4,187 research outputs found

    Signalling Storms in 3G Mobile Networks

    Full text link
    We review the characteristics of signalling storms that have been caused by certain common apps and recently observed in cellular networks, leading to system outages. We then develop a mathematical model of a mobile user's signalling behaviour which focuses on the potential of causing such storms, and represent it by a large Markov chain. The analysis of this model allows us to determine the key parameters of mobile user device behaviour that can lead to signalling storms. We then identify the parameter values that will lead to worst case load for the network itself in the presence of such storms. This leads to explicit results regarding the manner in which individual mobile behaviour can cause overload conditions on the network and its signalling servers, and provides insight into how this may be avoided.Comment: IEEE ICC 2014 - Communications and Information Systems Security Symposiu

    Network Traffic Aware Smartphone Energy Savings

    Get PDF
    In today\u27s world of ubiquitous Smartphone use, extending the battery life has become an important issue. A significant contributor to battery drain is wireless networking. Common usage patterns expect Smartphones to maintain a constant Internet connection which exacerbates the problem.;Our research entitled A Network Traffic Approach to Smartphone Energy Savings focuses on extending Smartphone battery life by investigating how network traffic impacts power management of wireless devices. We explore 1) Real-time VoIP application energy savings by exploiting silence periods in conversation. WiFi is opportunistically placed into low power mode during Silence periods. 2.) The priority of Smartphone Application network traffic is used to modifiy WiFi radio power management using machine learning assisted prioritization. High priority network traffic is optimized for performance, consuming more energy while low priority network traffic is optimized for energy conservation. 3.) A hybrid multiple PHY, MAC layer approach to saving energy is also utilized. The Bluetooth assisted WiFi approach saves energy by combining high power, high throughput WiFi with low power, lower throughput Bluetooth. The switch between Bluetooth and WiFi is done opportunistically based upon the current data rate and health of the Bluetooth connection.;Our results show that application specific methods for wireless energy savings are very effective. We have demonstrated energy savings exceeding 50% in generic cases. With real-time VoIP applications we have shown upwards of 40% energy savings while maintaining good call quality. The hybrid multiple PHY approach saves more than 25% energy over existing solutions while attaining the capability of quickly adapting to changes in network traffic

    Power Consumption Analysis, Measurement, Management, and Issues:A State-of-the-Art Review of Smartphone Battery and Energy Usage

    Get PDF
    The advancement and popularity of smartphones have made it an essential and all-purpose device. But lack of advancement in battery technology has held back its optimum potential. Therefore, considering its scarcity, optimal use and efficient management of energy are crucial in a smartphone. For that, a fair understanding of a smartphone's energy consumption factors is necessary for both users and device manufacturers, along with other stakeholders in the smartphone ecosystem. It is important to assess how much of the device's energy is consumed by which components and under what circumstances. This paper provides a generalized, but detailed analysis of the power consumption causes (internal and external) of a smartphone and also offers suggestive measures to minimize the consumption for each factor. The main contribution of this paper is four comprehensive literature reviews on: 1) smartphone's power consumption assessment and estimation (including power consumption analysis and modelling); 2) power consumption management for smartphones (including energy-saving methods and techniques); 3) state-of-the-art of the research and commercial developments of smartphone batteries (including alternative power sources); and 4) mitigating the hazardous issues of smartphones' batteries (with a details explanation of the issues). The research works are further subcategorized based on different research and solution approaches. A good number of recent empirical research works are considered for this comprehensive review, and each of them is succinctly analysed and discussed

    Electromagnetic pollution alert: Microwave radiation and absorption in human organs and tissues

    Get PDF
    Electromagnetic radiation from communication and electronic devices, networks, systems and base stations has drawn concern due to excessive global usage with increasing power and operating frequency level. Numerous previous researches only focus on how the radiation from certain frequency ranges of particular devices could harm specific human organs and tissues, resulting in distinct symptoms. In this research, electromagnetic propagation and properties in fourteen human organs and tissues were analyzed and investigated based on the organs and tissues’ electromagnetic and mechanical parameters, and chemical composition. Counting the organs and tissues as electromagnetic materials, their permittivity and conductivity, computed by a 4-Cole-Cole mode, directly respective to the operating frequency, are interrelated to wave behavior and hence influence the organs’ response. Tests were conducted in 1GHz to 105GHz system settings, covering most microwave frequency uses: 2.4GHz of 4G-LTE, WiFi, Bluetooth, ZigBee, and the 5G ranges: 28GHz of 5G-mmW and 95GHz of 5G-IoT. Trial human organs and tissues were placed in the wave propagation direction of 2.4GHz and 28GHz dipole antennas, and a waveguide port operating from 95-105GHz. The quantitative data on the effects of 5G penetration and dissipation within human tissues are presented. The absorbance in all organs and tissues is significantly higher as frequency increases. As the wave enters the organ-tissue model, the wavelength is shortened due to the high organ-tissue permittivity. Skin-Bone-Brain layer simulation results demonstrate that both electric and magnetic fields vanish before passing the brain layer at all three focal frequencies of 2.4GHz, 28GHz, and 100GHz

    Visible Light Communication Cyber Security Vulnerabilities For Indoor And Outdoor Vehicle-To-Vehicle Communication

    Get PDF
    Light fidelity (Li-Fi), developed from the approach of Visible Light Communication (VLC), is a great replacement or complement to existing radio frequency-based (RF) networks. Li-Fi is expected to be deployed in various environments were, due to Wi-Fi congestion and health limitations, RF should not be used. Moreover, VLC can provide the future fifth generation (5G) wireless technology with higher data rates for device connectivity which will alleviate the traffic demand. 5G is playing a vital role in encouraging the modern applications. In 2023, the deployment of all the cellular networks will reach more than 5 billion users globally. As a result, the security and privacy of 5G wireless networks is an essential problem as those modern applications are in people\u27s life everywhere. VLC security is as one of the core physical-layer security (PLS) solutions for 5G networks. Due to the fact that light does not penetrate through solid objects or walls, VLC naturally has higher security and privacy for indoor wireless networks compared to RF networks. However, the broadcasting nature of VLC caused concerns, e.g., eavesdropping, have created serious attention as it is a crucial step to validate the success of VLC in wild. The aim of this thesis is to properly address the security issues of VLC and further enhance the VLC nature security. We analyzed the secrecy performance of a VLC model by studying the characteristics of the transmitter, receiver and the visible light channel. Moreover, we mitigated the security threats in the VLC model for the legitimate user, by 1) implementing more access points (APs) in a multiuser VLC network that are cooperated, 2) reducing the semi-angle of LED to help improve the directivity and secrecy and, 3) using the protected zone strategy around the AP where eavesdroppers are restricted. According to the model\u27s parameters, the results showed that the secrecy performance in the proposed indoor VLC model and the vehicle-to-vehicle (V2V) VLC outdoor model using a combination of multiple PLS techniques as beamforming, secure communication zones, and friendly jamming is enhanced. The proposed model security performance was measured with respect to the signal to noise ratio (SNR), received optical power, and bit error rate (BER) Matlab simulation results
    • …
    corecore