The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the recent years, mobile wireless technology has invaded the computer domain with the increased evolution of mobile devices in computing power, storage capacity, and other richer functionalities. Those devices are no longer restricted to phone calls and messages, but also for the access to internet (via WiFi, 3G, 4G …) and exchanging data via Bluetooth. On the other side, we have the great success...
Explosion of mobile traffic will bring a heavy burden to the core network, and rapid growth of mobile devices, as well as increasing demand for delay-sensitive services poses severe challenges to future wireless communication systems. In this regard, local breakout is a promising solution to save core network load and, more importantly, to reduce end-to-end (e2e) delay of packets with local significance...
Delay tolerant networks (DTN) are characterized by lack of end-to-end communications and stable infrastructures. This paper deals with DTN networks consisting of a number of heterogeneous mobile fishing vessels where some nodes, referred to as adaptive nodes, are capable of communicating through long-range Wi-Fi whereas other nodes are having simple Wi-Fi access network. The nodes form different clusters...
Nowadays, mobile wireless sensor networks have many applications especially in a group movement such as evacuation system, search and rescue activity. To support the group movement and to achieve an energy-efficient protocol, we propose a Group mobility based Clustering (GC) scheme. This protocol reduces the control overhead in the setup phase of a clustering system by introducing a concept of group...
Mobile network technologies require some degree of tracking of user location, specifically user equipment tracking, as part of their fundamental mechanism of working. Without this basic function, features such as hand-over between cells would not work. Since mobile devices are typically associated with a single person, this provides a potential mechanism for user location surveillance. Network operators...
For some time now the volume of data traffic in Mobile Telecommunications Networks has far outweighed voice traffic and most users are more concerned about the quality of their data connection than their voice calls. Adequate traffic service requires analysis of traffic flows to identify network issues affecting users' services. This can be achieved by placing network analytics probes throughout the...
Rapid growth of static and dynamic applications has led to the expansion of Wireless Sensor Network (WSN). Sensor mote uses non-rechargeable batteries deployed in large numbers in the remote area; hence, dealing with the utilization of energy is an essential task in WSN. Clustering of motes gives an improved utilization of energy in the node thus balancing the load in both static and dynamic environments...
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can easily gain significant control over the WSN. In...
In this era wireless technology gaining more popularity, people prefer wireless communication over wired communication due to mobility, scalability and ease of access. However, the traditional wireless network is complex, vendor dependent and inadequate feasibility to incorporate new services, protocols, and APIs. The rapid growth in wireless network raises many thoughtful challenges for network and...
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes...
Recently, the performance of mobile data networks has been evaluated from many aspects, e.g., TCP/IP protocols, comparison with WiFi or even satellite communication, under different movements within a metropolis area. Nevertheless, the result is still unknown in high-speed mobility scenarios and in a scale that crosses different metropolis and geographic areas. To fill in this blank, we carry out...
Optimizing energy consumption and increasing the network lifetime are the main concern in wireless sensor networks where nodes energy are mostly used for sending data to the sink or base station. Many routing protocols are presented to save energy in data collection and using fixed base station problems are truly recognized. Many researches have been conducted on base station mobility which can improve...
New software-defined open network concepts are proposed in this paper to enable an efficient implementation of front- and backhaul solutions for future 5G mobile networks. Main requirements for 5G front- and backhaul are derived and then related to the open network architecture enabling multiple operators to share the same physical infrastructure. The value of software-defined networking (SDN) is...
The Election paradigm can be used as a building block in many practical problems such as group communication, atomic commit and replicated data management where a protocol coordinator might be useful. Mobile systems are more prone to failures than conventional distributed systems. Solving election in such an environment requires from a set of mobile hosts to choose a mobile host or a fixed host based...
Wireless communication encapsulates the earth into a global village with its reach to every nook and corner of the globe. The fourth generation (4G systems) of wireless communication was expected to be up for grabs from 2010s. However, due to the complicated hardware required the evolution of technology into 4G has been sluggish. Since 4G services require the integration of all the existing communication...
This paper investigates into the transaction management of mobile web services, which is crucial to maintaining execution correctness of services and consistency of their underlying data. We propose a relaxed set of transaction correctness criteria, called Sacred (Semantic Atomicity, Consistency, Resiliency, Durability) and design protocols for enforcing these criteria in the execution of transactions...
The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However,...
IEEE 802.16-2009 specifies two fast handover mechanisms, fast base station switching and macro diversity handover, to streamline communication for a mobile station (MS). Both operate with a diversity set that lists base stations among which an MS can move its connection readily. In view that an unduly chosen diversity set may cause prohibitive cost, we provide means to prevent the diversity set from...
Today's mobile communication networks support not just simple mobile voice and data services but also access to mobile Internet-based services with varying bandwidth and quality-of-service requirements. Step towards NGN leads to heterogeneity and complexity. The rapidly growing demand for “anywhere, anytime” high-speed Internet access will be one of the major forthcoming challenges for mobile network...
The handover performance in mobile network is the most important factor that can influence the Quality of Service (QoS). Today many countries in the world have migrated to more advanced mobile communication system such as the IEEE 802.16e mobile WiMax network. This mobile WiMax has been proven to be more stable and applicable for fixed, portable, nomadic and mobile network. The parameters such as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.