The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The adoption of IEEE 802.11 wireless networks has grown importantly in previous years. Recently, some vendors are developing smart access points for these networks, which are able to change their operation channel taking interference into consideration. Handoff management in wireless networks, i.e., transferring an active data session from one cell defined by an access point to another, is a critical...
5G, fog computing and the majority of the latest technological trends have minimized latency as a top priority. These initiatives are focusing on physical layer methods to decrease latency, thus keeping the changes transparent to users. Physical layer changes are expensive and in many cases incompatible with the original solution which results in lower adoption rate and higher capital investment....
A group signature scheme allows a user to anonymously sign a message on behalf of a group. One of important issues in group signature schemes is the user revocation. Previously, Libert et al. proposed an elegant revocable group signature scheme with O(1) signing/verification costs, O(1) signature size, O(1) membership certificate size, and O(log N) public key size, where N is the number of group members...
The Network Mobility(NEMO), extension of Mobile IPv6, can support the mobility of mobile router(MR) across different air-around access technologies during different phases of flight. However, the past schemes of NEMO lack the identity privacy and signal integrity protection in handover procedure, which makes it unsecurity in aeronautical passanger communication(APC) environment. In this paper, a local...
Mobile device security has become increasingly important as we become more dependent on mobile devices. One fundamental security problem is user authentication, and if not executed correctly, leaves the mobile user vulnerable to harm like impersonation and unauthorized access. Although many user authentication mechanisms have been presented in the past, studies have shown mobile users preferring usability...
Multi-hop infrastructure-based communication is expected to play a vital role in supporting high data-rate multimedia access to mobile devices. The advantages are significant in highly mobile scenarios such as intra-vehicular networks. However, mobile nodes in these networks suffer from long authentication delays, which adversely affect the goodput. In this work, we propose two techniques to shorten...
Wireless Mesh Networks (WMNs) have been a major research focus in the recent years leading to a profusion of protocol proposals. While most existing implementations address routing aspects, none of the proposals addressing security aspects have gained acceptance in practice, due to their high overhead or strong assumptions. To cope with security issues in current WMN deployments, well-known non-secure...
Many new applications, such as Mobile crowdsensing, burden mobile devices with heavy computation which severely affects the user's experience due to high battery consumption and delayed responses. Cloud computing was expected to solve heavy computation problems, so researchers tried to connect it to mobile networks, but always hindered by the expensive nature of mobile access networks from money,...
Mobile Social Networks (MSN), as an emerging social networking platform, facilitates social interaction and information sharing among users in the proximity. Spam filtering protocols are extremely important to reduce communication and storage overhead when many spam packets without specific destinations are diffused in MSNs. In this paper, we propose an effective social based updatable filtering protocol...
Wireless Local Area Networks (WLANs) have experienced a significant growth during the last decade due to ever emerging and heavy resource demanding applications. Widely used IEEE 802.11 may unexpectedly require long durations in association compared to what Voice over IP (VoIP), Video on Demand (VoD) and other real-time applications can tolerate. In this paper, we implement HIP-WPA; a novel approach...
Nowadays, with the wide establishment of IEEE 802.11, more and more people use Wi-Fi to surf on the Internet. Due to the convenience and mobility of the mobile devices, a number of mobile users have been increasing greatly. For real-time video and VOIP have attracted much attention, the delay time of handoff is the most important issue for the service. In order to provide high-speed service with low...
The increase in multimedia usage places stringent requirements on wireless network performance in terms of lesser handoff delays. A VOIP client, for example, cannot tolerate a delay larger than 150 ms between the incoming voice packets to ensure a satisfactory interactive service to the user. Of the 150ms, only 50ms is allowed for handoff and the rest should accommodate the transmission delay of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.