{"title":"System Level Evaluation and Validation of the ns-3 LTE Module in 3GPP Reference Scenarios","authors":"Andrei Marinescu, I. Macaluso, L. Dasilva","doi":"10.1145/3132114.3132117","DOIUrl":"https://doi.org/10.1145/3132114.3132117","url":null,"abstract":"LTE networks represent the latest generation implementation of communications technologies for mobile users. As such, simulation tools are essential in the development of new radio resource management (RRM) techniques for LTE. In this paper, we evaluate the LTE module of the ns-3 simulator in a set of 3GPP reference scenarios for system level simulation. Downlink spectral efficiency, user throughput distribution and SINR distribution in a basic LTE configuration are compared against 3GPP results, which are based on an aggregate of 17 industrial simulators. Results show that the ns-3 LTE module achieves similar performance to the one obtained by the 3GPP industrial simulators in the evaluated cases, both in terms of SINR distributions and users' throughput.","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joshua Harrington, Jesse Lacroix, K. El-Khatib, F. Lobo, Horácio Oliveira
{"title":"Proactive Certificate Distribution for PKI in VANET","authors":"Joshua Harrington, Jesse Lacroix, K. El-Khatib, F. Lobo, Horácio Oliveira","doi":"10.1145/3132114.3132730","DOIUrl":"https://doi.org/10.1145/3132114.3132730","url":null,"abstract":"Vehicular Ad-Hoc Networks (VANET) are the creation of several vehicles communicating with each other in order to create a network capable of communication and data exchange. One of the most promising methods for security and trust amongst vehicular networks is the usage of Public Key Infrastructure (PKI). However, current implementations of PKI as a security solution for determining the validity and authenticity of vehicles in a VANET is not efficient due to the usage of large amounts of delay and computational overhead. In this paper, we investigate the potential of PKI when predictively and preemptively passing along certificates to roadside units (RSU) in an effort to lower delay and computational overhead in a dynamic environment. We look to accomplish this through utilizing fog computing and propose a new protocol to pass certificates along the projected path.","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcos Aurélio Carrero, M. A. Musicante, A. Santos, Carmem S. Hara
{"title":"A Reusable Component-Based Model for WSN Storage Simulation","authors":"Marcos Aurélio Carrero, M. A. Musicante, A. Santos, Carmem S. Hara","doi":"10.1145/3132114.3132118","DOIUrl":"https://doi.org/10.1145/3132114.3132118","url":null,"abstract":"Sensor networks are a fast-evolving technology used for a variety of applications, ranging from environmental monitoring to cyber-physical systems (CPS) and IoT, including applications designed to support smart cities. The widespread use of sensor networks rises new challenges to data management and storage. The development of data storage systems is a hard task due to the specific nature of wireless sensor networks (WSNs) and the lack of a common general purpose development framework. Software component models provide an appropriate level of system abstraction, reducing the development complexity and improving productivity. In this paper we propose RCBM, a Reusable Component-based Model for wireless sensor network storage simulation. RCBM promotes software reuse from existing components to improve the efficiency of system development and evaluation. RCBM has been implemented on the NS2 simulator and experimental results show that RCBM is more flexible than previous component-based models for WSNs. Due to its general-purpose approach, RCBM can be applied to develop simulation code for a wide range of WSN storage models, reducing the development effort.","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123317234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatio-Temporal Compressive Sensing Technique for Data Gathering and Anomaly Detection in Wireless Sensor Networks","authors":"M. A. Moussa, Y. Ghamri-Doudane","doi":"10.1145/3132114.3132121","DOIUrl":"https://doi.org/10.1145/3132114.3132121","url":null,"abstract":"In this paper, we focus on collecting data and detecting anomalies in Wireless Sensor Networks (WSNs) while optimizing the use of sensor computational and energetic resources. Recently, Compressive Sensing (CS)-based solutions had been the subject of extensive studies for the design of efficient data gathering solutions in WSNs. However, existing CSbased approaches are very sensitive to outlying values and do not offer a proper tool to deal with the presence of anomalies. Moreover, CS data gathering schemes are based only on the spatial correlation pattern between sensory data and ignore an important feature which is the temporal correlation between sensor readings. This paper introduces a novel CS-based data gathering solution that allows to integrate the spatial and temporal correlation features into the data recovering process. Furthermore, the proposed approach is built in such a way that it also allows to detect and correct eventual anomalies. We propose a general formulation of data gathering and anomaly detection problem as a tractable convex optimization problem on the Hilbert space of data measurements and anomalies. Besides, we design a new class of primal-dual algorithms to solve the resulting optimization problem. We evaluate the efficiency of our method by running extensive simulations on two real datasets. We demonstrate that the proposed algorithm achieves good data recovery and anomaly detection performance and outperforms the main state-of-the-art technique addressing the same problem.","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127694581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Badrun Nahar, M. S. Alam, Shamim Ara Shawkat, M. A. Hoque
{"title":"Priority Aware Interference Mitigation Techniques for Coexistence of Wireless Technologies in Smart Utility Networks","authors":"Badrun Nahar, M. S. Alam, Shamim Ara Shawkat, M. A. Hoque","doi":"10.1145/3132114.3132124","DOIUrl":"https://doi.org/10.1145/3132114.3132124","url":null,"abstract":"In recent years, Smart Grid (SG) is envisioned to be the next generation electric power system by replacing traditional power grid due to its advantage of using two way communications. To implement reliable SG wireless communication networks, IEEE introduced a new wireless standard (IEEE802.15.4g) for Smart Utility Networks (SUNs). However, SUN operates on 2.4 GHz unlicensed band which is overlapped with Wireless Local Area Networks (WLANs) that leads to coexistence in Smart Utility Networks. In this paper, the coexistence problem of SUN is addressed in terms of homogeneous and heterogeneous interferences. To mitigate the homogeneous interference, Contention Access Period (CAP) and Contention Free Period (CFP) of a super frame of IEEE 802.15.4g is used to access the channel using slotted CSMA/CA algorithm by modifying the Backoff Period (BP) and Clear Channel Assessment (CCA) period for different priority data. An analytical model is developed using Markov chain, through which we demonstrate the accuracy of the proposed model in terms of throughput, channel access delay, probability of successful transmission and collision for nodes with different priority data. Performance evaluation is further investigated by comparing the proposed scheme with the existing PA-MAC. A channel switching mechanism is explored to mitigate the heterogeneous interference by the prediction of Naive Bayes Classifier. Predicted result shows that proposed mechanism effectively mitigates the heterogeneous interference by choosing the non-overlapping and non-coexisting channel.","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maryam Karimi, P. Krishnamurthy, J. Joshi, D. Tipper
{"title":"Mining Historical Data towards Interference Management in Wireless SDNs","authors":"Maryam Karimi, P. Krishnamurthy, J. Joshi, D. Tipper","doi":"10.1145/3132114.3132125","DOIUrl":"https://doi.org/10.1145/3132114.3132125","url":null,"abstract":"WiFi networks often seek to reduce interference through network planning, macroscopic self-organization (e.g. channel switching) or network management. In this paper, we explore the use of historical data to automatically predict traffic bottlenecks and make rapid decisions in a wireless (WiFi-like) network on a smaller scale. This is now possible with software defined networks (SDN), whose controllers can have a global view of traffic flows in a network. Models such as classification trees can be used to quickly make decisions on how to manage network resources based on the quality needs, service level agreement or other criteria provided by a network administrator. The objective of this paper is to use data generated by simulation tools to see if such classification models can be developed and to evaluate their efficacy. For this purpose, extensive simulation data was collected and data mining techniques were then used to develop QoS prediction trees. Such trees can predict the maximum delay that results due to specific traffic situations with specific parameters. We evaluated these decision/classification trees by placing them in an SDN controller. OpenFlow cannot directly provide the necessary information for managing wireless networks so we used POX messenger to set up an agent on each AP for adjusting the network. Finally we explored the possibility of updating the tree using feedback that the controller receives from hosts. Our results show that such trees are effective and can be used to manage the network and decrease maximum packet delay.","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126559564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","authors":"","doi":"10.1145/3132114","DOIUrl":"https://doi.org/10.1145/3132114","url":null,"abstract":"","PeriodicalId":194043,"journal":{"name":"Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122284786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}