Top Downloads

5G Technology: An Overview of Applications, Prospects, Challenges and Beyond

Maryam Fizza, Munam Ali Shah

Abstract

This paper provides a comprehensive overview of an emerging mobile wireless communication technology, i.e., 5G. We provide a concise view of the advancements which are currently being investigated to deploy 5G wireless technology in an effective and beneficial way. We aim to provide an easy and state of the art view of architectures, applications and challenges of the 5G technology. We group existing approaches and provide a critical overview of the underlying details adapted by the 5G technology.

Read More...

Smart Cities: Challenges and Beyond

Muhammad Hassan Raza, Munam Ali Shah, Muhammad Kamran Abbasi

Abstract

A smart city is an interconnection of objects in which each object plays a role of a source node. The data and information is collected from the source node for further computation and communication. A city can only be called a smart city if certain attributes are available such as clean water, good transport, energy efficiency, well-structured infrastructure, Internet of Things (IoT), mobile health (m-health), and Information and Communication Technologies (ICT). In this paper, we provide a comprehensive overview of the things that form a smart city. We focus on applications and technologies and identify different challenges in a smart city. Furthermore, the critical evaluation of different standards, architectures and frameworks form part of the paper. 

Read More...

Analysis of Embedded Web Resources in Web of Things

Muhammad Nazim, Munam Ali Shah, Muhammad Kamran Abbasi

Abstract

It is estimated that 42 million devices are currently connected to the Internet. These devices are accessible to a web interface through which a user can easily connect and utilize these devices by a simple Internet web browser forming a Web of Things (WoT). The connectivity of millions of devices through WoT has eliminated the need of a proprietary or control software. In this paper, we investigate these web services and analyze web embedded devices and related services in WoT. We aim to provide an easy and concise view of the underlying WoT model adapted by each approach.

Read More...

Privacy-Preserving in Collaborative Working Environments

Wajeeha Naeem, Munam Ali Shah, Ahmad Kamran Malik

Abstract

A Collaborative Working Environment (CWE) requires information sharing but at the same time users’ privacy is another important requisite. In order to perform collaborative tasks efficiently, a user requires sharing of some of his information with other collaborating users. To manage the sharing and privacy issues effectively, we need to extend NIST standard Role-Based Access Control (RBAC) model. This will help users in order to allow them to specify their own rules that can be dynamically adapted at run time. There are some other models which are introduced to enhance collaborative sharing and improving privacy of users’ information such as Team-based Access Control (TMAC) Model and Extended RBAC Model which is an enhancement of core RBAC model. In this paper, these aforementioned models, which are related to sharing and privacy preservation, are discussed and after their implementation, they are compared and evaluated using privacy, sharing and rule based metrics.

Read More...

Ad hoc and Opportunistic Routing in Static Scatternet Environment

Sardar Kashif Ashraf Khan, Jonathan Loo, Muhammad Adeel, Muhammad Awais Azam

Abstract

Peer-to-peer connectivity between mobile phones using technologies such as Bluetooth has given a new dimension to the mobile communication. Peers through the help of various underlying protocols can form piconets and scatternets to transparently communicate the content across the network. There however are issues like reliability in communication, delay and the cost of communication that need to be considered before resorting to this form of communication. This paper presents a study where opportunistic concept such as Bubble Rap is tested in Bluetooth ad hoc networking environment. The notion behind this research is to study the properties of these two networking environments, since opportunistic networks are derived from ad hoc networks. Thus, study of these two different environments yet related to each other may help us find new ways of message forwarding in Bluetooth communication environment. This paper is aimed at investigating the behaviour of nodes present in Bluetooth static scatternet environment by 1) studying message transfer from a source to destination using traditional ad hoc communication protocols such as AODV and 2) message transfer using opportunistic algorithms such as Bubble Rap on top of traditional ad hoc communication. This paper also proposes a concept of ranking to transfer messages to the node that has higher social centrality ranking compared to the current node. Nodes with varying social ranking are allowed to join piconets and forward messages based on Bubble Rap concept in scatternet environment. In BR algorithm, nodes forward messages to only those encountering nodes which are more popular than the current node.

Read More...

Development of Postpaid and Prepaid Billing System for ISPs

Azhar-ud-din, Ali Javed, Ayesha Hanif, M. Awais Azam, Tasawer Hussain

Abstract

ISPs generally provide two types of connections to their customers, varying primarily in payment options: postpaid and prepaid connections. In recent years, with the rapid development of broadband industry in third-world countries like Pakistan, it has become possible to meet the ever growing demands of internet users. Prepaid connections offered by ISPs continue to satisfy customer demands as the packages are skillfully tailored to meet growing demands of rapid connectivity without hassle of equipment installment time, serve customer’s mobility needs of accessing internet at more than one location, offer flexible rate packages for day and night timings and meet limited duration connectivity needs of tourists etc. Postpaid ISP billing solutions available in market are expensive and yet they fail to fulfill all of users’ requirements; specifically the mobility need. Now ISPs are keen in developing their own billing systems instead of buying non-customized applications from vendors. Most ISPs use AAA protocol for Authentication, Authorization and Accounting of their customers. For this feature, FreeRADIUS is the most widely deployed RADIUS server in the world, not only because it is an open source implementation of AAA but also because of its multitude of strengths. In this paper we explore these strengths and then propose a methodology of developing an ISP’s own pre-paid billing system using freeRADIUS. 

Read More...

On Propagation of Generic and Real-World Mobile Malware

Muhammad Adeel, Laurissa N Tokarchuk, S K A Khan, Muhammad Awais Azam

Abstract

Mobile malware has surfaced as a key challenge in recent years. With four hundred distinct types of mobile malware and approximately twelve hundred of their variants discovered to-date, there is a growing need of propagation analysis of mobile malware families to preempt the future malware threats and strategies. This paper provides an analysis of generic and real-world mobile malware to not only investigate their propagation capabilities but to also explore their implications on network and mobile resources.

Read More...

Social Aspectsof 3G/4G Cellular Network Deployment in Pakistan

Sardar Aadilur Rehman, Munam Ali Shah, Sijing Zhang

Abstract

The smartphone looks the most appropriate communications technology in today's global world. Through this, people can connect to other people for different purposes, e.g., business, commerce, social networking and education etc. The success story of 2nd Generation of wireless mobile communication has been tremendous in Pakistan. The recently launched 3G and 4G cellular technologies in the country offer higher data rates and more connectivity options. In this paper, our contribution is two-fold. Firstly, we investigate the social impacts of 3G/4G cellular networks in Pakistan. Secondly, we conduct a survey about the appropriateness of the technology in the country from social aspects. The survey reveals some interesting results which could be used by service providers and policy makers to make the 3G/4G experience more beneficial. 

Read More...

Cloud Forensics: A Discussion on Open Problems and State-of-the-Art Approaches

Rahat Masood, Muazzam Maqsood, Anam Mustaqeem, Muhammad Awais Azam

Abstract

The emergence of highly distributed and complex systems raises new challenges for investigators and researchers which strongly need to be catered by linking the ground make up of digital forensic with the requirements and concepts of newly introduced systems and environments such as Cloud Computing. Several challenges exist when investigations are made in a Cloud because of the scope, and diversity of the data to be investigated along with the best investigatory practices that are evolving towards increased stringency as well. Therefore, this paper serves to highlight a number of research challenges which need to be addressed in support of forensic investigations in cloud environments. The paper also discusses state-of-the-art cloud forensic solutions which have been proposed to address the forensic issues in a Cloud. Through this paper, we also suggest some potential solutions in order to give better future prospects and to overcome these challenges. 

Read More...

Clustering Based Packet Scheduling Adaptive to the Network Load in LTE-Advanced Networks

R. Kausar, Y. Chen, K. K. Chai

Abstract

This paper investigates authors’ previously proposed novel clustering based packet scheduling algorithm for the downlink transmission of LTE-Advanced networks, under variable network conditions. Numerous simulations are run to investigate the performance and validity of this algorithm under different network scenarios such as equal number of real time and non-real time users, real time users more than non-real time users and vice versa. Under each scenario, the total number of users is also varied to validate the algorithm both for different network scenarios and for the variable overall network load. The key performance indicators are average delay, the delay viability and packet drop rate of real time users, minimum throughput of non-real time users, and system throughput and fairness among users. The simulation results show that the algorithm maintains the service level and system level performance under each network scenario and variable network load. 

Read More...

Distributed Cluster Computing: An Analysis to Overcome the Limitations

Waleed Rafique, Munam Ali Shah

Abstract

The distributed cluster computing environments have many advantages over the normal clusters. One of the best features of distributed clusters is their mobility. This means we can use a distributed cluster over a wireless sensor networks or radio waves. There are certain limitations of a distributed cluster which affect the performance. In this paper, we review the literature to identify the limitations and solutions of distributed clusters on different parameters such as security, overheads of selection of a cluster head, and node discovery. We provide a performance evaluation and comparison of the proposed solutions. 

Read More...

Small Language for Service Oriented Computing

Arsalan Ahmed

Abstract

Due to increase in demand of computation, the service oriented architecture becomes one of the most popular solutions adopted by the business community. Service oriented architecture however is based on the concept of distributed process which may lead to various problems including the partial completion of a process being the most critical. Reliability in SOA implies that if one sub-process from among the set of processes fails, the whole transaction should fail/be put to a halt. On application level, this concept has been implemented through EJB containers managed transactions which uses attributes to define the scope of transactions. ATc gets inspiration from EJB to implement this idea in SOA /SOC. In this paper we propose an interpreter for ATc that comprises of a programming language devised for experimenting the reconfiguration of a service and its changing behavior with a transaction scope. The language features implementation of semantics of processes, services and its testing system. Since ATc is extension of Pi calculus, thus the syntax of ATc language is in Pi calculus notation.

Read More...

IOARP EDITORIAL SYSTEM

IES is a comprehensive web-based software designed exclusively to manage the review process for conferences, journals, and books.

Visit Website >

GLOBAL DIGITAL LIBRARY

Global Digital Library provides an opportunity to the researchers to access high-quality content published in our conferences, journals, and books. 

Visit Website >

LATEST RESEARCH NEWS

Our dedicated team researches through thousands of scholarly articles, blogs, and technology magazines to publish cutting-edge research in your field of interest. 

Read Research News >

IOARP NEWSLETTER

We publish a monthly newsletter to keep our readers posted about IOARP activities, information on products and services, and benefits of publishing with us.

Read Newsletter >

IOARP RESEARCH BLOG

Renowned researchers in academia and industry publish their blogs with IOARP on cutting-edge research, recent innovations, and novel research directions in different domains.

Read Research Blog >

IOARP Shop

Use our e-shop to purchase a wide range of products, pay for our services, or to access offers and discounts available across multiple IOARP websites.

Visit IOARP Shop >