2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)最新文献

筛选
英文 中文
C-ITS PKI protocol: Performance Evaluation in a Real Environment C-ITS PKI协议:真实环境下的性能评估
Farah Haidar, Arnaud Kaiser, B. Lonc, P. Urien
{"title":"C-ITS PKI protocol: Performance Evaluation in a Real Environment","authors":"Farah Haidar, Arnaud Kaiser, B. Lonc, P. Urien","doi":"10.23919/WONS.2019.8795479","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795479","url":null,"abstract":"In the near future, vehicles and roadside units (RSU) will communicate and cooperate by broadcasting V2X messages over the vehicular network (IEEE 802.11p). These messages are used by safety applications to improve road safety and traffic efficiency. However, those messages could also be used in a malicious way to track vehicles. Therefore, to guarantee drivers privacy, vehicles use pseudonym identities (or certificates) provided by a Public Key Infrastructure (PKI). During a trip, vehicles frequently change of certificates to make tracking much more difficult. They thus need to reload their certificates pool by requesting new ones to the PKI. In this paper, we evaluate the performance of the PKI protocol regarding the reloading of certificates. We ran several tests while driving in order to quantify the number of certificates that can be reloaded from the PKI at different speeds. The obtained results show that 1) the end-to-end latency between a requesting vehicle and the PKI is non-negligible and 2) as speed increases, the number of successfully reloaded certificates decreases.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121487294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Contextual Dishonest Behaviour Detection for Cognitive Adaptive Charging in Dynamic Smart Micro-Grids 动态智能微电网认知自适应充电的情境不诚实行为检测
M. Radenkovic, Adam David Walker
{"title":"Contextual Dishonest Behaviour Detection for Cognitive Adaptive Charging in Dynamic Smart Micro-Grids","authors":"M. Radenkovic, Adam David Walker","doi":"10.23919/WONS.2019.8795461","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795461","url":null,"abstract":"The emerging Smart Grid (SG) paradigm promises to address decreasing grid stability from thinning safe operating margins, meet continually rising demand from pervasive high capacity devices such as electric vehicles (EVs), and fully embrace the shift towards green energy solutions. At the SG edge, widespread decentralisation of heterogeneous devices coupled with fluctuating energy availability and need as well as a greatly increased fluidity between their roles as energy producers, consumers, and stores raises significant challenges to ensuring robustness and security of both information and energy exchange. Detecting and mitigating both malicious and non-malicious threats in these environments is essential to the realisation of the full potential of the SG. To address this need for robust, localised, real-time security at the grid edge we propose CONCEDE, a collaborative cross-layer ego-network integrity awareness and attack impact reduction extension to our previous work on delay-tolerant cognitive adaptive energy exchange. We detail a substantial, targeted, energy disruption attack perpetrated by colluding mobile energy prosumers. Our CONCEDE proposal is then evaluated in multiple, diverse smart micro-grid (SMG) scenarios using hybrid traces of EVs and infrastructure from Europe, North America, and South America in the presence of a coordinated attack from malicious distributors seeking to disrupt energy supply to a target community. We show that CONCEDE successfully detects and identifies the nodes exhibiting malicious, dishonest behaviour and that CONCEDE also reduces the impact of a coordinated energy disruption attack on innocent parties in all explored scenarios across multiple criteria. Keywords— Smart energy, Mobile DTNs, Autonomous Vehicles, Security","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
5G Traffic Forecasting: If Verticals and Mobile Operators Cooperate 5G流量预测:如果垂直行业和移动运营商合作
F. Malandrino, C. Chiasserini
{"title":"5G Traffic Forecasting: If Verticals and Mobile Operators Cooperate","authors":"F. Malandrino, C. Chiasserini","doi":"10.23919/WONS.2019.8795501","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795501","url":null,"abstract":"In 5G research, it is traditionally assumed that vertical industries (a.k.a verticals) set the performance requirements for the services they want to offer to mobile users, and the mobile operators alone are in charge of orchestrating their resources so as to meet such requirements. Motivated by the observation that successful orchestration requires reliable traffic predictions, in this paper we investigate the effects of having the verticals, instead of the mobile operators, performing such predictions. Leveraging a real-world, large-scale, crowd-sourced trace, we find that involving the verticals in the prediction process reduces the prediction errors and improves the quality of the resulting orchestration decisions.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126198682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MEC-based UWB Indoor Tracking System 基于mec的超宽带室内跟踪系统
J. Carrera, Zhongliang Zhao, M. Wenger, T. Braun
{"title":"MEC-based UWB Indoor Tracking System","authors":"J. Carrera, Zhongliang Zhao, M. Wenger, T. Braun","doi":"10.23919/WONS.2019.8795450","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795450","url":null,"abstract":"Real-time localization is the underlying requirement for providing context-aware services in the Internet of Things (IoT), Although several methods have been proposed to provide indoor localization, most of them implement the running algorithms locally in the mobile device to be located. However, the limited computational resources of mobile devices make it difficult to run complex algorithms. As an alternative, Multi-Access Edge Computing (MEC) as a promising paradigm extends the traditional cloud computing capabilities towards the edge of the network. This enables accurate location-aware services. In this work, we present an indoor tracking system based on the MEC paradigm for ultra wide band devices. Our tracking algorithms fuse machine learning-based zone prediction, Ultra Wide Band (UWB) radio ranging, inertial measurement units, and floor plan information into an enhanced particle filter. The localization process is hosted in an Edge server, which performs the resource-demanding calculation that is offloaded from the client devices. Moreover, the client devices are also equipped with certain processing power to handle sensor data processing. Our system includes also a Cloud layer, which enables data storage and data visualization for multiple clients. We evaluate our system in two complex environments. Experiment results show that our tracking system can achieve the average tracking error of 0.49 meters and 90% accuracy of 0.6 meters in real-time.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134511196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Benefits and Challenges of Software Defined Satellite-5G Communication 软件定义卫星- 5g通信的优势与挑战
H. Khalili, Pouria Sayyad Khodashenas, C. Fernández, Daniel Guija, K. Liolis, C. Politis, Gint Atkinson, Joe Cahill, R. King, Mark Kavanagh, Boris Tiomela Jou, O. Vidal
{"title":"Benefits and Challenges of Software Defined Satellite-5G Communication","authors":"H. Khalili, Pouria Sayyad Khodashenas, C. Fernández, Daniel Guija, K. Liolis, C. Politis, Gint Atkinson, Joe Cahill, R. King, Mark Kavanagh, Boris Tiomela Jou, O. Vidal","doi":"10.23919/WONS.2019.8795462","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795462","url":null,"abstract":"The convergence of innovation in satellite communications, 5G terrestrial systems and cloud technology promises a ubiquitous networking solution, which offers a wide range of features, including but not limited to: universal multiaccess coverage at extraordinarily high speeds & capacity, multi-tenancy, fixed and wireless access network convergence, software controlled, agile service provisioning, on-demand service-oriented resource allocation, and highly orchestrated. To meet the needs of future communication, a paradigm shift both in the terrestrial and satellite segments is needed, transforming them from data-only transport media to intelligent services, equipped with computational, storage and decision-making capacities. In this article, we present H2020 SaT5G project vision to integrate the next generation satellite systems into 5G terrestrial networks at different levels. To this end, after highlighting the benefits of the integrated satellite-5G systems via some potential use cases, we detail the architectural options proposed by the project. In addition, we will present a management solution for the effective management and orchestration of the end-to-end heterogeneous technologies (terrestrial and satellite services).","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the Properties of Infective Flooding in Low-Duty-Cycle Networks 低占空比网络中感染泛洪的性质
L. Baldesi, L. Maccari, R. Cigno
{"title":"On the Properties of Infective Flooding in Low-Duty-Cycle Networks","authors":"L. Baldesi, L. Maccari, R. Cigno","doi":"10.23919/WONS.2019.8795457","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795457","url":null,"abstract":"Broadcasting information in a network is an important function in networking applications. In some networks, as wireless sensor networks or some ad-hoc networks it is so essential as to dominate the performance of the entire system. Exploiting some recent results based on the computation of the eigenvector centrality of nodes in the network graph and classical dynamic diffusion models on graphs, this paper derives a novel theoretical framework for efficient information broadcasting in mesh networks with low duty-cycling without the need to build a distribution tree. The model provides lower and upper stochastic bounds with high probability. We show that the lower bound is very close to the theoretical optimum and that a preliminary implementation provides results that are very close to the lower bound on classical graph models.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129016186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Least Squares Optimization for Forest Propagation Augmented by Rainfall/Snowfall, Frequency, and Polarization Effects 降雨/降雪、频率和极化效应增强的森林繁殖最小二乘优化
M. Al Salameh
{"title":"Least Squares Optimization for Forest Propagation Augmented by Rainfall/Snowfall, Frequency, and Polarization Effects","authors":"M. Al Salameh","doi":"10.23919/WONS.2019.8795458","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795458","url":null,"abstract":"The general path loss model parameters for forest propagation environment are optimized using the least squares technique. The resulting model is verified by comparison with measured data where acceptable agreement is observed. The direct wave, vegetation effect, and rainfall/snowfall contribute to the wave propagation in a forest. The average rain rate that will probably be exceeded for at most 0.01% of the year (i.e., $mathbf{R}_{mathbf{0.01}%}$) is computed using real measured data in Jordan. Based on that, rainfall attenuation rate is computed and analyzed for varying frequencies and for both horizontal and vertical polarizations.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DVFS-Power Management and Performance Engineering of Data Center Server Clusters 数据中心服务器集群电源管理与性能工程
P. Kühn, M. Mashaly
{"title":"DVFS-Power Management and Performance Engineering of Data Center Server Clusters","authors":"P. Kühn, M. Mashaly","doi":"10.23919/WONS.2019.8795470","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795470","url":null,"abstract":"Dynamic Voltage and Frequency Scaling (DVFS) is a method to save energy consumption of electronic devices and to protect them against overheating by automatic sensing and adaptation of their energy consumption. This can be accomplished either on the program instruction level for electronic devices or on the task or job level for server clusters. This paper models DVFS on the job level and through which Service Levels Objectives can be guaranteed with respect to prescribed mean or quantiles of service delays according to given Service Level Agreements (SLA) between user and service provider. The two parameters V (voltage) and f (frequency) cannot be changed independently of each other; typically only several combinations of V and f values are implemented in hardware for several power states. In this paper a novel analysis of operating DVFS is suggested for Server Clusters of Cloud Data Centers (CDC) under prescribed bounds of service level objectives which are defined by SLAs. The method is based on the theory of queuing models of the type GI/G/n for a server cluster to establish a relationship between SLA parameters and the power consumption and is performed for the example of the Intel Pentium M Processor with Enhanced SpeedStep Power Management. As result of this method precise bounds are provided for the load ranges of service request rates $lambda$ for each power mode which guarantee minimum power consumption dependent on given SLA values and job arrival and service statistics. As the instantaneous load in a CDC can be highly volatile the current load level is usually monitored by periodic sensing which may result in a rather high frequency of DVFS range changes and corresponding overhead. For that reason an automated smoothing method is suggested which reduces the frequency of DVFS range changes significantly. This method is based on a Finite State Machine (FSM) with hysteresis levels.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A First Investigation of Congestion Control for LTE-V2X Mode 4 LTE-V2X模式4拥塞控制初探
Vincent Martinez, A. Mansouri, Jérôme Härri
{"title":"A First Investigation of Congestion Control for LTE-V2X Mode 4","authors":"Vincent Martinez, A. Mansouri, Jérôme Härri","doi":"10.23919/WONS.2019.8795500","DOIUrl":"https://doi.org/10.23919/WONS.2019.8795500","url":null,"abstract":"3GPP LTE-V2X is a recent new cellular technology allowing direct communications between vehicles and any other stations. Its Sidelink mode 4 allows the scheduler to be fully distributed and not requiring any support from cellular infrastructures, thus making this mode well fitted for V2X safety-related communications. Based on a Listen-before-Talk (LBT) strategy, the scheduler, however, remains subject to performance degradation under increased channel load, and thus requires wireless congestion control mechanisms. In this work, we focus on the interactions between the strategies used by the LTE-V2X Sidelink mode 4 for autonomous resource allocations - LBT and Semi-persistent scheduling (SPS) - and decentralized congestion control (DCC) mechanisms. Simulations under various scenarios showed counter-productive interactions leading to performance degradations, and strategies to mitigate them are suggested.","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
2019 15th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS) 2019第15届无线点播网络系统与服务年会(WONS)
{"title":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS)","authors":"","doi":"10.23919/wons.2019.8795466","DOIUrl":"https://doi.org/10.23919/wons.2019.8795466","url":null,"abstract":"","PeriodicalId":185451,"journal":{"name":"2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信