Skip to main content
main-content

Über dieses Buch

This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security.

The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.

Inhaltsverzeichnis

Frontmatter

VCloud: A Security Framework for VANET

Abstract
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. The proposed infrastructure; a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) seeks to provide a more reliable and secured vehicular communication network.
Wiseborn Manfe Danquah, D. Turgay Altilar

Design of Dual Band H-Shaped Antenna for DCS and WLAN Applications

Abstract
This paper presents the performance of a dual-band H-shaped patch antenna for DCS and WLAN applications. The proposed antenna employs a microstrip feed line and a FR4 substrate on which an H-shaped slot is cut using the etching technique. This structure radiates for Digital Communication System DCS (1.710-1.880) GHz and for Local Area Network WLAN (5.15 -5.35) GHz. A commercially available software CST Microwave Studio simulation showed that the proposed design exhibits a return loss of 15.36 dB and 23.493 dB at 1.81 GHz and 5.295 GHz respectively. Further, for each there was a power gain of 2.45 dBi and 2.1 dBi, and the VSWR was less than 2 for both bands while efficiency is between 80 to 90%. The proposed antenna could possibly be employed in a modern communication system that has constraints in size and weight.
K. ThanaPakkiam, K. Baskaran, J. S. Mandeep

Secrecy Rate of the Amplify-and-Forward Relay Wire-Tap Channel in Rayleigh Fading

Abstract
Benefiting from information-theoretic studies in cooperative relaying communications, relaying strategies have recently received considerable attention in the context of physical-layer security over wireless networks. In this paper, we investigate the secrecy rate of a relay wire-tap Rayleigh fading channel in which a source wishes to communicate securely to a destination in the presence of an eavesdropper and under the aid of an amplify-and-forward (AF) relay. Due to the presence of fading, it is a very challenging task to obtain the secrecy rate in closed-form. To overcome this issue, we first propose a novel method to calculate the expectation of an exponentially distributed random variable using the exponential integral function. By exploiting this calculation, we then establish the average secrecy rate of the considered AF relay channel in closed-form. Numerical results show that the proposed formula provides an accurate and effective way to obtain the secrecy rate without the need of time-consuming Monte Carlo simulations.
Cuong Dang, Leonardo J. Rodríguez, Duc-Anh Le, Forrest Sheng Bao, Nghi H. Tran

A Robust On-Demand Routing Protocol for Cognitive Radio Ad Hoc Networks

Abstract
Cognitive Radio (CR) technology has been introduced to solve the problems of spectrum underutilization and spectrum scarcity caused by improper spectrum management policies. In Cognitive Radio Ad Hoc Networks (CRAHNs), which operate without centralized infrastructure support, data routing encounters various challenges including frequent topology changes, heterogeneous spectrum availability, and intermittent connectivity caused by the activities of Primary Users (PUs). In this paper, a robust on-demand routing protocol for CRAHNs, referred to the Robustness Aware Cognitive Ad-hoc Routing Protocol (RACARP), is proposed with an aim to provide robust paths for data delivery. The Expected Path Delay (EPD) routing metric used for path decision is introduced and applied in the protocol. The metric takes account of the link delay and the effect of packet loss on wireless links. Furthermore, the protocol avoids creating a transmission path that uses PU’s channel in PU regions in order to counteract the impact of PU activities which can simply cause communication interruptions. The protocol also jointly exploits path and spectrum diversity in routing process in order to provide multi-path and multi-channel routes for the purpose of fast route recovery. The performance evaluation is conducted through simulation using NS-2 simulator. The simulation results prove that the RACARP protocol achieves better performance in terms of average throughput and average end-to-end delay as compared to the Dual Diversity Cognitive Ad-hoc Routing Protocol (D2CARP).
Zamree Che-aron, Aisha Hassan Abdalla, Khaizuran Abdullah, Wan Haslina Hassan, Md. Arafatur Rahman

Guiding Users to Shops Using the Near-Field Communication between Signages and Mobile Terminals

Abstract
This paper proposes two algorithms for navigating users to their destinations using near-field communication between their mobile terminals and digital signage units in an underground area where GPS is not usable. One algorithm focuses on the angle to the destination while the other looks at the distance to the destination. The paper also proposes an algorithm for avoiding traffic congestion by limiting the number of mobile terminals that communicate with a signage unit simultaneously. We have built an underground mall model on a simulator, and evaluated the algorithms in terms of the rate of successful arrival at the destination and the time it takes to reach the destination.
Yoshio Suga, Daiki Takahashi, Kazumasa Takami

MANETs Routing Method for Calls with Predefined Duration in Audio/Video Communications

Abstract
MANETs (Mobile Ad hoc Networks) are attracting attention as a useful means of communication in times when the communications network infrastructure has been disrupted by a widespread disaster. So far, audio/video services provided on MANETs have not been evaluated adequately. Audio/video communication generates large packet traffic, which rapidly reduces the battery levels of relaying terminals. This results in ongoing communication being interrupted due to a low battery level. This will lead to frequent disconnections and attempts to reestablish network routes at short intervals, resulting in degradation in communication quality. This paper studies a routing method that takes account of remaining battery levels in multimedia communication. Specifically, it proposes a routing method that establishes communication routes for calls with predefined communication duration, using only those terminals that have adequate remaining batter levels. The effectiveness of the proposed routing method has also been confirmed through communication quality evaluation by using a developed SIP_MANET emulator.
Hiroyuki Todoroki, Kazumasa Takami

Enhanced Adaptive Modulation and Coding (AMC) Technique Using ILDPCA Coders for MIMO Systems

Abstract
AMC has been adopted at the physical layer of several standard e, g 3GPP, 3GPP2, HIPERLAN/2, IEEE802.11a, IEEE 802.15.3 and IEEE 802.16. MIMO technology in coordination with Adaptive Modulation and Coding (AMC) scheme further enhances spectral efficiency by adjusting transmission parameters to the channel condition while satisfying a target error performance. Consequently, the combined MIMO-AMC technology is a promising solution to offer high throughput for next generation wireless systems. The system still has limitations in terms of channel estimation error, periodic performance drop, channel correlation resulting in reduced throughput and packet loss rate A cross layer design using Improved Low Density Parity Check Code (ILDPCA) in AMC on the physical layer and Incremental redundancy Hybrid ARQ (IR-HARQ) in the data link layer is proposed. ILDPCA coder in AMC enhances the performance of the system in terms of bit error rate,packet loss rate and spectral efficiency.
J. Sofia Priya Dharshini, M. V. Subramanyam, K. Soundararajan

A Weighted T2F Scheme for WLANs

Abstract
WiFi network is known to be wasteful because WiFi performs the time-domain contention and often forces channel to remain idle. The time to frequency (T2F) protocol has recently been proposed to perform the frequency-domain contention and it has shown that T2F can reduce the contention overheads effectively. However, T2F just provides fair channel access. In this paper, we proposed a novel weighted T2F (WT2F) design that can provide weighted channel access. We then study the proportional fairness of WT2F. Simulation results validate that the proposed design is very effective and the proposed performance model is very accurate.
Huan Zhang, Qinglin Zhao, Pei Dang, Hongning Dai, Zhijie Ma

Illustrating PNC Using Rectangular Pulses

Abstract
Physical-layer network coding (PNC) opens up a whole new research area because it innovatively proposes implementing upper-layer functions (i.e., network coding) at the physical layer. Study shows that PNC can achieve 100% throughput improvement compared with the traditional scheme. This paper aims at providing an entry-level tutorial that can help readers quickly and thoroughly understand the basic idea of PNC. In this paper, we first overview basic assumptions, bitwise XOR operation, network coding (NC), and then illustrate the decoding process and the performance of PNC using the example of rectangular pulses.
Li Feng

Application of Wireless Personal Area Networks to a Ship Area Piconet

Abstract
An integrated ship area network (SAN) architecture of the international standard is mainly based on wired instrument network connections and shipboard control networks. However, for a high-speed data transmission support to onboard instruments or instrument-to-instrument, we apply IEEE 802.15.3 wireless personal area networks (WPAN) to a high-cost valued ship area network. Thus, this paper consider two IEEE 802.15.3 WPAN protocols for a ship area piconet employing a wireless gateway concept. With this, it is shown that the WPAN gateway application can deliver a high quality transmission with energy efficiency and a higher data throughput performance. Moreover, it can be seen that a realistic transmission parameter choice for two WPAN protocols is essential to guarantee both less energy consumption and high data throughput.
Dong-Keun Jeon, Yeonwoo Lee, Kyung-Ho Kim

Design and Development of a Wireless Sensor Network Framework for Water Quality Remote Monitoring

Abstract
This study involves the design and development of a wireless sensor network (WSN) that integrates several sensing modules into a fully-functional system. The overall system is composed of a remote server, a controller node, and several sensing modules. The controller node is implemented using an Android mobile phone with Bluetooth and 3G capabilities. Bluetooth is used to communicate with the various sensing modules; while 3G is used to relay data to the remote server. The sensing modules utilize an Arduino Mega 2560 (with the sensor circuits) and a Bluetooth shield. Test results show that this framework is a viable design for WSN systems and can be used for remote installations that can be continuously upgraded over time.
Francis Jerome Tiausas, Maria Leonora Guico, Jose Claro Monje, Carlos Oppus

Fun Learn: An Interactive Mobile Platform for Kids Learning

Abstract
The project brings out the utmost desire for kids to learn basic mathematics in the form of simple games. They can enjoy on one hand while on the other hand their mathematics skills can greatly be improved by using Fun Learn kids’ games. Usually kids go more for playing games that make them feel entertained and are easy to play. This game will not only entertain the kids but will also make them learn unintentionally that makes it less boring than normal learning. The game would comprise of three basic games related to Math’s learning. Score for a user will increase for every correct answer. The project adds some interesting design techniques to the levels which makes it even more attractive for kids to increment their urge to play it and quench their thirst through it.
Shafiq ur Rehman

A Compressive Sensing Detection Approach Based on Spectral Kurtosis for Frequency Hopping Signal

Abstract
In order to determine the component of frequency hop, this paper taking the advantage of Compressive Sensing (CS) for sparse signal in frequency domain. Spectral kurosis is firstly calculated to identify peak locations which represent hopping frequency. Then the most optimal peaks are selected by applying Compressive Sensing Match Pursuit (CoSaMP) algorithm to overcome noise uncertainty. The hop time finally obtained from the residual between the given signal and the estimated one. The experiment results show that the system performs effectively even when SNR values are below -10dB, the presented approach can be effectively detect the hopping time. Compare to other conventional approaches, our proposed method is appropriate for lower and more widely varying SNR, reduces considerably the complexity.
Chenlin Hu, Jin Young Kim, Hyoung-Gook Kim, Chang-Joo Kim

Packet Loss Concealment for Improving Audio Streaming Service

Abstract
In this paper, we propose packet loss concealment for improving audio streaming service. Our approach is based on a concealment of lost packets and adaptive playout-buffer scheduling using active jitter estimation. The experimental results show that the proposed method enables users to deliver higher quality music.
Jun-Yong Lee, Hyoung-Gook Kim, Jin Young Kim

Secure IP Mobility Support in Software Defined Networks

Abstract
With the proliferation of mobile device and applications, a large number of mobility management solutions have been proposed to support mobility in IP networks. Mobile IP and its derivatives are basically network layer solutions for terminal mobility problems. However, there are several shortages in those solutions, such as large overhead, high latency, lack of scalability and weak security. Software Defined Networking (SDN) provides a flexible centralized approach to handle mobility in IP networks. In this paper, we propose a network based secure mobility management architecture. SDN controller manages the mobility with full authority and controls OpenFlow Switches to forward packets for mobile nodes in optimal path. The implementation and test results show a better delay and throughput performance during the handover process.
Shimin Sun, Li Han, Sunyoung Han

A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks

Abstract
This paper comprehensively analyzes the impact of security attacks on the performance of both proactive (OLSR, DSDV) and reactive (AODV, DSR) MANETs routing protocols. The analysis is provided in terms of performance metrics, such as average end-to-end delay, packet delivery ratio, and normalized routing load. Simulations are setup in NS-2 and performance of these routing protocols is discussed under gray-hole and black-hole attacks. Our finding shows that these protocols are designed without considering security aspects, as result, performance of these protocols degrades significantly under attacks.
Muhammad Saleem Khan, Qasim Khan Jadoon, Majid I. Khan

Enhanced Speaker Verification Using GMM-Supervector Based Modified Adaptive GMM Training

Abstract
In this paper, an enhanced speaker verification is proposed by exploring a novel modified adaptive Gaussian mixture model (GMM) training. Based weight factor of observation called the observation reliability; we propose to apply a modified Expectation maximization (EM) algorithm, combined with a modified Maximum a posteriori (MAP) estimation to train the modified adaptive GMM model. Using this proposed model, we generate GMM-supervectors which are combined with SVM for verification task. We evaluate performance of speaker verification system based the proposed approaches on utterances from Korean movie database (“You came from the stars”). Experimental results demonstrate that our proposed approaches can outperform the standard GMM-UBM and GMM-supervector approaches in noise conditions.
Tan Dat Trinh, Min Kyung Park, Jin Young Kim, Kyong Rok Lee, Keeseong Cho

Fit Buddy: A Mobile Application for Fitness Tracking Using the Always-On Low-Power Sensor

Abstract
This paper presents an always-on and always accessible mobile application, namely Fit Buddy, which will help users track their personal fitness statistics. The application focuses on step counting from both walking and running using a smartphone. The Fit Buddy can be linked to a user’s social media account and rank the user’s fitness data compared with those of friends who are on the same social network. By utilizing SensorCore data from a smartphone, user’s daily steps, active time and location can be tracked and recorded without the need for human interaction because of the always-on aspect of the application. Users also have immediate access to the history data. The Fit Buddy makes personalized daily goals easier to commit and achieve. It gives the users a simple and effective method of motivation to do more exercise.
Kasidit Wijitsopon, Chavalit Panichayanubal, Pusadee Seresangtakul

Firenzina: Porting a Chess Engine to Android

Abstract
We have ported an open-source chess engine to Android using the Native Development Kit (NDK), tested it against other engines, and played against it ourselves. The porting process revealed a number of challenges and insights, some of which may be similar across other mobile application ports, while others are likely unique to chess. We found that few changes were needed to have a working engine, and that the architecture of chess engines based on the universal chess interface (UCI) protocol enabled quick adoption of an advanced user interface. We also found that the native development experience made it difficult to find the path to a complete solution requiring relatively minor changes. In this paper, we present our solutions, along with observations about the porting process in the context of the UCI-based chess engine architecture. We believe that these observations will be of interest to developers of other applications as well.
Corey Abshire, Dmitri Gusev

SPEARS: Smart Phone Emergency and Accident Reporting System Using Social Network Service and Dijkstra’s Algorithm on Android

Abstract
This paper presents research results on an efficient tool for emergency and accident reporting on Android smart phones with social network services. We have developed a location-aware Smart Phone Emergency and Accident Reporting System (SPEARS) for Facebook and Twitter users including agencies responsible for handling emergency situations and accidents. Agencies (e.g., police, fire departments, and hospitals) can store their locations via SPEARS, so that users involved in an emergency situation can retrieve the shortest path from the point of alert to the point of care, e.g. a hospital. On the other hand, agencies can retrieve the current location of the emergency via GPS and send help immediately. The shortest path is calculated by applying an improved Dijkstra’s algorithm and displayed on Google maps in appropriate scaling. Moreover, SPEARS supports the collection and statistical presentation of emergency and accident data for further analysis.
Chakkrit Snae Namahoot, Michael Brückner

Descubre PUCP: Mobile App to Improve Academic Experience Inside Campus

Abstract
Descubre PUCP is a project developed and implemented in the Pontificia Universidad Católica del Perú whose objective is the improvement and extension of academic experience in college outside the classroom. To achieve this, Descubre PUCP marks each place in campus as a point of interest, showing its location using an augmented reality interface or a Google Map, adding relevant information for each one. This information includes static data (descriptions, photos, telephone numbers and mail contact) and dynamic data (in real time), interacting with different services and applications of PUCP such as events about to start in the auditoriums, free computers in the laboratories, the dishes to be served in the cafeteria, the streaming transmission available in different congresses or seminars in the campus and also explaining how to get to these places.
Pedro Jesús Carrión Castagnola, Natalí Flores-Lafosse, Albert Díaz-Mauricio

Localizing a Flying Object on Target Place Using Heterogeneous Binary Sensors

Abstract
In this paper, we propose a spatial and temporal flying target detection method using different types of sensors. By combining the sensors, we can discover the hit time and location more precisely. We designed ta system composition in consideration of protecting sensor system, and implemented a working prototype. In the experiments, we demonstrate its performance depending on the processing module and the accuracy.
Hyunyoung Kim, Changhee Cho, Jisu Kim, Sanghyun Park, Jinsul Kim, Kuinam J. Kim

Biometric Authentication Technology Trends in Smart Device Environment

Abstract
In a computing environment, Authentication is one of the most important techniques. ID/Password scheme which is currently the most widely used authentication methods is easy to implement and the scheme have the advantage of low cost, etc., but there are many issues from a safety. OTP(One Time Password) is characterized in that a disadvantage in usability, on the other hand, with a number of advantages for security. Among these recent years, Biometric authentication is attracting attention as the spread of smart device equipped with a biometric smart sensor. In this article, we will analyze the limit of knowledge-based authentication and possession-based authentication and the prospect of a biometric authentication technology. And we will analyze the FIDO protocol that provides a user authentication function using a biometric technique that is used by the smart devices in the online environment.
HyunJin Kim, JunHoo Park, JangYong Lee, JaeCheol Ryou

SLAN Based User-Customized Cloud Interface Sharing for Smart Mobile Devices

Abstract
Recently, the keyboard interfaces variously have been provided such as the hardware interface and the software interface. With smart mobile devices is supported with some software interfaces, but the number of interfaces are limited. This paper proposes an idea to provide dynamic interface for keyboard interface of smart mobile devices. The users can create their own interfaces or use the interfaces which are provided by server. We also propose SLAN communication, that help the interfaces can be easily shared between mobile devices. The user’s IP or unique device name without knowing 1:1 or 1: N communication can be shared. Using SLAN to transmit the interface between smart mobile devices more quickly, efficiently than telecommunication that was used previously, and this is demonstrated through experiments.
Sanghyun Park, Jisu Kim, Jinsul Kim

Backmatter

Weitere Informationen