By Topic

Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th

Date 10-13 Jan. 2014

Filter Results

Displaying Results 1 - 25 of 205
  • [Copyright notice]

    Publication Year: 2014 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • UPnP and IEEE 11073: Integrating personal health devices in home networks

    Publication Year: 2014 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (239 KB) |  | HTML iconHTML  

    Personal Health Devices (PHDs) with wireless technologies are becoming popular for remotely monitoring patients. However, although these devices are portable and mostly used at home, their integration with Consumer Electronics (CE) devices and networks is still in the earlier steps. This article presents a reference architecture that integrates at home PHDs and CE devices based on the UPnP (Universal Plug and Play) technology and the IEEE 11073 set of standards. This article introduces a UPnP device architecture for personal m-Health (mobile Health), describing how different types of devices interact to exchange personal health information. One of the main features of this work is the use of widely adopted data formats, such as eXtended Markup Language (XML) for health information exchange based on IEEE 11073 data model. Such approach enables web based CE networks, such as UPnP, to interact with PHD devices efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons learned in building pervasive platforms

    Publication Year: 2014 , Page(s): 7 - 12
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (315 KB) |  | HTML iconHTML  

    The purpose of pervasive applications is to be invisible and to require a minimal amount of user attention. But invisibility raises lots of hard challenges, blocking the long-awaited pervasive era to emerge. The device heterogeneity and volatility, security enforcement and context-awareness are just some of the issues a developer must tackle inside the application code. To industrialize such development, we propose to use an application server dedicated to the pervasive environment. Thanks to this server, developers focus on the application, delegating to the server most of the pervasive constraint management. However, providing such a platform is a very difficult task. The pervasive environment constraints must be handled by this server in a consistent way, while being flexible enough to support the different applications. This paper describes the requirements of the pervasive applications and how our platform, named iCASA, deals with them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A context-aware battery lifetime model for carrier aggregation enabled LTE-A systems

    Publication Year: 2014 , Page(s): 13 - 19
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB) |  | HTML iconHTML  

    A Quality of Experience (QoE) parameter of increasing importance is the time that a battery powered communication device (e.g. smartphone) can be operated before it needs to be recharged. However, due to the fact that battery capacity is not evolving as fast as the power requirement, the battery lifetime of modern user equipment is stagnating or even decreasing from one device generation to another. In parallel, a major challenge for the design of next generation wireless systems such as LTE-Advanced (LTE-A) is that the required high portion of spectrum is not available in a consecutive portion. For this reason, a procedure called interband non-continuous Carrier Aggregation (CA) will be introduced in LTE-A which allows for the combination of multiple spectrum pieces from different frequency bands. This procedure however requires the parallel operation of multiple power amplifiers that are characterized by a high energy demand. In this paper, we quantify the impact of CA on the power consumption of LTE-A enabled communication by means of a Markovian based power consumption model that incorporates system parameters as well as context parameters. The results show that the suitability of CA does from a battery lifetime perspective strongly depend upon the actual device characteristics as well as the resource availability is the various frequency bands. Furthermore, the application of the sophisticated Kinetic Battery Model (KiBaM) shows that the charge recovery effect during idle periods does significantly affect the battery lifetime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feasibility of simultaneous information and energy transfer in LTE-A small cell networks

    Publication Year: 2014 , Page(s): 20 - 25
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    Simultaneous information and energy transfer (SIET) is attracting much attention as an effective method to provide green energy supply for mobiles. However, low power level of harvested energy from RF spectrum limits application of this technique. Thanks to improvement of sensitivity and efficiency of RF energy harvesting circuit as well as dense deployment of small cell base stations, SIET becomes more practical. In this paper, we propose a unified receiver model for SIET in LTE-A small cell base station networks, formulate a feasibility problem with Poisson point process model and analyze the feasibility for a special and practical scenario. The results show that it is feasible for mobiles to charge the secondary battery with harvested energy from BSs, but it is still impractical to directly charge the primary battery or operate without any battery at all. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy efficient broadcast radius optimization in cellular networks

    Publication Year: 2014 , Page(s): 26 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    In this paper, we study the optimal broadcast radius in cellular network from the perspective of energy efficiency. Firstly, we consider the scenario where the base stations have already been deployed. The relationship between the power-saving gain and the possible energy efficient broadcast radius is derived. Based on it, we investigate the optimal number of tiers of cells in the broadcast range. Next, we turn to the scenario with the base stations to be deployed. The power consumption per effective coverage area is defined to measure the energy efficiency of different broadcast radius, based on which we analyze the optimal broadcast radius under different channel conditions. Simulation results confirm that the optimal energy efficient broadcast radius is positively correlated with the static power of the broadcast channel, negatively correlated with the minimal required broadcast service rate in the two scenarios, and negatively correlated with the original cell radius in the first scenario. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greedy backpressure routing for Smart Grid sensor networks

    Publication Year: 2014 , Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (844 KB) |  | HTML iconHTML  

    In this paper, a greedy backpressure routing protocol is proposed for multigate mesh networks. This protocol evaluates the greedy backpressure metric (GBM) value of mesh points and routes packets in the direction of the steepest gradient. The GBM value is calculated using a combination of traffic load and the mesh point's hop count to the closest gateway. The proposed routing algorithm can realize the effect of traffic load from all the nodes along the path to each gateway by iteratively updating information from neighbors through periodic beacon exchange. The consideration of incorporating traffic load helps to route packets around congested area. The results indicate that the greedy backpressure multigate mesh routing is capable of achieving significant improvement in the network reliability, latency, and throughput performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic market for distributed energy resources in the Smart Grid

    Publication Year: 2014 , Page(s): 38 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (197 KB) |  | HTML iconHTML  

    Distributed Energy Resources (DER) are one of the distinguished features of Smart Grid. A combination of small-scale energy generator and storage unit can produce energy to serve the associated load, while at the same time store or sell excessive energy. Assuming there is an energy surplus, the system can choose to sell a portion of its available energy to the market. In this work, an oligopoly model is developed in order to study dynamic pricing in such a scenario. The problem can be characterized as a dynamic N-player differential game, where the optimal solutions correspond to the equilibria of the game. We provide a mathematical analysis for the solution of the game, where a complete characterization of the steady-state price and optimal strategies of the players can be obtained in the symmetric case. Extensive numerical studies are provided to demonstrate the behaviors of the proposed market model and to analyze the impacts of various market parameters on the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Grid in radio access networks (SG-RAN): Smart energy management at cell-sites

    Publication Year: 2014 , Page(s): 44 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1006 KB) |  | HTML iconHTML  

    In this paper, we research on an interdisciplinary field of how the Smart Grid can help energy cost reduction in wireless communications. We study how the advances in the Smart Grid such as the information on predicted electricity price can be used to help reduce the energy cost of the cellular networks. Particularly, smart energy management at cell-sites is studied to minimize the electricity cost for mobile operators by leveraging time-varying electricity prices in the Smart Grid. We first propose a theoretical framework to optimally manage energy at a single cell-site (without and with energy harvester, respectively) by judiciously choosing which power source (the Power-Grid or a storage-battery) to use, when and how much to use in the cell-site; as well as controlling when and how much to charge the storage-battery. Moreover, we extend the framework from a single cell-site to a network including multiple cell-sites with different electricity prices or energy storage capacity, etc., where cell association, power control, and scheduling can be jointly considered to provide load shifting and cell ON/OFF to achieve mobile network operation with the lowest electricity cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage to energy: Modeling the carbon emission of storage task offloading between data centers

    Publication Year: 2014 , Page(s): 50 - 55
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    Storing data in the cloud is becoming a common trend, for both end-customers and data center operators. We propose a method for deciding where to host data storage tasks under the constraint of minimal greenhouse gas emission. The decision on whether to store data locally or store it remotely at a cleaner data center relies on the models for the local and remote data centers and the network connecting them. We conclude that the transport network that connects a local node and a "cleaner" remote data center plays a significant role in the decision of where to store data, and that the frequency of access of the data is an important and related factor. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-governed resilient networked systems

    Publication Year: 2014 , Page(s): 56 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (361 KB) |  | HTML iconHTML  

    Connected embedded systems in the realm of smart infrastructures comprise ubiquitous end-point devices supported by a communication infrastructure. Device, energy supply and network failures are a reality and provisioned communications could fail. Self-organization is a process where network devices cooperate with each other to restore network connectivity on detecting network connectivity failures. Self-organized networks are envisioned to be hierarchical, implying that a root device is expected to spend more energy to forward the entire network's data. This leads to battery exhaustion and therefore a single point of failure in the system. In this paper we address this problem by proposing an energy-governed resilient networking framework. Our framework enforces a policy to throttle upstream network traffic to maintain energy drain at the root device. To demonstrate the effectiveness of the proposed policy, we designed our experiment framework using Nano-RK and FireFly; a lightweight operating system and sensing platform respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSP-based implementation of soft Viterbi decoder for power line communications

    Publication Year: 2014 , Page(s): 62 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    When using power line communications (PLC) modems for Smart Grids (SG), achieving fast and reliable data transmission is one of the key issues. This paper investigate a soft Viterbi decoder to reduce errors effects of noises and attenuations in Spread Frequency Shift Keying (S-FSK) communication scheme. Through numerical simulations, the improvements of the proposed Viterbi decoder are shown in terms of BER performance. Furthermore, practical realization on low-cost embedded processor is discussed. The whole design of a narrowband S-FSK based PLC modem has been implemented and optimization for real time processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay-bounded routing on hybrid-solar vehicular ad-hoc networks

    Publication Year: 2014 , Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (533 KB) |  | HTML iconHTML  

    Most of the researches pay attention to minimize the end-to-end delay rather than reduce the usage of radio. However, some information is not urgent and radio is a valuable and limited resource. Recently, delay-bounded routing protocol has become a popular issue, whose goal is to deliver messages to the destination within user-defined delay and minimize the usage of radio. To decrease the burden on the environment and save energy, the hybrid-solar vehicle is one of the most prominent solutions. The existing delay-bounded routing protocols do not consider the charge and the energy expenditure factors and only choose the path with the least forwarding times. To improve previous works, we propose a mechanism based on a cost function, which includes forwarding times and power gain, to choose a minimum cost path. Besides, we propose a novel mechanism to deliver message to the destination by the hybrid of data muling (carried by the vehicle) and forwarding (transmitted through radio). In the existing protocol, when the remaining time is not enough the vehicle should forward the message by radio and when the remaining time is enough the vehicle should carry the message by itself. However, forwarding message by radio consumes more energy and hence the energy factor should be added into the consideration. The proposed protocol contains two schemes: the greedy and centralized schemes. In the centralized scheme, the information such as the solar illumination, length of each road segment, and the average velocity of the vehicles on each road segment are collected and then the dynamic programming is used to find the least cost routing path. In the greedy scheme, it only has the knowledge of the average velocity, the solar illumination and the length of all the possible next road segments to choose the next road segment with the least cost. Simulation results illustrate that the proposed routing protocol can save more energy than existing protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location aware code offloading on mobile cloud with QoS constraint

    Publication Year: 2014 , Page(s): 74 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (585 KB) |  | HTML iconHTML  

    Mobile applications can be enhanced to a great extent by using the offloading mechanism in an energy efficient manner to the bounty resourceful clouds. Due to the huge demand of smart phones, the issue of providing more processing capability to this resource constraint device is getting more concern now-a-days. In this paper, a method level offloading mechanism has been proposed where no prior image of the mobile device is needed to be transferred to the cloud. The application is partitioned at different points where the migration of the execution thread is performed from mobile device to nearby resourceful cloud to get the best execution performance in optimal energy cost. The mobile can complete the execution after the partitioned thread returns back from the cloud to the device. This mechanism increases scalability as well as performance in the form of faster execution speed of the mobile devices. Moreover, we consider the mobility of the mobile device and propose a solution to find the best cloud instance on the move. To find out which cloud to offload, the communication latency, capacity, and current load at individual clouds are considered to find out the best cloud to offload to ensure better service for the mobile device. The proposed solution has been simulated and compared against CloneCloud in two different simulation scenarios where we show that our method performs superior to CloneCloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bring your own device security issues and challenges

    Publication Year: 2014 , Page(s): 80 - 85
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    As mobile devices become prevalent in workplaces, it also creates a unique environment, Bring Your Own Device, in enterprise networks. BYODs are extensions of corporate networks and thus it is essential to secure BYODs to protect enterprise networks. Security tools such as firewalls, anti-virus software, and anti-spam software have been widely used to protect corporate networks. Similar tools are also desired to protect BYODs. BYODs have many advantages, such as reducing companies' cost and increasing users' productivity. However, they also raise many security issues and challenges due to their unique security requirements. This paper summarizes threats and attacks on BYODs and reveals their security issues and challenges. The paper further compares existing BYOD solutions and presents a BYOD security framework that provides guidance for enterprises when adopting BYODs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of SSL Proxy attacks on Android and iOS mobile applications

    Publication Year: 2014 , Page(s): 86 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1419 KB) |  | HTML iconHTML  

    According to recent articles in popular technology websites, some mobile applications function in an insecure manner when presented with untrusted SSL certificates. These non-browser based applications seem to, in the absence of a standard way of alerting a user of an SSL error, accept any certificate presented to it. This paper intends to research these claims and show whether or not an invisible proxy based SSL attack can indeed steal user's credentials from mobile applications, and which types applications are most likely to be vulnerable to this attack vector. To ensure coverage of the most popular platforms, applications on both Android 4.2 and iOS 6 are tested. The results of our study showed that stealing credentials is indeed possible using invisible proxy man in the middle attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end IP mobility platform in application layer for iOS and Android OS

    Publication Year: 2014 , Page(s): 92 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (610 KB)  

    Smartphones are a new type of mobile devices that users can install additional mobile software easily. In the almost all smartphone applications, client-server model is used because end-to-end communication is prevented by NAT routers. Recently, some smartphone applications provide real time services such as voice and video communication, online games etc. In these applications, end-to-end communication is suitable to reduce transmission delay and achieve efficient network usage. Also, IP mobility and security are important matters. However, the conventional IP mobility mechanisms are not suitable for these applications because most mechanisms are assumed to be installed in OS kernel. We have developed a novel IP mobility mechanism called NTMobile (Network Traversal with Mobility). NTMobile supports end-to-end IP mobility in IPv4 and IPv6 networks, however, it is assumed to be installed in Linux kernel as with other technologies. In this paper, we propose a new type of end-to-end mobility platform that provides end-to-end communication, mobility, and also secure data exchange functions in the application layer for smartphone applications. In the platform, we use NTMobile, which is ported as the application program. Then, we extend NTMobile to be suitable for smartphone devices and to provide secure data exchange. Client applications can achieve secure end-to-end communication and secure data exchange by sharing an encryption key between clients. Users also enjoy IP mobility which is the main function of NTMobile in each application. Finally, we confirmed that the developed module can work on Android system and iOS system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor fusion of physical and social data using Web SocialSense on smartphone mobile browsers

    Publication Year: 2014 , Page(s): 98 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1316 KB) |  | HTML iconHTML  

    Modern smartphones offer a rich selection of onboard sensors, where sensor access is typically performed through API calls provided by the phone's operating system. In this paper we evaluate the viability of implementing sensor processing entirely in the Web browser layer with Web SocialSense, a JavaScript framework for Tizen smartphones that uses a graph topology-based paradigm. This framework enables programmers to write personalized, context-aware applications that can dynamically fuse time-series signals from physical sensors (such as the accelerometer and geolocation services) and social software sensors (such as social network services and personal information management applications). To demonstrate the framework we implemented components for physical sensing and social software sensing to drive two context-aware applications, ActVertisements and Social Map. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-speed real-time multi-channel data-acquisition unit: Challenges and results

    Publication Year: 2014 , Page(s): 105 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (763 KB) |  | HTML iconHTML  

    In this paper, we describe the design of a 3 Giga-samples per second real-time multi-channel data-acquisition unit. We first introduce the technical challenges including synchronization, data transmission and printed circuit board design. Then we analyze the cause of issues in multi-channel synchronization, and develop a novel method to synchronize the channels and correctly save the data into RAM. We later discuss issues surrounding the unit's signal integrity and routing. We provide techniques and design procedures to properly mitigate these issues and guarantee the correct performance of the system. The DAU has been fabricated, and its performance is evaluated in this paper by sampling ultra-wide-band signals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Battery-saving message collection method for disrupted communication service areas

    Publication Year: 2014 , Page(s): 113 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (526 KB) |  | HTML iconHTML  

    The paper proposes a collection method of SOS messages in a disaster area with collapsed communication service. So far, we have proposed and implemented SOSCast as a smartphone application to support rescue operations for finding immobilized victims. However, in its current implementation, we found that SOSCast limits the search coverage area and disregards some SOS messages. Moreover, the smartphone rapidly consumes battery due to the required constant communication. We propose, therefore, to implement Wi-Fi Direct (WD) in addition to Bluetooth (BT) to increase the search coverage area. Furthermore, we introduce an information-sharing cluster in order to collect SOS messages efficiently while preserving the smartphones' battery life. By implementing the proposed methods on actual smartphones for a performance evaluation, we showed that controlling the use of both WD and BT increases the probability of locating immobilized victims. Also, enabling an information-sharing cluster by immobilized victims' smartphones can send SOS messages to a mobile victim smartphone all at once, which can extend the lifetime of the smartphone's battery as compared with the previous method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OpenFlow-based Proxy mobile IPv6 over software defined network (SDN)

    Publication Year: 2014 , Page(s): 119 - 125
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    Software Defined Network (SDN) is widely deployed by using OpenFlow protocol for the implementation of flexible networking. A lot of researches are progressing to adapt OpenFlow to existing network architectures. PMIPv6 is proposed to handle the network-based local mobility using IP tunneling. However, it has some weak points such as IP tunneling overhead and sharing same path for the data and the control planes. In this paper, we propose OpenFlow-based Proxy Mobile IPv6 (PMIPv6) to obtain the advantages of the OpenFlow architecture for PMIPv6 network. The proposed scheme separates the mobility management function from the components of PMIPv6. It preserves the functionalities and messages defined in PMIPv6 but reconstructs components to take the advantages offered by the OpenFlow architecture. The reconstructed components set the flow table of switches located in the path as the controller of OpenFlow. The proposed scheme removes the tunneling to forward user traffic and separates the data and the control planes. OpenFlow-based PMIPv6 offers more flexible deployment architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of efficient multicast sender mobility scheme for Proxy mobile IPv6

    Publication Year: 2014 , Page(s): 126 - 131
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (334 KB) |  | HTML iconHTML  

    Recent work has shown that Proxy Mobile IPv6 (PMIPv6) is a promising mobility management protocol for its salient features, such as supporting unmodified Mobile Node (MN). However, PMIPv6 does not consider the multicast routing support. Moreover, current research mainly concerns on the multicast receiver mobility, but it is a critical and challenging issue to ensure service connectivity for mobile multicast senders, which has not been addressed well. In this paper, we propose an efficient multicast sender mobility scheme for PMIPv6 (PMIP-BT), in which the multicast data can be transmitted through the PMIPv6 tunnel and the multicast sender mobility is transparently enabled in the PMIPv6 networks. Numerical results show that the proposed scheme outperforms the current scheme in terms of signaling cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey on distributed mobility management schemes for Proxy mobile IPv6

    Publication Year: 2014 , Page(s): 132 - 138
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (624 KB) |  | HTML iconHTML  

    As a promising mobility protocol, Proxy Mobile IPv6 (PMIPv6) can provide mobility support without the involvement of the mobile nodes (MNs). It depends on the Local Mobility Anchor (LMA) and Mobility Access Gateway (MAG) to emulate the home network for the attached MNs. Based on this design principle, PMIPv6 works well only for small scale networks. However, with the rapid increase of the MNs as well as the huge traffic loads, PMIPv6 as a centralized mobility management protocol in which both the location management and dada forwarding are performed by the LMA, will induce lots of limitations, such as non-optimal routing, single point of failure, scalability and so on. Therefore, a trend to distributed mobility management (DMM) is popular, and several distributed solutions for PMIPv6 have been proposed until now. In this paper, we survey the different schemes of DMM and focus on the related solutions for PMIPv6 by qualitative analysis, and conclude the remaining challenges and open issues for future development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed PDN gateway support for scalable LTE/EPC networks

    Publication Year: 2014 , Page(s): 139 - 144
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1189 KB) |  | HTML iconHTML  

    Recently, due to a explosive growth in the mobile Internet traffic, the problem of excessive data traffic handling on core network and thus scalability problem have been magnified in 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) networks. Current LTE/SAE network based on the central packet data network gateway (P-GW) used as mobility anchor cannot deal with such problems. In this paper, we propose a new LTE/SAE network architecture supporting distributed P-GWs and the corresponding distributed mobility management to solve the problems. For this, in addition to the deployment of such distributed P-GWs, we propose a dynamic and distributed mobility management by distributing MMEs (Mobility Management Entities) which dynamically manages the location information of an UEs PDN connection, and also propose a handover procedure of such PDN connections by using the proposed distributed P-GWs and MMEs. The performance of the proposed distributed LTE/SAE network system is compared with the conventional LTE/SAE network system in terms of the P-GW's data processing volume per unit time and the number of valid data sessions accommodated in the LTE/EPC core network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia-based battery drain attacks for Android devices

    Publication Year: 2014 , Page(s): 145 - 150
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (97 KB) |  | HTML iconHTML  

    People using smartphones to connect to the Internet for day-life activities has overtaken the number of people using canonical PCs. This lead to a huge quantity of security threats that usually tend to penetrate the defenses of a smartphone in order to gain control of its resources. Differently, energy-based attacks have the objective of increasing the energy consumption of the victim device. It is important to highlight that this objective could be possibly achieved by just activating the system's defenses as a consequence of canonical attacks and letting the system defenses detect and (try to) defeat them. These activities consume additional energy and could led the mobile device to its complete uselessness. In this paper, an energy-based attack based on soliciting hardware-level encoding/decoding functions through properly crafted multimedia files is analyzed and its impact evaluated. Such kind of attacks are performed without accessing the device by taking advantage of the new HTML5 functionalities. A series of experiments have been performed in order to understand which are the codecs that have a more relevant impact on energy consumption, and, as a consequence, that make the attack more effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.