Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing最新文献

筛选
英文 中文
Vehicular knowledge networking and application to risk reasoning 车辆知识网络及其在风险推理中的应用
Seyhan Uçar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Jérôme Härri, O. Altintas
{"title":"Vehicular knowledge networking and application to risk reasoning","authors":"Seyhan Uçar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Jérôme Härri, O. Altintas","doi":"10.1145/3397166.3413467","DOIUrl":"https://doi.org/10.1145/3397166.3413467","url":null,"abstract":"Vehicles are expected to generate and consume an increasing amount of data, but how to perform risk reasoning over relevant data is still not yet solved. Location, time of day and driver behavior change the risk dynamically and make risk assessment challenging. This paper introduces a new paradigm, transferring information from raw sensed data to knowledge and explores the knowledge of risk reasoning through vehicular maneuver conflicts. In particular, we conduct a simulation study to analyze the driving data and extract the knowledge of risky road users and risky locations. We use knowledge to facilitate reduced volume and share it through a Vehicular Knowledge Network (VKN) for better traffic planning and safer driving.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Iterative learning of graph connectivity from partially-observed cascade samples 部分观察级联样本图连通性的迭代学习
Jiin Woo, Jungseul Ok, Yung Yi
{"title":"Iterative learning of graph connectivity from partially-observed cascade samples","authors":"Jiin Woo, Jungseul Ok, Yung Yi","doi":"10.1145/3397166.3409130","DOIUrl":"https://doi.org/10.1145/3397166.3409130","url":null,"abstract":"Graph learning is an inference problem of estimating connectivity of a graph from a collection of epidemic cascades, with many useful applications in the areas of online/offline social networks, p2p networks, computer security, and epidemiology. We consider a practical scenario when the information of cascade samples are partially observed in the independent cascade (IC) model. For the graph learning problem, we propose an efficient algorithm that solves a localized version of computationally-intractable maximum likelihood estimation through approximations in both temporal and spatial aspects. Our algorithm iterates the operations of recovering missing time logs and inferring graph connectivity, and thereby progressively improves the inference quality. We study the sample complexity, which is the number of required cascade samples to meet a given inference quality, and show that it is asymptotically close to a lower bound, thus near-order-optimal in terms of the number of nodes. We evaluate the performance of our algorithm using five real-world social networks, whose size ranges from 20 to 900, and demonstrate that our algorithm performs better than other competing algorithms in terms of accuracy while maintaining fast running time.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
REFRAIN: promoting valid transmission in high-density modern wi-fi networks 主题:促进高密度现代wi-fi网络的有效传输
Youngwook Son, K. Lee, Seongwon Kim, Jinmyeong Lee, Sunghyun Choi, S. Bahk
{"title":"REFRAIN: promoting valid transmission in high-density modern wi-fi networks","authors":"Youngwook Son, K. Lee, Seongwon Kim, Jinmyeong Lee, Sunghyun Choi, S. Bahk","doi":"10.1145/3397166.3409124","DOIUrl":"https://doi.org/10.1145/3397166.3409124","url":null,"abstract":"For emerging high-density Wi-Fi networks, there have been plenty of studies that claim the need for more aggressive channel access to enhance spatial reuse. Against those previous ideas, this paper presents a different perspective that existing Wi-Fi devices already have excessive transmission opportunities, even without protecting each other in certain scenarios. We shed light on an anomaly within actual carrier sensing (CS) behaviors, which makes some neighboring devices become blind to each other and transmit simultaneously, due to undetected preambles. Through experimental study and analysis, we reveal both sides of the anomaly heavily affecting the overall network performance. Based on the observations, we design REFRAIN, a standard-compliant PHY/MAC framework, which copes with and further exploits the anomaly for better spatial reuse. Our prototype using NI USRP and commercial Wi-Fi devices shows the feasibility and effectiveness of our approach, while extensive simulation results demonstrate that REFRAIN achieves up to 1.57× higher average throughput by promoting valid transmissions, without modifying the 802.11 CS specification at all.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133381347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Visualizing the Bitcoin's OP_RETURN operator 可视化比特币的OP_RETURN操作符
Johannes Mols, Emmanouil Vasilomanolakis
{"title":"Visualizing the Bitcoin's OP_RETURN operator","authors":"Johannes Mols, Emmanouil Vasilomanolakis","doi":"10.1145/3397166.3415278","DOIUrl":"https://doi.org/10.1145/3397166.3415278","url":null,"abstract":"Bitcoin is undoubtedly the most used distributed ledger technology nowadays. Bitcoin's OP_RETURN operator allows for saving arbitrary data on the blockchain. This comes as an extension of Bitcoin's core usage (i.e. cryptocurrency) and opens up a multitude of use cases. These range from benign applications (e.g. ownership of a digital/physical asset) to illegal/malicious scenarios (e.g. blockchain-based botnets). In this paper, we present a system that provides advanced analytic and visual capabilities with regard to the OP_RETURN operator. Furthermore, we showcase a quantitative and qualitative analysis of the OP_RETURN along with a number of interesting findings.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based framework for energy trading between solar powered base stations and grid 基于区块链的框架,用于太阳能基站和电网之间的能源交易
Vikas Hassija, Vatsal Gupta, V. Chamola, Salil Kanhare
{"title":"A blockchain-based framework for energy trading between solar powered base stations and grid","authors":"Vikas Hassija, Vatsal Gupta, V. Chamola, Salil Kanhare","doi":"10.1145/3397166.3412800","DOIUrl":"https://doi.org/10.1145/3397166.3412800","url":null,"abstract":"The rapidly increasing mobile traffic across the globe has proliferated the deployment of cellular base stations, which has, in turn, led to an increase in the power consumption and carbon footprint of the telecommunications industry. In recent times, solar-powered base stations (SPBSs) have gained much popularity in the telecom sector due to their ability to make operations more sustainable. However, some potential energy benefits rendered by the SPBSs have not yet been realized. In areas with dense base station deployment or low mobile traffic, SPBSs store surplus energy, which, in most instances, gets lost due to limited charge storage capacity of the batteries. To limit the wastage of energy, an appropriate mechanism enabling the utilization of excess energy produced by these base stations can be adopted. To this end, we model a Base Station-to-Grid (BS2G) network in which the grid can utilize surplus energy spared by the SPBSs. To overcome challenges in regards to scalability, robustness, and cost-optimization, we propose using the blockchain technology to create the BS2G network. Blockchain is a distributed ledger designed to record transactions in a transparent, lightweight, and tamper-proof manner. To make energy trade between base stations and the grid cost-effective, a game-theoretical approach has also been adopted in this paper. The proposed model simplifies the process of energy trading while also making it cost-optimal.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rewarding relays for decentralised NAT traversal using smart contracts 奖励使用智能合约进行分散NAT遍历的中继
Navin V. Keizer, Onur Ascigil, I. Psaras, G. Pavlou
{"title":"Rewarding relays for decentralised NAT traversal using smart contracts","authors":"Navin V. Keizer, Onur Ascigil, I. Psaras, G. Pavlou","doi":"10.1145/3397166.3412799","DOIUrl":"https://doi.org/10.1145/3397166.3412799","url":null,"abstract":"Traversing NAT's remains a big issue in P2P networks, and many of the previously proposed solutions are incompatible with truly decentralised emerging applications. Such applications need a decentralised NAT traversal solution without trusted centralised servers. In this paper we present a decentralised, relay-based NAT traversal system, where any reachable node is able to assist an unreachable node in NAT traversal. Smart contracts on the Ethereum blockchain are used to ensure fair rewards. Besides financial incentives, a reputation system based on transactions on-chain is used to mitigate against malicious behaviour, and guide peer discovery. Evaluation of our system shows that a combination of historic performance metrics leads to an optimal scoring function, that the system takes little time to reach stability from inception, and that the system is resilient against various attacks. Implementation of the smart contract shows that the cost for participants is manageable.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quantum blockchain networks 量子区块链网络
D. Krishnaswamy
{"title":"Quantum blockchain networks","authors":"D. Krishnaswamy","doi":"10.1145/3397166.3412802","DOIUrl":"https://doi.org/10.1145/3397166.3412802","url":null,"abstract":"This paper explores and suggests possibilities for the design of quantum blockchain systems that are inspired by quantum processing techniques. Quantum states are defined that can be processed either by a physical quantum computer or virtually by emulation on a classical computer where such states can be entangled across different nodes in the system. The collapse of quantum state variables are explored utilizing non-deterministic smart contract processing. A quantum blockchain network is realized with different nodes in the system interacting with each other though a communication network. Different networking use-cases are explored such as to determine which user is given access to a network at a given time, or to select the best access node for a given user.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tensor completion-based 5G positioning with partial channel measurements 基于张量完井的5G定位与部分信道测量
Fuxi Wen, T. Svensson
{"title":"Tensor completion-based 5G positioning with partial channel measurements","authors":"Fuxi Wen, T. Svensson","doi":"10.1145/3397166.3413464","DOIUrl":"https://doi.org/10.1145/3397166.3413464","url":null,"abstract":"5G mmWave communication systems have promising properties for high precision user localization and environment mapping. Such information is of high value for emerging applications such as connected automated driving (CAD), and it has also potential to be explored to substantially improve efficiency and reliability of mmWave communications itself. However, the acquisition of such information cannot come with too large overhead in the system. Existing studies have so far relied on complete channel measurements, implying a prohibitive channel training overhead. In this paper, we exploit the possibility of 5G positioning using partial channel measurements. We utilize a tensor completion technique to recover the complete channel information from low rank channel measurements. Simulation results demonstrate the trade-off between user positioning accuracy and channel training overhead, and show that sub-meter precision with negligible performance loss is feasible at sample ratio reductions of at least 30%, and meter level precision is achievable with sample ratio reduction of 50%.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing 第21届移动网络和移动计算理论、算法基础和协议设计国际研讨会论文集
{"title":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","authors":"","doi":"10.1145/3397166","DOIUrl":"https://doi.org/10.1145/3397166","url":null,"abstract":"","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defining trust in IoT environments via distributed remote attestation using blockchain 通过使用区块链的分布式远程认证来定义物联网环境中的信任
Uzair Javaid, M. Aman, B. Sikdar
{"title":"Defining trust in IoT environments via distributed remote attestation using blockchain","authors":"Uzair Javaid, M. Aman, B. Sikdar","doi":"10.1145/3397166.3412801","DOIUrl":"https://doi.org/10.1145/3397166.3412801","url":null,"abstract":"The constantly growing number of Internet of Things (IoT) devices and their resource-constrained nature makes them particularly vulnerable and increasingly attractive for exploitation by cyber criminals. Current estimates commonly reach the tens of billions for the number of connected 'things'. The heterogeneous capabilities of these devices serve as a motivation for resource sharing among them. However, for effective resource sharing, it is essential that trust be retained in the multitude of pervasive and diverse IoT devices. Remote attestation is a well-known technique used to build such trust. Thus, this paper proposes a blockchain based remote attestation protocol to establish trust between IoT devices. The blockchain offers a secure framework for device registration while the attestation is based on Physical Unclonable Functions (PUF). This combination of technologies results in a tamper resistant scheme with protection against physical and proxy attacks.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信