scispace - formally typeset
Search or ask a question
Topic

Mobile telephony

About: Mobile telephony is a research topic. Over the lifetime, 38008 publications have been published within this topic receiving 553646 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A hybrid framework that combines the two technologies - cluster heads are equipped with solar panels to scavenge solar energy and the rest of nodes are powered by wireless charging is proposed and can reduce battery depletion by 20 percent and save vehicles’ moving cost by 25 percent compared to previous works.
Abstract: The application of wireless charging technology in traditional battery-powered wireless sensor networks (WSNs) grows rapidly recently. Although previous studies indicate that the technology can deliver energy reliably, it still faces regulatory mandate to provide high power density without incurring health risks. In particular, in clustered WSNs there exists a mismatch between the high energy demands from cluster heads and the relatively low energy supplies from wireless chargers. Fortunately, solar energy harvesting can provide high power density without health risks. However, its reliability is subject to weather dynamics. In this paper, we propose a hybrid framework that combines the two technologies - cluster heads are equipped with solar panels to scavenge solar energy and the rest of nodes are powered by wireless charging. We divide the network into three hierarchical levels. On the first level, we study a discrete placement problem of how to deploy solar-powered cluster heads that can minimize overall cost and propose a distributed $1.61(1+\epsilon)^2$ -approximation algorithm for the placement. Then, we extend the discrete problem into continuous space and develop an iterative algorithm based on the Weiszfeld algorithm. On the second level, we establish an energy balance in the network and explore how to maintain such balance for wireless-powered nodes when sunlight is unavailable. We also propose a distributed cluster head re-selection algorithm. On the third level, we first consider the tour planning problem by combining wireless charging with mobile data gathering in a joint tour. We then propose a polynomial-time scheduling algorithm to find appropriate hitting points on sensors’ transmission boundaries for data gathering. For wireless charging, we give the mobile chargers more flexibility by allowing partial recharge when energy demands are high. The problem turns out to be a Linear Program. By exploiting its particular structure, we propose an efficient algorithm that can achieve near-optimal solutions. Our extensive simulation results demonstrate that the hybrid framework can reduce battery depletion by 20 percent and save vehicles’ moving cost by 25 percent compared to previous works. By allowing partial recharge, battery depletion can be further reduced at a slightly increased cost. The results also suggest that we can reduce the number of high-cost mobile chargers by deploying more low-cost solar-powered sensors.

165 citations

Proceedings ArticleDOI
16 Oct 2012
TL;DR: This work exposes two novel threats to the user privacy in 3G telephony systems, which make it possible to trace and identify mobile telephony subscribers, and proposes fixes to these privacy issues which also take into account and solve other privacy attacks known from the literature.
Abstract: Mobile telephony equipment is daily carried by billions of subscribers everywhere they go. Avoiding linkability of subscribers by third parties, and protecting the privacy of those subscribers is one of the goals of mobile telecommunication protocols. We use formal methods to model and analyse the security properties of 3G protocols. We expose two novel threats to the user privacy in 3G telephony systems, which make it possible to trace and identify mobile telephony subscribers, and we demonstrate the feasibility of a low cost implementation of these attacks. We propose fixes to these privacy issues, which also take into account and solve other privacy attacks known from the literature. We successfully prove that our privacy-friendly fixes satisfy the desired unlinkability and anonymity properties using the automatic verification tool ProVerif.

164 citations

Journal ArticleDOI
TL;DR: The mobile crowdsourcing architecture and applications are investigated, some research challenges and countermeasures are discussed, and some research orientations are finally envisioned for further studies.
Abstract: With the proliferation of increasingly powerful mobile devices, mobile users can collaboratively form a mobile cloud to provide pervasive services, such as data collecting, processing, and computing. With this mobile cloud, mobile crowdsourcing, as an emerging service paradigm, can enable mobile users to take over the outsourced tasks. By leveraging the sensing capabilities of mobile devices and integrating humanintelligence and machine-computation, mobile crowdsourcing has the potential to revolutionize the approach of data collecting and processing. In this article we investigate the mobile crowdsourcing architecture and applications, then discuss some research challenges and countermeasures for developing mobile crowdsourcing. Some research orientations are finally envisioned for further studies.

164 citations

Journal ArticleDOI
TL;DR: An in-depth security and privacy analysis of some of the most popular freeware mobile health applications is provided, revealing that the majority of the analyzed applications do not follow well-known practices and guidelines, not even legal restrictions imposed by contemporary data protection regulations, thus jeopardizing the privacy of millions of users.
Abstract: Recent advances in hardware and telecommunications have enabled the development of low cost mobile devices equipped with a variety of sensors. As a result, new functionalities, empowered by emerging mobile platforms, allow millions of applications to take advantage of vast amounts of data. Following this trend, mobile health applications collect users health-related information to help them better comprehend their health status and to promote their overall wellbeing. Nevertheless, health-related information is by nature and by law deemed sensitive and, therefore, its adequate protection is of substantial importance. In this paper we provide an in-depth security and privacy analysis of some of the most popular freeware mobile health applications. We have performed both static and dynamic analysis of selected mobile health applications, along with tailored testing of each application’s functionalities. Long term analyses of the life cycle of the reviewed apps and our general data protection regulation compliance auditing procedure are unique features of the present paper. Our findings reveal that the majority of the analyzed applications do not follow well-known practices and guidelines, not even legal restrictions imposed by contemporary data protection regulations, thus jeopardizing the privacy of millions of users.

164 citations

Journal ArticleDOI
TL;DR: The current evidence for a causal association between cancer and exposure to RF energy is weak and unconvincing, and additional research in those areas will be required for a more thorough assessment of the possibility of a causal connection betweencancer and the RF energy from mobile telecommunications.
Abstract: There have been reports in the media and claims in the courts that radiofrequency (RF) emissions from mobile phones are a cause of cancer, and there have been numerous public objections to the siting of mobile phone base antennas because of a fear of cancer. This review summarizes the current state of evidence concerning whether the RF energy used for wireless communication might be carcinogenic. Relevant studies were identified by searching MedLine with a combination of exposure and endpoint terms. This was supplemented by a review of the over 1700 citations assembled by the Institute of Electrical and Electronics Engineers (IEEE) International Committee on Electromagnetic Safety as part of their updating of the IEEE C95.1 RF energy safety guidelines. Where there were multiple studies, preference was given to recent reports, to positive reports of effects and to attempts to confirm such positive reports. Biophysical considerations indicate that there is little theoretical basis for anticipating that RF energy would have significant biological effects at the power levels used by modern mobile phones and their base station antennas. The epidemiological evidence for a causal association between cancer and RF energy is weak and limited. Animal studies have provided no consistent evidence that exposure to RF energy at non-thermal intensities causes or promotes cancer. Extensive in vitro studies have found no consistent evidence of genotoxic potential, but in vitro studies assessing the epigenetic potential of RF energy are limited. Overall, a weight-of-evidence evaluation shows that the current evidence for a causal association between cancer and exposure to RF energy is weak and unconvincing. However, the existing epidemiology is limited and the possibility of epigenetic effects has not been thoroughly evaluated, so that additional research in those areas will be required for a more thorough assessment of the possibility of a causal connection between cancer and the RF energy from mobile telecommunications.

164 citations


Network Information
Related Topics (5)
Wireless
133.4K papers, 1.9M citations
95% related
Wireless network
122.5K papers, 2.1M citations
94% related
Wireless sensor network
142K papers, 2.4M citations
92% related
Wireless ad hoc network
49K papers, 1.1M citations
92% related
Network packet
159.7K papers, 2.2M citations
91% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20242
202351
2022149
2021339
2020558
2019707