The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most password-authenticated key agreement protocols have focused on authenticated key agreement using shared password between a client and a server. With the emergence of a variety of communication environments such as EPC global network, it is necessary to construct a secure channel between clients. Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocol can provide...
The Multiple Care-of Addresses Registration mechanism was designed for a single Mobile IPv6 node, but when this mechanism is used on nested Network Mobility, the Mobile Routers do not know how many paths are available and how to control the path of a packet, and the Mobile Router cannot get the upper layer Mobile Network's link failure information to adjust the routing. The "Path ID" mechanism...
Route optimization for nested Mobile Network is an important issue of Network Mobility (NEMO), and prefix delegation is one of the promising optimization schemes. However, the policy of prefix delegation is seldom discussed when this technology is applied in nested NEMO. The problems that may be encountered when applying the basic prefix delegation to nested NEMO are analyzed and identified, and a...
This paper discusses collaborative MIMO techniques among nearby base stations, relay stations and user equipments. It is vital to optimize performance and choose collaborative nodes due to unnecessary collision and cost while unlimited abusing of neighbors. After proving the usage possibility of helping node under certain situation, a node choosing protocol model on UE-UE collaborative scenario was...
Based on the wireless data transmission technologies, the vehicle-mounted wireless transmission terminal is able to provide reliable, up-to-date and accurate transport information for the moving vehicle, which contributes towards efficient road use, better traffic flow and greater road safety. The design of this vehicle-mounted wireless transmission terminal is based on ARM embedded technology and...
Wireless video sensor networks (WVSN) can retrieve video/images from environment of interest, which can greatly enhance our knowledge of the physical world and pave the way for new applications. Since video signal is sensitive to temporal differences between sensor nodes and sink nodes, time synchronization is a critical service for WVSN. However, the existing wireless sensor network (WSN) time synchronization...
In the area of mobile communication security, a key agreement protocol with mutual authentication is very essential to the following secure sessions between communicators and more attentions are paid to the provability of the protocol security. Based on Blake-Wilson's work, the new notions of secure AK and AKC protocols are defined. An efficient authenticated key agreement protocol for mobile communication...
The development of low-cost image/video sensors has enabled wireless multimedia sensor networks (WMSN). Equipped with the ability to collect images/video streams from surrounding environments, many interesting applications will emerge through the use of WMSN. One of the key targets of a WMSN application is reconstructing the Plenoptic function by using collected images. However, due to the characteristics...
Recent advances in image sensing hardware have enabled the development of wireless image sensor networks. Similar to generic wireless sensor networks that collect information from surrounding physical environments as scalar variables, wireless image sensor networks can collect data to generate descriptions of interested targets as images or video streams that, in turn, enhance the userpsilas understanding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.