{"title":"An Analytical Model for a Class of Receiver-Initiated MAC Protocols for Energy Harvesting Wireless Sensor Networks","authors":"C. Blondia","doi":"10.23919/PEMWN53042.2021.9664679","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664679","url":null,"abstract":"In this paper we propose an analytical model for a general class of receiver-initiated MAC protocols for energy-harvesting wireless sensor networks. The aim is to evaluate the system occupancy of a sensor node and the average delay a packet in a node experiences, taking into account the energy that is consumed by the radio using the stored energy in a capacitor. Packets are generated by the node itself but may also arrive from neighbor nodes using a receiver-initiated MAC protocol. The radio switches between Transmit, Receive and Sleep states. During the Sleep state, energy is harvested and stored in a capacitor. The sensor node is modeled by means of a finite capacity queue with repeated server vacations of different types and the available energy is modeled by means of an extra variable. The system occupancy and the available energy are observed at inspection instants (i.e., the end of a service or the end of a vacation), resulting in a discrete-time Markov Chain. Closed form formulas for the system occupancy distribution at at arbitrary time instants together with the mean response time are derived. The model is applied to evaluate the sensor node’s performance for various parameter values.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123840716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Said Frikha, S. Gammar, Abdelkader Lahmadi
{"title":"Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward","authors":"Mohamed Said Frikha, S. Gammar, Abdelkader Lahmadi","doi":"10.23919/PEMWN53042.2021.9664667","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664667","url":null,"abstract":"This paper proposes a new method to solve the monitoring and anomaly detection problems of Low-power Internet of Things (IoT) devices. However, their performances are constrained by limited processing, memory, and communication, usually using battery-powered energy. Polling driven mechanisms for monitoring the security, performance, and quality of service of these networks should be efficient and with low overhead, which makes it particularly challenging. The present work proposes the design of a novel method based on a Deep Reinforcement Learning (DRL) algorithm coupled with an Unsupervised Learning reward technique to build a pooling monitoring of IoT networks. This combination makes the network more secure and optimizes predictions of the DRL agent in adaptive environments.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131527717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imen Riabi, Hella Kaffel Ben Ayed, Bilel Zaghdoudi, L. George
{"title":"Blockchain based OAuth for IoT","authors":"Imen Riabi, Hella Kaffel Ben Ayed, Bilel Zaghdoudi, L. George","doi":"10.23919/PEMWN53042.2021.9664701","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664701","url":null,"abstract":"We propose the integration of blockchain with the OAuth standard. Two blockchains are considered for the implementation: Ethereum where ACL and token processing is performed on-chain and MultiChain where the processing is performed off-chain. The experiments show that the on-chain token generation provides an additional overhead compared to the off-chain one. However, it provides a secure token management and access traceability. The main advantage of our contribution is to propose a decentralized authorization system while relying on a standard specification.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Hierarchical Neural Network Offloading in IoT Edge Networks","authors":"Wassim Seifeddine, C. Adjih, N. Achir","doi":"10.23919/PEMWN53042.2021.9664700","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664700","url":null,"abstract":"In recent developments in machine learning, a trend has emerged where larger models achieve better performance. At the same time, deploying these models in real-life scenarios is difficult due to the parallel trend of pushing them on end-users or IoT devices with strong resource limitations. In this work, we develop a novel technique for executing parts of a single model successively through multiple devices (IoT, edge, cloud) while respecting each device’s resource limitations. For that, we introduce a new offloading mechanism where, during computation, a decision can be made to offload work, together with the ability to exit early in the computation with intermediate results. The decision itself is tuned through Deep Q-Learning.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, P. Muhlethaler, S. Bouzefrane, L. Saïdane
{"title":"Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks","authors":"Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, P. Muhlethaler, S. Bouzefrane, L. Saïdane","doi":"10.23919/PEMWN53042.2021.9664702","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664702","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have devastating effects on the performance of a VANET. This kind of attack has been extensively studied in contention-based MAC protocols. Hence, in this work, we focus on studying the impact of such an attack on a contention-free MAC protocol called Distributed TDMA-based MAC Protocol DTMAC. We identify new vulnerabilities related to the MAC slot scheduling process that can affect the slot reservation process on the DTMAC protocol and we use simulations to evaluate their impact on network performance. Exploitation of these vulnerabilities would result in a severe waste of channel capacity where up to a third of the free slots could not be reserved in the presence of an attacker. Moreover, multiple attackers could cripple the channel and none could acquire a time slot.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131819414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim Ayoub, Iman Hmedoush, C. Adjih, K. Khawam, S. Lahoud
{"title":"Deep-IRSA: A Deep Reinforcement Learning Approach to Irregular Repetition Slotted ALOHA","authors":"Ibrahim Ayoub, Iman Hmedoush, C. Adjih, K. Khawam, S. Lahoud","doi":"10.23919/PEMWN53042.2021.9664720","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664720","url":null,"abstract":"The Internet of Things (IoT) aims to connect billions of devices, most of which are power and memory-constrained. Such constraints require efficient network access. “Irregular Repetition Slotted Aloha” (IRSA) meets such requirements. In this paper, we optimize IRSA using Deep Reinforcement Learning to obtain Deep-IRSA, and introduce variants that allow retransmission and user priority classes. We observe the learned degree distribution and throughput, showing that Deep-IRSA performs excellently, is generic, and could well replace known approaches for smaller frame sizes and IRSA variants.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rihab Boussada, Balkis Hamdane, F. Kamoun, L. Saïdane
{"title":"Surveying and Analyzing Privacy Issues in Contact tracing apps","authors":"Rihab Boussada, Balkis Hamdane, F. Kamoun, L. Saïdane","doi":"10.23919/PEMWN53042.2021.9664725","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664725","url":null,"abstract":"The coronavirus pandemic continues to represent widespread panic, and global initiatives are focused on treating and limiting its spread. Contact tracing promises to help fight this pandemic through early detection of possible contagion events. In this context, several mobile applications have been proposed to try to identify the contact cases of a person who tested positive for COVID-19. In total, 32 countries have developed such applications and are using them as a strategy that may flatten the pandemic curve. These applications can also be adopted to combat future communicable diseases among humans. However, most of these applications do not fully respect the preservation of the privacy of users. That’s why, the adoption of these applications is being held back in many countries. Motivated by the need to protect user privacy, we analyze some of these applications. We demonstrate that they collect sensitive data which represents a violation of user privacy. At the end, we present several major recommendations that can serve as a reference, contributing to the development of privacy-preserving contact tracing applications.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Aissaoui, Chiraz Houaidia, A. Bossche, T. Val, L. Saïdane
{"title":"A new Taxonomy of Physical-Layer Network Coding techniques in Two Way Relay Channel model with single antenna","authors":"Mohammed Aissaoui, Chiraz Houaidia, A. Bossche, T. Val, L. Saïdane","doi":"10.23919/PEMWN53042.2021.9664726","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664726","url":null,"abstract":"Physical-layer network coding (PNC) can effectively improve wireless networks by extracting superimposed signals and transforming collision’s dilemma into an advantage. The proposition of higher layer methods (such as Data Link and Network Layer) explicitly designed for PNC can better enhance wireless network performances. Since the field of PNC is very vast and has several applications, the researchers of the higher layers find it very difficult to propose a suitable PNC system for their research, which has led to the scarcity of research works of this type. This article proposes a new classification method designed to help researchers choose the optimal method that suits their system. This paper is a complete guide for researchers of higher layers to discover the PNC field and improve wireless network performances.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANGELA: HTTP Adaptive Streaming and Edge Computing Simulator","authors":"Jesús Aguilar Armijo, C. Timmerer, H. Hellwagner","doi":"10.23919/PEMWN53042.2021.9664671","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664671","url":null,"abstract":"In this work, we present ANGELA, HTTP Adaptive Streaming (HAS) and Edge Computing Simulator. ANGELA was designed to test edge mechanisms that support HAS, as it offers: realistic radio layer simulation, different multimedia content configurations, access to radio and player metrics at the edge, and a wide variety of metrics to evaluate the video streaming session performance. The ANGELA architecture is flexible and can support adaptive bitrate (ABR) algorithms located at different points of the network. Moreover, we show the possibilities of ANGELA by evaluating different ABR algorithms.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128616431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Performance Evaluation of Cellular IoT networks in Deep-Indoor Scenario","authors":"Kalpit Dilip Ballal, L. Dittmann, S. Ruepp","doi":"10.23919/PEMWN53042.2021.9664690","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664690","url":null,"abstract":"Narrow-band Internet of Things (NB-IoT) and LTE-M are two emerging Low Power Wide Area Network (LPWAN) technologies in the IoT space. Both NB-IoT and LTE-M are based on the 3GPP LTE standard with added features specifically designed for Low Power, remote, and reliable IoT applications. Among other things, these Cellular-IoT (C-IoT) technologies promise improved deep-indoor performance (at least 20 dBm) over traditional LTE standards. In this paper, we have tried to evaluate the deep-indoor performance of NB-IoT and LTE-M. The technologies have been evaluated based on End-to-End delay, bitrate, received signal quality, and packet drop in uplink (UL) and downlink (DL) directions. The tests have been performed using the commercially deployed NB-IoT and LTE-M networks by operators in Denmark. These tests were conducted in the underground tunneling system of the Technical University of Denmark at levels L-1 and L-2 from the ground surface. The outcome of these tests was then compared with the outcome from the best-case scenario, where the base station is in the Line of Site (LOS) to the User Equipment(UE). In total, the tests were conducted at 18 different locations with a total of approx—two hundred eighty-eight thousand packets sent using both technologies, over two telecom operators with varying packet sizes. The goal behind experiments is to test the performance of C-IoT technologies in multi-technology deployment (in parallel with GSM, LTE, etc.) and gather real-world performance data from the networks. The idea is to determine whether C-IoT can be used for deep-indoor applications deployment. The results from these tests indicate that C-IoT networks had a degraded and unreliable performance in poor radio conditions.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132589143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}