The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In all mobile communication scenario, it is envisaged that user identity remains confidential. Universal Mobile Telecommunication System (UMTS) is no exception to this. Every Mobile Station (MS) in UMTS is assigned a unique International Mobile Subscriber Identity (IMSI). If this IMSI is compromised, so will be the user identity. There is restriction on transmission of this IMSI over radio link. Unfortunately,...
Mobile devices like PDAs or mobile phones have become widespread. Similarly network functionality like GSM, Bluetooth or WLAN has become a standard. Nevertheless, not many applications take mobility into account. An application and its communication component are tightly coupled and the applications assume that network behavior does not change. Here in this project we propose and implement a new component...
In wireless sensor networks, many studies on data dissemination to individual mobile sinks traditionally rely on a strategy that consists of a virtual infrastructure to serve current location of the mobile sinks and a per-sink foot-print chaining mechanism to support local mobility after location update. To adapt the strategy for supporting mobile sink groups, it may be simply considered to exploit...
Web Service technologies are state of the art in current enterprise distributed applications. To integrate highly resource-constrained devices, such as sensor nodes, into enterprise applications via Web Services, gateways are commonly used. Our aim was to investigate the intermediate, homogeneous communication between enterprise applications and highly resource-constrained devices. We therefore present...
We propose two scheduling protocols which are applicable to two-hop relay networks based on mobile WiMAX system: the first protocol adopts a persistent scheduling (PS) scheme in both hops, called the PS-PS protocol, while the second protocol adopts the PS scheme only in the first hop and the dynamic scheduling (DS) scheme in the second hop, called the PS-DS protocol. We optimize the above two protocols...
OWD is becoming increasingly important nowadays, as SLA agreements use it as a parameter to ensure QoS levels. However, its measurement is still a much debated topic due to the difficulty in the clock synchronization process. The paper approaches a new methodology to measure OWD, using NTP protocol with virtual clocks and bigger packets. This approach works over a measurement tool developed by the...
In this paper, we propose the Network Service Platform (NSP), which is a framework to develop network services using real-world data efficiently, and implement its application. We implemented a prototype system based on NSP using GPS data and image data obtained from cell phones. This service integrates internet services with ubiquitous services by using the Robot Service Network Protocol (RSNP),...
An architecture for wireless communication between control centers and registered users in emergency situations when the cellular network is not operational is described. It is based on delay tolerant networks (DTN) and enables mobile users with multiple radio interface technologies to communicate across heterogeneous network technologies. With the help of asynchronous bundles passing from hop to...
NFC technology can be integrated into existing systems to simplify and speed up the process of monitoring and control of these systems. In this paper we address a problem pertaining to the complexity of the monitoring and control of sensor or measurement equipment. Manual monitoring of measurement systems can be a tedious endeavor, especially in systems where the measurements are numerous and at regular...
There are more sensors connected to the Internet today and corporations predict that there will be billions of sensors within the decade. With billions of sensors, there is an opportunity for new behavior from applications in mobile devices based on sensor input. But such applications require a mechanism to provide a manageable subset of sensors, relevant to the user's current situation; since no...
End-to-end QoS is a challenge for future Internet. A per flow resource reservation can be carried out among heterogeneous domains on the communication path using signaling protocols. When one or both communicating terminals are mobile there is additional complexity. Signaling delays and resource lacking on future paths can dramatically impact user experience. In this paper, a rational future path...
IP reconfiguration using DHCP is the usual approach followed by mobile nodes (MNs) when they roam from one network to another one. However, DHCP is too slow for cooping with fast handover requirements. This article describes a cross-layer approach for accelerating DHCP-based IP reconfigurations in a mobility scenario across 802.11 access points (APs). DHCP transactions are initiated by neighboring...
Rumor Routing is one of the routing algorithm categories in wireless sensor networks which is well extended and optimized in the recent years. Common principal ideas in all rumor routing algorithms are conjunction of query-agents with the traversed path of event information propagator agents in the network. In this paper we propose a new method to reduce the number of routing agents to consequently...
For mobile multi-hop wireless network, IEEE 802.16j/MR network can not only supply large area wireless deployment, but also provide high quality network service to mobile users. In this paper, we will be focusing on QoS supporting for mobile users in the IEEE 802.16-MR network. The probability of a mobile user who visits a RS is known beforehand. With the same visiting probability of each RS and the...
Cooperative vehicular systems are being developed to improve traffic safety and efficiency through the dynamic exchange of information between vehicles and between vehicles and infrastructure units. Different communication protocols and policies have been proposed in the literature with diverse objectives, normally taking into account network performance metrics only. This paper illustrates the need...
Securing Network Program update is essential for many crucial military applications. Present Network Programming protocols proposed by Hailun Tan et al. provides confidentiality and authentication with high computational effort and power consumption. We have developed a confidential network program update protocol for clustered wireless sensor networks. Our scheme has two phases, key computation phase...
We propose a network management system which is suitable to disaster situation in U-city environment. U-city is a smart city with the intelligent convergence system that integrates IT technology and urban engineering technology such as environment, road traffic, safe and GIS. The network used in U-city should provide services without transmission failure and support functionality which enlarges the...
In heterogeneous wireless networks, multi-interfaced mobile terminals may be connected to links with rapidly varying MAC and physical characteristics. On the other hand, current deployment of communication protocols rely on the information available at associated layer only. In order to improve transport layer performance for multi-homed mobile terminals, we propose a cross-layer approach to schedule...
The near future will see production vehicles equipped with intelligent Advanced Driving Systems using various sensor modalities. Meanwhile, other aspects such as Vehicle-to-Vehicle (V2V) communications have emerged as means of assisting drivers. We propose a framework (V2Eye) in which V2V augments and extends the range of visual sensors in ways that have yet to be explored.
Mobile networks can be formed in bus, train, aircrafts, satellites with a wide variety of on-board IP-enable devices and Network Mobility (NEMO) protocols are required to support uninterrupted services to ongoing sessions. Node mobility has a direct impact on the performance evaluation of various NEMO protocols. However, most of the analysis on mobility protocols used random waypoint mobility model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.