{"title":"A Distributed V2V-Based Virtual Traffic Light System","authors":"M. Rapelli, C. Casetti, M. Sgarbi","doi":"10.1109/COMSNETS48256.2020.9027339","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027339","url":null,"abstract":"Congestion in urban areas carries inherent costs in terms of fuel consumption, pollution, delays. Although ITS systems have devised solutions such as GLOSA, they require sophisticated infrastructure and thus installation and maintenance investments. In this paper, we propose V3TL, a V2V-based distributed solution to manage unregulated intersections that aims primarily at minimizing the time needed to clear the intersection, while reducing the number of stop-and-go maneuvers that are known to increase emissions. The proposed solution operates a cyclic scheduling of vehicles as they approach the intersection, letting them coordinate among each other through V2V communication. We simulated the solution in an unregulated four-way intersection, showing that it achieves its objectives.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"569 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132703878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study and Mitigation of Platform Related UWB Ranging Errors","authors":"Nour Smaoui, O. Gnawali, Kyungki Kim","doi":"10.1109/COMSNETS48256.2020.9027356","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027356","url":null,"abstract":"Ultra Wideband technology has been presented as a precise and accurate solution for wireless ranging. However, the noise and errors created from the low-cost, off-the-shelf UWB devices have been a challenge. Therefore, a comprehensive characterization of these errors is required for these devices to work more efficiently in real applications. This paper will cover the characterization of errors in different environment and configurations, a zscore-based error estimation and correction method for LOS scenarios, and evaluation of its performance. The result shows errors with a maximum mean of 5cm after the proposed correction.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133108925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of UAV-aided RF Energy Transfer","authors":"Suraj Suman, S. De","doi":"10.1109/COMSNETS48256.2020.9027446","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027446","url":null,"abstract":"In this paper, the performance analysis of unmanned aerial vehicle (UAV)-aided RF energy transfer (RFET) in presence of hovering inaccuracy is investigated. Hovering inaccuracy of UAV refers to the error during the execution of mission due to imperfect hovering. This leads to change in distance and elevation angle between the transmitter (mounted on UAV) and the receiver (sensor node deployed on ground). A closed-form expression on received power is obtained for a generalized radiation pattern of transmitter antenna mounted on UAV. The simulation results reveal that, compared to the ideal scenario, power received at the sensor node reduces significantly in presence of hovering inaccuracy.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privc: Privacy Preserving Verifiable Computation","authors":"Hardik Gajera, M. Das","doi":"10.1109/COMSNETS48256.2020.9027488","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027488","url":null,"abstract":"Verifiable computation in cloud setup with a privacy-preserving feature is an interesting research problem which can find application in monitoring system such as healthcare application. For example, a public cloud service provider can facilitate computation service on patients data or symptoms based on doctors prescription (e.g., prediction function) without letting the cloud server know on anything about patient's data and the patient can verify the computed response. We present a privacy-preserving verifiable computation (PriVC) scheme in which the server can authenticate a user in a privacy-preserving manner, and compute on encrypted data of the user stored in the public cloud. The server provides the proof of computation which can be verified by the user. The PriVC preserves the privacy of the user and ensures undeniability of the service offered as well as the service consumed. The PriVC scheme uses homomorphic encryption for user data encryption and a private polynomial function for computation on encrypted data. We show that the PriVC scheme is secure under indistinguishability against chosen function attack (IND-CFA), and the proof of computation is unforgeable in the standard model.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication","authors":"Misbah Shafi, R. Jha","doi":"10.1109/COMSNETS48256.2020.9027360","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027360","url":null,"abstract":"The visualization of future generation Wireless Communication Network (WCN) redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO (Multiple Input Multiple Output), UDN (Ultra Dense Network), spectrum sharing, D2D (Device to Device) communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poisson's distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manan Sharma, Shivam Tiwari, Suchetana Chakraborty, D. Banerjee
{"title":"Behavior Analysis through Routine Cluster Discovery in Ubiquitous Sensor Data","authors":"Manan Sharma, Shivam Tiwari, Suchetana Chakraborty, D. Banerjee","doi":"10.1109/COMSNETS48256.2020.9027377","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027377","url":null,"abstract":"Behavioral analysis (BA) on ubiquitous sensor data is the task of finding the latent distribution of features for modeling user-specific characteristics. These characteristics, in turn, can be used for a number of tasks including resource management, power efficiency, and smart home applications. In recent years, the employment of topic models for BA has been found to successfully extract the dynamics of the sensed data. Topic modeling is popularly performed on text data for mining inherent topics. The task of finding the latent topics in textual data is done in an unsupervised manner. In this work we propose a novel clustering technique for BA which can find hidden routines in ubiquitous data and also captures the pattern in the routines. Our approach efficiently works on high dimensional data for BA without performing any computationally expensive reduction operations. We evaluate three different techniques namely LDA, the Non-negative Matrix Factorization (NMF) and the Probabilistic Latent Semantic Analysis (PLSA) for comparative study. We have analyzed the efficiency of the methods by using performance indices like perplexity and silhouette on three real-world ubiquitous sensor datasets namely, the Intel Lab Data, Kyoto Data, and MERL data. Through rigorous experiments, we achieve silhouette scores of 0.7049 over the Intel Lab dataset, 0.6547 over the Kyoto dataset and 0.8312 over the MERL dataset for clustering.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1991 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Skeleton based Human Action Recognition for Smart City Application using Deep Learning","authors":"M. Rashmi, R. R. Guddeti","doi":"10.1109/COMSNETS48256.2020.9027469","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027469","url":null,"abstract":"These days the Human Action Recognition (HAR) is playing a vital role in several applications such as surveillance systems, gaming, robotics, and so on. Interpreting the actions performed by a person from the video is one of the essential tasks of intelligent surveillance systems in the smart city, smart building, etc. Human action can be recognized either by using models such as depth, skeleton, or combinations of these models. In this paper, we propose the human action recognition system based on the 3D skeleton model. Since the role of different joints varies while performing the action, in the proposed work, we use the most informative distance and the angle between joints in the skeleton model as a feature set. Further, we propose a deep learning framework for human action recognition based on these features. We performed experiments using MSRAction3D, a publicly available dataset for 3D HAR, and the results demonstrated that the proposed framework obtained the accuracies of 95.83%, 92.9%, and 98.63% on three subsets of the dataset AS1, AS2, and AS3, respectively, using the protocols of [19].","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach","authors":"J. Jithish, S. Sankaran, K. Achuthan","doi":"10.1109/COMSNETS48256.2020.9027362","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027362","url":null,"abstract":"The emergence of Cyber-Physical Systems (CPSs) is a potential paradigm shift for the usage of Information and Communication Technologies (ICT). From predominantly a facilitator of information and communication services, the role of ICT in the present age has expanded to the management of objects and resources in the physical world. Thus, it is imperative to devise mechanisms to ensure the trustworthiness of data to secure vulnerable devices against security threats. This work presents an analytical framework based on non-cooperative game theory to evaluate the trustworthiness of individual sensor nodes that constitute the CPS. The proposed game-theoretic model captures the factors impacting the trustworthiness of CPS sensor nodes. Further, the model is used to estimate the Nash equilibrium solution of the game, to derive a trust threshold criterion. The trust threshold represents the minimum trust score required to be maintained by individual sensor nodes during CPS operation. Sensor nodes with trust scores below the threshold are potentially malicious and may be removed or isolated to ensure the secure operation of CPS.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaurav Bhandari, R. Shorey, R. Sundaresan, M. PrakashHiremath, Ashish Joglekar, A. Kulkarni, Devadatta M. Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju
{"title":"An Implementation of an Industrial Internet of Things on an SMT Assembly Line","authors":"Gaurav Bhandari, R. Shorey, R. Sundaresan, M. PrakashHiremath, Ashish Joglekar, A. Kulkarni, Devadatta M. Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju","doi":"10.1109/COMSNETS48256.2020.9027475","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027475","url":null,"abstract":"Industry 4.0 is the latest trend in the manufacturing sector that focuses on intelligent manufacturing and smart factories. This leads to opportunities in automation, optimization, asset management and predictive maintenance, which helps reduce downtime and increase revenue. In this paper, we propose the solution that was created for a particular SMT PCB manufacturing facility in Mysuru (Vinyas IT), the features it has to offer and the methodologies that were implemented in order to achieve our goals. We will also highlight the important aspects of the solution that will be showcased during the demonstration and the impact of our solution.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time Series Snapshot of Event Boundary Detection and Area Estimation in Wireless Sensor Networks","authors":"Srabani Kundu, Nabanita Das, Avirup Das","doi":"10.1109/COMSNETS48256.2020.9027316","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027316","url":null,"abstract":"To monitor the events like forest fire, flood, earth tremor etc., event boundary detection and area estimation are two challenging tasks for Wireless Sensor Networks (WSN). Researchers, so far, have proposed various innovative solutions assuming the event boundary to be static. To monitor spatiotemporal events by WSN, in this paper, we study some existing techniques to report snapshots of event boundary in successive intervals, and compare their performance in respect of accuracy, latency and message communication overhead. Testbed experiments have been done to evaluate the performance and the results show that the computation intensive techniques perform better, provided they satisfy the application specific real time constraint.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}