2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)最新文献

筛选
英文 中文
A Distributed V2V-Based Virtual Traffic Light System 基于v2v的分布式虚拟交通灯系统
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027339
M. Rapelli, C. Casetti, M. Sgarbi
{"title":"A Distributed V2V-Based Virtual Traffic Light System","authors":"M. Rapelli, C. Casetti, M. Sgarbi","doi":"10.1109/COMSNETS48256.2020.9027339","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027339","url":null,"abstract":"Congestion in urban areas carries inherent costs in terms of fuel consumption, pollution, delays. Although ITS systems have devised solutions such as GLOSA, they require sophisticated infrastructure and thus installation and maintenance investments. In this paper, we propose V3TL, a V2V-based distributed solution to manage unregulated intersections that aims primarily at minimizing the time needed to clear the intersection, while reducing the number of stop-and-go maneuvers that are known to increase emissions. The proposed solution operates a cyclic scheduling of vehicles as they approach the intersection, letting them coordinate among each other through V2V communication. We simulated the solution in an unregulated four-way intersection, showing that it achieves its objectives.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"569 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132703878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study and Mitigation of Platform Related UWB Ranging Errors 平台相关超宽带测距误差的研究与缓解
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027356
Nour Smaoui, O. Gnawali, Kyungki Kim
{"title":"Study and Mitigation of Platform Related UWB Ranging Errors","authors":"Nour Smaoui, O. Gnawali, Kyungki Kim","doi":"10.1109/COMSNETS48256.2020.9027356","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027356","url":null,"abstract":"Ultra Wideband technology has been presented as a precise and accurate solution for wireless ranging. However, the noise and errors created from the low-cost, off-the-shelf UWB devices have been a challenge. Therefore, a comprehensive characterization of these errors is required for these devices to work more efficiently in real applications. This paper will cover the characterization of errors in different environment and configurations, a zscore-based error estimation and correction method for LOS scenarios, and evaluation of its performance. The result shows errors with a maximum mean of 5cm after the proposed correction.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133108925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Analysis of UAV-aided RF Energy Transfer 无人机辅助射频能量传输的性能分析
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027446
Suraj Suman, S. De
{"title":"Performance Analysis of UAV-aided RF Energy Transfer","authors":"Suraj Suman, S. De","doi":"10.1109/COMSNETS48256.2020.9027446","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027446","url":null,"abstract":"In this paper, the performance analysis of unmanned aerial vehicle (UAV)-aided RF energy transfer (RFET) in presence of hovering inaccuracy is investigated. Hovering inaccuracy of UAV refers to the error during the execution of mission due to imperfect hovering. This leads to change in distance and elevation angle between the transmitter (mounted on UAV) and the receiver (sensor node deployed on ground). A closed-form expression on received power is obtained for a generalized radiation pattern of transmitter antenna mounted on UAV. The simulation results reveal that, compared to the ideal scenario, power received at the sensor node reduces significantly in presence of hovering inaccuracy.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privc: Privacy Preserving Verifiable Computation Privc:保护隐私的可验证计算
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027488
Hardik Gajera, M. Das
{"title":"Privc: Privacy Preserving Verifiable Computation","authors":"Hardik Gajera, M. Das","doi":"10.1109/COMSNETS48256.2020.9027488","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027488","url":null,"abstract":"Verifiable computation in cloud setup with a privacy-preserving feature is an interesting research problem which can find application in monitoring system such as healthcare application. For example, a public cloud service provider can facilitate computation service on patients data or symptoms based on doctors prescription (e.g., prediction function) without letting the cloud server know on anything about patient's data and the patient can verify the computed response. We present a privacy-preserving verifiable computation (PriVC) scheme in which the server can authenticate a user in a privacy-preserving manner, and compute on encrypted data of the user stored in the public cloud. The server provides the proof of computation which can be verified by the user. The PriVC preserves the privacy of the user and ensures undeniability of the service offered as well as the service consumed. The PriVC scheme uses homomorphic encryption for user data encryption and a private polynomial function for computation on encrypted data. We show that the PriVC scheme is secure under indistinguishability against chosen function attack (IND-CFA), and the proof of computation is unforgeable in the standard model.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication 半双工攻击:D2D通信中一种有效的攻击模型
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027360
Misbah Shafi, R. Jha
{"title":"Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication","authors":"Misbah Shafi, R. Jha","doi":"10.1109/COMSNETS48256.2020.9027360","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027360","url":null,"abstract":"The visualization of future generation Wireless Communication Network (WCN) redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO (Multiple Input Multiple Output), UDN (Ultra Dense Network), spectrum sharing, D2D (Device to Device) communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poisson's distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behavior Analysis through Routine Cluster Discovery in Ubiquitous Sensor Data 基于常规聚类发现的泛在传感器数据行为分析
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027377
Manan Sharma, Shivam Tiwari, Suchetana Chakraborty, D. Banerjee
{"title":"Behavior Analysis through Routine Cluster Discovery in Ubiquitous Sensor Data","authors":"Manan Sharma, Shivam Tiwari, Suchetana Chakraborty, D. Banerjee","doi":"10.1109/COMSNETS48256.2020.9027377","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027377","url":null,"abstract":"Behavioral analysis (BA) on ubiquitous sensor data is the task of finding the latent distribution of features for modeling user-specific characteristics. These characteristics, in turn, can be used for a number of tasks including resource management, power efficiency, and smart home applications. In recent years, the employment of topic models for BA has been found to successfully extract the dynamics of the sensed data. Topic modeling is popularly performed on text data for mining inherent topics. The task of finding the latent topics in textual data is done in an unsupervised manner. In this work we propose a novel clustering technique for BA which can find hidden routines in ubiquitous data and also captures the pattern in the routines. Our approach efficiently works on high dimensional data for BA without performing any computationally expensive reduction operations. We evaluate three different techniques namely LDA, the Non-negative Matrix Factorization (NMF) and the Probabilistic Latent Semantic Analysis (PLSA) for comparative study. We have analyzed the efficiency of the methods by using performance indices like perplexity and silhouette on three real-world ubiquitous sensor datasets namely, the Intel Lab Data, Kyoto Data, and MERL data. Through rigorous experiments, we achieve silhouette scores of 0.7049 over the Intel Lab dataset, 0.6547 over the Kyoto dataset and 0.8312 over the MERL dataset for clustering.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1991 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Skeleton based Human Action Recognition for Smart City Application using Deep Learning 基于骨骼的人类行为识别在智慧城市应用中的深度学习
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027469
M. Rashmi, R. R. Guddeti
{"title":"Skeleton based Human Action Recognition for Smart City Application using Deep Learning","authors":"M. Rashmi, R. R. Guddeti","doi":"10.1109/COMSNETS48256.2020.9027469","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027469","url":null,"abstract":"These days the Human Action Recognition (HAR) is playing a vital role in several applications such as surveillance systems, gaming, robotics, and so on. Interpreting the actions performed by a person from the video is one of the essential tasks of intelligent surveillance systems in the smart city, smart building, etc. Human action can be recognized either by using models such as depth, skeleton, or combinations of these models. In this paper, we propose the human action recognition system based on the 3D skeleton model. Since the role of different joints varies while performing the action, in the proposed work, we use the most informative distance and the angle between joints in the skeleton model as a feature set. Further, we propose a deep learning framework for human action recognition based on these features. We performed experiments using MSRAction3D, a publicly available dataset for 3D HAR, and the results demonstrated that the proposed framework obtained the accuracies of 95.83%, 92.9%, and 98.63% on three subsets of the dataset AS1, AS2, and AS3, respectively, using the protocols of [19].","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach 在信息物理系统中确保可信度:一种博弈论方法
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027362
J. Jithish, S. Sankaran, K. Achuthan
{"title":"Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach","authors":"J. Jithish, S. Sankaran, K. Achuthan","doi":"10.1109/COMSNETS48256.2020.9027362","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027362","url":null,"abstract":"The emergence of Cyber-Physical Systems (CPSs) is a potential paradigm shift for the usage of Information and Communication Technologies (ICT). From predominantly a facilitator of information and communication services, the role of ICT in the present age has expanded to the management of objects and resources in the physical world. Thus, it is imperative to devise mechanisms to ensure the trustworthiness of data to secure vulnerable devices against security threats. This work presents an analytical framework based on non-cooperative game theory to evaluate the trustworthiness of individual sensor nodes that constitute the CPS. The proposed game-theoretic model captures the factors impacting the trustworthiness of CPS sensor nodes. Further, the model is used to estimate the Nash equilibrium solution of the game, to derive a trust threshold criterion. The trust threshold represents the minimum trust score required to be maintained by individual sensor nodes during CPS operation. Sensor nodes with trust scores below the threshold are potentially malicious and may be removed or isolated to ensure the secure operation of CPS.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Implementation of an Industrial Internet of Things on an SMT Assembly Line 工业物联网在SMT装配线上的实现
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027475
Gaurav Bhandari, R. Shorey, R. Sundaresan, M. PrakashHiremath, Ashish Joglekar, A. Kulkarni, Devadatta M. Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju
{"title":"An Implementation of an Industrial Internet of Things on an SMT Assembly Line","authors":"Gaurav Bhandari, R. Shorey, R. Sundaresan, M. PrakashHiremath, Ashish Joglekar, A. Kulkarni, Devadatta M. Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju","doi":"10.1109/COMSNETS48256.2020.9027475","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027475","url":null,"abstract":"Industry 4.0 is the latest trend in the manufacturing sector that focuses on intelligent manufacturing and smart factories. This leads to opportunities in automation, optimization, asset management and predictive maintenance, which helps reduce downtime and increase revenue. In this paper, we propose the solution that was created for a particular SMT PCB manufacturing facility in Mysuru (Vinyas IT), the features it has to offer and the methodologies that were implemented in order to achieve our goals. We will also highlight the important aspects of the solution that will be showcased during the demonstration and the impact of our solution.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time Series Snapshot of Event Boundary Detection and Area Estimation in Wireless Sensor Networks 无线传感器网络中事件边界检测和区域估计的时间序列快照
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) Pub Date : 2020-01-01 DOI: 10.1109/COMSNETS48256.2020.9027316
Srabani Kundu, Nabanita Das, Avirup Das
{"title":"Time Series Snapshot of Event Boundary Detection and Area Estimation in Wireless Sensor Networks","authors":"Srabani Kundu, Nabanita Das, Avirup Das","doi":"10.1109/COMSNETS48256.2020.9027316","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027316","url":null,"abstract":"To monitor the events like forest fire, flood, earth tremor etc., event boundary detection and area estimation are two challenging tasks for Wireless Sensor Networks (WSN). Researchers, so far, have proposed various innovative solutions assuming the event boundary to be static. To monitor spatiotemporal events by WSN, in this paper, we study some existing techniques to report snapshots of event boundary in successive intervals, and compare their performance in respect of accuracy, latency and message communication overhead. Testbed experiments have been done to evaluate the performance and the results show that the computation intensive techniques perform better, provided they satisfy the application specific real time constraint.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信