{"title":"Fair distributed Congestion Control with transmit power for vehicular networks","authors":"E. Egea-López","doi":"10.1109/WoWMoM.2016.7523571","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523571","url":null,"abstract":"We model the problem of beaconing congestion control as a Network Utility Maximization (NUM) transmit power allocation problem. We propose a distributed congestion control algorithm by transmit power adaptation called FCCP, which allows to dynamically select the appropriate fairness notion. Our results show that FCCP converges to the close proximity of the optimal value both in static and dynamic multihop scenarios while keeping the channel load at the desired level.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Tinnirello, Menzo Wentink, D. Garlisi, Fabrizio Giuliano, G. Bianchi
{"title":"MAC design on real 802.11 devices: From exponential to Moderated Backoff","authors":"I. Tinnirello, Menzo Wentink, D. Garlisi, Fabrizio Giuliano, G. Bianchi","doi":"10.1109/WoWMoM.2016.7523503","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523503","url":null,"abstract":"In this paper we describe how a novel backoff mechanism called Moderated Backoff (MB), recently proposed as a standard extension for 802.11 networks, has been prototyped and experimentally validated on a commercial 802.11 card before being ratified. Indeed, for performance reasons, the time critical operations of MAC protocols, such as the backoff mechanism, are implemented into the card hardware/firmware and cannot be arbitrarily changed by third parties or by manufacturers only for experimental reasons. Our validation has been possible thanks to the availability of the so called Wireless MAC Processor (WMP), a prototype of a novel wireless card architecture in which MAC protocols can be programmed by using proper abstractions and a state-machine formal language, which enable easy modifications of legacy operations. Experimental results are in agreement with simulations and prove the effectiveness of Moderated Backoff, as well as the potentialities of the WMP platform.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121485440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An open, NFC enabler independent Mobile payment and identification method: NFC feature box","authors":"Ismail Turk, A. Cosar","doi":"10.1109/WoWMoM.2016.7523547","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523547","url":null,"abstract":"The use of Mobile Devices for electronic payment has increased significantly in the last decade. Near Field Communication (NFC) mobile payment is gaining popularity and it is widely considered to be the technology that will turn smartphones into m-wallets. While a typical wallet contains identification, loyalty, public transport and credit cards, m-wallet solutions currently have well-defined standards for credit card enrollment and usage only. In this thesis, we explore and present the main reason for this limitation. Then, we introduce a new method for using the Secure Element (SE) inside the NFC Phones which allows standard enrollment and usage for proprietary payment and identification schemes. We also explain the practical use our model by presenting well-known proprietary payment scenarios such as public transport payment. This study makes significant contributions to NFC technology by proposing a method for proprietary transaction flows that can be used in parallel with NFC credit card payment solutions. Furthermore, it provides an open protocol which can serve as an NFC payment and identification transaction execution standard.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122637510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How video streaming consumes power in 4G LTE networks","authors":"Jingyu Zhang, Gan Fang, M. Guo, Chunyi Peng","doi":"10.1109/WoWMoM.2016.7523528","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523528","url":null,"abstract":"With the increasing adoption of mobile 4G LTE networks, video streaming as the major contributor of 4G LTE data traffic, has become extremely hot. However, the battery life has become the bottleneck when mobile users are using online video services. In this paper, we deploy a real mobile system for power measurement and profiling of online video streaming in 4G LTE networks. Based on some designed experiments with different configurations, we measure the power consumption for online video streaming, offline video playing, and mobile background. A RRC state study is taken to understand how RRC states impact power consumption. Then, we profile the power consumption of video streaming and show the results with different impact factors. According to our experimental statistics, the power saving room for online video streaming in 4G LTE networks can be up to 69%.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feasibility and accuracy of hotword detection using vibration energy harvester","authors":"Sara Khalifa, Mahbub Hassan, A. Seneviratne","doi":"10.1109/WoWMoM.2016.7523555","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523555","url":null,"abstract":"Vibration energy harvesting (VEH) is a promising source of renewable energy that can be used to extend battery life of next generation mobile devices. In this paper, we study the feasibility and accuracy of VEH for detecting hotwords, such as “OK Google”, used by popular voice control applications to distinguish user commands from other conversations. The idea of using power signals of VEH to detect hotwords is based on the fact that human voice creates vibrations in the air, which could be potentially picked up by the VEH hardware inside a mobile device. Using off-the-shelf VEH product, we conduct a comprehensive experimental study involving 8 subjects. We analyse two possible usage scenarios for the VEH hardware. In the first scenario, the user is not required to talk directly to the device (indirect), but the VEH is expected to pick up the ambient vibrations caused by user-generated sound waves. In the second, the user is expected to direct his voice to the VEH (direct) and talk to it from a close distance. For both usage scenarios, we evaluate two types of hotword detection, speaker-independent and speaker-dependent. We find that VEH can detect hotwords more accurately in the direct scenario compared to the indirect. For the direct scenario, our results show that a simple Decision Tree classifier can detect hotwords from VEH signals with accuracies of 73% and 85%, respectively, for speaker-independent and speaker-dependent detections. Finally, we show that these accuracies are comparable to what could be achieved with an accelerometer sampled at 200 Hz.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132797272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyses of orthogonal and non-orthogonal steering vectors at millimeter wave systems","authors":"Hsiao-Lan Chiang, Tobias Kadur, G. Fettweis","doi":"10.1109/WoWMoM.2016.7523581","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523581","url":null,"abstract":"Beamforming is one of the most challenging problems for millimeter wave communication. With limited codebook size, how to design the steering angles to compensate angles of arrival and departure (AoAs/AoDs) is essential to beamforming performance. Typically, two categories of steering vector sets are commonly used. One is orthogonal steering vector set where the spatial frequency indices of the steering angles are uniformly distributed in spatial frequency domain. The other one is non-orthogonal steering vector set where the steering angles are uniformly distributed in angle domain. In this paper, analyses of these two designs are presented. Due to the fact that beamwidth are constant with respect to different spatial frequency indices in spatial frequency domain, if the spatial frequency indices are uniformly distributed, one has the smallest deviation of the beamforming gain. Since the orthogonal steering vectors satisfy this condition that spatial frequency indices are uniformly distributed, they can achieve higher data rates than the non-orthogonal ones when the AoAs are uniformly distributed over (-π/2, π/2).","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"541 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code mobility for on-demand computational offloading","authors":"Alan Ferrari, D. Puccinelli, S. Giordano","doi":"10.1109/WoWMoM.2016.7523582","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523582","url":null,"abstract":"Computational offloading is a traditional approach to augment the capabilities of smart devices. It has been shown that offloading is most efficient when carried out within a Local Area Network. Several frameworks have been proposed to tackle this problem but fail to consider that some of the application code may be part of the offloading request. This is a key element in cloudlets where it is virtually impossible to load all the necessary application code a priori on all nodes. It is even more crucial in opportunistic computing where it cannot be known a priori which devices will become the offloading targets.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the authentication of devices in the Internet of things","authors":"Yaman Sharaf-Dabbagh, W. Saad","doi":"10.1109/WoWMoM.2016.7523532","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523532","url":null,"abstract":"Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security and privacy solutions. Conventional security solutions fail to meet the IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an object authentication framework is proposed to exploit device-specific information, called fingerprints, to authenticate objects in the IoT. The proposed framework is shown to effectively track the effects of physical environment on objects' fingerprints via a transfer learning tool to differentiate between security attacks and normal change in fingerprints. Simulation results show that the proposed framework improves the authentication accuracy.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Toldov, R. Igual-Perez, R. Vyas, A. Boé, L. Clavier, N. Mitton
{"title":"Experimental evaluation of interference impact on the energy consumption in Wireless Sensor Networks","authors":"V. Toldov, R. Igual-Perez, R. Vyas, A. Boé, L. Clavier, N. Mitton","doi":"10.1109/WoWMoM.2016.7523518","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523518","url":null,"abstract":"In the era of Internet of Things (IoT), the development of Wireless Sensor Networks (WSN) arises different challenges. Two of the main issues are electromagnetic interference and the lifetime of WSN nodes. In this paper, we show and evaluate experimentally the relation between interference and energy consumption, which impacts the network lifetime. We present a platform based on commercially available low-cost hardware in order to evaluate the impact of electromagnetic interference in 2.4 GHz ISM band on energy consumption of WSN. The energy measurements are obtained separately from each electronic component in the node. Interference and energy measurements are conducted in an anechoic chamber and in an office-type lab environment. X-MAC protocol is chosen to manage the Radio Duty Cycle of the nodes and its energy performance is evaluated. The energy consumption transmitter nodes is analyzed particularly in this work. Moreover, this energy consumption has been quantified and differentiated according to the number of (re-)transmissions carried out by the transmitter as well as the number of ACK packets sent by the receiver for a single packet. Finally, we use a model of real battery to calculate the lifetime of the node for operation within different interference level zones. This study lays the basis for further design rules of communication protocols and development of WSNs.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125430882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable and bidirectional camera-display communications with smartphones","authors":"Maria L. Montoya Freire, M. D. Francesco","doi":"10.1109/WoWMoM.2016.7523499","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523499","url":null,"abstract":"Wireless technologies such as WiFi and Bluetooth are widely used for mobile data communications. However, these technologies are affected by interference resulting from shared access to unlicensed frequency bands. Visible light communication is an alternative means for data exchange over an optical channel. It has several advantages over currently used radio-based technologies, including a full-duplex channel and limited interference from other sources. We designed and implemented a system for bidirectional visible light communications between smartphones. Specifically, our solution employs dynamically changing Quick Response (QR) codes shown on the display of one mobile phone to encode the data and the front-facing camera of another phone to receive the data. We devised a supporting communication protocol for reliable communications and realized a file exchange application. Moreover, we carried out an experimental evaluation of our system with focus on communication performance and power consumption. The obtained results show that our solution is reliable and comparable with existing radio-based schemes from the user perspective.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}