To see the other types of publications on this topic, follow the link: Private mobile radio networks.

Journal articles on the topic 'Private mobile radio networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Private mobile radio networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gruet, Christophe, Xavier Pons-Masbernat, and Pierre Force. "The LTE Evolution: Private Mobile Radio Networks." IEEE Vehicular Technology Magazine 8, no. 2 (June 2013): 64–70. http://dx.doi.org/10.1109/mvt.2013.2252291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palanisamy, Ramesh, Senthil Jayapal, Anand M, and Jeelani Basha. "ENHANCED HYBRID COGNITIVE RADIO AD HOC NETWORKS (CRAHNs) FOR MOBILE NETWORK." International Journal of Computer Science and Mobile Computing 11, no. 11 (November 30, 2022): 237–46. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.020.

Full text
Abstract:
In sensor networks, a very crucial aspect of the maintenance of the communications of secure data is the data, which is the most difficult of all tasks. The sensor network consists of hierarchical elements like the Base Station (BS), the Cluster Head (CH) and the Sensor Nodes (SNs), and this will have three different keys, which are the public and private, the cluster and the master keys. Through the opportunistic use of the currently available wireless spectrum, cognitive radio (CR) technology is intended to address the issues in wireless networks brought on by the limited amount of range accessible and the inefficient use of spectrum. With the inherent capabilities of cognitive radio, CR networks will offer the most advanced spectrum-aware communication paradigm in wireless communications. However, the significant spectral fluctuation and various quality-of-service (QoS) requirements faced by CR networks provide unique difficulties. The distributed multihop design, the dynamic network topology, and the time- and location-varying spectrum availability are essential differentiating elements in cognitive radio ad hoc networks (CRAHNs).
APA, Harvard, Vancouver, ISO, and other styles
3

Canales, María, Ángela Hernández, and Antonio Valdovinos. "Trunking capacity estimation for wide area multicell private mobile radio networks." AEU - International Journal of Electronics and Communications 64, no. 1 (January 2010): 8–16. http://dx.doi.org/10.1016/j.aeue.2008.09.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haldorai, Anandakumar, Jeevanandham Sivaraj, Munivenkatappa Nagabushanam, and Michaelraj Kingston Roberts. "Cognitive Wireless Networks Based Spectrum Sensing Strategies: A Comparative Analysis." Applied Computational Intelligence and Soft Computing 2022 (October 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/6988847.

Full text
Abstract:
Because of numerous dormant application fields, wireless sensor networks (WSNs) have emerged as an important and novel area in radio and mobile computing research. These applications range from enclosed system configurations in the home and office to alfresco enlistment in an opponent’s landmass in a strategic flashpoint. Cognitive radio networks (CRNs) can be created by integrating radio link capabilities with network layer operations utilizing cognitive radios. The goal of CRN design is to optimize the general system operations to meet customer requirements at any location worldwide by much more efficiently addressing CRNs instead of simply connecting spectrum utilization. When compared to conventional radio networks, CRNs are more versatile and susceptible to wireless connections. Recent advancements in wireless communication have resulted in increasing spectrum scarcity. As a modern innovation, cognitive radio aims to tackle this challenge by proactively utilizing the spectrum. Because cognitive radio (CR) technology gives assailants additional possibilities than a normal wireless network, privacy in a CRN becomes a difficult challenge. We concentrate on examining the surveillance system at a societal level, in which both defense and monitoring are critical components in assuring the channel’s privacy. The current state of investigation into spectrum sensing and potential risks in cognitive radios is reviewed in this study.
APA, Harvard, Vancouver, ISO, and other styles
5

Imanbayev, A. Zh, S. Tynymbayev, R. S. Odarchenko, and Zh Alikhankyzy. "ANALYSIS OF THE SECURITY PROBLEMS OF FIFTH GENERATION MOBILE NETWORKS." BULLETIN Series of Physics & Mathematical Sciences 76, no. 4 (December 15, 2021): 21–28. http://dx.doi.org/10.51889/2021-4.1728-7901.03.

Full text
Abstract:
For now, the development of 5G mobile networks will have a significant impact on security. The 3GPP 5G standard is independent in the sense that it is flexible enough to allow for different types of physical and virtual overlap between the radio access network and the core of the network. The separation of functions between the radio access network and the core raises questions about competitiveness and performance. This article first looks at the security requirements of 5G, including security requirements for business applications, network architecture, air interface, and user privacy. On this basis, the challenges faced by the current mobile security architecture are analyzed and internal security elements are examined from a network architecture perspective. Subsequently, taking into account the security resources and technical characteristics brought by innovations in 5G network and radio interface technologies, the current state of research and development trends of the main technologies for additional 5G security support, including physical layer security, encryption and the use of blockchain technology in 5G, are presented, as well as some countermeasures and proposals to protect 5G networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Daeuble, Stephane, and Carlijn Williams. "PRIVATE WIRELESS MARKET." SYNCHROINFO JOURNAL 8, no. 3 (2022): 12–17. http://dx.doi.org/10.36724/2664-066x-2022-8-3-12-17.

Full text
Abstract:
Label switching technoloIndustry 4.0 operations enable you to fuse physical and digital processes by connecting everything from vehicles to sensors and mobile workers in the most flexible, affordable, secure and reliable way. By digitalizing operations, enterprises can easily transform data into insights and become more agile and proactive. To meet the requirements of AI, machine learning and automation, industries need highly reliable, low latency and secure wireless connectivity with high bandwidth. 4.9G/LTE and 5G industrial-grade private wireless networks are the only wireless solutions available that have proven records to meet the demands of Industry 4.0 mission and business-critical applications. They provide robust, secure and reliable connectivity for everything that is critical to your operations, from people and machines to sensors and analytics. Radio access points provide coverage of your outdoor and indoor spaces, similar to Wi-Fi, but you will need far fewer. Unlike Wi-Fi, there is a core network, which is the key to enabling mobility, ensuring security and maintaining quality-of-service parameters. The backhaul network is no different than what you would use to connect Wi-Fi access points, whether cabled Ethernet, passive optical LAN and/or microwave depending on the application and the distances served.gy, MPLS, Multiprotocol label switching, MPLS TE, Routing problems, BGP “Blackhole”.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Chuan, Shuhui Chen, and Zhiping Cai. "LTE Phone Number Catcher: A Practical Attack against Mobile Privacy." Security and Communication Networks 2019 (September 30, 2019): 1–10. http://dx.doi.org/10.1155/2019/7425235.

Full text
Abstract:
Phone number is a unique identity code of a mobile subscriber, which plays a more important role in the mobile social network life than another identification number IMSI. Unlike the IMSI, a mobile device never transmits its own phone number to the network side in the radio. However, the mobile network may send a user’s phone number to another mobile terminal when this user initiating a call or SMS service. Based on the above facts, with the help of an IMSI catcher and 2G man-in-the-middle attack, this paper implemented a practicable and effective phone number catcher prototype targeting at LTE mobile phones. We caught the LTE user’s phone number within a few seconds after the device camped on our rogue station. This paper intends to verify that mobile privacy is also quite vulnerable even in LTE networks as long as the legacy GSM still exists. Moreover, we demonstrated that anyone with basic programming skills and the knowledge of GSM/LTE specifications can easily build a phone number catcher using SDR tools and commercial off-the-shelf devices. Hence, we hope the operators worldwide can completely disable the GSM mobile networks in the areas covered by 3G and 4G networks as soon as possible to reduce the possibility of attacks on higher-generation cellular networks. Several potential countermeasures are also discussed to temporarily or permanently defend the attack.
APA, Harvard, Vancouver, ISO, and other styles
8

Lorenz, Vinzenz. "Use of Wireless Technologies in the Industrial Environment With Blockchain." Open Conference Proceedings 2 (December 15, 2022): 143–49. http://dx.doi.org/10.52825/ocp.v2i.146.

Full text
Abstract:
This paper presents the development of an OpenThread network within the framework of a BMBF project, which is intended to transfer production data to a private blockchain in order to store the data in a tamper-proof and transparent manner. Among other things, special radio modules were developed for this purpose which support the OpenThread and Bluetooth Low Energy radio standards and thus additionally enable the connection of mobile devices to the private blockchain. During the conception and development of the radio modules as well as the communication protocols, emphasis was placed on ensuring that the radio network meets the high requirements for its use in an industrial environment, such as commissioning through plug & play,robustness, availability, data transfer rate, latency and, above all, IT security.
APA, Harvard, Vancouver, ISO, and other styles
9

Patalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 19, 2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.

Full text
Abstract:
The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, Temporal Key Integrity Protocol (TKIP) generating a dynamic sequential key and CRC-32 checksum to detecting the error in our packets. The MSLP uses the stored symmetric secret key calculated on the basis of the Diffie-Hellman Key sharing scheme to generate keystream for cryptography functions. The secret key stored in the device’s filesystem our database prior to the deployment on Mobile Cloud Computing and remains the same throughout the session of communication. These systems use the dynamic initialization vector to avoid reply attacks and message integrity code calculated on source and destination devices addresses and actual frame contents. In the proposed thesis paper we analyze the security measures at the MSLP level and before transmitting information over the mobile networks, the information is encrypted in the form of frames and at the physical layer, this frame converted into its equivalent radio signals.
APA, Harvard, Vancouver, ISO, and other styles
10

Math, Sa, Lejun Zhang, Seokhoon Kim, and Intae Ryoo. "An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment." Security and Communication Networks 2020 (October 21, 2020): 1–11. http://dx.doi.org/10.1155/2020/8881640.

Full text
Abstract:
The existence of Mobile Edge Computing (MEC) provides a novel and great opportunity to enhance user quality of service (QoS) by enabling local communication. The 5th generation (5G) communication is consisting of massive connectivity at the Radio Access Network (RAN), where the tremendous user traffic will be generated and sent to fronthaul and backhaul gateways, respectively. Since fronthaul and backhaul gateways are commonly installed by using optical networks, the bottleneck network will occur when the incoming traffic exceeds the capacity of the gateways. To meet the requirement of real-time communication in terms of ultralow latency (ULL), these aforementioned issues have to be solved. In this paper, we proposed an intelligent real-time traffic control based on MEC to handle user traffic at both gateways. The method sliced the user traffic into four communication classes, including conversation, streaming, interactive, and background communication. And MEC server has been integrated into the gateway for caching the sliced traffic. Subsequently, the MEC server can handle each user traffic slice based on its QoS requirements. The evaluation results showed that the proposed scheme enhances the QoS and can outperform on the conventional approach in terms of delays, jitters, and throughputs. Based on the simulated results, the proposed scheme is suitable for improving time-sensitive communication including IoT sensor’s data. The simulation results are validated through computer software simulation.
APA, Harvard, Vancouver, ISO, and other styles
11

Mackay, Michael, Alessandro Raschella, and Ogeen Toma. "Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment." Future Internet 14, no. 2 (January 21, 2022): 34. http://dx.doi.org/10.3390/fi14020034.

Full text
Abstract:
With the widespread deployment of 5G gaining pace, there is increasing interest in deploying this technology beyond traditional Mobile Network Operators (MNO) into private and community scenarios. These deployments leverage the flexibility of 5G itself to support private networks that sit alongside or even on top of existing public 5G. By utilizing a range of virtualisation and slicing techniques in the 5G Core (5GC) and heterogeneous Radio Access Networks (RAN) at the edge, a wide variety of use cases can be supported by 5G. However, these non-typical deployments may experience different performance characteristics as they adapt to their specific scenario. In this paper we present the results of our work to model and predict the performance of millimeter wave (mmWave) backhaul links that were deployed as part of the Liverpool 5G network. Based on the properties of the 802.11ad protocol and the physical characteristics of the environment, we simulate how each link will perform with different signal-to-noise ratio (SNR) and Packet Error Rate (PER) values and verify them against real-world deployed links. Our results show good convergence between simulated and real results and provide a solid foundation for further network planning and optimization.
APA, Harvard, Vancouver, ISO, and other styles
12

Witters, Donald, and Paul Ruggera. "Tests for Radio Frequency Interference to Medical Telemetry Operating in the Private Land Mobile Radio Service (PLMRS) from Newly Allocated PLMRS Channels." Biomedical Instrumentation & Technology 41, no. 3 (May 2007): 244–51. http://dx.doi.org/10.2345/0899-8205(2007)41[244:tfrfit]2.0.co;2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sasaki, Seishi, and Teruo Fumoto. "A low bit rate speech codec using mixed excitation linear prediction for private mobile radio." Electronics and Communications in Japan (Part II: Electronics) 87, no. 6 (2004): 69–81. http://dx.doi.org/10.1002/ecjb.20096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Akman, Gizem, Philip Ginzboorg, and Valtteri Niemi. "Privacy-Aware Access Protocols for MEC Applications in 5G." Network 2, no. 2 (April 1, 2022): 203–24. http://dx.doi.org/10.3390/network2020014.

Full text
Abstract:
Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the mobile network operator (MNO). First, we create a system model based on this scenario. Second, we define the adversary model and give the list of privacy requirements for this system model. We also analyze the impact on user privacy when some of the parties in our model share information that is not strictly needed for providing the service. Third, we introduce a privacy-aware access protocol for the system model and analyze this protocol against the privacy requirements.
APA, Harvard, Vancouver, ISO, and other styles
15

Saeed, Mamoon M., Rashid A. Saeed, Rania A. Mokhtar, Hesham Alhumyani, and Elmustafa Sayed Ali. "A Novel Variable Pseudonym Scheme for Preserving Privacy User Location in 5G Networks." Security and Communication Networks 2022 (March 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7487600.

Full text
Abstract:
Due to the development in 5G mobile communications, user privacy becomes the main challenge, especially with the multiplicity of services and applications that can be accessed. Location privacy is related to the user privacy in terms of the possibility of tracking and unwanted advertisements, as well as the possibility of exposure to suspicious activities and terrorist attacks based on the user location. Accordingly, previous mobile systems use pseudonyms instead of a permanent identity to preserving the user’s location privacy in mobile networks, by what is known as the Cellular Radio Network Temporary Identifiers (C-RNTIs). The C-RNTI protects the user privacy relatively, but it faces some problems due to the clear text of the user in CRNI exchange, which will make the user easily trackable by man-in-the-middle attack. This article aims at proposing a new algorithm that improves the user’s location privacy and enhances the capabilities of the 5G infrastructure in terms of confidentiality and privacy. The idea is based on the use of a novel variable pseudonym (V-RNTI) algorithm that acts as a radio channel identifier for the user, which improves the allocation of pseudonyms to identify users. The proposed algorithm uses different V-RNTI values by the UE and can be changed frequently to improve the pseudonym allocation procedure. This approach can be implemented in 3GPP standard architecture by upgrading UEs and eNB by minor modifications. During this study, the proposed 5G V-RNTI authentication protocol model was built. And then, the automated analysis of the protocol model is performed by using ProVerif Model Checker. The results showed that the model works well without any noticeable problems.
APA, Harvard, Vancouver, ISO, and other styles
16

Coker, Wincharles. "Freedom of speech and the discourse of flaming in Ghana: Evidence from radio panel discussions." Abibisem: Journal of African Culture and Civilization 4 (December 1, 2011): 78–90. http://dx.doi.org/10.47963/ajacc.v4i.881.

Full text
Abstract:
Following the liberalisation of the airwaves in Ghana in the mid-1990s, the right to freedom of speech has been guaranteed although not without abuses. This freedom is evident in the activities of radio networks that urge listeners to participate in radio panel discussions (RPDs) through making interactive telephone calls or by posting text messages. In this paper, I explore the discourse of flaming on the panel discussions of Joy FM and Peace FM, two popular private radio stations. Grounded in Herring's (2004) computer-mediated discourse analysis, the Judy shows that listeners of RPDs use SMS to deprecate other selves. The study also reveals that flaming is precipitated by such technological affordances of mobile telephony as anonymity, pseudonymy and facelessness. The analysis further shows that social dissatisfactions were more frequent on RPDs than political complaints. Based on these findings, the study recommends that media houses educate the public on the face threatening potential of the SMS technology, given that derisive messages undermine the social, cultural and national cohesion.
APA, Harvard, Vancouver, ISO, and other styles
17

Fumoto, Teruo, Seishi Sasaki, and Koji Kondo. "A low-bit-rate speech codec using multiband excitation and LPC modeling of harmonic magnitudes for private mobile radio." Electronics and Communications in Japan (Part II: Electronics) 88, no. 1 (2004): 40–50. http://dx.doi.org/10.1002/ecjb.20140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Fujdiak, Radek, Konstantin Mikhaylov, Jan Pospisil, Ales Povalac, and Jiri Misurec. "Insights into the Issue of Deploying a Private LoRaWAN." Sensors 22, no. 5 (March 5, 2022): 2042. http://dx.doi.org/10.3390/s22052042.

Full text
Abstract:
The last decade has transformed wireless access technologies and crystallized a new direction for the internet of things (IoT). The modern low-power wide-area network (LPWAN) technologies have been introduced to deliver connectivity for billions of devices while keeping the costs and consumption low, and the range of communication high. While the 5G (fifth generation mobile network) LPWAN-like radio technologies, namely NB-IoT (narrowband internet of things) and LTE-M (long-term evolution machine type communication) are emerging, the long-range wide-area network (LoRaWAN) remains extremely popular. One unique feature of this technology, which distinguishes it from the competitors, is the possibility of supporting both public and private network deployments. In this paper we focus on this aspect and deliver original results comparing the performance of the private and public LoRAWAN deployment options; these results should help understand the LoRaWAN technology and give a clear overview of the advantages and disadvantages of the private versus public approaches. Notably, we carry the comparison along the three dimensions: the communication performance, the security, and the cost analysis. The presented results illustratively demonstrate the differences of the two deployment approaches, and thus can support selection of the most efficient deployment option for a target application.
APA, Harvard, Vancouver, ISO, and other styles
19

S, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (March 29, 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.

Full text
Abstract:
The speed of internet has increased dramatically with the introduction of 4G and 5G promises an even greater transmission rate with coverage outdoors and indoors in smart cities. This indicates that the introduction of 5G might result in replacing the Wi-Fi that is being currently used for applications such as geo-location using continuous radio coverage there by initiating the involvement of IoT in all devices that are used. The introduction of Wi-Fi 6 is already underway for applications that work with IoT, smart city applications will still require 5G to provide internet services using Big Data to reduce the requirement of mobile networks and additional private network infrastructure. However, as the network access begins to expand, it also introduces the risk of cyber security with the enhanced connectivity in the networking. Additional digital targets will be given to the cyber attackers and independent services will also be sharing access channel infrastructure between mobile and wireless network. In order to address these issues, we have introduced a random neural network blockchain technology that can be used to strengthen cybersecurity in many applications. Here the identity of the user is maintained as a secret while the information is codified using neural weights. However, when a cyber security breach occurs, the attacker will be easily tracked by mining the confidential identity. Thus a reliable and decentralized means of authentication method is proposed in this work. The results thus obtained are validated and shows that the introduction of the random neural network using blockchain improves connectivity, decentralized user access and cyber security resilience.
APA, Harvard, Vancouver, ISO, and other styles
20

Andure, Aaryaman. "5G Network Simulation in Smart Cities using Neural Network Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 1433–35. http://dx.doi.org/10.22214/ijraset.2022.47608.

Full text
Abstract:
Abstract: The speed of internet has increased dramatically with the introduction of 4G and 5G promises an even greater transmission rate with coverage outdoors and indoors in smart cities. This indicates that the introduction of 5G might result in replacing the Wi-Fi that is being currently used for applications such as geo-location using continuous radio coverage there by initiating the involvement of IoT in all devices that are used. The introduction of WiFi 6 is already underway for applicationsthat work with IoT, smart city applications will still require 5G to provide internet services using Big Data to reduce the requirement of mobile networks and additional private network infrastructure. However, as the network access begins to expand, it also introduces the risk of cyber security with the enhanced connectivity in the networking. Additional digital targets will be given to the cyber attackers and independent services will also be sharing access channel infrastructure between mobile and wireless network. In order to address these issues, we have introduced a random neural network blockchain technology that can be used to strengthen cybersecurity in many applications. Here the identity of the user is maintained as a secret while the information is codified using neural weights. However, when a cyber security breach occurs, the attacker will be easily tracked by mining the confidential identity. Thus a reliable anddecentralized means of authentication method is proposed in this work. The results thus obtained are validated and shows that the introduction of the random neural network using blockchain improves connectivity, decentralized user access and cybersecurity resilience
APA, Harvard, Vancouver, ISO, and other styles
21

Chun, Ji Young, and Geontae Noh. "Privacy-Preserving RFID-Based Search System." Electronics 10, no. 5 (March 4, 2021): 599. http://dx.doi.org/10.3390/electronics10050599.

Full text
Abstract:
The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in a group of tags using a mobile reader. Unfortunately, privacy infringement and availability issues in the search system have not been adequately addressed to date. In this paper, we propose a novel RFID tag search protocol that will enhance mobile reader user privacy while being able to operate under conditions of unstable connection to a central server. First, the proposed protocol preserves the privacy of mobile reader users. The privacy of the mobile reader user is at risk because the signal strength emitted from a mobile reader is much stronger than that from the tag, exposing the location of the mobile reader user and thus compromising the user’s privacy. Thus far, such privacy issues have been overlooked. The second issue is presented because of wireless connections that are either unreliable or too remote, causing a mobile reader to disconnect from the central server. The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader. In unstable environments, the protocol can successfully locate specific tags without any server.
APA, Harvard, Vancouver, ISO, and other styles
22

Lin, Weiwei, Tiansheng Huang, Xin Li, Fang Shi, Xiumin Wang, and Ching-Hsien Hsu. "Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–23. http://dx.doi.org/10.1145/3430503.

Full text
Abstract:
In addition to the stationary mobile edge computing (MEC) servers, a few MEC surrogates that possess a certain mobility and computation capacity, e.g., flying unmanned aerial vehicles (UAVs) and private vehicles, have risen as powerful counterparts for service provision. In this article, we design a two-stage online scheduling scheme, targeting computation offloading in a UAV-assisted MEC system. On our stage-one formulation, an online scheduling framework is proposed for dynamic adjustment of mobile users' CPU frequency and their transmission power, aiming at producing a socially beneficial solution to users. But the major impediment during our investigation lies in that users might not unconditionally follow the scheduling decision released by servers as a result of their individual rationality. In this regard, we formulate each step of online scheduling on stage one into a non-cooperative game with potential competition over the limited radio resource. As a solution, a centralized online scheduling algorithm, called ONCCO, is proposed, which significantly promotes social benefit on the basis of the users' individual rationality. On our stage-two formulation, we are working towards the optimization of UAV computation resource provision, aiming at minimizing the energy consumption of UAVs during such a process, and correspondingly, another algorithm, called WS-UAV, is given as a solution. Finally, extensive experiments via numerical simulation are conducted for an evaluation purpose, by which we show that our proposed algorithms achieve satisfying performance enhancement in terms of energy conservation and sustainable service provision.
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Da-Zhi, and Ji-Dong Zhong. "Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing." Security and Communication Networks 2021 (June 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5598574.

Full text
Abstract:
As an open standard for the short-range radio frequency communications, Bluetooth is suitable for Mobile Crowdsensing Systems (MCS). However, the massive deployment of personal Bluetooth-enabled devices also raises privacy concerns on their wielders. Hence, we investigate the privacy of the unilateral authentication protocol according to the recent Bluetooth standard v5.2. The contributions of the paper are twofold. (1) We demonstrate that the unilateral authentication protocol suffers from privacy weakness. That is, the attacker is able to identify the target Bluetooth-enabled device once he observed the device’s previous transmitted messages during the protocol run. More importantly, we analyze the privacy threat of the Bluetooth MCS, when the attacker exploits the proposed privacy weakness under the typical Internet of Things (IoT) scenarios. (2) An improved unilateral authentication protocol is therefore devised to repair the weakness. Under our formal privacy model, the improved protocol provably solves the traceability problem of the original protocol in the Bluetooth standard. Additionally, the improved protocol can be easily adapted to the Bluetooth standards because it merely employs the basic cryptographic components available in the standard specifications. In addition, we also suggest and evaluate two countermeasures, which do not need to modify the original protocol.
APA, Harvard, Vancouver, ISO, and other styles
24

Saeed, Mamoon, Rashid A. Saeed, Rania A. Mokhtar, Hesham Alhumyani, and Elmustafa Syed Ali. "Preserving Privacy Location in 5G by Using Variable Pseudonym." Transactions on Networks and Communications 8, no. 5 (October 31, 2020): 10–25. http://dx.doi.org/10.14738/tnc.85.9571.

Full text
Abstract:
User privacy is one of the most issues addressed extensively in mobile communications evolutions, research literature, and standardization. Location privacy is a key parameter and crucial aspect for user privacy, where most of the tracking, Unsolicited advertising, malicious activities, and location-based terrorism attacks are depending on the location of the victims. For preserving location privacy, various methods in previous mobile networks use a pseudonym instead of permanent identity i.e. Cell Radio Network Temporary Identifiers (C-RNTI), However, these methods based on C-RNII have been proofed that faces many vulnerable due to the clear text used for C-RNII exchange. A man-in-the-middle attack can easily trace users and collect information. The main objective of this paper is to propose a new location privacy algorithm that can greatly enhance the capabilities of the 5G architecture. The proposed algorithm introduces a novel variable pseudonym (V-RNTI) as an identifier for the user radio channel. Also, it provides an enhanced pseudonyms allocation procedure for identification. A new procedure that enabling UE to use different values for V-RNTI changed frequently using agreed equations to generate the values of the identifier. The proposed scheme is compatible with 3GPP standards architecture, where minor modifications/upgrades are needed for UEs eNB. Specifically, we build our model of the 5G V-RNTI authentication protocol and perform an automated security verification tool analysis of the protocol model by using the ProVerif model checker. Our analysis results show that the proposed procedure is working without flaws.
APA, Harvard, Vancouver, ISO, and other styles
25

Cao, Jin, Hui Li, Maode Ma, and Fenghua Li. "UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/6854612.

Full text
Abstract:
Machine Type Communication (MTC), as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN) for massive MTC (mMTC) devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A) networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership Project (3GPP) require several handover signaling interactions, which could cause the signaling load over the access network and the core network. Besides, several distinct handover procedures are proposed for different mobility scenarios, which will increase the system complexity. In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC) techniques, which is to fit in with all of the mobility scenarios in the LTE-A networks. Compared with the current 3GPP standards, our scheme can achieve a simple authentication process with robust security protection including privacy preservation and thus avoid signaling congestion. The correctness of the proposed group handover authentication protocol is formally proved in the Canetti-Krawczyk (CK) model and verified based on the AVISPA and SPAN.
APA, Harvard, Vancouver, ISO, and other styles
26

Naresh, Vankamamidi S., Sivaranjani Reddi, and Nistala V. E. S. Murthy. "Secure Lightweight IoT Integrated RFID Mobile Healthcare System." Wireless Communications and Mobile Computing 2020 (March 3, 2020): 1–13. http://dx.doi.org/10.1155/2020/1468281.

Full text
Abstract:
Patient safety is a global public health concern nowadays, especially in elderly people who need physiological health monitoring systems integrated with a technology which will help to oversee and manage the medical needs. In this direction, we propose a lightweight effective healthcare monitoring system designed by using the Internet of Things (IoT) and Radio Frequency Identification (RFID) tags. In this technique, we use dual-band RFID protocols which are the one working at a high frequency of 13.56 MHz and useful to figure out the individuals, and 2.45 GHz microwave bands are used to monitor corporal information. Sensors are used to monitor and collect patient physiological data; RFID tag is used to recognize the patient. This IoT-based RFID healthcare monitoring system provides acquisition of physiological information of elderly people and patients in hospital. Further, it is aiming to secure patient’s health recordings using hyper elliptic curve- (HEC-) based signcryption algorithm while allowing the doctor to access patient health information. Privacy is provided to variable length patient medical records using different genus curves, and the evaluation shows that the proposed algorithm is optimal with respect to healthcare.
APA, Harvard, Vancouver, ISO, and other styles
27

Davide Borsatti, Gianluca Davoli, Chiara Lombardo, Daniela Selvi, Roberto Bruschi, Walter Cerroni, Franco Davoli, Carla Raffaelli, Riccardo Trivisonno, and Raffaele Bolla. "Increasing safety levels in human-machine interaction by beyond-5G wireless redundancy." ITU Journal on Future and Evolving Technologies 3, no. 3 (November 22, 2022): 589–601. http://dx.doi.org/10.52953/fjiv5836.

Full text
Abstract:
Factory automation in the context of Industry 4.0/5.0 requires safety levels to satisfy more stringent and tight limits than those available so far. This goal is further challenged by the extension to the wireless environment of industrial shop floor communications that were traditionally based on cabled networks. Starting with wireless LANs, the trend towards the use of industrial wireless is fostered by the advent of fifth Generation (5G) private connectivity and is bound to increase its pace in the evolution towards 6G. In particular, the interaction of human operators with industrial robots and autonomous vehicles on the shop floor is posing stringent safety requirements that in turn push forward the dependability and reliability limits of wireless connectivity. To help achieve these limits, this paper proposes a dynamic redundancy mechanism based on the real-time activation/deactivation of radio bearers instantiated between mobile devices carried by humans and machines and multiple base stations, to achieve guaranteed upper bounds on packet loss probability in the communication of data related to operational safety control loops. An optimization problem is posed, and suitable heuristics are evaluated by simulation in a 5G and beyond wireless environment, aiming to dynamically maintain the required reliability levels with small computational effort.
APA, Harvard, Vancouver, ISO, and other styles
28

Barrios-Rubio, Andrés, and Gloria Consuelo Fajardo Fajardo Valencia. "The Media in the Construction of Reality in the Context of Colombian Social Nonconformity." Information 13, no. 8 (August 7, 2022): 378. http://dx.doi.org/10.3390/info13080378.

Full text
Abstract:
Introduction: Convergence of linguistics and semiotics materializes in the text not only the conceptual content that is expressed through codes, but the message also underlies the realism of the communicative intentions of the issuing agent in a specific context and the value of the interactions of the actors of the communicative act. Methodology: The vision of reality that is established in the collective imaginary must be analyzed from the interpretation of society and culture, the laws of operation and their constituent parts. For this, this research approached two newspapers of national circulation, five general radio channels of national coverage, and two television newscasts of private channels, and through the use of quantitative instruments, the posts, tweets or videos were reviewed in order to analyze the constituent elements of the discourse—text, images, hashtags, or keywords—which are appreciated from the syntactic and semantic perspectives (structural) and pragmatics (functional). Results: The communication process in its social context denotes the intervention of nonlinguistic elements of sociocultural order that demarcate the generation and interpretation of the meanings and senses of linguistic expressions. Discussion: The linguistic structure offers conditions for communication, but any generation and transmission of meanings is a product of the intention of the subjects who use it for specific purposes and in specific communicative situations within a social context. Conclusions: Intensive use of digital technology and social networks naturalized a relationship of proximity and familiarity in the communication process, satisfaction of needs in the multiplicity of information that is created and distributed in the network bundled to mobile devices and the political and social ecosystem of the nation.
APA, Harvard, Vancouver, ISO, and other styles
29

Firouzi, Ramin, and Rahim Rahmani. "5G-Enabled Distributed Intelligence Based on O-RAN for Distributed IoT Systems." Sensors 23, no. 1 (December 23, 2022): 133. http://dx.doi.org/10.3390/s23010133.

Full text
Abstract:
Edge-based distributed intelligence techniques, such as federated learning (FL), have recently been used in many research fields thanks, in part, to their decentralized model training process and privacy-preserving features. However, because of the absence of effective deployment models for the radio access network (RAN), only a tiny number of FL apps have been created for the latest generation of public mobile networks (e.g., 5G and 6G). There is an attempt, in new RAN paradigms, to move toward disaggregation, hierarchical, and distributed network function processing designs. Open RAN (O-RAN), as a cutting-edge RAN technology, claims to meet 5G services with high quality. It includes integrated, intelligent controllers to provide RAN with the power to make smart decisions. This paper proposes a methodology for deploying and optimizing FL tasks in O-RAN to deliver distributed intelligence for 5G applications. To accomplish model training in each round, we first present reinforcement learning (RL) for client selection for each FL task and resource allocation using RAN intelligence controllers (RIC). Then, a slice is allotted for training depending on the clients chosen for the task. Our simulation results show that the proposed method outperforms state-of-art FL methods, such as the federated averaging algorithm (FedAvg), in terms of convergence and number of communication rounds.
APA, Harvard, Vancouver, ISO, and other styles
30

Baashirah, Rania, and Abdelshakour Abuzneid. "SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography." Electronics 8, no. 10 (October 15, 2019): 1166. http://dx.doi.org/10.3390/electronics8101166.

Full text
Abstract:
Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supports the authentication of readers and tags by distributing and managing the credentials. Recent lightweight RFID authentication protocols have been proposed to satisfy the security features of RFID networks. Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server. However, many security challenges arise from implementing lightweight authentication protocols in serverless RFID systems. We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC). The protocol also maintains the confidentiality and privacy of the messages, tag information, and location. Although most of the current serverless protocols assume secure channels in the setup phase, we assume an insecure environment during the setup phase between the servers, readers, and tags. We ensure that the credentials can be renewed by any checkpoint server in the mobile RFID network. Thus, we implement ECC in the setup phase (renewal phase), to transmit and store the communication credentials of the server to multiple readers so that the tags can perform the mutual authentication successfully while far from the server. The proposed protocol is compared with other serverless frameworks proposed in the literature in terms of computation cost and attacks resistance.
APA, Harvard, Vancouver, ISO, and other styles
31

Ali, Kamil J. "Measurements of Electromagnetic Fields Emitted from Cellular Base Stations in Shirqat City." Tikrit Journal of Engineering Sciences 20, no. 1 (March 31, 2013): 51–61. http://dx.doi.org/10.25130/tjes.20.1.06.

Full text
Abstract:
With increasing the usage of mobile communication devices and internet network information, the entry of private telecommunications companies in Iraq has been started since 2003. These companies began to build up cellular towers to accomplish the telecommunication works but they ignore the safety conditions imposed for the health and environment that are considered in a random way. These negative health effects which may cause a health risk for life beings and environmental pollution. The aim of this work is to determine the safe and unsafe ranges and discuss damage caused by radiation emitted from Asia cell base stations in Shirqat city and discuses the best ways in which can minimize its exposure level to avoid its negative health effects. Practical measurements of power density around base stations have been accomplished by using a radiation survey meter type (Radio frequency EMF Strength Meter 480846) in two ways. The first way of measurements has been accomplished at a height of 2 meters above ground for different distances (0-300) meters. The second way is at a distance of 150 meters for different levels from (2-15) meters above ground level. The maximum measured power density is about (3) mW/m2. Results indicate that the levels of power density are far below the RF radiation exposure of USSR safety standards levels. And that means these cellular base stations don’t cause negative the health effect for life being if the exposure is within the acceptable international standard levels.
APA, Harvard, Vancouver, ISO, and other styles
32

Gozalvez, Javier. "Heterogeneous Wireless Networks [Mobile Radio]." IEEE Vehicular Technology Magazine 6, no. 2 (June 2011): 9–13. http://dx.doi.org/10.1109/mvt.2011.941495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Saha, Debashis. "Handbook of Mobile Radio Networks." Computer Communications 25, no. 3 (February 2002): 343. http://dx.doi.org/10.1016/s0140-3664(01)00344-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sasaki, S., and T. Fumoto. "Background noise suppressor for private mobile radio." Electronics Letters 37, no. 19 (2001): 1190. http://dx.doi.org/10.1049/el:20010795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hurley, S. "Planning effective cellular mobile radio networks." IEEE Transactions on Vehicular Technology 51, no. 2 (March 2002): 243–53. http://dx.doi.org/10.1109/25.994802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Iraqi, Y. "Mobile Radio Networks: Networking and Protocols." Computer Communications 23, no. 13 (July 2000): 1319. http://dx.doi.org/10.1016/s0140-3664(00)00212-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fokin, G. "Evolution of Positioning Radio Interfaces in Mobile Radio Networks." Telecom IT 8, no. 2 (June 2020): 77–91. http://dx.doi.org/10.31854/2307-1303-2020-8-2-77-91.

Full text
Abstract:
In this paper, we analyze the evolutionary features of the radio interfaces of cellular 2G–4G mobile radio systems from the point of view of solving network positioning problems. The analysis shows that along with the improvement of the parameters of positioning signals, special mechanisms appeared for their formation, processing and reuse in different cells, which contributed to increasing the accuracy of the collection of primary measurements.
APA, Harvard, Vancouver, ISO, and other styles
38

Casetti, Claudio. "For Mobile Networks Too, Sustainability Is Key [Mobile Radio]." IEEE Vehicular Technology Magazine 17, no. 1 (March 2022): 5–11. http://dx.doi.org/10.1109/mvt.2021.3130398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Shiuh-Jeng, and Yuh-Ren Tsai. "Private communications in hierarchical group-mobile radio system." Journal of Discrete Mathematical Sciences and Cryptography 7, no. 2 (January 2004): 187–201. http://dx.doi.org/10.1080/09720529.2004.10697999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Elsayed, Associate Professor, Khaled Fouad. "CDMA Mobile Radio Design." Computer Communications 26, no. 9 (June 2003): 1028. http://dx.doi.org/10.1016/s0140-3664(02)00245-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Vick, A., and M. Chemnitz. "Vernetzte Transportroboter in der Fabriklogistik*/Networked Robots for Factory Logistics – Factory Cloud and 4G/5G Campus Network for an Innovative Production Control and Robotic Logistics." wt Werkstattstechnik online 109, no. 09 (2019): 634–38. http://dx.doi.org/10.37544/1436-4980-2019-09-20.

Full text
Abstract:
Die Transformation zur digitalen und flexiblen Produktion ist für Unternehmen schwierig. Während die klassischen Wertschöpfungsprozesse ihrem Ende entgegensehen, müssen neue Produkte entwickelt und die Produktion geplant und vorbereitet werden. Dafür steht in Zukunft immer weniger Zeit zur Verfügung, sodass grundsätzlich völlig andere Fertigungs- und Logistikkonzepte in der Fabrik etabliert werden müssen. Eine besonders wandelbare und skalierbare Technologie bietet hier die mobile Robotik in Kombination mit einem privaten Mobilfunknetz und Edge-Cloud Rechenleistung.   The transformation from traditional to digital production is a significant effort for most production companies. As long-term value creation is depleting, new products and production processes have to be developed in a much shorter time. Completely new concepts for manufacturing and logistics are needed in the factories of the future to meet these requirements for flexible and scalable production. One possible strategy is the combination of mobile robots and mobile radio communication together with edge cloud computing resources.
APA, Harvard, Vancouver, ISO, and other styles
42

Lau, C. T., and C. Leung. "Capture models for mobile packet radio networks." IEEE Transactions on Communications 40, no. 5 (May 1992): 917–25. http://dx.doi.org/10.1109/26.141457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Nakano, K., S. Olariu, and J. L. Schwing. "Broadcast-efficient protocols for mobile radio networks." IEEE Transactions on Parallel and Distributed Systems 10, no. 12 (1999): 1276–89. http://dx.doi.org/10.1109/71.819949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cacciapuoti, Angela Sara, Marcello Caleffi, Luigi Paura, and Md Arafatur Rahman. "Channel availability for mobile cognitive radio networks." Journal of Network and Computer Applications 47 (January 2015): 131–36. http://dx.doi.org/10.1016/j.jnca.2014.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Heikkilä, Marjo, Jani Suomalainen, Ossi Saukko, Tero Kippola, Kalle Lähetkangas, Pekka Koskela, Juha Kalliovaara, et al. "Unmanned Agricultural Tractors in Private Mobile Networks." Network 2, no. 1 (December 30, 2021): 1–20. http://dx.doi.org/10.3390/network2010001.

Full text
Abstract:
The need for high-quality communications networks is urgent in data-based farming. A particular challenge is how to achieve reliable, cost-efficient, secure, and broadband last-mile data transfer to enable agricultural machine control. The trialed ad hoc private communications networks built and interconnected with different alternative wireless technologies, including 4G, 5G, satellite and tactical networks, provide interesting practical solutions for connectivity. A remotely controlled tractor is exemplified as a use case of machine control in the demonstrated private communication network. This paper describes the results of a comparative technology analysis and a field trial in a realistic environment. The study includes the practical implementation of video monitoring and the optimization of the control channel for remote-controlled unmanned agricultural tractors. The findings from this study verify and consolidate the requirements for network technologies and for cybersecurity enablers. They highlight insights into the suitability of different wireless technologies for smart farming and tractor scenarios and identify potential paths for future research.
APA, Harvard, Vancouver, ISO, and other styles
46

Типаков, Василий, Vasily Sergeevich Tipakov, Тимур Яковлев, and Timur Aleksandrovich Yakovlev. "Problems of constructing broadband radio access systems of mobile radio communication." Vestnik of Astrakhan State Technical University 2019, no. 2 (November 19, 2019): 24–30. http://dx.doi.org/10.24143/1812-9498-2019-2-24-3.

Full text
Abstract:
The article is focused on the problem of degrading the signals of broadband 3G / 4G mobile radio access systems in places of subscribers clustering and in so-called “dead zones”. The analysis of the actual principles of building mobile networks has been carried out, the main disadvantages of the approaches to the development of cellular networks have been identified. The current trend of building macro cells in the urban environment has lost its effectiveness due to the increasing frequencies used; it has to be replaced by a fundamentally new way of planning mobile networks. A new principle of providing access to mobile communications “from inside to outside” is proposed, which takes into account the needs of a large number of subscribers in the premises. It is based on setting the maximum number of internal base stations fully meeting the needs of internal network users. Such a distinction will positively affect all subscribers and improve the experience from using the high-quality services of the mobile operators, which will result in increasing the economic performance
APA, Harvard, Vancouver, ISO, and other styles
47

Sinha, R. "Channel Access Protocols for Mobile Packet Radio Networks." IEEE Transactions on Information Theory 31, no. 1 (January 1985): 112. http://dx.doi.org/10.1109/tit.1985.1057009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sinha, R., and S. Gupta. "Mobile packet radio networks: State-of-the-art." IEEE Communications Magazine 23, no. 3 (March 1985): 53–61. http://dx.doi.org/10.1109/mcom.1985.1092526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gozalvez, Javier. "Spectrum for Medical Area Body Networks [Mobile Radio]." IEEE Vehicular Technology Magazine 7, no. 3 (September 2012): 11–17. http://dx.doi.org/10.1109/mvt.2012.2204533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Iida, Daisuke, Shigeru Kuwano, Jun-ichi Kani, and Jun Terada. "Dynamic TWDM-PON for Mobile Radio Access Networks." Optics Express 21, no. 22 (October 25, 2013): 26209. http://dx.doi.org/10.1364/oe.21.026209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography