{"title":"Local Topology Aware Probabilistic Routing","authors":"D. Kifle, G. Gianini, M. Libsie","doi":"10.1145/3267129.3267144","DOIUrl":"https://doi.org/10.1145/3267129.3267144","url":null,"abstract":"Gossip-based packet forwarding is used in unstructured networks is to reduce traffic overhead in dense networks and to minimize early gossip termination in sparse networks. Unlike in flooding, where packets are forwarded to all the neighbors, in Gossip-based protocols packets are forwarded with some probability value p<1, to reduce redundancy. However this value has to be carefully tuned: if too small, early gossip termination is likely to occur, if too large, flooding storms can take place, as with the flooding protocol. In this work, we propose to use a forwarding probability based on local topology indicators, such as the effective node degree of the forwarding node: the choice of such probability takes into account the local topology. In a context where each node can have a different forwarding probability, another way of setting efficiently its value consists in further tuning such value for each message, based on the estimated level of completion of the corresponding communication task: to this purpose we propose to use a simple formula based on the messages hop-count. We validate these approaches by simulation using ns-2 in sparse and dense networks and show that they improve the performances in terms of traffic overhead and average end-to-end delay. In terms of packet delivery ratio, the proposed approach yields results comparable to those of the standard protocol AODV.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualized End-to-End Management Functions for Aggregated Control of Video Traffic Flows","authors":"K. Ravindran, Ancy Cherian, Arun Adiththan","doi":"10.1145/3267129.3267142","DOIUrl":"https://doi.org/10.1145/3267129.3267142","url":null,"abstract":"The paper describes the management and control (M&C) functions of various network nodes in an end-to-end rate-adaptive video transport system. Mobile user devices download video clips by sharing the underlying network path from an ingress node. At the core software level, M&C functions realize the well-known AIMD (additive increase multiplicative decrease) based video rate control algorithm to handle congestion along the path. AIMD is exercised on the aggregated data flows at a source ingress node based on the 'loss reports' signaled from the receiver egress node. Our aggregated AIMD-based control reduces the signaling overhead, relative to the existing approaches that anchor an AIMD instance on each user device itself. This offers scalability, while improving the user-experienced QoS: such as low jitter in transfer rates and isolation against device faults. The offloading of aggregated AIMD-based control to the in-network overlay nodes also allows a reduction in the overall bandwidth usage. The software handling of 'last-mile' issues in the path between user devices and egress nodes (such as greedy users and access network channel sharing) are discussed, in a context of fine-granular video encoders in the devices. The paper also shows a virtualization of our M&C functions (as VNF modules) for deployment in large-scale video distribution networks --- such as YouTube.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133083218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On TCP Simulation Fidelity in ns-2","authors":"Lingfeng Guo, Jack Y. B. Lee","doi":"10.1145/3267129.3267132","DOIUrl":"https://doi.org/10.1145/3267129.3267132","url":null,"abstract":"The Network Simulator version 2, also known as ns-2, is a widely used platform for network and protocol performance evaluation. Over the years it has benefited from numerous studies in improving its simulation fidelity. Nevertheless, this study discovered that ns-2's TCP simulation accuracy could be impaired substantially in cases where the first-hop link is the bottleneck. This is common in many applications where the client host uploads data to Internet servers as the uplink, e.g., wireless and mobile networks, may have far lower bandwidth than the Internet core. This work investigated this performance anomaly by dissecting and comparing ns-2's implementation against Linux implementation; and by developing extensions to ns-2 to resolve the anomaly as well as five additional updates to bring its implementation to match recent Linux implementations. Extensive verifications against experiments conducted in a physical testbed confirmed the accuracy of the extended ns-2, offering a renewed and accurate simulator for mobile and wireless networking.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Analysis of Synchronous All-to-All Communication Protocols for Wireless Systems","authors":"Haoliang Wang, R. Simon","doi":"10.1145/3267129.3267134","DOIUrl":"https://doi.org/10.1145/3267129.3267134","url":null,"abstract":"Many applications running over low-power and lossy wireless networks and wireless sensor networks (WSNs) rely heavily on a number of all-to-all communication primitives for services such as data aggregation, voting and consensus. Starting with the Chaos system, synchronous transmission-based broadcasting gossip protocols are now recognized as a technique for enabling efficient all-to-all communications in WSNs. However, despite their effectiveness, there has been relatively little analysis of this class of synchronous broadcasting gossip protocols (SBGPs). In this paper, we address this void by providing a basic theoretical framework for analysis SBGPs. Based on our derived theoretical results and previous experimental measurements, we show that the key for better performance is to increase the network connectivity as much as possible while limiting the number of concurrent transmitters. As a proof of the concept, we propose a multi-radio approach of the SBGP to achieve this purpose. We compare four multi-radio schemes of SBGP with a single radio SBGP through simulation and result has shown the convergence latency can be reduced up to 42% by utilizing multiple radios.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124577492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Abhishek, Anshoo Tandon, Teng Joon Lim, B. Sikdar
{"title":"Detecting Forwarding Misbehavior In Clustered IoT Networks","authors":"N. Abhishek, Anshoo Tandon, Teng Joon Lim, B. Sikdar","doi":"10.1145/3267129.3267147","DOIUrl":"https://doi.org/10.1145/3267129.3267147","url":null,"abstract":"Internet of Things (IoT) devices in clustered wireless networks can be compromised by compromising the gateway which they are associated with. In such scenarios, an adversary who has compromised the gateway can affect the network's performance by deliberately dropping the packets transmitted by the IoT devices. In this way, the adversary can actually mimic a bad radio channel. Hence, the affected IoT device has to retransmit the packet which will drain its battery at a faster rate. To detect such an attack, we propose a centralized detection system in this paper. It uses the uplink packet drop probability of the IoT devices to monitor the behavior of the gateway with which they are associated. The detection rule proposed is given by the generalized likelihood ratio test, where the attack probabilities are estimated using maximum likelihood estimation. Results presented show the effectiveness of the proposed detection mechanism and also demonstrate the impact of the choice of system parameters on the detection algorithm.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"74 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133582036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Comparison between OFDM & FH-OFDM Systems","authors":"M. Sakr, M. Soleymani","doi":"10.1145/3267129.3267145","DOIUrl":"https://doi.org/10.1145/3267129.3267145","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is a common modulation technique that is being used in many of modern wireless communications and standards due to its excellent spectral efficiency and immunity to multipath interference in fading channel. In this paper, a Frequency Hopping Orthogonal Frequency Division Multiplexing (FH-OFDM) system is proposed to enhance the performance of conventional OFDM systems in multiuser interference. Based on simulation results, the Bit Error Rate (BER) performance of the proposed FH-OFDM system is shown to be superior to that of the conventional OFDM system under conditions of multiuser interference and Additive White Gaussian Noise (AWGN) channel.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Proactive Handover Scheme for Achieving Energy-Efficient Vehicular Networks","authors":"Peng Sun, Noura Aljeri, A. Boukerche","doi":"10.1145/3267129.3267148","DOIUrl":"https://doi.org/10.1145/3267129.3267148","url":null,"abstract":"Recently, the Vehicular Network (VN) has gained a lot of attention from researchers around the world. By allowing wireless communication, VNs enable information exchanging among vehicles, which in turn let drivers become more aware of their surrounding road conditions. Accordingly, the road safety is improved. However, due to the fast speed and high-frequent changing direction of vehicles, the network topology of VNs has the transient nature. Hence, achieving efficient data dissemination/content delivery is a critical issue in the VNs-environment. In this article, we will introduce a novel passive roadside unit (RSU) detection-based proactive (PRDP) handover scenario. Consequently, the overhead of the handover process can be reduced, and the probability of successful connection establishment can be improved. More precisely, by combining with the extended Kalman filter (EKF), the PRDP handover protocol is designed to improve the energy efficiency of the handover procedure in the VNs-environment. We carry out intensive simulations to evaluate the performance of the proposed energy-efficient proactive handover protocol.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116658380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a Coverage Hole-free Communication Tree","authors":"A. Vergne, L. Decreusefond, P. Martins","doi":"10.1145/3267129.3267139","DOIUrl":"https://doi.org/10.1145/3267129.3267139","url":null,"abstract":"Wireless networks are present everywhere but their management can be tricky since their coverage may contain holes even if the network is fully connected. In this paper we propose an algorithm that can build a communication tree between nodes of a wireless network with guarantee that there is no coverage hole in the tree. We use simplicial homology to compute mathematically the coverage, and Prim's algorithm principle to build the communication tree. Some simulation results are given to study the performance of the algorithm and compare different metrics. In the end, we show that our algorithm can be used to create coverage hole-free communication groups with a limited number of hops.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115626687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HiveSign: dynamic message signatures for resource-constrained wireless networks","authors":"Raghav V. Sampangi, S. Sampalli","doi":"10.1145/2642687.2642699","DOIUrl":"https://doi.org/10.1145/2642687.2642699","url":null,"abstract":"Radio Frequency Identification (RFID) and Wireless body area network (WBAN) are two of the emerging wireless networks that are becoming increasingly popular, owing to their applicability in a variety of domains and longevity-based designs. However, the flexibility they offer and their reduced manufacturing cost come with a trade-off --- they have severe implicit hardware restrictions. These restrictions limit their ability to store a large amount of data and/or perform sophisticated computation, thereby leading them to be classified as resource-constrained wireless networks. Their constraints further limit the security that can be implemented on these devices, necessitating design of optimized solutions for security. In our paper, we present a new approach that generates dynamic message signatures using simple logical operations, hashing and pseudorandom number generation (PRNG) to accomplish integrity and entity authentication. Our approach provides a means to verify the integrity of both the message as well as the key. We validate our proposal using security evaluation and complexity analysis.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flow-level modeling and optimization of intercell coordination with dynamic TDD","authors":"Prajwal Osti, S. Aalto, P. Lassila","doi":"10.1145/2642687.2642698","DOIUrl":"https://doi.org/10.1145/2642687.2642698","url":null,"abstract":"We study the intercell coordination problem between two interfering cells combined with dynamic time-division duplexing (TDD). In dynamic TDD, each station selects in each time slot whether it is serving uplink (u) or downlink (d) traffic. Thus, the system has four possible operation modes (uu, ud, du, dd). The amount of intercell interference between the stations clearly depends on the operation mode. We consider a flow-level model where traffic consists of elastic data flows in both cells (cells 1 and 2) and in both directions (uplink and downlink). We first characterize the maximal stability region, and then determine the optimal static (i.e., state-independent) policy. Our main objective is to analyze the potential gains from applying dynamic (i.e., state-dependent) policies, where the chosen operation mode depends on the instantaneous state of the system. To this end, motivated by certain stochastic optimality results in the literature, we define several priority policies. As a reference policy, we have the well-known max-weight policy, and we also develop another dynamic policy by applying the policy iteration algorithm. Notably we prove that certain simple priority policies are, in fact, stochastically optimal in some special cases, but which policy is optimal depends on the setting. To study the exact performance gains achieved by the dynamic policies, we perform extensive simulations. While our stochastic optimality results require exponential service times, in the simulations, we also study the impact of nonexponential service times and consider a physical model where the service time distribution is determined by the joint distribution of flow sizes and the random location of the corresponding user in the cell area. The max-weight policy is, as expected, performing well but the various priority policies are sometimes better and even optimal. Jointly the results indicate that dynamic policies give significant performance gains compared with the optimal static policy.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}