20 research outputs found

    Mobility Management in beyond 3G-Environments

    Get PDF
    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi, GPRS, and UMTS networks. The GPRS and UMTS networks provide countrywide network access, while the WiFi networks provide network access in local areas such as city centres and airports. As a result, mobile end-users can be always on-line and connected to their preferred network(s), these network preferences are typically stored in a user profile. For example, an end-user who wishes to be connected with highest bandwidth could be connected to a WiFi network when available and fall back to GPRS when moving outside the hotspot area.\ud In this paper, we consider a combination of MM for legacy services (like web browsing, telnet, etc.) using Mobile IP and multimedia services using SIP. We assume that the end-user makes use of multi-interface terminals with the capability of selecting one or more types of access networks\ud based on preferences. For multimedia sessions, like VoIP or streaming video, we distinguish between changes in network access when the end-user is in a session or not in a session. If the end-user is not in a session, he or she needs to be able to start new sessions and receive invitations for new sessions. If the end-user is in a session, the session needs to be handed over to the new access network as seamless as possible from the perspective of the end-user. We propose an integrated but flexible solution to these problems that facilitates MM with a customizable transparency to applications and end-users

    Reducing handover latency in future IP-based wireless networks:Fast Proxy Mobile IPv6

    Get PDF
    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the favorite IP level mobility protocol for the 3GPP System Architecture Evolution / Long Term Evolution (SAE/LTE). The extension, Fast Proxy Mobile IPv6 (FPMIPv6), aims at solving or reducing the control and handover problem. An elementary analysis shows that FPMIPv6 can significantly reduce the handover latency and the loss of packets during handover, especially if handovers can be predicted a few tens of milliseconds before they occur

    A Conceptual Framework for Addressing IoT Threats: Challenges in Meeting Challenges

    Get PDF
    The Internet of Things (IoT) is rapidly growing, and offers many economical and societal potentials and benefits. Nevertheless, the IoT also introduces new threats to our Security, Privacy and Safety (SPS). The existing work on mitigating these SPS threats often fails to address the fundamental challenges behind the mitigation measures proposed, and fails to make the relations between different mitigation measures explicit. This paper, therefore, offers a conceptual framework for understanding and approaching the challenges and obstacles that arise in addressing the SPS threats of the IoT. This contribution aims to help policymakers in adopting policies and strategies that stimulate others to develop, deploy and use IoT devices, applications and services in secure, privacy-friendly and safe ways

    Status: Submitted

    No full text
    for designing personalized mobile service brokerage An overview on agent platforms (with an emphasis on mobility and security aspects) and high-level architecture of some applications designed with software agent

    A generalization of multiple repetition feedback coding schemes to soft output discrete memoryless channels

    No full text

    Coding for channels with low rate noiseless feedback

    No full text
    Consider a binary symmetric channel where for each frame of f forward transmissions one is allowed a group of y/spl Lt/f noiseless feedback transmissions. Using set partitioning, a forward code affects the rather simple intra-set decoding, while inter-set decoding is accomplished by using a feedback strategy. A simple example with (f,g)=(2,1), a memory length 1 convolutional code and multiple repetition feedback coding explains the idea. Using similar techniques, schemes up to (f,g)=(9,1) show significant complexity reduction over straightforward error correcting codes

    Feedback coded modulation

    No full text

    A Mechanism for Host Mobility Management supporting Application Awareness

    No full text
    Many approaches exist today that address the issues that arise when a mobile node changes its point(s) of attachment to the Internet. Mobile IP takes care of host mobility at the IP layer; others at the transport layer (Mobile SCTP) or at the application layer (SIP with re-invite). In practice, most of these approaches rely on functionality residing on the mobile host that scans, detects and activates the networks available through one or more network interfaces. The mechanism proposed in this paper takes into account that multiple of these approaches may be applied at the same time. It provides the applications on the mobile host with information about the state of the lower-layer mobility management protocols (such as Mobile IP) as well as the state and characteristics of the available network resources. Applications may consecutively adapt their behavior depending on this mobility process information and thus accommodate to the changed network connectivity conditions, possibly in an application specific manner. In this paper, we present the architecture of our mobility management mechanism. We also describe the implementation of our prototype and the results of experiments with the mechanism, thereby addressing the complexities of an integrated applicationaware mobility management system

    Privacy protection in data sharing: towards feedback based solutions

    No full text
    Sharing data is gaining importance in recent years due to proliferation of social media and a growing tendency of governments to gain citizens’ trust through being transparent. Data dissemination, however, increases chance of compromising privacy sensitive data, which undermines trust of data subjects (e.g., users and citizens). Data disseminators are morally, ethically, and legally responsible for any misuse of the disseminated data. Therefore, privacy enhancement techniques are often used to prevent unsavory disclosure of personal data. Data recipients, nevertheless, are sometimes able to derive (part of) privacy sensitive information by, for example, fusing the shared data with other data. This can be considered as a sort of data misuse. In this contribution, we investigate how having a feedback from data recipients to data disseminators is instrumental for detecting such data misuses (i.e., privacy breaches). We also elaborate on using feedback for defining and deriving context-dependent privacy-preferences of data disseminators. In this case, feedback acts as a means of privacy prevention. We provide a categorization of existing feedback based solutions and, in addition, describe our implementation of a feedback-based data dissemination solution in an e-government setting. Finally, we elaborate on the importance of real-time partial feedback mechanisms, as a rising and promising solution direction for preserving privacy
    corecore