scispace - formally typeset
Search or ask a question

Showing papers on "Roaming published in 2011"


01 Oct 2011
TL;DR: The design and experimental evaluation of ArrayTrack is presented, an indoor location system that uses MIMO-based techniques to track wireless clients at a very fine granularity in real time, as they roam about a building, making for the first time ubiquitous real-time, fine-grained location available on the mobile handset.
Abstract: With myriad augmented reality, social networking, and retail shopping applications all on the horizon for the mobile handheld, a fast and accurate location technology will become key to a rich user experience. When roaming outdoors, users can usually count on a clear GPS signal for accurate location, but indoors, GPS often fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor access point, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. We thus observe an opportunity to revisit the important problem of localization with a fresh perspective. This paper presents the design and experimental evaluation of ArrayTrack, an indoor location system that uses MIMO-based techniques to track wireless clients at a very fine granularity in real time, as they roam about a building. With a combination of FPGA and general purpose computing, we have built a prototype of the ArrayTrack system. Our results show that the techniques we propose can pinpoint 41 clients spread out over an indoor office environment to within 23 centimeters median accuracy, with the system incurring just 100 milliseconds latency, making for the first time ubiquitous real-time, fine-grained location available on the mobile handset.

703 citations


Journal ArticleDOI
TL;DR: A secure and light-weight authentication scheme with user anonymity for wireless communications that is secure in the case that the information stored in thesmart card is disclosed but the user password of the smart card owner is unknown to the attacker.

196 citations


Patent
28 Apr 2011
TL;DR: In this paper, a system and method for tracking billing events in a mobile wireless network for a network operator is disclosed, which can include, in one embodiment, capturing, by a server, event data associated with a mobile device.
Abstract: A system and method for tracking billing events in a mobile wireless network for a network operator is disclosed. The method can include, in one embodiment, capturing, by a server, event data associated with a mobile device. The event data specifies communication events at the mobile device and are captured are specific to a network operator which provides services to the mobile device. The method can further include, generating billing data for the mobile device using the event data and associated parameters, and providing, by the server, the billing data to the network operator providing services to the mobile device.

141 citations


Proceedings ArticleDOI
07 Apr 2011
TL;DR: It is necessary to develop a transmitter architecture that enables use of a multimode, multiband power amplifier, a key prerequisite to substantially reduce the number of external components, pins count, and PCB area, while at the same time significantly lowering power consumption.
Abstract: The constantly growing quest for global roaming with a fast mobile internet access has further increased demand for multiband 3G cell phones supporting also 2G/2.5G standards, in order to provide full coverage any time, any place. In order to substantially reduce cost and size of the multimode, multiband handsets, it is necessary to develop a transmitter architecture that enables use of a multimode, multiband power amplifier, a key prerequisite to substantially reduce the number of external components, pins count, and PCB area, while at the same time significantly lowering power consumption.

118 citations


Journal ArticleDOI
TL;DR: A lightweight and provably secure user authentication scheme with anonymity for the GLOMONET that uses only symmetric cryptographic and hash operation primitives for secure authentication and can defend smart card security breaches.
Abstract: Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some security weaknesses in those schemes. Furthermore, a lightweight and provably secure user authentication scheme with anonymity for the GLOMONET is proposed. It uses only symmetric cryptographic and hash operation primitives for secure authentication. Besides, it takes only four message exchanges among the user, foreign agent and home agent. We also demonstrate that this protocol enjoys important security attributes including prevention of various attacks, single registration, user anonymity, user friendly, no password/verifier table, and use of one-time session key between mobile user and foreign agent. The security properties of the proposed protocol are formally validated by a model checking tool called AVISPA. Furthermore, as one of the new features in our protocol, it can defend smart card security breaches. Copyright © 2010 John Wiley & Sons, Ltd. (In this paper, we propose a lightweight and provably secure user authentication scheme with anonymity for the global mobility network. It uses only symmetric cryptographic and hash operation primitives for secure authentication. Besides, it takes only four message exchanges among the user, foreign agent and home agent. We also demonstrate that this protocol enjoys important security attributes including prevention of various attacks, single registration, user anonymity and user friendly. Furthermore, it can defend smart card security breaches.)

118 citations


Journal ArticleDOI
TL;DR: This paper proposes a privacy-preserving universal authentication protocol, called Priauth, which provides strong user anonymity against both eavesdroppers and foreign servers, session key establishment, and achieves efficiency.
Abstract: Seamless roaming over wireless networks is highly desirable to mobile users, and security such as authentication of mobile users is challenging. In this paper, we propose a privacy-preserving universal authentication protocol, called Priauth, which provides strong user anonymity against both eavesdroppers and foreign servers, session key establishment, and achieves efficiency. Most importantly, Priauth provides an efficient approach to tackle the problem of user revocation while supporting strong user untraceability.

109 citations


Patent
20 Oct 2011
TL;DR: In this paper, the authors present an approach that enables storing and switching between multiple Electronic Subscriber Identity Modules (eSIM), where each eSIM is specific to a different carrier network.
Abstract: Methods and apparatus that allow a device to migrate wireless service across multiple wireless networks. In one exemplary embodiment, the present invention enables storing and switching between multiple Electronic Subscriber Identity Modules (eSIM), where each eSIM is specific to a different carrier network. By loading the appropriate eSIM, the user device can authenticate itself with the selected carrier, rather than roaming. During roaming operation, the user equipment can load one or more of the previously stored eSIMs. Selection of the eSIM can be done manually by the user or can be driven by the user equipment based on desired context; for example, based on carrier signal strength, cost-effectiveness, etc. Support for multiple radio technologies also allows universal connectivity for wireless devices, even spanning previously incompatible technologies such as GSM (Global Standard for Mobile Communications), CDMA (Code Division Multiple Access), etc.

105 citations


Patent
Jing Zhu1, Mats Agerstam1
07 Jun 2011
TL;DR: In this article, a multi-radio handover manager (MRHM) is proposed to minimize the "on" time of one radio when the other radio is connected to the Internet, and also prevents unnecessary inter-RAT (radio access technologies) WLAN-to-WWAN handovers in a "multi-AP" WLAN.
Abstract: A multi-radio handover manager and supporting algorithms are disclosed. The multi-radio handover manager (MRHM) minimizes the "on" time of one radio when the other radio is connected to the Internet. The MRHM also prevents unnecessary inter-RAT (radio access technologies) WLAN-to-WWAN handovers in a "multi-AP" WLAN, where intra-RAT WLAN-to-WLAN (layer 2) roaming is possible. The MRHM minimizes the impact of IP address changes due to WWAN-to-WLAN handover on an active TCP/IP session. And, the MRHM optimizes its handover-triggering algorithm based on traffic and environment.

93 citations


Journal ArticleDOI
TL;DR: This article showed that there are two possible ways in which a molecule can break apart: one can be split into two parts, and the other can be broken by a single particle, and its discovery may have far reaching implications.
Abstract: Chemists have long held that there are two ways in which a molecule can break apart. But recent results show a third possibility, and its discovery may have far-reaching implications.

82 citations


Journal ArticleDOI
TL;DR: Numerical results indicate that a huge amount of energy can be saved with an energy-aware cooperative management of the networks, and suggest that, to reduce energy consumption, and thus the cost to operate the networks), new cooperative attitudes of the operators should be encouraged with appropriate incentives, or even enforced by regulation authorities.

78 citations


Patent
01 Aug 2011
TL;DR: In this paper, the authors proposed a scheme for automatically selecting a wireless communication network by user equipment using a "steered" PLMN. But the scheme requires the user equipment to select a wireless network in the coverage area by comparing the received network identifications from the scanning operation with the steered network identification.
Abstract: Methods and apparatus for automatically selecting a wireless communication network by user equipment using a “steered” PLMN are disclosed. A home network identification, a list of prioritized roaming network identifications, and a steered network identification are stored in memory (e.g. a SIM or USIM) of the user equipment. In an automatic network selection procedure, a scanning operation is performed to receive one or more network identifications corresponding to one or more available wireless communication networks in a coverage area. The user equipment attempts to select a wireless communication network in the coverage area by comparing the received network identifications from the scanning operation with the steered network identification. If a match between a received network identification and the steered network identification is identified, a wireless communication network corresponding to the received network identification that matches the steered network identification is selected and registered with by the user equipment. This procedure is performed in lieu of use of the list of prioritized roaming network identifications of the user equipment. By setting the steered network identification via an over-the-air programming procedure when necessary (e.g. on a per region basis), a home network operator may “steer” user equipment to any desired network immediately and efficiently.

Patent
Peter J. Marsico1
19 Oct 2011
TL;DR: In this paper, the first signaling message includes a policy or quality of service (QoS) attribute associated with a roaming subscriber and originating from a home network of the roaming subscriber.
Abstract: According to one aspect, the subject matter described herein includes a method for modifying policy information associated with a roaming subscriber. The method includes receiving a first signaling message. The first signaling message includes a policy or quality of service (QoS) attribute associated with a roaming subscriber and originating from a home network of the roaming subscriber. The method also includes determining, using information associated with the roaming subscriber or a provider network, that the policy or QoS attribute should be modified and modifying the policy or QoS attribute for application in the provider network.

Proceedings ArticleDOI
11 Apr 2011
TL;DR: This paper presents a novel two-factor authentication scheme whereby a user's device produces multiples OTPs from an initial seed using the proposed production scheme, and applies the many from one function to a certain seed removes the requirement of sending SMS-based OTP's to users, and reduces the restrictions caused by the SMS system.
Abstract: Two-factor authentication (2FA) provides improved protection, since users are prompted to provide something they know and something they have. This method delivers a higher-level of authentication assurance, which is essential for online banking security. Many banking systems have satisfied the2FA requirements by sending a One Time Password (OTP), something possessed, through an SMS to the user's phone device. Unfortunately, international roaming and SMS costs and delays put restrictions on this system reliability. This paper presents a novel two-factor authentication scheme whereby a user's device produces multiples OTPs from an initial seed using the proposed production scheme. The initial seed is produced by the communications partners' unique parameters. Applying the many from one function to a certain seed removes the requirement of sending SMS-based OTPs to users, and reduces the restrictions caused by the SMS system.

Proceedings ArticleDOI
01 Jun 2011
TL;DR: This paper combines the existing adaptive segmented HTTP streaming system with an application layer framework for creating transparent multi-link applications, and a location based QoS information system containing GPS coordinates and accompanying bandwidth measurements, populated through crowd-sourcing.
Abstract: A well known challenge with mobile video streaming is fluctuating bandwidth. As the client devices move in and out of network coverage areas, the users may experience varying signal strengths, competition for the available resources and periods of network outage. These conditions have a significant effect on video quality. In this paper, we present a video streaming solution for roaming clients that is able to compensate for the effects of oscillating bandwidth through bandwidth prediction and video quality scheduling. We combine our existing adaptive segmented HTTP streaming system with 1) an application layer framework for creating transparent multi-link applications, and 2) a location based QoS information system containing GPS coordinates and accompanying bandwidth measurements, populated through crowd-sourcing. Additionally, we use real-time traffic information to improve the prediction by, for example, estimating the length of a commute route. To evaluate our prototype, we performed real-world experiments using a popular tram route in Oslo, Norway. The client connected to multiple networks, and the results show that our solution increases the perceived video quality significantly. Also, we used simulations to evaluate the potential of aggregating bandwidth along the route.

Journal ArticleDOI
TL;DR: This paper offers the first formal study of anonymous authentication scheme for roaming service in global mobility networks and points out some practical attacks on Chang et al.'s authentication scheme with user anonymity for roaming environments.

Journal ArticleDOI
TL;DR: A secure and lightweight user authentication protocol with anonymity for roaming service in the GLOMONET is proposed and uses low-cost functions such as one-way hash functions and exclusive-OR operations to achieve security goals.
Abstract: Designing a user authentication protocol with anonymity for the global mobility network (GLOMONET) is a difficult task because wireless networks are susceptible to attacks and each mobile user has limited power, processing and storage resources. In this paper, a secure and lightweight user authentication protocol with anonymity for roaming service in the GLOMONET is proposed. Compared with other related approaches, our proposal has many advantages. Firstly, it uses low-cost functions such as one-way hash functions and exclusive-OR operations to achieve security goals. Having this feature, it is more suitable for battery-powered mobile devices. Secondly, it uses nonces instead of timestamps to avoid the clock synchronization problem. Therefore, an additional clock synchronization mechanism is not needed. Thirdly, it only requires four message exchanges between the user, foreign agent and home agent. Further, the security properties of our protocol are formally validated by a model checking tool called AVISPA. We also demonstrate that this protocol enjoys important security attributes including prevention of various attacks, single registration, user anonymity, no password table, and high efficiency in password authentication. Security and performance analyses show that compared with other related authentication schemes, the proposed scheme is more secure and efficient.

Patent
15 Aug 2011
TL;DR: In this paper, a gateway supports both a local access point (AP) and a virtual AP (VAP), which is accessible to devices associated with the owner of the gateway and to roaming Wi-Fi devices.
Abstract: Systems and methods for Wi-Fi roaming. A gateway supports both a local access point (AP) and a virtual AP. The local AP is accessible only to an "owner" of the gateway. The virtual AP (VAP) is accessible to devices associated with the owner of the gateway and to roaming Wi-Fi devices. A datastore conveys information about the roaming Wi-Fi devices to the VAP to permit them to access the VAP without the need for manual configuration of the VAP. A roaming Wi-Fi device may communicate with a gateway via a tunnel to maintain session connectivity during roaming. A session may be initiated on one network, such as a Wi-Fi network or a cellular network, handed off to another network, such as a cellular network or a Wi-Fi network, and then returned to network on which the session was initiated.

Patent
11 May 2011
TL;DR: In this paper, the authors proposed a registering method for a mobile terminal, the mobile terminal and a server, which comprises the following steps of: obtaining local position information by mobile terminal; transmitting a request to the server so as to obtain local virtual user identity recognizing information; and registering the obtained local virtual virtual user ID recognizing information.
Abstract: The invention relates to a registering method for a mobile terminal, the mobile terminal and a server. The method comprises the following steps of: obtaining local position information by a mobile terminal; transmitting a request to the server so as to obtain local virtual user identity recognizing information; and registering the obtained local virtual user identity recognizing information. In the invention, the local position information of the mobile terminal, such as a mobile phone, is obtained by a positioning function, virtual SIM (Subscriber Identity Module) card information is obtained from the server by the local position information, the virtual SIM card information is registered to the mobile terminal, and the mobile terminal can make and answer a call by a virtual SIM card number, thereby converting roaming service into local conversation service and greatly reducing the roaming conversation cost.

Patent
29 Jul 2011
TL;DR: In this paper, the authors proposed a dynamic assignment of International Mobile Subscriber Identities (IMSIs) to reduce roaming and overuse charges for mobile devices by reprogramming SIM cards dynamically from a pool of available mobile accounts.
Abstract: This disclosure generally relates to mobile subscriber identities for mobile devices, and more particularly, to dynamic assignment of International Mobile Subscriber Identities (IMSIs) to reduce roaming and overuse charges Instead of using a reprogrammable embedded Subscriber Identity Module (SIM) card for remote activation of a device, mobile carrier charges, such as roaming and over limit usage fees, can be significantly reduced by reprogramming SIM cards dynamically from a pool of available mobile accounts A smaller pool can be utilized to meet the needs of a large group, rather than a one-to-one association implemented within today's phones Resource usage can be tracked and as one account reaches its maximum, a new account can be assigned to the mobile device to prevent overuse charges Existing FMC concepts can insure single number inbound or outbound caller identification regardless of the name or number associated with the SIM card for the mobile device

Journal ArticleDOI
TL;DR: Five reauthentication protocols for HOs between WiMAX and WLANs by subscribers of networks conforming to the 3G Partnership Project (3GPP) standards are presented and analyzed and achieve outstanding performance results compared to standard protocols.
Abstract: Wireless technologies such as the Wireless Local Area Network (WLAN), the Worldwide Interoperability for Microwave Access (WiMAX), and the Third-Generation (3G) mobile communications system complement each other to support a variety of services suited for the home, urban, and global environments. As roaming users expect a seamless handover (HO) experience when switching from one wireless network to another, fast and secure HO operations must be supported by the networks. In this paper, we present and analyze five reauthentication protocols for HOs between WiMAX and WLANs by subscribers of networks conforming to the 3G Partnership Project (3GPP) standards. Our proposed protocols achieve outstanding performance results compared to standard protocols in terms of reauthentication signaling traffic and reauthentication delay, while fulfilling essential HO security requirements such as the provision of mutual authentication and forward and backward secrecy.

Proceedings ArticleDOI
01 Jul 2011
TL;DR: An optimized VHD scheme for optimizing the efficiency of vertical handover processes in the Fourth Generation (4G) heterogeneous wireless networks is presented and mechanisms for mobile applications to control the tradeoff between the usage of the preferred access network and number of handovers or connection breakdowns are provided.
Abstract: This thesis presents a vertical handover decision (VHD) scheme for optimizing the efficiency of vertical handover processes in the Fourth Generation (4G) heterogeneous wireless networks. The scheme consists of three closely integrated modules: Handover necessity estimation, handover target selection, and handover triggering condition estimation. Handover necessity estimation module determines whether a handover is necessary to an available network. Handover target selection module chooses the ``best'' network among the available candidates based on a set of criteria. Finally, handover triggering condition estimation module determines the right moment to initiate a handover out of the currently connected network. 4G wireless networks are expected to support mechanisms for tight integration and cooperation of divergent access network technologies. In such networks of heterogeneous nature, roaming users will experience frequent handovers across network boundaries. Thus, to ensure seamless roaming and efficient resource usage over dissimilar networks, intelligent VHD algorithms need to be used extensively. The research project presented in this thesis report focuses on this problem and provides an optimized VHD scheme, which minimizes the handover failures, unnecessary handovers and connection breakdowns whilst maintaining users' satisfaction at high levels. In addition, the scheme also provides mechanisms for mobile applications to control the tradeoff between the usage of the preferred access network and number of handovers or connection breakdowns. Simulation based performance evaluations demonstrate that the scheme reduces the number of handover failures, unnecessary handovers and connection breakdowns by up to 80%, 70% and 70%, respectively. They also show an increase of up to 50% in the satisfaction level of users.

Proceedings ArticleDOI
18 Jul 2011
TL;DR: This paper proposes a flexible campus VLAN system based on Open Flow and confirms that the proposed system can realize flexible network configurations and sophisticated access control with a much simplified network management work.
Abstract: Using a lot of VLANs on campus networks has become popular for deploying many logical networks over minimal fibers/cables. A campus-wide Wi-Fi system, for example, requires a lot of VLANs for separating the access networks from other campus networks and for realizing a sophisticated access control such as guest-/home-users separation and security filtering. The requirement is high especially when a network roaming system, such as eduroam, is introduced. The conventional VLAN based on IEEE802.1Q has some limitations, and the system configuration work is laborious. In this paper, we propose a flexible campus VLAN system based on Open Flow to solve the problems. In addition, we introduce a prototype system and show evaluation results. As the results, we confirm that the proposed system can realize flexible network configurations and sophisticated access control with a much simplified network management work.

Patent
23 Sep 2011
TL;DR: In this paper, the location-based policy in a mobile communication network is described, where the first Diameter signaling message is received at a Diameter agent and the extracted information is communicated to a policy control function.
Abstract: Methods, systems, and computer readable media for enabling location-based policy in a mobile communication network are disclosed. According to one method, a first Diameter signaling message is received at a Diameter agent. Subscriber identification information and roaming information are extracted from the first Diameter message and the extracted information is communicated to a policy control function.

Patent
03 Mar 2011
TL;DR: In this paper, a method for managing the roaming preferences of a mobile subscriber is described, which includes sending a preferred network roaming list to a mobile user and activating the preferred list on the mobile user's mobile device.
Abstract: According to one aspect, the subject matter described herein includes a method for managing the roaming preferences of a mobile subscriber. The method includes sending a preferred network roaming list to a mobile subscriber device. The method further includes sending a triggering message for terminating a PDP context link involving the mobile subscriber device and for activating the preferred network roaming list on the mobile subscriber device.

01 Jan 2011
TL;DR: The analysis conducted to study the effect of electromagnetic radiation of two mobile phone technologies with different frequencies and power level shows that mobile phone serving GSM has the larger effect on brain compared to mobile phone Serving CDMA.
Abstract: A boon for better communication, cell phone usage nonetheless has many health hazards. Various studies indicate that the emissions from a cell phone can be extremely harmful, causing genetic damage, tumours, memory loss, increased blood pressure and weakening of the immune system. The fact that this radiation is invisible, intangible, and enters and leaves our bodies without our knowledge makes it even more intimidating. Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA) are the two most prevalent second generation (2G) mobile communication technologies. This paper discusses on the analysis conducted to study the effect of electromagnetic radiation of two mobile phone technologies with different frequencies and power level via experimental works. The experiment was conducted in a laboratory using 10 human volunteers. The period of operation is 10 minutes as the talking time on the phone. Electroencephalogram is used to monitor and capture the brain signals during the experimental analysis for 10 minutes interval. The result shows that mobile phone serving GSM has the larger effect on brain compared to mobile phone serving CDMA.

Patent
07 Oct 2011
TL;DR: In this article, a method in a second node (310) in a visited network (300v) is presented, where the second node receives a message comprising subscription information and selects a serving gateway (308) in the visited network.
Abstract: The embodiments herein relate to a method in a second node (310) in a visited network (300v). The visited network (300v) is visited by a UE (301 ). The second node (310) receives a message comprising subscription information. The subscription information comprises a parameter indicating that the UE (301 ) is allowed to use a multimedia service in the home (300h) or the visited network (300v). The second node (310) selects a serving gateway (308) in the visited network (300v). Based on the parameter, the second node (310) selects a visited PDN gateway (305v), in the visited network (300v) when the UE (301 ) is allowed to use the multimedia service in the visited network (300v). Based on the parameter, the second node (310) selects a home PDN gateway (305h) in the home network (300h) when the UE (301 ) is allowed to use the multimedia service in the home network (300h).

Patent
06 Sep 2011
TL;DR: In this article, a method for steering a mobile phone's user on preferred networks while roaming is presented, where the user being able to move from a home network to a visited network characterised in that on detecting a roaming event, the handset automatically switches from 2G/3G visited networks to Wi-Fi preferred networks when available.
Abstract: The present invention provides a method for steering a handset's user on preferred networks while roaming, said user being able to move from a home network to a visited network characterised in that on detecting a roaming event, the handset automatically switches from 2G/3G visited networks to Wi-Fi preferred networks when available.

Patent
30 Mar 2011
TL;DR: In this paper, a system and method for recognizing traffic generated from an authenticated a device roaming in a wireless local area network and related aspects are provided, where an authentication server is arranged to authorise communications traffic originating from a wireless access point to use a roaming service, the traffic comprising an NAT translated IP address.
Abstract: A system and method for recognising traffic generated from an authenticated a device roaming in a wireless local area network and related aspects are provided. An authentication server is arranged to authorise communications traffic originating from a wireless access point to use a roaming service, the traffic comprising an NAT translated IP address. The server first authorises a WLAN roaming device, and then processes a meta-data message received from a WLAN access point in which the source address of the message comprises the source address of the roaming device at the WLAN access point. The server then determines, from the information provided in the meta-data message when it is received by the authentication server, which includes at this point a NAT translated source address in the meta-data message what the NAT translated source address of traffic from said authenticated roaming device will be. This enables the authentication server to authenticate internet-bound traffic having said NAT translated source address. In this way, all traffic generated by the roaming device whilst that NAT translated IP address is valid is automatically authorised to use a roaming service to access the internet.

Journal ArticleDOI
TL;DR: The proposed approach is suitable for real-time applications, such as frequent periodic reporting of urban traffic conditions, that could be used by on-board computers to provide improved navigation for end-users.
Abstract: In this paper we propose an end-to-end solution for urban infrastructure-to-vehicle traffic data delivery based on a class of unequal error protection (UEP) rateless codes called expanding window fountain (EWF) codes. The proposed solution relies on attractive features that rateless codes introduce to networks with unpredictable dynamics: the universal capacity approaching property which is well-matched to time-varying behavior of wireless links, and the innovative nature of each encoded packet which makes both time-consuming retransmission and content-reconciliation mechanisms unnecessary. Furthermore, usage of EWF codes allows separation of delivered data in importance classes with different error protection and recovery time guarantees, enabling mobile users to retrieve more important information more reliably and in shorter time span, thus making the proposed solution suitable for time-critical services. The addressed urban communication scenario consists of large number of sensors that sample and relay traffic flow information to network of Access Points (APs). APs use the existing underlying communication infrastructure, such as metropolitan area networks (MANs), to exchange traffic flow data, encode it using EWF coding principles, and finally disseminate it to roaming vehicles that join the network service in an ad-hoc manner in order to retrieve information regarding the surrounding environment. The proposed approach is suitable for real-time applications, such as frequent periodic reporting of urban traffic conditions, that could be used by on-board computers to provide improved navigation for end-users.

Patent
26 Apr 2011
TL;DR: In this paper, a platform component stores multiple profiles for a mobile device and can dynamically reroute incoming phone calls to another profile using a database of stored profiles and a rerouting component.
Abstract: Systems and methods for cost-effective phone calls and dynamic provisioning of mobile profiles within a roaming environment are presented herein. A platform component stores multiple profiles for a mobile device and can dynamically reroute incoming phone calls to another profile using a database of stored profiles and a rerouting component. The phone call is rerouted from a first identity of a mobile device that is associated with a first network, to a second identity that corresponds to the second network that the mobile device is roaming in enables the mobile subscribers to bypass the high charges associated with roaming. Furthermore, a roaming platform component can perform location updates on a mobile device, thereby updating the identity of the mobile device's SIM card to ensure that the mobile device has an identity profile that corresponds to a visited network in which the mobile device is roaming.