2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

筛选
英文 中文
Measurement-based study on the influence of localization errors on estimated shadow correlations 基于测量的定位误差对估计阴影相关影响的研究
Nikos Perpinias, Alexandros Palaios, Janne Riihijärvi, P. Mähönen
{"title":"Measurement-based study on the influence of localization errors on estimated shadow correlations","authors":"Nikos Perpinias, Alexandros Palaios, Janne Riihijärvi, P. Mähönen","doi":"10.1109/WoWMoM.2016.7523587","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523587","url":null,"abstract":"In recent years, novel spectrum access schemes have increased the need to further explore and exploit radio propagation dynamics. One proposed approach is to use spectrum sensing nodes for propagation environment estimation, and particularly to allow shadowing field extraction. In general there is a tendency to develop techniques that allow the automated and localized estimation of the spatial correlation structure of the shadowing field. Key issue when using such data is to take into account inherent localization errors and the impact that it has on these estimates. In this paper we use real measurement data acquired with extremely high localization accuracy to demonstrate and study the impact of localization errors. We present results for the propagation estimation, the extracted shadow field, and estimated shadow correlations. In particular, we show that spatial correlation metrics such as semivariograms are robust against localization errors higher than arising from the typical embedded GPS chipsets, up to approximately 20 m. Moreover, we have considered various probability distributions of localization errors, exploring their impact into our analysis. The reported results are highly relevant to development of measurement-based coverage estimation techniques and planning of drive tests or understanding limits of crowd-sourced data from user devices.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indoor localization of vehicles using Deep Learning 使用深度学习的车辆室内定位
A. Kumar, Bernd Schäufele, Daniel Becker, Oliver Sawade, I. Radusch
{"title":"Indoor localization of vehicles using Deep Learning","authors":"A. Kumar, Bernd Schäufele, Daniel Becker, Oliver Sawade, I. Radusch","doi":"10.1109/WoWMoM.2016.7523569","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523569","url":null,"abstract":"Modern vehicles are equipped with numerous driver assistance and telematics functions, such as Turn-by-Turn navigation. Most of these systems rely on precise positioning of the vehicle. While Global Navigation Satellite Systems (GNSS) are available outdoors, these systems fail in indoor environments such as a car-park or a tunnel. Alternatively, the vehicle can localize itself with landmark-based positioning and internal car sensors, yet this is not only costly but also requires precise knowledge of the enclosed area. Instead, our approach is to use infrastructure-based positioning. Here, we utilize off-the shelf cameras mounted in the car-park and Vehicle-to-Infrastructure Communication to allow all vehicles to obtain an indoor position given from an infrastructure-based localization service. Our approach uses a Convolutional Neural Network (CNN) with Deep Learning to identify and localize vehicles in a car-park. We thus enable position-based Driver Assistance Systems (DAS) and telematics in an underground facility. We compare the novel Deep Learning classifier to a conventional classifier using Haar-like features.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127247478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
SWAP: Protecting pull-based P2P video streaming systems from inference attacks SWAP:保护基于拉的P2P视频流系统免受推理攻击
Giang T. Nguyen, Stefanie Roos, Benjamin Schiller, T. Strufe
{"title":"SWAP: Protecting pull-based P2P video streaming systems from inference attacks","authors":"Giang T. Nguyen, Stefanie Roos, Benjamin Schiller, T. Strufe","doi":"10.1109/WoWMoM.2016.7523509","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523509","url":null,"abstract":"In pull-based Peer-to-Peer video streaming systems, peers exchange buffer maps to reveal the availability of video chunks in their buffer. When collecting these buffer maps, a malicious party can infer the system's overlay structure and even identify head nodes, the direct communication partners of the stream's source. Attacking these head nodes can isolate peers from the source resulting in a disruption of the video dissemination for most peers in the system. We introduce a lightweight SWAP scheme, which allows peers to proactively change their partners, to reduce the chance of head nodes to be identified by such an inference attacker. Extensive simulation studies demonstrate that our scheme effectively undermines the attack's accuracy in identifying head nodes. So, SWAP lowers the chunk miss ratio while causing only a slight increase in signaling overhead.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Have you asked your neighbors? A Hidden Market approach for device-to-device offloading 你问过你的邻居吗?设备到设备卸载的隐藏市场方法
Dimitris Chatzopoulos, Mahdieh Ahmadi, Sokol Kosta, P. Hui
{"title":"Have you asked your neighbors? A Hidden Market approach for device-to-device offloading","authors":"Dimitris Chatzopoulos, Mahdieh Ahmadi, Sokol Kosta, P. Hui","doi":"10.1109/WoWMoM.2016.7523497","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523497","url":null,"abstract":"During the last years, researchers have proposed solutions to help smartphones offload heavy tasks to remote entities in order to improve execution time and reduce energy consumption. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices. None of these strategies, though, proposes any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that integrates an incentive scheme and a reputation mechanism. Our proposal follows the principles of the Hidden Market Design approach, which allows users to specify the amount of resources they are willing to “sacrifice” when participating in the offloading system. The underlying algorithm, that users are not aware of, is based on a truthful auction strategy and a peer-to-peer reputation exchange scheme. Extensive simulations on real traces depict how our designed mechanism achieves higher offloading rate and produces less traffic compared to three benchmark algorithms. Finally, we show how collaborating devices get rewarded for their contribution, while selfish ones get sidelined by others.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"514 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127046262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Energy-efficient cluster-based protocol using an adaptive data aggregative window function (A-DAWF) for wireless sensor networks 基于自适应数据聚合窗口函数(A-DAWF)的无线传感器网络节能聚类协议
S. Kandukuri, J. Lebreton, N. Murad, R. Lorion, Jean-Daniel Lan Sun Luk
{"title":"Energy-efficient cluster-based protocol using an adaptive data aggregative window function (A-DAWF) for wireless sensor networks","authors":"S. Kandukuri, J. Lebreton, N. Murad, R. Lorion, Jean-Daniel Lan Sun Luk","doi":"10.1109/WoWMoM.2016.7523529","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523529","url":null,"abstract":"We present an adaptive data aggregative window function (A-DAWF) for a distributed sensor network model in which nodes store data in their attribute window functions, and provide non-correlated data towards the base station (BS). Unlike previous works, namely data collection or data gathering management systems, we propose a novel approach that aims to process temporal redundant techniques in sensor nodes as well as providing spatial redundant filtration methods in cluster-head (CH) nodes. In this regard, preliminary results show that A-DAWF can suppress up to 90% of temporal redundant data among the considered sensor nodes by an optimal threshold of the window sizes, and their spatial correlations in CH node by a maximum error threshold compared to either periodic or a continuous data transmission system.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tie-breaking can maximize fairness without sacrificing throughput in D2D-assisted networks 在d2d辅助网络中,平局可以在不牺牲吞吐量的情况下最大化公平性
V. Mancuso, A. Asadi, P. Jacko
{"title":"Tie-breaking can maximize fairness without sacrificing throughput in D2D-assisted networks","authors":"V. Mancuso, A. Asadi, P. Jacko","doi":"10.1109/WoWMoM.2016.7523498","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523498","url":null,"abstract":"Opportunistic schedulers such as MaxRate and Proportional Fair are known for trading off between throughput and fairness of users in cellular networks. In this paper, we propose a novel solution that integrates opportunistic scheduling design principles and cooperative D2D communication capabilities in order to maximize fairness without sacrificing throughput. Specifically, we develop a mathematical approach and design a smart tie-breaking scheme which maximizes the fairness achieved by the MaxRate scheduler. However, our approach could be applied to improve fairness of any scheduler. In addition, we show that users that cooperatively form D2D clusters benefit from both higher throughput and fairness. Our scheduling scheme is simple to implement, scales linearly with the number of clusters, and is able to double the throughput of Equal Time schedulers and to outperform by 20% or more Proportional Fair schedulers, while providing a user fairness index comparable to or better than Proportional Fair.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
WiseHAUL: An SDN-empowered Wireless Small Cell Backhaul testbed WiseHAUL:基于sdn的无线小型蜂窝回程测试平台
José Núñez-Martínez, J. Baranda, I. Pascual, J. Mangues‐Bafalluy
{"title":"WiseHAUL: An SDN-empowered Wireless Small Cell Backhaul testbed","authors":"José Núñez-Martínez, J. Baranda, I. Pascual, J. Mangues‐Bafalluy","doi":"10.1109/WoWMoM.2016.7523527","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523527","url":null,"abstract":"The deployment of dense networks of Small Cells (SC) is one of the key components of 5G mobile networks and will pose several challenges to the backhaul network. Software-Defined Networking (SDN) is a key technique to cope with the increased management complexity of such heterogeneous deployments, helping in the task of achieving a system-wide network management, which includes the 5G mobile wireless backhaul. Therefore, it is fundamental to devise the tools for the evaluation of 5G backhauling SDN architectures. This paper presents WiseHAUL: an SDN-empowered Wireless Small Cell Backhaul testbed. We present the design considerations of WiseHAUL, deployed in the form of an hypercube mesh that combines heterogeneous wireless technologies with the final goal of conducting SDN research and experimentation. Preliminary experimental results serve to identify the main research challenges faced by canonical SDN management techniques in an all-wireless backhaul deployment, hence acting as key drivers for further redesign and testbed development towards hybrid SDN models.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Virtualization at the network edge: A performance comparison 网络边缘的虚拟化:性能比较
F. Ramalho, A. Neto
{"title":"Virtualization at the network edge: A performance comparison","authors":"F. Ramalho, A. Neto","doi":"10.1109/WoWMoM.2016.7523584","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523584","url":null,"abstract":"The rapid growth of the Internet of Things (IoT) is driving the evolution of Cloud technologies towards resource distribution across multi-clouds and the inclusion of various heterogeneous devices. IoT specific applications may require the deployment of gateways at the network edge to enable its interaction with physical sensors, pre-processing data from these sensors, and synchronizing it with the cloud. The orchestration, deployment, and maintenance of the software running on the gateways in large-scale deployments is known to be challenging. In this paper we analyze two virtualization techniques commonly used for deployment and management of applications at the cloud, but on the context of IoT and network edge. A study was conducted to evaluate the performance of the container-based approach compared to a hypervisor-based virtualization when running on devices typically used at the network edge. The study was performed through the execution of several synthetic benchmarks providing an insight in the performance overhead introduced by Docker containers (lightweight-virtualization) and KVM VMs (hypervisor-virtualization) running at network edge devices.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Beacons in dense Wi-Fi networks: How to befriend with neighbors in the 5G world? 密集Wi-Fi网络中的信标:如何在5G世界中与邻居交朋友?
D. Bankov, E. Khorov, A. Lyakhov, S. Schelstraete
{"title":"Beacons in dense Wi-Fi networks: How to befriend with neighbors in the 5G world?","authors":"D. Bankov, E. Khorov, A. Lyakhov, S. Schelstraete","doi":"10.1109/WoWMoM.2016.7523579","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523579","url":null,"abstract":"To address 5G challenges, IEEE 802.11 is currently developing new amendments to the Wi-Fi standard, the most promising of which is 802.11ax. A key scenario considered by the developers of this amendment is dense and overlapped networks typically present in residential buildings, offices, airports, stadiums, and other places of a modern city. Being crucial for Wi-Fi hotspots, the hidden station problem becomes even more challenging for dense and overlapped networks, where even access points (APs) can be hidden. In this case, user stations can experience continuous collisions of beacons sent by different APs, which can cause disassociation and break Internet access. In this paper, we show that beacon collisions are rather typical for residential networks and may lead to unexpected and irreproducible malfunction. We investigate how often beacon collisions occur, and describe a number of mechanisms which can be used to avoid beacon collisions in dense deployment. Specifically, we pay much attention to those mechanisms which are currently under consideration of the IEEE 802.11ax group.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of the IEEE 802.11ah Restricted Access Window mechanism for dense IoT networks 面向密集物联网网络的IEEE 802.11ah限制访问窗口机制评估
L. Tian, J. Famaey, Steven Latré
{"title":"Evaluation of the IEEE 802.11ah Restricted Access Window mechanism for dense IoT networks","authors":"L. Tian, J. Famaey, Steven Latré","doi":"10.1109/WoWMoM.2016.7523502","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523502","url":null,"abstract":"IEEE 802.11ah is a new Wi-Fi draft for sub-1Ghz communications, aiming to address the major challenges of the Internet of Things (IoT): connectivity among a large number of power-constrained stations deployed over a wide area. The new Restricted Access Window (RAW) mechanism promises to increase throughput and energy efficiency by dividing stations into different RAW groups. Only the stations in the same group can access the channel simultaneously, which reduces collision probability in dense scenarios. However, the draft does not specify any RAW grouping algorithms, while the grouping strategy is expected to severely impact RAW performance. To study the impact of parameters such as traffic load, number of stations and RAW group duration on optimal number of RAW groups, we implemented a sub-1Ghz PHY model and the 802.11ah MAC protocol in ns-3 to evaluate its transmission range, throughput, latency and energy efficiency in dense IoT network scenarios. The simulation shows that, with appropriate grouping, the RAW mechanism substantially improves throughput, latency and energy efficiency. Furthermore, the results suggest that the optimal grouping strategy depends on many parameters, and intelligent RAW group adaptation is necessary to maximize performance under dynamic conditions. This paper provides a major leap towards such a strategy.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114860899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信