The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the characteristics and key techniques of 3G mobile learning based on cloud services. Our research mainly focuses on mobile learning mode including active mode, passive mode and hybrid mode. And personalized learning method and resource integration approach are applied and analyzed. At last, we propose to employ cloud computing to mobile learning and build basic framework and...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
This paper presents a new data transmission protocol in Delay Tolerant Mobile Wireless Sensor Networks, which divides the data transmission process into two phases: data reception phase and data forwarding phase, mainly fulfilling through analyzing the state of mobile nodes and using Hand up mechanism. Simulation result shows that, through the implementation of two phases, we can obtain a higher message...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
P2P SIP (peer to peer session initiation protocol) systems have emerged as a new trend in multimedia realm due to their abilities to overcome the shortcomings of conventional SIP systems. Most of P2P SIP systems were implemented using Chord, a Distributed Hash Table (DHT) based routing algorithm which can provide scalability and reliability. Previous studies on P2P SIP systems did not address node...
The most common use of formal verification methods and tools so far has been in identifying whether livelock and/or deadlock situations can occur during protocol execution, process, or system operation. In this work we aim to show that an additional equally important and useful application of formal verification tools can be in protocol design and protocol selection in terms of performance related...
TCP's downlink performance during FMIPv6-enabled IEEE802.11g handoff is examined. The use of a user-initiated Handoff Notification, sent prior to handoff, is proposed. Therefore, the correspondent node is aware of the handoff-induced disruption, hence avoiding dropping the congestion window size and triggering Fast Retransmission mechanisms. During handoff, it continues to send data packets which...
A ubiquitous network environment is a system where the user can access network services anytime, anywhere. Studies are continuously being conducted on wireless communication technology and mobile devices to establish such an environment. The company that provides such services, at a charge to users, should have an established system for authentication and authorization. This service is referred to...
Recently, many authentication mechanisms have been proposed to provide security in WiMAX networks. Accessing information securely from any device, anywhere, anytime is becoming an increasingly important requirement for Human Centric Computing (HCC) environments. High mobility of end-users makes typical authentication procedures a challenging task. A novel EAP-TLS-ECDH-RSA-based authentication protocol...
Current text messaging protocols over the world allow a rigid limit of 160 characters per SMS, using the default messaging system of the mobile. However this limit is often found to be too less under ordinary circumstances and very often, to communicate effectively, a concatenated message needs to be sent. This, coupled with exorbitant messaging rates adds to the reduced effectiveness and decrease...
Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. We have developed an application that incorporates a novel technique which uses and enhances the Record Management Store (RMS), a subsystem of Mobile Information Device Profile (MIDP), which not only captures, upload and download multimedia data...
The recent research in the game console releases uses the wireless controller or “Wiimote” as the game controller. Nowadays there are a large number of mobile phones which contain 3D motion sensors. Hence, it is possible to create new interesting control schemes for mobile phone as a game controller. In this work, using the Sensor API library available for the Java Micro Edition SDK 3, we present...
With the rapid development of wireless network technology, the extensive use of mobile office in government, military and financial industry makes information security an urgent and important problem to be solved. However, traditional security mechanisms focus on authentication and authorization without considering endpoint security. TNC is no other than based on endpoint integrity to extend the trusted...
SIP (Session Initiation Protocol) is standardized by Internet Engineering Task Force (IETF) as a signaling and control functionality for multimedia services (video and audio). However, SIP is a text-based protocol with messages usually exceeding several hundred bytes in size, thus causing high call set-up latency over low bit-rate links. As a consequence, SIP suffers from undesirable delay which is...
In this paper, we propose authentication protocols for 802.11s mesh networks, which support the mesh point's fast handoff between Mesh key distributors (MKDs). The protocols consist of the initial authentication protocol (IAP) and the fast handoff authentication protocol (FHAP). Once a MP firstly accesses the 802.11s mesh networks, the initial authentication protocol will be executed, which realizes...
The proliferation of wireless and mobile devices has fostered the demand of context-aware applications, in which location is often viewed as one of the most significant contexts. Classically, trilateration is widely employed for testing network localizability; even in many cases, it wrongly recognizes a localizable graph as nonlocalizable. In this study, we analyze the limitation of trilateration-based...
In this paper, we present the design and the implementation of a test-bed for the Policy and Charging Control (PCC) system proposed in 3GPP TS23.203. Specifically, we use an IP multimedia call service example to demonstrate how to implement an advanced mobile service with policy and charging control in our test-bed. We show that the PCC system can handle the application-level session information and...
Service discovery systems over MANETs are demanded to find available services at an appropriate cost, even if nodes in MANETs frequently move, randomly join or leave, and services may be revoked by their owners. SCN4M-DL is an adaptive directory-less service discovery system for MANETs, and it meets the above challenges by deeply coupling with underlying geographic routing algorithm and setting configurable...
TCP, the facto standard used in today's Internet, has been found to perform poorly in Mobile Ad Hoc Networks (MANETs). This is exacerbated by contention with increasing UDP-based high priority multimedia traffic and the class differentiation introduced in current QoS protocols, which results into TCP starvation and increased spurious timeouts. In this paper, we propose a cross-layer TCP enhancement...
Proxy mobile IPV6 protocol is a network-based mobility management protocol. Mobile node does not need to participate in any PMIPv6 messages. A certificated-based authentication mechanism based on the public key infrastructure is proposed in this article. It can be used to protect and authenticate two proxy binding messages of PMIPv6. In addition, we use SVO formal logic to analysis the security of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.