• Title/Summary/Keyword: Mobile wireless networks

Search Result 1,350, Processing Time 0.03 seconds

Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks

  • Han, Longzhe;Nguyen, Dinh Han;Kang, Seung-Seok;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3775-3788
    • /
    • 2014
  • With the increasing number of the wireless and mobile networks, the way that people use the Internet has changed substantively. Wireless multimedia services, such as wireless video streaming, mobile video game, and mobile voice over IP, will become the main applications of the future wireless Internet. To accommodate the growing volume of wireless data traffic and multimedia services, cognitive radio (CR) and Information-Centric Network (ICN) have been proposed to maximize the utilization of wireless spectrum and improve the network performance. Although CR and ICN have high potential significance for the future wireless Internet, few studies have been conducted on collaborative operations of CR and ICN. Due to the lack of infrastructure support in multi-hop ad hoc CR networks, the problem is more challenging for video streaming services. In this paper, we propose a Cross-layer Video Streaming Mechanism (CLISM) for Cognitive Radio Ad Hoc Information Centric Networks (CRAH-ICNs). The CLISM included two distributed schemes which are designed for the forwarding nodes and receiving nodes in CRAH-ICNs. With the cross-layer approach, the CLISM is able to self-adapt the variation of the link conditions without the central network controller. Experimental results demonstrate that the proposed CLISM efficiently adjust video transmission policy under various network conditions.

Integrated Authentication and Key Management Method among Heterogeneous Wireless Mobile Networks (이기종 무선 이동망간 통합 인증 및 키관리 기법)

  • Park Hyung-Soo;Lee Hyung-Woo;Lee Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.50-59
    • /
    • 2006
  • The new communication paradigm is rapidly shifted from wireless mobile networks to an All-IP(Internet Protocol) network, led by service industry leaders and communication manufacturers. In this paradigm, providing authentication and session keys of a subscriber becomes one of the critical tasks because of IP open accessibility among heterogeneous networks. In this paper, we introduce authentication process procedure of heterogeneous wireless mobile networks and develop so-called IMAS(Integrated Mobile Authentication Server) which can securely inter-work among all mobile networks and support the legacy networks with backward compatibility. Especially, in designing IMAS, mobile authentication inter-working mechanism, key management technique, and other issues to be overcome are presented. We analyze and evaluate the performance of authentication algorithm which creates session key. A simulation environment of IMAS is established, and a performance(TPS; Transaction Per Second) result is analyzed and evaluated. It turned out that IMAS works among heterogeneous wireless mobile networks without compensating efficiency and functionalities of the legacy networks and decrease the entropy of data redundancy and data inconsistency among networks because of the integrity of the distributed Data Base(DB).

An Efficient Energy Charging Scheme for Wireless Sensor Networks Using a Mobile Sink Capable of Wireless Power Transmission

  • Park, Kyoung nam;Yoon, Ikjune
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.1-9
    • /
    • 2019
  • In this paper, we propose the algorithms which determine 1) the efficient anchor-node visiting route of mobile sink in terms of energy supply and 2) the efficient energy amount to be charged to each anchor node, by using the information of each anchor node and the mobile sink. Wireless sensor networks (WSNs) using mobile sinks can be deployed in more challenging environments such as those that are isolated or dangerous, and can also achieve a balanced energy consumption among sensors which leads to prolong the network lifetime. Most mobile sinks visit only some anchor nodes which store the data collected by the nearby sensor nodes because of their limited energy. The problem of these schemes is that the lifetime of the anchor nodes can be shorten due to the increased energy consumption, which rapidly reduces the overall lifetime of WSN. This study utilizes a mobile sink capable of wireless power transmission to solve this problem, so a mobile sink can gather data from anchor nodes while charging energy to them. Through the performance verification, it is confirmed that the number of blackout nodes and the amount of collected data are greatly improved regardless of the size of the network.

Characteristics of Wireless Distributed Communication System under the Overlay Convergent Networks (중첩 융합 네트워크에서 분산 무선 통신 시스템의 특성)

  • Cheon, EunJi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.11
    • /
    • pp.986-992
    • /
    • 2012
  • In order to support quickly increasing mobile traffic and deal with various types of users of wireless mobile systems under overlay convergent cognitive networking environments, it is highly required to improve the performance and the capability of the wireless access networks. With distributed antennas and distributed processors, it is possible for mobile terminals (MTs) to monitor interference and control system effectively to minimize mutual interference among users and cells. Virtual cell changes as the MT moves or the environment changes, so no handoff is needed in connections with base station hotelling. In this paper, the characteristics of wireless distributed systems under the overlay convergent networks will be investigated.

Performance Analysis of Cross-Layer Handoff Scheme in IP-Based Next-Generation Wireless Networks (IP기반 차세대 무선 네트워크에서의 교차계층 핸드오프 기법의 성능 분석)

  • Lee, JaeSuk;Jeong, Jongpil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.454-472
    • /
    • 2013
  • The development of wireless network technology and the increasing use of wireless networks to mobile users with a variety of wireless network systems has arisen. Wireless sensor networks, they can be nested together, and the need to switch between the network, depending on your needs. Next Generation Wireless Networks(NGWN) gives the mobile user a wide coverage and optimized service etc. Previous hand off management protocol is not enough to secure support of the NGWN application program. Cross-layer Handoff(CLH) protocol technique has been developed to support between and inside networks of handoff management of NGWN. CLH supports mobility management in a wireless network environment and also utilizes mobility speed and handoff signaling delay information to improve the handoff performance ability. For the analysis of handoff performance ability, we analyzed sensitivity of link layer and network layer, therefore, CLH technique is suggested based on this analysis.

Design and evaluation of a dissimilarity-based anomaly detection method for mobile wireless networks (이동 무선망을 위한 비유사도 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.2
    • /
    • pp.387-399
    • /
    • 2009
  • Mobile wireless networks continue to be plagued by theft of identify and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a dissimilarity-based anomaly detection method which can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, a dissimilarity is computed by a weighted dissimilarity measure. If the value of the weighted dissimilarity measure is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of other anomaly detection methods using dissimilarity measures.

  • PDF

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression

  • Wu, Tin-Yu;Chao, Han-Chieh;Lo, Chi-Hsiang
    • Journal of Information Processing Systems
    • /
    • v.5 no.3
    • /
    • pp.117-130
    • /
    • 2009
  • By providing ubiquitous Internet connectivity, wireless networks offer more convenient ways for users to surf the Internet. However, wireless networks encounter more technological challenges than wired networks, such as bandwidth, security problems, and handoff latency. Thus, this paper proposes new technologies to solve these problems. First, a Security Access Gateway (SAG) is proposed to solve the security issue. Originally, mobile terminals were unable to process high security calculations because of their low calculating power. SAG not only offers high calculating power to encrypt the encryption demand of SAG's domain, but also helps mobile terminals to establish a multiple safety tunnel to maintain a secure domain. Second, Robust Header Compression (RoHC) technology is adopted to increase the utilization of bandwidth. Instead of Access Point (AP), Access Gateway (AG) is used to deal with the packet header compression and de-compression from the wireless end. AG's high calculating power is able to reduce the load on AP. In the original architecture, AP has to deal with a large number of demands by header compression/de-compression from mobile terminals. Eventually, wireless networks must offer users "Mobility" and "Roaming". For wireless networks to achieve "Mobility" and "Roaming," we can use Mobile IPv6 (MIPv6) technology. Nevertheless, such technology might cause latency. Furthermore, how the security tunnel and header compression established before the handoff can be used by mobile terminals handoff will be another great challenge. Thus, this paper proposes to solve the problem by using Early Binding Updates (EBU) and Security Access Gateway (SAG) to offer a complete mechanism with low latency, low handoff mechanism calculation, and high security.

Adaptive Multiple TCP-connection Scheme to Improve Video Quality over Wireless Networks

  • Kim, Dongchil;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4068-4086
    • /
    • 2014
  • Due to the prevalence of powerful mobile terminals and the rapid advancements in wireless communication technologies, the wireless video streaming service has become increasingly more popular. Recent studies show that video streaming services via Transmission Control Protocol (TCP) are becoming more practical. TCP has more advantages than User Diagram Protocol (UDP), including firewall traversal, bandwidth fairness, and reliability. However, each video service shares an equal portion of the limited bandwidth because of the fair sharing characteristics inherent in TCP and this bandwidth fair sharing cannot always guarantee the video quality for each user. To solve this challenging problem, an Adaptive Multiple TCP (AM-TCP) scheme is proposed in this paper to guarantee the video quality for mobile devices in wireless networks. AM-TCP adaptively controls the number of TCP connections according to the video Rate Distortion (RD) characteristics of each stream and network status. The proposed scheme can minimize the total distortion of all participating video streams and maximize the service quality by guaranteeing the quality of each video streaming session. The simulation results show that the proposed scheme can significantly improve the quality of video streaming in wireless networks.

A Mobile-Sink based Energy-efficient Clustering Scheme in Mobile Wireless Sensor Networks (모바일 센서 네트워크에서 모바일 싱크 기반 에너지 효율적인 클러스터링 기법)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the active research into wireless sensor networks has led to the development of sensor nodes with improved performance, including their mobility and location awareness. One of the most important goals of such sensor networks is to transmit the data generated by mobile sensors nodes. Since these sensor nodes move in the mobile wireless sensor networks (MWSNs), the energy consumption required for them to transmit the sensed data to the fixed sink is increased. In order to solve this problem, the use of mobile sinks to collect the data while moving inside the network is studied herein. The important issues are the mobility and energy consumption in MWSNs. Because of the sensor nodes' limited energy, their energy consumption for data transmission affects the lifetime of the network. In this paper, a mobile-sink based energy-efficient clustering scheme is proposed for use in mobile wireless sensor networks (MECMs). The proposed scheme improves the energy efficiency when selecting a new cluster head according to the mobility of the mobile sensor nodes. In order to take into consideration the mobility problem, this method divides the entire network into several cluster groups based on mobile sinks, thereby decreasing the overall energy consumption. Through both analysis and simulation, it was shown that the proposed MECM is better than previous clustering methods in mobile sensor networks from the viewpoint of the network energy efficiency.

Handover Scheme between WiFi and Mobile WiMax (WiFi와 mobile WiMax간 핸드오버 방안)

  • Park, Seung-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.34-41
    • /
    • 2011
  • At present wireless internet access service is available through the 3G network, mobile WiMAX and WiFi anytime and anywhere. In this environment where there are various networks, users should be able to select specific networks depending on different situations. And it is necessary to provide mobility support between homogeneous and between heterogenous networks. Given this situation, the many proposals have been presented to link 3G, which has the largest service area among various networks, with mobile WiMAX(IEEE 802.16e), or with WiFi(IEEE 802.11). But, recently, with the increasing volume of wireless internet use and wireless internet data, due to the advents of net-book, e-book and smart phone, the service area of WiFi and mobile WiMAX has rapidly expanded. Especially, the availability of real-time application such as internet phone has led to the relative shrinking of the proportion of 3G mobile communication network giving conventional voice service, and enlargement of those of wireless internet access networks like WiFi and mobile WiMAX. This paper suggests a handover scheme based on PMIPv6, whitch support mobility between WiFi and mobile WiMAX, and minimizes handover delay. In this scheme, the mobile node has a dual stack structure composed of two interfaces-WiFi and mobile WiMAX. Since WiFi dose not support mobility, it is suggested that the mobile node have the capacity to deal with handover signaling between gateway in case of handover between homogeneous networks. This handover scheme, suggested comparing with current handovers between homogeneous networks, has proved, in its analytic evaluation, to be able to reduce handover, transmission, and signaling overhead.