SCIENTIA SINICA Informationis, Volume 45, Issue 1: 45-69(2015) https://doi.org/10.1360/N112014-00277

Key techniques for Mobile Internet: a survey

More info
  • AcceptedNov 10, 2014
  • PublishedJan 20, 2015


The Mobile Internet is an integrated product of the traditional internet and mobile communications, and represents one of the most rapidly growing IT elds for the current and a long period of time. However, data show that the global mobile internet is still in its infancy, there exist many problems to be solved and clari ed. This paper rst outlines the basic concept of the mobile internet, including its de nition, features, and architecture. Then, based on the current architecture, we discussed in detail the research status, problems, and solutions of its various components, including mobile terminals, access network, applications and services, as well as security and privacy. Finally, future research and development trends of cloud computing were discussed.


[1] Morgan Stanley. Mobile Internet Research Report. 2009. Google Scholar

[2] Luo J Z, Wu W J, Yang M. Terminal devices, networks and services. Chin J Comput, 2011, 34: 2029-2051 [罗军舟, 吴文甲, 杨明. 移动互联网: 终端, 网络与服务. 计算机学报: 2011, 34: 2029-2051]. Google Scholar

[3] Shi S. Research on the key technologies of secure authentication and applications in the Mobile Internet. Dissertation for Ph.D. Degree. Beijing: Beijing University of Post & Telecommunications, 2012 [石莎. 移动互联网络安全认证及 安全应用中若干关键技术研究. 博士学位论文, 北京: 北京邮电大学, 2012]. Google Scholar

[4] Ericsson. Ericsson Traffic and Market Data Reports. 2013. Google Scholar

[5] Baidu. Baidu Mobile Internet Trends Report. 2014. Google Scholar

[6] CiscoVNI Mobile. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018. 2014. Google Scholar

[7] Chen F. Research on quality of experience oriented resource management in Mobile Internet. Dissertation for Ph.D. Degree. Hefei: University of Science and Technology of China, 2013 [陈锋. 面向用户体验的移动互联网资源管理研 究. 博士学位论文. 合肥: 中国科技大学, 2013]. Google Scholar

[8] Meeker M. 2014 Internet Trends. 2014. Google Scholar

[9] iResearch. Chinese Mobile Network Market Size is 1059.8 Billion in Year 2012. 2012 [艾瑞咨询: 2012 年中国移动互 联网市场规模为1059.8 亿. 2012]. Google Scholar

[10] Ministry of Industry and Information Technology and Telecommunications Research Institute. Mobile Internet White Paper, 2011. Google Scholar

[11] Zhang J Z, Meng X F. Research on mobile web search. J Softw, 2012, 23: 46-64 [张金增, 孟小峰. 移动Web 搜索研 究. 软件学报, 2012, 23: 46-64]. Google Scholar

[12] Hu W Q. Research on location management and multi-interface cooperation in Mobile Internet. Dissertation for Ph.D. Degree. Beijing: Beijing University of Post & Telecommunications, 2011 [胡渭琦. 移动互联网的位置管理和多接口 合作技术的研究. 博士学位论文. 北京: 北京邮电大学, 2011]. Google Scholar

[13] Liao J, Wang B B, Gao Y W. Research on the terminal development of Mobile Internet. Mobile Commun, 2012, 2:39-43 [廖军, 王蓓蓓, 高一维. 移动互联网终端发展研究. 移动通信, 2012, 2: 39-43]. Google Scholar

[14] Yang Y, Kuang Y F, Wei Q. Key technologies for the development of mobile applications. ZTE Commun Technol,2013, 19: 19-23 [杨勇, 邝宇锋, 魏骞. 移动互联网终端应用开发技术. 中兴通讯技术, 2013, 19: 19-23]. Google Scholar

[15] Lee H S, Kim T G, Choi J Y. A study on the factors affecting smart phone application acceptance. In: Proceedings of 3rd International Conference on e-Education, e-Business, e-Management and e-Learning, Hong Kong, 2012. 27-34. Google Scholar

[16] Song B, Lee C Y, Park Y T. Identifying critical factors for customer satisfaction in mobile application service: a semantic text mining and bayesian network approach. In: Proceedings of 2011 International Conference on Management and Service Science, Wuhan, 2011. Google Scholar

[17] Tian Y, Wang W D. Main networking technology in Mobile Internet. ZTE Commun Technol, 2013, 19: 13-18 [田野, 王文东. 移动互联网中的网络技术. 中兴通讯技术, 2013, 19: 13-18]. Google Scholar

[18] Zhang Y Z, Yuan L Y, Xu X. Application of personal recommendation in Mobile Internet service. Telecommun Sci,2012, 28: 27-31 [张玉忠, 袁立宇, 徐雄. 个性化推荐在移动互联网业务中的应用. 电信科学, 2012, 28: 27-31]. Google Scholar

[19] Zhang W, Zhu L. The business marketing model analysis based on user behavior of Mobile Internet services operators. Jiangsu Bus Talk, 2011, 9: 86-88 [张薇, 朱磊. 基于用户行为的移动互联网服务运营商业务营销模式研究. 江苏商 论-市场营销, 2011, 9: 86-88]. Google Scholar

[20] Li F, Liu Y, Guo L, et al. A server's perspective of internet streaming delivery to mobile devices. In: Proceedings of the INFOCOM, Orlando, 2012. 1332-1340. Google Scholar

[21] Ghosh A, Jana R, Ramawami V, et al. Modeling and characterization of large-scale wifi traffic in public hot-spots. In: Proceedings of the INFOCOM, Shanghai, 2011. 2921-2929. Google Scholar

[22] Shafiq M Z, Ji L, Liu A X, et al. Characterizing geospatial dynamics of application usage in a 3G cellular data network. In: Proceedings of the INFOCOM, Orlando, 2012. 1341-1349. Google Scholar

[23] Keralapura R, Nucci A, Zhang Z L, et al. Profiling users in a 3G network using hourglass co-clustering. In: Proceedings of the MobiCom, Chicago, 2010. 341-352. Google Scholar

[24] Chen T S, Chou Y S, Chen T C. Mining user movement behavior patterns in a mobile service environment. IEEE Trans Syst Man Cyber, 2012, 42: 87-101. Google Scholar

[25] Lu E H C, Lee W C, Tseng V S. A framework for personal mobile commerce pattern mining and prediction. IEEE Trans Knowl Data Eng, 2012, 24: 769-782. Google Scholar

[26] Zhao G F, Lai W J, Xu C, et al. Revealing service visit characteristics in Mobile Internet. Chin J Comput, 2013, 36:1388-1398 [赵国锋, 赖雯静, 徐川, 等. 移动互联网的业务访问特性. 计算机学报, 2013, 36: 1388-1398]. Google Scholar

[27] Zhu H. Network service mashup architecture and realization method based on the Mobile Internet environment. Mod Sci Technol Telecommun, 2011, 41: 34-38 [朱浩. 基于移动互联网环境的网络服务聚合体系架构和实现方法. 现代 电信科技, 2011, 41: 34-38]. Google Scholar

[28] Daniel F, Maristella M. Turning web applications into mashup components: issues, models, and solutions. In: Proceedings of ICWE 2009, San Sebastian, 2009. 45-60. Google Scholar

[29] Prach C, Korawit P, Takehiro T. Mobile Mashup Generator System for Cooperative Applications of Different Mobile Devices. Web Engineering. Berlin: Springer, 2011. 182-197. Google Scholar

[30] Yu J, Benatallah B, Casati F, et al. Understanding Mashup Development. Internet Comput, 2008, 12: 44-52. Google Scholar

[31] Zhang Y H. Key technologies research of next generation Mobile Internet based on use behavior. Dissertation for Ph.D. Degree. Changsha: Central South University, 2010 [张永晖. 基于用户行为的下一代移动互联网络若干关键 问题的研究. 博士学位论文. 长沙: 中南大学, 2010]. Google Scholar

[32] International Telecommunication Union. Definition of Quality of Experience. ITU-T Study Group, 2007. Google Scholar

[33] Hong Y. QoE modeling for Mobile Internet service. Dissertation for Ph.D. Degree. Beijing: Beijing University of Post & Telecommunications, 2012 [红叶. 基于移动互联网业务的QoE 建模与分析. 博士学位论文. 北京: 北京邮电大学,2012]. Google Scholar

[34] Chen D. Application of QoE assessment for data services in mobile network. Dissertation for Ph.D. Degree. Beijing: Beijing University of Post & Telecommunications, 2012 [陈邓. 移动互联网新型数据业务QoE 评价方法的研究. 博 士学位论文. 北京: 北京邮电大学, 2012]. Google Scholar

[35] International Telecommunication Union. Methods for Subjective Determination of Transmission Quality. ITU Recommendation P.800, 1996. Google Scholar

[36] Liu L Y, Zhou W A, Song J D. The research of quality of experience evaluation method in pervasive computing environment. In: Proceedings of 1st International Symposium on Pervasive Computing and Applications, Urumqi,2006. 178-182. Google Scholar

[37] Menkovski V, Oredope A, Liotta A, et al. Predicting quality of experience in multimedia streaming. In: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, New York, 2009. 52-59. Google Scholar

[38] Chen K T, Tu C C, Xiao W C. On click: a framework for measuring network quality of experience. In: Proceedings of INFOCOM 2009, Rio de Janeiro, 2009. 702-710. Google Scholar

[39] Shaikh J, Fiedler M, Collange D. Quality of experience from user and network perspectives. Ann Telecommun, 2010,65: 47-57. Google Scholar

[40] Kim I, Lee H L, Kim B, et al. On the use of linear programming for dynamic subchannel and bit allocation in multiuser OFDM. In: Proceedings of IEEE GLOBECOM, San Antonio, 2001. 3648-3652. Google Scholar

[41] Wong C Y, Cheng R S, Lataief K B, et al. Multiuser OFDM with adaptive subcarrier, bit and power allocation. IEEE J Sel Area Commun, 1999, 17: 1747-1758. Google Scholar

[42] Pietrzyk S, Janssen G J M. Multiuser subcarrier allocation for QoS provision in the OFDMA systems. In: Proceedings of VTC-2002 Fall, Vancouver, 2002. 1077-1081. Google Scholar

[43] Kivanc D, Li G, Liu H. Computationally efficient bandwidth allocation and power control for OFDMA. IEEE Trans Wirel Commun, 2003, 2: 1150-1158. Google Scholar

[44] Mohanram C, Bhashyam S. A sub-optimal joint subcarrier and power allocation algorithm for multiuser OFDM. IEEE Commun Lett, 2005, 9: 685-687. Google Scholar

[45] Jang J, Lee K B. Transmit power adaptation for multiuser OFDM systems. IEEE J Sel Area Commun, 2003, 21:171-178. Google Scholar

[46] Rhee W, Cioffi J M. Increase in capacity of multiuser OFDM system using dynamic subchannel allocation. In: Proceedings of VTC-2000, Tokyo, 2000. 1085-1089. Google Scholar

[47] Shen Z, Andrews J G, Evans B L. Optimal power allocation in multiuser OFDM systems. In: Proceedings of IEEE GLOBECOM'03, San Francisco, 2003. 337-341. Google Scholar

[48] Alen T C H, Madhukumar A S, Chin F. Capacity enhancement of a multi-user OFDM system using dynamic frequency allocation. IEEE Trans Broadcast, 2003, 49: 344-353. Google Scholar

[49] Zhang Y J, Letaief K B. Multiuser adaptive subcarrier-and-bit allocation with adaptive cell selection for OFDM systems. IEEE Trans Wirel Commun, 2004, 3: 1566-1575. Google Scholar

[50] Shen W, Zeng Q A. Cost-function-based network selection strategy in integrated wireless and mobile networks. IEEE Trans Veh Technol, 2008, 57: 3778-3788. Google Scholar

[51] Ormond O, Murphy J, Muntean G. Utility-based intelligent network selection in beyond 3G systems. In: Proceedings of ICC'06 IEEE International Conference on Communications, Istanbul, 2006. 1831-1836. Google Scholar

[52] Li Y H, Guo X L, Li Y S, et al. A utility-based network selection mechanism in heterogeneous wireless networks. In:Proceedings of International Conference on Wireless Networks and Information Systems, Shanghai, 2009. 201-204. Google Scholar

[53] Wang L S, Binet D. Mobility-based network selection scheme in heterogeneous wireless networks. In: Proceedings of VTC-Spring IEEE 69th Conference on Vehicular Technology, Barcelona, 2009. 1-5. Google Scholar

[54] Zong W. Research on node resource management of peer-to-peer streaming media in Mobile Internet. Dissertation for Master's Degree. Chongqing: Chongqing University, 2012 [宗伟. 移动互联网P2P 流媒体节点资源管理研究. 硕士 学位论文. 重庆: 重庆大学, 2012]. Google Scholar

[55] Ma L. Research on open service architecture for Mobile Internet and some key technologies. Dissertation for Ph.D. Degree. Beijing: Beijing University of Post & Telecommunications, 2013 [马琳. 面向移动互联网的开放服务技术架 构及若干关键技术研究. 博士学位论文. 北京: 北京邮电大学, 2013]. Google Scholar

[56] Cheng C, Zhang C H, Qiu X F. Security issues and countermeasures of Mobile Internet in the new wave. Telecommun Netw Technol, 2012, 3: 51-56 [成城, 张春红, 裘晓峰. 新浪潮下的移动互联网安全及对策. 电信网技术, 2012, 3:51-56]. Google Scholar

[57] Fang M W. Research on the security technologies of mobile smart terminal by using trusted computing. Dissertation for Ph.D. Degree. Wuhan: Central China University, 2012 [方明伟. 基于可信计算的移动智能终端安全技术研究. 博 士学位论文. 武汉: 华中科技大学, 2012]. Google Scholar

[58] Zhang X W, Chen S Q, Covington M J, et al. SecureBus: towards application-transparent trusted computing with mandatory access control. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, 2007. 117-126. Google Scholar

[59] Shi E, Perrig A, Van Doorn L. Bind: a fine-grained attestation service for secure distributed systems. In: Proceedings of 2005 IEEE Symposium on Security and Privacy, New York, 2005. 154-168. Google Scholar

[60] Sadeghi A R, Christian S, Norbert P. European multilateral secure computing base-open trusted computing for you and me. Datenschutz und Datensicherheit DuD, 2004, 28: 548-554. Google Scholar

[61] Garfinkel T, Pfaff B, Chow J, et al. Terra: a virtual machine-based platform for trusted computing. In: Proceedings of SOSP'03 the 19th ACM Symposium on Operating Systems Principles, New York, 2003. 193-206. Google Scholar

[62] Reiner S, Zhang X L, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, Berkeley, 2004. 223-238. Google Scholar

[63] Jaeger T, Sailer R, Shankar U. PRIMA: policy-reduced integrity measurement architecture. In: Proceedings of ACM Symposium on Access Control Models and Technologies, New York, 2006. 19-28. Google Scholar

[64] Yue R, Li H. Study of Mobile Internet security risk and end-to-end service security evaluation. Telecommun Sci, 2013,29: 74-79 [岳荣, 李洪. 探讨移动互联网安全风险及端到端的业务安全评估. 电信科学, 2013, 29: 74-79]. Google Scholar

[65] Zhao B, Zhang H G, Li J, et al. The system architecture and security structure of trusted PDA. Chin J Comput, 2010,33: 82-92 [赵波, 张焕国, 李晶, 等. 可信PDA 计算平台系统结构与安全机制. 计算机学报, 2010, 33: 82-92]. Google Scholar

[66] Kim M, Ju H, Kim Y, et al. Design and implementation of mobile trusted module for trusted mobile computing. IEEE Trans Consum Electron, 2010, 56: 134-140. Google Scholar

[67] Bugiel S, Ekberg J E. Implementing an application-specific credential platform using late-launched mobile trusted module. In: Proceedings of the 2010 ACM Workshop on Scalable Trusted Computing, New York, 2010. 21-30. Google Scholar

[68] Hu A Q, Li T, Xue M F. Security service technology for mobile networks. ZTE Technol J, 2011, 17: 21-26 [胡爱群, 李涛, 薛明富. 移动网络安全防护技术. 中兴通讯技术, 2011, 17: 21-26]. Google Scholar

[69] Tu J, Tian Z S, Zhou F. Design and implementation of secure terminal in Mobile Internet. Appl Electron Tech, 2013,39: 62-68 [涂静, 田增山, 周非. 移动互联网安全终端的设计与实现. 电子技术应用, 2013, 39: 62-68]. Google Scholar

[70] Ming F, Peng Y X. Security and strategy of Mobile Internet. Commun Technol, 2013, 46: 19-21 [明芳, 彭亚雄. 移动 互联网安全问题分析及策略. 通信技术, 2013, 46: 19-21]. Google Scholar

[71] Feng S, Min D. Security issues analysis of the Mobile Internet. In: Proceedings of the 2010 Information communication business development Seminar, Beijing, 2010. 77-83 [封莎, 闵栋. 移动互联网安全问题分析. 2010 信息通信技术业 务发展研讨会论文集. 2010. 77-83]. Google Scholar

[72] Guo Y C, Fang B X, Yin L H, et al. A security model for confidentiality and integrity in mobile computing. Chin J Comput, 2013, 36: 1424-1433 [郭云川, 方滨兴, 殷丽华, 等. 一种面向移动计算的机密性与完整性模型. 计算机学报, 2013, 36: 1424-1433]. Google Scholar

[73] Aldabbas H, Alwadan T, Janicke H, et al. Data confidentiality in mobile ad hoc networks. Int J Wirel Mobile Netw,2012, 4: 225-236. Google Scholar

[74] Hu H Y, Li Z J, Hu H, et al. Cooperative contents distribution in mobile social networks. Chin J Comput, 2013, 36:613-625 [胡海洋, 李忠金, 胡华, 等. 面向移动社交网络的协作式内容分发机制. 计算机学报, 2013, 36: 613-625]. Google Scholar

[75] Singh A, Ramakrishnan C R, Smolka S A. A process calculus for mobile ad hoc networks. Sci Comput Program, 2010,75: 440-469. Google Scholar

[76] Zhang X D, Zhang W A, Huang Z L. High-security identity authentication technology analysis in Mobile Internet. Telecommun Technol, 2012, 4: 36-39 [张湘东, 张文安, 黄泽龙. 移动互联网高安全身份认证技术分析. 电信技术,2012, 4: 36-39]. Google Scholar

[77] Zhou W N, Liu Y G. The technology and security issues in the development of Mobile Internet. Public Commun Sci Technol, 2012, 3: 183 [周卫宁, 刘友刚. 移动互联网发展技术与安全问题. 科技传播, 2012, 3: 183]. Google Scholar

[78] Li M, Cai Z G. Level security service model for capability open platform based on Mobile Internet. J Univ Electron Sci Technol China, 2013, 42: 289-294 [李敏, 蔡志光. 移动互联网能力开放平台的层次安全服务模型. 电子科技大 学学报, 2013, 42: 289-294]. Google Scholar

[79] Zheng W. Analysis and suggestions about Mobile Internet application security. Mod Sci Technol Telecommun, 2012,9: 27-32 [郑威. 移动互联网应用安全的问题分析与建议. 现代电信科技, 2012, 9: 27-32]. Google Scholar

[80] Yang X F. New business development model based on Mobile Internet service. Dissertation for Master Degree. Beijing: Beijing University of Post & Telecommunications, 2013 [杨晓芳. 基于移动互联网的新业务发展模式研究. 硕士学位 论文. 北京: 北京邮电大学, 2013]. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有