{"title":"Optimal Content Caching Policy Considering Mode Selection and User Preference under Overlay D2D Communications","authors":"Yue Wang, Guangsheng Feng, Junyu Lin, Haibin Lv, Jiayu Sun, Huiqiang Wang, Zihan Gao","doi":"10.1109/MSN.2018.00035","DOIUrl":"https://doi.org/10.1109/MSN.2018.00035","url":null,"abstract":"The rapid growth of user demand for mobile data traffic, especially video streaming, places a serious burden on base stations. Cache-enabled D2D communication has emerged as a promising paradigm to offload cellular traffic, in which contents are cached at user devices and then shared among neighbors via D2D communications. It is a key step to optimize the content caching policy in the cache-enabled D2D-assisted offloading. To maximize D2D offloading probability, we propose an optimal content caching policy to cache valuable contents by considering both the mode selection and user preference of neighbors. Then we use a dual simplex method to solve the maximum D2D offloading probability problem. Comparing with existing schemes, the simulation results prove the advantage of our proposed scheme in the improvement of D2D offloading performance.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125740286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Configuration of the C-V2X Mode 4 Sidelink PC5 Interface for Vehicular Communication","authors":"Rafael Molina-Masegosa, J. Gozálvez, M. Sepulcre","doi":"10.1109/MSN.2018.00014","DOIUrl":"https://doi.org/10.1109/MSN.2018.00014","url":null,"abstract":"The 3GPP has released the C-V2X standard to support V2X (Vehicle-to-Everything) communications using the LTE sidelink PC5 interface. This standard includes two modes of operation, and this study focuses on the Mode 4. This mode does not require the support of the cellular infrastructure, and vehicles can autonomously select their sub-channels for their V2V transmissions. The adequate operation of C-V2X Mode 4 requires a careful configuration of its main parameters. This study analyzes the optimum configuration of the parameters that mostly influence the operation and performance of C-V2X or LTE-V Mode 4. This analysis is conducted for different channel loads and traffic conditions. The conclusions obtained are compared with existing studies taking into account the importance of using accurate models for adequately configuring the C-V2X Mode 4 interface.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Aware Service Composition of Configurable IoT Smart Things","authors":"Mengyu Sun, Zhangbing Zhou, Yucong Duan","doi":"10.1109/MSN.2018.00013","DOIUrl":"https://doi.org/10.1109/MSN.2018.00013","url":null,"abstract":"This paper presents a three-tier framework to facilitate the composition of Internet-of-Things (IoT) services, where these IoT services represent functionalities provided by heterogenous smart things. Various IoT services are categorized into service classes through the categorization of their functionalities. A service network is constructed by considering the invocation relationship between service classes, and service class chains are generated using traditional Web service composition techniques to satisfy the requirement from the functional perspective only. Considering the factors, including spatial and temporal constraints, energy efficiency, and the functional configurability, IoT service composition can be reduced to a multi-objective optimization problem. Heuristic algorithms, such as genetic algorithm (GA), ant colony optimization (ACO), and particle swarm optimization (PSO), are adopted to search for optimal IoT service compositions. Experimental results show that PSO performs better than GA and ACO in searching for approximately optimal IoT service compositions and reducing the energy consumption of smart things in the network.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133318191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone-Assisted Over-Air Reprogramming Based on Visible Light Communication","authors":"J. Qiu, Sai Li, Pan Zheng, Jing Fan","doi":"10.1109/MSN.2018.00025","DOIUrl":"https://doi.org/10.1109/MSN.2018.00025","url":null,"abstract":"Reprogramming is one of the key issues for long-term living wireless sensor networks. Most of current research focuses on optimizing the upper software in order to save energy or improve security. In this paper, we replace the electromagnetic communication with visible light communication applied in reprogramming, and then leverage general sensor node and smartphones for lowering the barrier of VLC applied in reprogramming. However, the unstable light source and low-cost light sensor make the reprogramming procedure difficult. For this, we present a novel incremental reprogramming approach named EasiVLC. This approach refers our previous research and optimizes visible light signal modulation based on VLC for reducing transmission time. The experiment results illustrate effectiveness of EasiVLC at the cost of increasing 52.5% energy overhead by comparison with EC-based reprogramming approach.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Publisher's information]","authors":"","doi":"10.1109/msn.2018.00044","DOIUrl":"https://doi.org/10.1109/msn.2018.00044","url":null,"abstract":"","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123152102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MSN 2018 Technical Program Committee","authors":"","doi":"10.1109/msn.2018.00006","DOIUrl":"https://doi.org/10.1109/msn.2018.00006","url":null,"abstract":"","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GTC Forest: An Ensemble Method for Network Structured Data Classification","authors":"Jinxi Wang, Bo Hu, Xiang Li, Zhen Yang","doi":"10.1109/MSN.2018.00020","DOIUrl":"https://doi.org/10.1109/MSN.2018.00020","url":null,"abstract":"In recent years, deep neural networks have achieved great success in various applications, particularly in visual tasks such as image classification. However, deep neural networks cannot reach their full potential when dealing with classification problems in networks. Because the network-related dataset is usually in a structured format rather than an image format, and in some cases the data scale is small to train a deep model. Therefore, we aim at another choice, which can abandon the structure of deep neural networks, but remain the powerful representation learning ability. In this paper, we propose GTC Forest, a tree-based ensemble method for network structured data classification. GTC Forest consists of two parts: the first part Multi-Grained Traversing to do representation learning in network structured data; and the second part Cascade Forest to train on small-scale dataset, as well as reducing model complexity. Experiments are conducted on user broadband dataset, which is built to guarantee users a better Internet experience. And the results prove that our model is effective, and has higher accuracy than other machine learning methods in network structured data classification.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence Maximization with Trust Relationship in Social Networks","authors":"Nan Wang, Jiansong Da, Jinbao Li, Yong Liu","doi":"10.1109/MSN.2018.00017","DOIUrl":"https://doi.org/10.1109/MSN.2018.00017","url":null,"abstract":"With the wide usage of many electronic devices such as the mobile telephones, the social activities in the mobile terminal have increased greatly. The influence maximization problem is to find a small set of nodes in a mobile social network such that they can make to maximize the spread of influence under the certain models. Existing methods of influence maximization only consider information dissemination, without considering the effectiveness of the transmission probabilities between nodes. We need to ensure the effectiveness of the transmission probabilities to achieve the maximal influence in real applications. We design a new propagation model and propose an effective greedy algorithm for this model. On this basis, we further improve the algorithmic efficiency with dynamic pruning strategy and propose a new estimation technique to accelerate influence evaluation. We demonstrate the effectiveness and efficiency of our algorithms on the two real social networks.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deployment Model of Charging Pile Based on Random Forest for Shared Electric Vehicle in Smart Cities","authors":"Tiantian Xu, Huazhi Sun, Guangjie Han, Chunmei Ma, Lifen Jiang","doi":"10.1109/MSN.2018.00015","DOIUrl":"https://doi.org/10.1109/MSN.2018.00015","url":null,"abstract":"In the smart cities, sharing electric vehicles have many advantages such as environmental protection, low carbon emission, and high efficiency, which will greatly facilitate human life. However, whether the shared electric vehicle can be charged in time directly affects the users' experience. Based on this fact, we study that how to deploy the charging piles in the parking station of the shared electric vehicle, and propose a charging pile deployment model. First, the number of shared electric vehicles that check out from parking stations is predicted based on the random forest algorithm. Then, a mobile model of the shared electric vehicle is established. Based on the mobile model, the number of shared electric vehicles that check in within the target period is calculated and whether they reach the starvation state are determined. After that, the number of charging piles to be deployed is determined. Finally, the effects of hunger rate, battery capacity and the distance between parking stations on the number of charging piles were simulated by experiments. The experimental results verify the validity and feasibility of the proposed model. The prediction model proposed in this paper can provide a certain decision basis for the sharing of electric vehicle charging pile planning.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"41 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120838678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yufu Wang, Yuan Liu, Jinzong Hu, Mingwei Zhang, Xingwei Wang
{"title":"Reputation and Incentive Mechanism for SDN Applications","authors":"Yufu Wang, Yuan Liu, Jinzong Hu, Mingwei Zhang, Xingwei Wang","doi":"10.1109/MSN.2018.000-3","DOIUrl":"https://doi.org/10.1109/MSN.2018.000-3","url":null,"abstract":"Software Defined Networking (SDN) decouples the control plane from the data plane, which increases network scalability and flexibility. But malicious applications on SDN controller can cause the entire network to crash. So, we design a reputation and incentive mechanism on SDN to reduce application's malicious access. In the proposed module, first of all, the application behavior is analyzed and the malicious accesses are identified, which are used to build the reputation and incentive mechanism. Second, the analysis results of the application behavior are combined through beta probability density to obtain the reputation rating. The reward or punishment will be given based on the behavior and reputation of the application under the selected social strategy. Simulation results show that the system can accurately identify malicious behavior and reduce malicious requests, with an acceptable runtime overhead about 300 microseconds.","PeriodicalId":264541,"journal":{"name":"2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115875304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}