Quoc-Tuan Vien, Wanqing Tu, H. Nguyen, R. Trestian
{"title":"Cross-layer optimisation for topology design of wireless multicast networks via network coding","authors":"Quoc-Tuan Vien, Wanqing Tu, H. Nguyen, R. Trestian","doi":"10.1109/LCN.2014.6925818","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925818","url":null,"abstract":"One of the main challenges towards reliable multicast transmissions over wireless networks is the dynamics of the wireless links (e.g. wireless errors, fading, interference, collisions, etc.) that can cause retransmissions overhead over the limited available bandwidth. To this end this paper considers the scenario of wireless multicast networks where network coding is applied to improve network throughput. We first propose a novel cross-layer optimisation framework for network topology design in order to optimise the wireless multicast rate, data flow of the wireless links, energy supply and node lifetime. The performance of the proposed solution is evaluated and compared against other solutions from the literature in terms of system throughput, total energy, and network lifetime. The results show that the proposed cross-layer design outperforms the other schemes involved, reaching up to 50% increase in the system throughput.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ismail Mansour, G. Chalhoub, P. Lafourcade, F. Delobel
{"title":"Secure key renewal and revocation for Wireless Sensor Networks","authors":"Ismail Mansour, G. Chalhoub, P. Lafourcade, F. Delobel","doi":"10.1109/LCN.2014.6925797","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925797","url":null,"abstract":"Once a secure mechanism for authenticated communication is deployed in a Wireless Sensor Network (WSN), several situations may arise: a node can leave the network, a new node can join the network, an intruder could try to join the network or capture a node. Therefore it is important to revoke and renew certain keys that are learned by a malicious node. We propose several secure WSN protocols for revocations and renewal of cryptographic keys in the network based on symmetric encryption and elliptic curve cryptography (ECC). For all our solutions, we provide a formal analysis of the security of our protocols using Scyther, an automatic verification tool for cryptographic protocols. All the proposed protocols are proven secure but have different security levels by using different types of keys. Finally we implemented all our protocols on real testbeds using TelosB motes and compared their efficiency.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lobna M. Eslim, H. Hassanein, Walid M. Ibrahim, A. Alma'aitah
{"title":"A cooperative localization scheme using RFID crowdsourcing and time-shifted multilateration","authors":"Lobna M. Eslim, H. Hassanein, Walid M. Ibrahim, A. Alma'aitah","doi":"10.1109/LCN.2014.6925771","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925771","url":null,"abstract":"RFID technology as an enabler of the Internet of Things (IoT) is extensively utilized for object localization. Existing RFID-based object localization techniques follow a centralized and coordinated approach. Indeed, none is designed to leverage RFID crowdsourcing for the purpose of object localization. In this paper, we propose a cooperative scheme to localize mobile RFID tags using heterogeneous, distributed and dynamic mobile RFID readers in indoor/outdoor environments. In addition, we introduce the concept of Time-Shifted Multilateration (TSM) to enhance location estimation accuracy of mobile tags when sufficient synchronous detection information is not available. We validate the proposed scheme and the TSM technique through extensive simulations using ns-3. Results show that our approach can achieve accurate location estimation in typical IoT settings.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123458755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Gen2v2 compliant RFID authentication and ownership management protocol","authors":"Haifeng Niu, S. Jagannathan, E. Taqieddin","doi":"10.1109/LCN.2014.6925788","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925788","url":null,"abstract":"Passive RFID tags and readers are initialized with secret keys which are updated after a successful cycle of authenticatio. Ownership transfer builds upon mutual authentication where a tagged item is shifted from one owner to another. Since the available protocols provide limited security for passive RFID systems and are vulnerable to attackers, we propose a novel ultra-lightweight authentication and ownership management protocol which conforms to the EPC Class-1 Generation-2 Version 2 standard while taking into account the storage and computational resources of the tags. The protocol is successfully implemented on hardware to overcome the weaknesses of the available protocols. The experimental results show that the use of such protocol ensures security with little added communication and computation overhead.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131442753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A deterministic QoE formalization of user satisfaction demands (DQX)","authors":"Christos Tsiaras, B. Stiller","doi":"10.1109/LCN.2014.6925776","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925776","url":null,"abstract":"Measuring the impact of technical variables, such as latency, bandwidth, or resources priority-access, on Quality-of-Experience (QoE) of various services demands an extensive feedback from end-users, when those variables change. Estimating QoE in a given scenario becomes harder, when non-technical variables, such as price, need to be considered in addition to technical ones. In any case, detailed feedback that correlates all variables affecting QoE is needed by end-users for each service separately. In this work a deterministic mathematical model (DQX) encapsulating user demands, service characteristics, and variable specifications is proposed to formalize the QoE calculation, considering one or multiple and diverse variables. The output of QoE functions presented here can be normalized such that results will be compatible with the five-point scale Mean Opinion Score (MOS), proposed by the ITU-T.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124719000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Igor G. Ribeiro, Antonio A. Rocha, C. Albuquerque, Flavio Guimaraes
{"title":"On the possibility of mitigating content pollution in Content-Centric Networking","authors":"Igor G. Ribeiro, Antonio A. Rocha, C. Albuquerque, Flavio Guimaraes","doi":"10.1109/LCN.2014.6925826","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925826","url":null,"abstract":"Content-Centric Networking is an architecture proposal for the future Internet that brings fundamental changes in the way the network operates. Contents are identified and requested based on their names and for security reasons they must be digitally signed by their publishers. Even though this new architecture was designed to be safe, one potential security threat is that malicious publishers may create polluted versions of legitimate contents, reducing their availability and degrading network resources. Because of the non-negligible overhead of checking a large number of signatures, it is not feasible to make it a mandatory task for every router, especially in the network core. In this paper, we propose CCNCheck: a mechanism in which CCN routers probabilistically check the content signatures. We evaluate the mechanism against simulations and found evidences that using CCNCheck increases the fraction of recovered contents and decreases the wastage of network resources.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sven Hager, F. Winkler, B. Scheuermann, Klaus Reinhardt
{"title":"MPFC: Massively Parallel Firewall Circuits","authors":"Sven Hager, F. Winkler, B. Scheuermann, Klaus Reinhardt","doi":"10.1109/LCN.2014.6925785","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925785","url":null,"abstract":"The process of matching the header fields of network packets against a set of rules is a performance critical task of firewalls. Software-based solutions have no chance to keep pace with the ever-growing data rates in high-speed networks. However, specialized filtering hardware is costly because complex logic is required in order to be able to apply arbitrary rulesets to a packet stream. By adapting the implemented logic to the specific firewall ruleset, FPGAs allow for much more specifically tailored and thus more efficient processing than ruleset-independent circuits in an ASIC. We present MPFC, a method to generate customized firewall circuits in the form of synthesizable VHDL code for FPGA configuration. The highly parallel MPFC circuits achieve a deterministic throughput of one packet per clock cycle, can be operated at high clock frequencies, and provide orders of magnitudes shorter processing latencies than previous work in this direction.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cross layer routing scheme for passive RFID tag-to-tag communication","authors":"Haifeng Niu, S. Jagannathan","doi":"10.1109/LCN.2014.6925811","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925811","url":null,"abstract":"A routing protocol for Passive RFID tag-to-tag networks is not reported in contrast with routing protocols for battery powered mobile wireless ad hoc and sensor networks. In this paper, we provide a cross-layer approach for passive RFID tag-to-tag communication. In the data link layer, we designed the medium access control (MAC) protocol which is suitable for passive tag-to-tag communication. In the network layer, we developed the optimal link cost multipath routing (OLCMR) protocol by using modulation depth as the link cost. Simulation results verify that proposed routing protocol consumes less energy when it is compared to optimum link state routing (OLSR). Additionally, when compared to the single path routing, the proposed multipath routing protocol increases the delivery ratio significantly.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-world evaluation of Sensor Context-aware Adaptive Duty-cycled opportunistic routing","authors":"Zhongliang Zhao, T. Braun","doi":"10.1109/LCN.2014.6925764","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925764","url":null,"abstract":"Energy is of primary concern in wireless sensor networks (WSNs). Low power transmission makes the wireless links unreliable, which leads to frequent topology changes. Resulting packet retransmissions aggravate the energy consumption. Beaconless routing approaches, such as opportunistic routing (OR) choose packet forwarders after data transmissions, and are promising to support dynamic features of WSNs. This paper proposes SCAD - Sensor Context-aware Adaptive Duty-cycled beaconless OR for WSNs. SCAD is a cross-layer routing solution and it brings the concept of beaconless OR into WSNs. SCAD selects packet forwarders based on multiple types of network contexts. To achieve a balance between performance and energy efficiency, SCAD adapts duty-cycles of sensors based on real-time traffic loads and energy drain rates. We implemented SCAD in TinyOS running on top of Tmote Sky sensor motes. Real-world evaluations show that SCAD outperforms other protocols in terms of both throughput and network lifetime.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the impact of denial-of-service attacks on wireless sensor networks","authors":"Michael Riecker, Dan Thies, M. Hollick","doi":"10.1109/LCN.2014.6925784","DOIUrl":"https://doi.org/10.1109/LCN.2014.6925784","url":null,"abstract":"Wireless sensor networks (WSNs) are especially susceptible to denial-of-service attacks due to the resource-constrained nature of motes. We follow a systematic approach to analyze the impacts of these attacks on the network behavior; therefore, we first identify a large number of metrics easily obtained and calculated without incurring too much overhead. Next, we statistically test these metrics to assess whether they exhibit significantly different values under attack when compared to those of the baseline operation. The metrics look into different aspects of the motes and the network, for example, MCU and radio activities, network traffic statistics, and routing related information. Then, to show the applicability of the metrics to different WSNs, we vary several parameters, such as traffic intensity and transmission power. We consider the most common topologies in wireless sensor networks such as central data collection and meshed multi-hop networks by using the collection tree and the mesh protocol. Finally, the metrics are grouped according to their capability of distinction into different classes. In this work, we focus on jamming and blackhole attacks. Our experiments reveal that certain metrics are able to detect a jamming attack on all motes in the testbed, irrespective of the parameter combination, and at the highest significance value. To illustrate these facts, we use a standard testbed consisting of the widely-employed TelosB motes.","PeriodicalId":143262,"journal":{"name":"39th Annual IEEE Conference on Local Computer Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}