scholarly journals An Efficient Patch Dissemination Strategy for Mobile Networks

2013 ◽  
Vol 2013 ◽  
pp. 1-13 ◽  
Author(s):  
Dawei Zhao ◽  
Haipeng Peng ◽  
Lixiang Li ◽  
Yixian Yang ◽  
Shudong Li

Mobile phones and personal digital assistants are becoming increasingly important in our daily life since they enable us to access a large variety of ubiquitous services. Mobile networks, formed by the connection of mobile devices following some relationships among mobile users, provide good platforms for mobile virus spread. Quick and efficient security patch dissemination strategy is necessary for the update of antivirus software so that it can detect mobile virus, especially the new virus under the wireless mobile network environment with limited bandwidth which is also large scale, decentralized, dynamically evolving, and of unknown network topology. In this paper, we propose an efficient semi autonomy-oriented computing (SAOC) based patch dissemination strategy to restrain the mobile virus. In this strategy, some entities are deployed in a mobile network to search for mobile devices according to some specific rules and with the assistance of a center. Through experiments involving both real-world networks and dynamically evolving networks, we demonstrate that the proposed strategy can effectively send security patches to as many mobile devices as possible at a considerable speed and lower cost in the mobile network. It is a reasonable, effective, and secure method to reduce the damages mobile viruses may cause.

2022 ◽  
Vol 2 ◽  
Author(s):  
Jos den Ouden ◽  
Victor Ho ◽  
Tijs van der Smagt ◽  
Geerd Kakes ◽  
Simon Rommel ◽  
...  

Despite the progress in the development of automated vehicles in the last decade, reaching the level of reliability required at large-scale deployment at an economical price and combined with safety requirements is still a long road ahead. In certain use cases, such as automated shuttles and taxis, where there is no longer even a steering wheel and pedals required, remote driving could be implemented to bridge this gap; a remote operator can take control of the vehicle in situations where it is too difficult for an automated system to determine the next actions. In logistics, it could even be implemented to solve already more pressing issues such as shortage of truck drivers, by providing more flexible working conditions and less standstill time of the truck. An important aspect of remote driving is the connection between the remote station and the vehicle. With the current roll-out of 5G mobile technology in many countries throughout the world, the implementation of remote driving comes closer to large-scale deployment. 5G could be a potential game-changer in the deployment of this technology. In this work, we examine the remote driving application and network-level performance of remote driving on a recently deployed sub-6-GHz commercial 5G stand-alone (SA) mobile network. It evaluates the influence of the 5G architecture, such as mobile edge computing (MEC) integration, local breakout, and latency on the application performance of remote driving. We describe the design, development (based on Hardware-in-the-Loop simulations), and performance evaluation of a remote driving solution, tested on both 5G and 4G mobile SA networks using two different vehicles and two different remote stations. Two test cases have been defined to evaluate the application and network performance and are evaluated based on position accuracy, relative reaction times, and distance perception. Results show the performance of the network to be sufficient for remote driving applications at relatively low speeds (<40 km/h). Network latencies compared with 4G have dropped to half. A strong correlation between latency and remote driving performance is not clearly seen and requires further evaluation taking into account the influence of the user interface.


Author(s):  
Marlyn Kemper Littman

The accelerating implementation and remarkable popularity of sophisticated mobile devices, including notebook computers, cellular phones, sensors, cameras, portable GPS (Global Positioning System) receivers, and wireless handhelds such as PDAs (personal digital assistants), contribute to development of wireless grids. Wireless grids feature a flexible and adaptable cyberinfrastructure that supports coordinated and economical access to distributed resources and next-generation applications and services. Generally, wireless grids are classified as ad hoc or standalone, and mixed-mode or hybrid. Ad hoc wireless grids enable diverse applications via MANETs (mobile ad hoc networks) and consist of mobile devices that operate in infrastructureless environments. Mobile network nodes process tasks and provide best effort delivery service to support wireless grid applications (Lima, Gomes, Ziviani, Endler, Soares, & Schulze, 2005). In the healthcare environment, for example, ad hoc wireless grids equipped with sensors monitor the status of critically ill patients and track the location of hospital equipment and supplies. Hybrid or mixed-mode wireless grids augment and extend the capabilities of wireline grids to remote locations; facilitate the shared use of resources and processing power; and consist of components ranging from supercomputers to distributed or edge devices such as very small satellite aperture terminals (VSATs) (Harrison & Taylor, 2006). This chapter features an introduction to factors contributing to the development of present-day wireless grids. Wireless grid technical fundamentals, specifications, and operations are examined. Security challenges associated with safeguarding wireless grids are reviewed. Finally, the distinctive characteristics of innovative wireless grid initiatives are explored and research trends in the wireless grid space are described.


Author(s):  
Roberto Irajá Tavares da Costa Filho ◽  
Filip De Turck ◽  
Luciano Paschoal Gaspary

Ranging from traditional streaming to Virtual Reality (VR) videos, the demand for video applications to mobile devices is booming. In the context of mobile operators a challenging problem is how to handle the increasing video traffic while managing the interplay between infrastructure optimization and QoE. Solving this issue is remarkably difficult, and recent investigations do not consider large-scale networks. In this dissertation paper we explore the solution space of efficient video streaming over mobile networks.


2020 ◽  
Vol 13 (1) ◽  
pp. 101-104
Author(s):  
Márk Kovács ◽  
Péter András Agg ◽  
Zsolt Csaba Johanyák

AbstractDue to the exponentially growing number of mobile devices connected to the Internet, the current 4G LTE-A mobile network will no longer be able to serve the nearly 5 billion mobile devices. With the advent of the fifth generation, however, the number of cybercrimes may increase. This requires building an architecture that can adequately protect against these attacks. For wired networks, the SDN-type architecture has been introduced for some time. As a result, a similar design concept has emerged, which is called Software Defined Mobile Networks (SDMN). This article describes this technology and how it helps prevents DoS, DDoS at-tacks, and IP source spoofing.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


Author(s):  
Hai Wang ◽  
Baoshen Guo ◽  
Shuai Wang ◽  
Tian He ◽  
Desheng Zhang

The rise concern about mobile communication performance has driven the growing demand for the construction of mobile network signal maps which are widely utilized in network monitoring, spectrum management, and indoor/outdoor localization. Existing studies such as time-consuming and labor-intensive site surveys are difficult to maintain an update-to-date finegrained signal map within a large area. The mobile crowdsensing (MCS) paradigm is a promising approach for building signal maps because collecting large-scale MCS data is low-cost and with little extra-efforts. However, the dynamic environment and the mobility of the crowd cause spatio-temporal uncertainty and sparsity of MCS. In this work, we leverage MCS as an opportunity to conduct the city-wide mobile network signal map construction. We propose a fine-grained city-wide Cellular Signal Map Construction (CSMC) framework to address two challenges including (i) the problem of missing and unreliable MCS data; (ii) spatio-temporal uncertainty of signal propagation. In particular, CSMC captures spatio-temporal characteristics of signals from both inter- and intra- cellular base stations and conducts missing signal recovery with Bayesian tensor decomposition to build large-area fine-grained signal maps. Furthermore, CSMC develops a context-aware multi-view fusion network to make full use of external information and enhance signal map construction accuracy. To evaluate the performance of CSMC, we conduct extensive experiments and ablation studies on a large-scale dataset with over 200GB MCS signal records collected from Shanghai. Experimental results demonstrate that our model outperforms state-of-the-art baselines in the accuracy of signal estimation and user localization.


2015 ◽  
Vol 2015 ◽  
pp. 1-18 ◽  
Author(s):  
Na Yu ◽  
Qi Han

Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom) as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.


Author(s):  
Elarbi Abderraouf ◽  
Abdesselam Bassou ◽  
Mohamed Rida Lahcene Rida Lahcene

<p>Thanks to the success of smart phones and mobile-ready laptops, data traffic has recently grown exponentially, and the demand for mobile data has risen very dramatically. These requests in large capacity can only be satisfied by a high efficiency and a very good optimization of the infrastructures of the mobile networks, while taking into account the constraints which are the power, bandwidth and a limited complexity. The task of developing mobile technologies has also evolved from a national or regional focus to a complex and growing mission, supported by global standards development organizations such as 3GPP (3rd Group Partnership Project). Through this research, we present everything related to the simulation of the 4G mobile network system (LTE), which can provide high data flow with good quality, through three model channels known as (EPA, EVA, ETU). In this work we focus on the block ‘iterative decoding channel encoder’ in the LTE system, where the iterative channel coding called ‘Turbo-code’ (TC) is substituted by the iterative coding channel called ‘Unpunctured Turbo Trellis-coded Modulation’ (UTTCM). The simulation results showed that with less decoding complexities, UTTCM's LTE system gives good performance (in terms of BER).</p>


Sign in / Sign up

Export Citation Format

Share Document