{"title":"A passive WiFi source localization system based on fine-grained power-based trilateration","authors":"Zan Li, T. Braun, D. Dimitrova","doi":"10.1109/WoWMoM.2015.7158147","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158147","url":null,"abstract":"Indoor localization systems become more interesting for researchers because of the attractiveness of business cases in various application fields. A WiFi-based passive localization system can provide user location information to third-party providers of positioning services. However, indoor localization techniques are prone to multipath and Non-Line Of Sight (NLOS) propagation, which lead to significant performance degradation. To overcome these problems, we provide a passive localization system for WiFi targets with several improved algorithms for localization. Through Software Defined Radio (SDR) techniques, we extract Channel Impulse Response (CIR) information at the physical layer. CIR is later adopted to mitigate the multipath fading problem. We propose to use a Nonlinear Regression (NLR) method to relate the filtered power information to propagation distances, which significantly improves the ranging accuracy compared to the commonly used log-distance path loss model. To mitigate the influence of ranging errors, a new trilateration algorithm is designed as well by combining Weighted Centroid and Constrained Weighted Least Square (WC-CWLS) algorithms. Experiment results show that our algorithm is robust against ranging errors and outperforms the linear least square algorithm and weighted centroid algorithm.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pericle Perazzo, Kanishka Ariyapala, M. Conti, G. Dini
{"title":"The verifier bee: A path planner for drone-based secure location verification","authors":"Pericle Perazzo, Kanishka Ariyapala, M. Conti, G. Dini","doi":"10.1109/WoWMoM.2015.7158150","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158150","url":null,"abstract":"Many dependable systems rely implicitly on the integrity of the positions of their components. For example, let us consider a sensor network for pollution monitoring: it is sufficient that a hostile actor physically moves some sensors to completely disrupt the monitoring. In such scenarios, a key question is: how to securely verify the positions of devices? To answer this question, researchers proposed several solutions. However, these generally require several fixed stations (anchors) with trusted positions. In this paper, we explore the possibility to use the emerging drone technology in order to overcome the limitation of using several fixed anchors. In particular, our approach is to replace all the fixed anchors with a single drone that flies through a sequence of waypoints. At each waypoint, the drone “acts like” an anchor and securely verifies the positions of the devices. The main challenge here is to find a convenient path for the drone to do this. The problem presents novel aspects, thus existing path planning algorithms cannot be used. We present VerifierBee: a path planning algorithm that allows a drone to perform a secure location verification of a set of devices. VerifierBee finds a good approximation of the shortest path, and at the same time it respects a set of requirements about drone controllability, localization precision, and communication range.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of country-scale Internet disconnection on structured and social P2P overlays","authors":"Ding Ding, M. Conti, R. Figueiredo","doi":"10.1109/WoWMoM.2015.7158168","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158168","url":null,"abstract":"Peer-to-peer systems are resilient in the presence of churn and uncorrelated failures. However, their behavior in extreme scenarios where massive correlated failures occur is not well-studied. Yet, there have been examples of situations where a country-scale fraction of Internet users have been disconnected from the rest of the network-for instance, when a government cuts connectivity to the outside world as a mechanism for suppression of uprisings. In this paper, we consider the effect of such partitions on topology and routing of structured and social-based unstructured P2P overlays, including a novel social-aware overlay. In particular, we consider nodes within a relatively small fraction of the network (2.5% or fewer Internet users), and study whether users can communicate with their (n-hop away) social neighbors in a peer-to-peer fashion after the partition. We perform an extensive simulation-based analysis to assess the probability for these communications to be possible. In our analysis, we consider both real and synthetic datasets of online social networks. Our results show that structured P2P overlay routability is severely hampered by country-scale partition events. In addition, the proposed social-based unstructured overlay network provides improved routability while maintaining a smaller number of links.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonino Masaracchia, R. Bruno, A. Passarella, S. Mangione
{"title":"Analysis of MAC-level throughput in LTE systems with link rate adaptation and HARQ protocols","authors":"Antonino Masaracchia, R. Bruno, A. Passarella, S. Mangione","doi":"10.1109/WoWMoM.2015.7158162","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158162","url":null,"abstract":"LTE is rapidly gaining momentum for building future 4G cellular systems, and real operational networks are under deployment worldwide. To achieve high throughput performance, in addition to an advanced physical layer design LTE exploits a combination of sophisticated mechanisms at the radio resource management layer. Clearly, this makes difficult to develop analytical tools to accurately assess and optimise the user perceived throughput under realistic channel assumptions. Thus, most existing studies focus only on link-layer throughput or consider individual mechanisms in isolation. The main contribution of this paper is a unified modelling framework of the MAC-level downlink throughput of a sigle LTE cell, which caters for wideband CQI feedback schemes, AMC and HARQ protocols as defined in the LTE standard. We have validated the accuracy of the proposed model through detailed LTE simulations carried out with the ns-3 simulator extended with the LENA module for LTE.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Qutab-ud-din, A. Hazmi, B. B. Olyaei, Anna Larmo, J. Torsner, M. Valkama
{"title":"Performance analysis of IoT-enabling IEEE 802.11ah technology and its RAW mechanism with non-cross slot boundary holding schemes","authors":"Muhammad Qutab-ud-din, A. Hazmi, B. B. Olyaei, Anna Larmo, J. Torsner, M. Valkama","doi":"10.1109/WoWMoM.2015.7158204","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158204","url":null,"abstract":"IEEE 802.11ah task group is working on a new amendment of the IEEE 802.11 standard, suitable for high density WLAN networks in the sub 1 GHz band. It is expected to be the prevalent standard in many Internet of Things (IoT) and Machine to Machine (M2M) applications where it will support long-range and energy-efficient communication in dense network environments. Therefore, significant changes in the legacy 802.11 standards have been proposed to improve the network performance in high contention scenarios, most important of which is the Restricted Access Window (RAW) mechanism described in the amendment. In this paper we analyze the performance of the RAW mechanism in the Non-Cross Slot Boundary case under various possible holding schemes. We propose new holding schemes as well as a new grouping scheme for RAW mechanism based on backoff states of the stations. The proposed schemes are shown to improve the saturation throughput and energy efficiency of the network through extensive simulations. These schemes can therefore be adapted in practical deployment scenarios of the IEEE 802.11ah use cases to improve the overall network performance. Overall, these advanced features make 802.11ah standard a true IoT-enabling technology towards seamless integration of massive amount of connected devices in the future.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trung-Thanh Nguyen, Hanwen Cao, T. Kreul, T. Kaiser
{"title":"A multi-channel spectrum sensing scheme with filter bank realization for LTE signals","authors":"Trung-Thanh Nguyen, Hanwen Cao, T. Kreul, T. Kaiser","doi":"10.1109/WoWMoM.2015.7158195","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158195","url":null,"abstract":"In cognitive ratio (CR), spectrum sensing is a crucial technique aiming at exploiting spectrum white spaces. This sensing task is more difficult for multiple channels in wide bands. In this paper, we investigate spectrum sensing tasks for long-term evolution (LTE) networks in large frequency-bands. We propose an effective spectrum sensing scheme to detect LTE signals and classify the cell-identities transmitted in multi-channels in parallel. To prove the concept and validate the performance of the proposed scheme, a secondary LTE transmission in TV bands is modeled in our simulations. At the perspective of realistic scenarios, the identified information could be utilized for some functions such as the co-ordination among secondary networks or initial-cell-search procedures between secondary user-equipments and their serving base-stations in the secondary LTE transmission. The simulation results show that the detection and classification performance of the proposed scheme is close tightly to that in the case of a single channel. The scheme works well in multi-path fading environment with carrier frequency offset (CFO) and is tolerant to noise uncertainty.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132975078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Puttnies, Vlado Altmann, F. Golatowski, D. Timmermann
{"title":"Cost-efficient universal approach for remote meter reading using web services and computer vision","authors":"H. Puttnies, Vlado Altmann, F. Golatowski, D. Timmermann","doi":"10.1109/WoWMoM.2015.7158205","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158205","url":null,"abstract":"The Internet of Things is a great vision but also an important challenge for the current research. Through, the connection of many different devices there are outstanding benefits such as an increasing automation and intelligent energy management. Nevertheless, the integration of legacy devices into the Internet of Things is a significant issue. Legacy meters, e.g., cannot provide metering data automatically and the installation of modern smart meters is cost-intensive and thus often unprofitable. An alternative approach is to extend legacy meters with an automatic meter reading system. Thus, they can be integrated into an intelligent system such as an efficient energy management. In this paper a robust and universal approach for automatic meter reading is proposed. The approach can be applied to water, gas, and electric meters and uses a Web service as standardized and open communication interface. The recognition rate of a prototype implementation is 98 % and the measurement duration is approx. 1.5 seconds. The entire system was implemented on a Raspberry Pi as a cost-efficient hardware platform.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132979924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiFo: A diagnostic tool for IEEE 802.11 MAC","authors":"Hessan Feghhi, D. Malone","doi":"10.1109/WoWMoM.2015.7158157","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158157","url":null,"abstract":"WLANs are constantly undergoing extensive research and development, and scientists keep coming up with new methods to improve existing protocols and amend standards. Experimental assessment has been an important part of 802.11 research, however measuring the detailed behaviour of the medium and hardware has been challenging. In this paper we design a diagnostic tool, WiFo, for IEEE 802.11-based WLANs. This tool helps developers and researchers monitor and analyze the wireless signals and details such as backoff distribution in a user-friendly environment. Our solution is much cheaper and easier to use than existing tools, and provides more flexibility by allowing users to add functionality. We then use WiFo to study several aspects of some off-the-shelf hardware and their corresponding software drivers, and show some interesting results regarding how they apply standard specifications.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing alternative approaches for mobile content delivery in information-centric networking","authors":"Feixiong Zhang","doi":"10.1109/WoWMoM.2015.7158151","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158151","url":null,"abstract":"The information-centric networking (ICN) concept has been investigated to support mobile content delivery, in which content is distributed and requested directly through their names. Pervasive in-network caching is normally enabled in ICN to further facilitate mobile content delivery. Several different architectures have been proposed to realize ICN. In this work, we present their common features and then compare different approaches for mobile content delivery in these architectures. Such comparison would greatly deepen our understanding of different design choices and help with future ICN research.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124627704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable videos broadcast with network coding and coordinated multiple Access Points","authors":"P. Ostovari, Jie Wu","doi":"10.1109/WoWMoM.2015.7158170","DOIUrl":"https://doi.org/10.1109/WoWMoM.2015.7158170","url":null,"abstract":"As the popularity of wireless devices (e.g. smartphones and tablets) increases, watching videos over the Internet is becoming a main device application. Two important challenges in wireless communications are the unreliability of the wireless links and the interference among the wireless links. In order to exploit reliable video multicast, forward error correction and network coding can be used. In this paper, we propose a reliable video multicast method over wireless networks with multiple Access Points (AP). Using multiple APs, the multicast receivers can benefit from both spatial and time diversities, which results in more reliable transmissions. In order to utilize the shared wireless network efficiently, we propose a resource allocation algorithm. We show that a systematic concurrent transmission of the interfering AP nodes can enhance the total system performance and provide fairness to the client nodes. Therefore, in contrast with the previous resource sharing methods, which only permit the AP nodes that do not interfere with each other to transmit concurrently, we allow the interfering nodes to transmit concurrently, and we propose a two-phase resource allocation algorithm to further enhance the system utility. We show the effectiveness of our proposed method through extensive simulations.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}