Shaopeng Liang, Ziqing Wang, Wenwen Chen, Yehan Ren, Qitian Wang
{"title":"Physical Intrusion Detection System Based on Behavioral Sign Recognition","authors":"Shaopeng Liang, Ziqing Wang, Wenwen Chen, Yehan Ren, Qitian Wang","doi":"10.1109/MASS.2018.00078","DOIUrl":"https://doi.org/10.1109/MASS.2018.00078","url":null,"abstract":"In this paper, we propose an all-weather, multi-angle, dynamic face recognition algorithm for home security. Combined with the gesture recognition algorithm, it is able to effectively react to the intrusion behavior and ensure the security of the user’s property. When the family members’ lives are threatened, they can promptly send out a distress signal to the police to protect the life of the user. At the same time, it will record the criminal course of the intruder, provide convenience for the police to follow up the case, and effectively improve the detection rate of cases such as burglary and robbery. It is of great significance to promote social harmony and stability.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132075696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anuj Dimri, Harsimran Singh, Shamik Sarkar, S. Kasera, Neal Patwari, Aditya Bhaskara, K. Derr, Samuel Ramirez
{"title":"Privacy Enabled Noise Free Data Collection in Vehicular Networks","authors":"Anuj Dimri, Harsimran Singh, Shamik Sarkar, S. Kasera, Neal Patwari, Aditya Bhaskara, K. Derr, Samuel Ramirez","doi":"10.1109/MASS.2018.00013","DOIUrl":"https://doi.org/10.1109/MASS.2018.00013","url":null,"abstract":"Many networked users through their devices are interested in participating in distributed sensing and data collection for the purpose of betterment of human society or for earning rewards. Preservation of their location privacy is an important requirement for users participating and contributing to the data collection. We develop a novel privacy preserving approach for collecting noise-free data from vehicular users. Collection of noise-free, \"pure\" data, enhances its utility in the applications that use it. Location privacy must be preserved from the entity that we call a central controller, that collects all the vehicular data, and is assumed to be adversarial. We collect the data in a noise-free form by introducing temporal and spatial variations using Random Delays and Indirections. We run simulations using network and vehicle simulators driven by a real-world traffic scenario from the city of Luxembourg to evaluate our approach. Our simulation results show that the adversary cannot localize the uploaders within the thresholds of the number of streets and the length of the region of interest chosen by them.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative Anomaly Detection Algorithm Based on Time Series Analysis","authors":"Jingxiang Qi, Yanjie Chu, Liang He","doi":"10.1109/MASS.2018.00085","DOIUrl":"https://doi.org/10.1109/MASS.2018.00085","url":null,"abstract":"Anomaly detection is a concerned field in recent years, which plays an important role in improving network performance, finding network anomalies in time and ensuring network security. Traditional anomaly detection algorithms are based on whether the traffic features exceed a given threshold to determine the anomaly, which have low accuracy. And recently, lots of works which are based on statistical model or machine learning can't deal with the impact of outliers on the subsequent fitting, so the results are not perfect enough. In this paper, a new iterative anomaly detection algorithm based on time series analysis is proposed. The algorithm detects anomalies by automatically fitting the best ARMA model iteratively, and detects the first anomaly point in each iteration. This method can produce more precise results, and has the features of high accuracy and low misjudgment rate.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131416443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Five Important Attack in Round Function Using SIMECK Algorithm","authors":"Sofu Risqi","doi":"10.1109/MASS.2018.00080","DOIUrl":"https://doi.org/10.1109/MASS.2018.00080","url":null,"abstract":"Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher algorithm which is used. In this research, fixed point attack is done to determine the application of SIMECK lightweight block cipher scheme PGV-5 hash function in accordance with the characteristics of the five important attack. SIMECK is a new lightweight block cipher design based on the combination of SIMON and SPECK block cipher. While the design allows a smaller and more efficient hardware implementation, its security margins are not well understood. Five important attack is applied to generate all possible 2^32 plaintext with 3 random IV. The result of this research, block cipher-based hash function with PGV-5 scheme using SIMECK algorithm, is not resistant against five important attack where the probabilities to obtain collision is 0.00000000139 in the three IV random samples which are used","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fusion Method of Multiple Sensors Data on Panorama Video for Airport Surface Surveillance","authors":"Hui Yao, Honggang Wu, DongLin He, Min Wu","doi":"10.1109/MASS.2018.00077","DOIUrl":"https://doi.org/10.1109/MASS.2018.00077","url":null,"abstract":"This paper proposes a fusion method of multiple sensors data on panoramic video and is applied to airport surface surveillance. The framework flow chart is given, then the whole processes of the fusion method are described in detail. The transformation principle between pixel coordinates and global position system(GPS) coordinates is introduced. We develop a new method to get the optimal value of homography trans-formation, which is more suitable for engineering application. In the end, the experimental results proves the effectiveness of the proposed method.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Dou, Jin Lu, Zigeng Wang, Xia Xiao, J. Bi, Chun-Hsi Huang
{"title":"Top-Down Indoor Localization with Wi-Fi Fingerprints Using Deep Q-Network","authors":"Fei Dou, Jin Lu, Zigeng Wang, Xia Xiao, J. Bi, Chun-Hsi Huang","doi":"10.1109/MASS.2018.00037","DOIUrl":"https://doi.org/10.1109/MASS.2018.00037","url":null,"abstract":"The location-based services for Internet of Things (IoTs) have attracted extensive research effort during the last decades. Wi-Fi fingerprinting with received signal strength indicator (RSSI) has been widely adopted in vast indoor localization systems due to its relatively low cost and the potency for high accuracy. However, the fluctuation of wireless signal resulting from environment uncertainties leads to considerable variations on RSSIs, which poses grand challenges to the fingerprint-based indoor localization regarding positioning accuracy. In this paper, we propose a top-down searching method using a deep reinforcement learning agent to tackle environment dynamics in indoor positioning with Wi-Fi fingerprints. Our model learns an action policy that is capable to localize 75% of the targets in an area of 25000m2 within 0.55m.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"94 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CREAM: Unauthorized Secondary User Detection in Fading Environments","authors":"Xiaonan Zhang, Pei Huang, Qi Jia, Linke Guo","doi":"10.1109/MASS.2018.00064","DOIUrl":"https://doi.org/10.1109/MASS.2018.00064","url":null,"abstract":"Dynamic Spectrum Access (DSA) has emerged as a major technology in the future wireless system to alleviate the worldwide spectrum scarcity issue. Authorized secondary users can take advantages of underutilized spectrum for communication. However, due to the open nature of the wireless medium, the DSA system suffers spectrum misuse by unauthorized secondary users, and thus fewer users would participate in DSA. Although many existing works have implemented misuse detection schemes into DSA, practical concerns, such as channel fading issues, are not well addressed. Therefore, how to ensure the reliable communication among authorized secondary users in a practical channel model becomes a challenging issue. In this paper, we propose CREAM, a physical-layer based misuse detection scheme specifically in the fading environment, which conceals the unforgeable spectrum permit into the message by superposition modulation for verification. Given the pre-shared secret information, the third-party verifier can perform efficient detection on unauthorized spectrum access. Detailed analysis and simulation results demonstrate the security, accuracy, efficiency, and low intrusion to message transmission in fading environments.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128965773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tong Shen, Yuexuan Wang, Zhaoquan Gu, Dongda Li, Zhen Cao, Heming Cui, F. Lau
{"title":"Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale Network","authors":"Tong Shen, Yuexuan Wang, Zhaoquan Gu, Dongda Li, Zhen Cao, Heming Cui, F. Lau","doi":"10.1109/MASS.2018.00058","DOIUrl":"https://doi.org/10.1109/MASS.2018.00058","url":null,"abstract":"Neighbor discovery is a fundamental step in constructing wireless sensor networks and many algorithms have been proposed aiming to minimize its latency. Recent developments of intelligent devices call for new algorithms, which are subject to energy restrictions. In energy-restricted large-scale networks, a node has limited power supply and can only discover other nodes that are within its range. Additionally, the discovery process may fail if excessive communications take place in a wireless channel. These factors make neighbor discovery a very challenging task and only a few of the proposed neighbor discovery algorithms can be applied to energy-restricted large-scale networks. In this paper, we propose Alano, a nearly optimal algorithm for a large-scale network, which uses the nodes' distribution as a key input. When nodes have the same energy constraint, we modify Alano by the Relaxed Difference Set (RDS), and present a Traversing Pointer (TP) based Alano when the nodes' energy constraints are different. We compare Alano with the state-of-the-art algorithms through extensive evaluations, and the results show that Alano achieves at least 31.35% lower discovery latency and has higher performance regarding quality (discovery rate) and scalability.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Resource Overbooking Mechanism in Fog Computing","authors":"Fuming Zhang, Zhiqing Tang, Mingcheng Chen, Xiaojie Zhou, Weijia Jia","doi":"10.1109/MASS.2018.00023","DOIUrl":"https://doi.org/10.1109/MASS.2018.00023","url":null,"abstract":"Fog Computing (FC - similarly edge computing) as new computing paradigm can support distributed domain-specific or area-specific applications with cloud-like quality of service (QoS). This promising paradigm thus can find its wide applications in various industrial scenarios and smart cities in which the resource requirements will be divided into peak-hour or non-peak-hour. To deal with such features of applications, a flexible resource allocation approach based on pricing model can be critical for the success of such paradigm. To the best of our knowledge, we have not seen such pricing based resource allocation approach ever been reported for FC scenarios. In this paper, we propose a novel pricing based dynamic resource allocation model through overbooking mechanism, and it is realized through three steps: 1) According to different QoS requirements of user tasks, methods of on-demand billing, daily billing, and auction billing are designed, in which we allow the resource to be overbooked; 2) For auction billing, we design an auction approach including pricing rule and winner determination rule. We prove that our auction approach guarantees individual rationality, computational efficiency, and truthfulness. 3) To overbook as much resource as possible with a high degree of QoS satisfaction of on-demand and daily billing, we overbook the resource based on a resource utilization prediction using neural network and service level agreement violation feedback. In the end, we validate the mechanism with real-world data trace. Experimental results show that our auction approach achieves desirable properties, and our dynamic resource overbooking mechanism maximizes the profit of nodes with a high degree of QoS satisfaction of on-demand and daily billing and a high resource utilization prediction accuracy rate.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130771626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Boubrima, A. Boukerche, Walid Bechkit, H. Rivano
{"title":"WSN Scheduling for Energy-Efficient Correction of Environmental Modelling","authors":"Ahmed Boubrima, A. Boukerche, Walid Bechkit, H. Rivano","doi":"10.1109/MASS.2018.00061","DOIUrl":"https://doi.org/10.1109/MASS.2018.00061","url":null,"abstract":"Wireless sensor networks (WSN) are widely used in environmental applications where the aim is to sense a physical parameter such as temperature, humidity, air pollution, etc. Most existing WSN-based environmental monitoring systems use data interpolation based on sensor measurements in order to construct the spatiotemporal field of physical parameters. However, these fields can be also approximated using physical models which simulate the dynamics of physical phenomena. In this paper, we focus on the use of wireless sensor networks for the aim of correcting the physical model errors rather than interpolating sensor measurements. We tackle the activity scheduling problem and design an optimization model and a heuristic algorithm in order to select the sensor nodes that should be turned off to extend the lifetime of the network. Our approach is based on data assimilation which allows us to use both measurements and the physical model outputs in the estimation of the spatiotemporal field. We evaluate our approach in the context of air pollution monitoring while using a dataset from the Lyon city, France and considering the characteristics of a monitoring system developed in our lab. We analyze the impact of the nodes' characteristics on the network lifetime and derive guidelines on the optimal scheduling of air pollution sensors.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132990452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}