M2M-Based Service Coverage for Mobile Users in Post-Emergency Environments

被引:8
|
作者
Surobhi, Nusrat Ahmed [1 ]
Jamalipour, Abbas [1 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
关键词
Ad hoc network; machine-to-machine (M2M) network; mobility prediction; post-emergency mobility; service coverage; HOC; MODEL;
D O I
10.1109/TVT.2014.2299754
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In an infrastructure-based wireless network, including mobile users and vehicles, many crucial and important services are provisioned by a centralized server. However, due to damaged infrastructure and increased mobility caused by an emergency, maintaining continuous service coverage in such a network can be challenging. Although several prediction-based replication methods have been proposed to achieve service coverage through replication of the central server, they are unable to accurately predict future topological changes and thus maintain service coverage in a post-emergency network. These topological changes are, in fact, directly related to user mobility. Nevertheless, existing mobility models are unable to realistically represent post-emergency user movements. Consequently, at first, this paper proposes a realistic mobility model that includes users' post-emergency complex behavioral changes. Subsequently, this paper proposes a machine-to-machine (M2M) networking-based service coverage framework for post-emergency environments. The proposed framework performs not only accurate prediction of the proposed user mobility but also optimal replication, utilizing these predictions, of the central server to achieve continuous service coverage. In addition, the framework requires no supervision and fewer resources to perform these functions due to use of the M2M networking. Simulation results are further used to verify the effectiveness of proposals presented in this paper.
引用
收藏
页码:3294 / 3303
页数:10
相关论文
共 50 条
  • [31] M2TA-Mobile Mouse Touchscreen Accessible for Users with Motor Disabilities
    Facanha, Agebson Rocha
    Carneiro Araujo, Maria da Conceicao
    Viana, Windson
    Sanchez, Jaime
    UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: METHODS, TECHNOLOGIES, AND USERS, UAHCI 2018, PT I, 2018, 10907 : 273 - 286
  • [32] MECM2M: An MEC Based M2M System Considering Mobile Nodes as Compute Servers
    Sawada, Rempei
    Takano, Haruto
    Mori, Kosuke
    Teraoka, Fumio
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 765 - 775
  • [33] A mobile-based emergency response system for intelligent m-government services
    Amailef, Khaled
    Lu, Jie
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2011, 24 (04) : 338 - +
  • [34] Trusted, Decentralized and Blockchain-Based M2M Application Service Provision
    Shala, Besfort
    Trick, Ulrich
    Lehmann, Armin
    Ghita, Bogdan
    Shiaeles, Stavros
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2020, 97 : 210 - 221
  • [35] A Service Characteristics Based Queue Management Method on Access of Capillary M2M
    Youm, Sungkwan
    Moon, Sukhwan
    ADVANCED SCIENCE LETTERS, 2016, 22 (11) : 3404 - 3408
  • [36] An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals
    Shi, Congcong
    Du, Miao
    Lu, Weidong
    Lu, Sanglu
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [37] A M2M Network-Based Realistic Mobile User Movement Prediction in Emergencies
    Surobhi, Nusrat Ahmed
    Jamalipour, Abbas
    6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [38] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
  • [39] IOCD-based Semantic Enablement for Service-oriented M2M Architecture
    Li, Yan
    Hu, Xuemei
    Zhang, Yulin
    Mohammed, Abdul-Wahid
    Xu, Yang
    2015 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY (WI-IAT), VOL 1, 2015, : 157 - 160
  • [40] ABS Scheduling Technique for Interference Mitigation of M2M Based Medical WBAN Service
    Park, Roy C.
    Jung, Hoill
    Jo, Sun-Moon
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2685 - 2700