Shayan Mehrazarin, Bin Tang, Ken Leyba, Jianchao Han, M. Beheshti
{"title":"A MacBook based earthquake early warning system","authors":"Shayan Mehrazarin, Bin Tang, Ken Leyba, Jianchao Han, M. Beheshti","doi":"10.1109/INFCOMW.2016.7562237","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562237","url":null,"abstract":"We demonstrate an early stage of our prototypical development of an earthquake early warning system based on Apple's MacBook computers. This system, called MacSeisApp, utilizes the Sudden Motion Sensors in MacBooks to detect seismic activities. It is inspired by an existing application called SeisMac, which turns a MacBook computer into a seismograph. MacSeisApp expands on SeisMac by using Apple's Push Notifications (APN) via a dedicated server for earthquake notification. Written in both the C and Objective-C under XCode Integrated Developer Environment (IDE), MacSeisApp utilizes an open-source library to detect the vibrations via the Sudden Motion Sensor and to translate it into points to be plotted as a seismograph.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem","authors":"Hsing-Chung Chen, Heri Wijayanto, Chia-Hui Chang, Fang-Yie Leu, Kangbin Yim","doi":"10.1109/INFCOMW.2016.7562224","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562224","url":null,"abstract":"The Mobile Instant Messaging Service (MIMS) is a popular feature on mobile communication devices today. It is a powerful and cheap facility to send and to receive messages through a handheld portable tool. Currently, many MIMS applications are available to support humans' activities in their everyday life. However, the security of this service needs to be increased for further applications such as a more friendly and easily approach on secure mobile transactions and personal health assistance. In this paper, we propose a new simple cryptography scheme for MIMS that is based on the Diffie-Hellman Key Exchange and Pseudo One Time Pad encryption. This scheme is designed for mobile devices that have limitations because of small memory and a low-speed processor. Furthermore, it extends the security level of the previous schemes which are Crypt21 and RTC-MTT.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129595699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal path selection in multi-RAT wireless networks","authors":"S. Borst, A. O. Kaya, D. Calin, H. Viswanathan","doi":"10.1109/INFCOMW.2016.7562145","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562145","url":null,"abstract":"Optimal path selection is of critical importance in exploiting the collective transmission resources from heterogeneous Radio Access Technologies (RATs) in emerging 5G networks and delivering excellent user performance. In the present paper we propose the `best-rate' path selection algorithm for a multi-RAT scenario with various types of traffic flows. We demonstrate that the rates received by the various flows under the best-rate algorithm, in conjunction with local fair resource sharing at the individual access points, are close to globally Proportional Fair. Extensive simulations confirm that the proposed algorithm outperforms various baseline policies in terms of user-perceived throughput.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification encryption via compressed permuted measurement matrices","authors":"Dimitris Milioris","doi":"10.1109/INFCOMW.2016.7562124","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562124","url":null,"abstract":"In this paper we present an efficient encryption system based on Compressive Sensing for topic detection and classification in Twitter. The proposed method first employs Joint Complexity to perform topic detection. Then based on the spatial nature of the data, we apply the theory of Compressive Sensing to perform classification from a small number of random sample measurements. The breakthrough of the method is the encryption based on the permutation of measurements which are generated when solving the classification optimization problem. The experimental evaluation with real data from Twitter presents the robustness of the encryption accuracy, without using a specific cryptographic layer, while maintaining a low computational complexity.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using typing pattern to save energy: Adaptive notification mechanism in MIM APPs","authors":"Yan Pan, Shining Li, Xianjin Xia, Zhigang Li, Zhe Yang, Yu Zhang, Junwei Li, Mingfei Wei, Jingyu Zhang","doi":"10.1109/INFCOMW.2016.7562266","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562266","url":null,"abstract":"Typing notification of instant messaging APPs improves user experience during online chatting. However, frequent notification leads to high energy consumption of mobile devices. In this paper, we study the trade-off between the frequency of typing notifications for user experience and communication energy saving of mobile device. We propose adaptive typing notification mechanisms, which exploit user's typing pattern and the current network conditions to adjust notification intervals. Simulation results demonstrate the proposed schemes can significantly save energy while improving user experience.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Networks: Cross-layer optimization performance","authors":"S. Basloom, N. Adra, G. Aldabbagh","doi":"10.1109/INFCOMW.2016.7562217","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562217","url":null,"abstract":"The number of cluster heads (CH) has significant effects on the way in which the network performs, the connectivity it achieves, and the constricting cost. Hence, the selection of a suitable number of cluster head nodes represents a form of an optimization problem. The cross-layer optimization technique is considered in this paper, to select the best number of CH nodes. Cross-layer optimization studies multi-objectives parameter from different layers to find the optimal number of CHs such as transmission power, available resources, and link Interference. Three layers are considered in this paper, the network, MAC and Physical layers. The simulation results show that the proposed algorithm can save the energy consumption by 70% and increase the network connectivity up to 60% for the optimum number of cluster heads.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131688930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Morsey, A. Willner, R. Loughnane, Mary Giatili, C. Papagianni, I. Baldin, P. Grosso, Yahya Al-Hazmi
{"title":"DBcloud: Semantic Dataset for the cloud","authors":"M. Morsey, A. Willner, R. Loughnane, Mary Giatili, C. Papagianni, I. Baldin, P. Grosso, Yahya Al-Hazmi","doi":"10.1109/INFCOMW.2016.7562073","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562073","url":null,"abstract":"In cloud environments, the process of matching requests from users with the available computing resources is a challenging task. This is even more complex in federated environments, where multiple providers cooperate to offer enhanced services, suitable for distributed applications. In order to resolve these issues, a powerful modeling methodology can be adopted to facilitate expressing both the request and the available computing resources. This, in turn, leads to an effective matching between the request and the provisioned resources. For this purpose, the Open-Multinet ontologies were developed, which leverage the expressive power of Semantic Web technologies to describe infrastructure components and services. These ontologies have been adopted in a number of federated testbeds. In this article, DBcloud is presented, a system that provides access to Open-Multinet open data via endpoints. DBcloud can be used to simplify the process of discovery and provisioning of cloud resources and services.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A block ACK transmission scheme for reliable multicast in IEEE 802.11 WLANs","authors":"Seungho Ryu, Woo-Jae Kim, Young-Joo Suh","doi":"10.1109/INFCOMW.2016.7562223","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562223","url":null,"abstract":"Multicast over wireless medium is considered for multimedia service such as YouTube and NetFlix. However, the multicast frames are sent in a low data rate without the feedback in IEEE 802.11. The low data rate of multicast causes performance anomaly problem. In this paper, we propose a feedback overhead reduction scheme to guarantee the reliable multicast, and to sustain the high throughput in recent IEEE 802.11. In our proposed scheme, multicast members send acknowledgement frames when they miss data frames. Multicast data frames are retransmitted according to the acknowledgment. The attempt to shrink the overhead for the feedback allows the opportunity to transmit more data. In simulations, our proposed scheme alleviates the degradation of the network throughput according to the increase of the multicast group size.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Millimeter-wave blind spots: Mitigating deafness collisions using frame aggregation","authors":"Adrian Loch, Gek Hong Sim","doi":"10.1109/INFCOMW.2016.7562064","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562064","url":null,"abstract":"Multi-gigabit-per-second data rates in millimeter-wave networks can result in an excessive amount of channel accesses. Transmitting a single packet at such rates often only requires a few microseconds. In contrast, the medium access control (MAC) overhead is about 20× larger. This is particularly harmful if one or more nodes are deaf due to the use of directional antennas. Deaf nodes cannot overhear ongoing transmissions, and thus cause a high number of collisions, exacerbating MAC overhead even more. In addition, the contention window of deaf nodes becomes very large since their transmissions often fail, resulting in unfairness. To mitigate this issue, we suggest increasing traffic burstiness deliberately to allow for higher frame aggregation at the physical layer. This reduces the number of medium accesses, and thus decreases the probability of collision in case of deafness. We adapt existing theoretical models to our scenario to show the effectiveness of this strategy. Moreover, we validate our scheme in a practical testbed operating in the 60 GHz band. In particular, our evaluation shows that our strategy improves fairness by 20% and throughput by 66% compared to a system that does not exploit deliberate burstiness.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized name-based security for content distribution using blockchains","authors":"N. Fotiou, George C. Polyzos","doi":"10.1109/INFCOMW.2016.7562112","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562112","url":null,"abstract":"User, content, and device names as a security primitive have been an attractive approach especially in the context of Information-Centric Networking (ICN) architectures. We leverage Hierarchical Identity Based Encryption (HIBE) to build (content) name-based security mechanisms used for securely distributing content. In contrast to similar approaches, in our system each user maintains his own Private Key Generator used for generating the master secret key and the public system parameters required by the HIBE algorithm. This way our system does not suffer from the key escrow problem, which is inherent in many similar solutions. In order to disseminate the system parameters of a content owner in a fully distributed way, we use blockchains, a distributed, community managed, global list of transactions.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116128699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}