User Privacy in Legacy Mobile Network Protocols

Author(s):  
Loav Abdelrazek ◽  
Marianne A. Azer
Author(s):  
Gusztáv Adamis

The goal of this chapter is to give an overview about the architecture of GSM and GPRS networks, and introduce to the reader the protocols used for mobility management and call control at the core network. To make it easier to understand the way in which the protocols work, we give many examples to help the readers in his studies. We show how the location update takes place, how the calls are originated and terminated, how the short messages are handled, et cetera.


2009 ◽  
Vol E92-B (12) ◽  
pp. 3893-3902
Author(s):  
Hyeong-Min NAM ◽  
Chun-Su PARK ◽  
Seung-Won JUNG ◽  
Sung-Jea KO

Author(s):  
Bodhy Krishna .S

A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.


Author(s):  
Alexander Driyarkoro ◽  
Nurain Silalahi ◽  
Joko Haryatno

Prediksi lokasi user pada mobile network merupakan hal sangat penting, karena routing panggilan pada mobile station (MS) bergantung pada posisi MS saat itu. Mobilitas MS yang cukup tinggi, terutama di daerah perkotaan, menyebabkan pencarian (tracking) MS akan berpengaruh pada kinerja sistem mobile network, khususnya dalam hal efisiensi kanal kontrol pada air interface. Salah satu bentuk pencarian adalah dengan mengetahui perilaku gerakan yang menentukan posisi MS. Dari MSC/VLR dapat diketahui posisi MS pada waktu tertentu. Karena location area suatu MS selalu unik dari waktu ke waktu, dan hal itu merupakan perilaku (behaviour) MS, maka dapat dibuat profil pergerakannya. Dengan menggunakan Neural Network (NN) akan diperoleh location area MS pada masa yang akan datang. Model NN yang digunakan pada penelitian ini adalah Propagasi Balik. Beberapa parameter NN yang diteliti dalam mempengaruhi kinerja prediksi lokasi user meliputi noise factor, momentum dan learning rate. Pada penelitian ini diperoleh nilai optimal learning rate = 0,5 dan noise factor = 1.


Author(s):  
V. Lyandres

Introduction:Effective synthesis of а mobile communication network includes joint optimisation of two processes: placement of base stations and frequency assignment. In real environments, the well-known cellular concept fails due to some reasons, such as not homogeneous traffic and non-isotropic wave propagation in the service area.Purpose:Looking for the universal method of finding a network structure close to the optimal.Results:The proposed approach is based on the idea of adaptive vector quantization of the network service area. As a result, it is reduced to a 2D discrete map split into zones with approximately equal number of service requests. In each zone, the algorithm finds such coordinates of its base station that provide the shortest average distance to all subscribers. This method takes into account the shortage of the a priory information about the current traffic, ensures maximum coverage of the service area, and what is not less important, significantly simplifies the process of frequency assignment.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Sign in / Sign up

Export Citation Format

Share Document