2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

筛选
英文 中文
Spatial locality in pocket switched networks 口袋交换网络中的空间局部性
Tekenate E. Amah, M. Kamat, K. A. Bakar, W. Moreira, Antonio Oliveira, M. Batista
{"title":"Spatial locality in pocket switched networks","authors":"Tekenate E. Amah, M. Kamat, K. A. Bakar, W. Moreira, Antonio Oliveira, M. Batista","doi":"10.1109/WoWMoM.2016.7523583","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523583","url":null,"abstract":"The current Internet design falls short in scenarios characterized by intermittent connectivity and absence of supporting infrastructure. Pocket switched networking allows communication between portable handheld user devices in such environments through the store-carry-forward paradigm. This involves storing data in device memory, exploiting user movement to physically transport the data, and forwarding through available short-range wireless interfaces. In this regard, user devices can be leveraged as data mules for point-to-point communication in two main scenarios: (i) conveying data between major infrastructures in urban areas (e.g., transporting sensor data to gateways in smart cities); and (ii) extending wireless coverage to provide connectivity in developing regions (e.g., bridging user devices and remote Internet access points). User movement in such scenarios exhibit spatial locality, which is the preference to a geographical location than others. This feature influences the data transfer opportunities that exist between different sets of users. This paper investigates the impact of locality on routing in pocket switched networks by: (i) evaluating the performance of existing routing strategies for point-to-point communication over different degrees of locality; and (ii) providing insights towards enhancing routing performance for realizing the aforementioned application scenarios through locality awareness.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhanced Ultrawideband methods for 5G LOS sufficient positioning and mitigation 增强型超宽带方法用于5G LOS充分定位和缓解
Akeem A. Adebomehin, S. Walker
{"title":"Enhanced Ultrawideband methods for 5G LOS sufficient positioning and mitigation","authors":"Akeem A. Adebomehin, S. Walker","doi":"10.1109/WoWMoM.2016.7523540","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523540","url":null,"abstract":"The 5G network prospect of seamlessly connected global devices with delay-tolerant communication, millisecond latency and gigabits per second data rate suggests the need for high resolution location-aware systems with new methods for positioning services. Traditional geo-positioning methods have been characterized by detection and mitigation of NLOS paths where discrimination between LOS and NLOS components are cast into a hypothesis-testing problem. This explains the focus of most related works on range measurements. It is however believed that Ultrawideband (UWB) promises better positioning methods for accuracy-critical situations expected in 5G setting. This paper outlines probable 5G wireless architecture as a road map to UWB in future wireless environments. It also proposes EULOSTECH; an algorithm for enhanced UWB LOS sufficiency positioning technique and mitigation method for cognitive 5G wireless setting. Results obtained from simulation experiments have been impressive and the highlights are presented in this paper. It is believed that the proposed solution has potential for robust and cost efficient localization in 5G setting as well as prospect to decongest licensed spectrums in 5G wireless environment with UWB.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134002787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Revisiting 802.11 power consumption modeling in smartphones 重新审视智能手机中的802.11功耗建模
S. K. Saha, Pratham Malik, Selvaganesh Dharmeswaran, Dimitrios Koutsonikolas
{"title":"Revisiting 802.11 power consumption modeling in smartphones","authors":"S. K. Saha, Pratham Malik, Selvaganesh Dharmeswaran, Dimitrios Koutsonikolas","doi":"10.1109/WoWMoM.2016.7523500","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523500","url":null,"abstract":"WiFi activity is a major source of power consumption in today's smartphones. Consequently, accurately WiFi power consumption models are extremely useful for researchers and app developers. Among a large number of models proposed recently, a model introduced by Serrano et al. was the first to add a new component - a per-frame energy toll incurred as a frame traverses the protocol stack - to the power consumption of the wireless NIC. The authors called this new component cross-factor and validated the accuracy of the model on a large number of devices, mostly 802.11g wireless routers and APs. This paper examines the validity of the model introduced by Serrano et al. on today's smartphones. We try to answer two questions: (i) Can the model accurately estimate the power consumption due to WiFi activity in today's smartphones given the complexity of modern smartphone architectures? (ii) Does the model remain valid in the case of 802.11n/ac interfaces, and if yes, can it reflect the impact of the new MAC features (e.g., MIMO, channel bonding) on the WiFi power consumption? Additionally, we study the impact of the power saving mode (PSM) which was ignored in the original model and show that ignoring PSM results in significant overestimation of the total power consumption at low frame generation rates. Accordingly, we propose a new model that works across the full range of frame generation rates and verify its accuracy for a wide range of parameters and devices.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132986147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Xcastor: Secure and scalable group communication in ad hoc networks Xcastor:在自组织网络中安全且可扩展的组通信
Milan Schmittner, M. Hollick
{"title":"Xcastor: Secure and scalable group communication in ad hoc networks","authors":"Milan Schmittner, M. Hollick","doi":"10.1109/WOWMOM.2016.7523512","DOIUrl":"https://doi.org/10.1109/WOWMOM.2016.7523512","url":null,"abstract":"Mobile ad hoc networks (MANETs) are emerging as a practical technology for emergency response communication in the case a centralized infrastructure malfunctions or is not available. Using smartphones as communication devices, MANETs may be readily established among the civilian population of affected areas. Beneficiaries would be civilian first responders, which may form small collaborating groups. Communication in such groups must be reliable for disaster response to be effective. In this paper, we address the issue of reliable group communication on the network layer. We design and implement the first secure explicit multicast routing protocol called Xcastor, in which we extend the secure and scalable routing concept of the Castor unicast routing protocol towards supporting reliable communication for large numbers of small groups. By simulation, we show significant performance improvements over Castor.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129177396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy efficient line-of-sight millimeter wave small cell backhaul: 60, 70, 80 or 140 GHz? 高效视距毫米波小蜂窝回程:60,70,80或140 GHz?
A. Mesodiakaki, A. Kassler, E. Zola, M. Ferndahl, T. Cai
{"title":"Energy efficient line-of-sight millimeter wave small cell backhaul: 60, 70, 80 or 140 GHz?","authors":"A. Mesodiakaki, A. Kassler, E. Zola, M. Ferndahl, T. Cai","doi":"10.1109/WoWMoM.2016.7523521","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523521","url":null,"abstract":"Spectrum scarcity together with high capacity demands make the use of millimeter wave (mmWave) frequencies an interesting alternative for next generation, i.e., fifth generation (5G), networks. Although mmWave is expected to play a key role for both access network and backhaul (BH), its initial use in the BH network seems more straight-forward. This stems from the fact that, in the BH case, its deployment is less challenging due to the fixed locations of BH transceivers. Still, provided that mmWave spectrum consists of several subbands, each one with different characteristics and thus different deployment constraints (e.g., channel bandwidth, maximum transmission power), a comparison is required in order to gain a better insight into the potentials of each solution. To that end, in this paper, the main mmWave candidate frequency bands are compared in terms of range, throughput and energy consumption. In our results, the bandwidth availability, the maximum transmission power as well as the antenna gains of each BH technology are taken into account, as defined by the Federal Communications Commission. The results are also compared with current industry-oriented state-of-the-art transceiver characteristics in order to gain further insights into the maximum achievable gains of each subband.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115514842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Evolution of vehicular congestion control without degrading legacy vehicle performance 不降低传统车辆性能的车辆拥塞控制演变
Bin Cheng, Ali Rostami, M. Gruteser, Hongsheng Lu, J. Kenney, G. Bansal
{"title":"Evolution of vehicular congestion control without degrading legacy vehicle performance","authors":"Bin Cheng, Ali Rostami, M. Gruteser, Hongsheng Lu, J. Kenney, G. Bansal","doi":"10.1109/WoWMoM.2016.7523573","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523573","url":null,"abstract":"Channel congestion is one of the major challenges for IEEE 802.11p-based vehicular ad hoc networks. To tackle the challenge, several algorithms have been proposed and some of them are being considered for standardization. Situations could arise where vehicles with different algorithms operate in the same network. Our previous work has investigated the performance of a mixed-algorithm vehicular network for the CAM-DCC and LIMERIC algorithms and identified that the CAM-DCC vehicles could potentially experience a performance degradation after introducing the LIMERIC vehicles into the network. In this work, we study whether it is possible to eliminate or bound this degradation. We propose a CBP target adjustment mechanism which controls the CBP target of LIMERIC vehicles according to vehicle density and mixing situation of the two algorithms in the network to limit the performance degradation of CAM-DCC vehicles to a desired level. The proposed mechanism is evaluated via both MATLAB and ns-2 simulations and the simulation results indicate that the performance degradation of the CAM-DCC vehicles is controlled as expected with only negligible impact on the performance of LIMERIC vehicles, which still perform similar or better than CAM-DCC vehicles.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of cooperative ARQ systems for wireless industrial networks 无线工业网络协同ARQ系统性能分析
Martin Serror, Yulin Hu, Christian Dombrowski, Klaus Wehrle, J. Gross
{"title":"Performance analysis of cooperative ARQ systems for wireless industrial networks","authors":"Martin Serror, Yulin Hu, Christian Dombrowski, Klaus Wehrle, J. Gross","doi":"10.1109/WoWMoM.2016.7523534","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523534","url":null,"abstract":"The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device 量化安全物联网的成本:基于arm的设备上ECC签名的开销和能耗
Max Mossinger, Benedikt Petschkuhn, Johannes Bauer, R. C. Staudemeyer, M. Wójcik, H. C. Pöhls
{"title":"Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device","authors":"Max Mossinger, Benedikt Petschkuhn, Johannes Bauer, R. C. Staudemeyer, M. Wójcik, H. C. Pöhls","doi":"10.1109/WoWMoM.2016.7523559","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523559","url":null,"abstract":"In this paper, we document the overhead in terms of runtime, firmware size, communication and energy consumption for Elliptic Curve Cryptography (ECC) signatures of modern ARM-based constrained devices. The experiments we have undertaken show that the cryptographic capabilities of the investigated Zolertia Re-Mote based on a TI's CC2538 chipset running Contiki OS is indeed suitable for the Internet-of-Things (IoT): Computing a signature using a curve with a 192-bit key length adds an additional runtime of roughly 200 ms. However, we found that in comparison to sending an unsigned message approximately two-thirds of the runtime overhead is spent on cryptographic operations, while sending the signed message accounts for the remainder. We give real measurements which can be used as a basis for analytical models. Our measurements show that the saving gained by using curves with lower security levels (i. e., 160-bit key length) is not worth the sacrifice in protection. While signatures add non-negligible overhead, we still think that the additional 200 ms (signing with secp192r) is worth consideration. This paper gives an indication of the true costs of cryptographically protected message integrity which is greater or equal to the cost of encryption. We show what needs to be spent in order to verify the origin of the data in the application, since in the IoT it will have travelled through many `things'.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Hybrid indoor localization using multiple Radio Interfaces 混合室内定位使用多个无线电接口
Islam Alyafawi, Simon Kiener, T. Braun
{"title":"Hybrid indoor localization using multiple Radio Interfaces","authors":"Islam Alyafawi, Simon Kiener, T. Braun","doi":"10.1109/WoWMoM.2016.7523525","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523525","url":null,"abstract":"This paper presents a hybrid approach for real-time indoor localization without interaction with end users or network operators. The proposed solution uses signal strength information from multiple Radio Interfaces (RIs) to estimate locations of target devices. This solution benefits from different characteristics of radio signals at each RI to overcome challenges such as multipath propagation. The proposed algorithms may combine signal information prior to or after the localization process. The system operates blindly without a priori knowledge of the environment layout or target devices' radio settings. Results of real indoor experiments with both WiFi and GSM show an improvement by the proposed hybrid solution with a median error of 1.6m compared to 2.3m for WiFi and 3.0m for GSM.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129643362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security threat assessment of simultaneous multiple Denial-of-Service attacks in IEEE 802.22 Cognitive Radio networks IEEE 802.22认知无线网络中同时多重拒绝服务攻击的安全威胁评估
Ismail K. Ahmed, A. Fapojuwo
{"title":"Security threat assessment of simultaneous multiple Denial-of-Service attacks in IEEE 802.22 Cognitive Radio networks","authors":"Ismail K. Ahmed, A. Fapojuwo","doi":"10.1109/WoWMoM.2016.7523510","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523510","url":null,"abstract":"The Cognitive Radio (CR) is a fully-reconfigurable wireless device that can intelligently sense, manage, and exploit temporarily-vacant licensed spectrum bands during the absence of incumbent users. Broadly, the IEEE 802.22 is the first complete Wireless Regional Area Network (WRAN) standard that utilizes CR technology in the opportunistic access of white spaces in the television (TV) bands. Intrinsically, the increased CR networks' vulnerabilities alongside the experienced growth of attackers' capabilities, creates a strain on CR network designers to act accordingly. However, most of the existing efforts solely examined the issues of Denial-of-Service (DoS) attacks of IEEE 802.22 networks, such as Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification (SSDF) attack, each treated in isolation. One main challenge in CR network security domain is to efficiently represent possible simultaneous multiple security threats, and assess their effects. Unlike the previous works, this paper addresses the aforementioned challenge through using the holistic approach of assessing the combined effect of simultaneous multiple DoS attacks. The Bayesian Attack Graph (BAG) model is utilized in this paper to capture the probabilistic dependencies among IEEE 802.22 DoS threat-environment and known vulnerabilities. The simulation results indicate up to 51.3% increase in the probability of DoS in IEEE 802.22 networks considering simultaneous multiple attacks in comparison to the most severe sole attack. Finally, the paper introduces the BAG model as a feasible CR vulnerability metric that can facilitate the creation of a security tightening plan.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信