{"title":"Autonomous dynamic transmission scheduling based on neighbor node behavior for multihop wireless networks","authors":"Daiki Nobayashi, Y. Fukuda, T. Ikenaga","doi":"10.1109/LCN.2012.6423625","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423625","url":null,"abstract":"Multihop wireless networks (MWNs) can dynamically extend the coverage area of wireless local area networks (LANs). Communication performance of MWNs that use a single channel decreases due to interference between nodes occurring when frames are being relayed. In this paper, we proposed an autonomous dynamic transmission scheduling scheme for MWNs that is based on the behavior of neighbor nodes. In our proposed scheme, each node has a transmission priority obtained by monitoring neighboring nodes. Because it is difficult for low priority node to obtain the right to transmit a frame, the proposed scheme can mitigate interferences among nodes. In this paper, we evaluate the proposed scheme by performing simulations, and show that it can improve performance in MWN communications.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"58 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114105246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the feasibility of secure application-layer communications on the Web of Things","authors":"J. Granjal, E. Monteiro, J. Silva","doi":"10.1109/LCN.2012.6423615","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423615","url":null,"abstract":"The availability of inexpensive sensing devices capable of wireless communications enables the design of exciting and new distributed sensing applications. The integration of such applications with the Internet will contribute to materialize a vision of a future Web that we nowadays describe as the Web of Things (WoT). Many security-related aspects are still open on how to address security for communications on the WoT, and that must be targeted before such applications can realistically be considered ready for deployment. We discuss the experimental evaluation of mechanisms proposed to secure end-to-end web communications with IPv6-capable sensing applications and devices, as such mechanisms may provide an important contribution towards the WoT. Our experimental evaluation study considers the impact of security on real sensing devices and requirements from sensing applications, allowing the identification of the limitations of current sensing platforms in supporting the proposed mechanisms.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed data filtering in logistics wireless sensor networks based on transmission relevance","authors":"Sebastian Zöller, A. Reinhardt, R. Steinmetz","doi":"10.1109/LCN.2012.6423622","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423622","url":null,"abstract":"Energy-efficient operation is mandatory in wireless sensor networks due to the limited energy budget of sensor nodes. Considering the potential application of wireless sensor networks in logistics, cost efficiency is another major requirement due to high cost pressure. To save on data transmissions within such sensor deployments, which account for the major part of energy consumption and monetary costs, we develop a method for data filtering based on an in-network determination of transmission relevance of sensor data. Our approach explicitly incorporates interdependencies between wireless sensor nodes and their measurements and data transmissions. It contributes to efficiency in wireless sensor networks by filtering out irrelevant data and enables a subsequent reduction of unnecessary transmissions from a network-wide view, while being able to still offer real-time data provision with sufficient data fidelity to stakeholders. The benefits of our approach are indicated by preliminary evaluation results.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130739034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zakwan Al-Arnaout, Jonathan Hart, Q. Fu, Marcus Frean
{"title":"MP-DNA: A novel distributed replica placement heuristic for WMNs","authors":"Zakwan Al-Arnaout, Jonathan Hart, Q. Fu, Marcus Frean","doi":"10.1109/LCN.2012.6423679","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423679","url":null,"abstract":"Content replication and placement is an area that has been well explored in the scope of Content Delivery Networks (CDNs), but has received relatively less attention from the research community when it comes to Wireless Mesh Networks (WMNs). There are a number of Replica Placement Algorithms (RPAs) that are specifically designed for CDNs. But they do not consider the special features of wireless networks. In this paper, we propose a new heuristic called MP-DNA (Multiple Partitions per Delegate Node Assignment). We study the problem of optimal content replication and placement in WMNs. In our model, each mesh router acts as a replica server with limited storage capacity. The challenge is to replicate content as close as possible to the requesting clients and thus reduce the access latency per object, while minimizing the number of replicas. We formulate this problem in terms of combinatorial optimization and propose a novel, distributed, scalable heuristic for content replication. Using simulation tests, we demonstrate that MP-DNA is scalable, performing well with respect to the number of replica servers and the number of objects. Furthermore, MP-DNA can achieve a performance close to the Greedy-Global heuristic, with a significant reduction in running time, mean throughput and storage space required.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130769895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Traffic Activity Graphs with low-rank matrix approximation","authors":"Yang Liu, Wenji Chen, Y. Guan","doi":"10.1109/LCN.2012.6423680","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423680","url":null,"abstract":"Recently, Traffic Activity Graphs (TAGs) have been proposed to understand, analyze, and model network-wide communication patterns. The topological properties of the TAGs have been shown to be very helpful for malware analysis, anomaly detection, and attack attribution. In a TAG, nodes represent hosts in the network and edges are observed flows that indicate certain communication relations or interactions of interest among the hosts. The challenge is how to capture and analyze TAGs which are usually large, sparse and complex and often have overly-large space and computation requirements. In this paper, we present a new sampling-based low-rank approximation method for monitoring TAGs. The resulted solution can reduce the computation complexity for the communication pattern analysis from O(mn) to O(m+n), where m and n denote the number of sources and destinations, respectively. The experimental results with real-world traffic traces show that our method outperform existing solutions in terms of efficiency and the capability of processing and identifying unknown TAGs.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"18 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132869879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang
{"title":"On the distribution of inter contact time for DTNs","authors":"Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang","doi":"10.1109/LCN.2012.6423594","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423594","url":null,"abstract":"Inter contact time (ICT) between two mobile nodes is essential to forwarding algorithms and the end-to-end delay in Delay Tolerant Networks (DTNs). However, studies regarding the distribution of ICT lack general applicability and the exponential parameter concerns with too many motion characteristics. Consequently, it is difficult to design the protocol and analyze the performance for DTNs. In this paper, we demonstrate ICT between two mobile nodes is exponentially distributed and the exponential parameter relates to their historical contact numbers and the cumulative ICTs. Moreover, through extensive experimental simulations, we find that our findings have a general applicability in both theoretical mobility models and real world mobility traces, thus providing guidelines on the design of new mobility models with exponential distribution, new message protocols and further performance analysis methods.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting protocol switching covert channels","authors":"S. Wendzel, S. Zander","doi":"10.1109/LCN.2012.6423628","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423628","url":null,"abstract":"Network covert channels enable hidden communication and can be used to break security policies. Within the last years, new techniques for such covert channels arose, including protocol switching covert channels (PSCCs). PSCCs transfer hidden information by sending network packets with different selected network protocols. In this paper we present the first detection methods for PSCCs. We show that the number of packets between network protocol switches and the time between switches can be monitored to detect PSCCs with 98-99% accuracy for bit rates of 4 bits/second or higher.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks","authors":"Yousef Ebrahimi, M. Younis","doi":"10.1109/LCN.2012.6423644","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423644","url":null,"abstract":"In wireless sensor networks, all data packets are routed from the individual sensor nodes towards an in-situ base-station (BS). Such traffic pattern makes the BS vulnerable to adversary's attack. Basically, an adversary would intercept the ongoing transmissions and localize their sources. Then by employing traffic analysis techniques, an adversary would correlate the intercepted transmissions to uncover the data path which may lead to the location of the BS. Evidence theory is a well-known scheme that an adversary might use for traffic analysis. However, prior work considered only intercepted transmissions as evidences in the correlation process without factoring in the time of interception. In this paper, we argue that time-based correlation increases the accuracy of the traffic analysis and makes contemporary countermeasures ineffective. A novel technique is proposed to counter the time correlation and boost the anonymity of the BS. The technique imposes buffering delay at each relaying node on the data route in order to disturb the time correlation among consecutive transmissions. Our technique is validated through simulation.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124749070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling visitor movement in theme parks","authors":"Gürkan Solmaz, M. Akbaş, D. Turgut","doi":"10.1109/LCN.2012.6423650","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423650","url":null,"abstract":"Realistic modeling of the movement of people in an environment is critical for evaluating the performance of mobile wireless systems such as urban sensing or mobile sensor networks. Existing human movement models are either fully synthetic or rely on traces of actual human movement. There are many situations where we cannot perform an accurate simulation without taking into account what the people are actually doing. For instance, in theme parks, the movement of people is strongly tied to the locations of the attractions and is synchronized with major external events. For these situations, we need to develop scenario specific models. In this paper, we present a model of the movement of visitors in a theme park. The nondeterministic behavior of the human walking pattern is combined with the deterministic behavior of attractions in the theme park. The attractions are divided into groups of rides, restaurants and live shows. The time spent by visitors at different attractions is calculated using specialized queuing-theoretic models. We compare the realism of the model by comparing its simulations to the statistics of the theme parks and to real-world GPS traces of visitor movement. We found that our model provides a better match to the real-world data compared to current state-of-the-art movement models.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Artemenko, T. Simon, A. Mitschele-Thiel, D. Schulz, R. Ta
{"title":"Comparison of Anchor Selection algorithms for improvement of position estimation during the Wi-Fi localization process in disaster scenario","authors":"O. Artemenko, T. Simon, A. Mitschele-Thiel, D. Schulz, R. Ta","doi":"10.1109/LCN.2012.6423660","DOIUrl":"https://doi.org/10.1109/LCN.2012.6423660","url":null,"abstract":"It is very common that during the localization process redundant reference data can be collected. This reference data is called “anchors”. For some position estimation algorithms, like trilateration or Min-Max, only three or four anchors for 2-d or 3-d localization respectively are required. The selection of certain anchors from collected amount can affect the localization accuracy significantly [1]. The main purpose of this paper is to propose and analyze several most promising Optimum Anchor Selection algorIthmS (OASIS) that can contribute to the improvement of the localization precision.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}