{"title":"Autonomous mobile agent based intrusion detection framework in wireless body area networks","authors":"Geethapriya Thamilarasu, Zhiyuan Ma","doi":"10.1109/WoWMoM.2015.7158178","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158178","url":null,"abstract":"Wireless body area networks (WBAN) are revolutionizing healthcare with their great potential to perform cost-effective, unobtrusive and constant real-time monitoring of health applications. Since wearable, implantable medical and mobile devices in WBAN often control life critical data, it is important to ensure security in these networks. Severe resource constraints pose significant challenges in providing security to these systems. In this paper, we propose an autonomous mobile agent based intrusion detection architecture to address security in wireless body area networks. We provide a comparison of mobile agent based IDS proposed in other domains with WBAN systems and highlight the unique benefits of the proposed architecture.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raúl A. Casas, Vakis Papaparaskeva, Xuehong Mao, Rishi Kumar, P. Kaul, S. Hijazi
{"title":"An IEEE 802.11ah programmable modem","authors":"Raúl A. Casas, Vakis Papaparaskeva, Xuehong Mao, Rishi Kumar, P. Kaul, S. Hijazi","doi":"10.1109/WoWMoM.2015.7158203","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158203","url":null,"abstract":"We introduce an architecture for a programmable IEEE 802.11ah Wi-Fi modem based on a new Cadence Xtensa-based low-energy DSP. The design is based on a methodology for partitioning the system into hardware and software components that takes into account power consumption, silicon area and the need for programmability. Physical layer software functions avail the DSP's extensible architecture options for baseband processing, such as complex signal filtering and FFT acceleration instructions. We provide sensitivity data from software simulations and laboratory tests that demonstrate the modem is capable of reliable detection and decoding of 2MHz packets with -107dBm of received signal power. Additionally, we analyze latency requirements for a System-on-Chip (SoC) design.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Viral Patel, Nicholas Mastronarde, M. Medley, J. Matyjas
{"title":"Towards optimal priority and deadline driven scheduling in dynamic wireless environments","authors":"Viral Patel, Nicholas Mastronarde, M. Medley, J. Matyjas","doi":"10.1109/WoWMoM.2015.7158128","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158128","url":null,"abstract":"We formulate the problem of point-to-point scheduling at a congested network node as a Markov decision process (MDP) that considers the deadlines and priorities of each packet as well as the dynamic packet arrivals and channel conditions. Within this framework, we formulate the problem with the objective of maximizing the node's long-run priority-weighted throughput subject to instantaneous transmission rate constraints. We then analyze the structural properties of the optimal scheduling policy with respect to the deadlines and priorities of the backlogged packets. Additionally, we compare our approach to existing heuristics such as Priority Queueing (PQ), Earliest Deadline First (EDF), and Weighted Fair Queueing (WFQ). Our MDP-based approach outperforms all three heuristics not only because it takes into account the packets' priorities and deadlines, but also because it takes into account the future channel and packet arrival dynamics. Lastly, we experimentally show that the optimal scheduling policy has a switch-over type structure in several key parameters including the relative priorities of different traffic classes, the discount factor, and the traffic load intensity.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cell biology inspired data packet forwarding scheme in mobile ad-hoc networks","authors":"S. Sooriyaarachchi","doi":"10.1109/WoWMoM.2015.7158152","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158152","url":null,"abstract":"Mobile ad hoc networking enables ubiquitous computing with widely available personal devices that incorporate wireless networking, mobility, and collaborative applications. This paper presents a new packet broadcast model for such networks based on cell biology and provides a theoretical analysis and simulation results on protocol operation and efficiency. This proposed protocol is intended to significantly reduce the broadcast storm problem.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptation mechanism for robust OTT video transmission","authors":"Fakher Oueslati, Jean-Charles Grégoire","doi":"10.1109/WoWMoM.2015.7158218","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158218","url":null,"abstract":"“Over the top” (OTT) has become an increasingly popular form of delivery for voice and video communications. Ubiquitous OTT communications, pioneered by Skype, have, with the recent release of WebRTC, become a commodity readily available for various applications, without a need for extra installations. Still, in spite of such progress, media communications remain challenging as user expectations are keeping ahead of technology progress and portable devices are becoming the norm. In practical terms, this means that media flows must constantly adapt to varying network conditions to try to -reliably!- offer the best experience to the users. We present in this paper a sender-side adaptation algorithm for video flows which trades off redundancy and throughput to maximize quality while minimizing the likelihood of loss, thus preserving service continuity. By exploiting standard FEC mechanisms at different levels of redundancy while controlling the quality of media delivered, we create a discrete parameter space which the algorithm exploits based on quality feedback. We study the performance of this algorithm in a number of reference test cases and discuss how it improves on earlier and related proposals.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134393714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferring content-centric traffic for opportunistic networking from geo-location Social Networks","authors":"Pavlos Sermpezis, T. Spyropoulos","doi":"10.1109/WoWMoM.2015.7158185","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158185","url":null,"abstract":"Opportunistic networking has been proposed to support a number of novel applications, like content sharing or mobile data offloading, that follow a content-centric communication model, i.e., many users are interested in the same content. Users' traffic demand patterns can crucially affect the performance of such applications, but our knowledge about the characteristics of content demand is limited. Nevertheless, opportunistic networking is known to exhibit strong locality and social characteristics. For this reason, in this paper we argue that some initial insights about opportunistic traffic patterns could be inferred from geo-social network data. In particular, we study the check-in patterns of users in datasets of two real Location-Based Social Networks, towards understanding potential traffic characteristics and implications for opportunistic networking.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134399567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint compressive data gathering and scheduling in wireless sensor networks under the physical interference model","authors":"Dariush Ebrahimi, C. Assi","doi":"10.1109/WoWMoM.2015.7158135","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158135","url":null,"abstract":"Compressive data gathering (CDG) has emerged as a useful method for collecting sensory data in large scale sensor networks; this technique is able to reduce global scale communication cost without introducing intensive computation, and is capable of extending the lifetime of the entire sensor network by balancing the aggregation and forwarding load across the network. With CDG, multiple forwarding trees are constructed, each for aggregating a coded measurement, and these measurements are collected at the sink for recovering the uncoded measurements from the sensors. This paper studies the problem of constructing forwarding trees for collecting and aggregating sensed data in the network under the physical interference model. The problem of aggregation tree construction and link scheduling is addressed jointly, through a mathematical formulation, and its complexity is underlined. Our objective is to collect data at the sink with minimal delays and fewer transmissions. Owing to the complexity of the joint problem, we present a decentralized method for solving the tree construction and the link scheduling sub-problems. Our link scheduling sub-problem relies on defining an interference neighbourhood for each link and coordinating transmissions among network links to control the interference. Numerical results are presented to compare the performance of the decentralized solution with the joint model as well as prior work from the literature.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight clustering of spatio-temporal data in resource constrained mobile sensing","authors":"Ghulam Murtaza, A. Reinhardt, S. Kanhere, S. Jha","doi":"10.1109/WoWMoM.2015.7158166","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158166","url":null,"abstract":"The technological development of inexpensive GPS receivers has enabled a new realm of applications for embedded sensing systems. The availability of location information allows these sensing system to study the motion trajectories of humans, animals, and objects. The storage of the collected trajectory data, however, represents a challenge for constrained devices with limited memory. In fact, external memory is often required, which incurs an additional cost for the storage component, enlarges the physical dimensions of the device, and also results in a measurable increase of the node's energy expenditure. In this paper, we present a clustering approach for GPS location information that is specifically tailored to resource-constrained sensing platforms. While our approach can be generalised to wide variety of applications, we focus on wireless animal tracking as an illustrative example. Our two-stage clustering process only records areas in which the animal has spent an extended period of time, in order to reduce the storage requirement while ensuring a low memory foot-print and processing requirements. We evaluate our solution using real-world animal GPS traces and show that our scheme achieves 90% improvement in location accuracy while also reducing the memory footprint by up to 99% in comparison with the state-of-the-art.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCCN: Tag-assisted Content Centric Networking for Internet of Things","authors":"Yuning Song, Huadong Ma, Liang Liu","doi":"10.1109/WoWMoM.2015.7158138","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158138","url":null,"abstract":"As one of the future networking architecture, Content Centric Networking (CCN) regards content as a first-class network entity and fits Internet of Things (IoT) applications well. CCN retrieves contents by their unique hierarchical names. However, in IoT, different autonomous networks have their own naming rules. When a mobile node enters a new network environment and interacts with local networks, it can hardly know the exact name of the content that it needs. In this paper, we propose Tag-assisted Content Centric Networking (TCCN) for IoT, which is a more flexible and efficient scheme for the content sharing between mobile node and local IoT network. We design the tables and structures of three basic components of CCN. Based on counting bloom filter, we further design Tag Filter (TF) for interest-content matching and forwarding information lookup. By using TF, Content Store (CS) can quickly check whether coming Interests can be satisfied locally. Moreover, in our designed Tag-based Forwarding Information Base (T-FIB), we change the traditional prefix-faces structure into face-tags structure, which can greatly reduce the size of FIB and the lookup time consumption. We design the Tag-based Caching Strategy (TCS), by which the node can decide whether to cache the coming content according to the TF and a counter threshold. By using TCS, contents with similar set of tags are cached intensively, which benefits the forwarding information.We conduct simulations to evaluate the validity and performance of our proposed methods.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122308062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Schumacher, Martin Serror, Christian Dombrowski, J. Gross
{"title":"WARPsim: A code-transparent network simulator for WARP devices","authors":"Andreas Schumacher, Martin Serror, Christian Dombrowski, J. Gross","doi":"10.1109/WoWMoM.2015.7158181","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158181","url":null,"abstract":"Analyzing a communication protocol by means of simulation and real-world experimentation requires careful protocol implementation in both domains. Differences in the implementation may lead to significantly diverging performance results, which may affect the protocol design process adversely. A code-transparent simulation and experimentation framework for Wireless Access Research Platform (WARP) devices is proposed, which is called WARPsim. By extending the simulation engine appropriately, the same application code that runs on WARP devices can be used for simulation. This work studies the implications of this approach using the example of implementing time-critical Medium Access Control Layer (MAC) protocols on WARP devices. In the demonstration, various MAC protocols will be simulated using WARPsim, while changing protocol parameters, but also crucial aspects of the emulated hardware. A graphical representation integrated into the framework allows for an intuitive examination of the protocol behavior.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"48 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125555773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}