Spelling suggestions: "subject:"dobile multicast"" "subject:"amobile multicast""
11 |
Integrated Mobility and Service Management for Network Cost Minimization in Wireless Mesh NetworksLi, Yinan 04 June 2012 (has links)
In this dissertation research, we design and analyze integrated mobility and service management for network cost minimization in Wireless Mesh Networks (WMNs). We first investigate the problem of mobility management in WMNs for which we propose two efficient per-user mobility management schemes based on pointer forwarding, and then a third one that integrates routing-based location update and pointer forwarding for further performance improvement.
We further study integrated mobility and service management for which we propose protocols that support efficient mobile data access services with cache consistency management, and mobile multicast services. We also investigate reliable and secure integrated mobility and service man agement in WMNs, and apply the idea to the design of a protocol for secure and reliable mobile multicast. The most salient feature of our protocols is that they are optimal on a per-user basis (or on a per-group basis for mobile multicast), that is, the overall network communication cost incurred is minimized for each individual user (or group). Per-user based optimization is critical because mobile users normally have vastly different mobility and service characteristics. Thus, the overall cost saving due to per-user based optimization is cumulatively significant with an increasing mobile user population.
To evaluate the performance of our proposed protocols, we develop mathematical models and computational procedures used to compute the network communication cost incurred and build simulation systems for validating the results obtained from analytical modeling. We identify optimal design settings under which the network cost is minimized for our mobility and service management protocols in WMNs. Intensive comparative performance studies are carried out to compare our protocols with existing work in the literature. The results show that our protocols significantly outperform existing protocols under identical environmental and operational settings.
We extend the design notion of integrated mobility and service management for cost minimization to MANETs and propose a scalable dual-region mobility management scheme for location-based routing. The basic design concept is to use local regions to complement home regions and have mobile nodes in the home region of a mobile node serve as location servers for that node. We develop a mathematical model to derive the optimal home region size and local region size under which overall network cost incurred is minimized. Through a comparative performance study, we show that dual-region mobility management outperforms existing mobility management schemes based on static home regions. / Ph. D.
|
12 |
Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications : multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communicationsMapoka, Trust Tshepo January 2015 (has links)
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cyber security in any business is obligatory to restrict access of disseminated services to only authorised personnel. This becomes a vital requirement for a successful commercialisation of exchanged group services. The standard way to achieve cyber security in a wireless mobile multicast communication environment is through confidentiality using Group Key Management (GKM).The existing GKM schemes for secure wireless multicast from literature only target single group service confidentiality; however, the adoption of multiple group service confidentiality in them involve inefficient management of keys that induce huge performance overheads unbearable for real time computing. Therefore, a novel authenticated GKM scheme for multiple multicast group subscriptions known as slot based multiple group key management (SMGKM) is proposed. In the SMGKM, the handovers move across diverse decentralised clusters of homogeneous or heterogeneous wireless access network technologies while participating in multiple group service subscriptions. Unlike the conventional art, the SMGKM advances its security by integrating location based authentication and GKM functions. Both functions are securely offloaded from the Domain Key Distributor (DKD) to the intermediate cluster controllers, Area Key Distributors (AKDs), in a distributed fashion, using the proposed location based authenticated membership list (SKDL). A significant upgrade of fast handoff performance with reduced performance overheads of the SMGKM scheme is achieved. The developed numerical analysis and the simulation results display significant resource economy in terms of reduced rekeying transmission, communication bandwidth and storage overheads while providing enhanced security. The performance of the SMGKM in a high speed environment is also evaluated and has demonstrated that SMGKM outperforms the previous work. Finally, the SMGKM correctness against various attacks is verified using BAN logic, the eminent tool for analysing the widely deployed security protocols. The security analysis demonstrates that SMGKM can counteract the security flaws and redundancies identified in the chosen related art.
|
13 |
Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications. Multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communicationsMapoka, Trust Tshepo January 2015 (has links)
Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cyber security in any business is obligatory to restrict access of disseminated services to only authorised personnel. This becomes a vital requirement for a successful commercialisation of exchanged group services. The standard way to achieve cyber security in a wireless mobile multicast communication environment is through confidentiality using Group Key Management (GKM).The existing GKM schemes for secure wireless multicast from literature only target single group service confidentiality; however, the adoption of multiple group service confidentiality in them involve inefficient management of keys that induce huge performance overheads unbearable for real time computing. Therefore, a novel authenticated GKM scheme for multiple multicast group subscriptions known as slot based multiple group key management (SMGKM) is proposed. In the SMGKM, the handovers move across diverse decentralised clusters of homogeneous or heterogeneous wireless access network technologies while participating in multiple group service subscriptions. Unlike the conventional art, the SMGKM advances its security by integrating location based authentication and GKM functions. Both functions are securely offloaded from the Domain Key Distributor (DKD) to the intermediate cluster controllers, Area Key Distributors (AKDs), in a distributed fashion, using the proposed location based authenticated membership list (SKDL).
A significant upgrade of fast handoff performance with reduced performance overheads of the SMGKM scheme is achieved. The developed numerical analysis and the simulation results display significant resource economy in terms of reduced rekeying transmission, communication bandwidth and storage overheads while providing enhanced security. The performance of the SMGKM in a high speed environment is also evaluated and has demonstrated that SMGKM outperforms the previous work. Finally, the SMGKM correctness against various attacks is verified using BAN logic, the eminent tool for analysing the widely deployed security protocols. The security analysis demonstrates that SMGKM can counteract the security flaws and redundancies identified in the chosen related art.
|
14 |
Adaptive Resource Allocation for Statistical QoS Provisioning in Mobile Wireless Communications and NetworksDu, Qinghe 2010 December 1900 (has links)
Due to the highly-varying wireless channels over time, frequency, and space
domains, statistical QoS provisioning, instead of deterministic QoS guarantees, has
become a recognized feature in the next-generation wireless networks. In this dissertation,
we study the adaptive wireless resource allocation problems for statistical QoS
provisioning, such as guaranteeing the specified delay-bound violation probability,
upper-bounding the average loss-rate, optimizing the average goodput/throughput,
etc., in several typical types of mobile wireless networks.
In the first part of this dissertation, we study the statistical QoS provisioning for
mobile multicast through the adaptive resource allocations, where different multicast
receivers attempt to receive the common messages from a single base-station sender
over broadcast fading channels. Because of the heterogeneous fading across different
multicast receivers, both instantaneously and statistically, how to design the efficient
adaptive rate control and resource allocation for wireless multicast is a widely cited
open problem. We first study the time-sharing based goodput-optimization problem
for non-realtime multicast services. Then, to more comprehensively characterize the
QoS provisioning problems for mobile multicast with diverse QoS requirements, we
further integrate the statistical delay-QoS control techniques — effective capacity
theory, statistical loss-rate control, and information theory to propose a QoS-driven
optimization framework. Applying this framework and solving for the corresponding optimization problem, we identify the optimal tradeoff among statistical delay-QoS
requirements, sustainable traffic load, and the average loss rate through the adaptive
resource allocations and queue management. Furthermore, we study the adaptive
resource allocation problems for multi-layer video multicast to satisfy diverse statistical
delay and loss QoS requirements over different video layers. In addition,
we derive the efficient adaptive erasure-correction coding scheme for the packet-level
multicast, where the erasure-correction code is dynamically constructed based on multicast
receivers’ packet-loss statuses, to achieve high error-control efficiency in mobile
multicast networks.
In the second part of this dissertation, we design the adaptive resource allocation
schemes for QoS provisioning in unicast based wireless networks, with emphasis
on statistical delay-QoS guarantees. First, we develop the QoS-driven time-slot and
power allocation schemes for multi-user downlink transmissions (with independent
messages) in cellular networks to maximize the delay-QoS-constrained sum system
throughput. Second, we propose the delay-QoS-aware base-station selection schemes
in distributed multiple-input-multiple-output systems. Third, we study the queueaware
spectrum sensing in cognitive radio networks for statistical delay-QoS provisioning.
Analyses and simulations are presented to show the advantages of our proposed
schemes and the impact of delay-QoS requirements on adaptive resource allocations
in various environments.
|
Page generated in 0.041 seconds