{"title":"MIDAS: Middlebox discovery and selection for on-path flow processing","authors":"Ahmed Abujoda, Panagiotis Papadimitriou","doi":"10.1109/COMSNETS.2015.7098686","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098686","url":null,"abstract":"The deployment of micro-datacenters for network function virtualization (NFV) by Internet Service Providers creates opportunities for flow processing along the traffic path. On-path processing requires the discovery of the middleboxes that will be traversed by each flow and the assignment of network functions (NFs) to middleboxes, while preserving the order of the NFs as specified in the service chain. NF location dependencies may require flow processing establishment across multiple NF Providers (NFPs). This entails additional challenges for middlebox discovery and selection, stemming from the NFPs' restrictions in information disclosure and interoperability. To address these issues, we present MIDAS, an architecture for the coordination of middlebox discovery and selection across multiple NFPs. MIDAS relies on a centralized middlebox controller in each NFP to provide interoperability among NFPs for flow processing setup. MIDAS establishes on-path processing via middlebox signaling, controller chaining, and Multi-Party Computation (MPC) based middlebox selection. We particularly employ MPC to preserve the confidentiality of middlebox utilization across the NFPs. We study the feasibility of MIDAS using a prototype implementation and further present simulation results to assess the efficiency of our middlebox selection approach.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127615384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apratim Mukherjee, Souvik Basu, Siuli Roy, S. Bandyopadhyay
{"title":"Developing a coherent global view for post disaster situation awareness using opportunistic network","authors":"Apratim Mukherjee, Souvik Basu, Siuli Roy, S. Bandyopadhyay","doi":"10.1109/COMSNETS.2015.7098676","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098676","url":null,"abstract":"Situational awareness is a critical component in a post-disaster recovery operation for assessment of needs and identification of available resources at different parts of a disaster-affected area. This information, in turn, may help the relief agencies to appropriately coordinate, manage and channelize their resources. A major hindrance in developing such global situational awareness is the non-uniform interaction pattern of relief workers. Volunteers in a particular region have much better knowledge of the local situation than those belonging to regions further away. This information asymmetry leads to deviation in perceptions of volunteers working in different regions, thereby affecting the resource distribution process. Thus, a unified global situational view of the entire disaster affected area is essential to bridge the perception gap of volunteers and to help them develop a common understanding of the actual scenario. In this paper, we propose a scheme for developing such a coherent global view of the post-disaster situation using local situational information in a smart-phone based delay tolerant peer-to-peer network environment.We focus on generating a comprehensive view which is consistent for all workers irrespective of their location or mobility. The proposed scheme takes into account the spatial locality and spatial regularity properties of human mobility and uses a concept of “opportunistic knowledge injection” to disseminate local situational knowledge to other remote areas without significant network overhead. The effectiveness of the proposal is evaluated on the ONE simulator.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alvika Gautam, Vinayak Naik, Archie Gupta, S. K. Sharma, K. Sriram
{"title":"An smartphone-based algorithm to measure and model quantity of sleep","authors":"Alvika Gautam, Vinayak Naik, Archie Gupta, S. K. Sharma, K. Sriram","doi":"10.1109/COMSNETS.2015.7098705","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098705","url":null,"abstract":"Sleep quantity affects an individual's personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. A number of wearable devices with embedded sensors have emerged in the recent past as an alternative to PSG for regular sleep monitoring directly by the user. These devices are intrusive and cause discomfort besides being expensive. In this work, we present an algorithm to detect sleep using a smartphone with the help of its inbuilt accelerometer sensor. We present three different approaches to classify raw acceleration data into two states - Sleep and Wake. In the first approach, we take an equation from Kushida's algorithm to process accelerometer data. Henceforth, we call it Kushida's equation. While the second is based on statistical functions, the third is based on Hidden Markov Model (HMM) training. Although all the three approaches are suitable for a phone's resources, each approach demands different amount of resources. While Kushida's equation-based approach demands the least, the HMM training-based approach demands the maximum. We collected data from mobile phone's accelerometer for four subjects for twelve days each. We compare accuracy of sleep detection using each of the three approaches with that of Zeo sensor, which is based on Electroencephalogram (EEG) sensor to detect sleep. EEG is an important modality in PSG. We find that HMM training-based approach is as much as 84% accurate. It is 15% more accurate as compared to Kushida's equation-based approach and 10% more accurate as compared to statistical method-based approach. In order to concisely represent the sleep quality of people, we model their sleep data using HMM. We present an analysis to find out a tradeoff between the amount of training data and the accuracy provided in the modeling of sleep. We find that six days of sleep data is sufficient for accurate modeling. We compare accuracy of our HMM training-based algorithm with a representative third party app SleepTime available from Google Play Store for Android. We find that the detection done using HMM approach is closer to that done by Zeo by 13% as compared to the third party Android application SleepTime. We show that our HMM training-based approach is efficient as it takes less than ten seconds to get executed on Moto G Android phone.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Degree based seed optimization to maximize information dissemination in social networks","authors":"Kundan Kandhway, J. Kuri","doi":"10.1109/COMSNETS.2015.7098713","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098713","url":null,"abstract":"We study the problem of optimal seed selection to maximize the fraction of individuals which has received a message in a social network. We have used the Susceptible-Infected (SI) process to model information epidemics. We formulate an optimization problem under a fixed budget constraint on the resource available to recruit individuals in the network to act as seeds, to achieve the above objective. The seeds are decided based on node degrees. This approach will work even when the exact adjacency matrix of the network is unknown and only degrees of the individuals in the network have been estimated. We study effect of the degree distribution of the network on the optimal seed selection strategy and present results for synthetic scale free and Erdös-Rényi networks, and a real scientific collaboration social network. The optimal strategy is compared with two heuristic strategies that (i) selects seeds uniformly among all degrees and (ii) selects highest degree nodes as seeds. Our results show that for a wide range of model parameters, targeting only the highest degree nodes is not optimal for various networks. This work may be of interest to advertisers and campaigners who are interested in spreading a message in a population connected via social networks.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133799970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rahul Majethia, Varun Mishra, P. Pathak, Divya Lohani, D. Acharya, Seema Sehrawat
{"title":"Contextual sensitivity of the ambient temperature sensor in Smartphones","authors":"Rahul Majethia, Varun Mishra, P. Pathak, Divya Lohani, D. Acharya, Seema Sehrawat","doi":"10.1109/COMSNETS.2015.7098674","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098674","url":null,"abstract":"Environmental monitoring using external and Smartphone-interfaced wireless sensors has been widely used in the past. The roadblocks start emerging when we use on-board sensors in off-the-shelf Smartphones to estimate context aware environmental parameters like ambient temperature, humidity and atmospheric pressure. In this work, we evaluate the sensitivity and accuracy of the on-board ambient temperature sensor under various circumstances and measure its performance against standardized weather monitoring equipment. Additionally, we identify the roles of several internal and external factors that affect the temperature data. Such an investigation is motivated by the need of pervasive temperature sensing to power Smart HVAC environments and for weather crowdsourcing. Our experiments reveal that while the on-board temperature sensors have great potential, using them for large scale data collection still requires significant work.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114496760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging contextual data for multifactor authentication in the mobile web","authors":"G. Mandyam, Mike Milikich","doi":"10.1109/COMSNETS.2015.7098728","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098728","url":null,"abstract":"Identify and authentication in the mobile web are important for many types of applications that benefit users, including payments. The mobile web today has several traditional approaches to authentication that allow for sensitive applications to take place. However, moving forward the use of contextual data can have a place in the area of authentication, Use of sensor information available on smartphones can provide information about user context that can serve either to augment existing authentication techniques or even provide additional authentication factors in their own right.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outage & diversity analysis of cooperative spectrum sharing protocol with decode-and-forward relaying","authors":"A. Vashistha, Shubha Sharma, V. Bohara","doi":"10.1109/COMSNETS.2015.7098688","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098688","url":null,"abstract":"In this paper, we analyze a two-phase hierarchical spectrum sharing protocol based on cooperative decode and forward relay transmission wherein it is assumed that the cognitive (i.e secondary) system is equipped with multiple antennas. The performance of the licensed (i.e. primary) as well as cognitive system is quantified by deriving the closed form expressions for outage probability. The theoretical and simulation results show that by exploiting multiple antennas at secondary transmitter (ST), we can drastically improve the performance of both primary and secondary systems as compared to conventional spectrum sharing schemes.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132451984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategies for traffic signal control in Indian cities","authors":"Gitakrishnan Ramadurai","doi":"10.1109/COMSNETS.2015.7098735","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098735","url":null,"abstract":"Most Indian cities face oversaturated flow conditions during peak periods. In this paper we revisit the traffic signal control to improve urban network performance. Three novel strategies that address congested heterogeneous traffic flow are presented. The first two strategies - keeping intersection signal cycle times shorter and bottleneck metering - are derived from field observed data while the third - exclusive lanes and storage area near intersections for two wheelers - is supported based on a micro-simulation model. Potential improvements are presented based on the strategies. While most recent studies have focused on area wide / network signal control improvements our study shows potential for significant improvement even at the level of an isolated signal.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115317435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naman Mishra, A. Chaurasia, Arun Kallavi, B. Raman, Purushottam Kulkarni
{"title":"Usage of 802.11n in practice: A measurement study","authors":"Naman Mishra, A. Chaurasia, Arun Kallavi, B. Raman, Purushottam Kulkarni","doi":"10.1109/COMSNETS.2015.7098700","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098700","url":null,"abstract":"IEEE 802.11n offers several throughput enhancing features over its predecessor 802.11a/g. The two main features at the PHY layer are: MIMO and channel bonding, while the main throughput enhancing feature at the MAC/link layer is Frame Aggregation. While in theory, as well as in controlled experimental conditions, these features achieve throughput enhancements, the extent to which they are useful for in-the-wild deployments has not been studied thus far. This paper presents measurements from three sets of traces: one from a research conference, one from a busy airport, and the third from a dense classroom setting with extensive WiFi usage for classroom activities. Our findings are as follows: (a) the high data rates of 802.11n are not used substantially, although the presence of moderate rates is significant, (b) the use of the channel bonding feature is minimal in dense deployments, and (c) the percentage of bytes undergoing frame aggregation is considerable but the levels of aggregation are not very high. We also undertake controlled experiments which shed light on non-wireless, system bottlenecks. Specifically, we find that many clients are not equipped to handle high levels of frame aggregation. Worse, this interacts badly with the rate adaptation algorithm, significantly lowering the data rates being used. These issues need careful addressing before 802.11n features are used effectively.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115622618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Paul, Vickey Kumar, Prasenjit Choudhury, S. Nandi
{"title":"Temporal analysis of author ranking using citation-collaboration network","authors":"P. Paul, Vickey Kumar, Prasenjit Choudhury, S. Nandi","doi":"10.1109/COMSNETS.2015.7098737","DOIUrl":"https://doi.org/10.1109/COMSNETS.2015.7098737","url":null,"abstract":"Automated author ranking mechanism in a given research domain has key applications like automatic faculty selection in an institution, selection of outstanding researcher in a particular research domain, selection of domain experts for reviewing articles or project proposals, etc. The advantage of automated mechanism is that it is transparent and free from personal intervention. On the other hand, temporal analysis of author ranking has importance in the issues like selection of candidates for project grants, selection for life-time achievement awards, etc. This being an era of shared authorship in scientific articles, finding exact contribution of an author in a field is always a challenge. In our present work, we propose a modified pagerank-based author ranking algorithm that may identify the exact contribution of a researcher in terms coauthorship scores and paper citation scores in the research field he/she is working, and validate them using H-index, an already well accepted author ranking strategy, with the help of DBLP data set. In addition, we perform a comparative analysis of the change in author ranking for different part of author spectrum over time.","PeriodicalId":277593,"journal":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115065238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}