Kanchana Thilakarathna, A. Karim, H. Petander, A. Seneviratne
{"title":"MobiTribe: Enabling device centric social networking on smart mobile devices","authors":"Kanchana Thilakarathna, A. Karim, H. Petander, A. Seneviratne","doi":"10.1109/SAHCN.2013.6644982","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644982","url":null,"abstract":"We proposed MobiTribe which enables device centric social networking on smart mobile devices while reducing high communication costs and battery usage normally associated with mobile distributed systems. In this paper, we demonstrate the feasibility of MobiTribe by integrating the service with the popular social networking application Facebook. We show that it is possible to provide the benefits of distributed content sharing on top of the existing centralized social networking services with minimal changes to the content sharing process.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114765304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint carrier aggregation and packet scheduling in LTE-advanced networks","authors":"Xiaolin Cheng, G. Gupta, P. Mohapatra","doi":"10.1109/SAHCN.2013.6645018","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645018","url":null,"abstract":"LTE is the next generation of all-IP mobile communication system designed and developed by 3GPP. It offers unprecedented data transmission speed and low latency to support a variety of applications and services. However, compared to wireline networks, efficient QoS provisioning for diversified applications in wireless access networks such as LTE is challenging due to unreliable and resource-constrained radio interface. In this paper, we investigate an important problem of downlink resource allocation in recently enhanced LTE-Advanced systems where a newly added feature carrier aggregation provides more flexibility in radio resource management in addition to the existing resource block level packet scheduling. The resource allocation problem can be formulated as a complex combinatorial problem with multiple constraints and is solved every time slot. We decompose this highly complex optimization problem and construct a two-tier resource allocation framework which incorporates dynamic component carrier assignment and backlog based scheduling schemes with intelligent link adaptation. An efficient algorithm is developed to dynamically allocate component carriers to users to achieve load balancing. We also present novel backlog based scheduling policies and weighted-CQI based link adaptation scheme to obtain significantly better throughput and delay fairness. Performance of the proposed schemes is evaluated against the static round-robin component carrier assignment, the well-known proportional fairness scheduling rule and the existing link adaptation scheme. Extensive simulation results demonstrate that our schemes offer both better throughput and delay performance as well as user fairness.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Starsky H. Y. Wong, R. Raghavendra, Yang Song, Kang-Won Lee
{"title":"X-WING: A high-speed wireless broadcasting framework for IEEE 802.11 networks","authors":"Starsky H. Y. Wong, R. Raghavendra, Yang Song, Kang-Won Lee","doi":"10.1109/SAHCN.2013.6645004","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645004","url":null,"abstract":"Rate adaptation is a MAC-layer mechanism in IEEE 802.11 networks that ensures efficient utilization of constantly varying wireless channel. For broadcast communication, however, the current practice is to send data at base rates (i.e., 1 or 2 Mbps in 802.11b/b+g and 6Mbps in 802.11a/g), leaving the channel capacity significantly underutilized. In this paper, we present a practical rate adaptation framework designed for broadcasting of streaming data to improve the channel utilization of 802.11 networks. The proposed framework jointly selects the data rate and the error protection level of FEC in a novel manner, and does not require changes to either existent applications or to the 802.11 standards - thus can be deployed in existing 802.11 networks. Using the performance measurement study in various live networking environments, we show that the proposed scheme provides substantial improvement in wireless channel utilization (more than 10x improvement compared to the current broadcast mode) and can adapt to different operational environments.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Shi, Wenzhan Song, Mingsen Xu, Qingjun Xiao, Goutham Kamath, J. Lees, G. Xing
{"title":"Imaging seismic tomography in sensor network","authors":"Lei Shi, Wenzhan Song, Mingsen Xu, Qingjun Xiao, Goutham Kamath, J. Lees, G. Xing","doi":"10.1109/DCOSS.2013.19","DOIUrl":"https://doi.org/10.1109/DCOSS.2013.19","url":null,"abstract":"Tomography imaging, applied to seismology, requires a new, decentralized approach if high resolution calculations are to be performed in a sensor network configuration. The real-time data retrieval from a network of large-amount wireless seismic nodes to a central server is virtually impossible due to the sheer data amount and resource limitations. In this paper, we present a distributed multi-resolution evolving tomography algorithm for processing data and inverting volcano tomography in the network, while avoiding costly data collections and centralized computations. The new algorithm distributes the computational burden to sensor nodes and performs real-time tomography inversion under the constraints of network resources. We implemented and evaluated the system design in the CORE emulator. The experiment results validate that our proposed algorithm not only balances the computation load, but also achieves low communication cost and high data loss tolerance.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124258169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majid Ghaderi, D. Goeckel, A. Orda, Mostafa Dehghan
{"title":"Efficient wireless security through jamming, coding and routing","authors":"Majid Ghaderi, D. Goeckel, A. Orda, Mostafa Dehghan","doi":"10.1109/SAHCN.2013.6645022","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645022","url":null,"abstract":"There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an o-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint ultra-wideband and signal strength-based through-building tracking for tactical operations","authors":"Merrick McCracken, M. Bocca, Neal Patwari","doi":"10.1109/SAHCN.2013.6645000","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645000","url":null,"abstract":"Accurate device free localization (DFL) based on received signal strength (RSS) measurements requires placement of radio transceivers on all sides of the target area. Accuracy degrades dramatically if sensors do not surround the area. However, law enforcement officers sometimes face situations where it is not possible or practical to place sensors on all sides of the target room or building. For example, for an armed subject barricaded in a motel room, police may be able to place sensors in adjacent rooms, but not in front of the room, where the subject would see them. In this paper, we show that using two ultra-wideband (UWB) impulse radios, in addition to multiple RSS sensors, improves the localization accuracy, particularly on the axis where no sensors are placed (which we call the x-axis). We introduce three methods for combining the RSS and UWB data. By using UWB radios together with RSS sensors, it is still possible to localize a person through walls even when the devices are placed only on two sides of the target area. Including the data from the UWB radios can reduce the localization area of uncertainty by more than 60%.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128568507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Santagati, T. Melodia, L. Galluccio, S. Palazzo
{"title":"Distributed MAC and rate adaptation for ultrasonically networked implantable sensors","authors":"G. Santagati, T. Melodia, L. Galluccio, S. Palazzo","doi":"10.1109/SAHCN.2013.6644968","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644968","url":null,"abstract":"The use of miniaturized biomedical devices implanted in the human body and wirelessly internetworked is promising a significant leap forward in medical treatment of many pervasive diseases. Recognizing the well-understood limitations of traditional radio-frequency wireless communications in interconnecting devices within the human body, in this paper we propose to develop network protocols for implantable devices based on ultrasonic transmissions. We start off by assessing the feasibility of using ultrasonic propagation in human body tissues and by deriving an accurate channel model for ultrasonic intra-body communications. Then, we propose a new ultrasonic transmission and multiple access technique, which we refer to as Ultrasonic WideBand (UsWB). UsWB is based on the idea of transmitting information bits spread over very short pulses following a time-hopping pattern. The short impulse duration results in limited reflection and scattering effects, and its low duty cycle reduces the thermal and mechanical effects, which are detrimental for human health. We then develop a multiple access technique with distributed control to enable efficient simultaneous access by interfering devices based on minimal and localized information exchange and on measurements at the receiver only. Finally, we demonstrate the performance of UsWB through a multi-scale simulator that models the proposed communication system at the acoustic wave level, at the physical (bit) level, and at the network (packet) level.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building blocks of physical-layer network coding","authors":"Jianghao He, S. Liew","doi":"10.1109/SAHCN.2013.6645013","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6645013","url":null,"abstract":"This paper investigates the fundamental building blocks of physical-layer network coding (PNC). Since its conception, PNC has developed into a subfield of network coding investigated by many. Most of the prior work, however, focused on the simplest communication setup in which PNC could be applied, namely the two-way-relay channel (TWRC). Studies of the application of PNC in general networks are relatively few. This paper is an attempt to fill this gap. To do so, we put forth two ideas: 1) For the purpose of scheduling transmissions, a general network can be decomposed into small building blocks of PNC, referred to as the PNC atoms. 2) TWRC is only one of many possible PNC atoms - besides TWRC, we identify eight other PNC atoms. We present formal definitions for the nine PNC atoms. We then formulate the PNC scheduling problem as a linear program based on the decomposition principle stated in 1) above. Two major results of our simulation experiments are as follows. First, under the decomposition framework, the throughput performance of PNC is significantly better than those of the traditional multi-hop scheme and the non-physical-layer network coding scheme - e.g., under heavy traffic volume, PNC can achieve 100% throughput gain relative to the traditional multi-hop scheme. Second, PNC decomposition based on a variety of different PNC atoms yield much better performance than PNC decomposition based on the TWRC atom alone.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using encryption for authentication: Wireless sensor network case","authors":"Filip Jurnecka, Vashek Matyás","doi":"10.1109/SAHCN.2013.6644960","DOIUrl":"https://doi.org/10.1109/SAHCN.2013.6644960","url":null,"abstract":"In this paper we discuss the possibility of using encryption to provide authenticity and explore various options for using authentication primitives, namely MAC, to provide confidentiality in wireless sensor networks. We briefly discuss the theoretical background and focus more deeply on the performance questions. We have found and implemented a set of both encryption and MAC functions, measured the timings and memory requirements of these on a mainstream wireless sensor node. Our paper also brings a performance analysis of existing cryptographic implementations.","PeriodicalId":206294,"journal":{"name":"2013 IEEE International Conference on Sensing, Communications and Networking (SECON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120916924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}