38,654 research outputs found

    Deploying a middleware architecture for next generation mobile systems

    Get PDF
    Although 2G systems quite adequately cater for voice communications, today demand is for high-speed access to data centric applications and multimedia. Future networks have been designed to provide higher rates for data transmission, but this will be complemented by higher speed access to services via hotspots using secondary wireless interfaces such as Bluetooth or WLAN. With a wide range of applications that may be developed, a growing number of short range wireless interfaces that may be deployed, and with mobile terminals of different capabilities, a means to integrate all these variables in order to facilitate provision of services is desirable. This paper describes an architecture involving the use of middleware that makes software development independent of the specific wireless platfor

    Fast Cell Discovery in mm-wave 5G Networks with Context Information

    Full text link
    The exploitation of mm-wave bands is one of the key-enabler for 5G mobile radio networks. However, the introduction of mm-wave technologies in cellular networks is not straightforward due to harsh propagation conditions that limit the mm-wave access availability. Mm-wave technologies require high-gain antenna systems to compensate for high path loss and limited power. As a consequence, directional transmissions must be used for cell discovery and synchronization processes: this can lead to a non-negligible access delay caused by the exploration of the cell area with multiple transmissions along different directions. The integration of mm-wave technologies and conventional wireless access networks with the objective of speeding up the cell search process requires new 5G network architectural solutions. Such architectures introduce a functional split between C-plane and U-plane, thereby guaranteeing the availability of a reliable signaling channel through conventional wireless technologies that provides the opportunity to collect useful context information from the network edge. In this article, we leverage the context information related to user positions to improve the directional cell discovery process. We investigate fundamental trade-offs of this process and the effects of the context information accuracy on the overall system performance. We also cope with obstacle obstructions in the cell area and propose an approach based on a geo-located context database where information gathered over time is stored to guide future searches. Analytic models and numerical results are provided to validate proposed strategies.Comment: 14 pages, submitted to IEEE Transaction on Mobile Computin

    Context Information for Fast Cell Discovery in mm-wave 5G Networks

    Full text link
    The exploitation of the mm-wave bands is one of the most promising solutions for 5G mobile radio networks. However, the use of mm-wave technologies in cellular networks is not straightforward due to mm-wave harsh propagation conditions that limit access availability. In order to overcome this obstacle, hybrid network architectures are being considered where mm-wave small cells can exploit an overlay coverage layer based on legacy technology. The additional mm-wave layer can also take advantage of a functional split between control and user plane, that allows to delegate most of the signaling functions to legacy base stations and to gather context information from users for resource optimization. However, mm-wave technology requires high gain antenna systems to compensate for high path loss and limited power, e.g., through the use of multiple antennas for high directivity. Directional transmissions must be also used for the cell discovery and synchronization process, and this can lead to a non-negligible delay due to the need to scan the cell area with multiple transmissions at different directions. In this paper, we propose to exploit the context information related to user position, provided by the separated control plane, to improve the cell discovery procedure and minimize delay. We investigate the fundamental trade-offs of the cell discovery process with directional antennas and the effects of the context information accuracy on its performance. Numerical results are provided to validate our observations.Comment: 6 pages, 8 figures, in Proceedings of European Wireless 201

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations
    • …
    corecore