{"title":"Privacy-Preserving Large-Scale Location Monitoring Using Bluetooth Low Energy","authors":"Zhuo Chen, Haibo Hu, Jielin Yu","doi":"10.1109/MSN.2015.38","DOIUrl":"https://doi.org/10.1109/MSN.2015.38","url":null,"abstract":"Wearable devices such as smart watch and bracelets continually broadcast Bluetooth Low Energy (BLE) signals, which can be easily captured by monitoring devices such as WiFi routers and Bluetooth scanners. As more and more wearable devices emerge, unauthorized monitoring and tracking by adversary becomes great privacy threats not only in the cyberworld, but also in the physical world. To protect location privacy, this paper presents a real-life location monitoring system that is based on BLE privacy feature that changes the device physical address periodically. To enable users to better control their privacy level while still providing monitoring and tracking service to authorized parties (e.g., for child and elderly care), we extend BLE privacy by enriching its privacy semantics with a comprehensive set of metrics, such as simple opt-in/out, k-anonymity, and granularity-based anonymity. The system has been implemented and evaluated in terms of accuracy and user study.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123210252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lixin Wang, W. Washington, Katrina Gilmore, Chuang Liu
{"title":"Impact of Radio Irregularities on Connectivity of Wireless Networks with Log-Normal Shadowing","authors":"Lixin Wang, W. Washington, Katrina Gilmore, Chuang Liu","doi":"10.1109/MSN.2015.23","DOIUrl":"https://doi.org/10.1109/MSN.2015.23","url":null,"abstract":"To better understand connectivity of multihop wireless networks with the log-normal shadowing, we study the impact of radio irregularities on network connectivity under such a realistic shadowing model. Existing results indicate that connectivity increases when the radio propagation becomes more irregular. But all of these results were only based on simulation studies or the assumption that the important boundary effect is ignored to avoid the challenging technical analysis. Therefore, they can hardly be applied to any practical wireless networks. It is extremely challenging to take the complicated boundary effect into consideration under such a realistic model because the transmission area of each node is an irregular region other than a circular area. In this paper, we assume the wireless nodes are represented by a Poisson point process with density n over a unit-area disk. With the boundary effect taken into consideration, we prove analytically that network connectivity increases when the radio propagation becomes more irregular (i.e., the shadowing deviation increases) under such a realistic shadowing model.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123417760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenhua Duan, Yujiang Hui, Cong Tian, N. Zhang, Bohu Huang
{"title":"A Self-ORganizing Trust Model Based on HP2P","authors":"Zhenhua Duan, Yujiang Hui, Cong Tian, N. Zhang, Bohu Huang","doi":"10.1109/MSN.2015.34","DOIUrl":"https://doi.org/10.1109/MSN.2015.34","url":null,"abstract":"Peer-to-Peer(P2P) reputation systems are essential to evaluate the trustworthiness of the nodes in a P2P system. This paper presents a distributed algorithm HP2PSORT based on SORT that enables a node to estimate the trustworthiness of other nodes based on the past interactions and recommendations. In an HP2P network, by using the filtering mechanism, the calculation method of the service trust and the dynamic calculation of the threshold value, we show that HP2PSORT outperforms SORT.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Resource Allocation of Gateways for Packet Transmission in Cyber-Physical Systems","authors":"Hao Wang, Jianzhong Li, Hong Gao","doi":"10.1109/MSN.2015.25","DOIUrl":"https://doi.org/10.1109/MSN.2015.25","url":null,"abstract":"Cyber-Physical System is an integration of physical world and digital world, and widely used by industries and daily life. With the development of wireless communication technology, different wireless technologies suitable for variety situations have been adopted by Cyber-Physical System. It is ubiquitous that equipment with different types of wireless technologies cooperates with each other. We call the wireless network composed of different wireless communication technologies the hybrid wireless communication network. Devices with different kinds of wireless technologies cannot communicate with each other directly, so gateways are needed. In this paper, we propose a dynamic gateway bandwidth allocation algorithm, in order to improve the performance of hybrid wireless network. Simulation results have shown that this algorithm leads to excellent performance.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132637763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Improvement with Lifetime Planning in Wireless Sensor Networks","authors":"Mohamed Abdelaal, Peilin Zhang, Oliver E. Theel","doi":"10.1109/MSN.2015.13","DOIUrl":"https://doi.org/10.1109/MSN.2015.13","url":null,"abstract":"Energy efficiency is an important goal for Wireless Sensor Network (WSN) designers. However, successful implementations of such networks are highly dependent on the enabling technologies, as well as on the provisioning of Quality of Service (QoS) in the network. In this paper, we propose a novel strategy, referred to as the lifetime planning for achieving best-effort QoS. Simultaneously, an adequate lifetime required to complete the assigned task is reached. The core idea is to sidestep lifetime maximization strategies in which sensor nodes continue functioning even after the fulfillment of the required task. In these cases, we could deliberately bound the operational lifetime to the expected task lifetime. As a result, more energy can be spent throughout the entire task lifetime for enhancing the provided service qualities. An analytical QoS model is engineered to validate the QoS's \"conflicts-free\" nature of lifetime planning. The proposed strategy is feasible via the design of QoS boundaries at design-time. During run-time, the controllable parameters are modulated by a proactive adaptation mechanism. To demonstrate the effectiveness of our design, we conduct an intensive performance evaluation using an office monitoring scenario in a cluster-tree WSN topology. The scenario has been designed in the Contiki network simulator Cooja using Tmote sky motes. Furthermore, we examine the profit of adopting our strategy relative to fixed heuristics and blind adaptation.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Layer Design for Energy-Efficient Reliable Routing in Wireless Sensor Networks","authors":"Yongrui Chen, Li Gao, Yulong Xing, Weidong Yi","doi":"10.1109/MSN.2015.44","DOIUrl":"https://doi.org/10.1109/MSN.2015.44","url":null,"abstract":"Delivering sensed data to the sink reliably in wireless sensor networks (WSN) calls for a Delivering sensed data to the sink reliably in wireless sensor networks (WSN) calls for a scalable, energy-efficient, and error-resilient routing solution. In this paper, a distributed energy-efficient and reliable routing protocol is proposed using cross-layer design techniques, by jointly considering the routing algorithm in network layer and the power control policy in physical layer. Based on the analysis of how to construct a minimum-power route with the end-to-end reliability constraint in WSN, a distributed cross-layer routing protocol with adaptive transmission power control (DRPC) is proposed. Evaluation results show that our strategy performs better than other routing algorithms in terms of energy efficiency as well as reliability.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116696336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhijian He, Yanming Chen, Zhaoyan Shen, Enyan Huang, Shuai Li, Z. Shao, Qixin Wang
{"title":"Ard-mu-Copter: A Simple Open Source Quadcopter Platform","authors":"Zhijian He, Yanming Chen, Zhaoyan Shen, Enyan Huang, Shuai Li, Z. Shao, Qixin Wang","doi":"10.1109/MSN.2015.9","DOIUrl":"https://doi.org/10.1109/MSN.2015.9","url":null,"abstract":"With the emergence of many commercial-off-the-shelf (COTS) and/or open-source hardware and software, we can now build cheap Unmanned Aerial Vehicles (UAVs). This will enable a broad spectrum of potential UAV based mobile applications. In this work, we propose a simple open UAV platform: Ard-μ-copter. Ard-μ-copter is a quadcopter built upon the open source ArduPilot [1] infrastructure library and hardware. Comparing to the many existing commercial quadcopters platforms and open source quadcopter platforms, Ard-μ-copter platform is fully open source, simple (i.e. what the \"μ\" stands for), and with good documentations.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Detection for Medical Body Sensor Networks Under Bayesian Network Model","authors":"Haibin Zhang, Jiajia Liu, Rong Li","doi":"10.1109/MSN.2015.21","DOIUrl":"https://doi.org/10.1109/MSN.2015.21","url":null,"abstract":"We propose a Bayesian network based method for the fault diagnosis problem of medical body sensor networks used to collect physiological signs to monitor the health of patients. We formalize a Bayesian network to describe the body sensor network considering both the spatial and temporal correlation in measurements at different sensors. Then we give the theoretical analysis of the fault detection, false alarm of this method, and the error probability after executing the fault diagnosis algorithm. Finally, Experiments carried out on synthetic medical datasets by injecting faults into real medical datasets show that the simulation performance matches the theoretical analysis closely, and the proposed approach possesses a good detection accuracy with a low false alarm rate.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114667954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Abdulwahid, Bin Dai, Benxiong Huang, Zijing Chen
{"title":"Energy-Efficient and Reliable Routing for Mobility Prediction-Based MANETs","authors":"H. Abdulwahid, Bin Dai, Benxiong Huang, Zijing Chen","doi":"10.1109/MSN.2015.11","DOIUrl":"https://doi.org/10.1109/MSN.2015.11","url":null,"abstract":"An energy-efficient and reliable routing optimization scheme for mobile ad hoc networks (MANETs) is investigated in this paper. Three elements are regarded as the most important keys that affect system performance, these three elements are transmission power, interference, and link lifetime. The contribution of this paper is the development of an optimal routing algorithm called the Energy-Efficient and Reliable Routing (EERR). The EERR algorithm exploits location information to allocate optimal transmission power subject to the key elements above and adapts it for different network scenarios. The interaction of these elements and their effects on routing are studied. Simulations demonstrate that EERR has high network performance and outperforms PEER and AODV, a state-of-the-art.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129308063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhao Liu, Jianxi Fan, Cheng-Kuan Lin, B. Cheng, Jingya Zhou
{"title":"Dynamic Reconfiguration of Complete Binary Trees in Faulty Locally Twisted Cubes","authors":"Zhao Liu, Jianxi Fan, Cheng-Kuan Lin, B. Cheng, Jingya Zhou","doi":"10.1109/MSN.2015.24","DOIUrl":"https://doi.org/10.1109/MSN.2015.24","url":null,"abstract":"The complete binary tree is an important network structure for parallel and distributed computing, which has many nice properties and is often used to be embedded into other interconnection architectures. The locally twisted cube LTQn is an important variant of the hypercube Qn. It has many better properties than Qn with the same number of edges and vertices. In this paper, we prove that the complete binary tree CBTn can be embedded with dilation 2 and congestion 1 into LTQn. Furthermore, it is proven that if there exists an arbitrary faulty node in LTQn, then both the dilation and congestion values will become 2 after reconfiguring CBTn, while if there are two arbitrary faulty nodes in LTQn, then both the dilation and congestion values will become 3 after reconfiguration.","PeriodicalId":363465,"journal":{"name":"2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}