{"title":"Performance Evaluation of the VB-TDMA Protocol for Long-term Tracking and Monitoring of Mobile Entities in the Outdoors","authors":"I. Radoi, J. Mann, D. Arvind","doi":"10.1145/2815317.2815340","DOIUrl":"https://doi.org/10.1145/2815317.2815340","url":null,"abstract":"The Virtual Beacon-Time Division Multiple Access (VB-TDMA) communication protocol has been proposed in [12] for a growing class of applications which require GPS tracking of autonomous mobile entities in the outdoors, and the long-term continuous monitoring of their contextual information using wireless sensors. Examples include monitoring animal behaviour in their natural habitat over the annual cycle, tracking shipping containers during their life-cycle of transit, loading/unloading and storage, and the handling of high-value packages during transportation. This paper employs simulations to evaluate the network performance of the VB-TDMA communication protocol in a representative scenario involving wild horses attached with collars, each containing a custom-designed platform with a three-axis accelerometer, a GPS module and ancillary electronics and battery, which uploads wirelessly to static base-stations, its position (sensed thrice an hour) and a summary of its activities between uploads. The simulations benefited from movement models derived from real data obtained from a long-term deployment of the collars on wild horses in the Donana National Park in south-west Spain. Comparisons with other MAC protocols have demonstrated the superior performance of the VB-TDMA protocol over a range of metrics for the representative example. An enhanced version of the VB-TDMA protocol - a multi-hop variant - is introduced for low latency requirements and was simulated for an urban scenario of bicycles fitted with sensors for crowd-sourcing spatio-temporal air quality information along the route of travel which is uploaded to the server when within range of static base-stations, for cases where low latency data upload is a requirement to enable access to the latest air quality information.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Irina Diaconita, A. Reinhardt, D. Reinhardt, Christoph Rensing
{"title":"Inferring Smartphone Positions Based on Collecting the Environment's Response to Vibration Motor Actuation","authors":"Irina Diaconita, A. Reinhardt, D. Reinhardt, Christoph Rensing","doi":"10.1145/2815317.2815342","DOIUrl":"https://doi.org/10.1145/2815317.2815342","url":null,"abstract":"Smartphones have become ubiquitous in recent years and offer many useful services to their users, such as notifications about incoming calls and messages, or news updates in real-time. These notifications however do not consider the current user's and phone's context. As a result, they can disturb users in important meetings or remain unnoticed in noisy environment. In this paper, we therefore propose an approach to infer the phone's context based on its vibration motor. To this end, we trigger the phone's vibration motor for short time periods and measure the response of its environments using the built-in microphone and/or accelerometers.Our evaluation shows that leveraging accelerometers allows to recognize the current phone's context with an accuracy of more than 99%. As a result, our proposed solution outperforms our previous work based on played and recorded ringtones in terms of classification performance, user annoyance, as well as potential privacy threats.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Javad Sohankar, Koosha Sadeghi, Ayan Banerjee, S. Gupta
{"title":"E-BIAS: A Pervasive EEG-Based Identification and Authentication System","authors":"Javad Sohankar, Koosha Sadeghi, Ayan Banerjee, S. Gupta","doi":"10.1145/2815317.2815341","DOIUrl":"https://doi.org/10.1145/2815317.2815341","url":null,"abstract":"Security systems using brain signals or Electroencephalography (EEG), is an emerging field of research. Brain signal characteristics such as chaotic nature and uniqueness, make it an appropriate information source to be used in security systems. In this paper, E-BIAS, a pervasive EEG-based security system with both identification and authentication functionalities is developed. The main challenges are: 1) accuracy, 2) timeliness, 3) energy efficiency, 4) usability, and 5) robustness. Therefore, we apply machine learning algorithms with low training times, multi-tier distributed computing architecture, and commercial single channel dry electrode wireless EEG headsets to respectively overcome the first four challenges. With only two minutes of training time and a simple rest task, the authentication and identification performance reaches 95% and 80%, respectively on 10 subjects. We finally test the robustness of our EEG-based seamless security system against three types of attacks: a) brain impersonation, b) database hacking, and c) communication snooping and discuss the system configurations which can avoid data leakage.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132214201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Assisted Coding (LAC): Embracing Interference in Free Space Optical Communications","authors":"T. Duong, D. Nguyen-Huu, Thinh P. Q. Nguyen","doi":"10.1145/2815317.2815335","DOIUrl":"https://doi.org/10.1145/2815317.2815335","url":null,"abstract":"As the number of wireless devices grows, the increasing demand for the shared radio frequency (RF) spectrum becomes a critical problem. Unlike wired communications in which, theoretically, more fibers can be used to accommodate the increasing bandwidth demand, wireless spectrum cannot be arbitrarily increased due to the fundamental limitations imposed by the physical laws. On the other hand, recent advances in free space optical (FSO) technologies promise a complementary approach to increase wireless capacity. However, high-speed FSO technologies are currently confined to short distance transmissions, resulting in limited mobility. In this paper, we briefly describe WiFO, a hybrid WiFi-FSO network for Gbps wireless local area network (WLAN) femtocells that can provide up to one Gbps per user while maintaining seamless mobility. While typical RF femtocells are non-overlapped to minimize inter-cell interference, there are advantages of using overlapped femtocells to increase mobility and throughput when the number of users is small. That said, the primary contribution of this paper will be a novel location assisted coding (LAC) technique used in the WiFO network that aims to increase throughput and reduce interference for multiple users in a dense array of femtocells. Both theoretical analysis and numerical experiments show orders of magnitude increase in throughput using LAC over basic codes.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128675600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectural Design of an Optimal Routed Network-based Mobility Management Function for SDN-based EPC Networks","authors":"Wen-Kang Jia","doi":"10.1145/2815317.2815326","DOIUrl":"https://doi.org/10.1145/2815317.2815326","url":null,"abstract":"4G/5G EPC over Network Functions Virtualization (NFV) complemented with Software Defined Networking (SDN) framework is envisioned to be a novel paradigm of network architecture that supports a variety of access technologies and solves growth challenges and requirements such seamless mobility management. Network-based localized mobility management scheme such as Proxy Mobile IPv6 (PMIPv6) is designed to address many of the drawbacks such as additional signaling and over-the-air tunnel overhead associated with global mobility protocols like Mobile IPv6 (MIPv6). In some deployment scenarios, PMIPv6 results in high registration, end-to-end delivery, inter- and intra-domain handoff (roaming), and route optimization latencies due to this unnecessary signaling and detour traffic path. To address these problems, in this paper we propose a route optimized PMIPv6 virtualized function over SDN framework. We first describe how PMIPv6 mechanism is transformed into a suit of virtualized network functions, and proposes design and implementation for SDN-based EPC networks in detail. Finally, simulation results show that proposed framework can improve the performance in terms of the registration, end-to-end delivery, inter- and intra-domain handoff (roaming), and route optimization latencies compared to original non-SDN based PMIPv6 framework.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounding Degrees on RPL","authors":"F. Boubekeur, Lélia Blin, R. Léone, P. Medagliani","doi":"10.1145/2815317.2815339","DOIUrl":"https://doi.org/10.1145/2815317.2815339","url":null,"abstract":"RPL is an open routing protocol standardized by the ROLL group of IETF for constrained IP smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy Networks (LLNs). Unfortunately, RPL suffers from significant packet loss due to the instability of the routes, and from a poor updates. Most of the existing solutions dedicated to solve the routes instability are based on improving the metrics used for constructing the routes. Generally these metrics are based on some evaluation of the radio link quality. In this paper, we adopt a new approach for addressing route instability in RPL, by placing an additional constraint on the maximum number of children a node can accept during tree construction. We call our solution Bounded Degree RPL (BD-RPL). BD-RPL addresses the absence of updating in the downward routes construction. Technically, we use the existing control messages provided by RPL for bounding the node degrees, as well as for updating the downward routes. Therefore, BD-RPL does not generate any additional overhead compared to RPL. Also, BD-RPL does not depend on the radio link quality metric. That is, any improvement of the metric used for RPL will automatically yield an improvement for BD-RPL. We have evaluated BD-RPL using the Cooja simulator, and implemented it on the Iot-lab platform. The experimentation demonstrates an improvement over RPL by an average of 10% in packet delivery, 50% in energy consumption, and 60% in delay.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134051376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Open Source Platform for Perceived Video Quality Evaluation","authors":"Lamine Amour, Sami Souihi, S. Hoceini, A. Mellouk","doi":"10.1145/2815317.2815344","DOIUrl":"https://doi.org/10.1145/2815317.2815344","url":null,"abstract":"To ensure the best multimedia service quality in order to well address users' expectations, a new concept named Quality of Experience (QoE) has appeared. Two methods can be used to evaluate the user satisfaction, a subjective one and an objective one. The subjective approach is based on measured real data. The problem is there is no dataset large enough and can be used to well evaluate the QoE. In this, work we present our approach to build a data set for subjective evaluation based on a categorization approach and open source software.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126444459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spraying Techniques for Securing Key Exchange in Large Ad-hoc Networks","authors":"Ariel Stulman, A. Stulman","doi":"10.1145/2815317.2815324","DOIUrl":"https://doi.org/10.1145/2815317.2815324","url":null,"abstract":"Massive ad-hoc mobile networks with fluctuating topologies, as is expected for the Internet of Things (IoT), vehicular networks (VANETs), and others, allow for new solutions for the initial key exchange problem. Spraying data on multiple paths is a novel algorithm for confidential key exchange over public, insecure mobile ad-hoc network. It assumes neither prior knowledge nor a trusted third party. It is based on the inherent fluctuating topology of such networks. By spraying the key exchange packets over multiple fluctuating paths, an adversary's ability of attacking a communication link is greatly diminished; thus, active attackers are turned passive. In this paper, two spraying techniques are compared using multiple simulations on random network topologies. The results show that for small networks one technique surpasses the other, but as the network grows - as is expected in IoT, smart cities, VANETs, etc. - this advantage is diminished.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Management for WiFi MAC Layer Processing in the Cloud: Demo Description","authors":"Jonathan Vestin, A. Kassler","doi":"10.1145/2815317.2815343","DOIUrl":"https://doi.org/10.1145/2815317.2815343","url":null,"abstract":"We present a demo of Quality of Service Management for CloudMAC, which combines SDN with NFV for processing WLAN MAC layer management frames in the Cloud. With CloudMAC, enterprise WLANs can be managed in the cloud which enables simple support for authentication, authorization and accounting, or mobility management. With CloudMAC, clients are associated with Virtual Machines and mobility management is simplified by updating OpenFlow forwarding rules. This enables seamless mobility. While CloudMAC works with standard WLAN clients, CloudMAC APs are very lightweight. In this demo, we show how we can manage different QoS classes in SDN enabled networks which allows a flexible WLAN MAC frame prioritisation. As an example, we implement 802.11ae based WLAN MAC management frame priorization in both the SDN network and the CloudMAC lightweight APs.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ekhiotz Jon Vergara, S. Nadjm-Tehrani, Mikael Asplund
{"title":"Sharing the Cost of Lunch: Energy Apportionment Policies","authors":"Ekhiotz Jon Vergara, S. Nadjm-Tehrani, Mikael Asplund","doi":"10.1145/2815317.2815338","DOIUrl":"https://doi.org/10.1145/2815317.2815338","url":null,"abstract":"Energy consumption has become a hot topic in computer and communication technologies pinpointing the need to carefully analyse system efficiency. The energy consumption of a system is determined by the usage patterns of system components and complex interactions between the coexisting entities and resources. Providing transparency of a system's consumption by breaking down the total consumption is vital to evaluate and provide energy-efficient design and operation. In this paper we survey the apportionment problem in different fields such as computer systems, wireless sensor networks, mobile devices and energy-efficient buildings. The challenge lies in how to attribute a share of the total energy consumption to the responsible entities (e.g., applications, processes or users of the system). Our analysis identifies that energy apportionment is a common problem in different fields and reviews five previously applied energy apportionment policies. Also, the work identifies relevant further research.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115179606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}