The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a Kalman-filter-based method, to track the direction-of-arrival (DOA) of a moving target using antenna array in mobile communications. There are two major new features about the proposed scheme. Firstly, traditional Kalman filter needs measurement transformed. However, it is difficult and costly to be obtained. And our method could work without this message. Secondly, the traditional...
In order to quickly generate secret key in low-power held-hand devices, Modadugu et al. propose two server-aided RSA key generation protocol, along with Chen et al. sequentially propose four improved protocol. However, one drawback of these protocols is they can??t resist collusion attack. In this paper, we implement a new server-aided RSA key generation protocol, which can resist collusion attack...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
A dynamic policy based network management scheme is presented for the problem that traditional policies can??t preferably adapt to change of network state. It defined dynamic policy form and appended new module PMA to IETF policy frame to improves the adaptability of policie. Then the application of dynamic policy to allocate resource is presented. By experiment and analysis, it is shown that this...
The terminal design of a data acquisition system based on GPRS is designed in this paper. It works out the hardware design of GPRS terminal equipment, including the minimum system design based on the Samsung ARM7-core microcontroller S3C44B0X, and the hardware design adding the GPRS engine MC35i produced by Siemens and RS485 interface to the minimum system. According to dial-up procedure, describes...
Protecting data of free-roaming mobile agents has drawn much attention in recent years. But no perfect solution has ever been proposed. Many of the solutions are vulnerable by colluded truncation attacks. In this study we analyze available methods, and design a novel protocol by cooperation between two kinds of agents -Task Agent and ACK Agent. Task Agent moves freely in the net to complete some task...
Concept lattice was creatively used in mining correlated policy rules in this study. It takes much time for a conflict detection routine to search every policy in policy repository with conventional policy storage models to see if conflict occurs before a new dynamic policy is added to the policy repository. A novel storage model for dynamic policies was proposed to address this problem. Dynamic policies...
Current mobile network architecture is constructed through introducing mobile IP protocol on the basis of IP network. On the one hand it cannot break away from the inherent limitation of IP network, such as no strong security, complex forwarding devices, lack of high expansibility and no QoS guarantee. On the other hand it brings some new problems due to the repair to IP network, such as the triangular...
Guarantee of QoS (quality of service) and mobility management are important research areas in NGN (next generation networks). Most people have been taking a route of mobile IP over MPLS (MIoM) to meet such challenge. However, MIoM has a drawback considering that MPLS itself does not have any direct control over transmission at the physical layer, instead, it has to rely on existing data link layer...
The platform of quick development of mobile 3D game can be used to reduce the mobile 3d phone games' develop-cycle. With this platform, the developers can break out of the complexity of programming. Thus more efforts will be putted into enriching contents of the game itself. The core of the platform of quick development of mobile 3D game is the ability of configuration, which can be divided into the...
In mobile IPv6, especially in hierarchical mobile IPv6 (HMIPv6), operations of the duplicate address detection (DAD) for on-link care-of address (LCoA) and regional care-of address (RCoA) take most of time in handover of HMIPv6. The concept of visual domain was introduced in this paper. By means of using the concept, this proposal make servers in visual domain replace mobile node (MN) to do DAD operations...
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device...
In the fields of deployments in wireless sensor networks, the method of stationary sensor nodes deployed in the area has already been done extensively. However, in a multilayer wireless sensor network, the deployment and movement control strategy for mobile nodes was done little. To guarantee the reliability of the data transmission, this paper proposes a virtual grid partition deployment method,...
According to the agent-oriented design method and the MASIF criteria, a commercial data query system based on the mobile agent is proposed. The system can make it easy for mobile users to query data that they needed. Using the master-slaver agent pattern, we define the role of the agent and design the work flow in the system. In the Aglet platform, we develop a mobile agent??s management and application...
With the widely applications of mobile communication networks, end-to-end secure voice has become a very important research issue and has attracted many people??s interests. A simple and effective method for end-to-end secure communication is to encrypt speech signal at user ends. But the use of encryption techniques leads to a hard problem that encrypted speech data can not be directly transmitted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.