Search results for "Core network"

showing 9 items of 9 documents

Fifth Generation Networking Principles for a Service Driven Future Internet Architecture

2010

Published version of an article published in Wireless Personal Communications, vol. 57:393-411. Also available from the publisher at: http://dx.doi.org/10.1007/s11277-010-0076-7 The vision of all-IP networks where IP forms the simple common layer understandable across the whole network has undeniable advantages. However, such simplicity comes as a major hurdle to flexibility and functionality to the architecture. This is evident from the increasingly numerous and complex engineering solutions and optimizations required to accommodate essential qualities like mobility, security, realtime communication support etc or to mitigate the shortcomings inherent in the 'traditional Internet' architec…

Enterprise architecture frameworkComputer sciencecomputer.internet_protocolDistributed computingSolution architectureInteroperabilityCore networkcomputer.software_genreDatabase-centric architectureVDP::Mathematics and natural science: 400::Information and communication science: 420::Theoretical computer science programming languages and programming theory: 421Next-generation networkReference architectureElectrical and Electronic EngineeringNetwork architecturebusiness.industryQuality of serviceService-oriented architectureComputer Science ApplicationsFuture Internet network architecture service oriented architecture ROSAApplications architectureOpen network architectureThe InternetWeb serviceSpace-based architecturebusinesscomputerWireless Personal Communications
researchProduct

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

Evaluation of web-based implementation for O&M functionality in mobile core network

2006

operation and maintenanceohjelmointiympäristökäyttöliittymätmobile core networkJ2EEperformance managementmatkapuhelinjärjestelmätUMTSnetwork managementGSMnetwork element
researchProduct

Proxy Mobile IPv6-Based Seamless Handover

2013

A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…

Access networkHandoverWireless networkMobile IPbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCore networkbusinessProxy Mobile IPv6Mobility managementIPv6Computer network
researchProduct

Gigabit Ethernet backbones with active loops

2001

The current standard Ethernet switches are based on the Spanning Tree (ST) protocol. Their most important restriction is that they can not work when the topology has active loops. In fact, the ST protocol selects a tree from the real topology by blocking the links that are not involved in the tree. This restriction produces a network traffic unbalancing behavior saturating those link near the root switch while rest of links will be idle or with a very low utilization. This paper proposes a new transparent switch protocol for Gigabit Ethernet backbones that considerably improves the performance of current ones. The proposed protocol is named ALOR for Active Loops and Optimal Routing. ALOR pr…

EthernetMedia Redundancy ProtocolEthernet Global Data ProtocolComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEthernet flow controlGigabit EthernetLocal area networkCore networkJumbo frameSpanning Tree ProtocolNetwork topologyMetro EthernetSynchronous EthernetNetwork interface controllerGigabitEtherChannelFiber Distributed Data InterfacebusinessATA over EthernetComputer networkCarrier EthernetInternational Conference on Parallel Processing, 2001.
researchProduct

GPRS Security for Smart Meters

2013

Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.

GPRSComputer science[SHS.INFO]Humanities and Social Sciences/Library and information sciences02 engineering and technology[INFO] Computer Science [cs]Encryption[SHS.INFO] Humanities and Social Sciences/Library and information sciencesGPRS core networkAMI0202 electrical engineering electronic engineering information engineeringWirelessMetering mode[INFO]Computer Science [cs]General Packet Radio ServiceSmartgridMobile network operatorAuthenticationbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunicationsSmart gridSecuritybusinessSmart MeteringComputer network
researchProduct

Low-Latency Infrastructure-Based Cellular V2V Communications for Multi-Operator Environments With Regional Split

2021

Mobile network operators are interested in providing Vehicle-to-Vehicle (V2V) communication services using their cellular infrastructure. Regional split of operators is one possible approach to support multi-operator infrastructure-based cellular V2V communication. In this approach, a geographical area is divided into non-overlapping regions, each one served by a unique operator. Its main drawback is the communication interruption motivated by the inter-operator handover in border areas, which prevents the fulfillment of the maximum end-to-end (E2E) latency requirements of fifth generation (5G) V2V services related to autonomous driving. In this work, we enable a fast inter-operator handove…

Mobile edge computingbusiness.industryComputer scienceMechanical EngineeringCore networkComputer Science ApplicationsBroadcasting (networking)HandoverServerAutomotive EngineeringCellular networkLatency (engineering)businessComputer networkIEEE Transactions on Intelligent Transportation Systems
researchProduct

Flexible modeling for anatomically-based cardiac conduction system construction.

2010

We present a method to automatically deploy the peripheral section of the cardiac conduction system in ventricles. The method encodes anatomical information thorough rules that ensure that Purkinje network structures generated are realistic and comparable to those observed in ex-vivo studies. The core methodology is based in non-deterministic production rules that are parameterized by means of statistical functions. Input parameters allow the construction of a great diversity of Purkinje structures that could be incorporated in fine element ventricular models to perform electrophysiology simulations. Resulting Purkinje trees show good geometrical approximations of Purkinje core network and …

Models AnatomicEngineeringPurkinje fibersbusiness.industryBiological clockModels CardiovascularCore networkParameterized complexityNetwork structureAction PotentialsPurkinje Fibersmedicine.anatomical_structureBiological ClocksmedicineElectronic engineeringAnimalsHumansComputer SimulationElectrical conduction system of the heartbusinessStatistical functionAlgorithmAnnual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual International Conference
researchProduct