning services, thus the provided accuracy might be low. The accuracy can be increased by the careful placement of WLAN access points to cover the given area appropriately. In this paper, we propose a method based on simulated annealing to find the optimal number and placement of WLAN access points for indoor positioning and show its investigation using simulations.


Informatics & IT Today | 2013

Optimization of Wi-Fi Access Point Placement for Indoor Localization

Károly Farkas; Árpád Huszák; Győző Gódor


Archive | 2013

Intelligent Indoor Parking

Győző Gódor; Árpád Huszák; Károly Farkas


Archive | 2013

On the Placement of Wi-Fi Access Points for Indoor Localization

Árpád Huszák; Győző Gódor; Károly Farkas


Archive | 2015

Security Aspects in Radio Frequency Identification Networks

Győző Gódor; Sándor Imre

Collaboration


Dive into the Győző Gódor's collaboration.

Top Co-Authors

Avatar

Sándor Imre

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Károly Farkas

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Árpád Huszák

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Ádám Knapp

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Norbert Giczi

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Zoltán Faigl

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Zoltán Jakó

Budapest University of Technology and Economics

View shared research outputs
Researchain Logo
Decentralizing Knowledge