336,905 research outputs found

    Handoff Management: A Critical Function in Mobility Management for Fourth Generation (4G) Wireless Networks

    Get PDF
    Efficient mobility management techniques are critical to the success of next-generation wireless systems. Handoff management, which is one of the two basic functions of mobility management, has become more critical in fourth generation wireless networks which support multimedia services. The paper treats basic issues involved in handoff management aspect of general mobility management in wireless communication systems. The relevance of mobility management, handoff management, and general mobility management protocols are explained. The taxonomy of handoff mechanisms, causes of delays in handoffs, and security in handoff procedures are elicited. The paper concludes highlighting some open areas of research in providing seamless services

    A robust self-organized public key management for mobile ad hoc networks

    Get PDF
    A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any security framework of MANETs. However, traditional solutions to key management through accessing trusted authorities or centralized servers are infeasible for MANETs due to the absence of infrastructure, frequent mobility, and wireless link instability. In this paper, we propose a robust self-organized, public key management for MANETs. The proposed scheme relies on establishing a small number of trust relations between neighboring nodes during the network initialization phase. Experiences gained as a result of successful communications and node mobility through the network enhance the formation of a web of trust between mobile nodes. The proposed scheme allows each user to create its public key and the corresponding private key, to issue certificates to neighboring nodes, and to perform public key authentication through at least two independent certificate chains without relying on any centralized authority. A measure of the communications cost of the key distribution process has been proposed. Simulation results show that the proposed scheme is robust and efficient in the mobility environment of MANET and against malicious node attacks

    Mobility Management, Quality of Service, and Security in the Design of Next Generation Wireless Network

    Full text link
    The next generation wireless network needs to provide seamless roaming among various access technologies in a heterogeneous environment. In allowing users to access any system at anytime and anywhere, the performance of mobility-enabled protocols is important. While Mobile IPv6 is generally used to support macro-mobility, integrating Mobile IPv6 with Session Initiation Protocol (SIP) to support IP traffic will lead to improved mobility performance. Advanced resource management techniques will ensure Quality of Service (QoS) during real-time mobility within the Next Generation Network (NGN) platform. The techniques may use a QoS Manager to allow end-to-end coordination and adaptation of Quality of Service. The function of the QoS Manager also includes dynamic allocation of resources during handover. Heterogeneous networks raise many challenges in security. A security entity can be configured within the QoS Manager to allow authentication and to maintain trust relationships in order to minimize threats during system handover. The next generation network needs to meet the above requirements of mobility, QoS, and security

    On secure communication in integrated internet and heterogeneous multi-hop wireless networks.

    Get PDF
    Integration of the Internet with a Cellular Network, WMAN, WLAN, and MANET presents an exceptional promise by having co-existence of conventional WWANs/WMANs/WLANs with wireless ad hoc networks to provide ubiquitous communication. We call such integrated networks providing internet accessibility for mobile users as heterogeneous multi-hop wireless networks where the Internet and wireless infrastructure such as WLAN access points (APs) and base stations (BSs) constitute the backbone for various emerging wireless networks (e.g., multi-hop WLAN and ad hoc networks. Earlier approaches for the Internet connectivity either provide only unidirectional connectivity for ad hoc hosts or cause high overhead as well as delay for providing full bi-directional connections. In this dissertation, a new protocol is proposed for integrated Internet and ad hoc networks for supporting bi-directional global connectivity for ad hoc hosts. In order to provide efficient mobility management for mobile users in an integrated network, a mobility management protocol called multi-hop cellular IP (MCIP) has been proposed to provide a micro-mobility management framework for heterogeneous multi-hop network. The micro-mobility is achieved by differentiating the local domain from the global domain. At the same time, the MCIP protocol extends Mobile IP protocol for providing macro-mobility support between local domains either for single hop MSs or multi-hop MSs. In the MCIP protocol, new location and mobility management approaches are developed for tracking mobile stations, paging, and handoff management. This dissertation also provides a security protocol for integrated Internet and MANET to establish distributed trust relationships amongst mobile infrastructures. This protocol protects communication between two mobile stations against the attacks either from the Internet side or from wireless side. Moreover, a secure macro/micro-mobility protocol (SM3P) have been introduced and evaluated for preventing mobility-related attacks either for single-hop MSs or multi-hop MSs. In the proposed SM3P, mobile IP security has been extended for supporting macro-mobility across local domains through the process of multi-hop registration and authentication. In a local domain, a certificate-based authentication achieves the effective routing and micro-mobility protection from a range of potential security threats

    Converging technologies and de-perimeterisation: towards risky active insulation

    Get PDF
    In converging technologies (Roco and Bainbridge, 2003), boundaries between previously separated technologies become permeable. A similar process is also taking place within information technology. In what is called de-perimeterisation (Jericho Forum, 2005), the boundaries of the information infrastructures of organisations dissolve. Where previously a firewall was used to separate the untrusted outside from the trusted inside, outsourcing of information management and mobility of employees make it impossible to rely on such a clearly located security perimeter. In this paper, we ask the question to what extent these developments represent a similar underlying shift in design assumptions, and how this relates to risk management (cf. Perrow, 1999). We investigate this question from the perspective of the system theory of Niklas Luhmann (1979, 1988, 2005 [1993])

    Protection and efficient management of big health data in cloud environment

    Full text link
    University of Technology Sydney. Faculty of Engineering and Information Technology.Healthcare data has become a great concern in the academic world and in industry. The deployment of electronic health records (EHRs) and healthcare-related services on cloud platforms will reduce the cost and complexity of handling and integrating medical records while improving efficiency and accuracy. To make effective use of advanced features such as high availability, reliability, and scalability of Cloud services, EHRs have to be stored in the clouds. By exposing EHRs in an outsourced environment, however, a number of serious issues related to data security and privacy, distribution and processing such as the loss of the controllability, different data formats and sizes, the leakage of sensitive information in processing, sensitive-delay requirements has been naturally raised. Many attempts have been made to address the above concerns, but most of the attempts tackled only some aspects of the problem. Encryption mechanisms can resolve the data security and privacy requirements but introduce intensive computing overheads as well as complexity in key distribution. Data is not guaranteed being protected when it is moved from one cloud to another because clouds may not use equivalent protection schemes. Sensitive data is being processed at only private clouds without sufficient resources. Consequently, Cloud computing has not been widely adopted by healthcare providers and users. Protecting and managing health data efficiently in many aspects is still an open question for current research. In this dissertation, we investigate data security and efficient management of big health data in cloud environments. Regarding data security, we establish an active data protection framework to protect data; we investigate a new approach for data mobility; we propose trusted evaluation for cloud resources in processing sensitive data. For efficient management, we investigate novel schemes and models in both Cloud computing and Fog computing for data distribution and data processing to handle the rapid growth of data, higher security on demand, and delay requirements. The novelty of this work lies in the novel data mobility management model for data protection, the efficient distribution scheme for a large-scale of EHRs, and the trust-based scheme in security and processing. The contributions of this thesis can be summarized according to data security and efficient data management. On data security, we propose a data mobility management model to protect data when it is stored and moved in clouds. We suggest a trust-based scheduling scheme for big data processing with MapReduce to fulfil both privacy and performance issues in a cloud environment. • The data mobility management introduces a new location data structure into an active data framework, a Location Registration Database (LRD), protocols for establishing a clone supervisor and a Mobility Service (MS) to handle security and privacy requirements effectively. The model proposes a novel security approach for data mobility and leads to the introduction of a new Data Mobility as a Service (DMaaS) in the Cloud. • The Trust-based scheduling scheme investigates a novel composite trust metric and a real-time trust evaluation for cloud resources to provide the highest trust execution on sensitive data. The proposed scheme introduces a new approach for big data processing to meet with high security requirements. On the efficient data management, we propose a novel Hash-Based File Clustering (HBFC) scheme and data replication management model to distribute, store and retrieve EHRs efficiently. We propose a data protection model and a task scheduling scheme which is Region-based for Fog and Cloud to address security and local performance issues. • The HBFC scheme innovatively utilizes hash functions to cluster files in defined clusters such that data can be stored and retrieved quickly while maintaining the workload balance efficiently. The scheme introduces a new clustering mechanism in managing a large-scale of EHRs to deliver healthcare services effectively in the cloud environment. • The trust-based scheduling model uses the proposed trust metric for task scheduling with MapReduce. It not only provides maximum trust execution but also increases resource utilization significantly. The model suggests a new trust-oriented scheduling mechanism between tasks and resources with MapReduce. • We introduce a novel concept “Region” in Fog computing to handle the data security and local performance issues effectively. The proposed model provides a novel Fog-based Region approach to handle security and local performance requirements. We implement and evaluate our proposed models and schemes intensively based on both real infrastructures and simulators. The outcomes demonstrate the feasibility and the efficiency of our research in this thesis. By proposing innovative concepts, metrics, algorithms, models, and services, the significant contributions of this thesis enable both healthcare providers and users to adopt cloud services widely, and allow significant improvements in providing better healthcare services

    Designing MPAs for food security in open-access fisheries

    Get PDF
    Food security remains a principal challenge in the developing tropics where communities rely heavily on marine-based protein. While some improvements in fisheries management have been made in these regions, a large fraction of coastal fisheries remain unmanaged, mismanaged, or use only crude input controls. These quasi-open-access conditions often lead to severe overfishing, depleted stocks, and compromised food security. A possible fishery management approach in these institution-poor settings is to implement fully protected marine protected areas (MPAs). Although the primary push for MPAs has been to solve the conservation problems that arise from mismanagement, MPAs can also benefit fisheries beyond their borders. The literature has not completely characterized how to design MPAs under diverse ecological and economic conditions when food security is the objective. We integrated four key biological and economic variables (i.e., fish population growth rate, fish mobility, fish price, and fishing cost) as well as an important aspect of reserve design (MPA size) into a general model and determined their combined influence on food security when MPAs are implemented in an open-access setting. We explicitly modeled open-access conditions that account for the behavioral response of fishers to the MPA; this approach is distinct from much of the literature that focuses on assumptions of “scorched earth” (i.e., severe over-fishing), optimized management, or an arbitrarily defined fishing mortality outside the MPA’s boundaries. We found that the MPA size that optimizes catch depends strongly on economic variables. Large MPAs optimize catch for species heavily harvested for their high value and/or low harvesting cost, while small MPAs or no closure are best for species lightly harvested for their low value and high harvesting cost. Contrary to previous theoretical expectations, both high and low mobility species are expected to experience conservation benefits from protection, although, as shown previously, greater conservation benefits are expected for low mobility species. Food security benefits from MPAs can be obtained from species of any mobility. Results deliver both qualitative insights and quantitative guidance for designing MPAs for food security in open-access fisheries

    Survey Paper: Mobility Management in Heterogeneous Wireless Networks

    Get PDF
    AbstractEver increasing user demands and development of modern communication technologies have led to the evolution of communication networks from 1st Generation (1G) network to 4G heterogeneous networks. Further, 4G with heterogeneous network environment will provide features such as, “Always Best Connected”, “Anytime Anywhere” and seamless communication. Due to diverse characteristics of heterogeneous networks such as bandwidth, latency, cost, coverage and Quality of Service (QoS) etc., there are several open and unsolved issues namely mobility management, network administration, security etc. Hence, Designing proficient mobility management to seamlessly integrate heterogeneous wireless networks with all-IP is the most challenging issue in 4G networks. Mobile IPv6 (MIPv6) developed by Internet Engineering Task Force (IETF) has mobility management for the packet-switched devices of homogeneous wireless networks. Further, mobility management of homogeneous networks depends on network related parameter i.e., Received Signal Strength (RSS). However the mobility management of heterogeneous networks, not only depends on network related parameters, but also on terminal-velocity, battery power, location information, user-user profile & preferences and service-service capabilities & QoS etc. Designing mobility management with all-IP, while, considering issues such as context of networks, terminal, user and services is the main concern of industry and researchers in the current era

    An Efficient Authentication Protocol Based on Chebyshev Chaotic Map for Intelligent Transportation

    Get PDF
    For meeting the demands of safety, traffic management, and high mobility, vehicular adhoc network (VANET) has become a promising component for smart transportation systems. However, the wireless environment of vehicular network leads to various challenges in the communication security. Hence, several authentication schemes have previously been proposed to address VANET security issues but their procedures disregard the balance between effectiveness and security. Thus, this paper presents a new decentralized authentication protocol that relies on lightweight functions such as the Chebyshev chaotic map and logical shift operator to achieve the high mobility requirement. In order to reduce the number of messages transferred over the network, this protocol attempts to eliminate any redundant authentication steps during its authentication stage. Additionally, the new protocol solves key management problems by applying a little modification to the public key infrastructure to ignore certificates transmission over the network. The proposed design incorporates the self-authentication concept to safeguard the vehicle trip route on the road. Moreover, the performance evaluation is conducted to verify that the proposed protocol outperforms the most related scheme in terms of security and efficiency aspects. Finally, the Scyther simulation validates the security robustness of the new protocol
    • …
    corecore