Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing最新文献
{"title":"Vehicular knowledge networking and application to risk reasoning","authors":"Seyhan Uçar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Jérôme Härri, O. Altintas","doi":"10.1145/3397166.3413467","DOIUrl":"https://doi.org/10.1145/3397166.3413467","url":null,"abstract":"Vehicles are expected to generate and consume an increasing amount of data, but how to perform risk reasoning over relevant data is still not yet solved. Location, time of day and driver behavior change the risk dynamically and make risk assessment challenging. This paper introduces a new paradigm, transferring information from raw sensed data to knowledge and explores the knowledge of risk reasoning through vehicular maneuver conflicts. In particular, we conduct a simulation study to analyze the driving data and extract the knowledge of risky road users and risky locations. We use knowledge to facilitate reduced volume and share it through a Vehicular Knowledge Network (VKN) for better traffic planning and safer driving.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative learning of graph connectivity from partially-observed cascade samples","authors":"Jiin Woo, Jungseul Ok, Yung Yi","doi":"10.1145/3397166.3409130","DOIUrl":"https://doi.org/10.1145/3397166.3409130","url":null,"abstract":"Graph learning is an inference problem of estimating connectivity of a graph from a collection of epidemic cascades, with many useful applications in the areas of online/offline social networks, p2p networks, computer security, and epidemiology. We consider a practical scenario when the information of cascade samples are partially observed in the independent cascade (IC) model. For the graph learning problem, we propose an efficient algorithm that solves a localized version of computationally-intractable maximum likelihood estimation through approximations in both temporal and spatial aspects. Our algorithm iterates the operations of recovering missing time logs and inferring graph connectivity, and thereby progressively improves the inference quality. We study the sample complexity, which is the number of required cascade samples to meet a given inference quality, and show that it is asymptotically close to a lower bound, thus near-order-optimal in terms of the number of nodes. We evaluate the performance of our algorithm using five real-world social networks, whose size ranges from 20 to 900, and demonstrate that our algorithm performs better than other competing algorithms in terms of accuracy while maintaining fast running time.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngwook Son, K. Lee, Seongwon Kim, Jinmyeong Lee, Sunghyun Choi, S. Bahk
{"title":"REFRAIN: promoting valid transmission in high-density modern wi-fi networks","authors":"Youngwook Son, K. Lee, Seongwon Kim, Jinmyeong Lee, Sunghyun Choi, S. Bahk","doi":"10.1145/3397166.3409124","DOIUrl":"https://doi.org/10.1145/3397166.3409124","url":null,"abstract":"For emerging high-density Wi-Fi networks, there have been plenty of studies that claim the need for more aggressive channel access to enhance spatial reuse. Against those previous ideas, this paper presents a different perspective that existing Wi-Fi devices already have excessive transmission opportunities, even without protecting each other in certain scenarios. We shed light on an anomaly within actual carrier sensing (CS) behaviors, which makes some neighboring devices become blind to each other and transmit simultaneously, due to undetected preambles. Through experimental study and analysis, we reveal both sides of the anomaly heavily affecting the overall network performance. Based on the observations, we design REFRAIN, a standard-compliant PHY/MAC framework, which copes with and further exploits the anomaly for better spatial reuse. Our prototype using NI USRP and commercial Wi-Fi devices shows the feasibility and effectiveness of our approach, while extensive simulation results demonstrate that REFRAIN achieves up to 1.57× higher average throughput by promoting valid transmissions, without modifying the 802.11 CS specification at all.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualizing the Bitcoin's OP_RETURN operator","authors":"Johannes Mols, Emmanouil Vasilomanolakis","doi":"10.1145/3397166.3415278","DOIUrl":"https://doi.org/10.1145/3397166.3415278","url":null,"abstract":"Bitcoin is undoubtedly the most used distributed ledger technology nowadays. Bitcoin's OP_RETURN operator allows for saving arbitrary data on the blockchain. This comes as an extension of Bitcoin's core usage (i.e. cryptocurrency) and opens up a multitude of use cases. These range from benign applications (e.g. ownership of a digital/physical asset) to illegal/malicious scenarios (e.g. blockchain-based botnets). In this paper, we present a system that provides advanced analytic and visual capabilities with regard to the OP_RETURN operator. Furthermore, we showcase a quantitative and qualitative analysis of the OP_RETURN along with a number of interesting findings.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vikas Hassija, Vatsal Gupta, V. Chamola, Salil Kanhare
{"title":"A blockchain-based framework for energy trading between solar powered base stations and grid","authors":"Vikas Hassija, Vatsal Gupta, V. Chamola, Salil Kanhare","doi":"10.1145/3397166.3412800","DOIUrl":"https://doi.org/10.1145/3397166.3412800","url":null,"abstract":"The rapidly increasing mobile traffic across the globe has proliferated the deployment of cellular base stations, which has, in turn, led to an increase in the power consumption and carbon footprint of the telecommunications industry. In recent times, solar-powered base stations (SPBSs) have gained much popularity in the telecom sector due to their ability to make operations more sustainable. However, some potential energy benefits rendered by the SPBSs have not yet been realized. In areas with dense base station deployment or low mobile traffic, SPBSs store surplus energy, which, in most instances, gets lost due to limited charge storage capacity of the batteries. To limit the wastage of energy, an appropriate mechanism enabling the utilization of excess energy produced by these base stations can be adopted. To this end, we model a Base Station-to-Grid (BS2G) network in which the grid can utilize surplus energy spared by the SPBSs. To overcome challenges in regards to scalability, robustness, and cost-optimization, we propose using the blockchain technology to create the BS2G network. Blockchain is a distributed ledger designed to record transactions in a transparent, lightweight, and tamper-proof manner. To make energy trade between base stations and the grid cost-effective, a game-theoretical approach has also been adopted in this paper. The proposed model simplifies the process of energy trading while also making it cost-optimal.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Navin V. Keizer, Onur Ascigil, I. Psaras, G. Pavlou
{"title":"Rewarding relays for decentralised NAT traversal using smart contracts","authors":"Navin V. Keizer, Onur Ascigil, I. Psaras, G. Pavlou","doi":"10.1145/3397166.3412799","DOIUrl":"https://doi.org/10.1145/3397166.3412799","url":null,"abstract":"Traversing NAT's remains a big issue in P2P networks, and many of the previously proposed solutions are incompatible with truly decentralised emerging applications. Such applications need a decentralised NAT traversal solution without trusted centralised servers. In this paper we present a decentralised, relay-based NAT traversal system, where any reachable node is able to assist an unreachable node in NAT traversal. Smart contracts on the Ethereum blockchain are used to ensure fair rewards. Besides financial incentives, a reputation system based on transactions on-chain is used to mitigate against malicious behaviour, and guide peer discovery. Evaluation of our system shows that a combination of historic performance metrics leads to an optimal scoring function, that the system takes little time to reach stability from inception, and that the system is resilient against various attacks. Implementation of the smart contract shows that the cost for participants is manageable.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum blockchain networks","authors":"D. Krishnaswamy","doi":"10.1145/3397166.3412802","DOIUrl":"https://doi.org/10.1145/3397166.3412802","url":null,"abstract":"This paper explores and suggests possibilities for the design of quantum blockchain systems that are inspired by quantum processing techniques. Quantum states are defined that can be processed either by a physical quantum computer or virtually by emulation on a classical computer where such states can be entangled across different nodes in the system. The collapse of quantum state variables are explored utilizing non-deterministic smart contract processing. A quantum blockchain network is realized with different nodes in the system interacting with each other though a communication network. Different networking use-cases are explored such as to determine which user is given access to a network at a given time, or to select the best access node for a given user.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tensor completion-based 5G positioning with partial channel measurements","authors":"Fuxi Wen, T. Svensson","doi":"10.1145/3397166.3413464","DOIUrl":"https://doi.org/10.1145/3397166.3413464","url":null,"abstract":"5G mmWave communication systems have promising properties for high precision user localization and environment mapping. Such information is of high value for emerging applications such as connected automated driving (CAD), and it has also potential to be explored to substantially improve efficiency and reliability of mmWave communications itself. However, the acquisition of such information cannot come with too large overhead in the system. Existing studies have so far relied on complete channel measurements, implying a prohibitive channel training overhead. In this paper, we exploit the possibility of 5G positioning using partial channel measurements. We utilize a tensor completion technique to recover the complete channel information from low rank channel measurements. Simulation results demonstrate the trade-off between user positioning accuracy and channel training overhead, and show that sub-meter precision with negligible performance loss is feasible at sample ratio reductions of at least 30%, and meter level precision is achievable with sample ratio reduction of 50%.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","authors":"","doi":"10.1145/3397166","DOIUrl":"https://doi.org/10.1145/3397166","url":null,"abstract":"","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining trust in IoT environments via distributed remote attestation using blockchain","authors":"Uzair Javaid, M. Aman, B. Sikdar","doi":"10.1145/3397166.3412801","DOIUrl":"https://doi.org/10.1145/3397166.3412801","url":null,"abstract":"The constantly growing number of Internet of Things (IoT) devices and their resource-constrained nature makes them particularly vulnerable and increasingly attractive for exploitation by cyber criminals. Current estimates commonly reach the tens of billions for the number of connected 'things'. The heterogeneous capabilities of these devices serve as a motivation for resource sharing among them. However, for effective resource sharing, it is essential that trust be retained in the multitude of pervasive and diverse IoT devices. Remote attestation is a well-known technique used to build such trust. Thus, this paper proposes a blockchain based remote attestation protocol to establish trust between IoT devices. The blockchain offers a secure framework for device registration while the attestation is based on Physical Unclonable Functions (PUF). This combination of technologies results in a tamper resistant scheme with protection against physical and proxy attacks.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}