{"title":"A scheme to reduce merging collisions in TDMA-based VANETs","authors":"Jeng-Ji Huang, Yu-Shiang Chiu","doi":"10.1109/ISWPC.2013.6707435","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707435","url":null,"abstract":"It is well known that a time division multiple access (TDMA)-based medium access control (MAC) is advantageous in many aspects in vehicular ad hoc networks (VANETs). These include its ability to prevent the hidden-terminal problem, and the guarantee of strict quality-of-service (QoS) for providing real-time applications. However, time slot assignments to vehicles could suffer from an unstable problem, called merging collisions. This problem is due mainly to the changing network topology of a VANET, which can be characterized by vehicles joining into or leaving from a cluster of vehicles. In this paper, we focus on the problem of unstable time slot assignments facing several existing TDMA approaches, and a scheme is proposed to effectively alleviate this problem.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeng-Ji Huang, Ting-Han Kuo, Tzu-Han Chen, Chen-Ju Yang
{"title":"QoS control over the power saving in 3GPP LTE advanced wireless networks","authors":"Jeng-Ji Huang, Ting-Han Kuo, Tzu-Han Chen, Chen-Ju Yang","doi":"10.1109/ISWPC.2013.6707436","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707436","url":null,"abstract":"The power saving operation, called discontinuous reception (DRX), in Third-Generation Partnership Project (3GPP) Long-Term Evolution Advanced (LTE Advanced) has recently been discussed in many studies. However, most of them focus only on the first moments, i.e. means, of interested performance metrics such as power-saving factor, transmission delay, etc. In order to gain full quality of service (QoS) control for real-time applications, it is imperative to obtain the distribution function of, in particular, the transmission delay. Thus, in this paper, extensive simulations are performed to examine the effects of various DRX parameters on the distribution function of the transmission delay.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116468589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polynomial time approximation scheme for t-latency bounded information propagation problem in heterogeneous wireless networks","authors":"R. Rafiq, R. Farhan, M. S. Rahman","doi":"10.1109/ISWPC.2013.6707432","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707432","url":null,"abstract":"In a network sometimes we need to propagate information within a given time period t, which is called t-latency. Any node that accepts information from the other nodes will start transmitting that information if it satisfies the required conditions of the protocol that is in use. In a t-latency bounded information propagation problem, we need to find a minimal set of nodes that will start to transmit information initially so that the whole set of nodes can start transmitting within the given time period, t. In this paper we provide an approximation scheme for a t-latency bounded information propagation problem in heterogeneous wireless networks and we are the first to propose such scheme. We also derive the approximation ratio of our scheme and show that the ratio is bounded by a factor ε which is constant for a particular network.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121832316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient TDMA based virtual back off algorithm for adaptive data dissemination in VANETs","authors":"Amit Dua, Neeraj Kumar, S. Bawa, N. Chilamkurti","doi":"10.1109/ISWPC.2013.6707447","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707447","url":null,"abstract":"With an exponential growth of Internet related technologies, there is an emergence of new class of efficient data dissemination using Vehicular Ad Hoc networks for the safety of peoples. As there are limited number of channels in IEEE 802.11 a/b/g/p standards, so efficient mechanisms are required to allocate the same for new incoming requests from the users. Keeping in view of the same, we propose a modified TDMA based virtual back off algorithm for VANETs. Vehicles are assumed to be arrived using Poisson distribution and served as exponential. By varying the distance from RSUs, we have provided the analysis of end-to end delay for varying speed of vehicles.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122760877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Sybil attacks in participatory sensing using Cloud based Trust Management System","authors":"Shih-Hao Chang, Yeong-Sheng Chen, Shin-Ming Cheng","doi":"10.1109/ISWPC.2013.6707448","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707448","url":null,"abstract":"Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. Different from other participatory sensing application challenges who consider user privacy and data trustworthiness, we consider network trustworthiness problem namely Sybil attacks in participatory sensing. Sybil attacks focus on creating multiple online user identities called Sybil identities and try to achieve malicious results through these identities. In this paper, we proposed a Cloud based Trust Management Scheme (CbTMS) framework for detecting Sybil attacks in participatory sensing network. Our CbTMS was proposed for performing Sybil attack characteristic check and trustworthiness management system to verify coverage nodes in the participatory sensing. To verify the proposed framework, we are currently developing the proposed scheme on OMNeT++ network simulator in multiple scenarios to achieve Sybil identities detection in our simulation environment.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishing secured communications in cluster based wireless sensor networks","authors":"Q. Mamun, M. Islam, M. Kaosar","doi":"10.1109/ISWPC.2013.6707426","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707426","url":null,"abstract":"The security of wireless sensor networks (WSNs) is a big challenge due to their resource-constraint nature. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present a secured key management scheme adopted on cluster based topology of sensor network. The proposed scheme uses partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. The scheme outperforms other random key pre-distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal spectrum sensing framework with interference constraint in cognitive radio networks","authors":"Hyuk Wu, Dong-Jun Lee, Changtaek Shin","doi":"10.1109/ISWPC.2013.6707442","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707442","url":null,"abstract":"In cognitive radio networks, several research works on optimal spectrum sensing framework have addressed maximization of throughput of secondary users under constraints on interference incurred to primary user signal. When a plausible statistical modeling of primary user signal is given, the amount of interference to primary user signal can be estimated and used to produce the optimal spectrum sensing and data transmission time. However, previous works on this area have some flaws in the modeling of interference to primary user signal. In this study we apply more accurate modeling of primary user signal to the spectrum sensing framework. Our method uses Chapman-Kolmogorov equation to model the behavior of primary user signal in a certain instant and derive the optimal spectrum sensing framework. Numerical results show that the proposed method results in higher throughput of secondary users than previous methods.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chih-Chiang Kuo, Jyun-Naih Lin, S. Wu, Cheng-Hsuan Cho, Yi-Hong Chu, F. C. Tsai
{"title":"An in-vehicle communication scheme for multi-system integration","authors":"Chih-Chiang Kuo, Jyun-Naih Lin, S. Wu, Cheng-Hsuan Cho, Yi-Hong Chu, F. C. Tsai","doi":"10.1109/ISWPC.2013.6707427","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707427","url":null,"abstract":"With more and more devices being introduced into vehicles to provide additional driving functionality, driving experience is seemingly getting more complex and frustrated due to an influx of individual messages. To help manage the information, we need a mechanism to orchestrate the operations of the in-vehicle devices so that such frustration can be eased. In this study, we propose an in-vehicle communication scheme for multi-system integration, where an effective system service discovery protocol is used. This proposed design also contains mutual communication methods and the data exchange methodologies for system integration. Experimental results with data analysis demonstrate the success of the proposed design.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A RFID QoS mechanism for IoT tracking applications","authors":"Rafael Perazzo Barbosa Mota, D. Batista","doi":"10.1109/ISWPC.2013.6707429","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707429","url":null,"abstract":"In this paper, we propose a mechanism that reduces useless responses for RFID systems in the Internet of Things (IoT) environment, for tracking applications. The mechanism achieves its objectives by reducing the number of packets exchanged between readers and tags. We analyze the behavior of our proposal by considering the average number of identification rounds. With extensive simulations using an RFID module for the ns-2 simulator, we show the benefit of the proposed mechanism. When compared to the Pure Q Algorithm and Binary Tree Slotted Aloha, our mechanism reduces the number of packets up to 43%, which is a good result in terms of performance of IoT applications and energy consumption of the devices used in the communications.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129917800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance comparison of collision resolution algorithms with amount of feedback information","authors":"N. Wattanamongkhol","doi":"10.1109/ISWPC.2013.6707439","DOIUrl":"https://doi.org/10.1109/ISWPC.2013.6707439","url":null,"abstract":"This paper presents the performance comparison of eight collision resolution algorithms. It can be systematically applied for random access protocols under different feedback information which includes binary, ternary and feedback of the number of accessing packets. Each algorithm is derived from the combination of uniform selection algorithm and three effective strategies, including splitting, adaptive frame size, and skipped slot. This paper aims to investigate which one strategy in these three strategies is the best effective to improve the system performance. Based on simulation results, when the information about number of accessing packets is available, significant improvement in mean access delay can be achieved. We found that the splitting strategy is the most effective strategy, following by adaptive frame size and skipped slot.","PeriodicalId":301015,"journal":{"name":"International Symposium on Wireless and pervasive Computing (ISWPC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130172265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}