38,654 research outputs found
Deploying a middleware architecture for next generation mobile systems
Although 2G systems quite adequately cater for voice communications, today demand is for high-speed access to data centric applications and multimedia. Future networks have been designed to provide higher rates for data transmission, but this will be complemented by higher speed access to services via hotspots using secondary wireless interfaces such as Bluetooth or WLAN. With a wide range of applications that may be developed, a growing number of short range wireless interfaces that may be deployed, and with mobile terminals of different capabilities, a means to integrate all these variables in order to facilitate provision of services is desirable. This paper describes an architecture involving the use of middleware that makes software development independent of the specific wireless platfor
Fast Cell Discovery in mm-wave 5G Networks with Context Information
The exploitation of mm-wave bands is one of the key-enabler for 5G mobile
radio networks. However, the introduction of mm-wave technologies in cellular
networks is not straightforward due to harsh propagation conditions that limit
the mm-wave access availability. Mm-wave technologies require high-gain antenna
systems to compensate for high path loss and limited power. As a consequence,
directional transmissions must be used for cell discovery and synchronization
processes: this can lead to a non-negligible access delay caused by the
exploration of the cell area with multiple transmissions along different
directions.
The integration of mm-wave technologies and conventional wireless access
networks with the objective of speeding up the cell search process requires new
5G network architectural solutions. Such architectures introduce a functional
split between C-plane and U-plane, thereby guaranteeing the availability of a
reliable signaling channel through conventional wireless technologies that
provides the opportunity to collect useful context information from the network
edge.
In this article, we leverage the context information related to user
positions to improve the directional cell discovery process. We investigate
fundamental trade-offs of this process and the effects of the context
information accuracy on the overall system performance. We also cope with
obstacle obstructions in the cell area and propose an approach based on a
geo-located context database where information gathered over time is stored to
guide future searches. Analytic models and numerical results are provided to
validate proposed strategies.Comment: 14 pages, submitted to IEEE Transaction on Mobile Computin
Context Information for Fast Cell Discovery in mm-wave 5G Networks
The exploitation of the mm-wave bands is one of the most promising solutions
for 5G mobile radio networks. However, the use of mm-wave technologies in
cellular networks is not straightforward due to mm-wave harsh propagation
conditions that limit access availability. In order to overcome this obstacle,
hybrid network architectures are being considered where mm-wave small cells can
exploit an overlay coverage layer based on legacy technology. The additional
mm-wave layer can also take advantage of a functional split between control and
user plane, that allows to delegate most of the signaling functions to legacy
base stations and to gather context information from users for resource
optimization. However, mm-wave technology requires high gain antenna systems to
compensate for high path loss and limited power, e.g., through the use of
multiple antennas for high directivity. Directional transmissions must be also
used for the cell discovery and synchronization process, and this can lead to a
non-negligible delay due to the need to scan the cell area with multiple
transmissions at different directions. In this paper, we propose to exploit the
context information related to user position, provided by the separated control
plane, to improve the cell discovery procedure and minimize delay. We
investigate the fundamental trade-offs of the cell discovery process with
directional antennas and the effects of the context information accuracy on its
performance. Numerical results are provided to validate our observations.Comment: 6 pages, 8 figures, in Proceedings of European Wireless 201
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints
Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations
- …