1,037 research outputs found
On the handover security key update and residence management in LTE networks
In LTE networks, key update and residence management have been investigated as an effective solution to cope with desynchronization attacks in mobility management entity (MME) handovers. In this paper, we first analyse the impacts of the key update interval (KUI) and MME residence interval (MRI) on the handover performance in terms of the number of exposed packets (NEP) and signaling overhead rate (SOR). By deriving the bounds of the NEP and SOR over the KUI and MRI, it is shown that there exists a tradeoff between the NEP and the SOR, while our aim is to minimise both of them simultaneously. This accordingly motivates us to propose a multiobjective optimisation problem to find the optimal KUI and MRI that minimise both the NEP and SOR. By introducing a relative importance factor between the SOR and NEP along with their derived bounds, we further transform the proposed optimisation problem into a single-objective optimisation problem which can be solved via a simple numerical method. In particular, the results show that a higher accuracy of up to 1 second is achieved with the proposed approach while requiring a lower complexity compared to the conventional approach employing iterative searches
Enhancing security of MME handover via fractional programming and Firefly algorithm
Key update and residence management have been investigated as an effective solution to cope with desynchronisation attacks in Mobility Management Entity (MME) handovers. In this paper, we first analyse the impacts of the Key Update Interval (KUI) and MME Residence Interval (MRI) on handover processes and their secrecy performance in terms of the Number of Exposed Packets (NEP), Signaling Overhead Rate (SOR) and Outage Probability of Vulnerability (OPV). Specifically, the bounds of the derived NEP and SOR not only capture their behaviours at the boundary of the KUI and MRI, but also show the trade-off between the NEP and SOR. Additionally, through the analysis of the OPV, it is shown that the handover security can be enhanced by shortening the KUI and the desynchonisation attacks can be avoided with high-mobility users. The above facts accordingly motivate us to propose a Multi- objective Optimisation (MO) problem to find the optimal KUI and MRI that minimise both the NEP and SOR subject to the constraint on the OPV. To this end, two scalarisation techniques are adopted to transform the proposed MO problem into single- objective optimisation problems, i.e., an achievement-function method via Fractional Programming (FP) and a weighted-sum method. Based on the derived bounds on NEP and SOR, the FP approach can be optimally solved via a simple numerical method. For the weighted-sum method, the Firefly Algorithm (FA) is utilised to find the optimal solution. The results show that both techniques can solve the proposed MO problem with a significantly reduced searching complexity compared to the conventional heuristic iterative search technique
Maximal -regularity for stochastic evolution equations
We prove maximal -regularity for the stochastic evolution equation
\{{aligned} dU(t) + A U(t)\, dt& = F(t,U(t))\,dt + B(t,U(t))\,dW_H(t),
\qquad t\in [0,T],
U(0) & = u_0, {aligned}. under the assumption that is a sectorial
operator with a bounded -calculus of angle less than on
a space . The driving process is a cylindrical
Brownian motion in an abstract Hilbert space . For and
and initial conditions in the real interpolation space
\XAp we prove existence of unique strong solution with trajectories in
L^p(0,T;\Dom(A))\cap C([0,T];\XAp), provided the non-linearities
F:[0,T]\times \Dom(A)\to L^q(\mathcal{O},\mu) and B:[0,T]\times \Dom(A) \to
\g(H,\Dom(A^{\frac12})) are of linear growth and Lipschitz continuous in their
second variables with small enough Lipschitz constants. Extensions to the case
where is an adapted operator-valued process are considered as well.
Various applications to stochastic partial differential equations are worked
out in detail. These include higher-order and time-dependent parabolic
equations and the Navier-Stokes equation on a smooth bounded domain
\OO\subseteq \R^d with . For the latter, the existence of a unique
strong local solution with values in (H^{1,q}(\OO))^d is shown.Comment: Accepted for publication in SIAM Journal on Mathematical Analysi
Participatory agro-climate information services: A key component in climate resilient agriculture
The brief promotes participatory agro-climate information services as a key component in achieving climate-smart agriculture. The brief emphasizes that actionable agro-climate information starts with—and responds to—gender-based needs of farmers, integrated at all stages of the value chain. Timely forecasts and accurate agroclimate advisories have been proven to provide farmers with production, adaptation, and mitigation benefits
Cellular O-Glycome Reporter/Amplification to explore O-glycans of living cells
Protein O-glycosylation has key roles in many biological processes, but the repertoire of O-glycans synthesized by cells is difficult to determine. Here we describe an approach termed Cellular O-Glycome Reporter/Amplification (CORA), a sensitive method used to amplify and profile mucin-type O-glycans synthesized by living cells. Cells convert added peracetylated benzyl-α-N-acetylgalactosamine to a large variety of modified O-glycan derivatives that are secreted from cells, allowing for easy purification for analysis by HPLC and mass spectrometry (MS). Relative to conventional O-glycan analyses, CORA resulted in an ∼100-1,000-fold increase in sensitivity and identified a more complex repertoire of O-glycans in more than a dozen cell types from Homo sapiens and Mus musculus. Furthermore, when coupled with computational modeling, CORA can be used for predictions about the diversity of the human O-glycome and offers new opportunities to identify novel glycan biomarkers for human diseases
Riesz transform characterization of Hardy spaces associated with Schr\"odinger operators with compactly supported potentials
Let L=-\Delta+V be a Schr\"odinger operator on R^d, d\geq 3. We assume that V
is a nonnegative, compactly supported potential that belongs to L^p(R^d), for
some p>d/2. Let K_t be the semigroup generated by -L. We say that an
L^1(R^d)-function f belongs to the Hardy space H_L^1 associated with L if
sup_{t>0} |K_t f| belongs to L^1(R^d). We prove that f\in H_L^1 if and only if
R_j f \in L^1(R^d) for j=1,...,d, where R_j= \frac{d}{dx_j} L^{-1/2} are the
Riesz transforms associated with L.Comment: 6 page
Conical square function estimates in UMD Banach spaces and applications to H-infinity functional calculi
We study conical square function estimates for Banach-valued functions, and
introduce a vector-valued analogue of the Coifman-Meyer-Stein tent spaces.
Following recent work of Auscher-McIntosh-Russ, the tent spaces in turn are
used to construct a scale of vector-valued Hardy spaces associated with a given
bisectorial operator (A) with certain off-diagonal bounds, such that (A) always
has a bounded (H^{\infty})-functional calculus on these spaces. This provides a
new way of proving functional calculus of (A) on the Bochner spaces
(L^p(\R^n;X)) by checking appropriate conical square function estimates, and
also a conical analogue of Bourgain's extension of the Littlewood-Paley theory
to the UMD-valued context. Even when (X=\C), our approach gives refined
(p)-dependent versions of known results.Comment: 28 pages; submitted for publicatio
Two-Higgs doublet models from TeV-scale supersymmetric extra U(1) models
We investigate the reduction of a general TeV-scale supersymmetric extra U(1)
model to a 2HDM below the TeV- scale through the tree level non-decoupling.
Portions of the parameter space of the extra U(1) model appropriate for
obtaining a 2HDM are identified. Various properties of the resulting 2HDM are
connected to the parameter space of the underlying model. PACS: 12.60.Jv,
12.60.Cn, 12.60.FrComment: 12 pages, 4 postscript figures, to appear in Phys. Rev.
- …