14 research outputs found
Network Selection Problems - QoE vs QoS Who is the Winner?
In network selection problem (NSP), there are now two schools of thought. There are those who think using QoE (Quality of Experience) is the best yardstick to measure the suitability of a Candidate Network (CN) to handover to. On the other hand, Quality of Service (QoS) is also advocated as the solution for network selection problems. In this article, a comprehensive framework that supports effective and efficient network selection is presented. The framework  attempts to provide a holistic solution to network selection problem that is achieved by combining both of the QoS and QoE measures.  Using this hybrid solution the best qualities in both methods are combined to overcome issues of the network selection problem According to ITU-R (International Telecommunications Union – Radio Standardization Sector), a 4G network is defined as having peak data rates of 100Mb/s for mobile nodes with speed up to 250 km/hr and 1Gb/s for mobile nodes moving at pedestrian speed. Based on this definition, it is safe to say that mobile nodes that can go from pedestrian speed to speed of up to 250 km/hr will be the norm in future. This indicates that the MN’s mobility will be highly dynamic. In particular, this article addresses the issue of network selection for high speed Mobile Nodes (MN) in 4G networks. The framework presented in this article also discusses how the QoS value collected from CNs can be fine-tuned to better reflect an MN’s current mobility scenario
Enhancement of FMIPv6 by Utilising Concurent Binding Update Process
The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper enhances the binding updates process in the Fast Handover Mobile IPv6 (FMIPv6) to improve its handover process performance in term of secureness and robustness, by implementing concurant binding update process thru the use of the International Mobile Subscriber Identifier (IMSI). Simulation results show that the proposed idea reduces the handover latency to about 63% compared to standard FMIPv6
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard
Having done an analysis on the security vulnerabilities of Radio Frequency Identification (RFID) through a desynchronization and an impersonation attacks, it is revealed that the secret information (i.e.: secret key and static identifier) shared between the tag and the reader is unnecessary. To overcome the vulnerability, this paper introduces Shelled Lightweight Random Value (SLRV) protocol; a mutual authentication protocol with high-security potentials conforming to electronic product code (EPC) Class-1 Generation-2 Tags, based on lightweight and standard cryptography on the tag’s and reader’s side, respectively. SLRV prunes de-synchronization attacks where the updating of internal values is only executed on the tag’s side and is a condition to a successful mutual authentication. Results of security analysis of SLRV, and comparison with existing protocols, are presented
SeamSAR: Seamless, Secure And Robust Handover Model for Mobile IPTV Network Using Enhanced FMIPv6
Multimedia becomes one of the most wanted content in the modern Internet world. Since the Mobile Internet Protocol version 6 (MIPv6) was proposed, many researchers have tried to develop a new protocol based on this technology in order to improve the performance of mobile multimedia services. The world is emerging toward the Mobile Internet Protocol Television (MIPTV) era where people are enabled to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper proposes a new model of secure and robust handover with low handover latency, called SeamSAR. The model introduces a new way to perform home binding update and correspondent binding update simultaneously. Simulation results show that the proposed model reduced the handover latency to 63% compared to FMIPv6. Moreover, the secureness of the proposed model was verified using CMurphi simulator
Enhancement of FMIPv6 by Utilising Concurent Binding Update Process
The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper enhances the binding updates process in the Fast Handover Mobile IPv6 (FMIPv6) to improve its handover process performance in term of secureness and robustness, by implementing concurant binding update process thru the use of the International Mobile Subscriber Identifier (IMSI). Simulation results show that the proposed idea reduces the handover latency to about 63% compared to standard FMIPv6
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks
Агрессивная форма ювенильной макромастии
ПОДРОСТКИМОЛОЧНЫЕ ЖЕЛЕЗЫ ЧЕЛОВЕКА /АНОМАЛБОЛЕЗНИ РЕДКИЕМАКРОМАСТИЯГИПЕРТРОФИЯМОЛОЧНОЙ ЖЕЛЕЗЫ ПЛАСТИКАХИРУРГИЧЕСКИЕ ОПЕРАЦИИ ВОССТАНОВИТЕЛЬНЫЕМОЛОЧНОЙ ЖЕЛЕЗЫ БОЛЕЗНИ /ТЕР /ХИ