{"title":"SDWDS: Fault Recovery Automation in IoTs","authors":"Chin-Ya Huang, Hong-Yi Wang, Yu-Pei Wu","doi":"10.1109/SAHCN.2018.8397152","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397152","url":null,"abstract":"To assist various intelligent applications, IoT devices send their monitored data to Internet for further process. WiFi access points (APs) would be a candidate to support data transmission in IoTs due to its large wireless service coverage and low cost. An AP connects to the Internet through Ethernet to provide Internet connectivity to its connected IoT devices. However, data transmission may be failed when an AP loses its Ethernet connectivity. To resolve this problem, a software define networking (SDN) and wireless distribution system (WDS) assisted fault recovery automation scheme, SDWDS, is proposed. In SDWDS, packets can be directly and wirelessly forwarded between two APs when the Ethernet link fails at one of the APs. Specifically, when the Ethernet link failure of an AP is detected by the SDN controller, the AP will switch to WDS mode to wirelessly connect to its neighboring APs. The SDN controller in further reroutes corresponding packets through the newly associated AP. Consequently, the IoT devices can sustain Internet access even though their associated AP cannot directly communicate with the Internet via Ethernet. Additionally, the proposed SDWDS is implemented in commercial APs for performance evaluation. Preliminary results show the SDWDS can automatically recover more than one Ethernet link failures in the network. However, due to the limitation of the commercial AP, the creation of WDS requires rebooting the AP which costs about 20 seconds recovery latency. In the future, we will introduce virtualization or multi- connectivity techniques to more efficiently support the fault recovery automation in IoTs.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125321107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rethinking Mobile Devices' Energy Efficiency in WLAN Management Services","authors":"Haoxin Wang, Jiang Xie, Xingya Liu","doi":"10.1109/SAHCN.2018.8397137","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397137","url":null,"abstract":"With the rapid popularization of large data stream mobile applications, wireless local area networks (WLANs) have been a top choice for mobile users (MUs), because of the high data rate and low monetary cost. However, the battery life of mobile devices, which is the most concerned feature of MUs, may suffer from WLAN management services, such as mobility management and load balancing services. Unfortunately, few existing WLAN systems take into account both the energy efficiency of mobile devices and the performance of management services. Even worse, to improve the performance of WLAN management services, various existing management mechanisms sacrifice mobile devices' energy. In this paper, we propose BELL, a novel WLAN system that provides two energy-efficient management services for its associated MUs by reproducing and scheduling the beacons broadcast from access points (APs). We name them BELL- handoff and BELL-2M services. We have implemented the proposed BELL-handoff using commercial Wi-Fi adapters. The experimental results reveal that BELL-handoff significantly decreases both mobile devices' energy consumption and latency during handoffs, compared with the commercial WLAN mobility management service. Furthermore, we conduct extensive simulations to evaluate APs' load and mobile devices' battery life within a large-scale deployment of BELL. Simulation results demonstrate that BELL not only balances the load among APs, but also prolongs the battery life of mobile devices.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Reliable Hypothesis Validation in Social Sensing Applications","authors":"Dong Wang, D. Zhang, Chao Huang","doi":"10.1109/SAHCN.2018.8397103","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397103","url":null,"abstract":"Social sensing has become a new crowdsourcing application paradigm where humans function as sensors to report their observations about the physical world. While many previous studies in social sensing focus on the problem of ascertaining the reliability of data sources and the truthfulness of their reported claims (often known as truth discovery), this paper investigates a new problem of hypothesis validation where the goal is to validate some high-level statements (referred to as hypotheses) from the low-level statements (referred to as claims) embedded in the social sensing data. The truthfulness of hypotheses cannot be directly obtained from the truth discovery results and two key challenges are involved in solving the hypothesis validation problem: (i) how to match the hypotheses generated by end users to the relevant claims generated by social sensors? (ii) How to accurately validate the truthfulness of the hypotheses given the unknown reliability of data sources and unvetted truthfulness of the claims? This paper proposes a Reliable Hypothesis Validation (RHV) scheme to address the above challenges. In particular, we develop a critical claim selection approach to match the hypotheses with the relevant claims and derive an optimal solution to validate their truthfulness by exploring the complex relationship between hypotheses and claims. The performance of RHV scheme is evaluated on three datasets collected from real- world social sensing applications. The results show that the RHV scheme significantly outperformed the state-of-the-art baselines in terms of validating the truthfulness of hypotheses.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Chu, Kun Qian, Xu Wang, Lina Yao, Fu Xiao, Jianbo Li, Xin Miao, Zheng Yang
{"title":"Passenger Demand Prediction with Cellular Footprints","authors":"Jing Chu, Kun Qian, Xu Wang, Lina Yao, Fu Xiao, Jianbo Li, Xin Miao, Zheng Yang","doi":"10.1109/SAHCN.2018.8397114","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397114","url":null,"abstract":"Accurate forecast of citywide passenger demand helps online car-hailing service providers to better schedule driver supplies. Previous research either uses only passenger order history and fails to capture the deep dependency of passenger demand, or is restricted on grid region partition that loses physical context. Recent advance in mobile traffic analysis has fostered understanding of city functions. In this paper, we propose FlowFlexDP, a demand prediction model that integrates regional crowd flow and applies to flexible region partition. Analysis on a cellular dataset covering 1.5 million users in a major city in China reveals strong correlation between passenger demand and crowd flow. FlowFlexDP extracts both order history and crowd flow from cellular data, and adopts Graph Convolutional Neural Network to adapt prediction for regions of arbitrary shapes and sizes in a city. Evaluation on a large scale data set of DiDi Chuxing from cellular data shows that FlowFlexDP accurately predicts passenger demand and outperforms the state-of-the-art demand prediction methods.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"44 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xili Wan, Wentian Zhao, Xinjie Guan, Feng Ye, Guangwei Bai
{"title":"Performance Guaranteed Traffic Signal Control with Frame-Based Algorithm","authors":"Xili Wan, Wentian Zhao, Xinjie Guan, Feng Ye, Guangwei Bai","doi":"10.1109/SAHCN.2018.8397147","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397147","url":null,"abstract":"In urban area, fast growth in the number of vehicles has led to a series of traffic problems, including traffic jams,high traffic accident rates, etc. Efficient traffic signal control methods has been shown to be an essential way to significantly mitigate traffic problems. In this poster, different from previous online methods, we propose a frame-based model and an efficient algorithm to solve the drawbacks of online algorithm by scheduling the vehicles that have accumulated at the intersection over a period of time. Preliminary experiments exhibit that the proposed algorithm could greatly improve the throughput of the intersection.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124745907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Optimal Operation State Scheduling in RF-Powered Internet of Things","authors":"Songyuan Li, Shibo He, Lingkun Fu, Shuo Chen, Jiming Chen","doi":"10.1109/SAHCN.2018.8397136","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397136","url":null,"abstract":"RF power transfer is becoming a reliable solution to energy supplement of Internet of Things (IoT) in recent years, thanks to the emerging off-the-shelf wireless charging and sensing platforms. As a core component of IoT, sensor nodes mounted with these platforms can not work and harvest energy simultaneously, due to the low-manufacture-cost requirement. This leads to a new design challenge of optimally scheduling sensor nodes' operation states: working or recharging, to achieve a desirable network utility. We show that the operation state scheduling problem is quite challenging, since the time-varying network topology leads to spatiotemporal coupling of scheduling strategies. We first consider a single-hop special case of small-scale networks. We employ geometric programming to transfer it into a convex optimization problem, and obtain an optimal analytical solution. Then a general case of large-scale multi-hop networks is investigated. Based on Lyapunov optimization technique, we design a State Scheduling Algorithm (SSA) with a proved performance guarantee. Our algorithm decouples the primal problem by defining a dynamic energy threshold vector, which successfully schedules each sensor node to the desirable state according to its energy level. To verify our design, the SSA is implemented on a Powercast wireless charging and sensing testbed, achieving about 85% of the theoretical optimal with quite low time complexity. Furthermore, numerous simulation results demonstrate that the SSA outperforms the baseline algorithms and achieves good performance under different network settings.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"iPand: Accurate Gesture Input with Smart Acoustic Sensing on Hand","authors":"Shumin Cao, Panlong Yang, Xiangyang Li, Mingshi Chen, Peide Zhu","doi":"10.1109/SAHCN.2018.8397157","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397157","url":null,"abstract":"Finger gesture input is emerged as an increasingly popular means of human-computer interactions. In this demo, we propose iPand, an acoustic sensing system that enables finger gesture input on the skin, which is more convenient, user-friendly and always accessible. Unlike past works, which implement gesture input with dedicated devices, our system exploits passive acoustic sensing to identify the gestures, e.g. swipe left, swipe right, pinch and spread. The intuition underlying our system is that specific gesture emits unique friction sound, which can be captured by the microphone embedded in wearable devices. We then adopt convolutional neural network to recognize the gestures. We implement and evaluate iPand using COTS smartphones and smartwatches. Results from three daily scenarios (i.e., library, lab and cafe) of 10 volunteers show that iPand can achieve the recognition accuracy of 87%, 81% and 77% respectively.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133590090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chi Lin, Jiaye Hu, Yu Sun, Fenglong Ma, Lei Wang, Guowei Wu
{"title":"WiAU: An Accurate Device-Free Authentication System with ResNet","authors":"Chi Lin, Jiaye Hu, Yu Sun, Fenglong Ma, Lei Wang, Guowei Wu","doi":"10.1109/SAHCN.2018.8397108","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397108","url":null,"abstract":"The ubiquitous and fine-grained features of WiFi signals make it promising for achieving device-free authentication. However, traditional methods suffer from drawbacks such as sensitivity to environmental dynamics, low accuracy, long delay, etc. In this paper, we introduce how to validate human identity using the ubiquitous WiFi signals. We develop WiAU, a device-free authentication system which only utilizes a Commodity Off-The-Shelf (COTS) router and a laptop. We describe the constitutions of WiAU and how it works in detail. Through collecting channel state information (CSI) profiles, WiAU automatically segments coherent activities and walking gait using an automatic segment algorithm (ASA). Then, a ResNet algorithm with two dedicated loss functions is designed to validate legal users and recognize illegal ones. Finally, experiments are conducted from different scenes to highlight the superiorities of WiAU in terms of high accuracy, short delay and robustness, revealing that WiAU has an accuracy of over 98% in recognizing human identity and human activities respectively.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133271441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kang Yang, Xiaoqing Gong, Yang Liu, Zhenjiang Li, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang
{"title":"cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing","authors":"Kang Yang, Xiaoqing Gong, Yang Liu, Zhenjiang Li, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang","doi":"10.1109/SAHCN.2018.8397117","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397117","url":null,"abstract":"Mobile sensing is a promising sensing paradigm that utilizes mobile device sensors to collect sensory data about sensing targets and further applies learning techniques to recognize the sensed targets to correct classes or categories. Due to the recent great success of deep learning, an emerging trend is to adopt deep learning in this recognition process, while we find an overlooked yet crucial issue to be solved in this paper - The size of deep learning models should be sufficiently large for reliably classifying various types of recognition targets, while the achieved processing delay may fail to satisfy the stringent latency requirement from applications. If we blindly shrink the deep learning model for acceleration, the performance cannot be guaranteed. To cope with this challenge, this paper presents a compact deep neural network architecture, namely cDeepArch. The key idea of the cDeepArch design is to decompose the entire recognition task into two lightweight sub-problems: context recognition and the context-oriented target recognitions. This decomposition essentially utilizes the adequate storage to trade for the CPU and memory resource consumptions during execution. In addition, we further formulate the execution latency for decomposed deep learning models and propose a set of enhancement techniques, so that system performance and resource consumption can be quantitatively balanced. We implement a cDeepArch prototype system and conduct extensive experiments. The result shows that cDeepArch achieves excellent recognition performance and the execution latency is also lightweight.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bingxian Lu, Zhenquan Qin, Mingyi Yang, Xuhui Xia, Renjie Zhang, Lei Wang
{"title":"Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication","authors":"Bingxian Lu, Zhenquan Qin, Mingyi Yang, Xuhui Xia, Renjie Zhang, Lei Wang","doi":"10.1109/SAHCN.2018.8397149","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397149","url":null,"abstract":"Recent advances in Cross-Technology Communication (CTC) enable the coexistence and collaboration among heterogeneous wireless devices operating in the same ISM band (e.g., Wi-Fi, ZigBee, and Bluetooth in 2.4 GHz). However, state-of-the-art CTC schemes are vulnerable to spoofing attacks since there is no practice authentication mechanism yet. This paper proposes a scheme to enable the spoofing attack detection for CTC in heterogeneous wireless networks by using physical layer information. First, we propose a model to detect ZigBee packets and measure the corresponding Received Signal Strength (RSS) on Wi-Fi devices. Then, we design a collaborative mechanism between Wi-Fi and ZigBee devices to detect the spoofing attack. Finally, we implement and evaluate our methods through experiments on commercial off-the- shelf (COTS) Wi-Fi and ZigBee devices. Our results show that it is possible to measure the RSS of ZigBee packets on Wi-Fi device and detect spoofing attack with both a high detection rate and a low false positive rate in heterogeneous wireless networks.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115417581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}