{"title":"A novel idle mode operation in IEEE 802.11 WLANs: prototype implementation and empirical evaluation","authors":"Sunggeun Jin, Kwanghun Han, Sunghyun Choi","doi":"10.1109/ICC.2006.255403","DOIUrl":"https://doi.org/10.1109/ICC.2006.255403","url":null,"abstract":"While the IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet access, new applications such as Internet Protocol (IP) telephony are fast emerging today. For the battery-powered IP phone devices, the standby time extension is a key concern for the market acceptance while today's 802.11 is not optimized for such an operation. In this paper, we propose a novel Idle Mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a Mobile Host (MH) does not need to perform a handoff within a predefined Paging Area (PA). Only when the MH enters a new PA, an idle handoff is performed with a minimum level of signaling. Due to the absence of such idle mode operation, both IP paging and Power Saving Mode (PSM) have been considered the alternatives so far even though they are not efficient. We develop a new analytical model to comparatively evaluate our proposed scheme. Our numerical results demonstrate that the proposed scheme outperforms the legacy alternatives with respect to power consumption, thus extending the standby time dramatically.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed approach for assistive service provision in pervasive environment","authors":"M. Ghorbel, M. Mokhtari, Stéphane Renouard","doi":"10.1145/1161023.1161037","DOIUrl":"https://doi.org/10.1145/1161023.1161037","url":null,"abstract":"In this paper, we propose assistive service provision architecture in pervasive environments. This architecture is based on a distributed approach and ensures service design, deployment and discovery aspects. In order to perform those aspects, several constraints are supported by this architecture such as the context of the pervasive environment, the user profile and the terminal profile. Delivered services are dedicated to dependent people (elderly and people with disabilities). Our strategy is based on our previous work on smart home for people with disabilities. We also present the OSGi-based implementation of our architecture. This implementation is a first step to experiment and validate our approach. We are aiming at having evaluations in real conditions The rapid development of information and communication technologies is opening a large variety of new services and aids not only for valid people, but also for dependent people due to physical/cognitive restriction or the elderly. Combining technical aids and mobile technology allows those people to benefit from an independent living in both usual and temporary living environments.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-centric network security management: a comprehensive helper","authors":"G. K. Mostéfaoui, P. Brézillon","doi":"10.1145/1161023.1161031","DOIUrl":"https://doi.org/10.1145/1161023.1161031","url":null,"abstract":"In most current systems, managing access to networks rely on static rules implemented on firewalls and IDS (Intrusion Detection Systems). These measures lack a systematic consideration of the context within which an attack occurs. Indeed, we argue that network access management must be enforced by identifying the sensible contexts in which the hacker tries to drive the system to, before performing the potential dangerous action. Thus, our claim concerns a human-centered management of security as opposed to computing-centered security. In this direction, we propose a visual model that allows expressing sensible contexts for blocking hackers when they enter such sensible contexts. This surveillance operation could be lead by a human or a system. Additionally, our solution allows interlocked processes of incremental acquisition of knowledge and learning of new practices that enriches the initial security policy with new security contexts.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Stuedi, A. Frei, LucAndré Burdet, G. Alonso
{"title":"SymPhone: design and implementation of a VoIP peer for Symbian mobile phones using Bluetooth and SIP","authors":"Patrick Stuedi, A. Frei, LucAndré Burdet, G. Alonso","doi":"10.1145/1161023.1161034","DOIUrl":"https://doi.org/10.1145/1161023.1161034","url":null,"abstract":"VoIP is born from the growing Internet infrastructure, which has over the years seen significant improvements in both bandwidth and end-to-end latency. In this paper, we explore making VoIP available on a mobile phone. For that purpose, we propose an architecture and describe the various components involved. Data entering and leaving the mobile phone is encapsulated in a wireless Bluetooth connection. The bridge to the Internet is provided by a linux Bluetooth access point. The system is compatible with current VoIP standards using RTP and SIP for data and signaling transmission, respectively. It has been tested to work in combination with several known softphones. Both RTP and SIP stack are built on top of a special IP emulation layer on the mobile phone, which has been developed to facilitate the migration of the application onto devices having a direct IP binding available for Bluetooth such as BNEP (Bluetooth Network Encapsulation Protocol). Apart from presenting design and implementation details, the paper also provides measurement results with regard to delay and session setup time and discusses certain limitations of the application evolving from restrictions imposed by the mobile phone's programming platform.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments","authors":"H. Moustafa, Gilles Bourdon, Y. Gourhant","doi":"10.1145/1161023.1161030","DOIUrl":"https://doi.org/10.1145/1161023.1161030","url":null,"abstract":"Wireless LAN (WLAN) is rapidly growing as a popular technology for ubiquitous communication, where Internet access is being a standard commodity. The growing demand in WLAN technological development is to provide high quality and secure Internet access to mobile users using their portable devices. Nevertheless, WLAN is still restrictive, as it requires the presence of mobile users in the communication range of access points. Moreover, the security of this network is posing a major challenge for its usage. Hybrid ad hoc networks appear as an attractive solution in public hotspots applications, allowing mobile users to achieve WLAN access independent of their existence in access points communication ranges. Since effective Authentication, Authorization and Accounting (AAA) are of great importance for secure mobile wireless access, in this paper we propose a novel architecture that provides efficient AAA and secure communication among mobile clients in WLAN hotspots applications. Our solution uses the hybrid ad hoc network concept and considers the service provider as the single point of contact for all AAA transactions. We adapt the IEEE 802.11i standard to the hybrid ad hoc network environment in order to set up authenticated links on layer 2, achieving secure wireless access as well as confidential data transfer. Since IEEE 802.11i necessitates the existence of a fixed infrastructure between the WLAN and the authentication server, we introduce a cross-layer interaction with the ad hoc routing layer in order to provide a virtual infrastructure among the mobile clients through employing a clustering mechanism. We validate our proposed solution through simulation. Through analyzing the obtained results, we give some performance estimates and we show the advantages of using the hybrid ad hoc networks approach.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Caituiro-Monge, K. Almeroth, Mariali Alvarez-Rohena
{"title":"Friend relay: a resource sharing framework for mobile wireless devices","authors":"H. Caituiro-Monge, K. Almeroth, Mariali Alvarez-Rohena","doi":"10.1145/1161023.1161027","DOIUrl":"https://doi.org/10.1145/1161023.1161027","url":null,"abstract":"The rising popularity of wireless devices opens exciting possibilities for users to share their resources. However, there exists no end-to-end, general-purpose, resource sharing framework for such devices. Existing resource sharing solutions address only part of the overall challenge and barely consider mobile wireless devices' critical characteristics, such as mobility, CPU capability, and power limitations. Furthermore, they do not have mechanisms to control the degree to which resources are shared. This lack of control likely leads to over-usage of shared resources, therefore, reducing computing capacity and draining the batteries of devices that are sharing resources. In this paper, we present Friend Relay, a resource-sharing framework for mobile wireless devices that offers automatic publishing, discovery and configuration, as well as monitoring and control. Our contribution is to add monitoring and control as mechanisms to manage the utilization of shared resources. To evaluate Friend Relay, we quantify the benefits of monitoring and controlling resource usage for Internet access sharing. For our evaluation, we developed a prototype of Friend Relay. In addition, we prototyped \"Internet Sharing\", a service to allow users to share the ISP subscription of another user. Our evaluation focuses on the performance of this service with and without the Friend Relay monitoring and control mechanisms. Our results show that mobile devices that either share or use resources can benefit significantly from using our Friend Relay architecture.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing mobility and adaptation in upcoming 802.21 enabled devices","authors":"F. Cacace, L. Vollero","doi":"10.1145/1161023.1161025","DOIUrl":"https://doi.org/10.1145/1161023.1161025","url":null,"abstract":"One emerging characteristic of electronic devices is the increasing number of connectivity interfaces (aka NICs1) towards the outside world. That obviously translates in a set of technical issues related to their management in order to provide seamless connectivity when the connections move from one interface to another. The IEEE 802.21 is a recent effort of IEEE that aims at providing a general interface for the management of NICs. In this paper we discuss how the upcoming standard may be effectively exploited in a mobile context in order to hide network heterogeneity to end users. To accomplish this task, we propose a centralized element called Mobility Manager interfacing with the 802.21 sublayer and responsible for the application of connectivity policies. Based on a real testbed, we showed that the new standard and the MM can be used to improve network performance experienced by the end user. Moreover we showed how the MM can interact with adaptive applications in order to improve further the range of usability of real-time applications.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115749997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UniWireless: a distributed open access network","authors":"D. Severina, M. Brunato, A. Ordine, L. Veltri","doi":"10.1145/1161023.1161029","DOIUrl":"https://doi.org/10.1145/1161023.1161029","url":null,"abstract":"In this paper we describe the UniWireless framework, a nationwide distributed Open Access testbed that involves different research units collaborating in the TWELVE national project. The Uni-Fy AAA system, used to manage the collection of involved hotspots, is also discussed.The most important aspect of the UniWireless framework is its compatibility with different authentication mechanisms; while most access networks enforce a particular authentication protocol upon their users, in the UniWireless system different mechanisms coexist, and each client can in principle use the one that it considers most suitable. Two different, independent and coexisting authentication protocols (capive portal and a SIP-based technique) have been implemented and are described in this paper.Besides its academic and scientific value for demonstrating results and supporting research activities, the UniWireless framework is actually used to grant access to nomadic users that belong to different research units in all the hotspots related to the project. Every nomadic user can access network resources from every hotspot in the testbed by his usual authentication credentials. Experience gathered from more than one year of continuative use of the system is also discussed.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A localized IP-address auto-configuration protocol for wireless ad-hoc networks","authors":"V. C. Giruka, M. Singhal","doi":"10.1145/1161023.1161038","DOIUrl":"https://doi.org/10.1145/1161023.1161038","url":null,"abstract":"We present a localized IP auto-con.guration protocol for wireless ad-hoc networks, called OASIS. OASIS introduces the idea of position-dependent IP-addresses using a cellular structure of the underlying network. Within a cell, nodes try to obtain a con.ict-free IP-address using a distributed mutual exclusion style algorithm. We show the correctness, and present an asymptotic analysis of the overhead of OASIS. Further, we present extensions to OASIS protocol to cope with message losses and node mobility. OASIS avoids problems due to network partitions and mergers, supports concurrent node joins/leaves, incurs localized control overhead per IP-address acquisition (independent of the number of nodes in the network), and hence it is scalable.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132120553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient paging in large-scale urban mesh networks","authors":"S. Bohacek, V. Sridhara, L. Lou","doi":"10.1145/1161023.1161036","DOIUrl":"https://doi.org/10.1145/1161023.1161036","url":null,"abstract":"The task of forming a route can be broken into two parts, finding any route to the desired host and refining that route so it is suitable for the conenction. We refer to this first task as paging and it consists of simply delivering a single packet to the destination. Traditional MANET routing protocols perform this task via flooding. However, when the number of nodes ranges into the thousands, flooding becomes highly inefficient. In the case of cellular networks, paging is performed with one or more base stations broadcasting a page message. However, in large-scale urban networks, nodes are not necessarily in direct contact with the infrastructure, hence such techniques are not applicable. In this paper, the topology and architecture of a large-scale urban mesh network is examined and a scheme is developed for paging. This scheme is designed for and takes advantage of the topology, mobility, and architecture found in urban mesh networks. The resulting scheme is highly efficient in that it generates little overhead and is scalable.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}