The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent technological advancements have led to the popularity of mobile devices, which can dynamically form wireless networks. Unfortunately, mobile devices are vulnerable to failure because of various factors, including physical damage due to deployment in harsh environmental conditions, limited energy, and malicious attacks. Detecting node failure is an important problem that has been widely studied;...
The advancement in wireless networking technologies and portable devices has motivated the explosive interests in heterogeneous wireless environments. However, the mobility and diversity of both devices and users bring new challenges for the design of mobile Internet applications. Seamless mobility support has always been one of the key problems. In this paper, we study context-aware adaptation for...
In wireless heterogeneous environment, the integration of wireless access network will be accomplished by seamless handover which contains many challenges i.e. service mobility, vertical handover, common authentication, unified accounting/billing, security mechanisms, QoS and service provisioning, etc. Toward this direction, our research aims to provide a complete integration of heterogeneous network...
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile user and the accessed VLR. Fortunately, we improve...
Analogous to the beneficial impact that mobility has on the throughput of unicast networks, this paper establishes that mobility can provide a similar gain in the order-wise growth-rate of the throughput for multicast networks. This paper considers an all-mobile multicast network, and characterizes its multicast capacity scaling. The scaling result shows that the growth-rate of the throughput in the...
In the heterogeneous wireless networks, the optimal network selection problem is one of the key issues. QoS aware path selection scheme is proposed in this paper, which estimates required bandwidth ratio based on the QoS requirements of target service and the SINR of each path. The proposed scheme can select the optimal path which can satisfy the QoS requirements among many heterogeneous wireless...
With rapid development of wireless technologies, current user mobile devices can support to access various wireless networks such as Wi-Fi 802.11 Wireless LANs, 3G cellular networks, etc. Due to requirements of multicast mobility for multimedia services, the convergence of wired and wireless network has been a necessary trend in Next Generation Networks (NGN). The issues of multicast and mobility...
Wireless technology is seen as a gradually popular information technology with such potency that it has changed the way we view IT. Through wireless network, many knowledge management activities occur in working places and in our daily activities. In the mobile environments, the important knowledge management is quickly acquired the right knowledge using mobile devices through wireless network. The...
Mobile application developers and content providers usually need to develop mobile applications with concerns for mobility for specific wireless networks and device platforms which are used by network carriers. In order to provide standard mobile applications with interoperability and mobility support, in this paper we propose a comprehensive mobile application framework to support interoperability...
The co-existence of heterogeneous access technologies with largely different characteristics results in handoff asymmetry. As the convergence of dissimilar networks has been envisioned to characterize the next generation wireless networks, the seamless and efficient handoff between different access technologies (vertical handoff) has become essential. As the "best" network has to be chosen,...
Intermittently connected mobile networks, also called delay tolerant networks (DTNs), are wireless networks in which at any given time instance, the probability of having a complete path from a source to destination is low. Several routing algorithms have been proposed for such networks based on control flooding in which there is a fixed number of copies for each message. Although a DTN is delay tolerant...
Mobile IPv6 supports a global mobility solution in wireless networks. The mobile node is unable to send or receive packets during handover, due to link switching delay and IP protocol operations. This handover latency is caused by standard mobile IPv6 procedures, such as movement detection, new care of address configuration, and binding update. This configuration is the most time-consuming phase,...
Among different techniques that provide mobile positioning, using the Received Signal Strength (RSS) is regarded as a low-cost solution which is applicable in a wide range of wireless networks. In this paper, we propose a cooperative RSS-based positioning algorithm that utilizes the additional RSS data of the short range communications between mobile stations (MSpsilas). We use a nonlinear least square...
This paper describes a communication model in a two-dimensional grid for mobile wireless networks and shows how to optimally solve some decision problems related to the model. We show that user communication problem (UCP) and source reachability problem (SRP) can be most efficiently solved in polynomial time. Asymptotically time-optimal algorithms for solving these problems are also presented.
This paper proposes an efficient authentication scheme, which is suitable for low-power mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to generate a delegation passcode for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover, the mobile station only needs to receive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.