Learn More
Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of(More)
Mobile Ad hoc Networks (MANETs) have opened a new window for fresh ideas and thoughts to be converted to reality and to assist in making better use of mobile communication implemented with mobility models. For instance, Vehicular Ad hoc Networks (VANETs), a subset of MANETs, is used in vehicular connectivity such as Car-to-Car and Car-to-Internet and(More)
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an(More)
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons(More)
Since mobile device technology has emerged, users expect to experience more convenience and higher safety in Vehicular Ad Hoc Networks (VANETs). VANETs comprise a special subclass of Mobile Ad Hoc Networks (MANETs). The topology frequently changes, encountering frequent disconnection. Hence, designing a feasible routing protocol is challenging. Such(More)
access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
The advance in wireless technologies and portable devices such as smart phones has made the Wireless Local Area Networks (WLANs) popular in the recent years. Nowadays, WLANs have become widely accepted in both private and public sectors due to ease of installation, reasonable prices and high data rates that can support real time applications. However, fast(More)
Mobile Nodes (MN) in Mobile IPv6 (MIPv6) are given the opportunity to eliminate triangle routing that is inefficient with their own corresponding node (CN) using Route Optimisation (RO). This greatly improves the performance of the network. Unfortunately, using this method allows several security vulnerabilities to manifest itself with the MIPv6. Among(More)
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. As it is publicly available the security mechanisms are of highly concern. In this(More)