{"title":"Passive Device-Free Multi-Point CSI Localization and Its Obfuscation with Randomized Filtering","authors":"Marco Cominelli, F. Gringoli, R. Cigno","doi":"10.1109/MedComNet52149.2021.9501240","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501240","url":null,"abstract":"The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi communications, and in particular to locate the position of unaware people, is moving from feasibility studies to high precision applications. The work we present in this paper explores how the use of multiple localization receivers can enhance the precision and robustness of device-free CSI-based localization with a method based on a state-of-the-art Convolutional Neural Network. Next we discuss how a randomized pre-filtering at the transmitter can hide the information that the CSI carries on the location of one person indoor formalizing the manipulation technique. Results are presented discussing two different ways of exploiting the multi-receiver redundancy and how, in any case, properly randomized pre-distortion at the transmitter can prevent localization even if the attack is carried out with multiple localization devices (receivers controlled by the attacker).","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121346042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luciano Miuccio, D. Panno, P. Pisacane, Salvatore Riolo
{"title":"Channel-Aware and QoS-Aware Downlink Resource Allocation for Multi-numerology Based 5G NR Systems","authors":"Luciano Miuccio, D. Panno, P. Pisacane, Salvatore Riolo","doi":"10.1109/MedComNet52149.2021.9501268","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501268","url":null,"abstract":"The versatility and flexibility needed to support heterogeneous 5G usage scenarios involves the introduction of multi-numerology based 5G New Radio (NR) systems, where multiple frame structures with different sub-carrier spacing coexists in the same radio spectrum. Although this approach is efficient to cater a wide variety of services, it introduces a new issue in the radio resource allocation among the different non-orthogonal numerologies. This work introduces a new Quality of Service (QoS) aware Radio Resource Management (RRM) framework which schedules User Equipments (UEs) requiring Guaranteed Bit Rate (GBR) services with different priorities, or non-GBR services. In order to maximize the spectral efficiency and, consequently, the system throughput, this framework consists of two channel-aware control levels. The first level provides a dynamic subdivision of the spectrum among the various numerologies, while the second one schedules the Physical Resource Blocks (PRBs) to the UEs belonging to the same numerology. In this paper, we propose a new 1st level allocation algorithm, called Channel-Aware Resource Allocation for Multi-numerology (CARAM), which aims to maximize the system throughput and the amount of satisfied users, taking into account the priority. As 2nd control level, we exploit well-known scheduling algorithms. We benchmark our approach against other existing 1st level allocation algorithms via several system-level simulations, under different traffic loads and channel conditions. The comparative analysis shows that our RRM framework outperforms the reference schemes in terms of system throughput, while guaranteeing a larger number of GBR services with high priority.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling Solar Powered UAV-BS for 5G and Beyond","authors":"Greta Vallero, M. Meo","doi":"10.1109/MedComNet52149.2021.9501239","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501239","url":null,"abstract":"Unmanned Aerial Vehicles equipped with Base Stations (UAV-BSs) are considered an effective solution to dynamically provide additional capacity in Radio Access Networks (RANs), in case of network congestion or emergency situations. To face the problem of the poor energy availability provided by on-board batteries, UAV-BSs can be equipped with Photovoltaic (PV) panels. To investigate and understand the complex interworking between traffic needs and energy availability, in this paper, we propose a model of a PV-panel-powered Long Term Evolution (LTE) Multi User Multiple Input-Multiple Output (MU-MIMO) UAV-BS, using a discretized representation of the energy in terms of Energy Packets (EPs). The model highlights the different operation regions under which the traffic demand can be satisfied for given energy production levels. Results for winter and summer seasons that take into account daily traffic and energy production variability are shown and can be used to properly dimension the UAV-BS power supply system.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT for Real Time Presence Sensing on the 5G EVE Infrastructure","authors":"Riccardo Rusca, C. Casetti, P. Giaccone","doi":"10.1109/MedComNet52149.2021.9501245","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501245","url":null,"abstract":"One of the most widely advertised capabilities of 5G targets the massive Machine-Type Communication (mMTC) giving the development of Internet of Things (IoT) solutions center stage in the new generation of mobile networks. In this paper, we address the possibility of detecting people on city streets thanks to deployment of commercial sensors, connected to the 5G network, that capture WiFi probes transmitted by people's smart devices. We first outline the motivation of such a scenario. Then, we illustrate our implemented architecture and present the results detected in an area near the Politecnico di Torino within the 5G EVE H2020 project. We show that our architecture can monitor real-time data coming from the installed sensors and thus estimate the number of people present in an area by simply collecting anonymized MAC addresses and timestamps from smart devices of passers-by.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pietro Spadaccino, D. Garlisi, F. Cuomo, Giorgio Pillon, Patrizio Pisani
{"title":"Discovery privacy threats via device de-anonymization in LoRaWAN","authors":"Pietro Spadaccino, D. Garlisi, F. Cuomo, Giorgio Pillon, Patrizio Pisani","doi":"10.1109/MedComNet52149.2021.9501247","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501247","url":null,"abstract":"LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in turn, redirect the data to application servers. While several security issues have been faced in the LoRaWAN v1.1 specification from the very beginning, there are still some aspects that may undermine the privacy and the security of the IoT devices. In this paper we tackle the privacy aspect in the LoRaWAN device identity. The proposed approach, by monitoring the traffic of a LoRaWAN Network, is able to derive, in a probabilistic way, the unique identifier of the device from the temporal address assigned from the network. In other words, the method identifies the relationship between the LoRaWAN DevAddress and the device manufacturer DevEUI. The proposed approach, named DEVIL (DEVice Identification and privacy Leakage), is based on temporal patterns arising in the packet transmissions by LoRaWAN devices, and it is evaluated on the dataset extracted from real applications scenario deployed in Italy by a network operator. The results of our analysis show how device identification, during the time, can expose users to privacy leakage.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miead Tehrani Moayyed, Leonardo Bonati, Pedram Johari, T. Melodia, S. Basagni
{"title":"Creating RF Scenarios for Large-scale, Real-time Wireless Channel Emulators","authors":"Miead Tehrani Moayyed, Leonardo Bonati, Pedram Johari, T. Melodia, S. Basagni","doi":"10.1109/MedComNet52149.2021.9501275","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501275","url":null,"abstract":"Recent years have seen the introduction of large-scale platforms for experimental wireless research. These platforms, which include testbeds like those of the PAWR program and emulators like Colosseum, allow researchers to prototype and test their solutions in a sound yet realistic wireless environment before actual deployment. Emulators, in particular, enable wireless experiments that are not site-specific as those on real testbeds. Researchers can choose among different radio frequency (RF) scenarios for real-time emulation of a vast variety of different situations, with different number of users, RF bandwidth, antenna counts, hardware requirements, etc. Although very powerful, in that they can emulate virtually any real-world deployment, emulated scenarios are only as useful as how accurately they can reproduce the targeted wireless channel and environment. Achieving emulation accuracy is particularly challenging, especially for experiments at scale for which emulators require considerable amounts of computational resources. In this paper, we propose a framework to create RF scenarios for emulators like Colosseum starting from rich forms of input, like those obtained by measurements through radio equipment or via software (e.g., ray-tracers and electromagnetic field solvers). Our framework optimally scales down the large set of RF data in input to the fewer parameters allowed by the emulator by using efficient clustering techniques and channel impulse response re-sampling. We showcase our method by generating wireless scenarios for the Colosseum network emulator by using Remcom's Wireless InSite, a commercial-grade ray-tracer that produces key characteristics of the wireless channel. Examples are provided for line-of-sight and non-line-of-sight scenarios on portions of the Northeastern University main campus","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124536011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Quadri, V. Mancuso, Valerio Cislaghi, M. Marsan, G. P. Rossi
{"title":"From PLATO to Platoons","authors":"C. Quadri, V. Mancuso, Valerio Cislaghi, M. Marsan, G. P. Rossi","doi":"10.1109/MedComNet52149.2021.9501242","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501242","url":null,"abstract":"Grouping vehicles into platoons promises to improve road capacity, driver safety, and fuel consumption. However, when platoons have to allow for cross traffic maneuvers, the ability to control single large platoons is not sufficient, and chaining smaller platoons becomes necessary. To this aim we define PLATO, an edge-assisted multi-platoon control architecture and, by delving into the dichotomy of unity and plurality of platooning, we analyze costs and benefits of multi-platooning. We investigate on the feasibility and formulate the utility of multi-platoons by analyzing the underlying edge computing and broadband cellular connectivity requirements. Using a detailed simulator, we show that, in realistic environments, multi-platoons can be effectively controlled with PLATO, as long as the latency between individual platoon managers and the multi-platoon manager is kept below a few tens of milliseconds. Surprisingly, the latency between vehicles and managers is one order of magnitude less critical.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giuseppe Ribezzo, L. D. Cicco, Vittorio Palmisano, S. Mascolo
{"title":"Bitrate Reduction for Omnidirectional Video Streaming: Comparing Variable Quantization Parameter and Variable Resolution Approaches","authors":"Giuseppe Ribezzo, L. D. Cicco, Vittorio Palmisano, S. Mascolo","doi":"10.1109/MedComNet52149.2021.9501278","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501278","url":null,"abstract":"Immersive and Extended Reality applications are getting increasingly popular due to the recent improvements and wide availability of Head Mounted Displays in the mass market. Among the many new immersive applications, Omnidirectional Video Streaming (OVS) - or 360°Video Streaming - is attracting the attention of both the industry and the research community. The increased immersivity of 360° videos comes at the cost of larger bandwidth requirements compared to classic 2D videos. To tackle the issue of reducing bandwidth requirements, tiling is a viable technique that allows to encode the portions of the 360° video most likely to fall outside of the users' viewport at lower quality using a higher quantization parameter. Tiling requires new encoders to be used which however do not have available hardware decoders in mobile devices yet. The variable resolution approach instead shrinks areas not falling in the region of interest to decrease the overall resolution and thus allowing bitrate reduction with any codec. This paper quantitatively compares the two approaches to find the trade-offs between achievable bitrate reduction and visual quality measured using the VMAF visual quality metric.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Local Intrusion Detection in the Internet of Things","authors":"Christiana Ioannou, V. Vassiliou","doi":"10.1109/MedComNet52149.2021.9501269","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501269","url":null,"abstract":"Security in the Internet of Things (IoT) is designed to ensure timely, reliable and fully operational network. The presence of a malicious device within the network can decrease the IoT applications' effective functionality by failing to transmit the data to the intended user. Intrusion detection systems (IDS) with anomaly detection classify IoT network activity based on what is defined as normal. In this paper we present the evaluation of local Binary Logistic Regression (BLR) detection models, found in mIDS, which monitor local IoT node activity to detect routing layer attacks, such as Selective Forward and Blackhole. The BLR detection models were evaluated in both a simulator and an IoT testbed platform. Overall, our results, both in the simulator and at the testbed, have shown that for each environment to be deployed, a customised BLR model should be created and more than one performance measure should be used. In the paper we propose the use of four performance metrics to fully capture the efficacy of classification methods. Besides Precision, Recall, and Accuracy, we have chosen to include the Matthews Correlation Coefficient in our evaluation set, since it provides a more normalized view and the quality of the BLR detection models.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124322271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lorenzo Ghiro, Francesco Restuccia, Salvatore D’oro, S. Basagni, T. Melodia, L. Maccari, R. Cigno
{"title":"A Blockchain Definition to Clarify its Role for the Internet of Things","authors":"Lorenzo Ghiro, Francesco Restuccia, Salvatore D’oro, S. Basagni, T. Melodia, L. Maccari, R. Cigno","doi":"10.1109/MedComNet52149.2021.9501280","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501280","url":null,"abstract":"The term blockchain is used for disparate projects, ranging from cryptocurrencies to applications for the Internet of Things (IoT). The concept of blockchain appears therefore blurred, as the same technology cannot empower applications with extremely different requirements, levels of security and performance. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain allowing us to clarify its possible role in the IoT. The definition binds together three elements that, as a whole, delineate those unique features that distinguish the blockchain from other distributed ledger technologies: immutability, transparency and anonymity. We note that immutability-which is imperative for securing blockchains-imposes remarkable resource consumption. Moreover, while transparency demands no confidentiality, anonymity enhances privacy but prevents user identification. As such, we raise the concern that these blockchain features clash with the requirements of most IoT applications where devices are power-constrained, data needs to be kept confidential, and users to be clearly identifiable. We consequently downplay the role of the blockchain for the IoT: this can act as a ledger external to the IoT architecture, invoked as seldom as possible and only to record the aggregate results of myriads of local (IoT) transactions that are most of the time performed off-chain to meet performance and scalability requirements.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}