The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the characteristics and key techniques of 3G mobile learning based on cloud services. Our research mainly focuses on mobile learning mode including active mode, passive mode and hybrid mode. And personalized learning method and resource integration approach are applied and analyzed. At last, we propose to employ cloud computing to mobile learning and build basic framework and...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
This paper presents a new data transmission protocol in Delay Tolerant Mobile Wireless Sensor Networks, which divides the data transmission process into two phases: data reception phase and data forwarding phase, mainly fulfilling through analyzing the state of mobile nodes and using Hand up mechanism. Simulation result shows that, through the implementation of two phases, we can obtain a higher message...
TCP's downlink performance during FMIPv6-enabled IEEE802.11g handoff is examined. The use of a user-initiated Handoff Notification, sent prior to handoff, is proposed. Therefore, the correspondent node is aware of the handoff-induced disruption, hence avoiding dropping the congestion window size and triggering Fast Retransmission mechanisms. During handoff, it continues to send data packets which...
A ubiquitous network environment is a system where the user can access network services anytime, anywhere. Studies are continuously being conducted on wireless communication technology and mobile devices to establish such an environment. The company that provides such services, at a charge to users, should have an established system for authentication and authorization. This service is referred to...
Recently, many authentication mechanisms have been proposed to provide security in WiMAX networks. Accessing information securely from any device, anywhere, anytime is becoming an increasingly important requirement for Human Centric Computing (HCC) environments. High mobility of end-users makes typical authentication procedures a challenging task. A novel EAP-TLS-ECDH-RSA-based authentication protocol...
Current text messaging protocols over the world allow a rigid limit of 160 characters per SMS, using the default messaging system of the mobile. However this limit is often found to be too less under ordinary circumstances and very often, to communicate effectively, a concatenated message needs to be sent. This, coupled with exorbitant messaging rates adds to the reduced effectiveness and decrease...
Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. We have developed an application that incorporates a novel technique which uses and enhances the Record Management Store (RMS), a subsystem of Mobile Information Device Profile (MIDP), which not only captures, upload and download multimedia data...
The recent research in the game console releases uses the wireless controller or “Wiimote” as the game controller. Nowadays there are a large number of mobile phones which contain 3D motion sensors. Hence, it is possible to create new interesting control schemes for mobile phone as a game controller. In this work, using the Sensor API library available for the Java Micro Edition SDK 3, we present...
With the rapid development of wireless network technology, the extensive use of mobile office in government, military and financial industry makes information security an urgent and important problem to be solved. However, traditional security mechanisms focus on authentication and authorization without considering endpoint security. TNC is no other than based on endpoint integrity to extend the trusted...
SIP (Session Initiation Protocol) is standardized by Internet Engineering Task Force (IETF) as a signaling and control functionality for multimedia services (video and audio). However, SIP is a text-based protocol with messages usually exceeding several hundred bytes in size, thus causing high call set-up latency over low bit-rate links. As a consequence, SIP suffers from undesirable delay which is...
In this paper, we present the design and the implementation of a test-bed for the Policy and Charging Control (PCC) system proposed in 3GPP TS23.203. Specifically, we use an IP multimedia call service example to demonstrate how to implement an advanced mobile service with policy and charging control in our test-bed. We show that the PCC system can handle the application-level session information and...
Proxy mobile IPV6 protocol is a network-based mobility management protocol. Mobile node does not need to participate in any PMIPv6 messages. A certificated-based authentication mechanism based on the public key infrastructure is proposed in this article. It can be used to protect and authenticate two proxy binding messages of PMIPv6. In addition, we use SVO formal logic to analysis the security of...
Wireless sensor networks have become very useful in so many applications. Applications such as grape monitoring, insect movement monitoring and etc., that allows connectivity between sensor network and Internet can solve many remote control and monitoring problems. IPv6 over low power WPAN (6lowPAN) protocols are suitable technology that can be adapted in wireless sensor network. The deployment of...
A Mobile Ad Hoc Network (MANET) is a wireless network which provides communication among wireless mobile hosts without the need of any pre-established infrastructure or centralized control. In such environments, organizing mobile nodes into manageable groups called clusters can reduce the routing overhead and provide better coordination among the nodes. When the nodes mobility is high, re-clustering...
Mobile ad hoc network (MANET) is self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs and the very bad security environment in battlefield bring a great challenge to securing tactical mobile ad hoc networks. Most schemes proposed recently focus on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion...
Nowadays, the requirement of Internet is increasing in more and more heterogeneous scenarios; especially in mobile platforms, such as Planes, trains and buses. NEMOWG (network mobility workging group) a new working group in IETF (Internet Engineering Task Force) is formed to provide mechanisms to manage the mobility of a network as a whole, enabling that network to change its point of attachment to...
The DFT-MSN protocol tailored for DTMSNs is deeply analyzed in this paper, and we propose an efficient improved DFT-MSN protocol (IDFT-MSN). Our simulation results show that, comparing with the DFT-MSN data delivering protocol, IDFT-MSN achieves a relatively higher message delivery ratio with lower transmission overhead and data delivery delay.
As the next generation Internet (NGI) is coming, and with the rapid development and great research progress achieved, mobile Internet Protocol version 6 (MIPv6) based network has become a hotspot all over the world. Considering of the rapid growth of network service quality and data exchange requirement, we are going to propose a new data exchange method in this paper. This method uses resource reservation...
An ad hoc network is a collection of mobile nodes with no fixed infrastructure such as base station or mobile switching centers. In this paper we present the study and simulation of a new protocol for routing in ad hoc networks. The new proposed protocol is an Enhancement of Ad hoc on demand Distance Vector (EAODV) routing protocol which offers quick adaptation to dynamic link conditions, low processing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.