The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the trends towards Internet of Things (IoT) and massive Machine-Type Communications (mMTC) it is expected that the 5th Generation of mobile communications (5G) will have a significant amount of battery powered devices (e.g. sensors, baggage tags, etc.). Therefore, battery efficiency and duration will be essential, especially for those devices in remote locations and/or restricted areas. It would...
As the number of mobile devices per user increases, the need to connect/combine them grows. Current approaches focus on the use of cloud-hosted backend services which allow file and app-state synchronization but fail in providing true resource sharing among mobile devices. To enable true resource/service sharing, the mobile devices of a single user should be combined into a cloud of cooperating mobile...
For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used for the transmission of user packets between SGSN and GGSN by building a mimicry gateway, which breaks the static correspondence between TEID...
In wireless communications, improving bandwidth efficiency is a necessity in the presence of limited spectrum resources and increasing demand. This is especially true in satellite communications where resources are shared amongst many of users. The Joint IP Modem (JIPM) is a satellite modem system that will enable extension of Global Information Grid (GIG) services to remote war fighters. One method...
Publish/subscribe or "push" communication has been proposed as a new network service. In particular, in a content-based network, messages sent by publishers are delivered to subscribers based on the message content and on subscribers' long-term interests (subscriptions). In most systems that implement this form of communication, messages are treated as datagrams transmitted without end-to-end...
Opportunistic routing (OR) employs a list of candidates to improve wireless transmission reliability. However, conventional list-based OR restricts the freedom of opportunism, since only the listed nodes are allowed to compete for packet forwarding. Additionally, the list is generated statically based on a single network metric prior to data transmission, which is not appropriate for mobile ad-hoc...
Opportunistic routing (OR) employs a list of candidates to improve reliability of wireless transmission. However, list-based OR features restrict the freedom of opportunism, since only the listed nodes can compete for packet forwarding. Additionally, the list is statically generated based on a single metric prior to data transmission, which is not appropriate for mobile ad-hoc networks. This paper...
In this paper, we have proposed proactive approach for fast-handoff using Access Point (AP) in Vehicular Ad-hoc Network (VANET). The existing schemes are based on context transfer for fast hand-off, but needs to reduce the latency of hand-off for VANETs. Fast hand-off in vehicle scans only the selected AP at any instance of time depending upon the association pattern. The Fast Hand-off Algorithm using...
Software Defined Networking (SDN) has been proposed as a drastic shift in the networking paradigm, by decoupling network control from the data plane and making the switching infrastructure truly programmable. The key enabler of SDN, OpenFlow, has seen widespread deployment on production networks and its adoption is constantly increasing. Although openness and programmability are primary features of...
We consider, by means of a study based on a simulation, the implementation of process control applications on a Wireless Local Area Network (WLAN) with a collision-free CSMA MAC protocol called CANlike protocol (adaptation of the MAC protocol of the CAN bus to the wireless context). The co-design approach is based on links between the Quality of Control (QoC) provided by the controller and the Quality...
The Internet of Things (IoT) is an application-driven heterogeneous network, being rapidly deployed across the world. The proposed session layer for IoT is the upcoming standard for Constrained Application Protocol (CoAP). The transport layer of choice for IoT is emerging to be UDP. CoAP itself mandates usage of UDP only as the transport layer. It is well-known that practical usage of UDP requires...
This paper introduces reference metrics for performance assessment of context-based charging, based on a novel model in which the charging process is capable of adapting to the user context by handling context-change driven events. The proposed metrics correspond to the response time in the relevant signalling scenarios, derived from the Third Generation Partnership Project (3GPP) network standards,...
Wi-Fi hotspots deployed by domestic networks are an attractive approach to foster ubiquitous Internet access for mobile computers. However, it raises several security issues, since the owners of such hotspots cannot be trusted to be honest; therefore, visitors should consider them as potential Man-in-the-Middle attackers. On the other hand, the owners of such hotspots should not be legally accounted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.