{"title":"Channel coding and interleaving in Industrial WSN: abiding to timing constraints and bit error nature","authors":"Filip Barac, M. Gidlund, Tingting Zhang","doi":"10.1109/IWMN.2013.6663775","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663775","url":null,"abstract":"Forward Error Correction is a preemptive manner of improving communication reliability. Albeit not a part of IEEE 802.15.4-2006 standard, its application in Industrial Wireless Sensor Networks has been widely considered. Nevertheless, this study is the first performance analysis on real error traces with sufficiently lightweight channel codes, with respect to IEEE 802.15.4-2006 and industrial wireless communication timing constraints. Based on these constraints and bit error properties from the collected traces, the use of Reed-Solomon (15,7) block code is suggested, which can be implemented in software. Experiments show that bit error nature on links affected by multipath fading and attenuation in industrial environments is such that RS(15,7) can correct ≥95% of erroneously received packets, without the necessity for interleaving. On links under IEEE 802.11 interference, typically up to 50% of corrupted packets can be recovered by combining RS(15,7) with symbol interleaving, which has proven to be more effective than its bit counterpart. The optimal interleaving depth is found empirically and it is shown that simple bit-interleaved 1/3 repetition code achieves at least 90% of correcting performance of RS(15,7) code on uninterfered links that operate ≥10 dB above the sensitivity threshold.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125020662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Duplicate detection methodology for IP network traffic analysis","authors":"Iñaki Ucar, D. Morató, E. Magaña, M. Izal","doi":"10.1109/IWMN.2013.6663796","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663796","url":null,"abstract":"Network traffic monitoring systems have to deal with a challenging problem: the traffic capturing process almost invariably produces duplicate packets. In spite of this, and in contrast with other fields, there is no scientific literature addressing it. This paper establishes the theoretical background concerning data duplication in network traffic analysis: generating mechanisms, types of duplicates and their characteristics are described. On this basis, a duplicate detection and removal methodology is proposed. Moreover, an analytical and experimental study is presented, whose results provide a dimensioning rule for this methodology.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121558773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised wearable wireless system for fall detection","authors":"A. Leone, G. Rescio, P. Siciliano","doi":"10.1109/IWMN.2013.6663803","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663803","url":null,"abstract":"Falling down events can cause trauma, disability and death among older people. Accelerometer-based devices are able to detect falls in controlled environments. This kind of solution often presents poor performance in real conditions. The aim of this work is the development of a computationally low-cost algorithm for feature extraction and the implementation of a Machine Learning scheme for people fall detection, by using a tri-axial MEMS wearable wireless accelerometer. The proposed approach allows to generalize the detection of fall events in several practical conditions. It appears invariant to the age, weight, height of people and to the relative positioning area (even in the upper part of the waist), overcoming the drawbacks of well-known threshold-based approaches in which several parameters need to be manually estimated according to the specific features of the end-user. In order to limit the workload, the specific study on posture analysis has been avoided and a polynomial kernel function is used while maintaining high performance in terms of specificity and sensitivity. The supervised clustering step is achieved by implementing an One-Class Support Vector Machine classifier in a stand-alone PC.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VoIP performance evaluation over IPv4-6 and manually configured tunnels","authors":"Poussy A. Amr, Nashwa Abdelbaki","doi":"10.1109/IWMN.2013.6663789","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663789","url":null,"abstract":"IPv4 address space is exhausted. Internet Engineering Task Force (IETF) developed IPv6 -the upgrade of IPv4- to satisfy the continual increase of the IP address needs. The Internet is so ramified and enormous that the complete transition from IPv4 to IPv6 is slow. Therefore, their coexistence is inevitable. Manually configured tunnels are an important solution to allow this co-existence that allows transmitting native IPv6 packets over IPv4 networks. Meanwhile, VoIP is also gaining momentum with expectation to occupy considerable percentage of Internet traffic. In this paper, we compare the Voice over Internet Protocol (VoIP) network performance delivering Real-Time Quality-of-Service over manually configured tunnels versus conventional IPv4 and IPv6 networks. The measurements are collected out of probing a single call transferred over a network congested with HTTP, FTP or Video. The comparison performance criteria are jitter, network delay, throughput and packet loss percentage. Also the call user satisfaction is assessed by Mean Opinion Score.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Angrisani, D. Capriglione, L. Ferrigno, G. Miele
{"title":"Quality assessment of VoIP services: A proposal based on the measurement of the IP Packet Delay Variation","authors":"L. Angrisani, D. Capriglione, L. Ferrigno, G. Miele","doi":"10.1109/IWMN.2013.6663787","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663787","url":null,"abstract":"Generally, the voice quality of a VoIP call can be analyzed through the measurement of suitable metrics at the application layer of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI) protocol stack. However, the peculiarities of such a kind of measurements make very difficult to provide to each user a value representative of the quality of each VoIP call.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132243057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network","authors":"P. V. Amoli, T. Hämäläinen","doi":"10.1109/IWMN.2013.6663794","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663794","url":null,"abstract":"Previously, Network Intrusion Detection Systems (NIDS) detected intrusions by comparing the behaviour of the network to the pre-defined rules or pre-observed network traffic, which was expensive in terms of both cost and time. Unsupervised machine learning techniques have overcome these issues and can detect unknown and complex attacks within normal or encrypted communication without any prior knowledge. NIDS monitors bytes, packets and network flow to detect intrusions. It is nearly impossible to monitor the payload of all packets in a high-speed network. On the other hand, the content of packets does not have sufficient information to detect a complex attack. Since the rate of attacks within encrypted communication is increasing and the content of encrypted packets is not accessible to NIDS, it has been suggested to monitor network flows. As most network intrusions spread within the network very quickly, in this paper we will propose a new real-time unsupervised NIDS for detecting new and complex attacks within normal and encrypted communications. To achieve having a real-time NIDS, the proposed model should capture live network traffic from different sensors and analyse specific metrics such as number of bytes, packets, network flows, and the time explicitly and implicitly, of packets and network flows, in the different resolutions. The NIDS will flag the time slot as an anomaly if any of those metrics passes the threshold, and it will send the time slot to the first engine. The first engine clusters different layers and dimensions of the network's behaviour and correlates the outliers to purge the intrusions from normal traffic. Detecting network attacks, which produce a huge amount of network traffic (e.g. DOS, DDOS, scanning) was the aim of proposing the first engine. Analysing statistics of network flows increases the feasibility of detecting intrusions within encrypted communications. The aim of proposing the second engine is to conduct a deeper analysis and correlate the traffic and behaviour of Bots (current attackers) during DDOS attacks to find the Bot-Master.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlo Sansone, S. Manfredi, Edmondo Di Tucci, S. D. Vito, G. Fattoruso, F. Tortorella
{"title":"A novel approach for detecting alerts in urban pollution monitoring with low cost sensors","authors":"Carlo Sansone, S. Manfredi, Edmondo Di Tucci, S. D. Vito, G. Fattoruso, F. Tortorella","doi":"10.1109/IWMN.2013.6663783","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663783","url":null,"abstract":"The problem of estimating the pollutants in urban areas is one of the most active research in recent years due to the increasing concerns about their influence on human health. Solide state sensors, increasingly small and inexpensive, are being used to build compact multisensor devices. Suffering from sensors instabilities and cross-sensitivities, they need ad-hoc calibration procedures in order to reach satisfying performance levels. In this paper we propose a novel approach based on Nonlinear AutoRegressive eXogenous model (NARX) to estimate pollutants in urban area and detecting alerts with respect to law limits. We compared our proposal with two other techniques, based on a Feed Forward Neural Network and a Semi Supervised Learning approach, respectively. Numerical simulations have been carried out to validate the proposed approach on a real dataset.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Scarpato, T. Caputo, A. Caputo, W. D. Cesare, A. Esposito, M. Vadursi
{"title":"A wireless network as support to the monitoring of Campi Flegrei volcano in Italy","authors":"G. Scarpato, T. Caputo, A. Caputo, W. D. Cesare, A. Esposito, M. Vadursi","doi":"10.1109/IWMN.2013.6663779","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663779","url":null,"abstract":"The main purpose of this work is the design and implementation of an integrated wireless network as support to the multiparametric geophysical monitoring network of the Campi Flegrei volcanic area, in view of the increased need for seismic monitoring, which is a consequence of the drilling of an exploration well for scientific purposes. The goal is to increase the performance of the transmission system in terms of speed, real-time availability and reliability, given the high seismic risk and hazard associated with the experiment. The drilling is part of the international research project called “Campi Flegrei Deep Drilling Project” (CFDDP). For this purpose, in the first half of 2012, it was necessary to enhance the multiparametric monitoring network of Campi Flegrei, creating a subnet of seismic sensors, with limited geographical extension, but concentrated around the area of the well realization. The data acquisition from the monitoring center “Osservatorio Vesuviano”, section of Naples of the INGV, is guaranteed by a system of radio links in the 5 GHz band, due to the high interference in the typical band 802.11 and the highly urbanized area of interest. The subnet has shown a good cost/benefit ratio as regards the transmission, and it has proved to be useful for the monitoring purposes in order to detect in real time possible anomalies related to the drilling.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122884509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rym Chéour, M. W. Jmal, A. Lay-Ekuakille, F. Derbel, O. Kanoun, M. Abid
{"title":"Choice of efficient simulator tool for wireless sensor networks","authors":"Rym Chéour, M. W. Jmal, A. Lay-Ekuakille, F. Derbel, O. Kanoun, M. Abid","doi":"10.1109/IWMN.2013.6663805","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663805","url":null,"abstract":"The wireless sensor networks are experiencing an extraordinary rise which is reflected by their omnipresence in various fields of application. They offer numerous challenges ranging from the stringent power constraints of each node, the need of cross-out to adapt to different conditions and the limited computation capabilities. To overcome these shortcomings and to follow the rapid hardware obsolescence and the need for functionality updates, it is necessary to use a simulation tool that can help designing and testing new hardware and software solutions. As there are many simulators, we make an attempt in this paper to specify the important ones related to energy consumption.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ermanno Battista, V. Casola, S. Marrone, N. Mazzocca, Roberto Nardone, V. Vittorini
{"title":"An integrated lifetime and network quality model of large WSNs","authors":"Ermanno Battista, V. Casola, S. Marrone, N. Mazzocca, Roberto Nardone, V. Vittorini","doi":"10.1109/IWMN.2013.6663791","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663791","url":null,"abstract":"This paper introduces a modeling approach to the design and evaluation of large wireless sensor networks against the topology of the network and the monitoring application and taking into account the performance degradation due to the power consumption. The model is built by composing Stochastic Activity Network (SAN) models of the nodes and a Markovian Agent Model (MAM) of the whole network. The SAN models are used to conduct a performance analysis of the nodes (i.e. to measure their sampling time) and evaluate their mean time to discharge. The MAM is used to compose the results of the SAN model analysis into a complex topology-aware model able to evaluate the Packet Delivery Ratio (PDR) and the power consumption of the network. The possibility to model spatially distributed interdependencies featured by the MAM makes the integrated model a concrete, scalable mean to evaluate different design choices and perform meaningful what-if analyses. The model has been validated by comparing the analysis results with real node values: specifically we present the experimental results obtained by using TelosB nodes equipped with TinyOs.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131563614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}