Search results for "mobile network"
showing 10 items of 21 documents
UMTS radio networks
2006
Publisher Summary This chapter reviews the contributions to the UMTS radio network planning, with the optimization being provided from COST 273 and the real-time tuning, which is related to RRM. The results on UTRAN performance evaluation by the means of simulation tools are also discussed. The UMTS planning includes processes like: the propagation and traffic models, the aspects of parameter planning, and the automatic planning algorithms. An accurate ray-tracing model integrated in a UMTS-capable planning tool allows the radio network planner to reach optimal numbers for the BS deployment and configuration while meeting the service level requirements. Ray tracing can identify the problem …
A “Best Current Practice” for 3GPP-based cellular system security
2014
This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…
GPRS Security for Smart Meters
2013
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…
Handover management in heterogenous mobile and wireless networks
2015
Since 1990, networking and mobile technologies have made a phenomenal unprecedented progress. This progress has been experienced on multiple fronts in parallel; especially on the application level and the user's needs one. This rapid evolution of the technology imposed a need for the existence of heterogeneous environments where the coverage is ensured throughout the different available networks. The challenge with such architecture would be to provide the user with the ability to navigate through the different available networks in a transparent and seamless fashion. However, the navigation among different types of networks is commonly referred to as vertical Handover. The IEEE 802.21 stan…
Modelling Mobile Encounter Networks
2006
This article presents mobile encounter networks, which emerge when mobile devices come across each other and form a temporary connection between them using a common short-range radio technology. Local information exchanges between mobile devices results in a broadcast diffusion of information to other users of the network with a delay. In addition to presenting the concept of mobile encounter networks, we also provide an abstract method for describing the information diffusion process inside them. peerReviewed
Mobile Search - Social Network Search Using Mobile Devices Demonstration
2008
Mobile search prototype demonstrates the possibilities of social network search in N800 mobile devices. Search is initiated from a N800 mobile device to search the contacts in mobile device's addressbook. The contacts can be other N800 mobile devices running mobile Web server or normal Web servers in the Internet with Drupal content management system. Mobile device users can select which of their personal information such as phone numbers, calendar data etc. to share via a mobile Web server. The proposed search mechanism has many benefits compared to centralized Web search engines like Google. The search can locate information which is not referenced anywhere and thus allows hidden or rare …
Mobile Encounter Networks and Their Applications
2008
This article presents mobile encounter networks (MENs), which emerge when mobile devices come across each other and form a temporary connection between them using a common short-range radio technology. Local information exchanges between mobile devices results in a broadcast diffusion of information to other users of the network with a delay. Gasoline price comparison system (GPCS), which delivers newest gasoline prices to mobile users using mobile encounter information diffusion, is described as well as other application areas where MENs could be used. The feasibility of building MENs using bluetooth is tested with the BlueCheese mobile encounter network middleware and it is found that the…
Efficient Steering Mechanism for Mobile Network-Enabled UAVs
2022
HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the players resulting from the decentralized intelligence given to the player. Another limitation is the bottleneck link that could happen at any time during the streaming session and anywhere in the network. These issues may result in wobbling bandwidth perception by the players and could lead to missing the deadline for chunk downloads, which result …
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 …
2002
The recent NSF Workshop on Infrastructure for Mobile and Wireless Systems, held on Oct. 15, 2001 in Phoenix had a goal of defining and establishing a common infrastructure for the discipline of mobile wireless networking. This consensus-based paper is the outcome of that workshop. The paper provides a foundation for implementation, standardization, and further research and discussion on the issues of what should constitute such an infrastructure. Workshop participants came from many different wireless communities, including those of communications, operating systems, core networking, mobility, databases, and middleware. The workshop presented various research directions in the field and inc…