mobile subscriber
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 1)

H-INDEX

6
(FIVE YEARS 0)

2021 ◽  
Vol 2131 (4) ◽  
pp. 042096
Author(s):  
D N Roenkov ◽  
P A Plekhanov

Abstract The research purposeis to develop an approach to assessing the reliability of a train radio communication channel based on the representation of a radio communication network in the form of a model that includes both traditional elements (various types of equipment, a wire channel) and a radio channel, which is proposed to be described by the availability of radio coverage, which varies depending on the location of the mobile subscriber. In the research methods of the theory of reliability, and, in particular, the assessment of the availability factor of the elements of the radio communication system and communication channels, dynamically changing during the movement of the mobile radio station. In addition, to assess the energy of radio channels, the theory of radio wave propagation was applied, including on the basis of industry recommendations for calculating radio communication networks of JSC Russian Railways. As result of the research, a method was proposed for assessing the dependence of the reliability of a train radio communication channel (in terms of readiness) on the track coordinate. In this case, the radio communication channel dynamically changes the composition of the elements when the mobile subscriber moves along the railway section. Simultaneously, for each point of the section, the calculation formula is also dynamically changed, which makes it possible to find the value of the readiness of the communication channel. The proposed approach allows to identify the sections of technological radio communication networks that are weakest from the point of view of communication reliability and take this information into account when planning work to improve the reliability of communication networks.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Chuan Yu ◽  
Shuhui Chen ◽  
Zhiping Cai

Phone number is a unique identity code of a mobile subscriber, which plays a more important role in the mobile social network life than another identification number IMSI. Unlike the IMSI, a mobile device never transmits its own phone number to the network side in the radio. However, the mobile network may send a user’s phone number to another mobile terminal when this user initiating a call or SMS service. Based on the above facts, with the help of an IMSI catcher and 2G man-in-the-middle attack, this paper implemented a practicable and effective phone number catcher prototype targeting at LTE mobile phones. We caught the LTE user’s phone number within a few seconds after the device camped on our rogue station. This paper intends to verify that mobile privacy is also quite vulnerable even in LTE networks as long as the legacy GSM still exists. Moreover, we demonstrated that anyone with basic programming skills and the knowledge of GSM/LTE specifications can easily build a phone number catcher using SDR tools and commercial off-the-shelf devices. Hence, we hope the operators worldwide can completely disable the GSM mobile networks in the areas covered by 3G and 4G networks as soon as possible to reduce the possibility of attacks on higher-generation cellular networks. Several potential countermeasures are also discussed to temporarily or permanently defend the attack.


The overall markets for SIM cards is massive and comparatively Stable. In fact, the amount of SIM cards shipped globally is forecast to extend a huge range and still increasing at once. So, increasing the bit field of MSIN(Mobile Subscriber Identification Number) is additionally an helpful choice to choose. however in present bit size of nine or ten (depends on the country) the MSIN have over trillion mixtures of obtainable numbers. In our proposed work we have a tendency to makes a group of home MNCs that are connects in usual, and Keeps record of attributes like ‘Signal Strength’, ‘Internet Speed’, ‘Call drop. After that, Orders or sorts the set of MNCs as per any alternative of those attributes, then selects the most effective result for home MNCs each time and Updates the database contiguously.As the population is increasing of the globe and additionally there is no any regulation or an individual is not restricted to use just one SIM card so, it would be a secure possibility for future use.


Author(s):  
Gopalan M. ◽  
Marthandan G. ◽  
Eswaran C.

IEEE 802.16e is extensively used these days for both data and voice communications as it makes available high-speed wireless access. However, in view of the fact that mobile subscriber stations are powered by a limited capacity battery, power saving mechanism is necessary to improve network performance. In this article, the authors introduce a load based sleep scheduling mechanism with reduced state transitions for IEEE 802.16e Networks. The mechanism encompasses two phases, load-based sleep scheduling and a reduced state transition (RST) algorithm. Considering network load information, the Base Station (BS) assigns a sleep window size for each mobile subscriber station (MS). The proposed RST algorithm reduces the number of state transitions between sleep and active mode by watchfully combining any two adjacent active bands. Further, the technique considers network load and delay as QoS metrics. Through simulation results, the authors prove the proficiency of their mechanism.


2018 ◽  
Vol 6 (3) ◽  
pp. 245-262
Author(s):  
Silke Holtmanns ◽  
Ian Oliver ◽  
Yoan Miche ◽  
◽  
◽  
...  
Keyword(s):  

Author(s):  
Piers O'Hanlon ◽  
Ravishankar Borgaonkar ◽  
Lucca Hirschi
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document