The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes connected by wireless links without fixed infrastructure, which is originally designed for a cooperative environment. However, MANETs are subjected to a variety of attacks by malicious nodes, in particular for attacks on the packet routing. Compared with traditional cryptosystem based security mechanisms, trust-enhanced...
In a mobile Self-Organizing Network (SON) the usage of a SON coordinator is necessary to preclude the execution of conflicting SON function instances. Typically, such a coordinator is accountable for conflict prevention and resolution and does not take into consideration that the activity of function instances may induce an undesired network behavior. In this paper, we propose an experimental system...
As one of the newest technology, LTE has become increasingly popular after GSM and UMTS. As the LTE industrial chain matures and user requirements grow, E-UTRAN will be deployed on a large scale, covering all urban areas and most other regions. The control plane, which is responsible for connection management, mobility and security, has aroused more and more attention. In order to have an in-depth...
With the rapid developing growth of information technology and communication, the devices equipped with various network functions connecting each others are more popular. In order to efficiently manage those devices, the Internet of Thing (IoT) technology is adopted. IoT is an emerging concept of the network which allows any object in the real world is connected together at anytime and anywhere through...
With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, trust and privacy concerns continuously surface as a key deterrent to the adoption of these emergent technologies. The ensuing literature presents a Secure,...
Mobile ad-hoc networks are more vulnerable to security attacks due to their unique characteristics such as dynamic topology, no fixed infrastructure, resource limitations and multi-hop scenario. In MANETs one the dangerous attack is packet dropping attack. This packet dropping attack is two types: 1. Black hole and 2. Gray hole. In both the attacks, an attacker sends the false reply to source node...
Wireless visual sensor networks can provide significant information for a large set of monitoring and surveillance applications. In these networks, mobile sinks are often used to reduce energy consumption over the network, where many algorithms have been proposed for higher energy efficiency. Frequently, visual sensors may have different relevancies for the monitoring functions of the applications,...
This paper describes a TriTHEApp Android application, designed to serve as a location based time saving and safety ensuring application. In other words TriTHEApp is a location based service, with three features, 1) Tool to announce arrival, 2) Handset theft monitoring and 3) Emergency call feature integrated in it. Tool to announce arrival service is designed to make client's uncertain waiting time...
The use of mobile devices in home automation today allows to control and monitor the use of electrical devices. This article presents Blue-Motic automation system for monitoring and control points of energy consumption on mobile devices. The system consists of a power card to capture electrical signals and send information via a Bluetooth network to a mobile device, also has a security system and...
The number of vehicles on roads keeps increasing continuously, making the management of traffic flow, especially in big cities more and more challenging. One of the key enablers for having smooth traffic flows and better mobility is to rely on real-time traffic monitoring systems. These systems allow road operators to implement intelligent traffic management strategies such as the dynamic adjustment...
This paper considers mobile bionanosensor networks designed for target tracking in molecular environments. The mobile bionanosensor network considered in this paper consists of nano-to-microscale bio-nanomachines that coordinate their activity by propagating the two types of signaling molecules: attractants for a group of bio-nanomachines to move toward targets, and repellents to spread over the environment...
Virtualisation of cellular networks can be seen as a way to significantly reduce the complexity of processes, required nowadays to provide reliable cellular networks. The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN) is a EU FP7 Large-scale Integrating Project (IP) funded by the European Commission that is focusing on how cloud computing and network function...
Cloud computing is a promising solution for the flexible, on-demand delivery of communication services and infrastructures. The European Union funded project Mobile Cloud Networking is developing a cloud-based mobile communication service platform where service providers deliver virtualized wireless infrastructures integrated with high-level applications running on top of them. Mobile networks are...
Monitoring in mobile ad hoc networks (MANETs) constitutes a crucial service, as it enables the adaptation to the changing conditions in those networks based on the monitored state. Many monitoring mechanisms rely on a hierarchical structure, which must be maintained and suffers from sparsely populated networks, where the hierarchy might not be correctly established. Contrary to this structured design,...
TETRA (Terrestrial Trunked Radio) is ETSI defined standard for professional digital mobile radio network. It is mission critical system and one of most important parameter is reliability. Mobile functionality is of great importance for end users and special attention should be given to reselection parameters. The article gives a detailed explanation of the process of reselection, it is explained what...
In this paper, we present a novel bio-inspired trusted routing framework (B-iTRF) which composed of trust mechanism and routing strategy. For trust mechanism, B-iTRF monitors neighbors' behavior in real time and then assesses neighbors' trust value based on the priori knowledge. For routing strategy, each node finds routes to the Sink based on ant colony optimization. In the process of path finding,...
Mobile devices are already included in cloud domain which increases the utilization of cloud apps & services. As the mobile operators offers internal service over mobile network user easily set connected to the cloud. Due to availability of cloud more and more applications are deployed on mobile such as email, e-health, social networking apps etc. Due to 24x7 availability of network to mobile...
Coverage is an important metric used to measure the quality of service of wireless sensor networks monitoring a field of interest (FoI). Existing literature on the coverage problem assumes that the sensors are deployed directly in the FoI. These results cannot be applied in some applications like canal water surface monitoring, because the sensors cannot be deployed on the water surface. In this paper,...
In this work we examine a large dataset of 335 million anonymized call records made by 3 million users during 47 days in a region of northern Italy. Combining this dataset with publicly available user data, from different social networking ser-vices, we present a probabilistic approach to evaluate the potential of re-identification of the anonymized call records dataset. In this sense, our work explores...
Uniform load distribution is a major challenging area in wireless sensor networks. Sink mobility strategy achieves great success in uniform load distribution policy. In optimal sink mobility scheme, main problem is optimal path construction for sink movement with minimum message overhead. This paper reports an optimal path construction strategy for mobile sinks movement in wireless sensor network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.