Q2S and Security for Wireless and Mobile Networks最新文献

筛选
英文 中文
Optimal Transmission Thresholds for QoS Guarantees in WSNs wsn中QoS保证的最优传输阈值
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267137
Edgar Romo-Montiel, M. E. Rivero-Angeles, H. Molina-Lozano, G. Rubino, Ricardo Menchaca-Méndez, R. Menchaca-Méndez
{"title":"Optimal Transmission Thresholds for QoS Guarantees in WSNs","authors":"Edgar Romo-Montiel, M. E. Rivero-Angeles, H. Molina-Lozano, G. Rubino, Ricardo Menchaca-Méndez, R. Menchaca-Méndez","doi":"10.1145/3267129.3267137","DOIUrl":"https://doi.org/10.1145/3267129.3267137","url":null,"abstract":"In Wireless Sensor Networks (WSNs), each node typically transmits several control and data packets in a contention fashion to the sink. In this work, we mathematically analyze and study three unscheduled transmission schemes for control packets in a cluster-based architecture named Fixed Scheme (FS), Adaptive by Estimation Scheme (AES) and Adaptive by Gamma Scheme (AGS), in order to offer QoS guarantees in terms of system lifetime (related to energy consumption) and reporting delay (related to cluster formation delay). In the literature, different adaptive schemes have been proposed, and also there is research about the appropriate value selection of the transmission probability for the cluster formation. However, it largely overlooked the minimum and maximum values for the transmission probability that entails the best performance. Based on the numerical results, we show that the threshold values are just as important in the system design as the actual value of the transmission probability in adaptive schemes (AES and AGS), to achieve QoS guarantees.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Management of Autonomous Vehicle Platooning 自动车辆队列的安全管理
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267146
Fábio Gonçalves, B. Ribeiro, Vadym S. Hapanchak, S. Barros, Ó. Gama, Paulo Araújo, M. J. Nicolau, Bruno Dias, Joaquim Macedo, António D. Costa, Alexandre J. T. Santos
{"title":"Secure Management of Autonomous Vehicle Platooning","authors":"Fábio Gonçalves, B. Ribeiro, Vadym S. Hapanchak, S. Barros, Ó. Gama, Paulo Araújo, M. J. Nicolau, Bruno Dias, Joaquim Macedo, António D. Costa, Alexandre J. T. Santos","doi":"10.1145/3267129.3267146","DOIUrl":"https://doi.org/10.1145/3267129.3267146","url":null,"abstract":"Platooning is an emerging Intelligent Transportation Systems (ITS) application that can have a huge impact on road traffic. It allows vehicles to travel in a convoy manner, very close to each other with constant speeds and gaps.\u0000 It uses Vehicular Ad hoc Networks (VANETs) as the underlying communication framework. These are a type of network with a set of very specific characteristics, making it an easy target for attackers. Frequent disconnections, topology change, communication over the air among others, create vulnerabilities easily exploitable.\u0000 The goal of this paper is to present how to secure the communication between the several nodes of a platooning by using an existing security model. After a careful research and evaluation, the Vehicular Ad hoc Network Public Key Infrastructure and Attribute Based Encryption with Identity Manager (VPKIbrID) model was chosen. It provides a whole solution with tools for secure message exchange and entity authentication.\u0000 The impact of the introduced security model was evaluated using simulations with different platoon sizes and VPKIbrID modes. The several operations of the platoon will be carried using the Platoon Management Protocol (PMP).\u0000 The result analysis allowed to verify that when using a VPKIbrID mode that allows multicast/broadcast communications, the vehicles sent much fewer messages than the mode that only supports unicast. The performance results indicate that the vehicles should use VPKIbrID Public Key Infrastructure (VPKIbrID-PKI) for maneuvers and VPKIbrID Attribute Based Encryption (VPKIbrID-ABE) to exchange platoon beacons or any message exchanged to all platoon members. Moreover, the messages broadcasted in a platoon group will always have the same targets, with the same attributes, being a perfect use case for the usages of cached keys.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"127 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129851174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Joint Design of WiFi Mesh Network for Video Surveillance Application 面向视频监控应用的WiFi网状网络联合设计
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267130
Jie Wu, Hongchun Li, Yi Xu, Jun Tian
{"title":"Joint Design of WiFi Mesh Network for Video Surveillance Application","authors":"Jie Wu, Hongchun Li, Yi Xu, Jun Tian","doi":"10.1145/3267129.3267130","DOIUrl":"https://doi.org/10.1145/3267129.3267130","url":null,"abstract":"The ability to transmit high volumes of data over a long distance makes WiFi mesh networks an ideal transmission solution for remote video surveillance. Instead of independently manipulating the node deployment, channel and interface assignment, and routing to improve the network performance, we propose a joint network design using multi-objective genetic algorithm to take into account the interplay of them. Moreover, we found a performance evaluation method based on the transmission capability of the WiFi mesh networks for the first time. The good agreement of our obtained multiple optimized solutions to the extensive simulation results by NS-3 demonstrates the effectiveness of our design.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122508460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Service Slicing Strategy with QoS for LTE-based Cellular Networks 基于lte蜂窝网络的具有QoS的服务切片策略
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267140
Peng Sun, H. Naser
{"title":"A Service Slicing Strategy with QoS for LTE-based Cellular Networks","authors":"Peng Sun, H. Naser","doi":"10.1145/3267129.3267140","DOIUrl":"https://doi.org/10.1145/3267129.3267140","url":null,"abstract":"This paper introduces a service slicing strategy for managing Quality of Service in LTE-based cellular networks by managing resource blocks in the uplink direction based on resource pooling. An algorithm is devised to optimize and allocate resource blocks in the uplink direction based on longterm transmission history, channel conditions, and long-term fair share of resources among different service slices (classes). The proposed service slicing mechanism can flexibly allocate network resources between different service slices. It offers an ultra-reliable low-latency service suitable for uRLLC applications, and low to medium latency services suitable for extreme mobile broadband (xMBB) and massive Internet of Things (mIoT) use cases in future 5G networks. One important merit of the proposed algorithm is that its performance does not vary with the Transmission Time Interval (TTI). This enables network designers to choose different values for TTI to achieve other design goals (such as improved powerefficiency or capacity gain) without affecting QoS.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CEEPS4IoT: Context-aware Energy Efficient Publish/Subscribe for Internet of Things CEEPS4IoT:面向物联网的环境感知节能发布/订阅
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267138
Mariem Harmassi, Cyril Faucher, Y. Ghamri-Doudane
{"title":"CEEPS4IoT: Context-aware Energy Efficient Publish/Subscribe for Internet of Things","authors":"Mariem Harmassi, Cyril Faucher, Y. Ghamri-Doudane","doi":"10.1145/3267129.3267138","DOIUrl":"https://doi.org/10.1145/3267129.3267138","url":null,"abstract":"Data collection in Internet of Things is greatly impaired by the redundant or unwanted reportings provided by sensors deployed in urban area. The service provider/ application is typically unaware of an objects context while collecting its readings. This paper proposes CEEPS4IoT as a publish- subscribe context-aware system for data collection that takes into account the context of neighboring sensors while collect- ing data. However, rational sensors do not cooperate since sharing their readings is an energy costly operation along incurring them additional communication overhead. To cater this, we present a dynamic coalition game for sensors to collaborate and share their readings in an energy-efficient way and in return receive a reward for cooperating. We derive a stable utility for a sensor proportional to the amount of data it shares while compensating for its energy costs. Results from evaluating CEEPS4IoT in networks of up to 300 nodes suggest it as a scalable and energy efficient pub/sub system with context awareness since it conserves around 50% energy compared to existing pub/sub system.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127819448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy-Efficient Node Deployment Strategy for Energy Harvesting-aided Wireless Sensor Networks 能量收集辅助无线传感器网络的节能节点部署策略
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267149
Peng Sun, A. Boukerche
{"title":"An Energy-Efficient Node Deployment Strategy for Energy Harvesting-aided Wireless Sensor Networks","authors":"Peng Sun, A. Boukerche","doi":"10.1145/3267129.3267149","DOIUrl":"https://doi.org/10.1145/3267129.3267149","url":null,"abstract":"Due to the limited battery capacity, energy is the most crucial constraint for improving the performance of widely adopted Wireless Sensor Networks (WSNs). Hence, conserving energy and improving the energy efficiency are important in designing a sustainable WSN. In this article, by taking the advantages of the emerging energy harvest techniques, we introduce a novel energy-efficient hierarchical two-tier (HTT) energy harvesting-aided WSNs deployment scenario. In our design, two types of nodes are adopted: one is the regular battery-powered sensor node (RSN), and the other is the energy harvesting-aided data relaying node (EHN). The objective is to use only RSNs to monitor FoI, while EHNs focus on collecting the sensed data from RSNs and forwarding the gathered data to the data sink. The minimum number of EHNs is deployed based on a newly designed probability density function to minimize the energy consumption of RSNs. This, in turn, extends the lifetime of the deployed WSN. The simulation results indicate that the proposed scheme outperforms some well-known techniques in the network lifetime, while enhancing the total throughput.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TTBA: An RFID-based Tracking System for Two Basic Actions in Free-Weight Exercises TTBA:基于rfid的自由重量练习中两个基本动作的跟踪系统
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267133
Feng Ding, Qian Zhang, Run Zhao, Dong Wang
{"title":"TTBA: An RFID-based Tracking System for Two Basic Actions in Free-Weight Exercises","authors":"Feng Ding, Qian Zhang, Run Zhao, Dong Wang","doi":"10.1145/3267129.3267133","DOIUrl":"https://doi.org/10.1145/3267129.3267133","url":null,"abstract":"People have been spending much time on free-weight exercises that can strengthen the muscles, connective tissues and tendons. To decrease the risk of injury and reap the benefit of free-weight exercises, a monitoring system which helps users exercise scientifically is necessary. Wearable sensors or changes of Radio Frequency (RF) signal have been exploited for activity sensing in prior work. However, wearable sensors methods are intrusive and may bother users, while the RF-based methods require training data and fail to extract fine-grained features of each action. Therefore, our goal is to design a system which is non-intrusive, privacy-insensitive and non-training. Tracking the free-weight equipment may meet the challenge of large accuracy loss, only by extending existing RF-based 2D tracking methods to 3D space. Instead, regarding the 3D moving as 1D moving simplifies the problem. We find that most actions in free-weight exercises can be divided into two kinds, circular and vertical motions. Therefore, this paper proposes a RFID-based system, TTBA, to track free-weight equipment instrumented with passive RFID tags. We implement a low-cost prototype of TTBA to recognize and track the two basic actions. Extensive experiments show that TTBA achieves high tracking accuracy for both motions, even mm-level accuracy for the vertical motion. And the potential TTBA has to achieve an assessment system is also showed in the practical evaluation.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation of Channels Blacklists in TSCH Networks with Star and Tree Topologies 星形和树形TSCH网络中信道黑名单的评估
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267131
Diego V. Queiroz, R. Gomes, C. Benavente-Peces, I. Fonseca, M. Alencar
{"title":"Evaluation of Channels Blacklists in TSCH Networks with Star and Tree Topologies","authors":"Diego V. Queiroz, R. Gomes, C. Benavente-Peces, I. Fonseca, M. Alencar","doi":"10.1145/3267129.3267131","DOIUrl":"https://doi.org/10.1145/3267129.3267131","url":null,"abstract":"The Time-Slotted Channel Hopping (TSCH) mode, defined by the IEEE 802.15.4e protocol, aims to reduce the effects of narrowband interference and multipath fading on some channels through the frequency hopping method. To work satisfactorily, this method must be based on the evaluation of the channel quality through which the packets will be transmitted to avoid packet losses. In addition to the estimation, it is necessary to manage channel blacklists, which prevents the sensors from hopping to bad quality channels. The blacklists can be applied locally or globally, and this paper evaluates the use of a local blacklist through simulation of a TSCH network in a simulated harsh industrial environment. This work evaluates two approaches, and both use a developed protocol based on TSCH, called Adaptive Blacklist TSCH (AB-TSCH), that considers beacon packets and includes a link quality estimation with blacklists. The first approach uses the protocol to compare a simple version of TSCH to configurations with different sizes of blacklists in star topology. In this approach, it is possible to analyze the channel adaption method that occurs when the blacklist has 15 channels. The second approach uses the protocol to evaluate blacklists in tree topology, and discusses the inherent problems of this topology. The results show that, when the estimation is performed continuously, a larger blacklist leads to an increase of performance in star topology. In tree topology, due to the simultaneous transmissions among some nodes, the use of smaller blacklist showed better performance.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Athena: A Knowledge Fusion Algorithm for the Internet of Things Athena:一种物联网的知识融合算法
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267141
Gabriel Martins de Oliveira Costa, C. Farias, L. Pirmez
{"title":"Athena: A Knowledge Fusion Algorithm for the Internet of Things","authors":"Gabriel Martins de Oliveira Costa, C. Farias, L. Pirmez","doi":"10.1145/3267129.3267141","DOIUrl":"https://doi.org/10.1145/3267129.3267141","url":null,"abstract":"Internet of things (IoT) is envisioned as the interconnection of the Internet with sensing and actuating devices. IoT systems are usually designed to collect massive amounts of data from multiple and possibly conflicting sources. Nevertheless, data must be refined before being stored in a repository, so as information can be correctly extracted for further uses. Knowledge fusion is an important technique to identify and eliminate erroneous data from compromised sources or any mistakes that might have occurred during the extraction process. We propose a new multisensor data fusion algorithm for IoT that supports the knowledge extraction needed to adapt knowledge graphs. This algorithm, named Athena, enhances accuracy when compared to the traditional multisensor data fusion techniques. We also discuss the role of reinforcement learn over integration on a multi-application WSAN.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Actor-Oriented Design Patterns for Performance Modeling of Wireless Communications in Cyber-physical Systems 面向参与者的网络物理系统无线通信性能建模设计模式
Q2S and Security for Wireless and Mobile Networks Pub Date : 2018-10-25 DOI: 10.1145/3267129.3267136
Rafael Rosales, Wael Guibène, German Fabila Garcia
{"title":"Actor-Oriented Design Patterns for Performance Modeling of Wireless Communications in Cyber-physical Systems","authors":"Rafael Rosales, Wael Guibène, German Fabila Garcia","doi":"10.1145/3267129.3267136","DOIUrl":"https://doi.org/10.1145/3267129.3267136","url":null,"abstract":"The work at hand proposes a set of modeling recipes to address the aggressive development time window of current and future wireless communications in cyber-physical systems. These systems pose a significant challenge in meeting Time-to-Market due to the ever more challenging requirements such as ultra-low latency for mission-critical applications, extremely high throughput demanding tons of communication and computation resources working concurrently, and, at the same time, low power consumption and small chip area for its field deployment.\u0000 This paper presents three actor-oriented design patterns for a systematic creation of implementation-aware performance models of complex real-time wireless communication systems that can be applied in existing system level frameworks.\u0000 The main benefits of this modeling approach are: 1) Time semantic model correctness where the effects of a chosen hardware platform can be taken into account. 2) Behavioral modeling completeness by construction, and 3) reduced time-to-market through reduced modeling effort, improved maintainability and testability. Furthermore, by adhering to this modeling paradigm, it is possible to easily integrate the following features for the improvement of functional safety: a) system timing diagnostics, b) an appropriate handling of timing violations, and c) a simulation-based scheduleability analysis.\u0000 To demonstrate the aforementioned benefits, a model of a real world pre-5G baseband processor for V2X communications is created in Intel CoFluent where our claims are confirmed when assessing real-time deadline compliance of possible HW implementations.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信