Michael Stocker, Bernhard Großwindhager, C. Boano, K. Römer
{"title":"Towards Secure and Scalable UWB-based Positioning Systems","authors":"Michael Stocker, Bernhard Großwindhager, C. Boano, K. Römer","doi":"10.1109/MASS50613.2020.00039","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00039","url":null,"abstract":"Positioning systems based on ultra-wideband (UWB) technology are becoming ubiquitous and enable a plethora of attractive Internet of Things applications, ranging from smart access and asset tracking to the navigation of autonomous vehicles. As these positioning systems are often deployed over large areas, the focus of UWB-based research has recently shifted to the development of scalable solutions that can offer a high positioning accuracy for countless tags while maximizing energyefficiency. At the same time, as positioning systems are increasingly used in safety-critical settings, several academic efforts and the standardization activities of the IEEE $802. 15.4 z$ working group have laid the foundations for a secure distance estimation using UWB technology. Unfortunately, these two endeavours have followed independent tracks that do not blend together. In this paper, we highlight this issue and describe the challenge of securing modern UWB-based positioning systems that are designed with scalability in mind. We first illustrate how the use of unidirectional communications, the need for synchronized anchors, and the use of quasi-simultaneous responses, which are common features of recent scalable UWB systems based on timedifference-of-arrival, make these solutions vulnerable to several attacks, despite the use of IEEE $802. 15.4 z$. After carrying out a security analysis and describing how scalable UWB systems are exposed to several attacks, we devise a number of design concepts to counteract the identified attacks and secure these systems.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offloading Federated Learning Task to Edge Computing with Trust Execution Environment","authors":"Shifu Dong, Deze Zeng, Lin Gu, Song Guo","doi":"10.1109/MASS50613.2020.00066","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00066","url":null,"abstract":"Federated Learning (FL) takes advantage of distributed data to jointly train a global deep learning model on many clients, without revealing local data to the central server for privacy guarantee. However, due to the heterogeneity of the FL clients, some poor performance clients may become stragglers, impeding the global training process. It is desirable to offload these stragglers’ tasks to some high performance servers, but this is at the risk of data privacy leakage. To mitigate such problem, we introduce the edge servers empowered by Trusted Execution Environment (TEE) to securely help the FL clients with poor performance. With the consideration of limited computation resource in TEE, we further investigate how to select the clients for help. Considering the time-varying processing capabilities on the FL clients, we propose an exploration-exploitation based client selection algorithm. Via evaluating our algorithm in a practical FL training task, the experiments show that the proposed algorithm indeed accelerate training process thanks to its efficient client selection.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiang Jin, X. Xing, Haroon Elahi, Guojun Wang, Hai Jiang
{"title":"A Malware Detection Approach Using Malware Images and Autoencoders","authors":"Xiang Jin, X. Xing, Haroon Elahi, Guojun Wang, Hai Jiang","doi":"10.1109/MASS50613.2020.00009","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00009","url":null,"abstract":"Most machine learning-based malware detection systems use various supervised learning methods to classify different instances of software as benign or malicious. This approach provides no information regarding the behavioral characteristics of malware. It also requires a large amount of training data and is prone to labeling difficulties and can reduce accuracy due to redundant training data. Therefore, we propose a malware detection method based on deep learning, which uses malware images and a set of autoencoders to detect malware. The method is to design an autoencoder to learn the functional characteristics of malware, and then to observe the reconstruction error of autoencoder to realize the classification and detection of malware and benign software. The proposed approach achieves 93% accuracy and comparatively better F1-score values while detecting malware and needs little training data when compared with traditional malware detection systems.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"821 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Energy-efficient Scheduling Algorithm for Renewable Energy-powered Roadside units in VANETs","authors":"Vivek Sethi, Sujata Pal, Avani Vyas","doi":"10.1109/MASS50613.2020.00068","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00068","url":null,"abstract":"Road-side unit (RSU) plays an important role in providing connectivity among the vehicles on the road. In rural areas, RSUs are powered using renewable energy, such as solar or wind energy. Hence, the energy consumption across such RSUs should be efficient i.e., energy consumption at RSUs should be minimized and no RSU gets over-utilized while others are under-utilized. The amount of energy consumption depends upon the scheduling of different kinds of data requests at RSU. In this paper, we propose a scheduling architecture for minimizing energy consumption at RSU and attaining uniform energy consumption across neighboring RSUs. This, in turn, increases the request fulfillment percentage at RSUs. The proposed architecture categorizes the incoming request as a Traditional (less computation) or a Smart request (high computation). Two approaches- Hard-deadline Less Computation requirement Approach (HLCA) and Soft-deadline High Computation requirement Approach (SHCA) are proposed for addressing Traditional and Smart data requests, respectively. In HLCA approach, the receiving RSU uses the scheduling metric to select the servicing RSU for request fulfillment. We prove by analysis, how scheduling metric helps in minimizing and achieving uniform energy consumption across the RSUs. In SHCA approach, Fog computing is used for handling high computation requests. Energy consumption at RSUs is further optimized by using Auction game-based relay vehicle selection mechanism. Simulation results demonstrate that our proposed approaches achieve uniform energy consumption across multiple RSUs and 10% more efficient than scheduling algorithms for single RSU model such as Nearest Fastest Set Scheduler (NFS).","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direction Finding with UWB and BLE: A Comparative Study","authors":"L. Botler, Michael Spörk, K. Diwold, K. Römer","doi":"10.1109/MASS50613.2020.00016","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00016","url":null,"abstract":"Using Angle-of-Arrival based on Phase-Difference-of-Arrival is a recent trend in indoor positioning. Although the basic techniques for direction estimation have been known and used for a long time in different application scenarios (e.g., RADAR), the complexity of Phase-Difference-of-Arrival transceivers discouraged its use for indoor applications. This scenario changed with the recent development of modern chips at competitive prices. Specifically, two ubiquitous technologies in the context of indoor positioning, namely Bluetooth Low Energy (BLE) and Ultra-Wideband (UWB), currently feature Angle-of-Arrival estimation. In this paper we compare these two technologies regarding their potential for indoor positioning based on a fair evaluation of their performance for estimating Angle-of-Arrival in five different realistic setups. The results obtained are compared with existing studies when available. Our results show that Ultra-Wideband is, in general, more accurate and precise, especially when subject to multipath interference. Additionally, we discuss possible approaches to improve the accuracy and precision of Angle-of-Arrival estimation using BLE, such as the impact of increasing the number of antenna elements. By using UWB, we achieved an angular accuracy of up to 5° even under obstructed LOS and multipath, while an overall mean error of nearly 25° was obtained with BLE in an outdoor scenario without obstacles.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FD-UWA: Full-Duplex Underwater Acoustic Comms via Self-Interference Cancellation in Space","authors":"Yung-Ting Hsieh, M. Rahmati, D. Pompili","doi":"10.1109/MASS50613.2020.00040","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00040","url":null,"abstract":"Traditionally, underwater acoustic communications is half duplex, i.e., the hydrophones and transducers operate in non-overlapping time-slots/frequency-bands in one direction at a time or frequency. To double the spectral efficiency and allow simultaneous transmission and reception in Full-Duplex mode (FD), a Self-Interference Cancellation (SIC) technique in space is introduced and deployed. Specifically, a novel underwater acoustic system is proposed to perform FD-SIC efficiently via an integrated design combining underwater Acoustic Vector Sensor (AVS) and Phased Array Transducer (PAT) to realize spatial SIC. The energy focusing function of the Beamformer (BF) helps PAT avoid self and mutual spatial interference. The AVS keeps updating the direction of arrival information to let BF adjust the steering angle via an adaptive protocol. The proposal is evaluated and verified via simulations in realistic underwater acoustic channels and is able to achieve 59 dB SIC at 80 kHz steering angle at -5 ° and at least 37 dB within the steering angle region before the input of digital SIC. This indicates that the design is a promising solution for the chosen angle region to perform spatial SIC as well as to prevent the grating lobe interference. The design is being experimentally validated using the data collected from an underwater testbed and implemented on an Field Programmable Gate Array (FPGA) board that provides energy efficiency and real-time processing capabilities.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liqian Shen, Xiangmao Chang, Yusheng Qiu, G. Xing, Deliang Yang
{"title":"Measuring and Optimizing Cell Selection of NB-IoT Network","authors":"Liqian Shen, Xiangmao Chang, Yusheng Qiu, G. Xing, Deliang Yang","doi":"10.1109/MASS50613.2020.00061","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00061","url":null,"abstract":"Narrowband-Internet of Things (NB-IoT) is an emerging cellular communication technology designed for low power wide area applications. Cell selection determines the channel of user device and hence is an important issue in cellular networks. In this paper, we take the first attempt to examine and optimize the the cell selection in NB-IoT networks by field measurement. We conduct measurements at 30 different locations which involve 5 typical application scenarios of NB-IoT. Two kinds of NB-IoT modules and two network operators are also involved in the measurements. We find three potential issues on the cell selection of the User Equipment (UE) through the measurements. We propose an adaptive cell selection approach to optimize the cell selection of UE. The simulation test based on real-world measurement data shows that the cell selected by the adaptive approach can improve the coverage level and reduce the power consumption for UE.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DOSP: Data Dissemination with Optimized and Secured Path for Ad-hoc Vehicular Communication Networks","authors":"K. Tripathi, A. Yadav, S. Sharma","doi":"10.1109/MASS50613.2020.00025","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00025","url":null,"abstract":"Timely delivery of critical information and data may reduce the chances of road accidents using vehicular adhoc networks. The vehicular ad-hoc network uses the multihop data dissemination technique due to the limited transmission capabilities of the vehicles. The dynamic topology of the network due to the presence of highly mobile vehicles experiences frequent path disconnections in the communication network. Due to these challenges, the timely delivery of messages to the intended recipient is still a challenging issue. The core attention of this work is to report the timely message delivery problem in the vehicular communication network. In this work, we proposed a secure and optimized data routing technique using cross-layer optimization for the heterogeneous ad-hoc network. Firstly we calculate the trust value of nodes based on the entity-centric trust model. Further, we estimate the link durability and probability of collision in the network of vehicles. Our prime aim is to increase the link reliability and duration to deliver the message on time. We also minimize the probability of data collision and improve the delivery ratio of the network. The proposed optimized data dissemination model has been tested with several network parameters. The experimental results show significant improvements in terms of minimized delay, packet loss ratio.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trustworthy Blockchain based framework for Impregnable IoV in Edge Computing","authors":"Pralay Kumar Lahiri, Debashis Das, W. Mansoor, Sourav Banerjee, Pushpita Chatterjee","doi":"10.1109/MASS50613.2020.00013","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00013","url":null,"abstract":"The concept behind the Internet of Things (IoT) is taking everything and connecting to the internet so that all devices would be able to send and receive data online. Internet of Vehicles (IoV) is a key component of smart city which is an outcome of IoT. Nowadays the concept of IoT has plaid an important role in our daily life in different sectors like healthcare, agriculture, smart home, wearable, green computing, smart city applications, etc. The emerging IoV is facing a lack of rigor in data processing, limitation of anonymity, privacy, scalability, security challenges. Due to vulnerability IoV devices must face malicious hackers. Nowadays with the help of blockchain (BC) technology energy system become more intelligent, eco-friendly, transparent, energy efficient. This paper highlights two major challenges i.e. scalability and security issues. The flavor of edge computing (EC) considered here to deal with the scalability issue. A BC is a public, shared database that records transactions between two parties that confirms owners through cryptography. After a transaction is validated and cryptographically verified generates “block” on the BC and transactions are ordered chronologically and cannot be altered. Implementing BC and smart contracts technologies will bring security features for IoV. It plays a role to implement the rules and policies to govern the IoV information and transactions and keep them into the BC to secure the data and for future uses.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Defective Nodes in Cyber-Physical Systems","authors":"Vidushi Agarwal, Sujata Pal, Neeraj Sharma, Vivek Sethi","doi":"10.1109/MASS50613.2020.00012","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00012","url":null,"abstract":"Cyber-physical systems (CPSs) comprise physical systems or objects incorporated with computing functionalities and data storage systems. Different sensor nodes in a CPS communicate with each other and devices like actuators and microcontrollers regulate the physical systems through smart algorithms. Efficient communication and networking algorithms play a critical role in supporting smooth interaction between the cyber and physical worlds. Internet of Things (IoT) belongs to the physical part of CPS. In the physical part, the sensor nodes are connected with each other and each node sends data to the root node through their respective parent node in a multi-hop manner. The physical devices in a CPS may stop sensing the environment due to logical and physical failures. To solve this, we propose a real time defective nodes detection scheme (R2D) in a cyber-physical system. The root node of the CPS gathers sensed data, detects the defective nodes and performs data analysis in the cyber part of the CPS. The results show that our proposed R2D protocol achieves a 10.2% higher packet delivery ratio and a 12.5% increase in throughput as compared to the flooding approach. Moreover, an improvement by almost 50% in throughput is observed when compared to RPL with an increase in packet loss rate of 20%.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121276096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}