Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248850
K. Qureshi, F. Bashir, A. Abdullah
Real time data dissemination is one of the significant requirement and also a challenge during data forwarding in Vehicular Ad hoc Networks (VANETs). High vehicular mobility causes various constraints in the shape of high scale of disconnections, packet dropping, delay in inter vehicle communication. Extensive investigation has been conducted to design reliable and efficient routing protocol for real time data dissemination in the network. However, still the existing routing protocols have suffered to handle high mobility, dynamic traffic patterns, traffic density estimation and other physical parameters in the network. This paper presents a Real time Forwarding Method (R-FM) for next hop selection by distance, direction, link quality and real time traffic density information. The proposed data forwarding method minimizes the generated communication overhead during data dissemination and ensures in time data delivery in the network. The experimental results show that proposed method improves the data forwarding as well as keeps high data delivery.
{"title":"Real time traffic density aware road based forwarding method for vehicular ad hoc networks","authors":"K. Qureshi, F. Bashir, A. Abdullah","doi":"10.1109/WMNC.2017.8248850","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248850","url":null,"abstract":"Real time data dissemination is one of the significant requirement and also a challenge during data forwarding in Vehicular Ad hoc Networks (VANETs). High vehicular mobility causes various constraints in the shape of high scale of disconnections, packet dropping, delay in inter vehicle communication. Extensive investigation has been conducted to design reliable and efficient routing protocol for real time data dissemination in the network. However, still the existing routing protocols have suffered to handle high mobility, dynamic traffic patterns, traffic density estimation and other physical parameters in the network. This paper presents a Real time Forwarding Method (R-FM) for next hop selection by distance, direction, link quality and real time traffic density information. The proposed data forwarding method minimizes the generated communication overhead during data dissemination and ensures in time data delivery in the network. The experimental results show that proposed method improves the data forwarding as well as keeps high data delivery.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114711957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248844
Tobias Knappe, T. Michael, M. Dippold, Manfred Paul
This paper investigates how various radio channel interferences influence IP packet jitter and thus QoS in heterogeneous networks consisting of a serially connected LTE and WiFi segment. A lab environment was set up allowing to vary LTE channel models, received power and WiFi interference conditions independently. IP/UDP packets with fixed interpacket time were sent over an emulated network to a client, where IP packet jitter was analyzed allowing for an estimation of QoS. Investigation of the individual channels in comparison to a combination of both channels show that time distributions of received IP packets are quite typical for each network and interference case. Thus different issues in the network segments can be identified based on their typical behavior for a wide range of variations allowing to allocate QoS issues to the related segment with high probability.
{"title":"Analyzing the quality of service of heterogeneous radio networks using IP layer statistics","authors":"Tobias Knappe, T. Michael, M. Dippold, Manfred Paul","doi":"10.1109/WMNC.2017.8248844","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248844","url":null,"abstract":"This paper investigates how various radio channel interferences influence IP packet jitter and thus QoS in heterogeneous networks consisting of a serially connected LTE and WiFi segment. A lab environment was set up allowing to vary LTE channel models, received power and WiFi interference conditions independently. IP/UDP packets with fixed interpacket time were sent over an emulated network to a client, where IP packet jitter was analyzed allowing for an estimation of QoS. Investigation of the individual channels in comparison to a combination of both channels show that time distributions of received IP packets are quite typical for each network and interference case. Thus different issues in the network segments can be identified based on their typical behavior for a wide range of variations allowing to allocate QoS issues to the related segment with high probability.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248852
Amerah A. Alabrah, M. Bassiouni
The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.
{"title":"Preventing single sign-on impersonation attacks with a keyless signature scheme","authors":"Amerah A. Alabrah, M. Bassiouni","doi":"10.1109/WMNC.2017.8248852","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248852","url":null,"abstract":"The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127596484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248856
Siva Karteek Bolisetti, M. Sharma, M. Patwary, A. Soliman, E. Benkhelifa, M. Maguid
In this paper, we explore multi-sensor Radio Frequency (RF) sensing based Internet of Things (IoT) for surveillance applications. RF sensing techniques are the next generation technologies which offer distinct advantages over traditional means of sensing. Traditionally, Energy detection (ED) has been used for surveillance applications due to its low computational complexity. However, ED is unreliable due to high false detection rates. There is a need to develop surveillance strategies which offer reliable target detection rates. In this paper, we have proposed a multi-sensor RF sensing based target detection architecture for IoT. To perform surveillance within IoT, multiple sensor nodes are required to co-exist while performing the desired tasks. Interfering waveforms from the neighbouring sensor nodes have a significant impact on the target detection reliability of IoT. In this paper, a waveform selection criterion has been proposed to optimise the target detection reliability and power consumption within IoT in the presence of interfering waveforms.
{"title":"Energy efficient target detection through waveform selection for multi-sensor RF sensing based Internet of Things","authors":"Siva Karteek Bolisetti, M. Sharma, M. Patwary, A. Soliman, E. Benkhelifa, M. Maguid","doi":"10.1109/WMNC.2017.8248856","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248856","url":null,"abstract":"In this paper, we explore multi-sensor Radio Frequency (RF) sensing based Internet of Things (IoT) for surveillance applications. RF sensing techniques are the next generation technologies which offer distinct advantages over traditional means of sensing. Traditionally, Energy detection (ED) has been used for surveillance applications due to its low computational complexity. However, ED is unreliable due to high false detection rates. There is a need to develop surveillance strategies which offer reliable target detection rates. In this paper, we have proposed a multi-sensor RF sensing based target detection architecture for IoT. To perform surveillance within IoT, multiple sensor nodes are required to co-exist while performing the desired tasks. Interfering waveforms from the neighbouring sensor nodes have a significant impact on the target detection reliability of IoT. In this paper, a waveform selection criterion has been proposed to optimise the target detection reliability and power consumption within IoT in the presence of interfering waveforms.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128941381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248855
Carlos Cambra Baseca, S. Sendra, Laura García, Jaime Lloret
Wireless Sensor Networks (WSNs), Internet of things (IoT) and cloud data are nowadays being greatly used in our society. This challenge requires a new and smart wireless network topology for communicating devices. Problems like scalability and manageability are important issues when there are large amounts of devices. This paper presents the design of a smart IoT communication system for detecting rodents. The system is based on low energy consumption and low cost RF communication microcontrollers which costs around 1–2 $. A large number of devices connected in real time are deployed to monitor rodent pests mainly in food industries and agricultural activities. The movements of rodents and the trapping estimation for periodical dates (weekly, monthly or yearly) on each company or selected area can be remotely monitored by accessing to the multimedia platform through mobile phone or via computer. Finally, we have measured the bandwidth consumed for different configurations as well as the detection of rodents using a Passive Infrared (PIR) sensor. Our goal is the expansion of micro RF transceivers with a cost less than 5 $ on industries and ultra-low power wireless communications.
{"title":"Low cost wireless sensor network for rodents detection","authors":"Carlos Cambra Baseca, S. Sendra, Laura García, Jaime Lloret","doi":"10.1109/WMNC.2017.8248855","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248855","url":null,"abstract":"Wireless Sensor Networks (WSNs), Internet of things (IoT) and cloud data are nowadays being greatly used in our society. This challenge requires a new and smart wireless network topology for communicating devices. Problems like scalability and manageability are important issues when there are large amounts of devices. This paper presents the design of a smart IoT communication system for detecting rodents. The system is based on low energy consumption and low cost RF communication microcontrollers which costs around 1–2 $. A large number of devices connected in real time are deployed to monitor rodent pests mainly in food industries and agricultural activities. The movements of rodents and the trapping estimation for periodical dates (weekly, monthly or yearly) on each company or selected area can be remotely monitored by accessing to the multimedia platform through mobile phone or via computer. Finally, we have measured the bandwidth consumed for different configurations as well as the detection of rodents using a Passive Infrared (PIR) sensor. Our goal is the expansion of micro RF transceivers with a cost less than 5 $ on industries and ultra-low power wireless communications.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129355712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248858
Christos Gkountis, Miran Taha, Jaime Lloret, G. Kambourakis
It is without a doubt that both the controller and switch of an SDN are vulnerable to Distributed Denial of Service (DDoS) attacks. Typically, this ilk of attacks targets the flow table of the deployed network switches with the aim of producing overloading, high network delays, and consume bandwidth. Motivated by this fact, in this paper, we propose a lightweight scheme which is based on a set of rules to efficiently characterize packets send to a network switch as malicious or not. Through testbed experimentation and comparison with legacy DDoS protection schemes, we demonstrate that our solution performs significantly better when it comes to SDN ecosystem of mobile users.
毫无疑问,SDN的控制器和交换机都容易受到DDoS (Distributed Denial of Service)攻击。通常,这类攻击的目标是已部署网络交换机的流表,目的是产生过载、高网络延迟和消耗带宽。基于这一事实,本文提出了一种基于一组规则的轻量级方案,以有效地表征发送到网络交换机的数据包是否为恶意数据包。通过试验台实验和与传统DDoS保护方案的比较,我们证明了我们的解决方案在移动用户的SDN生态系统中表现得更好。
{"title":"Lightweight algorithm for protecting SDN controller against DDoS attacks","authors":"Christos Gkountis, Miran Taha, Jaime Lloret, G. Kambourakis","doi":"10.1109/WMNC.2017.8248858","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248858","url":null,"abstract":"It is without a doubt that both the controller and switch of an SDN are vulnerable to Distributed Denial of Service (DDoS) attacks. Typically, this ilk of attacks targets the flow table of the deployed network switches with the aim of producing overloading, high network delays, and consume bandwidth. Motivated by this fact, in this paper, we propose a lightweight scheme which is based on a set of rules to efficiently characterize packets send to a network switch as malicious or not. Through testbed experimentation and comparison with legacy DDoS protection schemes, we demonstrate that our solution performs significantly better when it comes to SDN ecosystem of mobile users.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248848
Osama Elgarhy, L. Reggiani, Riccardo Ferrari
Uplink conventional power control techniques in systems with frequency reuse one have some limitations, typically regarding the tradeoff between the average throughput of users at cell center and cell edge. Moreover, one of the main drawbacks is the excess use of power. From our point of view, one of the reasons for this waste of power is the practice of giving all the users in the cell the same target SINR in the power control process. Since there exists a rate limit for users in the cell, depending on their positions, a Hybrid Power Control (HPC) technique is introduced here in order to overcome these limitations and provide a more flexible solution. The HPC uses power control with at least two different types of setup and the rate limit of the cell users is respected. Moreover, this HPC method shows a significant reduction in the average cell transmission power, satisfactory cell edge users performance and an improvement in the overall cell rate, around 25%. Moreover, the average transmitted power is reduced by more than 20 dB.
{"title":"Hybrid power control for multi-carrier systems","authors":"Osama Elgarhy, L. Reggiani, Riccardo Ferrari","doi":"10.1109/WMNC.2017.8248848","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248848","url":null,"abstract":"Uplink conventional power control techniques in systems with frequency reuse one have some limitations, typically regarding the tradeoff between the average throughput of users at cell center and cell edge. Moreover, one of the main drawbacks is the excess use of power. From our point of view, one of the reasons for this waste of power is the practice of giving all the users in the cell the same target SINR in the power control process. Since there exists a rate limit for users in the cell, depending on their positions, a Hybrid Power Control (HPC) technique is introduced here in order to overcome these limitations and provide a more flexible solution. The HPC uses power control with at least two different types of setup and the rate limit of the cell users is respected. Moreover, this HPC method shows a significant reduction in the average cell transmission power, satisfactory cell edge users performance and an improvement in the overall cell rate, around 25%. Moreover, the average transmitted power is reduced by more than 20 dB.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248851
Kerrache Chaker Abdelaziz, E. Barka, N. Lagraa, Abderrahmane Lakas
Ensuring the desired security is an important issue in all communicating systems and it becomes more challenging in open medium networks. Furthermore, the majority of the wireless and mobile networks including Flying Adhoc NETworks (FANETs) are built over energy-restricted devices. Hence, communication interface and computation complexity are additional factors to consider when designing secure protocols. as an alternative solution to cryptography, trust and reputation management solutions are able to sustain high security levels with less energy consumption. In this paper, we propose a new reputation-aware energy-efficient FANET monitoring technique, in which we first establish trust among different peers and then thanks to the trust and links duration combination, we distribute the network monitoring period between those trusting each other moving with similar mobility patterns. Simulations conducted using NS2 simulator show the efficiency of our proposal at both ensuring high detection rations (> 80%) and reducing by more than two times the average consumed energy.
{"title":"Reputation-aware energy-efficient solution for FANET monitoring","authors":"Kerrache Chaker Abdelaziz, E. Barka, N. Lagraa, Abderrahmane Lakas","doi":"10.1109/WMNC.2017.8248851","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248851","url":null,"abstract":"Ensuring the desired security is an important issue in all communicating systems and it becomes more challenging in open medium networks. Furthermore, the majority of the wireless and mobile networks including Flying Adhoc NETworks (FANETs) are built over energy-restricted devices. Hence, communication interface and computation complexity are additional factors to consider when designing secure protocols. as an alternative solution to cryptography, trust and reputation management solutions are able to sustain high security levels with less energy consumption. In this paper, we propose a new reputation-aware energy-efficient FANET monitoring technique, in which we first establish trust among different peers and then thanks to the trust and links duration combination, we distribute the network monitoring period between those trusting each other moving with similar mobility patterns. Simulations conducted using NS2 simulator show the efficiency of our proposal at both ensuring high detection rations (> 80%) and reducing by more than two times the average consumed energy.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248845
M. Karimzadeh, Luca Valtulina, H. V. D. Berg, A. Pras, P. Ortiz, R. Sadre
Mobile networks have achieved a high-level of acceptance, mainly due to the ubiquitously deployment and ever growing connectivity through various wireless access technologies for new services, being available to mobile users. The core architecture of existing mobile networks does not scale well to accommodate future traffic demands owing to its highly centralized and hierarchical composition. Decentralization of the network architecture, is believed to be a sustainable trend against to the constantly growing of mobile data traffic. Given that LTE will handle substantial part of the worldwide mobile data traffic in the coming 5–10 years, in this paper we discuss an approach for realizing a decentralized LTE architecture. Next, we present a novel scheme to support user's mobility in this architecture. The proposed solution can handle seamless data traffic steering and session continuity for the users moving among the distributed anchor points, in a resource-efficient manner and with a minimal impact on the existing network implementation. Our approach is based on the MPTCP (Multipath TCP) which is also one of the most important candidate protocols to enhance end-to-end communication reliability, resiliency and bandwidth efficiency in the future mobile networks (5G). We used the NS3-LENA simulation software to implement a decentralized LTE network as well as the proposed mobility management scheme. The evaluation results show that the proposed solution efficiently fulfill the functionality and performance requirements related to mobility management.
{"title":"MultiPath TCP to support user's mobility in future LTE network","authors":"M. Karimzadeh, Luca Valtulina, H. V. D. Berg, A. Pras, P. Ortiz, R. Sadre","doi":"10.1109/WMNC.2017.8248845","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248845","url":null,"abstract":"Mobile networks have achieved a high-level of acceptance, mainly due to the ubiquitously deployment and ever growing connectivity through various wireless access technologies for new services, being available to mobile users. The core architecture of existing mobile networks does not scale well to accommodate future traffic demands owing to its highly centralized and hierarchical composition. Decentralization of the network architecture, is believed to be a sustainable trend against to the constantly growing of mobile data traffic. Given that LTE will handle substantial part of the worldwide mobile data traffic in the coming 5–10 years, in this paper we discuss an approach for realizing a decentralized LTE architecture. Next, we present a novel scheme to support user's mobility in this architecture. The proposed solution can handle seamless data traffic steering and session continuity for the users moving among the distributed anchor points, in a resource-efficient manner and with a minimal impact on the existing network implementation. Our approach is based on the MPTCP (Multipath TCP) which is also one of the most important candidate protocols to enhance end-to-end communication reliability, resiliency and bandwidth efficiency in the future mobile networks (5G). We used the NS3-LENA simulation software to implement a decentralized LTE network as well as the proposed mobility management scheme. The evaluation results show that the proposed solution efficiently fulfill the functionality and performance requirements related to mobility management.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1963-11-01DOI: 10.1109/hri.2016.7451720
Jaime Lloret, J. M. Jiménez
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than IFIP must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
{"title":"Copyright page","authors":"Jaime Lloret, J. M. Jiménez","doi":"10.1109/hri.2016.7451720","DOIUrl":"https://doi.org/10.1109/hri.2016.7451720","url":null,"abstract":"Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than IFIP must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1963-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}