2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)最新文献

筛选
英文 中文
SteerTrack: Acoustic-Based Device-Free Steering Tracking Leveraging Smartphones SteerTrack:基于声音的无设备转向跟踪利用智能手机
Xiangyu Xu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Minglu Li
{"title":"SteerTrack: Acoustic-Based Device-Free Steering Tracking Leveraging Smartphones","authors":"Xiangyu Xu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Minglu Li","doi":"10.1109/SAHCN.2018.8397115","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397115","url":null,"abstract":"Given the increasing popularity, mobile devices are exploited to enhance active driving safety nowadays. Among all safety services provided for vehicles, tracking the rotation angle of steering wheel in real time can monitor the vehicles' dynamics and drivers' behaviors at the same time. In this paper, we propose a steering tracking system, SteerTrack, which tracks the rotation angle of steering wheel in real time leveraging audio devices on smartphones. SteerTrack seeks a device-free approach for steering tracking without requiring installation of specialized sensors on steering wheels nor asking drivers to wear sensors on their wrists. Since the steering wheel is operated by a driver's hands, the rotation angle of steering wheel can be tracked based on movements of the driver's hands. SteerTrack first builds an acoustic signal field inside of a vehicle and then analyzes the echoes reflected from the driver's hands with relative correlation coefficient(RCC) and reference frame to track the movement trajectory of hands under different steering maneuvers. Given the tracked movement trajectory, SteerTrack further develops a geometrical transformation-based method for estimating the rotation angle of steering wheel in 3D driving environments by projecting the steering wheel to a 2D ellipse. Through extensive experiments in real driving environments with 5 volunteers for several weeks, SteerTrack can achieve an average error of 4.61 degree for estimating the rotation angle of steering wheel.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
AHT: Application-Based Handover Triggering for Saving Energy in Cellular Networks 基于应用的切换触发在蜂窝网络中节能
Di Zhang, Yuezhi Zhou, Xiang Lan, Yaoxue Zhang, Xiaoming Fu
{"title":"AHT: Application-Based Handover Triggering for Saving Energy in Cellular Networks","authors":"Di Zhang, Yuezhi Zhou, Xiang Lan, Yaoxue Zhang, Xiaoming Fu","doi":"10.1109/SAHCN.2018.8397106","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397106","url":null,"abstract":"Nowadays, multiple heterogeneous cellular networks coexist simultaneously, and mobile devices can freely select the appropriate network for data communication. Our measurement studies show that a barrier exists between heterogeneous cellular networks and applications. Triggering handovers between various cellular networks can break the barrier and present the promise of saving energy for cellular data communication. However, most existing network handover triggering methods do not adequately incorporate the characteristics of applications and may cause unnecessary handovers. In this paper, we propose an application-based handover triggering method called AHT. According to the applications that are used by users, AHT triggers handovers between high-performance and energy-efficient cellular networks, thus conserving energy. Based on the user experience (UX) requirements, AHT classifies applications into UX- sensitive and insensitive ones. AHT determines whether and when to switch to the high-performance network (e.g., LTE) in accordance with the predicted UX-sensitive application and estimated usage time, and triggers handovers to the energy- efficient network (e.g., UMTS) through an idle timer. We evaluate the performance of AHT with real application usage traces. Experimental results show that AHT saves up to 60.7% and 32.8% energy compared with the pure LTE network transmission and the screen-based handover triggering scheme Intelli3G, respectively.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125186941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ThunderLoc: Smartphone-Based Crowdsensing for Thunder Localization ThunderLoc:基于智能手机的《雷霆》定位Crowdsensing
Naigao Jin, Xinchaun Zhou, Chi Lin, Lei Wang, Yu Liu, Mathew L. Wymore, D. Qiao
{"title":"ThunderLoc: Smartphone-Based Crowdsensing for Thunder Localization","authors":"Naigao Jin, Xinchaun Zhou, Chi Lin, Lei Wang, Yu Liu, Mathew L. Wymore, D. Qiao","doi":"10.1109/SAHCN.2018.8397150","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397150","url":null,"abstract":"Thunder localization provides an important solution to lightning location systems. This paper designs a smartphone- based thunder localization system, ThunderLoc. The key idea is to turn the localization problem into search problem in Hamming space by collecting the dual-microphone data of smartphones via crowdsensing mechanism. We utilized the TDOA of dual- microphone integrated in smartphone. After the quantization with a bit for the TDOA measurement from the smartphone nodes, thunder localization is performed by minimizing the Hamming distance between the measured binary sequence and the binary vectors in a database. Evaluation results demonstrate that ThunderLoc can effectively localize the virtual thunder with good robustness.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Online Incentive Mechanism for Mobile Crowdsourcing Based on Two-Tiered Social Crowdsourcing Architecture 基于双层社会众包架构的移动众包在线激励机制
Jia Xu, Chengcheng Guan, Haobo Wu, Dejun Yang, Lijie Xu, Tao Li
{"title":"Online Incentive Mechanism for Mobile Crowdsourcing Based on Two-Tiered Social Crowdsourcing Architecture","authors":"Jia Xu, Chengcheng Guan, Haobo Wu, Dejun Yang, Lijie Xu, Tao Li","doi":"10.1109/SAHCN.2018.8397102","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397102","url":null,"abstract":"Mobile crowdsourcing has become an efficient paradigm for performing large scale tasks. The incentive mechanism is important for the mobile crowdsourcing system to stimulate participants, and to achieve good service quality. In this paper, we focus on solving the insufficient participation problem in the budget constrained online crowdsourcing system. We present a two-tiered social crowdsourcing architecture, which can enable the selected registered users to recruit their social neighbors by diffusing the tasks to their social circles. In the two-tiered social crowdsourcing system, the tasks are associated with different end times, and both the registered users and their social neighbors have different arrival/departure times. An online incentive mechanism, MTSC, which consists of two steps: Agent Selection and Online Reverse Auction, is proposed for this novel mobile crowdsourcing system. Through both rigorous theoretical analysis and extensive simulations, we demonstrate that the proposed incentive mechanism achieves computational efficiency, individual rationality, budget feasibility, cost truthfulness, and time truthfulness.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128280990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Demonstration of Path-Based Packet Batcher for Accelerating Vectorized Packet Processing 加速矢量分组处理的基于路径的分组处理机演示
Jinli Yan, Tao Li, Sheng Wang, Gaofeng Lv, Zhigang Sun
{"title":"Demonstration of Path-Based Packet Batcher for Accelerating Vectorized Packet Processing","authors":"Jinli Yan, Tao Li, Sheng Wang, Gaofeng Lv, Zhigang Sun","doi":"10.1109/SAHCN.2018.8397154","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397154","url":null,"abstract":"Recently, a major challenge on generic multi-core network processing platforms is how to improve packet processing performance. Vector packet processor (VPP) is a modularized and high- performance software framework for building network dataplane applications. The key idea of VPP is to reduce instruction cache (i-cache) misses with vectorized packet processing. However, the packets in a vector may traverse different processing paths in some scenarios. In such case, the vector is split into several smaller vectors, and the per- packet overhead would increase. In this paper, we propose a Path-based Packet Batcher (PPB) to accelerate VPP. PPB is transparent to VPP, and it requires no modification to VPP. Before VPP processes packets, PPB batches the packets based on the processing paths they will traverse. We build a prototype based on FPGA to evaluate the performance optimizations to VPP with PPB. Experiment results show that the reduction of i-cache misses can be up to 57.6% when the batch size is 128.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128338277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain 面向接收者的交易,防止私有区块链中的双重支出攻击
Hyunjae Lee, Myungjae Shin, K. Kim, Y. Kang, Joongheon Kim
{"title":"Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain","authors":"Hyunjae Lee, Myungjae Shin, K. Kim, Y. Kang, Joongheon Kim","doi":"10.1109/SAHCN.2018.8397151","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397151","url":null,"abstract":"This paper presents a new approach for avoiding double-spending attacks via the concept of recipient-oriented concepts in private blockchain networks. Together with the concepts of stealth address and masternode at recipient sides, transactional privacy is assured and transaction recipients become active which receive transaction propagation unilaterally. Based on this approach, it can be shown that recipient-oriented method is suggested for preventing the double-spending attacks in this paper. In addition, the proposed method is possible to prevent double spending attacks using the verification time of the recipient and blocking time of the transaction.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Missing-Tag Detection with Presence of Unknown Tags 缺失标签检测与未知标签的存在
Youlin Zhang, Shigang Chen, You Zhou, Olufemi O. Odegbile
{"title":"Missing-Tag Detection with Presence of Unknown Tags","authors":"Youlin Zhang, Shigang Chen, You Zhou, Olufemi O. Odegbile","doi":"10.1109/SAHCN.2018.8397133","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397133","url":null,"abstract":"Radio Frequency Identification (RFID) technology has been proliferating in recent years, especially with its wide usage in retail, warehouse and supply chain management. One of its most popular applications is to automatically detect missing products (attached with RFID tags) in a large storage place. However, most existing protocols assume that the IDs of all tags within a reader's coverage are known, while ignoring practical scenarios where the IDs of some tags may be unknown. The existence of these unknown tags will introduce false positives in those protocols, degrading their performance. Some prior art studies this problem, but their time efficiency is low, especially when the number of unknown tags is large. In this paper, we propose a missing tag detection protocol based on compressed filters, which not only reduces the filter size for better time-efficiency but also helps dampen the interference of unknown tags for high missing-tag detection accuracy. To further improve the performance, we propose a new way for tags to report their presence, greatly reducing collisions and thus improving the detection probability. Extensive simulations demonstrate that our compressed filter and collision-reduction method reduce the protocol execution time by 83% to 92% under the same missing-tag detection probability, when comparing with the best prior work.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130161257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Efficiency and Detectability of Random Reactive Jamming in Wireless Networks 无线网络中随机无功干扰的有效性和可检测性
Ni An, S. Weber
{"title":"Efficiency and Detectability of Random Reactive Jamming in Wireless Networks","authors":"Ni An, S. Weber","doi":"10.1109/SAHCN.2018.8397097","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397097","url":null,"abstract":"A natural basis for the detection of a wireless random reactive jammer (RRJ) is the perceived violation by the detector (typically located at the access point (AP)) of the carrier sensing protocol underpinning many wireless random access protocols (e.g., WiFi). Specifically, when the wireless medium is perceived by a station to be busy, a carrier sensing compliant station will avoid transmission while a RRJ station will often initiate transmission. However, hidden terminals, i.e., activity detected by the AP but not by the sensing station, complicate the use of carrier sensing as the basis for RRJ detection since they provide plausible deniability to a station suspected of being an RRJ. The RRJ has the dual objectives of avoiding detection and effectively disrupting communication, but there is an inherent performance tradeoff between these two objectives. In this paper we capture the behavior of both the RRJ and the compliant stations via a parsimonious Markov chain model, and pose the detection problem using the framework of Markov chain hypothesis testing. Our analysis yields the receiver operating characteristic (ROC) of the detector, and the optimized behavior of the RRJ. While there has been extensive work in the literature on jamming detection, our innovation lies in leveraging carrier sensing as a natural and effective basis for detection.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Efficiency Maximization in Multi-User Miso Mixed RF/VLC Heterogeneous Cellular Networks 多用户Miso混合射频/VLC异构蜂窝网络的能效最大化
Yi-Chun Hsiao, Chienchua Chen, Che Lin
{"title":"Energy Efficiency Maximization in Multi-User Miso Mixed RF/VLC Heterogeneous Cellular Networks","authors":"Yi-Chun Hsiao, Chienchua Chen, Che Lin","doi":"10.1109/SAHCN.2018.8397105","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397105","url":null,"abstract":"In this work, we consider coordinated beamforming design in a multi-user multiple-input single output (MISO) downlink heterogeneous cellular network (HCN) that combines radio frequency (RF) and visible light communication (VLC). VLC can exploit the illumination efficiently but cannot transmit signal in the absence of a line-of-sight (LOS) since the performance will be degraded significantly. Our goal in this paper is to maximize energy efficiency (EE) of the entire communication system with quality-of-service (QoS) constraints of all users in the femtocell. We formulate the problem as a fractional programming problem, which is difficult to solve due to the non-convex objective function and constraints. To tackle this problem, we introduce slack variables and use several approximation techniques to reformulate the original problem into an approximated convex problem. To further improve EE of the system, we apply such convex approximation successively to devise an successive convex approximation (SCA) algorithm. Based on extensive numerical experiments, we observe that the EE performance of the proposed mixed RF/VLC network architecture is significantly better than that without VLC by as much as 67.6% and 43.5% when the RF and VLC circuit power are low (1 W for both cases). In summary, we demonstrate that the RF/VLC network architecture is much more energy efficient than those without VLC.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
UltraGesture: Fine-Grained Gesture Sensing and Recognition 超手势:细粒度手势感知和识别
Kang Ling, Haipeng Dai, Yuntang Liu, A. Liu
{"title":"UltraGesture: Fine-Grained Gesture Sensing and Recognition","authors":"Kang Ling, Haipeng Dai, Yuntang Liu, A. Liu","doi":"10.1109/SAHCN.2018.8397099","DOIUrl":"https://doi.org/10.1109/SAHCN.2018.8397099","url":null,"abstract":"With the rising of AR/VR technology and miniaturization of mobile devices, gesture is becoming an increasingly popular means of interacting with smart devices. Some pioneer ultrasound based human gesture recognition systems have been proposed. They mostly rely on low resolution Doppler Effect, and hence focus on whole hand motion and cannot deal with minor finger motions. In this paper, we present UltraGesture, a Channel Impulse Response (CIR) based ultrasonic finger motion perception and recognition system. CIR measurements can provide with 7 mm resolution, rendering it sufficient for minor finger motion recognition. UltraGesture encapsulates CIR measurements into an image, and builds a Convolutional Neural Network model to classify these images into different categories, which corresponding to distinct gestures. Our system runs on commercial speakers and microphones that already exist on most mobile devices without hardware modification. Our results show that UltraGesture achieves an average accuracy of greater than 97% for 12 gestures including finger click and rotation.","PeriodicalId":139623,"journal":{"name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信