2 research outputs found

    Network-assisted Smart Access Point Selection for Pervasive Real-time mHealth Applications

    Get PDF
    AbstractDue to the fast evolution of wireless access networks and high-performance mobile devices together with the spreading of wearable medical sensors, electronic healthcare (eHealth) services have recently started to receive more and more attention, especially in the mobile Health (mHealth) domain. The vast majority of mHealth services require strict medical level Quality of Service (QoS) and Quality of Experience (QoE) provision. Emergency use-cases, remote patient monitoring, tele-consultation and guided surgical intervention require real-time communication and appropriate connection quality. The increasing significance of different overlapping wireless accesses makes possible to provide the required network resources for ubiquitous and pervasive mHealth applications. Aiming to support such use-cases in a heterogeneous network environment, we propose a network-assisted intelligent access point selection scheme for ubiquitous applications of Future Internet architectures focusing on real-time mobile telemedicine services. Our solution is able to discover nearby base stations that cover the current location of the mobile device efficiently and to trigger heterogeneous handovers based on the state and quality of the current access network. The solution is empirically evaluated in Wi-Fi networks used by real-life Android mobile devices and we observed that the scheme can improve the quality of mHealth applications and enhance traffic load balancing capabilities of wireless architectures

    An improved port knocking authentication framework for mobile cloud computing

    Get PDF
    The latest developments in mobile cloud computing (MCC) have changed user's priorities for computing. However, the change towards MCC brings new challenges to cloud service providers and administrators. Authentication is one among the challenges categorized in the classification of security issues for MCC. Port knocking authentication method eliminates user's collaboration during the authentication process. Thus, such technique has the potential to be applied on the MCC environment which can ensure reliable communication. However, current port knocking authentication techniques lack of addressing the issue of knock-sequence length. It is challenging to deploy appropriate length sequence for port knocking authentication for the reason that shorter length knock sequence degrades security, whereas, deploying longer length sequence involves performance issues in terms of time and buffer management. This paper proposes a dynamic length port knocking authentication framework which addresses the issue of security degradation and optimizes performance in terms of time up and buffer managment. We employ MikroTik RouterOS for the evaluation of the proposed technique. Analysis of the results shows that dynamic length port knocking authentication technique improves performance in terms of time up to 23% and buffer management up to 28% by reducing the imposed load. Furthermore, by deploying dynamic length (DL) and pool of length (PoL), the proposed method reveals high security, which decreases the probability of hacking knock-sequence near to zero for a number of parallel authentication requests. Hence, dynamic length port knocking authentication technique provides an optimal solution for reliable communication in MCC
    corecore