The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's...
Understanding user behavior is essential for source optimization in mobile networks, including urban planning, road traffic engineering, and content distribution. In this paper, we take the first step to investigate the basic characterization of user behavior over 340,000 users of a 4G mobile network in a large metropolitan area. Our study is carried on from two aspects: mobility and application usage...
The Internet was designed to support host-oriented services. However, users are typically interested in the content itself rather than the location of the content. As the usage of the Internet for content retrieval is increasing rapidly, some intelligent methods have to be employed in the base stations to provide faster and seamless content delivery. In this paper, we propose a CCN-based fast content...
The main objective of this research project was to identify factors promoting the adoption of m-health and determine usability challenges in the existing m-health applications in Kenya. Specifically the study aimed at i) establishing the factors promoting adoption of M-health and, ii) determining the usability challenges in m-health applications in Kenya. Consequently an M-health prototype application...
Emerging services for Intelligent Transport Systems put the information content at the centre of the communication process, require a seamless support of mobile users, and target a real-time and asynchronous data dissemination. The Information-Centric Networking paradigm has all the potentials to fulfill these requirements, thanks to its ability to distribute contents through publish-subscribe communication...
In this paper, we call for a paradigm shift away from the wireless-access focused research efforts on 5G networked systems. We believe that the architectural limitations should share equal blame on issues of performance, reliability, and security. We thus identify architectural weakness on both sides of the mobile clients and the 4G network infrastructure. Our recent findings show that, contrary to...
Differentiated Services (DiffServ) provides a means for applications to classify traffic into Quality of Service (QoS) classes by reading the Differentiated Services Code Point (DSCP) field in the IP header and then mapping traffic to a specific QoS forwarding treatment. This paper provides new measurement data that examines how the DSCP is altered as packets traverse mobile broadband access networks...
Crowdsourced mobile network access (CMNA), in which mobile users can share their Internet access with others, is a promising paradigm for addressing users' increasing needs for ubiquitous connectivity and alleviating cellular network congestion. In this paper, we study the operator-assisted CMNA model, in which a mobile virtual network operator (MVNO) incentivizes its subscribers to operate as mobile...
IVANETs (Internet Based Vehicular Adhoc Networks) are the adhoc networks formed by moving vehicles without any permanent infrastructure and are characterized by frequent disconnections, frequent topological changes, as vehicles move at very high speed and can take unpredictable turns on their route. So their cached data items become stale, need to be updated from the server and it results in high...
Mobile Crowdsourced Access (MCA) enables mobile users (MUs) to share their Internet connections by serving as tethers to other MUs, hence can improve the quality of service of MUs as well as the overall utilization of network resources. However, MCA can also reduce the revenue-generating mobile traffic and increase the network congestion for mobile network operators (MNOs), and thus has been blocked...
To deal with the severe challenge from explosively increasing mobile users' multimedia service requests in mobile networks, introducing cloud-based computing platform and content caching into radio access networks (RANs) has become an effective emerging technique. In this paper, we propose a collaborative hierarchical caching framework in cloud RANs (C-RANs), which minimizes the access delay of content...
Mobile edge computing (MEC) has risen as a promising technology to augment computational capabilities of mobile devices. Meanwhile, in-network caching has become a natural trend of the solution of handling exponentially increasing Internet traffic. The important issues in these two networking paradigms are computation offloading and content caching strategies, respectively. In order to jointly tackle...
Internet mobile users concern more and more about their privacy nowadays as both researches and real world incidents show leaking of communication and location privacy can lead to serious consequence, and many researches have been done to anonymize individual user from aggregated location data. However just the communication itself between mobile user and their peers or website could leak considerable...
Users trying to access censored content may experience different results, depending on the technique adopted to enforce Internet Censorship, that in turn depends on different factors. Administrative control of the network (i.e. the entity managing network devices) is one of such factors. To the best of our knowledge, we are the first to focus on censorship detection on 3G/4G (hereafter mobile) network...
To address the challenge arising from mobile users' increasing demands for multimedia services, applying content caching in heterogeneous networks (HetNets) is regarded as an effective way to offload traffic and improve the capacity of mobile networks. In this paper, we aim at designing novel content caching strategies in HetNets to offload the network traffic and support users' requests locally....
To cope with the increasing demands of mobile devices and the limited capacity of cellular networks, mobile connections are offloaded to WiFi. The access capacity is further increased by aggregating backhaul bandwidth of WiFi access links. To analyze the performance of aggregated access links we develop a model for two and more cooperating systems sharing capacities using an offloading scheme. The...
User behavioral analysis is expected to be a key technique for identity theft detection in the Internet, especially in mobile social networks (MSNs). While traditional methods prefer to use explicit behaviors, a series of behaviors implicit in user's texts can probably provide much more accurate identity. And these implicit behaviors can be digged from texts by LDA. Besides the latent feature in texts,...
With the development of mobile Internet and the information technology, mobile APP is closely linked with people' s life. However, it seriously hinders the user to find a required APP that quantity overload and homogenization of APP in mobile application store. Based on the Elaboration Likelihood Model, this article has explored the effects of online reviews on APP discoverability under different...
Nowadays, more and more companies intend to combine public transport system with the mature Wi-Fi technology to bring more passengers value-added services during their travel. It is critical to mobile service market and city management by identify the user's behavior patterns. In this paper, the author firstly analyzes the time regularity of bus Wi-Fi network behavior. Then from the perspective of...
Quality-to-Experience (QoE) refers to users' experience when using an application. Network operators typically focus on Quality-of-Service (QoS) metrics such as throughput, delay, and packet loss. However, these QoS metrics only matter if they impact users' experience of the application they are using. Therefore, it is crucial for network operators to monitor Quality of Experience (QoE). However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.