Samaneh Igder, Hamdi Idjmayyel, B. Qazi, S. Bhattacharya, J. Elmirghani
The unprecedented growth in content demand on smartphones has significantly increased the energy consumption of current cellular and backbone networks. Apart from achieving stringent carbon footprint targets, provisioning high data rates to city vehicular users while maintaining quality of service (QoS) remains a serious challenge. In previous work, to support content delivery at high data rates, the number and locations of caching points (CPs) within a content distribution network (CDN) were optimized while reducing the operational energy consumption compared to typical cellular networks. Further reduction in energy consumption may be possible through sleep cycles, which reduces transmission energy consumption. However, sleep cycles degrade the quality of service. Therefore, in this paper, we propose a novel load adaptation technique for a CP which not only enhances content download rate but also reduces transmission energy consumption through random sleep cycles. Unlike a non-load adaptive (deterministic) CP, the performance results reveal that the load adaptive CP achieves considerably lower average piece delay (approximately 60% on average during the day), leveraging the introduction of random sleep cycles to save transmission energy. The proposed CP saves up to 84% transmission energy during off-peak hours and 33% during the whole day while fulfilling content demand in a city vehicular environment.
{"title":"Load Adaptive Caching Points for a Content Distribution Network","authors":"Samaneh Igder, Hamdi Idjmayyel, B. Qazi, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2015.24","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.24","url":null,"abstract":"The unprecedented growth in content demand on smartphones has significantly increased the energy consumption of current cellular and backbone networks. Apart from achieving stringent carbon footprint targets, provisioning high data rates to city vehicular users while maintaining quality of service (QoS) remains a serious challenge. In previous work, to support content delivery at high data rates, the number and locations of caching points (CPs) within a content distribution network (CDN) were optimized while reducing the operational energy consumption compared to typical cellular networks. Further reduction in energy consumption may be possible through sleep cycles, which reduces transmission energy consumption. However, sleep cycles degrade the quality of service. Therefore, in this paper, we propose a novel load adaptation technique for a CP which not only enhances content download rate but also reduces transmission energy consumption through random sleep cycles. Unlike a non-load adaptive (deterministic) CP, the performance results reveal that the load adaptive CP achieves considerably lower average piece delay (approximately 60% on average during the day), leveraging the introduction of random sleep cycles to save transmission energy. The proposed CP saves up to 84% transmission energy during off-peak hours and 33% during the whole day while fulfilling content demand in a city vehicular environment.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Madhusanka Liyanage, Ijaz Ahmed, M. Ylianttila, Jesus Llorente Santos, R. Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, C. Jimenez
5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging to address the requirements of future mobile networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing concepts. In this paper, we introduce the security challenges these new technologies are facing, inherent to the new telecommunication paradigm. We also present a multitier approach to secure Software Defined Mobile Network (SDMN) by tackling security at different levels to protect the network itself and its users. First, we secure the communication channels between network elements by leveraging Host Identity Protocol (HIP) and IPSec tunnelling. Then, we restrict the unwanted access to the mobile backhaul network with policy based communications. It also protects the backhaul devices from source address spoofing and Denial of Service (DoS) attacks. Finally, we leverage Software Defined Monitoring (SDM) and data collection to detect, prevent and react to security threats.
{"title":"Security for Future Software Defined Mobile Networks","authors":"Madhusanka Liyanage, Ijaz Ahmed, M. Ylianttila, Jesus Llorente Santos, R. Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, C. Jimenez","doi":"10.1109/NGMAST.2015.43","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.43","url":null,"abstract":"5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging to address the requirements of future mobile networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing concepts. In this paper, we introduce the security challenges these new technologies are facing, inherent to the new telecommunication paradigm. We also present a multitier approach to secure Software Defined Mobile Network (SDMN) by tackling security at different levels to protect the network itself and its users. First, we secure the communication channels between network elements by leveraging Host Identity Protocol (HIP) and IPSec tunnelling. Then, we restrict the unwanted access to the mobile backhaul network with policy based communications. It also protects the backhaul devices from source address spoofing and Denial of Service (DoS) attacks. Finally, we leverage Software Defined Monitoring (SDM) and data collection to detect, prevent and react to security threats.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1826 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile WiFi devices are becoming increasingly popular in non-seamless and user-controlled mobile traffic offloading alongside the standard WiFi hotspots. Unlike the operator-controlled hotspots, a mobile WiFi device relies on the capacity of the macro-cell for the data rate allocated to it. This type of devices can help offloading data traffic from the macro-cell base station and serve the end users within a closer range, but will change the pattern of resource distributions operated by the base station. We propose a resource allocation scheme that aims to optimize user quality of experience (QoE) when accessing video services in the environment where traffic offloading is taking place through interworking between a mobile communication system and low range wireless LANs. In this scheme, a rate redistribution algorithm is derived to perform scheduling which is controlled by a no-reference quality assessment metric in order to achieve the desired trade-offs between efficiency and fairness. We show the performance of this algorithm in terms of the distribution of the allocated data rates throughout the macro-cell investigated and the service coverage offered by the WiFi access point.
{"title":"Optimising QoE Distribution for Video Applications through LTE-WiFi Interworking","authors":"Mirghiasaldin Seyedebrahimi, Xiaohong Peng","doi":"10.1109/NGMAST.2015.70","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.70","url":null,"abstract":"Mobile WiFi devices are becoming increasingly popular in non-seamless and user-controlled mobile traffic offloading alongside the standard WiFi hotspots. Unlike the operator-controlled hotspots, a mobile WiFi device relies on the capacity of the macro-cell for the data rate allocated to it. This type of devices can help offloading data traffic from the macro-cell base station and serve the end users within a closer range, but will change the pattern of resource distributions operated by the base station. We propose a resource allocation scheme that aims to optimize user quality of experience (QoE) when accessing video services in the environment where traffic offloading is taking place through interworking between a mobile communication system and low range wireless LANs. In this scheme, a rate redistribution algorithm is derived to perform scheduling which is controlled by a no-reference quality assessment metric in order to achieve the desired trade-offs between efficiency and fairness. We show the performance of this algorithm in terms of the distribution of the allocated data rates throughout the macro-cell investigated and the service coverage offered by the WiFi access point.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.
{"title":"Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud","authors":"Wael Alosaimi, M. Alshamrani, K. Al-Begain","doi":"10.1109/NGMAST.2015.50","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.50","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Hamiti, M. Ibrani, Luan Ahma, Rreze Halili, Doruntine Berisha, Vlerar Shala
The use of mobile communication applications, services, and technologies has become an indispensable part of everyday life, a fact which has promoted research on the assessment of human exposure to radio-frequency electromagnetic fields and related health issues. To evaluate personal exposure to wireless technologies and broadcast transmitters in this study the personal exposure meters with triaxial E-field probe are used, enabling frequency selective measurements of electric field strength in 14 predefined frequency bands (80 MHz-6 GHz). The measurements were conducted in five microenvironments: home, office, coffee shops, transport vehicles and outdoor, resulting in 122 944 measurement samples. For each microenvironment the mean value of power density from different wireless technologies is presented, including the contribution of specific wireless technology to the total personal exposure. The obtained results are compared with the exposure limits given by the International Commission on Non-Ionizing Radiation Protection.
{"title":"Assessment of Personal Exposure to Wireless Communication Technologies in Different Microenvironments","authors":"E. Hamiti, M. Ibrani, Luan Ahma, Rreze Halili, Doruntine Berisha, Vlerar Shala","doi":"10.1109/NGMAST.2015.56","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.56","url":null,"abstract":"The use of mobile communication applications, services, and technologies has become an indispensable part of everyday life, a fact which has promoted research on the assessment of human exposure to radio-frequency electromagnetic fields and related health issues. To evaluate personal exposure to wireless technologies and broadcast transmitters in this study the personal exposure meters with triaxial E-field probe are used, enabling frequency selective measurements of electric field strength in 14 predefined frequency bands (80 MHz-6 GHz). The measurements were conducted in five microenvironments: home, office, coffee shops, transport vehicles and outdoor, resulting in 122 944 measurement samples. For each microenvironment the mean value of power density from different wireless technologies is presented, including the contribution of specific wireless technology to the total personal exposure. The obtained results are compared with the exposure limits given by the International Commission on Non-Ionizing Radiation Protection.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126812558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an effective solution that is designed to counteract such attacks and protect targeted networks. The proposed framework is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS). This method is tested practically and the test's results proved the success of the framework in limiting the end-to-end response time and handling complex versions of these attacks on multiple layers.
{"title":"Denial of Service Attacks Mitigation in the Cloud","authors":"Wael Alosaimi, M. Zák, K. Al-Begain","doi":"10.1109/NGMAST.2015.48","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.48","url":null,"abstract":"Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an effective solution that is designed to counteract such attacks and protect targeted networks. The proposed framework is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS). This method is tested practically and the test's results proved the success of the framework in limiting the end-to-end response time and handling complex versions of these attacks on multiple layers.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. P. A. Ogah, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran, Yue Cao, P. Asuquo, Masoud Al Tawqi
Vehicular Delay Tolerant Networking (VDTN) is a special instance of Vehicular Ad hoc Networking (VANET) and in particular Delay Tolerant Networking (DTN) that utilizes infrastructure to enhance connectivity in challenged environments. While VANETs assume end-to-end connectivity, DTNs and VDTNs do not. Such networks are characterized by dynamic topology, partitioning due to lack of end-to-end connectivity, and opportunistic encounters between nodes. Notably, VDTNs enhances the capabilities DTNs to provide support for delay and intermittent connectivity. Hence, they can easily find applicability in the early stages of the deployment of vehicular networks characterized by low infrastructure deployment as is obtainable in rural areas and in military communications. Privacy implementation and evaluation is a major challenge in VDTNs. Group communication has become one of the well discussed means for achieving effective privacy and packet routing in ad hoc networks including VDTNs. However, most existing privacy schemes lack flexibility in terms of the dynamics of group formation and the level of privacy achievable. Again, it is difficult to evaluate privacy for sparse VDTNs for rural area and early stages of deployment. This paper reports on an improved privacy scheme based on group communication scheme in VDTNs. We analyze the performance of our model in terms of trade-off between privacy and performance based on delivery overhead and message delivery ratio using simulations. While this is a work in progress, we report that our scheme has considerable improvement compared to other similar schemes described in literature.
{"title":"Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks","authors":"C. P. A. Ogah, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran, Yue Cao, P. Asuquo, Masoud Al Tawqi","doi":"10.1109/NGMAST.2015.67","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.67","url":null,"abstract":"Vehicular Delay Tolerant Networking (VDTN) is a special instance of Vehicular Ad hoc Networking (VANET) and in particular Delay Tolerant Networking (DTN) that utilizes infrastructure to enhance connectivity in challenged environments. While VANETs assume end-to-end connectivity, DTNs and VDTNs do not. Such networks are characterized by dynamic topology, partitioning due to lack of end-to-end connectivity, and opportunistic encounters between nodes. Notably, VDTNs enhances the capabilities DTNs to provide support for delay and intermittent connectivity. Hence, they can easily find applicability in the early stages of the deployment of vehicular networks characterized by low infrastructure deployment as is obtainable in rural areas and in military communications. Privacy implementation and evaluation is a major challenge in VDTNs. Group communication has become one of the well discussed means for achieving effective privacy and packet routing in ad hoc networks including VDTNs. However, most existing privacy schemes lack flexibility in terms of the dynamics of group formation and the level of privacy achievable. Again, it is difficult to evaluate privacy for sparse VDTNs for rural area and early stages of deployment. This paper reports on an improved privacy scheme based on group communication scheme in VDTNs. We analyze the performance of our model in terms of trade-off between privacy and performance based on delivery overhead and message delivery ratio using simulations. While this is a work in progress, we report that our scheme has considerable improvement compared to other similar schemes described in literature.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the coexistence of M2M and H2H based traffic sharing the RACH of an existing cellular network. Q-learning is applied to control the RACH access of the M2M devices which enables collision free access amongst the M2M user group. Frame ALOHA for a Q-learning RACH access (FA-QL-RACH) is proposed to realise a collision free RACH access between the H2H and M2M user groups. The scheme introduces a separate frame for H2H and M2M to use in the RACH access. Simulation results show that applying Q-learning to realise the proposed FA-QL-RACH scheme resolves the RACH overload problem and improves the RACH-throughput. Finally the improved RACH-throughput performance indicates that the FA-QL-RACH scheme has eliminated the collision between the H2H and M2M user groups.
{"title":"Q-learning Based Random Access with Collision free RACH Interactions for Cellular M2M","authors":"L. Bello, P. Mitchell, D. Grace, Tautvydas Mickus","doi":"10.1109/NGMAST.2015.22","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.22","url":null,"abstract":"This paper investigates the coexistence of M2M and H2H based traffic sharing the RACH of an existing cellular network. Q-learning is applied to control the RACH access of the M2M devices which enables collision free access amongst the M2M user group. Frame ALOHA for a Q-learning RACH access (FA-QL-RACH) is proposed to realise a collision free RACH access between the H2H and M2M user groups. The scheme introduces a separate frame for H2H and M2M to use in the RACH access. Simulation results show that applying Q-learning to realise the proposed FA-QL-RACH scheme resolves the RACH overload problem and improves the RACH-throughput. Finally the improved RACH-throughput performance indicates that the FA-QL-RACH scheme has eliminated the collision between the H2H and M2M user groups.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the current technological landscape, companies face problems associated with the development of mobile applications and rapid integration with their enterprise systems to ensure the availability of value-added services for its customers in pervasive environment. To fill this gap, a generic model for dynamic switching of communication channels to ensure the principles of transparency in distributed environments is proposed, by: (1) designing an interchangeable communication layer for mobile applications, (2) ensuring the transparency of the communication channels, (3) proposing a framework for the development of mobile applications in distributed environment to guarantee the mentioned above communication transparency.
{"title":"A Communication Channels Dynamic Switching Model for Always-Connected Availability of Service Oriented Mobile Applications","authors":"Diogo Azevedo, H. Paredes, Benjamim Fonseca","doi":"10.1109/NGMAST.2015.51","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.51","url":null,"abstract":"In the current technological landscape, companies face problems associated with the development of mobile applications and rapid integration with their enterprise systems to ensure the availability of value-added services for its customers in pervasive environment. To fill this gap, a generic model for dynamic switching of communication channels to ensure the principles of transparency in distributed environments is proposed, by: (1) designing an interchangeable communication layer for mobile applications, (2) ensuring the transparency of the communication channels, (3) proposing a framework for the development of mobile applications in distributed environment to guarantee the mentioned above communication transparency.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes Internet of Things (IoT) and Machine-to-Machine (M2M) communications as the enablers of smart city initiatives. The challenges in modern cities are briefly identified. Utilization of IoT based applications and services could mitigate these challenges. The paper then introduces an architecture based on oneM2M standards for smart cities. The key elements of the architecture are described along with the common service functions. The main contributions of the work are -- (i) uniform metadata exchange with things using Sensor Markup Language and its extensions, (ii) uniform description of heterogeneous things for configuration management, (iii) OMA Lightweight M2M based device management framework, (iv) resource discovery framework and (v) Machine-to-Machine Measurement framework based M2M data processing and analytics. The core functionalities of these frameworks are exposed to the consumers through RESTful web services. An application scenario on crowdsourcing in the smart cities is highlighted. Finally the paper concludes with future research directions.
{"title":"Internet of Things and M2M Communications as Enablers of Smart City Initiatives","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/NGMAST.2015.10","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.10","url":null,"abstract":"This paper describes Internet of Things (IoT) and Machine-to-Machine (M2M) communications as the enablers of smart city initiatives. The challenges in modern cities are briefly identified. Utilization of IoT based applications and services could mitigate these challenges. The paper then introduces an architecture based on oneM2M standards for smart cities. The key elements of the architecture are described along with the common service functions. The main contributions of the work are -- (i) uniform metadata exchange with things using Sensor Markup Language and its extensions, (ii) uniform description of heterogeneous things for configuration management, (iii) OMA Lightweight M2M based device management framework, (iv) resource discovery framework and (v) Machine-to-Machine Measurement framework based M2M data processing and analytics. The core functionalities of these frameworks are exposed to the consumers through RESTful web services. An application scenario on crowdsourcing in the smart cities is highlighted. Finally the paper concludes with future research directions.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}