{"title":"On the authentication of devices in the Internet of things","authors":"Yaman Sharaf-Dabbagh, W. Saad","doi":"10.1109/WoWMoM.2016.7523532","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523532","url":null,"abstract":"Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security and privacy solutions. Conventional security solutions fail to meet the IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an object authentication framework is proposed to exploit device-specific information, called fingerprints, to authenticate objects in the IoT. The proposed framework is shown to effectively track the effects of physical environment on objects' fingerprints via a transfer learning tool to differentiate between security attacks and normal change in fingerprints. Simulation results show that the proposed framework improves the authentication accuracy.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Should I seed or should I not: On the remuneration of seeders in D2D offloading","authors":"Filippo Rebecchi, M. Amorim, V. Conan","doi":"10.1109/WoWMoM.2016.7523496","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523496","url":null,"abstract":"Traffic offloading using opportunistic device-to-device (D2D) communications is a new and exciting opportunity for cellular operators to cope with the unprecedented mobile data growth. A limitation of existing proposals is that they assume that all terminals are, by default, involved in the D2D forwarding process. In particular, they do not capture the need to reward seed users. For this reason, we include a rewarding cost in the design of the opportunistic offloading strategy. In our solution, we make the difference between nodes that receive content through the cellular channel only (leechers) and nodes that take part in the forwarding process (seeders). The key point for an operator is to design a global strategy to select which nodes act as seeders and which ones as leechers, in order to reduce the total dissemination cost. We formulate this question as a stochastic control problem that we solve using an application of Pontryagin's Maximum Principle. We provide a mathematical framework to devise the optimal strategy for opportunistic offloading under a generic cost model. First, we show that an optimal solution exists; then, from this policy, we extract some insights to develop heuristics. Finally, we discuss the advantages of the proposed model compared to the classic seeder-only model. We demonstrate that separating seeders/leechers leads to better incentive strategies in the most demanding cases of content with a large span of delivery delays.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121853362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Toldov, R. Igual-Perez, R. Vyas, A. Boé, L. Clavier, N. Mitton
{"title":"Experimental evaluation of interference impact on the energy consumption in Wireless Sensor Networks","authors":"V. Toldov, R. Igual-Perez, R. Vyas, A. Boé, L. Clavier, N. Mitton","doi":"10.1109/WoWMoM.2016.7523518","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523518","url":null,"abstract":"In the era of Internet of Things (IoT), the development of Wireless Sensor Networks (WSN) arises different challenges. Two of the main issues are electromagnetic interference and the lifetime of WSN nodes. In this paper, we show and evaluate experimentally the relation between interference and energy consumption, which impacts the network lifetime. We present a platform based on commercially available low-cost hardware in order to evaluate the impact of electromagnetic interference in 2.4 GHz ISM band on energy consumption of WSN. The energy measurements are obtained separately from each electronic component in the node. Interference and energy measurements are conducted in an anechoic chamber and in an office-type lab environment. X-MAC protocol is chosen to manage the Radio Duty Cycle of the nodes and its energy performance is evaluated. The energy consumption transmitter nodes is analyzed particularly in this work. Moreover, this energy consumption has been quantified and differentiated according to the number of (re-)transmissions carried out by the transmitter as well as the number of ACK packets sent by the receiver for a single packet. Finally, we use a model of real battery to calculate the lifetime of the node for operation within different interference level zones. This study lays the basis for further design rules of communication protocols and development of WSNs.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125430882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenjie Ruan, Quan Z. Sheng, Lina Yao, Tao Gu, M. Ruta, Longfei Shangguan
{"title":"Device-free indoor localization and tracking through Human-Object Interactions","authors":"Wenjie Ruan, Quan Z. Sheng, Lina Yao, Tao Gu, M. Ruta, Longfei Shangguan","doi":"10.1109/WoWMoM.2016.7523524","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523524","url":null,"abstract":"Device-free indoor localization aims to localize people without requiring them to carry any devices or being actively involved in the localizing process. It underpins a wide range of applications including older people surveillance, intruder detection and indoor navigation. However, in a cluttered environment such as a residential home, the Received Signal Strength Indicator (RSSI) is heavily obstructed by furniture or metallic appliances, thus reducing the localization accuracy. This environment is important to observe as human-object interaction (HOI) events, detected by pervasive sensors, can potentially reveal people's interleaved locations during daily living activities, such as watching TV, opening the fridge door. This paper aims to enhance the performance of commercial off-the-shelf (COTS) RFID-based localization system by leveraging HOI contexts in a furnished home. Specifically, we propose a general Bayesian probabilistic framework to integrate both RSSI signals and HOI events to infer the most likely location and trajectory. Experiments conducted in a residential house demonstrate the effectiveness of our proposed method, in which we can localize a resident with average 95% accuracy and track a moving subject with 0.58m mean error distance.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129041399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nils Richerzhagen, Björn Richerzhagen, Michael Walter, D. Stingl, R. Steinmetz
{"title":"Buddies, not enemies: Fairness and performance in cellular offloading","authors":"Nils Richerzhagen, Björn Richerzhagen, Michael Walter, D. Stingl, R. Steinmetz","doi":"10.1109/WoWMoM.2016.7523505","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523505","url":null,"abstract":"Recently, a number of offloading approaches have been proposed to reduce the burden on the cellular infrastructure, especially during peak hours. Ranging from pure data offloading concepts using local caches to fully-fledged services operating on ad hoc networks, these approaches are mostly tuned towards their performance. Consequently, cache hit ratios, achieved throughput, or end-to-end latencies, are prominent evaluation metrics. However, when utilizing users' resources to improve the performance of a shared service, the fairness with respect to the resources contributed by individual users should be considered as well. Resource consumption, e.g., the battery lifetime, can vary significantly between individual users, depending on their contributions. This effect can have a significant impact on user acceptance and, thus, the usability of the overall system. In this paper, we examine the trade-off between overall system performance and fairness w.r.t. resource utilization for a state-of-the-art monitoring service relying on offloading. To bridge the identified gap between performance and fairness, we propose a number of protocol adjustments to increase the system's fairness. Through an extensive simulation study we show that the proposed mechanisms lead to improvements in the overall achieved fairness of up to 60%, with below 4% degradation in service quality.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel parallelized motion estimation algorithm for GPU based video encoding","authors":"Wenbin Jiang, Pengcheng Wang, Min Long, Hai Jin","doi":"10.1109/WoWMoM.2016.7523558","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523558","url":null,"abstract":"Cloud-based video encoding has become more and more popular in Internet, especially for mobile clients, considering their limited resources. Recently, GPUs (Graphics Processor Units) make the cloud-based video encoding more economic and efficient. However, the motion estimation in inter prediction, which usually occupies about 70% encoding time in H.264/AVC, is still a big headache because of its complexity. In this paper, a novel motion estimation algorithm is proposed, which is customized for GPU-based cloud encoding, considering motion tendency. A mean subsampling template is presented for a pre-search approach to get motion tendency, which can reduce computation cost obviously with less quality loss. To improve the efficiency of the CUDA (Compute Unified Device Architecture) thread organization for motion estimation, a section-division method is presented. Experimental results show that the proposed algorithm can reduce nearly 22% computation time with less video quality loss, compared with the state-of-the-art work.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nathan D. Mickulicz, Utsav Drolia, P. Narasimhan, R. Gandhi
{"title":"Zephyr: First-person wireless analytics from high-density in-stadium deployments","authors":"Nathan D. Mickulicz, Utsav Drolia, P. Narasimhan, R. Gandhi","doi":"10.1109/WoWMoM.2016.7523552","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523552","url":null,"abstract":"Zephyr is a first-person wireless-performance data-collection approach to study the end-user's perspective of the wireless-network's performance using an OTT video-streaming service used in 35 mobile applications and 25 sports stadiums. We use Zephyr to provide insights into user behavior and user disengagement from production traces gathered over 2+ years. We identify the different types of failures that we've observed, and describe how frequently they occur. Finally, we correlate low-level Wi-Fi performance data with application-level failures and describe the trends that we observe. The data from Zephyr reveals that 50% of users disengage if video playback does not begin within 12 seconds, and also if video playback stalls, instream, for more than 6 seconds. The most dominant failure type for video playback is cancellation during the initial buffering phase, which accounts for 30% of all streams.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126290513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable and bidirectional camera-display communications with smartphones","authors":"Maria L. Montoya Freire, M. D. Francesco","doi":"10.1109/WoWMoM.2016.7523499","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523499","url":null,"abstract":"Wireless technologies such as WiFi and Bluetooth are widely used for mobile data communications. However, these technologies are affected by interference resulting from shared access to unlicensed frequency bands. Visible light communication is an alternative means for data exchange over an optical channel. It has several advantages over currently used radio-based technologies, including a full-duplex channel and limited interference from other sources. We designed and implemented a system for bidirectional visible light communications between smartphones. Specifically, our solution employs dynamically changing Quick Response (QR) codes shown on the display of one mobile phone to encode the data and the front-facing camera of another phone to receive the data. We devised a supporting communication protocol for reliable communications and realized a file exchange application. Moreover, we carried out an experimental evaluation of our system with focus on communication performance and power consumption. The obtained results show that our solution is reliable and comparable with existing radio-based schemes from the user perspective.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Björn Richerzhagen, Julian Wulfheide, H. Koeppl, A. Mauthe, K. Nahrstedt, R. Steinmetz
{"title":"Enabling crowdsourced live event coverage with adaptive collaborative upload strategies","authors":"Björn Richerzhagen, Julian Wulfheide, H. Koeppl, A. Mauthe, K. Nahrstedt, R. Steinmetz","doi":"10.1109/WoWMoM.2016.7523526","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523526","url":null,"abstract":"User-generated content, such as short video snippets or tweets, is increasingly used in event coverage even by professional media outlets. Especially in unforeseen events, or when dealing with large crowds, these snippets provide unique perspectives on the scene. While uploading a tweet does not impose much load on the communication system, uploading live video at today's camera resolutions consumes a significant amount of resources. At the same time, only a fraction of the uploaded streams is suitable for event coverage (e.g., shakiness of the video, focus on the scene, obstructions). By identifying the set of relevant streams early, and postponing the upload of other content, the available network resources can be dedicated to the upload of the most relevant streams. In this paper, we propose a set of strategies to collaboratively upload the most relevant streams at high quality by utilizing freed resources. We argue that these strategies can be exchanged during runtime to adapt to user dynamics and network heterogeneity, and present initial findings on the performance of our system.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129624300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianyi Yu, Jenny Eden, Cristofer Englund, Tony Larsson
{"title":"Traffic situation estimator for Adaptive Cruise Control","authors":"Tianyi Yu, Jenny Eden, Cristofer Englund, Tony Larsson","doi":"10.1109/WoWMoM.2016.7523567","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523567","url":null,"abstract":"A traffic situation estimator capable of analyzing driving behavior utilizing an image analysis-based tracking module is presented. The behavior is analyzed by using a state machine driven counter to estimate the traffic rhythm and determine if the detected vehicles are approaching, getting away, have been overtaken or have overtaken the ego-vehicle. Depending on the result, the traffic situation estimator suggest different reactions, either to drive faster, slower or optionally suggest to overtake vehicles ahead to help the driver to follow the traffic rhythm which in turn will improve safety and energy efficiency. The proposed approach is implemented in a smart-phone and has shown good performance while testing the application on a two-lane highway.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}