{"title":"Analysis of MAC Protocols for Real-Time Monitoring of Heart and Respiratory Signals","authors":"Negar Mohammadi-Koushki, A. Gawanmeh","doi":"10.1109/LCNW.2018.8628524","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628524","url":null,"abstract":"Wireless sensor networks have several appealing medical applications. The deployment of wireless technologies in the medical field imposes several considerations on the choice of communication methods, protocols, wireless technologies, and type of devices. One of the most challenging problems is the choice of the best medium access control protocol in order to resolve problems such as the correlation of traffic, heavy collisions, and free channel recognition. Real-Time monitoring of heart and respiratory signals has gained increasing attention in the last few decades, as there is more interest in continuous monitoring of heart activity which can significantly improve early detection of heart problems. This paper suggests a Multi Attribute Decision Making (MADM) methodology [1], [2] in order to study, analyze and recommend the most optimum protocol for the purpose of heart monitoring. The aim of this approach is to rank existing alternatives, according to several attributes that are often inconsistent.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Bounds of Secondary User's Transmission Under Fading Channel","authors":"Jun Zheng, Li Yu","doi":"10.1109/LCNW.2018.8628604","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628604","url":null,"abstract":"Cognitive radio (CR) is a promising technology to improve the spectrum utilization in that it allows secondary users (SUs) to transmit over the spectrum holes by spectrum sensing. Though the SUs are with low priority to access to the channel, the QoS guarantees are critical for their transmissions. In this paper, we construct a cross-layer based model to analyze the performance bounds for SUs, by which we investigate how different factors jointly influence the transmission of SUs, including PU activity, number of SUs and channel fading, etc. To this end, the stochastic network calculus is employed as a basic tool, where impairment process is introduced to construct the service process for SUs. Then, the delay bound and throughput bound are derived for given arrival process. Numerical results demonstrate that PU activity has a dominant impact on the performance of the transmission for SUs.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124637911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hakan Yekta Yatbaz, Berkem Cinar, Ali Gokdemir, E. Ever, F. Al-turjman, H. Nguyen, A. Yazıcı
{"title":"Hybrid Approach for Disaster Recovery using P2P Communications in Android","authors":"Hakan Yekta Yatbaz, Berkem Cinar, Ali Gokdemir, E. Ever, F. Al-turjman, H. Nguyen, A. Yazıcı","doi":"10.1109/LCNW.2018.8628555","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628555","url":null,"abstract":"Disaster recovery and rescuing are challenging tasks due to the unknown parameters related with the victims in disastrous situations. Existing surveillance systems have a degree of efficiency to inform the people through the use of various communication channels about disasters and their area of effect. However, the obscureness of the rescuing process has not been resolved in desirable levels, especially for the cases where the communication infrastructure can also be heavily damaged. Thanks to the prevalent use of mobile devices installed with variety of sensors, it is possible to aid the rescue process using the mobile hand sets. In this study, a framework which focuses on reducing the time spent to locate possible victims in a disastrous situation and to expedite the medical help is presented. For this purpose a system which introduces a proactive approach using Android, WiFi P2P technology, and local/central location database synchronization is proposed. In short, the system obtains the location of the users with fixed intervals to store in both local and centralized database for authorities to query for necessary information. The information related with the neighbouring mobile devices within a specific coverage area is also stored for the cases where only some of the devices are reachable due to disasters. With these features, it is possible to consider the system as a hybrid one where both reactive and proactive approaches are employed in order to reach the most up-to-date information available. This way, the probability of reaching up-to-date information about potential victims with no connection due to damaged infrastructure is increased, since each mobile node has information about the stations within its coverage area. In addition, the emergency medical information of the user are collected via a mobile application to accelerate the medical support time. Even though the system is designed to be used in any kind of disastrous situations, the case study included in this paper is for earthquakes only. Briefly, we developed a system that can enhance the rescuing and provide fast medical support by making use of the advancements in both mobile and wireless communication technologies.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Zainal Abedin, K. Siddiquee, M. S. Bhuyan, Razuan Karim, Mohammad Shahadat Hossain, K. Andersson
{"title":"Performance Analysis of Anomaly Based Network Intrusion Detection Systems","authors":"Md. Zainal Abedin, K. Siddiquee, M. S. Bhuyan, Razuan Karim, Mohammad Shahadat Hossain, K. Andersson","doi":"10.1109/LCNW.2018.8628599","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628599","url":null,"abstract":"Because of the increased popularity and fast expansion of the Internet as well as Internet of things, networks are growing rapidly in every corner of the society. As a result, huge amount of data is travelling across the computer networks that lead to the vulnerability of data integrity, confidentiality and reliability. So, network security is a burning issue to keep the integrity of systems and data. The traditional security guards such as firewalls with access control lists are not anymore enough to secure systems. To address the drawbacks of traditional Intrusion Detection Systems (IDSs), artificial intelligence and machine learning based models open up new opportunity to classify abnormal traffic as anomaly with a self-learning capability. Many supervised learning models have been adopted to detect anomaly from networks traffic. In quest to select a good learning model in terms of precision, recall, area under receiver operating curve, accuracy, F -score and model built time, this paper illustrates the performance comparison between Naive Bayes, Multilayer Perceptron, J48, Naive Bayes Tree, and Random Forest classification models. These models are trained and tested on three subsets of features derived from the original benchmark network intrusion detection dataset, NSL-KDD. The three subsets are derived by applying different attributes evaluator's algorithms. The simulation is carried out by using the WEKA data mining tool.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Packet Dropping and Decoding Statistics for Linear Network Coded Broadcast with Feedback","authors":"Sovanjyoti Giri, R. Roy","doi":"10.1109/LCNW.2018.8628590","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628590","url":null,"abstract":"Exploitation of the benefit of feedback in network coded multicast or broadcast is a well-investigated technique, whose purpose is to make the system more robust to loss. In such scenario, the drop when seen algorithm reduces the expected queue length at sender while maintaining throughput optimality of encoding scheme. In this work, we study a broadcasting system where the transmitter is sending data packets of a generation, using drop when seen strategy, to a set of receivers of finite buffer length over packet erasure channels with full feedback. We develop an n-dimensional Markov chain-based model that enables us to compute the probability of dropping a packet (which is currently being transmitted) from sender queue at the end of a particular time slot. Further, by proposing the idea of first time dropping, we map the n-dimensional dynamics to a simple one-dimensional model. This simplified framework is used to find expected time to drop a packet from the sender queue. It also provides an opportunity to study decoding statistics of stored packets in receivers' buffer. We analyze three different decoding options namely, arbitrary single receiver decoding, leader decoding, worst follower decoding, and compare them.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome Message from the 5G-IoT Chairs","authors":"","doi":"10.1109/lcnw.2018.8628480","DOIUrl":"https://doi.org/10.1109/lcnw.2018.8628480","url":null,"abstract":"","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131371455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara A. Elsayed, Sherin Abdel Hamid, A. M. Nagib, H. Hassanein
{"title":"Tracking-based Cooperative Caching in VANETs for Social Networking","authors":"Sara A. Elsayed, Sherin Abdel Hamid, A. M. Nagib, H. Hassanein","doi":"10.1109/LCNW.2018.8628526","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628526","url":null,"abstract":"Social media traffic is the predominant source of Internet traffic. Such traffic is primarily facilitated by mobile devices. As a result, mobile users tend to sustain high cellular costs. To alleviate such costs, we endeavor to allow social media users to depend more on vehicular rather than cellular networks for data access. However, this can be thwarted by the high delay and low packet delivery ratio often coupled with content access from distant data providers in vehicular networks. Hence, we strive to get the data closer to the requester by proposing the Cooperative Content Discovery and Placement at Vehicles (CCDPV) scheme. In CCDPV, we dynamically discover closer replicas to the requester using parked and moving vehicles. In particular, we utilize the last encounter information, as well as the static and mobile nature of parked and moving vehicles, respectively, to diffuse cached content information, track caching nodes, and dynamically locate closer caching nodes to the requester. CCDPV applies cooperative cache placement at both parked and moving vehicles. It caches data at parked vehicles located in congested road segments to cater for the higher possibility of requests occurring at them. CCDPV caches data at moving vehicles while taking data diversity relative to the vehicles direction of movement into consideration. Performance evaluation shows that CCDPV significantly improves delay, packet delivery ratio, and cache hit ratio compared to a caching scheme in vehicular networks that has some implicit cooperative features, as well as to a tracking-based cooperative cache discovery scheme in mobile ad hoc networks.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"17 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LCN 2018 Organizing and Program Committee","authors":"","doi":"10.1109/lcnw.2018.8628504","DOIUrl":"https://doi.org/10.1109/lcnw.2018.8628504","url":null,"abstract":"","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Paving the Way for Connected Cars with Adaptive AUTOSAR and AGL","authors":"S. Aust","doi":"10.1109/LCNW.2018.8628558","DOIUrl":"https://doi.org/10.1109/LCNW.2018.8628558","url":null,"abstract":"Connected vehicles offer new business models and improved user experiences. Car manufacturers are aiming to equip their vehicles with software modules and to keep them up-to-date with new services. To ease the process of maintaining the vehicle functions and to offer basic software components over the vehicle's life-cycle the AUTOSAR (AUTomotive Open System ARchitecture) consortium started to standardize basic core functions for vehicle's Electronic Control Units (ECUs) as classic AUTOSAR real-time operating system (RTOS). However, the ever increasing user expectations require that software platforms follow recent developments in software architecture and the AUTOSAR consortium started with the design of an adaptive platform solution that is directed towards future developments. Adaptive AUTOSAR offers software components that will make it easier to deploy a standardized platform for connected cars. A missing component in adaptive AUTOSAR is the specification of a Graphical User Interface (GUI) that is required to design In-vehicle Infotainment (IVI) systems. Automotive Grade Linux (AGL) provides such appealing GUIs and is open source. In this paper, the new concept of adaptive AUTOSAR will be introduced and recent design architectures are outlined. Further, the combination of adaptive AUTOSAR and AGL are motivated to design a proof-of-concept (PoC) that is efficient to use for further performance evaluation of the software components of each software platform.","PeriodicalId":318712,"journal":{"name":"2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124530982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}