Learn More
—Smartphones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smartphones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the cloud computing technology offers virtually unlimited dynamic resources(More)
Mobile cloud computing presents an effective solution to overcome smartphone constraints, such as limited computational power, storage, and energy. As the traditional mobile application development models do not support computation offloading, mobile cloud computing requires novel application development models that can facilitate the development of cloud(More)
SUMMARY This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled routing (PCR) and its enhanced version, i.e. enhanced power-controlled routing (EPCR). In both the protocols, fixed transmission power is employed in the clustering phase but when ordinary nodes are about to send their data to their respective(More)
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the security of(More)
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, manager-based(More)
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computationally(More)
Cloud computing is gaining popularity due to virtually unlimited resources, low capital cost, ease of adoption, flexible resource provisioning, and high scalability. Considering these benefits, researchers envision the usage of cloud computing for mobile devices to overcome the ever-increasing computational and energy demands of smartphone applications.(More)
This paper presents comparison of different hierarchical (position and non-position based) protocols with respect to different mobility models. Previous work mainly focuses on static networks or at most a single mobility model. Using only one mobility model may not predict the behavior of routing protocol accurately. Simulation results show that mobility(More)
Network simulation is the most useful and common methodology used to evaluate different network to-pologies without real world implementation. Network simulators are widely used by the research community to evaluate new theories and hypotheses. There are a number of network simulators, for instance, ns-2, ns-3, OMNET++, SWAN, OPNET, Jist, and GloMoSiM etc.(More)