A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
A man-in-the-middle attack on UMTS
2004
Proceedings of the 2004 ACM workshop on Wireless security - WiSe '04
We show that both of these mechanisms are necessary in order to prevent a man-in-the-middle attack. ...
Since the UMTS standard requires mutual authentication between the mobile station and the network, so far UMTS networks were considered to be secure against man-in-themiddle attacks. ...
If the sequence number is in the right range, the mobile station is assured that AUTN was issued recently by its home network. ...
doi:10.1145/1023646.1023662
dblp:conf/ws/MeyerW04
fatcat:l2emrwor3vc5tomdqillfa7vai
A proxy mobile IP based layer-3 handover scheme for mobile WiMAX based wireless mesh networks
2010
2010 Second International Conference on Ubiquitous and Future Networks (ICUFN)
In this paper, we present a proxy mobile IP based layer-3 handover scheme for mobile WiMAX based wireless mesh networks. ...
MIP based handover incures the long handover latency because mobile nodes generate a lot of handover messages in wireless area. ...
SIMULATION In order to evaluate the performance of proposed handover scheme, we use the NS-2 network simulator. Fig. 4 shows the topology used for the simulation. ...
doi:10.1109/icufn.2010.5547209
fatcat:lddt2cyda5b5bnsfgdg5klmeoa
Security for the Third Generation (3G) Mobile System
2000
Information Security Technical Report
Various means of handling this issue are available. d) The mechanisms for verifying the freshness of sequence numbers in the USIM shall to some extent allow the out-of-order use of sequence numbers. ...
The HE has some flexibility in the management of sequence numbers, but the verification mechanism needs to protect against wrap around and allow to a certain extent the out-of-order use of quintets. ...
doi:10.1016/s1363-4127(00)03007-7
fatcat:5ksumqwekbhgrjvoywchyi54va
Quality-of-service signaling in wireless IP-based mobile networks
2003
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
In order to provide the necessary quality of service (QoS) on demand in mobile wireless networks, appropriate signaling has to be defined. ...
We present a mobility-aware QoS signaling architecture that integrates resource management with mobility management. ...
In a similar manner, the integrated state model shows transitions for • Hard handover • Anticipated handover using a make-before-break sequence • Network-initiated anticipated handover • And variations ...
doi:10.1109/vetecf.2003.1286383
fatcat:lsfprwrhpvhsplr4ukdeb7etmi
An Efficient Integrated Routing Protocol for Interconnecting Mobile Ad Hoc Network and the Internet
2009
International Journal of Computer and Electrical Engineering
Index Terms-Eff-DSDV, Integration Strategy, Mobile ad hoc Network (MANET), Mobile Internet Gateway (MIG) ...
The proposed framework uses one of the ad hoc hosts known as Mobile Internet Gateway (MIG) to act as a bridge between the two networks. ...
In order to be able to communicate with both network types, the MIG uses the protocols of the wired network and the wireless ad hoc Network. ...
doi:10.7763/ijcee.2009.v1.6
fatcat:yq2wugowkndphktjmgj7xx4zqa
STACO - An accounting configuration architecture for multi-service mobile networks
2009
2009 IFIP/IEEE International Symposium on Integrated Network Management
The message sequence chart for the network connection setup use case is shown in Figure 3 . The user wants to connect via AP1 to the network. ...
Afterwards, the sequence of actions is identical to the network connection setup use case. ...
doi:10.1109/inm.2009.5188886
dblp:conf/im/RaczS09
fatcat:iz3g5fn3uzesvdahcqt2nkwhum
Enhancing Security Using Mobility-Based Anomaly Detection in Cellular Mobile Networks
2006
IEEE Transactions on Vehicular Technology
Location information is an important feature in users' profiles in cellular mobile networks. ...
A threshold policy is then used in both schemes to determine whether a mobile device is potentially compromised or not. ...
Similarly, the word string is used in discussing LZ algorithms, while cell list is used in cellular mobile networks.
A. ...
doi:10.1109/tvt.2006.874579
fatcat:752oi3swp5cl5kaehlow7o4fpi
An MDC-based video streaming architecture for mobile networks
2011
2011 IEEE 13th International Workshop on Multimedia Signal Processing
We integrated the proposed technique in a mobile ad-hoc streaming protocol, and tested it using a group mobility model. ...
If only one description is received, the missing frames are reconstructed using temporal high-order motion interpolation (HOMI), a technique originally proposed for distributed video coding. ...
The encoded sequence in this test is transmitted over a mobile adhoc network (see Tab. II) using the ABCD protocol described in Sec. IV-A. ...
doi:10.1109/mmsp.2011.6093829
dblp:conf/mmsp/GrecoPCP11
fatcat:n2gom3b74fegvpnrdfr22ivnzq
METHODS FOR ENSURING DATA SECURITY IN MOBILE STANDARDS
2022
Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska
Thus, user authentication in UMTS, as well as in the GSM network, is carried out using encryption with a common key using the "hack-response" protocol (the authenticating party sends a random number to ...
In particular, the following dangerous types of attacks have been identified, to which mobile network subscribers are sensitive: sniffing; leakage of personal data; leakage of geolocation data; spoofing ...
To close data in LTE networks, streaming encryption is used by superimposing a pseudo-random sequence on open information using the XOR operator. ...
doi:10.35784/iapgos.2877
fatcat:ck52b3pvfjdknht3qjemc4dmbq
Performance Evaluation of Adhoc Routing Protocols through NCTUns 6.0
2011
International Journal of Computer Applications
Routing protocols solve many problems of ad hoc networks. In this paper we are aiming to provide a performance comparison of three routing protocols i.e. ADV, AODV and DSDV. ...
NCTUns 6.0 is used as a simulator. The performance metrics for evaluating the protocols are number of packet dropped, number of packet collision and throughput. ...
result in a loss of packet integrity and compared the network performance. ...
doi:10.5120/2361-3097
fatcat:dxkxl3nuwjfpfjsdfpfyllxm2u
Security analysis and enhancements of 3GPP authentication and key agreement protocol
2005
IEEE Transactions on Wireless Communications
The protocol, called AP-AKA, also eliminates the need of synchronization between a mobile station and its home network. AP-AKA specifies a sequence of six flows. ...
Moreover, we demonstrate that the use of synchronization between a mobile station and its home network incurs considerable difficulty for the normal operation of 3GPP AKA. ...
It might be caused by an adversary by replaying a pair of used and . The out-of-order use of authentication vectors in the serving network could also cause synchronization failure. ...
doi:10.1109/twc.2004.842941
fatcat:hrug6jpt6ba5lowyfokl3242va
Research of Ad Hoc Networks Access Algorithm
2012
Physics Procedia
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication ...
range of mobile communication system, even business adjacent to the community, improve edge data rates. ...
In the proposed scheme, in order to provide gateway information with minimum overhead, the use of a periodic advertisement is proposed. And each mobile node needs to maintain two tables. ...
doi:10.1016/j.phpro.2012.03.379
fatcat:zof35fipdnf5zopouuafw6fe4m
Security in third Generation Mobile Networks
2004
Computer Communications
This paper elaborates on the security framework in 3G mobile networks. ...
The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality. ...
) user response to challenge in GSM/GPRS
RNC
Radio Network Controller
SA
Security Association
SG
Security Gateways
SRES
Signed response
SN
Serving Network
SQN
Sequence number
SQN HE
Sequence ...
doi:10.1016/j.comcom.2003.12.004
fatcat:mknokvlbrnd63kqpsze7mw3ijq
Representation Learning from Time Labelled Heterogeneous Data for Mobile Crowdsensing
2016
Mobile Information Systems
Therefore, we propose a new representation learning method of heterogeneous data with time labels to extract typical features using deep learning. ...
Mobile crowdsensing is a new paradigm that can utilize pervasive smartphones to collect and analyze data to benefit users. ...
Acknowledgments This work was supported in part by the Application Foundation and Advanced Technology Research Project of Tianjin (no. 15JCQNJC01400) and the Scientific Special Commissioner Project of ...
doi:10.1155/2016/2097243
fatcat:555exgit2bepvhg2jlg4vgh6mi
An Extension of TRIANGLE Testbed with Model-Based Testing
[chapter]
2018
Lecture Notes in Computer Science
This paper presents the testing framework developed in the TRIAN-GLE project 1 that integrates a complete mobile network testbed and a model-based testing approach, which is based on model checking, to ...
automatically evaluate the apps performance in different network scenarios. ...
A test case defines the configuration of the network scenarios, the measurements that have to be collected and the app user flow (sequence of actions) that will be used to activate the feature under test ...
doi:10.1007/978-3-319-94111-0_11
fatcat:66apqzitlfgjnlrlrjgxvwa2ie
« Previous
Showing results 1 — 15 out of 248,382 results