The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current satellite network design is approaching an inflection point with mobile devices as the primary enduser devices. In addition, identifier/location separation is commonly used to enhance mobility in future satellite networks. To this end, a key issue must be addressed is the design of rapid mapping resolution system. In this work, a design overview of a rapid mapping resolution system is...
5G tends to be a multi-layered, multi-actor, and multi-access mobile network in order to fulfill the stringent availability, security, privacy and resilience requirements that are usually contradictory. In this paper, we propose a 5G vision based on softwarization. We provide a non-exhaustive list of current security, trust and resilience issues that are critical to be explored in 5G. We finally give...
With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. In this paper, we propose a privacy-preserving...
We present the first selectively secure hierarchical identity-based non-interactive key agreement (HIB-NIKA) in the standard model that does not explicitly require multilinear maps. We give a novel solution for resilience called "shadowing factor" to improve the security of HIB-NIKA and present a practical attack model of hierarchical key agreement to analyze the anti-forgery and anti-collusion...
To fully exploit the increasingly dense deployments of mobile base station (BS) infrastructure, this paper proposes a novel caching paradigm called explicit caching, which stores selective contents at BSs and exposes such contents to users for volunteer browsing and download. We formulate the explicit caching problem as a joint content recommendation and delivery problem, which aims to maximize the...
Hyper-dense network is a promising solution to the high mobile video traffic. However, it has some fundamental problems. To address these issues, we propose a novel information-centric cooperative video transmission strategy in hyper-dense networks via caching. In the proposed scheme, each video file is encoded into segments using maximum distance separable rateless code. Then, a portion of each segment...
In the present era of modern communication network, the importance of mobile technology can't be denied at all. The requirement of high speed internet access through these mobile devices seamlessly has been increased. The growing use of IP devices in the field of mobile network has generated a great demand of network mobility. To fulfill these demands, network mobility architecture has been studied...
Deployment of Network Function Virtualization (NFV) over multiple clouds accentuates its advantages like flexibility of virtualization, proximity to customers and lower total cost of operation. However, NFV over multiple clouds has not yet attained the level of performance to be a viable replacement for traditional networks. One of the reasons is the absence of a standard based Fault, Configuration,...
The design of routing protocol in mobile social delay tolerant networks is a tricky issue due to lack of stable end-to-end path, frequent link disconnection and changeable network topology. This paper proposes a novel routing algorithm based on dynamic topological potential and social relationship (DTPSR) between nodes for mobile social delay tolerant networks. In DTPSR, we define three metrics to...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
A Mobile Patient Monitoring System (MPMS) acquires patient's biosignals and transmits them using wireless network connection to the decision making module or healthcare professional for the assessment of patient's condition. An important research challenge in the MPMS is how to satisfy Quality of Service (QoS) requirements of biosignals delivery in the environment characterized by patient mobility,...
Computer network and security courses are essential parts of college computer science curriculum, and hands-on networking experience is well recognized as an effective approach to help students better understand the concepts of network and security. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up...
Device-to-device (D2D)-based mobile social networking (MSN) has been touted as a low-power, low-cost alternative to conventional MSN over cellular and WiFi networks. Nevertheless, the open nature of communication channels and the users' social activity that tend to decline over time expose D2D-based MSN to network contractions, which is a consequence of initial dropouts, combined with the jointly...
Because of the limited energies of sensors, efficient data gathering in wireless sensor network has been received a great deal of attention recently. To prolong the network lifetime, in this paper, we study the problem of scheduling a mobile sink to some specific nodes, termed anchor nodes in this paper, for data collection and reducing the energy consumption of data transmission. While considering...
Computation offloading is a key technique to enhance the performance and interactivity of mobile application through migrating the computation-intensive tasks to the cloud. However, efficient offloading is challenging in practice in that a mobile application often consists of computation tasks that have dependency with execution order constraints as well as parallel tasks that can be executed non-deterministically...
Computation offloading has received much attention to improve the performance or energy efficiency of mobile systems that have usually limited and constrained resource capacities. Yet, applying the computation offloading technique in opportunistic networks that are highly dynamic and often become volatile still remains a challenge due to the following reasons: (1) technical difficulties in constructing...
In this paper, we present the Dynamic Small cell Management (DSM) scheme to improve vehicular communications, focusing on the dynamic allocation of small cells when the macrocells cannot cope with the traffic generated by the connected cars. We have considered real base station deployments in the city of Dublin, Ireland, combined with realistic models of vehicle mobility, and small cell deployments...
In this paper, we call for a paradigm shift away from the wireless-access focused research efforts on 5G networked systems. We believe that the architectural limitations should share equal blame on issues of performance, reliability, and security. We thus identify architectural weakness on both sides of the mobile clients and the 4G network infrastructure. Our recent findings show that, contrary to...
Mobile Cloud Computing (MCC) leverages resourceful data centers that are distant (aka the cloud) or closely located (aka edge servers) for computational offloading to overcome resource limitations of modern mobile systems like smartphones or IoT devices. Many research works investigate context-aware offloading decision algorithms aiming to find the best offloading system at runtime. However, all approaches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.