Spelling suggestions: "subject:"[een] WIRELESS MOBILE NETWORKS"" "subject:"[enn] WIRELESS MOBILE NETWORKS""
1 |
Cooperative Location Update in Wireless Mobile NetworksYe, Cai-Fang 06 August 2008 (has links)
In this paper, in order to reduce the location update cost in wireless mobile networks, we propose a cooperative location update scheme. The proposed scheme first discovers the statistical relation between mobile stations according to their history of location update and paging. In order to reduce the total cost of mobility management, we propose integrating the cooperative location update scheme with the concurrent search scheme. We use analytical results and simulation results to justify the usage of the proposed approach.
|
2 |
An Investigation of Group Key Management with Mobility Protocol for 5G Wireless Mobile Environment. A Case analysis of group key management security requirements with respect to wireless mobile environment of different proposed solutionsEya, Nnabuike N. January 2019 (has links)
Group communication, security and 5G technology present a unique dimension
of challenges and security remains crucial in the successful deployment of 5G
technology across different industry. Group key management plays a vital role in
secure group communication.
This research work studies various group key management schemes for mobile
wireless technology and then a new scheme is proposed and evaluated. The
main architecture is analysed, while the components and their roles are
established, trust and keying relationships are evaluated, as well as detailed
functional requirements.
A detailed description of the main protocols required within the scheme is also
described. A numerical and simulation analysis is employed to assess the
proposed scheme with regards to fulfilling the security requirement and
performance requirements. The impact of group size variation, the impact of
mobility rate variation are studied with regards to the average rekeying messages
induced by each event and 1-affects-n phenomenon.
The results obtained from the simulation experiments show that the proposed
scheme outperformed other solutions with a minimal number of rekeying
messages sent and less number of affected members on each event. The
security requirements demonstrate that backward and forward secrecy is
preserved and maintained during mobility between areas.
Finally, the research work also proposes a 5G-enabled software-defined
multicast network (5G-SDMNs), where software-defined networking (SDN) is
exploited to dynamically manage multicast groups in 5G and mobile multicast
environment. Also, mobile edge computing (MEC) is exploited to strengthen
network control of 5G-SDMN. / National Open University of Nigeria
|
3 |
[en] A FRAMEWORK FOR QOS PROVISIONING IN WIRELESS MOBILE NETWORKS / [pt] UM FRAMEWORK PARA PROVISÃO DE QOS EM REDES MÓVEIS SEM FIOLUCIANA DOS SANTOS LIMA 19 March 2003 (has links)
[pt] Nas últimas décadas, tem-se observado um crescente
interesse nas tecnologias relacionadas a ambientes de
comunicação móvel sem fio. Em grande parte, esse interesse
vem acompanhando o crescimento do mercado de
telecomunicações, mais especificamente dos sistemas de
telefonia móvel celular. Os usuários vêm absorvendo
rapidamente essas tecnologias, originando novas
necessidades, como a utilização de serviços de dados
multimídia, que exige garantias de qualidade. Nesse
contexto, um dos desafios encontrados é conseguir a
utilização eficiente do limitado espectro de freqüências
disponível, fornecendo serviços com qualidade para os
usuários. Esta dissertação propõe uma arquitetura para
provisão de qualidade de serviço -QoS- fim-a-fim em redes
móveis sem fio, levando em consideração características
inerentes a esses ambientes. Para alcançar esse objetivo,
são propostas modificações aos frameworks para provisão de
QoS em ambientes genéricos de processamento e comunicação,
visando atender às necessidades trazidas pelas redes
móveis, gerando uma arquitetura adaptável para fornecer QoS
em ambientes que ofereçam suporte à mobilidade. Uma
instanciação dos frameworks para provisão de QoS em redes
móveis sem fio é descrita através de um cenário de
mobilidade, no qual é simulada uma rede infraestruturada
de serviços integrados funcionando sobre o IP Móvel, de
modo a validar a peoposta. / [en] In the last decades, increasing interest has been observed
in technologies related to wireless mobile communication
environments. Great part of such interest follows the
growth in the telecommunications industry, more
specifically of cellular mobile telephony systems. Users
are quickly absorbing these technologies and generating new
necessities, such as the use of services of multimedia
data, which demand quality assurance. In this context, one
of the challenges is the efficient use of the limited
frequency spectrum available, providing users quality
services. This thesis proposes an architecture for the
provision of end-to-end QoS in wireless mobile networks,
taking into account inherent characteristics of these
environments. To reach this purpose, modifications were
proposed to the frameworks for QoS provisioning
in generic processing and communication environments,
aiming to fulfill the necessities brought by mobile
networks, generating an adaptable architecture to offer QoS
in environments that support mobile connections. In order
to validate the proposal, an instantiation of frameworks
for QoS provisioning in wireless mobile networks is
described by means of a mobility scenario in which an
infrastructure network of integrated services is simulated
working over Mobile IP.
|
4 |
Utilisation des propriétés électromagnétiques en sécurité des réseaux sans fil / Signal-Based security in wireless networksBen Hamida, Sana 27 February 2012 (has links)
La sécurité des systèmes de communication mobiles/sans fil est problématique, car ceux-ci sont généralement construits suivant une topologie répartie ou arborescente. Les noeuds qui composent ces réseaux sont caractérisés par des ressources limitées et connectés généralement entre eux d'une manière ad-hoc sans l'aide d'une tierce personne de confiance. Les méthodes de sécurité matures issues du monde des réseaux filaires s'appuient souvent sur des procédés nécessitant des systèmes centralisés et des ressources importantes qui sont difficiles à mettre en place dans des réseaux à fortes contraintes. Dans le cadre de cette thèse, on propose de nouvelles solutions de sécurité qui exploitent les propriétés du médium électromagnétique et de l'interface de radiocommunication dans le but d'assurer des communications sécurisées. La thèse est structurée en deux parties. La première est dédiée au problème de génération de clés de cryptage en exploitant les propriétés des systèmes de communication à bande de fréquence ultra large (ULB). Trois phases sont nécessaires pour convertir le canal radio en clés secrètes: l'estimation du canal, la quantification et l'accord mutuel entre noeuds. Des expérimentations ont été effectuées pour valider les hypothèses sur lesquelles se fondent les méthodes de génération de clés (c.-à-d. la réciprocité et la décorrélation spatiale du canal). Notre étude a montré que la robustesse de ces techniques de sécurité repose sur le choix des algorithmes de numérisation utilisés pour la conversion de la signature du canal ULB vers un format de clé. Une solution adaptative d'extraction a été proposée, évaluée et testée. La robustesse contre les attaques de prédiction du canal a été également examinée. La deuxième partie traite le problème des intrusions illégitimes aux réseaux sans fil. Dans un premier temps, nous testons expérimentalement une méthode basée sur les variations électromagnétiques afin de détecter l'attaque d'écoute passive "eavesdropping" dans les réseaux de capteurs. Par la suite, nous présentons nos travaux concernant l'attaque relais qui est une variante de l'attaque de l'homme-du-milieu et qui est considérée comme un grand défi en particulier pour les systèmes d'authentification. Une nouvelle approche basée sur la détection de la variation des caractéristiques du bruit a été proposée. Des études théoriques et expérimentales ont été conduites pour vérifier la validité de la proposition dans les systèmes de communication de type RFID. / Security in mobile wireless networks is considered a major impediment since these environments are a collection of low-cost devices. They are generally collected in ad hoc manner without the help of trusted third party. Therefore, conventional security methods are always inappropriate. Recent contributions propose to explore the radio communication interface and to turn the radio propagation problems into advantages by providing new alternatives to enhance security. In this thesis, we investigate the signal-based security concept and study its effectiveness through experiments. The first part of this dissertation discusses the problem of key generation from Ultra Wide Band channel. To derive secret keys from channel measurements three stages are required: channel estimation, quantization and key agreement. A campaign of measurements has been performed to confirm the fundamental channel requirements for key generation (i.e., the reciprocity and the spatial decorrelation). Results show that the robustness of such techniques depends on the channel information used as source of randomness as well as on the underlying algorithms. Analysis on the impact of each stage (i.e. the quantization and the key agreement) on the security has been presented. An adaptive key extraction method is proposed, performances are evaluated and robustness against deterministic channel prediction attacks is presented. The second part of the dissertation considers the problem of intrusion detection. First, we test a method based on electromagnetic radiation to discover the presence of an adversary in the receiver/emitter vicinity. Then, the problem of relay attack detection is investigated in RFID systems. A relay attack is a man-in-the middle attack, where the adversary is able to successfully pass the authentication phase by relaying messages between the legitimate verifier and the prover. A new solution based on the noise channel is proposed to detect this attack. Experimental and theoretical results are provided to test the effectiveness of the new proposition.
|
Page generated in 0.033 seconds