scispace - formally typeset
Search or ask a question

Showing papers on "Roaming published in 2013"


Proceedings Article
02 Apr 2013
TL;DR: In this paper, the authors present an indoor location system that uses MIMO-based techniques to track wireless clients at a very fine granularity in real time, as they roam about a building.
Abstract: With myriad augmented reality, social networking, and retail shopping applications all on the horizon for the mobile handheld, a fast and accurate location technology will become key to a rich user experience. When roaming outdoors, users can usually count on a clear GPS signal for accurate location, but indoors, GPS often fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor access point, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. We thus observe an opportunity to revisit the important problem of localization with a fresh perspective. This paper presents the design and experimental evaluation of ArrayTrack, an indoor location system that uses MIMO-based techniques to track wireless clients at a very fine granularity in real time, as they roam about a building. With a combination of FPGA and general purpose computing, we have built a prototype of the ArrayTrack system. Our results show that the techniques we propose can pinpoint 41 clients spread out over an indoor office environment to within 23 centimeters median accuracy, with the system incurring just 100 milliseconds latency, making for the first time ubiquitous real-time, fine-grained location available on the mobile handset.

654 citations


Journal ArticleDOI
TL;DR: An enhanced authentication scheme with privacy preservation based on quadratic residue assumption is proposed that achieves two-factor security and user untraceability and enhances security strength of He et al.
Abstract: Global mobility network (GLOMONET) provides global roaming service to ensure ubiquitous connectivity for users traveling from one network to another. It is very crucial not only to authenticate roaming users, but to protect the privacy of users. However, due to the broadcast nature of wireless channel and resource limitations of terminals, providing efficient user authentication with privacy preservation is challenging. Recently, He et al. proposed a secure and lightweight user authentication scheme with anonymity for roaming service in GLOMONETs. However, in this paper, we identify that the scheme fails to achieve strong two-factor security, and suffers from domino effect, privileged insider attack and no password change option, etc. Then we propose an enhanced authentication scheme with privacy preservation based on quadratic residue assumption. Our improved scheme enhances security strength of He et al.’s protocol while inheriting its merits of low communication and computation cost. Specifically, our enhanced scheme achieves two-factor security and user untraceability.

120 citations


Journal ArticleDOI
TL;DR: It is concluded that CS, a generalization of traditional roaming, is the best performing and simplest option, SS is least effective and that VSS and VPS perform better than spectrum sharing with added complexity.
Abstract: Resource sharing among mobile network operators is a promising way to tackle growing data demand by increasing capacity and reducing costs of network infrastructure deployment and operation. In this work, we evaluate sharing options that range from simple approaches that are feasible in the near-term on traditional infrastructure to complex methods that require specialized/virtualized infrastructure. We build a simulation testbed supporting two geographically overlapped 4G LTE macro cellular networks and model the sharing architecture/process between the network operators. We compare Capacity Sharing (CS) and Spectrum Sharing (SS) on traditional infrastructure and Virtualized Spectrum Sharing (VSS) and Virtualized PRB Sharing (VPS) on virtualized infrastructure under light, moderate and heavy user loading scenarios in collocated and noncollocated E-UTRAN deployment topologies. We also study these sharing options in conservative and aggressive sharing participation modes. Based on simulation results, we conclude that CS, a generalization of traditional roaming, is the best performing and simplest option, SS is least effective and that VSS and VPS perform better than spectrum sharing with added complexity.

99 citations


Posted Content
TL;DR: This work proposes a novel anonymous authentication scheme for roaming service in global mobility networks that contains the authentication and establishment of session key scheme when mobile user is located in his/her home network, therefore it is more practical and universal for global Mobility networks.
Abstract: Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed a enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.'s scheme is vulnerable to impersonation attacks, off-line password guessing attacks and insider attacks, and cannot provide user friendliness, user's anonymity, proper mutual authentication and local verification. To remedy these weaknesses, in this paper we propose a novel anonymous authentication scheme for roaming service in global mobility networks. Security and performance analyses show the proposed scheme is more suitable for the low-power and resource-limited mobile devices, and is secure against various attacks and has many excellent features.

98 citations


Patent
William A. Brown1, Troy C. Meuninck1
16 Apr 2013
TL;DR: In this article, a system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile device server that has computer instructions to execute a web server application at the mobile devices server.
Abstract: A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile device server that has computer instructions to execute a web server application at the mobile device server. The web server application can be operable to detect a media resource center while roaming in a communication zone of the media resource center and to transmit a pairing key to the media resource center responsive to acquiring communication access to the communication zone. The web server application can be further operable to receive from the media resource center an indication that a roaming charge will be applied to a subscriber account associated with the mobile device responsive to the media resource center identifying from the pairing key that the mobile device server is a guest device. Other embodiments are disclosed.

95 citations


Patent
10 Dec 2013
TL;DR: In this paper, the authors propose a service policy that applies a first control to a first activity over a roaming network and a second control to the first action over a home network.
Abstract: A device that determines an aspect of a service policy based on a state of the device, and applies the service policy. The state is based on a user interaction, or a lack of user interaction, with the device. The service policy applies a first control to a first activity over a roaming network and a second control to the first activity over a home network, wherein the first control controls the first activity differently than the second control controls the first activity. The first activity is caused by a first software component on the device and comprises a first set of prospective or successful communications over an available wireless network. The aspect of the service policy controls the first activity differently from a second activity over a roaming network, where the second activity is associated with a second software component on the device.

91 citations


Journal ArticleDOI
TL;DR: A new authentication scheme is presented that provides a robust anonymous two-factor authentication for consumer roaming service in GLOMONETs and is analyzed whether it withstands various attacks.
Abstract: As a mechanism to secure access to a global mobility network (GLOMONET), authentication for consumer roaming service is an essential technology. Moreover, as mobile consumers are getting concerned about how much information network providers gather about them, privacy preservation is a serious concern these days. In this paper, a new authentication scheme is presented that provides a robust anonymous two-factor authentication for consumer roaming service in GLOMONETs. Detailed operational phases of the proposed scheme are provided. Security analysis is provided to confirm that the proposed scheme provides anonymity, authentication, and perfect forward secrecy. In addition, the proposed scheme is analyzed whether it withstands various attacks.

86 citations


Patent
05 Dec 2013
TL;DR: In this paper, a system and method allows users to make purchases by charging or funding a prepaid debit card with their cell phone accounts by simulating a user roaming with their mobile device.
Abstract: A system and method allows users to make purchases by charging or funding a prepaid debit card with their cell phone accounts by simulating a user roaming with their mobile device.

79 citations


Journal ArticleDOI
TL;DR: This paper analyzes the security of Jiang et al.
Abstract: In global mobility networks, anonymous user authentication is an essential task for enabling roaming service In a recent paper, Jiang et al proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised In this paper, we analyze the security of Jiang et al's scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack Then, we also propose a new smart card based anonymous user authentication scheme for roaming service Compared with the existing schemes, our protocol uses a different user authentication mechanism, which does not require the home agent to share a static secret key with the foreign agent, and hence, it is more practical and realistic We show that our proposed scheme can provide stronger security than previous protocols

78 citations


Book ChapterDOI
07 May 2013
TL;DR: In this article, cognitive radio and cooperative communication can be integrated in 4G networks to conduct wireless devices to either perform vertical handover or execute relaying by exploiting their available short range interfaces (e.g., WiMedia, Bluetooth, etc).
Abstract: 4G is a promising solution for the future mobile Internet through integrating heterogeneous radio access technologies (RATs) based on the Internet Protocol (IP) where multi-standard wireless devices allow mobile users to experience ubiquitous connectivity by roaming across different networks and connecting through the RAT that best suits their traffic requirements. However, holding multiple active interfaces incurs significant power consumption to the wireless devices. This necessitates investigating disruptive techniques for decreasing the power consumption of the 4G wireless devices. In this paper, we demonstrate how cognitive radio and cooperative communication can be integrated in 4G networks to conduct wireless devices to either perform vertical handover or execute relaying by exploiting their available short range interfaces (e.g., WiMedia, Bluetooth, etc) to reduce their power consumption while still enabling the required QoS. Simulation and experimental results validate that 4G wireless devices can double their battery lifetime by adopting the proposed strategies.

38 citations


Journal ArticleDOI
Daojing He1, Chun Chen1, Jiajun Bu1, Sammy Chan, Yan Zhang 
TL;DR: The challenges unique to roaming services are identified as a set of mandatory and optional requirements and some mechanisms that can meet the aforementioned security and efficiency requirements are proposed.
Abstract: Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging. Although the same may be said for all communication systems, roaming services have special requirements and vulnerabilities, and therefore deserve special attention. Over the years, we have seen a variety of authentication protocols emerging to address this issue. However, which protocol is the most effective is still debatable. In this article, we first identify the challenges unique to roaming services as a set of mandatory and optional requirements. Next, we provide a brief state-of-the-art survey of existing work and point out their limitations in securing roaming services, especially in resistance against denial of service attacks, efficient authentication, flexible roaming in mobile contexts, as well as backward and forward non-linkabilities. To complement the security provided by the existing work, we then propose some mechanisms that can meet the aforementioned security and efficiency requirements. Finally, we present challenges that need to be addressed in roaming authentication.

Proceedings ArticleDOI
01 Dec 2013
TL;DR: The findings reveal that the ratio μTc /(μT1 + μT c) quantifies the impact of node mobility on both cloudlet access probability and cloudlet computing performance.
Abstract: With the popularity of smartphones and explosion of mobile applications, mobile devices are becoming the prevalent computing platform for convenient communication and rich entertainment. Because mobile devices still have limited processor power, computing-intensive applications need to be offloaded to either remote clouds or nearby cloudlets for processing. But, remote cloud computing is hindered by the long latency and expensive roaming charges of cellular radio access. Therefore, cloudletcomputing becomes appealing to provide instant and low- cost service through resource-rich devices (e.g., desktops) in the vicinity of mobile devices. It is evident that cloudlet computing is challenged by the intermittent connection between cloudlets and mobile devices due to user mobility. The question ishow to evaluate the impact of user mobility on cloudlet computing perfor- mance. In this paper, we examine the cloudlet access probability, task success rate, and task execution speed to measure the impact of mobility. We discover that the cloudlet access probability is µTC/(µTI +µTC ) determined by mean connection time µTC and mean inter-connection time µTI between the mobile device and the cloudlet. Furthermore, we find that the task success rate and execution speed depend on not only task computation demand and cloudlet computing speed but also cloudlet access probability. Our findings reveal that the ratio µTC/(µTI + µTC ) quantifies the impact of node mobility on both cloudlet access probability and cloudlet computing performance. I. INTRODUCTION

Patent
Sandip Homchaudhuri1, Shu Du1, Sumeet Kumar1, Sohani Ganesh Rao1, Paul Husted1 
08 Oct 2013
TL;DR: In this paper, a multidimensional algorithm for roaming is described for wireless communications, where the initial set of APs is identified based at least in part on an initial metric (e.g., beacon signal strength) and information may be received in response to the probe signals.
Abstract: Methods, devices, and apparatuses are described for wireless communications using a multidimensional algorithm for roaming. In one aspect, an initial set of candidate access points (APs) is produced by a station using a roaming scan. The initial set may be identified based at least in part on an initial metric (e.g., beacon signal strength). A probe signal may be transmitted by the station to at least one of the candidate APs in the initial set and information may be received in response to the probe signals. The station may then identify a reduced set from the initial set based at least in part on the received information, where the reduced set is used to select a target AP. At least one additional metric may be identified and the probe signal may be configured to obtain information corresponding to the additional metrics. This information may be used by the station to select the candidate APs in the reduced set.

Patent
03 Oct 2013
TL;DR: In this article, a system and method for providing policy-based roaming updates for a mobile device is presented, which includes receiving one or more roaming policies from a server, monitoring several parameters of the mobile device for a change in one ormore of the several parameters, and evaluating the one of the parameters and the change according to the one or multiple roaming policies.
Abstract: Presented is a system and method for providing policy-based roaming updates for a mobile device. The method includes receiving one or more roaming policies from a server, monitoring several parameters of the mobile device for a change in one or more of the several parameters, and evaluating the one or more of the several parameters and the change according to the one or more roaming policies. The method further includes updating a roaming priority list on the mobile device in response to the evaluating, and roaming, after the updating, according to the roaming priority list for establishing a wireless communication. The roaming priority list may include a home network and one or more roaming networks.

Proceedings ArticleDOI
14 Apr 2013
TL;DR: This work analyzes the structure of revenue-sharing contracts that incentivize both capacity sharing and increased access for end-users and adapts the newsvendor model from the operations management literature to model such a situation.
Abstract: In a limited form cellular providers have long shared spectrum in the form of roaming agreements. The primary motivation for this has been to extend the coverage of a wireless carrier's network into regions where it has no infrastructure. As devices and infrastructure become more agile, such sharing could be done on a much faster time-scale and have advantages even when two providers both have coverage in a given area, e.g., by enabling one provider to acquire “overflow” capacity from another provider during periods of high demand. This may provide carriers with an attractive means to better meet their rapidly increasing bandwidth demands. On the other hand, the presence of such a sharing agreement could encourage providers to underinvest in their networks, resulting in poorer performance. We adapt the newsvendor model from the operations management literature to model such a situation and to gain insight into these trade-offs. In particular, we analyze the structure of revenue-sharing contracts that incentivize both capacity sharing and increased access for end-users.

Journal ArticleDOI
TL;DR: A secure and privacy protect authentication scheme is proposed in this paper, which comprises local authentication and roaming authentication for VANET based on bilinear pairing and can provide secure communications and anonymous authentication among RSUs and vehicles.
Abstract: Vehicular ad hoc network (VANET) can increase the traffic efficiency by allowing arbitrary vehicles to broadcast the messages to other vehicles and road side units (RSUs). But due to the openness of the wireless network, VANET is very vulnerable to forgery attack. Thus, the security and privacy of the messages should be provided, to make sure that the real identity of vehicles can be traceable by authorized party while not be revealed to other vehicles. The existing solutions can neither satisfy the privacy requirement nor have an effective message verification scheme on vehicles. A secure and privacy protect authentication scheme is proposed in this paper, which comprises local authentication and roaming authentication for VANET based on bilinear pairing and can provide secure communications and anonymous authentication among RSUs and vehicles.

Journal ArticleDOI
TL;DR: The results show that the proposed INS scheme is more efficient at decreasing handover delays, End-to-End delays for VoIP and Video applications, packet loss ratios as well as increasing the efficiency of network selection processes in comparison with the state of the arts.
Abstract: In heterogeneous vehicular networks, the most challenging issue is obtaining an efficient vertical handover during the vehicle roaming process. Efficient network selection process can achieve satisfactory Quality-of-Service for ongoing applications. In this paper, we propose an Intelligent Network Selection (INS) scheme based on maximization scoring function to efficiently rank available wireless network candidates. Three input parameters were utilized to develop a maximization scoring function that collected data from each network candidate during the selection process. These parameters are: Faded Signal-to-Noise Ratio, Residual Channel Capacity, and Connection Life Time. The results show that the proposed INS scheme is more efficient at decreasing handover delays, End-to-End delays for VoIP and Video applications, packet loss ratios as well as increasing the efficiency of network selection processes in comparison with the state of the arts.

Patent
18 Dec 2013
TL;DR: In this paper, the authors proposed a method for selecting an AP based on a prioritized list with respect to APs, which includes at least one of roaming consortium information, a network address identifier (NAI), a public land mobile network (PLMN) identifier, and a service set identifier (SSID).
Abstract: There is provided a method for selecting an access point (AP), the method performed by a user equipment. The method may comprise: receiving a prioritized list with respect to APs, the prioritized list includes at least one of roaming consortium information, a network address identifier (NAI), a public land mobile network (PLMN) identifier; scanning at least one or more APs in the vicinity thereby generating an available list which includes at least one or more service set identifiers (SSIDs) and roaming consortium information; acquiring at least one or more NAIs from the roaming consortium information in the available list using pre-stored mapping information; comparing the acquired NAI with the NAI in the prioritized list to select a proper AP.

Book ChapterDOI
01 Jan 2013
TL;DR: The success of GSM promoted the creation of the 3GPP, a standard-developing organization dedicated to supporting GSM evolution and creating new telecommunication standards, in particular a Third Generation Telecommunication System (3G).
Abstract: Terrestrial mobile telecommunications started in the early 1980s using various analog systems developed in Japan and Europe. The Global System for Mobile communications (GSM) digital standard was subsequently developed by the European Telecommunications Standards Institute (ETSI) in the early 1990s. Available in 219 countries, GSM belongs to the second generation mobile phone system. It can provide an international mobility to its users by using inter-operator roaming. The success of GSM promoted the creation of the Third Generation Partnership Project (3GPP), a standard-developing organization dedicated to supporting GSM evolution and creating new telecommunication standards, in particular a Third Generation Telecommunication System (3G). The current members of 3GPP are ETSI (Europe), ATIS(USA), ARIB (Japan), TTC (Japan), CCSA (China) and TTA (Korea). In 2010, there are 1.3 million 2G and 3G base stations around the world and the number of GSM users surpasses 3.5 billion.

Patent
28 Aug 2013
TL;DR: In this paper, a method for enhanced voice call procedure includes receiving at a CSFB-IWF a request to provide routing information for a UE for which an incoming voice call is received.
Abstract: Systems, methods and media for enhanced voice call procedures are provided. A method for enhanced voice call procedure includes receiving at a CSFB-IWF a request to provide routing information for a UE for which an incoming voice call is received. The request is received from an HLR and includes a UE identifier. The UE is operating in an LTE network. The method also includes sending a page along with a TMSI for the UE to an MME in the LTE network that can locate the UE along with the TMSI. The page signal causes the UE to switch to a legacy (3G) network. The method further includes detecting an MSC hosting the UE that is located in the legacy network. The method also includes receiving an MSRN for the UE from the hosting MSC and sending to the HLR a message including the MSRN in response to the request.

Proceedings ArticleDOI
25 Jun 2013
TL;DR: It is found that, current 2G/3G/4G systems have well-tested mobility support solutions and generally work well, but under certain biased, less common yet possible scenarios, accounting gap between the operator's log and the user's observation indeed exists.
Abstract: In this paper, we study how mobility affects mobile data accounting, which records the usage volume for each roaming user. We find out that, current 2G/3G/4G systems have well-tested mobility support solutions and generally work well. However, under certain biased, less common yet possible scenarios, accounting gap between the operator's log and the user's observation indeed exists. The gap can be as large as 69.6% in our road tests. We further discover that the root causes are diversified. In addition to the no-signal case reported in the prior work [23], they also include handoffs, as well as insufficient coverage of hybrid 2G/3G/4G systems. Inter-system handoffs (that migrate user devices between radio access technologies of 2G, 3G, and 4G) may incur non-negligible accounting discrepancy.

Patent
04 Sep 2013
TL;DR: In this paper, the steering of roaming services based on connection state data pertaining to Diameter connections between visited networks and an internetwork is discussed. But the steering is restricted to a single device and a non-transitory storage medium.
Abstract: A method, a device, and a non-transitory storage medium comprising instructions that provide steering of roaming services based on connection state data pertaining to Diameter connections between visited networks and an internetwork. The steering of roaming services include accepting or denying a request of a roaming user seeking to attach to a visited network and managing and deploying preferred visited network lists to user devices.

Proceedings ArticleDOI
07 Apr 2013
TL;DR: An enhanced group mobility scheme is proposed in this paper to reduce the number of control messages, including Router Solicitation and Router Advertisement messages as opposed to the group-based PMIPv6 protocol.
Abstract: The IPv6 over Low power Wireless Personal Area Network (6LoWPAN) has attracted lots of attention recently because it can be used for the communications of Internet of things (IoT). In this paper, the concept of group-based network roaming in Proxy Mobile IPv6 (PMIPv6) domain is considered in the 6LoWPAN-based wireless body area networks. PMIPv6 is a standard to manage the network-based mobility in allIP wireless network. However, it does not perform well in group-based body area networks. To further reduce the handoff delay and signaling cost, an enhanced group mobility scheme is proposed in this paper to reduce the number of control messages, including Router Solicitation (RS) and Router Advertisement (RA) messages as opposed to the group-based PMIPv6 protocol. Simulation results illustrate that the proposed handoff scheme can reduce the handoff delay and signaling cost. The packet loss ratio and the overhead can also be reduced.

Patent
12 Apr 2013
TL;DR: In this paper, an animal tracking system is provided for remotely monitoring animal positioning, which includes an implant device, a global positioning system, a network, one or more remote servers, and at least one wireless computing device.
Abstract: An animal tracking system is provided for remotely monitoring animal positioning. The system includes an implant device, a global positioning system, a network, one or more remote servers, and at least one wireless computing device. The implant device acts as a GPS receiver, calculating the animal's position and then transmitting the results to the remote server where they are stored in a database. Owners can remotely access the database via a software application installed on a wireless computing device. Users can select an acceptable roaming range for the animal, an acceptable range between the animal and other animals being tracked, a lack of movement, or substantial changes in body temperature. Additionally, the implant device can directly connect with the wireless computing device via a Bluetooth connection. In this way, the computing device can access or transfer data regarding owner contract info, and an animal's medical history.

Patent
03 Dec 2013
TL;DR: In this article, the authors propose a method for use when a mobile communication device roams be- tween a home network (10) and foreign networks (20,30) which device comprises a SIM card using an IMSI.
Abstract: Method for use when a mobile communication device roams be- tween a home network (10) and foreign networks (20,30), which device comprises a SIM card using an IMSI. The method comprises the steps of a) storing on the SIM card a first IMSI for network identification; b)upon receipt of a location update message indicating that the mobile device has moved to a first visited network (20), firstly causing the HLR (12) to send an instruction message to the mobile device to change, to a second IMSI, the IMSI used for network identification; secondly causing the mobile device to use the second IMSI for network identification and saving the first IMSI; and then causing the mobile device to perform a device network refresh; and c)upon roaming back to the home network, causing the mobile device to change the IMSI used for network identification back to the first IMSI and then to update its network status.

Patent
31 May 2013
TL;DR: In this article, a roaming mobile device is provided with VoLTE services, even when the home network of the mobile device does not provide VOLTE service, even if the mobile devices are attached to the network.
Abstract: Voice over LTE (VoLTE) services may be provided to a roaming mobile device, even when the home network of the mobile device does not provide VoLTE service. In one implementation, one or more devices in a network may determine based on a mobile device attaching to a network as a roaming device for the network, a home network of the mobile device. The devices may further determine whether the home network, associated with the mobile device, provides VoLTE services; transmit, based on the determination that the home network does not provide VoLTE services, a VoLTE client application to the mobile device, the VoLTE client application providing functionality, for the mobile device, relating to usage of VoLTE services in the network. The devices may further communicate with the mobile device and the VoLTE client application, to provide one or more VoLTE services to the mobile device.

Journal ArticleDOI
TL;DR: An analytical method for evaluating the performance of a VH algorithm that relies on the Received Signal Strength Indicator (RSSI) samples is proposed and a novel intermediary system model, namely the N-model, is proposed to capture the large-scale shadowing effects.
Abstract: The development of handheld mobile terminals (MT) capable of operating over both Wireless Local Area Networks (WLAN) and the cellular media is an important step toward the evolution of next-generation integrated networks. For real-time applications like voice, efficient vertical handover (VH) algorithms are required in maintaining a seamless connectivity and an acceptable level of quality for mobile users in heterogeneous environments. This paper proposes an analytical method for evaluating the performance of a VH algorithm that relies on the Received Signal Strength Indicator (RSSI) samples. The system model is portrayed upon addressing relevant factors that affect the quality and continuity of a voice call, and a set of performance metrics is proposed. A rigorous signal strength time series is utilized in characterizing the instantaneous decision metrics, and a novel intermediary system model, namely the N-model, is proposed to capture the large-scale shadowing effects. The performance of a generic algorithm that relies on the RSSI, which itself is susceptible to estimation error, is evaluated for an MT roaming in and out of the WLAN coverage area. Results obtained using the analytical expressions are validated by comparing them to that obtained through Monte Carlo simulation.

Journal ArticleDOI
TL;DR: A novel strategy is proposed by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements that lure attackers by sending route request advertisements and the effectiveness of the proposed architecture is evaluated using simulation in ns-2.
Abstract: A Wireless Mesh Network (WMN) is a promising way of providing low-cost broadband Internet access. The underlying routing protocol naively assumes that all the nodes in the network are non-malicious. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way to malicious attackers. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to have a suction attack called the blackhole attack. The attacker can falsify routing metrics such as the shortest transmission time to reach any destination and thereby suck the network traffic. We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. They are deployed as roaming software agents that tour the network and lure attackers by sending route request advertisements. We collect valuable information on attacker's strategy from the intrusion logs gathered at a given honeypot. We finally evaluate the effectiveness of the proposed architecture using simulation in ns-2.

Patent
04 Feb 2013
TL;DR: In this article, the authors proposed a system for rerouting independent traffic on the networks of the mobile telephony operators, such as the GSM network, as well as the use of methods for user authentication and activation, traffic control and user access on a 3G-traffic re-routing Wi-Fi network.
Abstract: The present invention relates to a system for rerouting independent traffic on the networks of the mobile telephony operators, such as the GSM network, as well as the use of methods for user authentication and activation, traffic control and user access on a 3G-traffic rerouting Wi-Fi network. The rerouting Wi-Fi network proposed is independent of the mobile telephony network operators and enables the data traffic rerouting service to be provided to users of several operators simultaneously. The system includes its own database containing user information, obviating the need to consult operator databases. The system proposed also enables a user of operator A to purchase a Wi-Fi data plan from operator B using the International Mobile Subscriber Identity (IMSI) authentication of operator A, thereby obviating the need to replace the SIM card. Access to roaming users, i.e. users outside their native numbering area, is also permitted.