Show simple item record

dc.contributor.advisorAtiquzzaman, Mohammed
dc.creatorHossain, Shohrab
dc.date.accessioned2019-06-07T01:03:26Z
dc.date.available2019-06-07T01:03:26Z
dc.date.issued2012
dc.identifier9946039902042
dc.identifier.urihttps://hdl.handle.net/11244/320332
dc.description.abstractToday mobile computing has become a necessity and we are witnessing explosive growth in the number of mobile devices accessing the Internet. To facilitate continuous Internet connectivity for nodes and networks in motion, mobility protocols are required and they exchange various signaling messages with the mobility infrastructure for protocol operation. Proliferation in mobile computing has raised several research issues for the mobility protocols. First, it is essential to perform cost and scalability analysis of mobility protocols to find out their resource requirement to cope with future expansion. Secondly, mobility protocols have survivability issues and are vulnerable to security threats, since wireless communication media can be easily accessible to intruders. The third challenge in mobile computing is the protection of
dc.description.abstractsignaling messages against losses due to high bandwidth requirement
dc.description.abstractof multimedia in mobile environments. However, there is lack of existing works that focus on the quantitative analysis of cost, scalability, survivability and security of mobility protocols.
dc.description.abstractIn this dissertation, we have performed comprehensive evaluation of
dc.description.abstractmobility protocols. We have presented tools and methodologies required for the cost, scalability, survivability and security analysis of mobility
dc.description.abstractprotocols. We have proposed a dynamic scheduling algorithm to protect mobility signaling message against losses due to increased multimedia traffic in mobile environments and have also proposed a mobile network
dc.description.abstractarchitecture that aims at maximizing bandwidth utilization. The analysis presented in this work can help network engineers compare different mobility protocols quantitatively, thereby choose one that is reliable, secure, survivable and scalable.
dc.format.extent259 pages
dc.format.mediumapplication.pdf
dc.languageen_US
dc.relation.requiresAdobe Acrobat Reader
dc.subjectMobile communication systems
dc.subjectComputer network protocols
dc.titleSurvivability, Scalability and Security of Mobility Protocols
dc.typetext
dc.typedocument
dc.thesis.degreePh.D.
ou.groupCollege of Engineering::School of Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record