The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is predicted that the global mobile data traffic will increase nearly eightfold in the next five years, and the cloud applications will consist of 90 percent of total mobile data traffic by the end of 2019. There is no doubt that the increasing high quality video requirements and huge similar information stored in cloud servers enforce to setup a new communication paradigm. In this paper, we will...
With the ever increasing data and computational demands from mobile users, heterogenous wireless networks (HetNets) and mobile cloud computing (MCC) have been advocated as a promising solution to meet these demands. Insufficient bandwidth is one of the most important challenges being faced by a successful implementation of the MCC technology due to heavy data traffic. The MCC implementation on HetNet...
NEtwork MObility (NEMO) is a host-based mobility management protocol, which efficiently manages Internet connectivity of multiple nodes on the move. Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, tries to offload low-power mobile devices though managing mobility signaling by the infrastructure devices. To support network mobility in PMIPv6-domain, several schemes have been...
The smart phones are used in many aspects of our life, shopping on the Internet, and creating and distributing many types of files. But these devices have many limitations including: short battery life time and limited storage and processing. Mobile Cloud Computing technology can help to overcome these limitations. Offloading technique reduces the power consumption and saves the mobile storage by...
Delay-tolerant sensor networks (DTSNs) require efficient MAC transmission strategies that include energy constraint, relaxed latency, mobility support and diverse traffic load. Reservation-based and contention-based MAC schemes are used to improve throughput and energy consumption. In this paper, we propose a traffic adaptive, energy-efficient MAC protocol to achieve better data transmissions and...
Device-to-device (D2D) communication is one of the most promising solutions to the dramatic increase of wireless networks traffic load. In D2D communications, mobile nodes can communicate in a semi-autonomous way, with minimal or no control by the base station (BS). In this context, we address the problem of the coexistence of cellular and D2D tiers in the uplink frequencies, where a D2D source is...
To facilitate content delivery to mobile users, we propose a content caching and distribution framework for the heterogeneous OFDM networks, where a library of files available at the macro base station (MBS) can be distributively cached in multiple serving nodes (SNs). SNs are capable of both receiving unstored files from MBS and transmitting files to the associated users. For a given group of file...
Computation offloading manages resource-intensive and interactive applications on mobile devices where much processing is replicated with multiple users in the same environment. In this paper, we consider the scenario where duplicated computation tasks are processed on specific mobile users and computation results are shared through Device-to-Device (D2D) multicast channel. Our goal is to find an...
In this paper, we introduce MVPN, a framework for building secure Virtual Private Networks (VPNs) with a novel Mobile IPv6 based Moving Target Defense strategy. Our approach aids in combating remote attacks against a VPN server. By eliminating the static address of the server, we make it difficult for an attacker to find the server. The server''s address is randomly changed at a certain interval creating...
Support of data communication during disaster management operations is traditionally achieved by means of Internet Protocol (IP)-based networks, which however show some limitation in terms of mobility support and resilience to link disruption. A new promising networking paradigm is represented by Information Centric Networking (ICN) architectures implementing caching functions, which are studied in...
As the explosion of Internet traffic is quickly leading to overloaded cellular network, device-to-device (D2D)-based content sharing is proposed as a method to offload mobile data traffic. The performance of D2D-based content sharing is dramatically affected by the success rate of content fetching from nearby devices and quality of content transmission, which is determined by the geographic distribution...
Wireless caching at users' devices in mobile social network is considered to be a promising solution to alleviate backhaul overload in future wireless networks. However, most of the current works propose caching schemes based on heuristic reasoning and intuition with poor performance or high complexity which are impractical due to individual devices' computing capacity restriction. In this paper,...
Mobile sensing, which uses mobile sensors to monitor spatially correlated physical fields, is a promising technique to enhance the flexibility and coverage of wireless sensing systems. However, the position errors of mobile sensors can deteriorate the estimation accuracy of the physical fields. Thus, to optimize the estimation performance, it calls for a trade-off between the resource allocated to...
Nowadays, the sufficient quality-of-service (QoS) provision for mobile applications remains a major challenge in any wireless network. Conventional sufficient QoS provision techniques using resource allocation, data scheduling, and cross-layer optimization have been proposed to tackle this problem. Nevertheless, due to the unpredictable nature of wireless channel conditions, the QoS improvements resulting...
In mobile edge computing systems, mobile devices can offload compute-intensive tasks to a nearby \emph{cloudlet}, so as to save energy and extend battery life. Unlike a fully-fledged cloud, a cloudlet is a small-scale datacenter deployed at a wireless access point, and thus is highly constrained by both radio and compute resources. We show in this paper that separately optimizing the allocation of...
Cloudlet is a new paradigm in mobile cloud computing to provide resources to nearby mobile users via one-hop wireless connections. In this study, we leverage the social tie structure among mobile users to achieve mutual-beneficial computation offloading decision making and hence enhance the system-wide performance.Drawing on a social group utility maximization (SGUM) framework, we cast users' decision...
With the popularity of watching mobile videos, many works focus on the geographic features of user viewing behaviors, but few study them in the context of an entire metropolitan city. Different regions of a large city have different intensity of economy activities with respect to their different distances to the downtown, and how this will influence video popularity and similarity is still unclear...
In this paper, we address the problem of downlink resource allocation and admission control for an Orthogonal Frequency Division Multiple Access (OFDMA)-based Cloud Radio Access Network (C-RAN). Specifically, we formulate the resource allocation and admission control for mobile users in C-RAN as an optimization problem, subject to constraints on mobile users data rate requirements, maximum transmission...
Nowadays people are carrying their mobile devices wherever they go, and as social beings they interact with others all day long. Thus, by exploiting this massive use of smart devices they provide a way to be co-located using only their captured environmental radio signals. In this paper, we design a co-location system that finds groups of people, in real-time, with high accuracy, by exploiting the...
Motivated by the massive and increasing number of online messaging service users, the idea of utilizing short-range device-to-device (D2D) communication has been adapted to the access of instant messaging services on-the-go, introducing a D2D-based messaging service (D2D-Msg) paradigm that promises higher data rate and longer battery life. The quality of message dissemination in such a new paradigm,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.