A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation...A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.展开更多
Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Int...Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks.展开更多
With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to res...With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart.展开更多
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti...Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.展开更多
For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this articl...For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this article proposes a rerouting triggering scheme for path optimization after handover and a new minimum cost handover algorithm for mobile satellite networks. This algorithm ensures the quality of service (QoS) parameters, such as delay, during the handover and minimizes the handover costs. Simulation indicates that this algorithm is superior to other current algorithms in guaranteeing the QoS and decreasing handover costs.展开更多
In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random...In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random geometrics. Through mathematical proof the optimal number of relay nodes and the optimal location of each node for data transmission can be obtained when a distance is given.In the ADPC first the source node computes the optimal number and the sites of the relay nodes between the source and the destination nodes.Then it searches feasible relay nodes around the optimal virtual relay-sites and selects one link with the minimal total transmission energy consumption for data transmission.Simulation results show that the ADPC can reduce both the energy dissipation and the end-to-end latency of the transmission.展开更多
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks....An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others.展开更多
A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality ar...A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality are formulized and deduced. The relevant factors are obtained by a cross-layer mechanism or Feedback method. According to these relevant factors, the variable set and the Bayesian network topology are determined. Then a Bayesian network prediction model is constructed. The results of the prediction can be used as the bandwidth of the mobile ad hoc network (MANET). According to the bandwidth, the video encoder is controlled to dynamically adjust and encode the right bit rates of a real-time video stream. Integrated simulation of a video streaming communication system is implemented to validate the proposed solution. In contrast to the conventional transfer scheme, the results of the experiment indicate that the proposed scheme can make the best use of the network bandwidth; there are considerable improvements in the packet loss and the visual quality of real-time video.K展开更多
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s...The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.展开更多
Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely dep...Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.展开更多
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to...Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.展开更多
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s...Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.展开更多
The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility ...The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility of users as well as satisfy the required quality of service(QoS) such as the end-to-end response latency experienced by each user. We formulate the problem of joint resource allocation as a combinatorial optimization problem. Three evolutionary approaches are considered to solve the problem: genetic algorithm(GA), ant colony optimization with genetic algorithm(ACO-GA), and quantum genetic algorithm(QGA). To decrease the time complexity, we propose a mapping process between the resource allocation matrix and the chromosome of GA, ACO-GA, and QGA, search the available radio and cloud resource pairs based on the resource availability matrixes for ACOGA, and encode the difference value between the allocated resources and the minimum resource requirement for QGA. Extensive simulation results show that our proposed methods greatly outperform the existing algorithms in terms of running time, the accuracy of final results, the total utility, resource utilization and the end-to-end response latency guaranteeing.展开更多
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T...Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently.展开更多
With the advent of 5G era,the rise of cloud services,virtual reality/virtual reality(AR/VR),vehicle networking and other technologies has put forward new requirements for the bandwidth and delay of the bearer network....With the advent of 5G era,the rise of cloud services,virtual reality/virtual reality(AR/VR),vehicle networking and other technologies has put forward new requirements for the bandwidth and delay of the bearer network.Traditional Ethernet technology cannot meet the new requirements very well.Flex Ethernet(FlexE)technology has emerged as the times require.This paper introduces the background,standardization process,functional principle,application mode and technical advantages of FlexE technology,and finally analyses its application prospects and shortcomings in 5G mobile transport network.展开更多
The emerging mobile edge networks with content caching capability allows end users to receive information from adjacent edge servers directly instead of a centralized data warehouse,thus the network transmission delay...The emerging mobile edge networks with content caching capability allows end users to receive information from adjacent edge servers directly instead of a centralized data warehouse,thus the network transmission delay and system throughput can be improved significantly.Since the duplicate content transmissions between edge network and remote cloud can be reduced,the appropriate caching strategy can also improve the system energy efficiency of mobile edge networks to a great extent.This paper focuses on how to improve the network energy efficiency and proposes an intelligent caching strategy according to the cached content distribution model for mobile edge networks based on promising deep reinforcement learning algorithm.The deep neural network(DNN)and Q-learning algorithm are combined to design a deep reinforcement learning framework named as the deep-Q neural network(DQN),in which the DNN is adopted to represent the approximation of action-state value function in the Q-learning solution.The parameters iteration strategies in the proposed DQN algorithm were improved through stochastic gradient descent method,so the DQN algorithm could converge to the optimal solution quickly,and the network performance of the content caching policy can be optimized.The simulation results show that the proposed intelligent DQN-based content cache strategy with enough training steps could improve the energy efficiency of the mobile edge networks significantly.展开更多
Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researche...Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET) is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2, NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation. Keywords Adhoc On-Demand Distance Vector (AODV) routing - Dynamic Source routing (DSR) - Mobile Adhoc Networks (MANET) - Wireless Networked Control Systems (WNCS) Mohammad Shahidul Hasan received his BSc and first MSc in Computer Science from the University of Dhaka, Bangladesh. He obtained his 2nd MSc in Computer & Network Engineering from Sheffield Hallam University, Sheffield, UK. Currently he is pursuing his PhD under the Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, UK in Networked Control Systems over MANET.Chris Harding received his BSc in Computing Science and Masters by Research from Staffordshire University, UK. Currently he is pursuing his PhD in Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.Hongnian Yu is Professor of Computer Science at Staffordshire University. He was a lecturer in Control and Systems Engineering at Yanshan University, China in 1985–1990, did his PhD in Robotics at King’s College London (1990–1994), was a research fellow in Manufacturing Systems at Sussex University (1994–1996), a lecturer in Artificial Intelligence at Liver-pool John Moore’s University (1996–1999), a lecturer in Control and Systems Engineering at the University of Exeter (1999–2002), and a Senior Lecturer in Computing at the University of Bradford (2002–2004). He now leads the Mobile Computing and Distributed Systems Research Group at Staffordshire University. He was a founding member of the Modeling Optimisation Scheduling and Intelligent Control research group at the University of Bradford. He has extensive research experience in neural networks, mobile computing, modeling, control of robot manipulators, and modeling, scheduling, planning, and simulations of large discrete event dynamic systems with applications to manufacturing systems, supply chains, transportation networks, and computer networks. He has published over 100 research papers focusing on the following: neural networks, computer networks, adaptive and robust control of robot manipulators, analysis and control of hybrid machines, control of timed delay systems, predictive control, manufacturing system modeling and scheduling, planning, and supply chains. He has held several research grants from EPSRC, the Royal Society, and the EU, as well as from industry. He was awarded the F.C. William Premium for his paper on adaptive and robust control of robot manipulators by the IEE Council in 1997. Professor Yu is an EPSRC college member, a member of IEEE, and a committee member of several conferences and journal editorial boards.Alison Griffiths has been a Senior Lecturer in Telecommunications at Staffordshire University since 2003. She was a lecturer in Computing at Staffordshire University in 2002–2003. She was a Research Associate on an EPSRC funded project whilst doing her PhD on the convergence of Mobile Computing and Telecommunications at Staffordshire University (1999–2003). The investigation consisted of the communication of different types of media (voice, video conferencing, web browsing, and downloading) over a common network, using a mobile device. Problems considered were the complications that occurred when a user moves, and consequently changes their end-point in the network during communication, with respect to the type of service the user is provided with (delays and losses). She obtained both her MEng and 1st Class BEng (Hons) from Staffordshire University in 1999 and 1998 respectively. She is now part of the Mobile Computing and Distributed Systems Research Group at Staffordshire University. She has published 8 research papers focusing on quality of service and access between cellular and IP packet switched networks. Future directions include mobile agents and control of mobile wireless ad-hoc networks. Her current research interests have extended to Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.展开更多
Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and ...Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors.展开更多
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ...In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.展开更多
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag...Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No. 62073172)the Natural Science Foundation of Jiangsu Province of China (Grant No. BK20221329)。
文摘A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2022R1A2C1003549).
文摘Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks.
文摘With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart.
文摘Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.
基金National Natural Science Foundation of China (60532030)National Natural Science Foundation for Distinguished Young Scholars(60625102)
文摘For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this article proposes a rerouting triggering scheme for path optimization after handover and a new minimum cost handover algorithm for mobile satellite networks. This algorithm ensures the quality of service (QoS) parameters, such as delay, during the handover and minimizes the handover costs. Simulation indicates that this algorithm is superior to other current algorithms in guaranteeing the QoS and decreasing handover costs.
基金The National Basic Research Program of China(973 Program)(No.2009CB320501)the National Natural Science Foundation of China(No.61370209,61272532)the Natural Science Foundation of Jiangsu Province(No.BK2010414,BK2011335)
文摘In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random geometrics. Through mathematical proof the optimal number of relay nodes and the optimal location of each node for data transmission can be obtained when a distance is given.In the ADPC first the source node computes the optimal number and the sites of the relay nodes between the source and the destination nodes.Then it searches feasible relay nodes around the optimal virtual relay-sites and selects one link with the minimal total transmission energy consumption for data transmission.Simulation results show that the ADPC can reduce both the energy dissipation and the end-to-end latency of the transmission.
基金The National Natural Science Foundation of China(No60362001)
文摘An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others.
基金The National High Technology Research and Development Program of China (863Program) (No.2003AA1Z2130)the Scienceand Technology Project of Zhejiang Province(No.2005C11001-02)
文摘A novel bandwidth prediction and control scheme is proposed for video transmission over an ad boc network. The scheme is based on cross-layer, feedback, and Bayesian network techniques. The impacts of video quality are formulized and deduced. The relevant factors are obtained by a cross-layer mechanism or Feedback method. According to these relevant factors, the variable set and the Bayesian network topology are determined. Then a Bayesian network prediction model is constructed. The results of the prediction can be used as the bandwidth of the mobile ad hoc network (MANET). According to the bandwidth, the video encoder is controlled to dynamically adjust and encode the right bit rates of a real-time video stream. Integrated simulation of a video streaming communication system is implemented to validate the proposed solution. In contrast to the conventional transfer scheme, the results of the experiment indicate that the proposed scheme can make the best use of the network bandwidth; there are considerable improvements in the packet loss and the visual quality of real-time video.K
基金This project was supported by the National Natural Science Foundation of China (60672068)the National High Technology Development 863 Program of China (2006AA01Z436, 2007AA01Z452.)
文摘The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.
基金This research was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2020-2015-0-00403)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation)this work was supported by the Soonchunhyang University Research Fund.
文摘Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.
基金the National High Technology Development "863" Program of China (2006AA01Z436, 2007AA01Z452)the National Natural Science Foundation of China(60702042).
文摘Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.
基金National Key Basic Research Program of China (973 Program) under Grant No.2012CB315802 and No.2013CB329102.National Natural Science Foundation of China under Grant No.61171102 and No.61132001.New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No.2011ZX03002-002-01,Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478
文摘Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.
基金supported by the National Natural Science Foundation of China (No. 61741102, No. 61471164)China Scholarship Council
文摘The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility of users as well as satisfy the required quality of service(QoS) such as the end-to-end response latency experienced by each user. We formulate the problem of joint resource allocation as a combinatorial optimization problem. Three evolutionary approaches are considered to solve the problem: genetic algorithm(GA), ant colony optimization with genetic algorithm(ACO-GA), and quantum genetic algorithm(QGA). To decrease the time complexity, we propose a mapping process between the resource allocation matrix and the chromosome of GA, ACO-GA, and QGA, search the available radio and cloud resource pairs based on the resource availability matrixes for ACOGA, and encode the difference value between the allocated resources and the minimum resource requirement for QGA. Extensive simulation results show that our proposed methods greatly outperform the existing algorithms in terms of running time, the accuracy of final results, the total utility, resource utilization and the end-to-end response latency guaranteeing.
基金This project was supported by the National"863"High Technology Development Programof China (2003AA148010) Key Technologies R&D Programof China (2002DA103A03 -07)
文摘Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently.
文摘With the advent of 5G era,the rise of cloud services,virtual reality/virtual reality(AR/VR),vehicle networking and other technologies has put forward new requirements for the bandwidth and delay of the bearer network.Traditional Ethernet technology cannot meet the new requirements very well.Flex Ethernet(FlexE)technology has emerged as the times require.This paper introduces the background,standardization process,functional principle,application mode and technical advantages of FlexE technology,and finally analyses its application prospects and shortcomings in 5G mobile transport network.
基金This work was supported by the National Natural Science Foundation of China(61871058,WYF,http://www.nsfc.gov.cn/).
文摘The emerging mobile edge networks with content caching capability allows end users to receive information from adjacent edge servers directly instead of a centralized data warehouse,thus the network transmission delay and system throughput can be improved significantly.Since the duplicate content transmissions between edge network and remote cloud can be reduced,the appropriate caching strategy can also improve the system energy efficiency of mobile edge networks to a great extent.This paper focuses on how to improve the network energy efficiency and proposes an intelligent caching strategy according to the cached content distribution model for mobile edge networks based on promising deep reinforcement learning algorithm.The deep neural network(DNN)and Q-learning algorithm are combined to design a deep reinforcement learning framework named as the deep-Q neural network(DQN),in which the DNN is adopted to represent the approximation of action-state value function in the Q-learning solution.The parameters iteration strategies in the proposed DQN algorithm were improved through stochastic gradient descent method,so the DQN algorithm could converge to the optimal solution quickly,and the network performance of the content caching policy can be optimized.The simulation results show that the proposed intelligent DQN-based content cache strategy with enough training steps could improve the energy efficiency of the mobile edge networks significantly.
文摘Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET) is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2, NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation. Keywords Adhoc On-Demand Distance Vector (AODV) routing - Dynamic Source routing (DSR) - Mobile Adhoc Networks (MANET) - Wireless Networked Control Systems (WNCS) Mohammad Shahidul Hasan received his BSc and first MSc in Computer Science from the University of Dhaka, Bangladesh. He obtained his 2nd MSc in Computer & Network Engineering from Sheffield Hallam University, Sheffield, UK. Currently he is pursuing his PhD under the Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, UK in Networked Control Systems over MANET.Chris Harding received his BSc in Computing Science and Masters by Research from Staffordshire University, UK. Currently he is pursuing his PhD in Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.Hongnian Yu is Professor of Computer Science at Staffordshire University. He was a lecturer in Control and Systems Engineering at Yanshan University, China in 1985–1990, did his PhD in Robotics at King’s College London (1990–1994), was a research fellow in Manufacturing Systems at Sussex University (1994–1996), a lecturer in Artificial Intelligence at Liver-pool John Moore’s University (1996–1999), a lecturer in Control and Systems Engineering at the University of Exeter (1999–2002), and a Senior Lecturer in Computing at the University of Bradford (2002–2004). He now leads the Mobile Computing and Distributed Systems Research Group at Staffordshire University. He was a founding member of the Modeling Optimisation Scheduling and Intelligent Control research group at the University of Bradford. He has extensive research experience in neural networks, mobile computing, modeling, control of robot manipulators, and modeling, scheduling, planning, and simulations of large discrete event dynamic systems with applications to manufacturing systems, supply chains, transportation networks, and computer networks. He has published over 100 research papers focusing on the following: neural networks, computer networks, adaptive and robust control of robot manipulators, analysis and control of hybrid machines, control of timed delay systems, predictive control, manufacturing system modeling and scheduling, planning, and supply chains. He has held several research grants from EPSRC, the Royal Society, and the EU, as well as from industry. He was awarded the F.C. William Premium for his paper on adaptive and robust control of robot manipulators by the IEE Council in 1997. Professor Yu is an EPSRC college member, a member of IEEE, and a committee member of several conferences and journal editorial boards.Alison Griffiths has been a Senior Lecturer in Telecommunications at Staffordshire University since 2003. She was a lecturer in Computing at Staffordshire University in 2002–2003. She was a Research Associate on an EPSRC funded project whilst doing her PhD on the convergence of Mobile Computing and Telecommunications at Staffordshire University (1999–2003). The investigation consisted of the communication of different types of media (voice, video conferencing, web browsing, and downloading) over a common network, using a mobile device. Problems considered were the complications that occurred when a user moves, and consequently changes their end-point in the network during communication, with respect to the type of service the user is provided with (delays and losses). She obtained both her MEng and 1st Class BEng (Hons) from Staffordshire University in 1999 and 1998 respectively. She is now part of the Mobile Computing and Distributed Systems Research Group at Staffordshire University. She has published 8 research papers focusing on quality of service and access between cellular and IP packet switched networks. Future directions include mobile agents and control of mobile wireless ad-hoc networks. Her current research interests have extended to Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.
基金Project(07JJ1010) supported by the Hunan Provincial Natural Science Foundation of China for Distinguished Young ScholarsProjects(61073037,60773013) supported by the National Natural Science Foundation of China
文摘Most existing work on survivability in mobile ad-hoc networks(MANETs) focuses on two dimensional(2D) networks.However,many real applications run in three dimensional(3D) networks,e.g.,climate and ocean monitoring,and air defense systems.The impact on network survivability due to node behaviors was presented,and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity.Node behaviors were modeled by using a semi-Markov process.The node minimum degree of 3D MANETs was discussed.An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors,based on the model of node isolation.The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description,and the effectiveness and rationality of the proposed approach are verified through numerical analysis.The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors.
文摘In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.
基金supported by the 863 project (Grant No. 2014AA01A701) Beijing Natural Science Foundation (Grant No. 4152047)
文摘Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.