scispace - formally typeset
Search or ask a question
Topic

Mobile telephony

About: Mobile telephony is a research topic. Over the lifetime, 38008 publications have been published within this topic receiving 553646 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks that are proposed in literature and open research areas are identified.
Abstract: Location-based services (LBSs) have gained popularity as a result of the advances in mobile and communication technologies LBS provide users with relevant information based on their location In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected Location privacy is one of the major challenges in vehicular and mobile networks In this paper, we analyze the security and privacy requirements for LBS in vehicular and mobile networks Specifically, this paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks The different approaches proposed in literature are compared and open research areas are identified

110 citations

Journal ArticleDOI
TL;DR: A divide-and-conquer strategy with parallel computing mechanism has been adopted and an algorithm called Community-based Greedy algorithm for mining top-K influential nodes and precision analysis is given to show approximation guarantees of the models.
Abstract: With the proliferation of mobile devices and wireless technologies, mobile social network systems are increasingly available. A mobile social network plays an essential role as the spread of information and influence in the form of “word-of-mouth”. It is a fundamental issue to find a subset of influential individuals in a mobile social network such that targeting them initially (e.g., to adopt a new product) will maximize the spread of the influence (further adoptions of the new product). The problem of finding the most influential nodes is unfortunately NP-hard. It has been shown that a Greedy algorithm with provable approximation guarantees can give good approximation; However, it is computationally expensive, if not prohibitive, to run the greedy algorithm on a large mobile social network. In this paper, a divide-and-conquer strategy with parallel computing mechanism has been adopted. We first propose an algorithm called Community-based Greedy algorithm for mining top-K influential nodes. It encompasses two components: dividing the large-scale mobile social network into several communities by taking into account information diffusion and selecting communities to find influential nodes by a dynamic programming. Then, to further improve the performance, we parallelize the influence propagation based on communities and consider the influence propagation crossing communities. Also, we give precision analysis to show approximation guarantees of our models. Experiments on real large-scale mobile social networks show that the proposed methods are much faster than previous algorithms, meanwhile, with high accuracy.

109 citations

Journal ArticleDOI
TL;DR: This paper proposes a privacy-preserving universal authentication protocol, called Priauth, which provides strong user anonymity against both eavesdroppers and foreign servers, session key establishment, and achieves efficiency.
Abstract: Seamless roaming over wireless networks is highly desirable to mobile users, and security such as authentication of mobile users is challenging. In this paper, we propose a privacy-preserving universal authentication protocol, called Priauth, which provides strong user anonymity against both eavesdroppers and foreign servers, session key establishment, and achieves efficiency. Most importantly, Priauth provides an efficient approach to tackle the problem of user revocation while supporting strong user untraceability.

109 citations

Journal ArticleDOI
TL;DR: A mobile service provisioning architecture named a mobile service sharing community is proposed and a service composition approach by utilizing the Krill-Herd algorithm is proposed, which can obtain superior solutions as compared with current standard composition methods in mobile environments.
Abstract: The advances in mobile technologies enable mobile devices to perform tasks that are traditionally run by personal computers as well as provide services to the others. Mobile users can form a service sharing community within an area by using their mobile devices. This paper highlights several challenges involved in building such service compositions in mobile communities when both service requesters and providers are mobile. To deal with them, we first propose a mobile service provisioning architecture named a mobile service sharing community and then propose a service composition approach by utilizing the Krill-Herd algorithm. To evaluate the effectiveness and efficiency of our approach, we build a simulation tool. The experimental results demonstrate that our approach can obtain superior solutions as compared with current standard composition methods in mobile environments. It can yield near-optimal solutions and has a nearly linear complexity with respect to a problem size.

109 citations

Journal ArticleDOI
TL;DR: This paper analytically derive the average number of location updates during the interservice time for a movement-based location update scheme under fairly realistic assumptions, which are crucial for all trade off analysis.
Abstract: Mobility management plays a central role in providing ubiquitous communications services in future wireless mobile networks. In mobility management, there are two key operations, location update and paging, commonly used in tracking mobile users on the move. Location update is to inform the network about a mobile user's current location, while paging is used for the network to locate a mobile user. Both operations will incur signaling traffic in the resource limited wireless networks. The more frequent the location updates, the less paging in locating a mobile user; thus, there is a trade off in terms of signaling cost. Most trade off analysis in the literature is carried out under the assumption that some time variables are exponentially distributed. However, such assumptions will not be valid, particularly for the wireless Internet. In this paper, we present some general analytical results without these assumptions, which are essential for the general trade off analysis. Specifically, we analytically derive the average number of location updates during the interservice time for a movement-based location update scheme under fairly realistic assumptions, which are crucial for all trade off analysis. Our general analytical results make thorough numerical analysis for finding the optimal mobility management under various network operation scenarios possible.

109 citations


Network Information
Related Topics (5)
Wireless
133.4K papers, 1.9M citations
95% related
Wireless network
122.5K papers, 2.1M citations
94% related
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless ad hoc network
49K papers, 1.1M citations
92% related
Network packet
159.7K papers, 2.2M citations
91% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20242
202351
2022149
2021339
2020558
2019707