{"title":"Copyright","authors":"","doi":"10.1109/mass50613.2020.00003","DOIUrl":"https://doi.org/10.1109/mass50613.2020.00003","url":null,"abstract":"","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126622792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Garcia-Luna-Aceves, Dylan Cirimelli-Low, N. Mashhadi
{"title":"ALOHA with Queue Sharing","authors":"J. Garcia-Luna-Aceves, Dylan Cirimelli-Low, N. Mashhadi","doi":"10.1109/MASS50613.2020.00031","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00031","url":null,"abstract":"ALOHA with Queue Sharing (ALOHA-QS) maintains most of the simplicity of ALOHA with priority acknowledgments (ACK) and attains the high throughput of transmission scheduling methods that require clock synchronization. Channel access with ALOHA-QS consists of a sequence of queue cycles, with each cycle having one or multiple collision-free transmissions by nodes that have joined the transmission queue and a single request turn to join the queue. The signaling of ALOHA-QS entails adding to packet headers the size of the shared queue, the position of the sending node in the queue, a bit indicating the end of transmissions by the transmitting node, and a bit stating whether or not a new node joined the queue successfully. The throughput of ALOHA-QS is compared with the throughput of TDMA with a fixed transmission schedule, ALOHA with priority ACK’s, and CSMA with priority ACK’s analytically and by simulation.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain meets IoT: A Scalable Architecture for Security and Maintenance","authors":"Vidushi Agarwal, Sujata Pal","doi":"10.1109/MASS50613.2020.00017","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00017","url":null,"abstract":"Internet of Things, delineated as a network of connected heterogeneous devices is emerging as a widely adopted technology in almost all walks of life today. The massive increase in the number of IoT devices has introduced several issues related to security and management. Blockchains can be a promising technology to make IoT systems secure and distributed for the time to come. However, current blockchain systems are not capable of scaling in accordance to the huge IoT data without a loss in speed and time efficiency. Therefore, we use the concept of sidechains and offline data storage to alleviate the scalability issue of blockchains. In this work, we propose an architectural framework for the security and maintenance of IoT systems using blockchain technology. Smart contracts are used to enforce data authentication, authorization, and keep track of all the activities. Extensive simulation and analysis results demonstrate that the proposed blockchain architecture is highly scalable (in terms of average latency, throughput and cost) and can be applied efficiently in the IoT system.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122973228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Wireless real-time Communication in Mobile Wearable Applications","authors":"Sven Pullwitt, J. Morgenroth, L. Wolf","doi":"10.1109/MASS50613.2020.00052","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00052","url":null,"abstract":"Many wearable applications utilize wireless communication to provide the user with comfort features. With a typically rather small consumer market using technologies in the ISM band is beneficial in order to be cost effective. Safety relevant wearable applications, such as a wireless airbag jacket, face the challenge of providing real-time communication in noisy and volatile environments. In this evaluation we analyze different Wireless Body Area Network (WBAN) technologies with respect to their performance for real-time applications in mobile scenarios. The well established approach of using frequency diversity for increased reliability in noisy environments is evaluated for mobile scenarios.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124690967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Temperature-Aware Routing for IEEE 802.15.6 Based Wireless Body Area Networks","authors":"Beomsu Kim, Ki-Il Kim","doi":"10.1109/MASS50613.2020.00067","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00067","url":null,"abstract":"In wireless body area networks (WBANs), the routing layer has a unique challenge that needs to be addressed by novel temperature-aware routing mechanisms to minimize the increase in body temperature. However, existing temperatureaware routing studies do not consider the compatibility with the core functions of the MAC layer for routing support, such as a two-hop star topology extension or two-hop scheduled resource allocation. The lack of interaction with the MAC layer can lead to a poor performance or inaccurate performance evaluation. To solve this problem, in this paper, we outline the key functions for routing support defined in the IEEE 802.15.6 and design the new upper-layer components required for temperature-aware routing. Subsequently, we implement a simple temperature-aware routing protocol to compare the performance with previous studies. The simulation results prove that our approach can derive a practical routing performance in terms of delay, packet delivery ratio, and power consumption, among other factors.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"18 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message form the SLICE 2020 Workshop Chairs","authors":"Kavitha Kadarla, Ning Wang","doi":"10.1109/mass50613.2020.00007","DOIUrl":"https://doi.org/10.1109/mass50613.2020.00007","url":null,"abstract":"","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"97 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132477167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luyao Ye, Zezhong Wang, Xinhong Chen, Jianping Wang, Kui Wu, K. Lu
{"title":"GSAN: Graph Self-Attention Network for Interaction Measurement in Autonomous Driving","authors":"Luyao Ye, Zezhong Wang, Xinhong Chen, Jianping Wang, Kui Wu, K. Lu","doi":"10.1109/MASS50613.2020.00042","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00042","url":null,"abstract":"Modeling the interactions among vehicles has been considered essential in improving efficiency and safety in autonomous driving, since the real traffic scenarios, such as merging lanes, intersection, and lane change, are full of complex interactions. In the literature, interaction is considered implicitly in individual tasks, which makes it hard to extract the interactions for other related downstream tasks. In this paper, we propose a novel Graph Self-Attention Network (GSAN) to quickly capture and quantify the influence of interactions among vehicles from historical trajectories, which can be used as a tool to introduce the impact of interactions into different downstream tasks and further analyze the dominating features affecting the interactions among vehicles. We conduct experiments on the trajectory prediction task as one example to illustrate how to use the spatial-temporal interaction vector to improve the performance of interaction related tasks. The experiment results demonstrate that the GSAN module outperforms the state-of-the-art solutions in terms of the trajectory prediction accuracy. Also, we visualize the effects from all surrounding vehicles on the ego vehicle by heat maps using the trained attention values from the GSAN module.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Unified Trust Framework for Detecting IoT Device Attacks in Smart Homes","authors":"H. Alsheakh, Shameek Bhattacharjee","doi":"10.1109/MASS50613.2020.00080","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00080","url":null,"abstract":"Trust in Smart Home (SH) Internet of Things (IoT) technologies is a primary concern for consumers, which is preventing the widespread adoption of smart home services. Additionally, the variety of IoT devices and cyber attacks make it hard to build a generic attack detection framework for smart home IoT devices. In this paper, we present a roadmap towards building a unified approach towards establishing trust scores as an indicator of the security status of an IoT device in a smart home that works across multiple attacks and device types/protocols. Specifically, we first introduce artificial reasoning inspired evidence collection approach by introducing a small set of factors that are affected significantly if a smart home IoT device is under attack. Thereafter, we propose an explainable trust scoring model that maps the device level evidence into trust scores in a way that produces lower trust scores when devices are under attack. Specifically, the trust model involves an Augmented Bayesian Belief based Model embedded with novel non-linear weighing functions; explicitly designed to account for the severity of the attack, probabilistic discounting of parts of the evidence caused by benign changes, thus explaining our success. For evaluation of the framework, we use two real datasets that contain a variety of actual cyber-attacks and benign traffic from seven different smart home IoT devices. Our evaluation seeks to investigate the generality of our framework across multiple datasets, with various classes of IoT devices and cyber attacks.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"13 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zezheng Zhao, Chunqiu Xia, Lian Chi, XIAOMIN CHANG, Wei Li, Ting Yang, Albert Y. Zomaya
{"title":"An Adaptive Multi-objective Salp Swarm Algorithm for Efficient Demand Side Management","authors":"Zezheng Zhao, Chunqiu Xia, Lian Chi, XIAOMIN CHANG, Wei Li, Ting Yang, Albert Y. Zomaya","doi":"10.1109/MASS50613.2020.00044","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00044","url":null,"abstract":"With the continuous growth in population and energy demands more attention has been paid to energy consumption issues in residential environments. At the user-end, the home energy management system (HEMS) has been proposed as a cost-effective solution to reduce the electricity cost in households, while maintaining users’ comfort and reducing the pressure on energy providers. However, it is a challenge to design a cost-effective scheduling strategies for HEMS which takes many objectives into consideration while potentially benefiting both users and providers. In our work, we propose a new approach named adaptive multi-objective salp swarm algorithm (AMSSA) based on traditional multi-objective salp swarm algorithm (MSSA) to realise a multi-objective optimisation approach for the power scheduling problem. AMSSA not only fulfils the trade-off among users’ comfort, electricity cost and peak to average ratio (PAR), but also enhances the convergence speed for the overall optimisation process. Moreover, we also set up a testbed by using smart appliances and implemented our design on an edge-based energy management system. The experiment results demonstrated a reduction in both electricity cost (47.55%) and PAR (45.73%), compared with the case without a scheduling scheme.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reverse Auction-based Demand Response Program: A Truthful Mutually Beneficial Mechanism","authors":"A. R. Khamesi, S. Silvestri","doi":"10.1109/MASS50613.2020.00059","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00059","url":null,"abstract":"Matching power demand during peak load hours is a well-known problem in power systems. In fact, the cost of producing electricity increases very rapidly when the demand is high, due to the need for starting backup generators and enhancing transmission system. Incentive-based Demand Response (DR) program is a new approach, enabled by recent advances in smart grid technologies, designed to deal with such problem. According to DR, the utility company can provide economical incentives to users in order to temporarily reduce their energy consumption during peak hours. It is, however, challenging to determine the procedure to distribute such incentives, as well as to ensure that users will be sufficiently engaged and satisfied to make the DR program effective. In this paper, we propose a reverse auction mechanism to enable an incentive-based DR program. We formulate the DR reverse auction as an integer linear programming (ILP) problem, which integrates a perceived-value utility, to model the user perception of electrical appliances, as well as the financial objectives of the utility company. We adopt a Vickrey-Clarke-Groves (VCG) based reverse auction mechanism to guarantee the truthfulness and individual rationality properties. Since the VCG auction requires to optimally solve the NP-Hard ILP problem, we propose a heuristic algorithm named Reverse Auction DemAnd Response (RADAR), and prove that RADAR preserves truthfulness. Extensive simulations using real power consumption data of several homes show that RADAR is effective in reducing demand peaks while outperforming previous solutions in terms of users’ perceived utility.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115350332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}