The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advancements in mobile sensors and health-care technologies, mobile health (mHealth) services are growing in demand. However, the deployment of mHealth's applications in rural and underdeveloped areas remains a major challenge, despite the investments made, largely due to unreliable communication infrastructures. In this paper, we propose delivering mHealth data in a highly disruptive wireless...
In mobile Cognitive Radio Networks (CRNs), the frequent link breakage and wireless interference urged the need for novel stable routing solutions. In this paper, we propose STAR, a stable routing protocol that aims at selecting interference-free and durable paths. We investigate the particular Hidden interfering Primary User (HIPU) problem caused by the un-detectable presence of the primary user in...
Due to the exponential advancements in mobile and IoT device capabilities, we are currently witnessing a resurrection in the domains of ubiquitous and pervasive systems. These systems and devices heavily rely on efficient wireless communication as an enabler of single and multi-hop wireless data transfers. Awareness of the practical performance capabilities and limitations of existing wireless technologies...
We present an empirical study for device-to-device single hop wireless communication. We perform realistic indoor and outdoor measurements of WiFi and Bluetooth communication between representative mobile and IoT devices. This measurement paper aims at answering multiple questions: What are the methods and the limitations in D2D wireless communications for multiple IoT devices? What is the impact...
The proliferation of mobile health (mHealth) technologies in rural and disconnected areas has enabled novel communication challenges. These challenges exist due to the underdeveloped Internet infrastructure, wireless intermittent connectivity, and the large data generated by such applications that often overwhelms the weak infrastructure. In this paper, we investigate data delivery in such overloaded...
Edge Computing, as a solution to leveraging computation capabilities at the edge of the network, is emerging. One key challenge for edge computing is offering its computing service with a low service blocking and low latency that otherwise translate to an inefficient deployment of a Edge computing system. Unlike cloud computing, the computing resources in edge computing are limited. One way to deal...
While smart devices are increasing in numbers, compute resources, and communication capabilities, current application requirements are often outpacing such hardware improvement. Recently, offloading computation to remote cloud resources or closely located computing resources, such as cloudlets or other mobile and IoT devices have been proposed. In this paper, we propose “Cumulus”, an open source platform...
Following the explosion of Internet-enabled mobile devices and mobile services, users tend to expect network connectivity everywhere they go and at any time. In anticipation of these higher connectivity expectations and requirements especially for vehicular communication, several technologies like WiMAX, cellular networks (i.e., 3G/4G) and wireless mesh networks have been developed. While cellular...
The pervasiveness of small mobile devices equipped with multiple wireless interfaces enabled novel communication paradigms: opportunistic data transfer between the mobile devices. In this paper, we consider the heterogeneity in forwarding mechanisms as one of the major reasons which affects the performance of forwarding algorithms. Heterogeneity arises in different contexts, for example in device...
The evolution of mobile devices into highly capable computing platforms that sense, store, and execute complex tasks is making them attractive candidates for edge computational micro-cloud settings. Such solutions are creating novel security challenges due to the increased push for more seamless computational cyber-foraging that leverages the exploding proliferation of mobile devices. A major concern...
While WiFi-based indoor localization services are on the rise, existing solutions require periodic updates and therefore exhibit high power demand. In this paper, we propose a novel Social Aware Cluster Based Localization algorithm (SAC-Loc) that leverages social information between nodes in order to dynamically cluster those that exhibit similar mobility patterns. SAC-Loc deploys socially-aware algorithms...
With the advent of wearable computing and the resulting growth in mobile application market, we investigate mobile opportunistic cloud computing where mobile devices leverage nearby computational resources in order to save execution time and consumed energy. Our goal is to enable generic computation offloading to heterogeneous devices forming a mobile-to-mobile opportunistic computing platform. In...
Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile network...
With the advent of wearable computing and the resulting growth in mobile application market, we investigate mobile opportunistic cloud computing where mobile devices leverage nearby computational resources in order to save execution time and consumed energy. Our goal is to enable generic computation offloading to heterogeneous devices that include Cloud, mobile devices, and cloudlets. We propose a...
It is common practice for mobile devices to offload computationally heavy tasks off to a cloud, which has greater computational resources. In this paper, we consider an environment in which computational offloading is made among collaborative mobile devices.We call such an environment a mobile device cloud (MDC). We highlight the gain in computation time and energy consumption that can be achieved...
Mobile Device Clouds are becoming a reality with the quantitative and qualitative upgrades on mobile devices such as smart-phones and tablets. This proliferation renders mobile devices capable of initiating sophisticated cyberattacks especially when they coordinate together and form a distributed mobile botnets which we call “MobiBots”. MobiBots infect a large number of mobile devices and schedule...
Many mobile applications overcome their device limitations in computational, energy, or data resources by offloading computations to the cloud. In this paper, we consider environments in which computational offloading occurs amongst a set of mobile devices. We call such an environment a mobile device cloud (MDC). In this work, we first highlight the gain in computation time and energy consumption...
Despite the plethora of opportunistic forwarding solutions offered by the research community, we revisit this domain from a new perspective by exploiting the concept of space syntax to enable deployable solutions in large scale urban environments. We present a set of algorithms that build upon space syntax, which predicts natural movement patterns by interacting with pre-built static environments...
With the ubiquity of WiFi-enabled smartphones, and large-scale access point deployment, WiFi-based localization is one of the most promising indoor localization systems. Existing WiFi localization solutions, however, exhibit high power demand due to the periodic updates required, which raises the barrier for deployment on mobile devices since battery life is a crucial resource. In this paper, we present...
The fundamental challenge in opportunistic networking, regardless of the application, is when and how to forward a message. Rank-based forwarding techniques currently represent one of the most promising methods for addressing this message forwarding challenge. While these techniques have demonstrated great efficiency in performance, they do not address the rising concern of fairness amongst various...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.