A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combin...A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.展开更多
Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely dep...Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.展开更多
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag...Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.展开更多
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ...In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.展开更多
Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. I...Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model.展开更多
The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applicatio...The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applications and terminals with improved multi- media. Wi-Fi is an essential approach to alleviating mobile data traffic load on a cellular network because it provides extra capacity and improves overall performance. In this paper, we propose an integrated LTE/Wi-Fi architecture with software-defined networking (SDN) abstraction in mobile baekhaul and enhanced components that facilitate the move towards next-generation 5G mo- bile networks. Our proposed architecture enables programmable offloading policies that take into account real-time network conditions as well as the status of devices and applications. This mechanism improves overall network performance by deriving real- time policies and steering traffic between cellular and Wi-Fi networks more efficiently.展开更多
With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast...With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast is an effective means for data dissemination in mobile networks. In this paper, the def'mition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for uncertain data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted uncertain data effectively at the cost of a minor increase in data access time, in the case of no transmission error and presence of transmission errors. As a result, lower uncertainty of data benefits the qualifies of the query results based on the data.展开更多
The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the n...The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the network intermittently connected. Detection of malicious node and routing is onerous due to its genre. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made more adorable through Bee Colony Optimization (BCO). The amalgamation of BCO with authentication series leads a novel routing protocol named Privacy Preserving Bee Routing Protocol (PPBRP) which is highly secure. The degree of security is tested with malicious nodes in the network to prove that the proposed PPBRP ensures secure routing.展开更多
Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networ...Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networks(CNNs)proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models.When using ASC systems in the real world,model complexity and device robustness are essential considerations.In this paper,we propose a two-pass mobile network for low-complexity classification of the acoustic scene,named TP-MobNet.With inverse residuals and linear bottlenecks,TPMobNet is based on MobileNetV2,and following mobile blocks,coordinate attention and two-pass fusion approaches are utilized.The log-range dependencies and precise position information in feature maps can be trained via coordinate attention.By capturing more diverse feature resolutions at the network’s end sides,two-pass fusions can also train generalization.Also,the model size is reduced by applying weight quantization to the trained model.By adding weight quantization to the trained model,the model size is also lowered.The TAU Urban Acoustic Scenes 2020 Mobile development set was used for all of the experiments.It has been confirmed that the proposed model,with a model size of 219.6 kB,achieves an accuracy of 73.94%.展开更多
There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices h...There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand.One solution to the problem is the emergence of fifth-generation(5G)wireless communication,which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption.The application of small cells is the fundamental mechanism for the 5Gtechnology.The use of small cells can enhance the facility for higher capacity and reuse.However,it must be noted that small cells deployment will lead to frequent handovers of mobile nodes.Considering the importance of small cells in 5G,this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers formobile phones through careful resources allocation in a two-tier network.Therefore,the resource management problem has been formulated as an optimization issue thatwe aim to overcome through an optimal solution.To find a solution to the existing problem of frequent handovers,a heuristic approach has been used.This solution is then evaluated and validated through simulation and testing,during which the performance was noted to improve by 12%in the context of handover costs.Therefore,this model has been observed to be more efficient as compared to the existing model.展开更多
The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between di...The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.展开更多
Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nat...Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nature of CDR makes them a valuable dataset used for forensic activities.Advances in technology have led to the seamless communication across Multiple Mobile Network(MMN),which poses a threat to the availability and integrity of CDR data.Present CDR implementation is capable of logging peer-to-peer communications over single connection only,thus necessitating improvements on how the CDR data is stored for forensic analysis.In this paper,the problem is solved by identifying and conceptually modelling six new artifacts generated by such communication activities.The newly identified artifacts are introduced into the existing CDR for an incident capturing of the required data for forensic analysis during investigations involved in the MMN communication.Results show an improved absolute speed of 0.0058 s for the MMN-CDR to associate a suspect with an incident,which is 0.0038 s faster than the speed of 0.0097s for the existing CDR to associate a suspect with an accomplice.Thus,a novel method for forensically tracking calls over the MMN has been developed.The MMN-CDR,when forensically analyzed,reveals an increase in time efficiency over the existing CDR due to its high absolute speed.Also,higher accuracy and completeness percentage are both obtained.展开更多
Blockchain can mean many things to many people.It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers.It is a distributed ledger for business and fin...Blockchain can mean many things to many people.It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers.It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies.For technologists,it is the driving force behind the next generation of the internet.On the other hand,it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people,a tool for radically reshaping society and economy.Some view it as a disruptive technology that can be the source of a great deal of fraud,illegal activity,where others see opportunities to bring into existing systems by providing decentralization,transparency,and efficiency.This complex technological,economic,and social phenomenon has been the subject of fervent debate.It calls into question what might have been seen to be established parameters of the modern world like currency,economics,trust,value,and exchange.It is a revolutionary new computing paradigm and one of the most significant,fundamental digital platforms’advances since the internet.It is an emergent technology experiencing very rapid evolution,and so is our understanding of what it is and what it can be.This paper is subject to the use of Blockchain concepts in mobile networks to strengthen the Home Location Registry(HLR)database and make it decentralized for secure transactions and in banking and financial centers.Blockchain also holds potential implications for global commerce.It could make trade more efficient by removing the manual and paper-based processes and introducing streamlined and automated processes.展开更多
As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes s...As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.展开更多
ZTE Corporation, a leading global provider of telecommunications equipment and network solutions, demonstrated successful IMS based Voice over LTE (VoLTE) calls on CSL Limited (CSL)'s LTE network and its existing...ZTE Corporation, a leading global provider of telecommunications equipment and network solutions, demonstrated successful IMS based Voice over LTE (VoLTE) calls on CSL Limited (CSL)'s LTE network and its existing mobile networks at Mobile Asia Congress 2010 (MAC 2010).展开更多
ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for th...ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for the Time Division Long Term Evolution (TD-LTE) industry with the industry's first successful Inter-Operability Test(IOT) of multiple TD-LTE USB dongles in a single mobile network cell. The successful test was first performed in Hong Kong,展开更多
The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to under...The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to understand the condition of multiple comrmunicatinn paths outside the mobile netwtrk, they can get IP performance metrics, such as delay, jitter, bandwidth, packet loss, etc., irrespective of the preserre or absence of measurement functionality. At the same time, the proposed scheme dees not require the MN to he involved in measuring IP performance metrice. The Multihomed Mobile Router (MMR) with heterogeneons wireless interfaces measures IP performance metrics on behalf of the MNs inside the mobile network. Then, MNs can get measured IP perfonmnce metries from the MMR using L3 messages. The proposed scheme can reduce burden and power consumption of MNs with limited resource and batty power since MNs don' t measure IP performance metrics directly. In addition, it can reduce considerably traffic overhead over wireless links on multiple measurement paths since signaling messages and injeeted testing traffic are reduced.展开更多
Current climate forecasting has advanced to the stage of investigating mesoscale air-sea interactions. Recent studies have identified significant structural differences between the cores and edges of mesoscale eddies;...Current climate forecasting has advanced to the stage of investigating mesoscale air-sea interactions. Recent studies have identified significant structural differences between the cores and edges of mesoscale eddies;however, the effects of these structural variations on air-sea fluxes and the Marine Atmospheric Boundary Layer(MABL) remain underexplored. Traditional observations often fail to capture the detailed structures of eddies, necessitating enhanced observations at high spatiotemporal resolution for mesoscale eddies. To address this, efforts have been made to develop multi-agent platforms and expendable air-sea interface observation technologies. A task-oriented observation scheme was developed to monitor the spatial characteristics of mesoscale eddies. The South China Sea(SCS) is rich in mesoscale eddies with rapid motion changes, requiring enhanced observations of the air-sea interface using multi-agent mobile networking. An anticyclonic eddy was observed in the eastern region of the Xisha Islands in the SCS, and we examined variations in air-sea fluxes across different regions within the eddy.展开更多
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti...Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.展开更多
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation...A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.展开更多
基金supported by the National Key R&D Program of China (No.2021YFF0901002)the National Natural Science Foundation of China (No.61802291)+1 种基金Fundamental Research Funds for the Provincial Universities of Zhejiang (GK199900299012-025)Fundamental Research Funds for the Central Universities (No.JB210311).
文摘A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.
基金This research was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2020-2015-0-00403)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation)this work was supported by the Soonchunhyang University Research Fund.
文摘Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.
基金supported by the 863 project (Grant No. 2014AA01A701) Beijing Natural Science Foundation (Grant No. 4152047)
文摘Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.
文摘In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.
基金the National High Technology Research and Development Program of China (2007AA01Z43)
文摘Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model.
文摘The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applications and terminals with improved multi- media. Wi-Fi is an essential approach to alleviating mobile data traffic load on a cellular network because it provides extra capacity and improves overall performance. In this paper, we propose an integrated LTE/Wi-Fi architecture with software-defined networking (SDN) abstraction in mobile baekhaul and enhanced components that facilitate the move towards next-generation 5G mo- bile networks. Our proposed architecture enables programmable offloading policies that take into account real-time network conditions as well as the status of devices and applications. This mechanism improves overall network performance by deriving real- time policies and steering traffic between cellular and Wi-Fi networks more efficiently.
基金Initial Research Foundation of Shanghai Second Polytechnic University ( No.001943)National High Technology Research and Development Program of China(863 Program) (No.2007AA01Z309)
文摘With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast is an effective means for data dissemination in mobile networks. In this paper, the def'mition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for uncertain data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted uncertain data effectively at the cost of a minor increase in data access time, in the case of no transmission error and presence of transmission errors. As a result, lower uncertainty of data benefits the qualifies of the query results based on the data.
文摘The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the network intermittently connected. Detection of malicious node and routing is onerous due to its genre. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made more adorable through Bee Colony Optimization (BCO). The amalgamation of BCO with authentication series leads a novel routing protocol named Privacy Preserving Bee Routing Protocol (PPBRP) which is highly secure. The degree of security is tested with malicious nodes in the network to prove that the proposed PPBRP ensures secure routing.
基金This work was supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)[No.2021-0-0268,Artificial Intelligence Innovation Hub(Artificial Intelligence Institute,Seoul National University)]。
文摘Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networks(CNNs)proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models.When using ASC systems in the real world,model complexity and device robustness are essential considerations.In this paper,we propose a two-pass mobile network for low-complexity classification of the acoustic scene,named TP-MobNet.With inverse residuals and linear bottlenecks,TPMobNet is based on MobileNetV2,and following mobile blocks,coordinate attention and two-pass fusion approaches are utilized.The log-range dependencies and precise position information in feature maps can be trained via coordinate attention.By capturing more diverse feature resolutions at the network’s end sides,two-pass fusions can also train generalization.Also,the model size is reduced by applying weight quantization to the trained model.By adding weight quantization to the trained model,the model size is also lowered.The TAU Urban Acoustic Scenes 2020 Mobile development set was used for all of the experiments.It has been confirmed that the proposed model,with a model size of 219.6 kB,achieves an accuracy of 73.94%.
基金This work was supported by the Taif University Researchers Supporting Project number(TURSP-2020/79),Taif University,Taif,Saudi Arabia.
文摘There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand.One solution to the problem is the emergence of fifth-generation(5G)wireless communication,which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption.The application of small cells is the fundamental mechanism for the 5Gtechnology.The use of small cells can enhance the facility for higher capacity and reuse.However,it must be noted that small cells deployment will lead to frequent handovers of mobile nodes.Considering the importance of small cells in 5G,this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers formobile phones through careful resources allocation in a two-tier network.Therefore,the resource management problem has been formulated as an optimization issue thatwe aim to overcome through an optimal solution.To find a solution to the existing problem of frequent handovers,a heuristic approach has been used.This solution is then evaluated and validated through simulation and testing,during which the performance was noted to improve by 12%in the context of handover costs.Therefore,this model has been observed to be more efficient as compared to the existing model.
文摘The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.
文摘Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nature of CDR makes them a valuable dataset used for forensic activities.Advances in technology have led to the seamless communication across Multiple Mobile Network(MMN),which poses a threat to the availability and integrity of CDR data.Present CDR implementation is capable of logging peer-to-peer communications over single connection only,thus necessitating improvements on how the CDR data is stored for forensic analysis.In this paper,the problem is solved by identifying and conceptually modelling six new artifacts generated by such communication activities.The newly identified artifacts are introduced into the existing CDR for an incident capturing of the required data for forensic analysis during investigations involved in the MMN communication.Results show an improved absolute speed of 0.0058 s for the MMN-CDR to associate a suspect with an incident,which is 0.0038 s faster than the speed of 0.0097s for the existing CDR to associate a suspect with an accomplice.Thus,a novel method for forensically tracking calls over the MMN has been developed.The MMN-CDR,when forensically analyzed,reveals an increase in time efficiency over the existing CDR due to its high absolute speed.Also,higher accuracy and completeness percentage are both obtained.
文摘Blockchain can mean many things to many people.It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers.It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies.For technologists,it is the driving force behind the next generation of the internet.On the other hand,it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people,a tool for radically reshaping society and economy.Some view it as a disruptive technology that can be the source of a great deal of fraud,illegal activity,where others see opportunities to bring into existing systems by providing decentralization,transparency,and efficiency.This complex technological,economic,and social phenomenon has been the subject of fervent debate.It calls into question what might have been seen to be established parameters of the modern world like currency,economics,trust,value,and exchange.It is a revolutionary new computing paradigm and one of the most significant,fundamental digital platforms’advances since the internet.It is an emergent technology experiencing very rapid evolution,and so is our understanding of what it is and what it can be.This paper is subject to the use of Blockchain concepts in mobile networks to strengthen the Home Location Registry(HLR)database and make it decentralized for secure transactions and in banking and financial centers.Blockchain also holds potential implications for global commerce.It could make trade more efficient by removing the manual and paper-based processes and introducing streamlined and automated processes.
基金funded by the National High-Technology Research and Development Program of China"(863"Program)under Grant No.2009AA01Z427
文摘As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.
文摘ZTE Corporation, a leading global provider of telecommunications equipment and network solutions, demonstrated successful IMS based Voice over LTE (VoLTE) calls on CSL Limited (CSL)'s LTE network and its existing mobile networks at Mobile Asia Congress 2010 (MAC 2010).
文摘ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for the Time Division Long Term Evolution (TD-LTE) industry with the industry's first successful Inter-Operability Test(IOT) of multiple TD-LTE USB dongles in a single mobile network cell. The successful test was first performed in Hong Kong,
文摘The new measurement scheme of IP performance metrics is for the mobile network in heterogeneous wireless network environment. In the proposed scheme, when Mobile Nodes (MNs) inside the mobile network needs to understand the condition of multiple comrmunicatinn paths outside the mobile netwtrk, they can get IP performance metrics, such as delay, jitter, bandwidth, packet loss, etc., irrespective of the preserre or absence of measurement functionality. At the same time, the proposed scheme dees not require the MN to he involved in measuring IP performance metrice. The Multihomed Mobile Router (MMR) with heterogeneons wireless interfaces measures IP performance metrics on behalf of the MNs inside the mobile network. Then, MNs can get measured IP perfonmnce metries from the MMR using L3 messages. The proposed scheme can reduce burden and power consumption of MNs with limited resource and batty power since MNs don' t measure IP performance metrics directly. In addition, it can reduce considerably traffic overhead over wireless links on multiple measurement paths since signaling messages and injeeted testing traffic are reduced.
基金supported by the National Key R&D Program of China (Grant No.2018YFC1405700)the National Natural Science Foundation of China (Grant No.42227901)。
文摘Current climate forecasting has advanced to the stage of investigating mesoscale air-sea interactions. Recent studies have identified significant structural differences between the cores and edges of mesoscale eddies;however, the effects of these structural variations on air-sea fluxes and the Marine Atmospheric Boundary Layer(MABL) remain underexplored. Traditional observations often fail to capture the detailed structures of eddies, necessitating enhanced observations at high spatiotemporal resolution for mesoscale eddies. To address this, efforts have been made to develop multi-agent platforms and expendable air-sea interface observation technologies. A task-oriented observation scheme was developed to monitor the spatial characteristics of mesoscale eddies. The South China Sea(SCS) is rich in mesoscale eddies with rapid motion changes, requiring enhanced observations of the air-sea interface using multi-agent mobile networking. An anticyclonic eddy was observed in the eastern region of the Xisha Islands in the SCS, and we examined variations in air-sea fluxes across different regions within the eddy.
文摘Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.
基金Project supported by the National Natural Science Foundation of China (Grant No. 62073172)the Natural Science Foundation of Jiangsu Province of China (Grant No. BK20221329)。
文摘A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.