49 research outputs found
A Novel Handover Decision Policy for Reducing Power Transmissions in the two-tier LTE network
Femtocells are attracting a fast increasing interest nowadays, as a promising solution to improve indoor coverage, enhance system capacity, and lower transmit power. Technical challenges still remain, however, mainly including interference, security and mobility management, intercepting wide deployment and adoption from mobile operators and end users. This paper describes a novel handover decision policy for the two-tier LTE network, towards reducing power transmissions at the mobile terminal side. The proposed policy is LTE backward-compatible, as it can be employed by suitably adapting the handover hysteresis margin with respect to a prescribed SINR target and standard LTE measurements. Simulation results reveal that compared to the widely-adopted strongest cell policy, the proposed policy can greatly reduce the power consumption at the LTE mobile terminals, and lower the interference network-wide
An energy-centric handover decision algorithm for the integrated LTE macrocell–femtocell network
Femtocells are attracting a fast increasing interest nowadays, as a promising solution to improve indoor
coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower
transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS).
On the other hand, technical challenges still remain, mainly including interference mitigation, security
and mobility management, intercepting wide deployment and adoption by both mobile operators and
end users. This paper introduces a novel energy-centric handover decision policy and its accompanied
algorithm, towards minimizing the power consumption at the mobile terminal side in the integrated
LTE macrocell–femtocell network. The proposed policy is shown to extend the widely-adopted strongest
cell policy, by suitably adapting the handover hysteresis margin in accordance with standardized LTE
measurements on the tagged user’s neighbor cells. Performance evaluation results show that significantly
lower interference and power consumption can be attained for the cost of a moderately increased number
of network-wide handover executions events
Evaluation of Cryptography Usage in Android Applications
Mobile application developers are using cryptography in their products to protect sensitive data like passwords, short messages, documents etc. In this paper, we study whether cryptography and related techniques are employed in a proper way, in order to protect these private data. To this end, we downloaded 49 Android applications from the Google Play marketplace and performed static and dynamic analysis in an attempt to detect possible cryptographic misuses. The results showed that 87.8 % of the applications present some kind of misuse, while for the rest of them no cryptography usage was detected during the analysis. Finally, we suggest countermeasures, mainly intended for developers, to alleviate the issues identified by the analysis
Energy Efficient Mobility Management for the Macrocell – Femtocell LTE Network
Femtocells will play a key role in future deployments of the 3rd Generation Partnership Project (3GPP) the Long Term Evolution (LTE) system, as they are expected to enhance system capacity, and greatly improve the energy-efficiency in a cost-effective manner. Due to the short transmit-receive distance, femtocells prolong handset battery life and enhance the Quality of Service (QoS) perceived by the end users. However, large-scale femtocell deployment comprises many technical challenges, mainly including security, interference and mobility management. Under the viewpoint of energy-efficient mobility management, this chapter discusses the key features of the femtocell technology and presents a novel energy-efficient handover decision policy for the macrocell – femtocell LTE network. The proposed HO decision policy aims at reducing the transmit power of the LTE mobile terminals in a backwards compatible with the standard LTE handover decision procedure. Simulation results show that significantly lower energy and power consumption can be attained if the proposed approach is employed, at the cost of a moderately increased number of handover executions events
Distance Distributions and Proximity Estimation Given Knowledge of the Heterogeneous Network Layout
Today's heterogeneous wireless network (HWN) is a collection of ubiquitous wireless networking elements (WNEs) that support diverse functional capabilities and networking purposes. In such a heterogeneous networking environment, proximity estimation will play a key role for the seamless support of emerging applications that span from the direct exchange of localized traffic between homogeneous WNEs (peer-to-peer communications) to positioning for autonomous systems using location information from the ubiquitous HWN infrastructure. Since most of the existing wireless networking technologies enable the direct (or indirect) estimation of the distances and angles between their WNEs, the integration of such spatial information is a natural solution for robustly handling the unprecedented demand for proximity estimation between the myriads of WNEs. In this paper, we develop an analytical framework that integrates existing knowledge of the HWN layout to enable proximity estimation between WNE supporting different radio access technologies (RATs). In this direction, we derive closed-form expressions for the distance distribution between two tagged WNEs given partial (or full) knowledge of the HWN topology. The derived expressions enable us to analyze how different levels of location-awareness affect the performance of proximity estimation between WNEs that are not necessarily capable of communicating directly. Optimal strategies for the deployment of WNEs, as means of maximizing the probability of successful proximity estimation between two WNEs of interest, are presented, and useful guidelines for the design of location-aware proximity estimation in the nowadays HWN are drawn
Recommended from our members
MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without understanding the methods and tactics adversaries use to attack an organisation. The MITRE ATT&CK provides information on the motivation, capabilities, interests and tactics, techniques and procedures (TTPs) used by threat actors. In this paper, we leverage these characteristics of threat actors to support informed cyber risk characterisation and assessment. In particular, we utilise the MITRE repository of known adversarial TTPs along with attack graphs to determine the attack probability as well as the likelihood of success of an attack. We further identify attack paths with the highest likelihood of success considering the techniques and procedures of a threat actor. The assessment is supported by a case study of a health care organisation to identify the level of risk against two adversary groups– Lazarus and menuPass
Recommended from our members
Distributed key management in microgrids
Security for smart industrial systems is prominent due to the proliferation of cyber threats threatening national critical infrastructures. Smart grid comes with intelligent applications that can utilize the bidirectional communication network among its entities. Microgrids are small-scale smart grids that enable Machine-to-Machine (M2M) communications as they can operate with some degree of independence from the main grid. In addition to protecting critical microgrid applications, an underlying key management scheme is needed to enable secure M2M message transmission and authentication. Existing key management schemes are not adequate due to microgrid special features and requirements. We propose the Micro sElf- orgaNiSed mAnagement (MENSA), which is the first hybrid key management and authentication scheme that combines Public Key Infrastructure (PKI) and Web-of-Trust concepts in micro- grids. Our experimental results demonstrate the efficiency of MENSA in terms of scalability and swiftness
Recommended from our members
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance companies in this area face several challenges, such as a lack of data, a shortage of automated tasks, increased fraudulent claims from legal policyholders, attackers masquerading as legal policyholders, and insurance companies becoming targets of cybersecurity attacks due to the abundance of data they store. On top of that, there is a lack of Know Your Customer procedures. To address these challenges, in this article, we present INCHAIN, an innovative architecture that utilizes Blockchain technology to provide data transparency and traceability. The backbone of the architecture is complemented by Smart Contracts, which automate cyber insurance processes, and Self-Sovereign Identity for robust identification. The effectiveness of INCHAIN ’s architecture is compared with the literature against the challenges the cyber insurance industry faces. In a nutshell, our approach presents a significant advancement in the field of cyber insurance, as it effectively combats the issue of fraudulent claims and ensures proper customer identification and authentication. Overall, this research demonstrates a novel and effective solution to the complex problem of managing cyber insurance, providing a solid foundation for future developments in the field
Automated cyber and privacy risk management toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a Privacy Impact Assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and Personally Identifiable Information (PII) that may occur during the dynamic life-cycle of systems. In this paper, we propose a cyber and privacy risk management toolkit, called AMBIENT (AutoMated cyBer and prIvacy risk managEmeNt Toolkit) that addresses the above challenges by implementing and integrating three distinct software tools. AMBIENT not only assesses cyber and privacy risks in a thorough and automated manner but it also offers decision-support capabilities, to recommend optimal safeguards using the well-known repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT is the first toolkit, in the academic literature, that brings together the aforementioned capabilities. To demonstrate its use, we have created a case scenario based on information about cyber attacks we have received from a healthcare organisation, as a reference sector that faces critical cyber and privacy threats