Search results for "Core network"
showing 9 items of 9 documents
Fifth Generation Networking Principles for a Service Driven Future Internet Architecture
2010
Published version of an article published in Wireless Personal Communications, vol. 57:393-411. Also available from the publisher at: http://dx.doi.org/10.1007/s11277-010-0076-7 The vision of all-IP networks where IP forms the simple common layer understandable across the whole network has undeniable advantages. However, such simplicity comes as a major hurdle to flexibility and functionality to the architecture. This is evident from the increasingly numerous and complex engineering solutions and optimizations required to accommodate essential qualities like mobility, security, realtime communication support etc or to mitigate the shortcomings inherent in the 'traditional Internet' architec…
A “Best Current Practice” for 3GPP-based cellular system security
2014
This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
Evaluation of web-based implementation for O&M functionality in mobile core network
2006
Proxy Mobile IPv6-Based Seamless Handover
2013
A prospective next generation wireless network is expected to integrate harmoniously into an IP-based core network. It is widely anticipated that IP-layer handover is a feasible solution to global mobility. However, the performance of IP-layer handover based on basic Mobile IP (MIP) cannot support real time services very well due to long handover delay. The Internet Engineering Task Force (IETF) Network-based Localized Mobility Management (NETLMM) working group developed a network-based localized mobility management protocol called Proxy Mobile IPv6 (PMIPv6) to reduce the handoff latency of MIPv6. Moreover, PMIPv6 provides the IP with the mobility to support User Equipments (UEs) without it…
Gigabit Ethernet backbones with active loops
2001
The current standard Ethernet switches are based on the Spanning Tree (ST) protocol. Their most important restriction is that they can not work when the topology has active loops. In fact, the ST protocol selects a tree from the real topology by blocking the links that are not involved in the tree. This restriction produces a network traffic unbalancing behavior saturating those link near the root switch while rest of links will be idle or with a very low utilization. This paper proposes a new transparent switch protocol for Gigabit Ethernet backbones that considerably improves the performance of current ones. The proposed protocol is named ALOR for Active Loops and Optimal Routing. ALOR pr…
GPRS Security for Smart Meters
2013
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.
Low-Latency Infrastructure-Based Cellular V2V Communications for Multi-Operator Environments With Regional Split
2021
Mobile network operators are interested in providing Vehicle-to-Vehicle (V2V) communication services using their cellular infrastructure. Regional split of operators is one possible approach to support multi-operator infrastructure-based cellular V2V communication. In this approach, a geographical area is divided into non-overlapping regions, each one served by a unique operator. Its main drawback is the communication interruption motivated by the inter-operator handover in border areas, which prevents the fulfillment of the maximum end-to-end (E2E) latency requirements of fifth generation (5G) V2V services related to autonomous driving. In this work, we enable a fast inter-operator handove…
Flexible modeling for anatomically-based cardiac conduction system construction.
2010
We present a method to automatically deploy the peripheral section of the cardiac conduction system in ventricles. The method encodes anatomical information thorough rules that ensure that Purkinje network structures generated are realistic and comparable to those observed in ex-vivo studies. The core methodology is based in non-deterministic production rules that are parameterized by means of statistical functions. Input parameters allow the construction of a great diversity of Purkinje structures that could be incorporated in fine element ventricular models to perform electrophysiology simulations. Resulting Purkinje trees show good geometrical approximations of Purkinje core network and …