{"title":"A simultaneous network search scheme for fast roaming and handover of the simultaneous voice and LTE mobile devices","authors":"Minsu Ko, Myung-Gyun Kim, Sungwon Kang","doi":"10.5220/0005037600360043","DOIUrl":"https://doi.org/10.5220/0005037600360043","url":null,"abstract":"Most of the countries in the world are currently providing 2G or 3G mobile communication services with limited coverage of LTE services. Therefore when an LTE service user moves into or around such countries, the LTE terminal needs to roam or handover to 2G or 3G network for service quality. For LTE terminals that can be connected to 3GPP Legacy (such as GSM, UMTS, and HSPA) and CDMA networks, it normally takes more than 2 minutes to select one of several candidate networks for roaming and 20 seconds to 2 minutes to handover to other networks before getting out of the LTE service area, which is considered very long by many LTE users. This paper proposes a scheme for fast roaming and handover that simultaneously searches for multiple networks with a Dual RF LTE terminal for both voice and data communication. In our experiment with the simultaneous network search implemented in a commercial LTE terminal with dual RF, the network selection time for roaming was reduced by 15% to 40% and the delay time for handover in LTE network was reduced by 90%.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124889291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the cooperativeness of users in Wi-Fi networks","authors":"S. Szott, Grzegorz Ptaszek, L. Janowski","doi":"10.5220/0005117300600064","DOIUrl":"https://doi.org/10.5220/0005117300600064","url":null,"abstract":"Wi-Fi networks are based on the cooperation of users in sharing a common resource — the radio channel. This is a security risk because users may behave selfishly to increase their own throughput but at the same time decrease the overall network performance. Many scientific analyses have focused on this problem, but none have taken into account real user behavior. We present the initial results of a work-in-progress in which we studied a group of users in terms of their online behavior as well as their psychological characteristics. We have found that users behave selfishly in a wireless setting, regardless of their cooperative nature. We provide lessons learned as well as pose open questions for further research in this field.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ahrens, Francisco Cano-Broncano, C. Benavente-Peces
{"title":"Resource allocation in GMD and SVD-based MIMO system","authors":"A. Ahrens, Francisco Cano-Broncano, C. Benavente-Peces","doi":"10.5220/0005020300270035","DOIUrl":"https://doi.org/10.5220/0005020300270035","url":null,"abstract":"Singular-value decomposition (SVD)-based multiple-input multiple output (MIMO) systems, where the whole MIMO channel is decomposed into a number of unequally weighted single-input single-output (SISO) channels, have attracted a lot of attention in the wireless community. The unequal weighting of the SISO channels has led to intensive research on bit- and power allocation even in MIMO channel situation with poor scattering conditions identified as the antennas correlation effect. In this situation, the unequal weighting of the SISO channels becomes even much stronger. In comparison to the SVD-assisted MIMO transmission, geometric mean decomposition (GMD)-based MIMO systems are able to compensate the drawback of weighted SISO channels when using SVD, where the decomposition result is nearly independent of the antennas correlation effect. The remaining interferences after the GMD-based signal processing can be easily removed by using dirty paper precoding as demonstrated in this work. Our results show that GMD-based MIMO transmission has the potential to significantly simplify the bit and power loading processes and outperforms the SVD-based MIMO transmission as long as the same QAM-constellation size is used on all equally-weighted SISO channels.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification technology of mobile phone devices using RFF","authors":"S. Japertas, A. Budnikas, G. Cincikas","doi":"10.5220/0005011800470052","DOIUrl":"https://doi.org/10.5220/0005011800470052","url":null,"abstract":"The vulnerability of the device identifiers, such as IP and MAC addresses, IMEI and IMSI codes, etc. creates threat to the information security, integrity and reliability. One of the solutions of this threat is usage of Radio Frequency Fingerprinting (RFF) technology for identifying wireless devices based on their unique radiation “fingerprint” as opposed to their addresses or codes. In this work identification problems of mobile radio stations (from here in — mobile phones) are being analyzed and identification methodology for identifying them based on the mathematical processing of front and rear fronts is proposed. All of this provides new insight in the field of signal detection and identification, thus by using this method only the original data is received. The purpose of this work is identification of a mobile phone, working on the DCS (digital cellular service) frequency, based on the phone's radiated signal time characteristics.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A balanced battery usage routing protocol to maximize network lifetime of MANET based on AODV","authors":"Esubalew Yitayal, J. Pierson, D. Ejigu","doi":"10.1007/978-3-319-10353-2_23","DOIUrl":"https://doi.org/10.1007/978-3-319-10353-2_23","url":null,"abstract":"","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katarzyna Kosek-Szott, M. Natkaniec, Lukasz Prasnal, L. Janowski
{"title":"Impact of the IEEE 802.11aa intra-AC prioritization on QoE for H.264 compression","authors":"Katarzyna Kosek-Szott, M. Natkaniec, Lukasz Prasnal, L. Janowski","doi":"10.5220/0005118800650070","DOIUrl":"https://doi.org/10.5220/0005118800650070","url":null,"abstract":"Recently, a new 802.11aa amendment has been released. Its main goal is to increase quality of service support for audio-video traffic streams. Among others, it defines the intra-access category prioritization mechanism coupled with appropriate traffic selection procedures, in order to increase the granularity of traffic prioritization in comparison to the currently used EDCA. This paper presents the preliminary study of the possible impact of the new feature on quality of experience (QoE) in case of H.264 video streams. The obtained results show that IEEE 802.11aa and 802.1Q parameters should be tuned to efficiently use the available bandwidth.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imen Elbouabidi, S. Smaoui, F. Zarai, M. Obaidat, L. Kamoun
{"title":"Improved secure Neighbor Discovery Protocol (ISEND) for new wireless networks generations","authors":"Imen Elbouabidi, S. Smaoui, F. Zarai, M. Obaidat, L. Kamoun","doi":"10.5220/0005123300710077","DOIUrl":"https://doi.org/10.5220/0005123300710077","url":null,"abstract":"In charge of several critical functionalities, the Neighbor Discovery Protocol (NDP) is used by IPv6 nodes to find out nodes on the link, to learn their link-layer addresses to discover routers, and to preserve reachability information about the paths to active neighbors. Given its important and multifaceted role, security and efficiency must be ensured. However, NDP is vulnerable to critical attacks such as spoofing address, denial-of-service (DoS) and reply attack. Thus, in order to protect the NDP protocol, the Secure Neighbor Discovery (SEND) was designed. Nevertheless, SEND's protection still suffers from numerous threats and it is currently incompatible with the context of mobility and especially with the proxy Neighbor Discovery function used in Mobile IPv6. To overcome these limitations, this paper defines a new protocol named Improved Secure Neighbor Discovery (ISEND) which adapt SEND protocol to the context of mobility and extend it to new functionalities. The proposed protocol (ISEND) has been modeled and verified using the Security Protocol ANimator software (SPAN) for the Automated Validation of Internet Security Protocols and Applications (AVISPA) which have proved that authentication goals are achieved. Hence, the scheme is safe and efficient when an intruder is present.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}