{"title":"Computation of a Nash Equilibrium of Multiple-Leader Stackelberg Network Games","authors":"V. Rodoplu, Gautam S. Raj","doi":"10.1109/ICSNC.2010.43","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.43","url":null,"abstract":"We propose a multiple-leader Stackelberg network game to model the pricing decisions of relay nodes on an arbitrary topology between a source and a destination, under a reservation-based traffic model. After deriving closed-form solutions for the special case of serial and parallel networks, we present a centralized algorithm that finds a Nash equilibrium of the multiple-leader Stackelberg network game. We design an algorithm that converges to a Nash equilibrium for an arbitrary relay topology. We analyze the performance of the algorithm in the context of energy-limited wireless networks.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131645348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference and Power Minimization in TDMA-OFDMA Infrastructure Wireless Mesh Networks","authors":"T. Szymanski","doi":"10.1109/ICSNC.2010.67","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.67","url":null,"abstract":"This paper examines algorithms to minimize interference in infrastructure wireless mesh networks. A mathematical optimization problem for coloring the active wireless edges in a time-division scheduling frame is formulated. The optimization eliminates primary conflicts and minimizes secondary conflicts. The active wireless edges are specified in an integer zero-one ’edge-specification’ matrix. An ’edge-interference’ matrix is formulated, where each element represents the interference power if two edges share a color. The objective of the optimization problem is to partition the integer edge-specification matrix into a sum of C integer zero-one matrices which specify the active edges assigned to each of the C colors, such that the secondary interference is minimized. The optimal solution requires a constrained partitioning of an integer matrix, which is a combinatorial problem. A polynomial time approximation algorithm called Least-Noise coloring is presented. Simulations of an essentially saturated hexagonal mesh network supporting backhaul traffic flows are reported. It is confirmed that interference and edge transmission powers can be minimized, and that the mesh network can be configured to achieve near-perfect Quality of Service guarantees with essentially 100% throughput.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of Channel Formation in a MANET","authors":"Kerul Patel, J. DeDourek, P. Pochec","doi":"10.1109/ICSNC.2010.42","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.42","url":null,"abstract":"We investigate the channel formation in a Mobile Ad Hoc Network (MANET) using the NS-2 simulator. The results show that the normalized node density is a good measure for predicting the performance of a MANET: for the normalized node density of 2.8 two nodes in a MANET running the AODV routing protocol stay connected 90% of the time. For the DSR protocol this is only 70%. The results may be used in deciding how many nodes would be required in a MANET to cover a particular area, and as a future benchmark for comparing different MANET routing protocols.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pelayo Nuño, J. C. Granda, D. García, F. J. Suárez
{"title":"Automatic Deployment of a Communication Mesh for Synchronous e-Learning Activities","authors":"Pelayo Nuño, J. C. Granda, D. García, F. J. Suárez","doi":"10.1109/ICSNC.2010.40","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.40","url":null,"abstract":"Synchronous e-learning platforms are frequently used to train the personnel of large corporations. Usually, these corporations are geographically dispersed in multiple sites, so efficient transport of multimedia streams during an e-learning activity is essential. In order to interconnect the groups of participants, it is necessary to deploy a communication mesh. If the number of sites is high, non-automatic deployment of the communication mesh is complex, cumbersome and prone to errors, delaying the startup of e-learning activities. In this paper, an automatic deployment technique based on a centralized server is proposed. This technique continuously updates the composition of the communication mesh, and involves only those sites where there are active participants in the e-learning activity, modifying the mesh topology in function of the joining and leaving of participants. Tests show that the proposed automatic deployment technique makes use of the available bandwidth efficiently.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Impact in Wireless Ad Hoc Network Routing","authors":"T. Saadawi, Merlinda Drini","doi":"10.1109/ICSNC.2010.47","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.47","url":null,"abstract":"In this paper, we present the set of factors in the physical layer that are relevant to the performance evaluation of the routing protocols. Such factors consist of signal reception, path loss, fading and interference considerations. Therefore it would be desirable for routing algorithms in wireless ad hoc networks, to be able to select paths that are more likely to be stable. With this in mind we adopt a numerical approach based on Finite State Markov Chain channel model to study the performance of an ad hoc routing protocol under various radio propagation models. Further this paper presents a new cross-layer algorithm for joint physical and routing layers in wireless ad hoc networks, applying this to the Optimized Link State Routing (OLSR), protocol. We address the problem of link and route stability, focusing particularly on multipoint relay (MPR) selection method, to find the most optimal routes between any pair of nodes. Our simulation results indicate that the network throughput is greatly improved and the delay is significantly decreased using this cross-layer mechanism, compared to the original OLSR.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128383355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Streaming for Colocated Subscribers in Mobile Networks","authors":"L. Tu, Chung-Ming Huang","doi":"10.1109/ICSNC.2010.39","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.39","url":null,"abstract":"It is common that current mobile devices are equipped with multiple interfaces such as GPRS or UMTS for wireless WAN (WWAN) link as well as WiFi and/or bluetooth for local networking. Meanwhile, it is also possible that a number of mobile subscribers keep close for a period of time and fetch and play same live stream from Internet. Stimulated by these facts, we develop textit{C$5$}, a Collaborative Content fetching scheme for Common Characteristics Community, which employs a small scale P2SP framework of a hybrid mobile network and a set of application-level fetching procedures to enable collaborative streaming. The chunk selection strategies are particularly investigated in this paper. Simulation results show that textit{C$5$} can provide better playback performance in the live streaming application for community members than individual fetching. Thus it can improve the user experiences for mobile Internet subscribers.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ENS: An Energy Harvesting Wireless Sensor Network Platform","authors":"M. Barnes, C. Conway, J. Mathews, D. Arvind","doi":"10.1109/ICSNC.2010.18","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.18","url":null,"abstract":"We present the Energy Neutral Speck (ENS) wireless sensor network platform. The ENS is a mote like platform powered by combination of photo-voltaic and battery power supplies. The design and implementation of the platform are described including the hardware, firmware and operating system along with the architecture and implementation of a software framework for interfacing with the network and visualisation and storage of sensor data.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115614683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Miyaho, Tatsuro Nakamura, T. Shimada, Noriko Konno
{"title":"Sensor Network Management for Healthcare Applications","authors":"N. Miyaho, Tatsuro Nakamura, T. Shimada, Noriko Konno","doi":"10.1109/ICSNC.2010.71","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.71","url":null,"abstract":"Telemedicine can be implemented using a sensor network that carries users’ biometric information collected by tiny intelligent sensors attached to the human body. We propose a communication system that can be used for telemedicine to improve the Quality of Life of individuals, which uses a sensor network and a sensor database with mutual authentication to ensure security. Finally, this paper describes the priority control mechanism and experiments using it and clarifies the real-time performance of the proposed communication sensor network system.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gilberto Tadayoshi Hashimoto, P. F. Rosa, Edmo Lopes Filho, J. Machado
{"title":"A Security Framework to Protect against Social Networks Services Threats","authors":"Gilberto Tadayoshi Hashimoto, P. F. Rosa, Edmo Lopes Filho, J. Machado","doi":"10.1109/ICSNC.2010.36","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.36","url":null,"abstract":"Despite the security policies, standards, awareness strategies and tools currently in place, employees are still involving in risky behaviors that put business at risk. The growth and proliferation of Social Networks Services (SNS), among other threats, have made possible new leakage avenues for sensitive data, and malware spread. To address these security issues, network and security managers often turn to network policy management services such as firewall, Intrusion Prevention System (IPS), antivirus, and Data Loss Prevention systems (DLP). However, without a consistent strategy the desired control may be circumvented. As its outcome, this paper addresses a security framework to protect corporate information against the threats related to SNS.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang-Beom Lim, Sunghun Kang, Hyun-Hun Cho, Sin-Woo Park, J. Park
{"title":"An Enhanced Indoor Localization Algorithm Based on IEEE 802.11 WLAN Using RSSI and Multiple Parameters","authors":"Chang-Beom Lim, Sunghun Kang, Hyun-Hun Cho, Sin-Woo Park, J. Park","doi":"10.1109/ICSNC.2010.44","DOIUrl":"https://doi.org/10.1109/ICSNC.2010.44","url":null,"abstract":"Indoor Localization that is based on received signal strength indication (RSSI) needs Log Path Loss Model for ranging. Parameters on the model should be optimal according to the environment. This paper will investigate Dual Log Path Loss Model that has practical parameters. The novel Indoor Localization algorithm based on WLAN and the method to determine the location of AP are proposed too. Two methods show lower distance error in general indoor environment.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}