1,156 research outputs found

    Social-aware hybrid mobile offloading

    Get PDF
    Mobile offloading is a promising technique to aid the constrained resources of a mobile device. By offloading a computational task, a device can save energy and increase the performance of the mobile applications. Unfortunately, in existing offloading systems, the opportunistic moments to offload a task are often sporadic and short-lived. We overcome this problem by proposing a social-aware hybrid offloading system (HyMobi), which increases the spectrum of offloading opportunities. As a mobile device is always co- located to at least one source of network infrastructure throughout of the day, by merging cloudlet, device-to-device and remote cloud offloading, we increase the availability of offloading support. Integrating these systems is not trivial. In order to keep such coupling, a strong social catalyst is required to foster user's participation and collaboration. Thus, we equip our system with an incentive mechanism based on credit and reputation, which exploits users' social aspects to create offload communities. We evaluate our system under controlled and in-the-wild scenarios. With credit, it is possible for a device to create opportunistic moments based on user's present need. As a result, we extended the widely used opportunistic model with a long-term perspective that significantly improves the offloading process and encourages unsupervised offloading adoption in the wild

    Tracking Infected Covid-19 Persons and their Proximity Users Using D2D in 5G Networks

    Get PDF
    The world witnessed a pandemic that needs to be limited. COVID-19 is a disease that spreads among people when an infected person is in close contact with another. To decrease the virus spreading, World Health Organization (WHO) imposed precautionary measures and suggested some rules to be followed such as social distancing and quarantining the infected people. We propose a model, using D2D and IoT technology, for tracking infected persons with COVID-19 and its proximity. If a person (mobile device) gets close to an infected person, he will also get infected, so by continuous moving, the infection will be transmitted. Thus, identifying the infected persons and their contacts will limit the spread of the disease. In each scenario, it is possible to distinguish the number of infected people and know from whom they are infected, and the location of the infection. The simulation shows the tracking of a mobile device when proximate infected person at a distance of 3 meters. As a result, our proposed D2D model is effective, especially in the scenario which found the infected person with COVID-19, tracks them, determines minimum distances, and recognizes the source of the infection. Thus, the model can limit the rapid spread of COVID-19 as it determines the 3meters distance from infected person and send precaution messages to the network

    An LTE-Direct-Based Communication System for Safety Services in Vehicular Networks

    Get PDF
    With the expected introduction of fully autonomous vehicles, the long-term evolution (LTE)-based vehicle-to-everything (V2X) networking approach is gaining a lot of industry attention, to develop new strategies to enhance safety and telematics features. The vehicular and wireless industries are currently considering the development of an LTE-based system, which may co-exist, with the IEEE 802.11p-based systems for some time. In light of the above fact, our objective is to investigate the development of LTE Proximity Service (ProSe)-based V2X architecture for time-critical vehicular safety applications in an efficient and cost-effective manner. In this chapter, we present a new cluster-based LTE sidelink-based vehicle-to-vehicle (V2V) multicast/broadcast architecture to satisfy the latency and reliability requirements of V2V safety applications. Our proposed architecture combines a new ProSe discovery mechanism for sidelink peer discovery and a cluster-based round-robin scheduling technique to distribute the sidelink radio resources among the cluster members. Utilizing an OMNET++ based simulation model, the performance of the proposed network architecture is examined. Results of the simulation show that the proposed algorithms diminish the end-to-end delay and overhead signaling as well as improve the data packet delivery ratio (DPDR) compared with the existing 3GPP ProSe vehicle safety application technique

    Architecture for public safety network using D2D communication

    Get PDF
    Device to Device (D2D) communication has been proposed as an underlay to Long-Term evolution (LTE) network as a means of harvesting the proximity, reuse and hop gains. However, D2D communication can also serve as a technology for providing public safety and disaster relief services. In this article, the basic concepts of D2D communications are first introduced and then existing fundamental works on disaster communication are discussed. We focus on the performance of the network architecture by utilizing the relay assisted transmission which can effectively enhance the capacity and power saving of the network. We also propose the distance based strategy to reduce the computational complexity and power transmission. Finally, simulation results are provided to verify the proposed architecture

    Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif

    Get PDF
    Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols

    User-oriented mobility management in cellular wireless networks

    Get PDF
    2020 Spring.Includes bibliographical references.Mobility Management (MM) in wireless mobile networks is a vital process to keep an individual User Equipment (UE) connected while moving within the network coverage area—this is required to keep the network informed about the UE's mobility (i.e., location changes). The network must identify the exact serving cell of a specific UE for the purpose of data-packet delivery. The two MM procedures that are necessary to localize a specific UE and deliver data packets to that UE are known as Tracking Area Update (TAU) and Paging, which are burdensome not only to the network resources but also UE's battery—the UE and network always initiate the TAU and Paging, respectively. These two procedures are used in current Long Term Evolution (LTE) and its next generation (5G) networks despite the drawback that it consumes bandwidth and energy. Because of potentially very high-volume traffic and increasing density of high-mobility UEs, the TAU/Paging procedure incurs significant costs in terms of the signaling overhead and the power consumption in the battery-limited UE. This problem will become even worse in 5G, which is expected to accommodate exceptional services, such as supporting mission-critical systems (close-to-zero latency) and extending battery lifetime (10 times longer). This dissertation examines and discusses a variety of solution schemes for both the TAU and Paging, emphasizing a new key design to accommodate 5G use cases. However, ongoing efforts are still developing new schemes to provide seamless connections to the ever-increasing density of high-mobility UEs. In this context and toward achieving 5G use cases, we propose a novel solution to solve the MM issues, named gNB-based UE Mobility Tracking (gNB-based UeMT). This solution has four features aligned with achieving 5G goals. First, the mobile UE will no longer trigger the TAU to report their location changes, giving much more power savings with no signaling overhead. Instead, second, the network elements, gNBs, take over the responsibility of Tracking and Locating these UE, giving always-known UE locations. Third, our Paging procedure is markedly improved over the conventional one, providing very fast UE reachability with no Paging messages being sent simultaneously. Fourth, our solution guarantees lightweight signaling overhead with very low Paging delay; our simulation studies show that it achieves about 92% reduction in the corresponding signaling overhead. To realize these four features, this solution adds no implementation complexity. Instead, it exploits the already existing LTE/5G communication protocols, functions, and measurement reports. Our gNB-based UeMT solution by design has the potential to deal with mission-critical applications. In this context, we introduce a new approach for mission-critical and public-safety communications. Our approach aims at emergency situations (e.g., natural disasters) in which the mobile wireless network becomes dysfunctional, partially or completely. Specifically, this approach is intended to provide swift network recovery for Search-and-Rescue Operations (SAROs) to search for survivors after large-scale disasters, which we call UE-based SAROs. These SAROs are based on the fact that increasingly almost everyone carries wireless mobile devices (UEs), which serve as human-based wireless sensors on the ground. Our UE-based SAROs are aimed at accounting for limited UE battery power while providing critical information to first responders, as follows: 1) generate immediate crisis maps for the disaster-impacted areas, 2) provide vital information about where the majority of survivors are clustered/crowded, and 3) prioritize the impacted areas to identify regions that urgently need communication coverage. UE-based SAROs offer first responders a vital tool to prioritize and manage SAROs efficiently and effectively in a timely manner

    The Design and Implementation of Middleware for Application Development within Honeybee Computing Environment

    Get PDF
    Computing technology is now moving from ubiquitous computing into advanced ubiquitous computing environment. An advanced ubiquitous environment is an extension of ubiquitous environment that improve connectivity between devices. This computing environment has five major characteristics, namely: large number of heterogeneous devices; new communication technology; mobile ad hoc network (MANET); peer-to-peer communication; and Internet of Things. Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives, which is a project initiated within Digital Malaysia. This paper describes the design and implementation of a middleware to support application development within Honeybee computing environment

    Contents

    Get PDF
    corecore