2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)最新文献

筛选
英文 中文
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain 一种基于区块链的可穿戴智能传感设备隐私友好方案
Guishan Dong, Yuxiang Chen, Jia Fan, Dijun Liu, Yao Hao, Zhen Wang
{"title":"A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain","authors":"Guishan Dong, Yuxiang Chen, Jia Fan, Dijun Liu, Yao Hao, Zhen Wang","doi":"10.1109/MASS.2018.00073","DOIUrl":"https://doi.org/10.1109/MASS.2018.00073","url":null,"abstract":"Wearable smart sensing devices presently become more and more popular in people's daily life, which also brings serious problems related to personal data privacy. In order to provide users better experiences, wearable smart sensing devices are collecting users' personal data all the time and uploading the data to service provider to get computing services, which objectively let service provider master each user's condition and cause a lot of problems such as spam, harassing call, etc. This paper designs a blockchain based scheme to solve such problems by cutting off the association between user identifier and its sensing data from perspective of shielding service providers and adversaries. Firstly, privacy requirements and situations in smart sensing area are reviewed. Then, three key technologies are introduced in the scheme including its theories, purposes and usage. Next, the designed protocol is shown and analyzed in detail. Finally, security analysis and engineering feasibility of the scheme are given. This scheme will give user better experience from privacy protection perspective in smart sensing area.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127963390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Wireless Tags to Monitor Bodily Oscillation 使用无线标签监测身体振动
Youlin Zhang, Shigang Chen, You Zhou, Yuguang Fang
{"title":"Using Wireless Tags to Monitor Bodily Oscillation","authors":"Youlin Zhang, Shigang Chen, You Zhou, Yuguang Fang","doi":"10.1109/MASS.2018.00042","DOIUrl":"https://doi.org/10.1109/MASS.2018.00042","url":null,"abstract":"Traditional systems for monitoring and diagnosing patients' health conditions often require either dedicated medical devices or complicated system deployment, which incurs high cost. The networking research community has recently taken a different technical approach of building health-monitoring systems at relatively low cost based on wireless signals. However, the RF signals carry various types of noise and have time-varying properties that often defy the existing methods in more demanding conditions with other body movements, which makes it difficult to model and analyze the signals mathematically. In this paper, we design a novel wireless system using commercial off-the-shelf RFID readers and tags to provide a general and effective means of measuring bodily oscillation rates, such as the hand tremor rate of a patient with Parkinson's disease. Our system includes a series of noise-removal steps, targeting at noise from different sources. More importantly, it introduces two sliding window-based methods to deal with time-varying signal properties from channel dynamics and irregular body movement. The proposed system can measure bodily oscillation rates of multiple persons simultaneously, even when the individuals are moving. Extensive experiments show that our system can produce accurate measurement results with errors less than 0.3 oscillations per second when it is applied to monitor hand tremor.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Voiceprint-Based Access Control for Wireless Insulin Pump Systems 基于声纹的无线胰岛素泵系统访问控制
Bin Hao, X. Hei, Yazhou Tu, Xiaojiang Du, Jie Wu
{"title":"Voiceprint-Based Access Control for Wireless Insulin Pump Systems","authors":"Bin Hao, X. Hei, Yazhou Tu, Xiaojiang Du, Jie Wu","doi":"10.1109/MASS.2018.00046","DOIUrl":"https://doi.org/10.1109/MASS.2018.00046","url":null,"abstract":"Insulin pumps have been widely used by patients with diabetes. Insulin pump systems adopt wireless channel with few cryptographic mechanisms, which makes them vulnerable to many attacks. In this paper, we focus on the wireless channel between Carelink USB and insulin pump on which the attackers can launch message eavesdropping and/or therapy manipulation attacks, which may put the patient in a life-threatening situation. Some prior solutions such as certificate-based or token-based schemes need either complicated key management or additional devices. We propose a novel voiceprint-based access control scheme comprising anti-replay speaker verification and voiceprint-based key agreement to secure the channel between the Carelink USB and insulin pump. Our scheme does not need permanent key sharing or additional devices. The anti-replay speaker verification adopts cascaded fusion of speaker verification and anti-replay countermeasure to ensure the insulin pump can be accessed by Carelink USB only after the legitimate user passes the identity verification. The evaluation on ASVspoof 2017 datasets shows that our scheme achieves a 4.02% Equal Error Rate (EER) with the existence of replay impostors. Besides, our scheme uses energy-difference-based voiceprint extraction and secure multi-party computing to generate a common cryptography (temporary) key between the Carelink USB and insulin pump, which can be used to encrypt the subsequent communication, and protect the insulin pump from eavesdropping and therapy manipulation attacks. By appropriately setting the similarity threshold of voiceprints, our key agreement scheme allows the insulin pump to establish a secure channel only with the device in its close proximity.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Assisted Traffic Redundancy Elimination for Power Efficiency in Smartphones 云辅助流量冗余消除智能手机的电源效率
Shenghua He, Haiying Shen, Vivekgautham Soundararaj, Lei Yu
{"title":"Cloud Assisted Traffic Redundancy Elimination for Power Efficiency in Smartphones","authors":"Shenghua He, Haiying Shen, Vivekgautham Soundararaj, Lei Yu","doi":"10.1109/MASS.2018.00060","DOIUrl":"https://doi.org/10.1109/MASS.2018.00060","url":null,"abstract":"The exceptional increase in the usage of smartphones has contributed to a massive increase in data traffic from application servers to the smartphones, which not only strains their computation capacities and batteries but also bogs down the last hop in data transmission. For this problem, traffic redundancy elimination (TRE) is an effective solution, in which a chunk to be transmitted could be directly fetched from the receiver's cache. However, existing TRE solutions either cannot be directly applied to or are not suitable for smartphones due to high computing and energy overhead imposed on smartphones. To address this problem, in this paper, we propose a novel TRE system, called TailoredRE, which consists of three components. First, each smartphone has a clone in the cloud that is responsible for computation intensive tasks including parsing traffic and detecting redundancy. Second, considering that each mobile user has certain applications (e.g., YouTube) to use in daily life, each smartphone's clone selectively chooses the applications that are most frequently used by the user and also have high redundancy ratios to cache data. Third, considering that some users always have common favorite applications, TailoredRE clusters their clones together to cooperatively conduct the redundancy detection task in order to reduce the cache resource consumption in the cloud. We collected traces from eleven applications including Web Browser, YouTube, CNN, Quora, Instagram and Facebook, and used the traces in simulation. We also implemented and open-sourced TailoredRE and conducted prototype-based experiments. Experiment results show that TailoredRE can achieve much higher cache hit rate, end-to-end throughput, bandwidth saving and energy efficiency compared with previous TRE methods.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds 通过移动边缘云的动态计算卸载实现能源效率
Zeyu Meng, Hongli Xu, Liusheng Huang, Peng Xi, Shuang Yang
{"title":"Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds","authors":"Zeyu Meng, Hongli Xu, Liusheng Huang, Peng Xi, Shuang Yang","doi":"10.1109/MASS.2018.00038","DOIUrl":"https://doi.org/10.1109/MASS.2018.00038","url":null,"abstract":"There is a fundamental and critical problem in modern mobile applications, in which the battery life of mobile devices is usually limited. Recently, some researchers prolong the life of batteries by offloading computation tasks to edge-servers which are deployed near the mobile devices. However, computing offloading causes extra delay, which may severely downgrade the user experience especially for the delay-sensitive applications. Moreover, the dynamic nature of mobile devices and the limited computation capacity of edge-servers also bring another challenges for tradeoff optimization between energy consumption and task completion latency. In this paper, we propose a dynamic computing offloading (DCL) problem, which aims to minimize the maximum energy consumption of the mobile devices with constraints on computation tasks latency in a Mobile Edge-Computing (MEC) network. To solve the problem, we consider two complementary cases: offline case (we sacrifice response time to achieve better service results) and online case (where we have to make immediate offloading decision for each computation task arrived online). For the offline case, we propose an efficient RMCL algorithm, and prove that our RMCL method achieves at least O((log m)/α + 1) of the optimum with high probability, where m is the number of computation tasks in a time slot, and α is a value depending on the minimum edge-server capacity and the maximum computation task demand, with α ≥ 1 under most practical situations. For the online case, we propose an algorithm, named OMCL, which considers a trade off between the latency and energy consumption. The performance of our proposed algorithms is evaluated by formal analysis and simulation on a small-scale system. The simulation results show that the algorithm can reduce the maximum energy consumption in a set of mobile devices by 40% compared with executing computation tasks locally.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114831312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment MRDroid: Android恶意软件风险评估的多行为分类模型
Jianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Wei-qing Huang, Gang Li
{"title":"MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment","authors":"Jianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Wei-qing Huang, Gang Li","doi":"10.1109/MASS.2018.00020","DOIUrl":"https://doi.org/10.1109/MASS.2018.00020","url":null,"abstract":"Risk Score (RS) on Android is aiming at offering measurement to users for evaluating the apps' trustworthiness. Much work has been done to assess Android app's risk, but few jobs use various assessment systems to analyze Android apps with various malicious acts. However, it is hard for a single system to analyze those multiple categories Android apps. To overcome such limitations, we propose a multi-act classification model MRDroid for Android malware risk assessment in this paper, which presorts an app to one category, then uses the most suitable subsystem corresponding to that category to analyze the app for giving a RS. Base on this model, we implement an Android malware risk assessment system utilizing a machine learning solution with k-means algorithm for clustering benign and malware samples to various categories and the supervised algorithms for generating specific subsystems. It can be also used for Android malware detection under the condition of human confirmation. Experiments show that MRDroid provides high detection precision and offers stable and reliable risk assessment. Though testing our system using the dataset different from the system used, the result indicates it is also effective in detecting some unknown samples.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115903534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud Control to Optimize Real-Time Video Transmission in Dense IEEE 802.11aa/ax Networks 云控制优化密集IEEE 802.11aa/ax网络中的实时视频传输
E. Khorov, A. Ivanov, A. Lyakhov, I. Akyildiz
{"title":"Cloud Control to Optimize Real-Time Video Transmission in Dense IEEE 802.11aa/ax Networks","authors":"E. Khorov, A. Ivanov, A. Lyakhov, I. Akyildiz","doi":"10.1109/MASS.2018.00040","DOIUrl":"https://doi.org/10.1109/MASS.2018.00040","url":null,"abstract":"Inter-and intra-cell interferences significantly degrade the quality of service (QoS) in dense Wi-Fi networks. A promising way to cope with the interference is the use of centralized coordination of various stations in a Wi-Fi infrastructure network. Specifically, to avoid interference from the neighbors, the interfering stations need to execute orthogonal channel access and transmit data in non-overlapping channel times. The paper studies how to use the the features of IEEE 802.11aa/ax in order to guarantee reliable real-time video communication in dense Wi-Fi networks. In particular, IEEE 802.11aa allows an access point to reserve in advance a periodic sequence of channel times during which the data can be transmitted only between two devices, while the neighboring devices should keep silent. IEEE 802.11ax introduces trigger-based multi-user access, which can be done in a periodic way. To optimize and synchronize schedules of various access points a cloud controller can be used. Because of the random nature of the wireless channel and dynamic bit rate of a video stream, the amount of needed channel time varies. The paper proposes an approach on how to jointly use the reserved channel times and the idle channel times in order to satisfy QoS requirements of real-time video transmissions. A mathematical model is developed which can be used at the cloud controller to optimize the performance of the designed approach in terms of satisfying QoS requirements with the minimal channel time consumption. The high efficiency of the designed approach is evaluated with the real video traces.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Spectrum Aware Routing Protocol in Cognitive Radio Ad Hoc Networks 认知无线电自组织网络中的频谱感知路由协议
Beomsu Kim, Ki-Il Kim, Bongsoo Roh, Hyungseok Choi
{"title":"A Spectrum Aware Routing Protocol in Cognitive Radio Ad Hoc Networks","authors":"Beomsu Kim, Ki-Il Kim, Bongsoo Roh, Hyungseok Choi","doi":"10.1109/MASS.2018.00033","DOIUrl":"https://doi.org/10.1109/MASS.2018.00033","url":null,"abstract":"In this paper, we present a new spectrum aware routing protocol that is based on the number of available channels obtained by prediction algorithm and number of hops to reduce the end-to-end delay in cognitive radio ad hoc networks. Simulation results are given to demonstrate the shorten end-to-end delay in the aspects of mobility speed and varying number of channels.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123015034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks 无人机辅助无线网络中业务量与计算量卸载的联合优化
Xianlang Hu, Xiaoxiao Zhuang, Guangsheng Feng, Haibin Lv, Huiqiang Wang, Junyu Lin
{"title":"Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks","authors":"Xianlang Hu, Xiaoxiao Zhuang, Guangsheng Feng, Haibin Lv, Huiqiang Wang, Junyu Lin","doi":"10.1109/MASS.2018.00072","DOIUrl":"https://doi.org/10.1109/MASS.2018.00072","url":null,"abstract":"Wireless communication via unmanned aerial vehicles (UAVs) is a promising way to provide transmission coverage and computation capacity for mobile user devices, especially in remote areas where the communication resources and infrastructures are extremely limited. In this paper, we study a UAV-assisted traffic and computation offloading (UTCO) problem, where one UAV can provide communication and computation capabilities for its covered user equipments (UEs). The UTCO problem is formulated as a problem of maximizing user satisfaction, in which the bandwidth allocation, transmit power including the UEs and UAV, and UAV trajectory are jointly considered. However, the UTCO problem is proven to be non-convex and some variables are nonlinear coupled, which cause it difficult to be solved optimally. To tackle this challenge, we propose a two-stage alternative optimization approach by leveraging successive convex approximation (SCA) method to obtain a near-optimal solution. The simulation results show that the proposed approach can achieve an outstanding performance in convergence speed and user satisfaction.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Energy Replenishment Problem in Mobile WRSNs 移动水源网络的能量补充问题
Chien-Fu Cheng, Chenchao Wang
{"title":"The Energy Replenishment Problem in Mobile WRSNs","authors":"Chien-Fu Cheng, Chenchao Wang","doi":"10.1109/MASS.2018.00029","DOIUrl":"https://doi.org/10.1109/MASS.2018.00029","url":null,"abstract":"The energy replenishment problem is an important issue in Wireless Rechargeable Sensor Networks (WRSNs). In this paper, we discuss how to make use of the mobility capability of sensors to balance energy consumption among mobile sensors before they get assistance from fully charged redundant mobile sensors.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123936289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信