The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key distribution plays an important role in wireless sensor networks (WSNs), for information must be kept secure, even in an environment with limited storage ability and low data processing speed. However, it is a challenge to work in such a harsh requirement environment, the traditional key management scheme such as key distribution center (KDC) and public key cannot be used. Key pre-distribution...
In today's Next Generation Networks (NGN) many services are residing that all make different security demands on the inter-domain communication. In this paper a concept will be presented that is based on Network Domain Security (NDS) specification and extends it in such a way, that multiple tunnels-depending on the security needs of the involved endpoints-can be established. The concept hereby focuses...
The Multimedia Messaging Service Environment (MMSE) integrates already existing messaging systems in mobile networks and Internet, where the MMS server is responsible for handling of incoming and outgoing messages. We note that when the load offered to the MMS server is increased beyond the capacity limit, especially when hot-spot traffic caused by the movement of users suddenly appears, the latency...
A key part of First Person Shooter network gaming is the game server discovery phase. Whilst probing for suitable servers from a wireless network, a large burst of network traffic is generated, potentially leading to detrimental effects on network capacity available to other wireless users. This can be minimised using an optimised algorithm to order the discovery probes and subsequently terminate...
In recent years, IMS architectures standardized by 3GPP have gained importance as the key technologies for the Next Generation Network that will provide high quality services over an IP network. These systems are being put to practical use and are mainly maintained and operated by telecommunication operators. In the future, deployment of new IMS services such as an IMS-based IPTV service and IMS-based...
A new-generation access network should be able to transport various kinds of dynamically changing sensor information about specific localities or private individuals to different destination servers in a secure manner for processing so that the various processed information can be used in an integrated manner to provide advanced context-aware services. After classifying the various kinds of sensor...
In a saturating telecommunications marketplace network operators want to rapidly deploy services with minimum capital investment, while maximizing on revenue from service usage by customers. One way to achieve this is to create interfaces for 3rd party service and content providers to offer their applications and services to users. Composing and bundling of these services will essentially create new...
A cognitive radio system is modeled as a queue with a server subject to interruptions from primary users. Each customer (packet) arriving at the queue has choices of balking or joining the queue. The individual decision of each customer is optimized based on the reward for the completion of service and the penalty for the waiting time (delay). A socially optimal strategy is also found to maximize...
We propose a novel communication system for evacuees of shelters, termed "Shelter Communication System (SCS)". SCS is composed of a computer (termed Shelter Server) connected to the Internet and a set of personal computers (termed shelter PCs), one in each shelter, connected to Shelter Server through a temporal link and the Internet. SCS provides a message communication service between shelters...
The IP Multimedia Subsystem (IMS) Service Continuity is a recent effort by 3GPP towards achieving an enhanced mobility experience for IMS subscribers. It provides mechanisms to manage continuity of IMS services, particularly the seamless transfer of multimedia sessions across different access networks, different domains, and the mobility of ongoing sessions across devices of the same user. Functionally,...
This article investigates efficient broadcast delivery of file download (filecasting) services in hybrid broadcast and cellular systems formed by a DVB-H network and an evolved 3G+ cellular network with HSDPA and MBMS capabilities. In particular, we investigate the delivery cost savings that can be achieved using HSDPA and MBMS to repair errors of the initial DVB-H broadcast transmission. In a realistic...
Most of routing protocols in VANETs are position-based due to their well scalability. The forwarding decisions of such protocols are simply based on the location information of forwarders' neighborhood and the destination node. Due to high mobility of vehicles, location-service protocols are required to provide the destination location. Location services protocols can be categorized as flooding-based...
Adaptive video is a popular technique to continuously deliver a video stream to a user in the best quality possible when the underlying network bandwidth cannot be guaranteed. As such, quality of adaptive video depends critically on the agility of the rate adaptation algorithms in tracking the varying bandwidth. In this paper, we investigate the performance of a popular rate adaptation algorithm,...
Seamless handoff between different wireless technologies is a vital requirement for the next generation mobile networks (NGMN). The soft handoff (SHO) method provides seamless roaming, but makes heavy use of battery and radio resources. In this paper, we propose a conservative soft handoff (cSHO) which maintains the benefits of SHO and reduces the consumption of resources. Instead of using both radio...
A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for enabling mobile users to play the same rich Internet games available to PC users. However, the mobile gaming user experience may be limited by risks of unacceptably high response time, and low gaming video quality, as gaming...
Service discovery in Ubiquitous Sensor Networks has been targeted mostly for services available within certain proximity, but the service availability only in close vicinity is no longer feasible in the pervasive and ubiquitous era. In order to address the ubiquity in service discovery, we have proposed a framework that makes use of the Electronic Number Mapping (ENUM) protocol. Our network architecture...
In this paper, we describe an architecture for the Host Identify Protocol (HIP) to automatically manage the path to be used between two hosts for a given traffic flow. Different simultaneous flows between the two hosts can take different paths. The architecture is based on and extends the Simultaneous Multiaccess (SIMA) HIP extension and the Interactive Connectivity Establishment (ICE) framework....
An increasing body of protocols has been proposed in recent years for detecting node replication attack in sensor networks. Most of them however expose the following limitations: high performance overheads, unreasonable assumptions, etc. To address these issues, we propose two new protocols in this paper: LANCE and SACRED. LANCE is designed to be light-weight in performance at the cost of slightly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.