Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems最新文献

筛选
英文 中文
On the (over)-Reactions and the Stability of a 6TiSCH Network in an Indoor Environment 室内环境下6TiSCH网络的(过)反应及稳定性研究
Rodrigo Teles Hermeto, A. Gallais, Fabrice Théoleyre
{"title":"On the (over)-Reactions and the Stability of a 6TiSCH Network in an Indoor Environment","authors":"Rodrigo Teles Hermeto, A. Gallais, Fabrice Théoleyre","doi":"10.1145/3242102.3242104","DOIUrl":"https://doi.org/10.1145/3242102.3242104","url":null,"abstract":"Industrial networks differ from others kinds of networks because they require real-time performance in order to meet strict requirements. With the rise of low-power wireless standards, the industrial applications have started to use wireless communications in order to reduce deployment and management costs. IEEE802.15.4-TSCH represents currently a promising standard relying on a strict schedule of the transmissions to provide strong guarantees. However, the radio environment still exhibits time-variable characteristics. Thus, the network has to provision sufficient resource (bandwidth) to cope with the worst case while still achieving high energy efficiency. The 6TiSCH IETF working group defines a stack to tune dynamically the TSCH schedule. In this paper, we analyze in depth the stability and the convergence of a 6TiSCH network in an indoor testbed. We identify the main causes of instabilities, and we propose solutions to address each of them. We show that our solutions improve significantly the stability.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126832272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
WiDet
Hua Huang, Shane Lin
{"title":"WiDet","authors":"Hua Huang, Shane Lin","doi":"10.1145/3242102.3242119","DOIUrl":"https://doi.org/10.1145/3242102.3242119","url":null,"abstract":"To achieve device-free person detection, various types of signal features, such as moving statistics and wavelet representations, have been extracted from the Wi-Fi Received Signal Strength Index (RSSI), whose value fluctuates when human subjects move near the Wi-Fi transceivers. However, these features do not work effectively under different deployments of Wi-Fi transceivers because each transceiver has a unique RSSI fluctuation pattern that depends on its specific wireless channel and hardware characteristics. To address this problem, we present WiDet, a system that uses a deep Convolutional Neural Network (CNN) approach for person detection. The CNN achieves effective and robust detection feature extraction by exploring distinguishable patterns in Wi-Fi RSSI data. With a large number of internal parameters, the CNN can record and recognize the different RSSI fluctuation patterns from different transceivers. We further apply the data augmentation method to improve the algorithm robustness to wireless interferences and pedestrian speed changes. To take advantage of the wide availability of the existing Wi-Fi devices, we design a collaborative sensing technique that can recognize the subject moving directions. To validate the proposed design, we implement a prototype system that consists of three Wi-Fi packet transmitters and one receiver on low-cost off-the-shelf embedded development boards. In a multi-day experiment with a total of 163 walking events, WiDet achieves 94.5% of detection accuracy in detecting pedestrians, which outperforms the moving statistics and the wavelet representation based approaches by 22% and 8%, respectively.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122614941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
TRAILS - A Trace-Based Probabilistic Mobility Model TRAILS -基于跟踪的概率迁移模型
Anna Förster, Anas Bin Muslim, A. Udugama
{"title":"TRAILS - A Trace-Based Probabilistic Mobility Model","authors":"Anna Förster, Anas Bin Muslim, A. Udugama","doi":"10.1145/3242102.3242134","DOIUrl":"https://doi.org/10.1145/3242102.3242134","url":null,"abstract":"Modeling mobility is a key aspect when simulating different types of networks. To cater to this requirement, a large number of models has emerged in the last years. They are typically (a) trace-based, where GPS recordings are re-run in simulation, (b) synthetic models, which describe mobility with formal methods, or (c) hybrid models, which are synthetic models based on statistically evaluated traces. All these families of models have advantages and disadvantages. For example, trace-based models are very inflexible in terms of simulation scenarios, but have realistic behaviour, while synthetic models are very flexible, but lack realism. In this paper, we propose a new mobility model, called TRAILS (TRAce-based ProbabILiStic Mobility Model), which bridges the gap between these families and combines their advantages into a single model. The main idea is to extract a mobility graph from real traces and to use it in simulation to create scalable, flexible simulation scenarios. We show that TRAILS is more realistic than synthetic models, while achieving full scalability and flexibility. We have implemented and evaluated TRAILS in the OMNeT++ simulation framework.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129460973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
DCNs-2: A Cloud Network Simulator Extension for ns-2 dnns -2: ns-2的云网络模拟器扩展
P. Bellavista, L. Foschini, S. Luciano, M. Solimando
{"title":"DCNs-2: A Cloud Network Simulator Extension for ns-2","authors":"P. Bellavista, L. Foschini, S. Luciano, M. Solimando","doi":"10.1145/3242102.3242136","DOIUrl":"https://doi.org/10.1145/3242102.3242136","url":null,"abstract":"The widespread exploitation of cloud technologies forces cloud providers to forecast peaks of requests to guarantee always the adequate quality of service to their currently served customers. Static resource provisioning is rarely affordable for large Data Center Networks (DCNs) and dynamic resource management can be rather complex, in particular for networking. Hence, we claim the relevance of simulator-based approaches, helpful in planning DCN deployment and in analyzing performance behaviors in response to expected traffic patterns. However, existing cloud simulators exhibit non-negligible limitations for what relates to the modeling of networking issues of cloud Infrastructure as a Service (IaaS) deployments. Therefore, we propose DCNs-2, a novel extension package for the ns-2 simulator, as a valid solution to efficiently simulate DCNs with all their primary entities, such as switches, physical machines, racks, virtual machines, and so on.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PRMS 人口、难民和移民事务局
Huatao Xu, Run Zhao, Qian Zhang, Dong Wang
{"title":"PRMS","authors":"Huatao Xu, Run Zhao, Qian Zhang, Dong Wang","doi":"10.1145/3242102.3242138","DOIUrl":"https://doi.org/10.1145/3242102.3242138","url":null,"abstract":"In the future, libraries and warehouses will gain benefits from the spatial location of books and merchandises attached with RFID tags. Existing localization algorithms, however, usually focus on improving positioning accuracy or the ordering one for RFID tags on the same layer. Nevertheless, books or merchandises are placed on the multilayer in reality and the layer of RFID tagged object is also an important position indication. To this end, we design PRMS, an RFID based localization system which utilizes both phase and RSSI values of the backscattered signal provided by a single antenna to estimate the spatial position for RFID tags. Our basic idea is to gain initial estimated locations of RFID tags through a basic model which extracts the phase differences between received signals to locate tags. Then an advanced model is proposed to improve the positioning accuracy combined with RF hologram based on basic model. We further change traditional deployment of a single antenna to distinguish the features of RFID tags on multilayer and adopt a machine learning algorithm to get the layer information of tagged objects. The experiment results show that the average accuracy of layer detection and sorting at low tag spacing ($2sim8$cm) are about 93% and 84% respectively.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A 3GPP NR Compliant Beam Management Framework to Simulate End-to-End mmWave Networks 模拟端到端毫米波网络的3GPP NR兼容波束管理框架
Carlos Herranz, Menglei Zhang, M. Mezzavilla, David Martín-Sacristán, S. Rangan, J. Monserrat
{"title":"A 3GPP NR Compliant Beam Management Framework to Simulate End-to-End mmWave Networks","authors":"Carlos Herranz, Menglei Zhang, M. Mezzavilla, David Martín-Sacristán, S. Rangan, J. Monserrat","doi":"10.1145/3242102.3242117","DOIUrl":"https://doi.org/10.1145/3242102.3242117","url":null,"abstract":"The advent of the next iteration of mobile and wireless communication standards, the so called 5G, is already a reality. 3GPP released in December 2017 the first set of specifications of the 5G New Radio (NR), which introduced important innovations with respect to legacy networks. One of the main novelties is the use of very-high frequencies in the radio access, which requires highly-directional transmissions or beams to overcome the severe propagation losses. Therefore, it is paramount to manage these beams in an efficient manner in order to always choose the optimum set of beams. In this work, we describe the first NR-compliant beam management framework for the ns-3 network simulator. We aim at providing an open-source and fully-customizable solution to let the scientific community implement their solutions and assess their impact on the end-to-end network performance. Additionally, we describe the necessary modifications in ns-3 to align the radio frame structure to what the 3GPP standards mandate. Finally, we validate our results by running a simple mobility scenario.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GreenLoading: Using the Citizens Band Radio for Energy-Efficient Offloading of Shared Interests 绿色负荷:利用公民波段无线电实现共享利益的节能负荷
Pengfei Cui, S. Chen, J. Camp
{"title":"GreenLoading: Using the Citizens Band Radio for Energy-Efficient Offloading of Shared Interests","authors":"Pengfei Cui, S. Chen, J. Camp","doi":"10.1145/3242102.3242113","DOIUrl":"https://doi.org/10.1145/3242102.3242113","url":null,"abstract":"Cellular networks are susceptible to being severely capacity-constrained during peak traffic hours or at special events such as sports and concerts. Many other applications are emerging for LTE and 5G networks that inject machine-to-machine (M2M) communications for Internet of Things (IoT) devices that sense the environment and react to diurnal patterns observed. Both for users and devices, the high congestion levels frequently lead to numerous retransmissions and severe battery depletion. However, there are frequently social cues that could be gleaned from interactions from websites and social networks of shared interest to a particular region at a particular time. Cellular network operators have sought to address these high levels of fluctuations and traffic burstiness via the use of offloading to unlicensed bands, which may be instructed by these social cues. In this paper, we leverage shared interest information in a given area to conserve power via the use of offloading to the emerging Citizens Radio Band Service (CBRS). Our GreenLoading framework enables hierarchical data delivery to significantly reduce power consumption and includes a Broker Priority Assignment (BPA) algorithm to select data brokers for users. With the use of in-field measurements and web-based Google data across four diverse U.S. cities, we show that, on average, an order of magnitude power savings via GreenLoading over a 24-hour period and up to 35 times at peak traffic times. Finally, we consider the role that a relaxation of wait times can play in the power efficiency of a GreenLoaded network.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cascading Attacks on Wi-Fi Networks with Weak Interferers 弱干扰Wi-Fi网络的级联攻击
Liangxiao Xin, D. Starobinski
{"title":"Cascading Attacks on Wi-Fi Networks with Weak Interferers","authors":"Liangxiao Xin, D. Starobinski","doi":"10.1145/3242102.3242142","DOIUrl":"https://doi.org/10.1145/3242102.3242142","url":null,"abstract":"Recent work shows that an adversary can exploit a coupling effect induced by hidden nodes to launch a cascading attack causing global congestion in a Wi-Fi network. The underlying assumption is that the power of interference caused by a hidden node is an order of magnitude stronger than the signal sent to the receiver. In this paper, we investigate the feasibility of cascading attacks with weakly interfering hidden nodes, that is when the signal-to-interference ratio is high. Through extensive ns-3 simulations, including for an indoor building model, we show that cascading attacks are still feasible. The attacks leverage two PHY-layer phenomena: receiver capture and bit rate adaptation. We show that the attack relies on a coupling effect, whereby the average bit rate of a transmission pair drops sharply as the channel utilization of a neighboring pair gets higher. This coupling effect facilitates the propagation of the attack throughout the network.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks 一种保护5G网络分片组件关联和分片隔离的新协议
Vipin N. Sathi, Manikantan Srinivasan, P. Thiruvasagam, C. Murthy
{"title":"A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks","authors":"Vipin N. Sathi, Manikantan Srinivasan, P. Thiruvasagam, C. Murthy","doi":"10.1145/3242102.3242135","DOIUrl":"https://doi.org/10.1145/3242102.3242135","url":null,"abstract":"Slicing of a 5G network by creating virtualized instances of network functions facilitates the support of different service types with varying requirements. The management and orchestration layer identifies the components in the virtualization infrastructure to form an end-to-end slice for an intended service type. The key security challenges for the softwarized 5G networks are, (i) ensuring availability of a centralized controller/orchestrator, (ii) association between legitimate network slice components, and (iii) network slice isolation. To address these challenges, in this paper, we propose a novel implicit mutual authentication and key establishment with group anonymity protocol using proxy re-encryption on elliptic curve. The protocol provides (i) controller independent distributed association between components of a network slice, (ii) implicit authentication between network slice components to allow secure association, (iii) secure key establishment between component pairs for secure slice isolation, and (iv) service group anonymity. The proposed protocol's robustness is validated with necessary security analysis. The computation and bandwidth overheads of the proposed protocol are compared with that of the certificate based protocol, and our proposed protocol has 9.52% less computation overhead and 13.64% less bandwidth overhead for Type A1 pairing.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123114013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Software-Defined Radio Analysis of the Impact of Dynamic Modulation Scaling within Low-Power Wireless Systems 低功耗无线系统中动态调制缩放影响的软件无线电分析
A. Gumusalan, R. Simon, Hakan Aydin
{"title":"A Software-Defined Radio Analysis of the Impact of Dynamic Modulation Scaling within Low-Power Wireless Systems","authors":"A. Gumusalan, R. Simon, Hakan Aydin","doi":"10.1145/3242102.3242131","DOIUrl":"https://doi.org/10.1145/3242102.3242131","url":null,"abstract":"Dynamic Modulation Scaling (DMS) is a well-known mechanism that can effectively exploit the tradeoff between communication time and energy consumption. In recent years a number of studies have suggested that DMS techniques can reduce energy consumption while maintaining performance objectives in low-power wireless transmission technologies such as those defined in IEEE 802.15.4. These studies tend to rely on theoretical or simulation DMS models to predict network performance metrics. However, there is little, if any, work that is based upon empirically verified network performance outcomes using DMS. This paper fills that gap. Our contribution is four-fold; first, using GNU~Radio and SDR hardware we show how to emulate DMS in low power wireless systems. Second, we measure the impact of varying Signal-to-Noise levels on throughput and delivery rates for different DMS control strategies. Third, using DMS we quantify the impact of distance and finally, we measure the impact of different elevations between sender and receiver on network performance. Our results provide an empirical basis for future work in this area.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114162585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信