scispace - formally typeset
Search or ask a question
Topic

Mobile telephony

About: Mobile telephony is a research topic. Over the lifetime, 38008 publications have been published within this topic receiving 553646 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: It has demonstrated that the computation complexity of the proposed protocols is similar to the existing ones, while the security has been significantly improved.
Abstract: Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile users privacy in the roaming network environment. One-time session key progression frequently renews the session key for mobile users and reduces the risk of using a compromised session key to communicate with visited networks. It has demonstrated that the computation complexity of the proposed protocols is similar to the existing ones, while the security has been significantly improved

108 citations

Proceedings ArticleDOI
21 Feb 2012
TL;DR: The proposed fall detection prototype for the Android-based platform has three components: sensing the accelerometer data from the mobile embedded sensors, learning the relationship between the fall behavior and the collected data, and alerting preconfigured contacts through message while detecting fall.
Abstract: Since todays smartphones are programmable and embed various sensors, these phones have the potential to change the way how healthcare is delivered. Fall detection is definitely one of the possibilities. Injuries due to falls are dangerous, especially for elderly people, diminishing the quality of life or even resulting in death. This study presents the implementation of a fall detection prototype for the Android-based platform. The proposed system has three components: sensing the accelerometer data from the mobile embedded sensors, learning the relationship between the fall behavior and the collected data, and alerting preconfigured contacts through message while detecting fall. We adopt different fall detection algorithms and conduct various experiments to evaluate performance. The results show that the proposed system can recognize the fall from human activities, such as sitting, walking and standing, with 72.22% sensitivity and 73.78% specificity. The experiment also investigates the impact of different locations where the phone attached. In addition, this study further analyzes the trade-off between sensitivity and specificity and discusses the additional power consumption of the devices.

108 citations

Patent
10 May 1994
TL;DR: In this paper, the authors proposed a method for optimizing the use of channels, the changing of channels and handover procedures in a mobile telecommunications system for instance, wherein parameters (C/I, P, I, L, N, ς, m) belonging to the mobile system generate the load values (Bc, Bp, Bi, Bl, Bn, Bς, Bm) for the connections via different channels/base stations between subscribers in a public telephone network and mobile stations in the mobile telecommunications systems.
Abstract: A method for optimizing the use of channels, the changing of channels and handover procedures in a mobile telecommunications system for instance, wherein parameters (C/I, P, I, L, N, ς, m) belonging to the mobile telecommunications system generate the load values (Bc, Bp, Bi, Bl, Bn, Bς, Bm) for the connections via different channels/base stations between subscribers in a public telephone network and mobile stations in the mobile telecommunications systems. Different kinds of parameters can be compared directly by means of the load values (Bc, Bp, Bi, Bl, Bn, Bς, Bm) which are combined (S1-S5) to provide a total load value (Btot2, Btot4) for each connection. A first total load value (Btot2) is generated for a connection set-up between one of the subscribers and one of the mobile stations. The total load values (Btot4, Btot5) for the connection are estimated for alternative channels/base stations and these total load values are compared with the first total load value (Btot2). The system changes to the channel/base station that has the most favourable load value (Btot4), on the basis of the comparison. The load values (Btot2, Btot4) can also be used to optimize the resources within one or more base stations, so that the sum of the load values for the connections within one or more base stations will become the most advantageous.

108 citations

Journal ArticleDOI
TL;DR: This paper proposes a user verification system leveraging unique gait patterns derived from acceleration readings to detect possible user spoofing in mobile healthcare systems and shows that the framework can be implemented in two ways: user-centric and server-centric, and it is robust to not only random but also mimic attacks.
Abstract: The rapid deployment of sensing technology in smartphones and the explosion of their usage in people’s daily lives provide users with the ability to collectively sense the world. This leads to a growing trend of mobile healthcare systems utilizing sensing data collected from smartphones with/without additional external sensors to analyze and understand people’s physical and mental states. However, such healthcare systems are vulnerable to user spoofing, in which an adversary distributes his registered device to other users such that data collected from these users can be claimed as his own to obtain more healthcare benefits and undermine the successful operation of mobile healthcare systems. Existing mitigation approaches either only rely on a secret PIN number (which can not deal with colluded attacks) or require an explicit user action for verification. In this paper, we propose a user verification system leveraging unique gait patterns derived from acceleration readings to detect possible user spoofing in mobile healthcare systems. Our framework exploits the readily available accelerometers embedded within smartphones for user verification. Specifically, our user spoofing mitigation framework (which consists of three components, namely Step Cycle Identification, Step Cycle Interpolation, and Similarity Comparison) is used to extract gait patterns from run-time accelerometer measurements to perform robust user verification under various walking speeds. We show that our framework can be implemented in two ways: user-centric and server-centric, and it is robust to not only random but also mimic attacks. Our extensive experiments using over 3,000 smartphone-based traces with mobile phones placed on different body positions confirm the effectiveness of the proposed framework with users walking at various speeds. This strongly indicates the feasibility of using smartphone based low grade accelerometer to conduct gait recognition and facilitate effective user verification without active user cooperation.

108 citations

Proceedings ArticleDOI
10 Apr 2016
TL;DR: A clear definition of NDN mobility support is provided, to enable fetching of data produced by mobile users, and then to classify the proposed solutions by their commonalities and to articulate design tradeoffs of different approaches.
Abstract: The initial Named Data Networking (NDN) architecture design provided consumer mobility support automatically, taking advantage of NDN's stateful forwarding plane to return data to mobile consumers; at the same time, the support of data producer mobility was left unspecified. During the past few years, a number of NDN producer mobility support schemes have been proposed. This paper provides a clear definition of NDN mobility support, to enable fetching of data produced by mobile users, and then to classify the proposed solutions by their commonalities and to articulate design tradeoffs of different approaches. We identify remaining challenges and discuss future research directions for effective and efficient data producer mobility support in NDN.

108 citations


Network Information
Related Topics (5)
Wireless
133.4K papers, 1.9M citations
95% related
Wireless network
122.5K papers, 2.1M citations
94% related
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless ad hoc network
49K papers, 1.1M citations
92% related
Network packet
159.7K papers, 2.2M citations
91% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20242
202351
2022149
2021339
2020558
2019707