{"title":"A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility","authors":"Ergys Puka, P. Herrmann","doi":"10.1109/WoWMoM.2019.8793021","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793021","url":null,"abstract":"The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we present a method to reduce the waiting time occurring when a vehicle intends to send a message via a cellular network but is currently in a dead spot without sufficient coverage. We use a hybrid network approach combining cellular network access with ad-hoc networks between vehicles that are nearby. In particular, we introduce a data dissemination protocol that allows the vehicles connected through an ad-hoc network to find out which one will most likely leave the dead spot first. Messages can then be sent to this vehicle that forwards them as soon as it regains cellular network access. Further, we developed an initial implementation of this protocol using the technology WiFi Direct that is realized on many mobile phones. Implementation details of the prototype as well as analysis results regarding data transmission time limits of fast driving vehicles are discussed in the article as well.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"19 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Water Consumption Estimates from a Bottle-Attachable Sensor Using Heuristic Fusion","authors":"Henry K. Griffith, S. Biswas","doi":"10.1109/WoWMoM.2019.8792985","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792985","url":null,"abstract":"This paper demonstrates a strategy for improving aggregate (i.e.: multiple drink) water consumption estimates obtained from a bottle-attachable IMU sensor through heuristic fusion. Aggregate consumption is estimated based upon residual container volume using a Gaussian process regression model trained on over 1,500 drinks. The model estimates the fill level of the bottle using hand-engineered features describing the estimated inclination during drinking. Fill level estimates are fused with an empirically parameterized heuristic consumption model. For initial proof-of-concept, fusion is performed using complementary and Kalman filtering. Both techniques are evaluated for 32 dedicated testing experiments containing 12 drinks each. Root mean square fill ratio estimation errors are reduced by 17.3% and 39.6% versus raw sensor estimates using the complementary and Kalman fusion frameworks, respectively.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-Demand Video-Streaming Quality of Experience Maximization in Mobile Edge Computing","authors":"Ayman Younis, Tuyen X. Tran, D. Pompili","doi":"10.1109/WoWMoM.2019.8793052","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793052","url":null,"abstract":"Mobile Edge Computing (MEC) has recently emerged as a promising paradigm to enhance mobile networks' performance by providing cloud-computing capabilities to the edge of the Radio Access Network (RAN) with the deployment of MEC servers right at the Base Stations (BSs). Meanwhile, in-network caching and video transcoding have become important complementary technologies to lower network cost and to enhance Quality of Experience (QoE) for video-streaming users. In this paper, we aim at optimizing the QoE for dynamic adaptive video streaming by taking into account the Distortion Rate (DR) characteristics of videos and the coordination among MEC servers. Specifically, a novel Video-streaming QoE Maximization (VQM) problem is cast as a Mixed-Integer Nonlinear Program (MINLP) that jointly determines the integer video resolution levels and video transmission data rates. Due to the challenging combinatorial and non-convex nature of this problem, the Dual-Decomposition Method (DDM) is employed to decouple the original problem into two tractable subproblems, which can be solved efficiently using standard optimization solvers. Realtime experiments on a wireless video streaming testbed have been performed on a FDD-downlink LTE emulation system to characterize the performance and computing resource consumption of the MEC server under various realistic conditions. Emulation results of the proposed strategy show significant improvement in terms of users' QoE over traditional approaches.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed A. Nassar, Len Luxford, Peter Cole, G. Oatley, P. Koutsakis
{"title":"Adaptive Low-Power Wireless Sensor Network Architecture for Smart Street Furniture-based Crowd and Environmental Measurements","authors":"Mohamed A. Nassar, Len Luxford, Peter Cole, G. Oatley, P. Koutsakis","doi":"10.1109/WoWMoM.2019.8793006","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793006","url":null,"abstract":"Street furniture such as bins, seats and bus shelters can become “smart” with the inclusion of wireless sensor nodes, which consist of environmental sensors, wireless modules, processors and microcontrollers. One of the most crucial challenges for smart street furniture is how to manage power consumption efficiently without affecting data freshness. In this work, we propose a novel Wireless Sensor Network (WSN)architecture for smart street furniture. Unlike existing WSNs which are based on a one-way communication model between wireless sensor nodes and the server, the proposed architecture employs a two-way communication model and a dynamic adaptation of the time interval of measurements to balance between power consumption and data updates. Our approach also provides a real-time low-power design for wireless sensor nodes which efficiently communicate the updated data instead of sending the same data on a regular basis. To the best of our knowledge, this is the first work in the relevant literature which extends the functionality of the wireless module in wireless sensor nodes to act not only as a station sending environmental data but also as soft Access Point (AP), sensing MAC addresses and WiFi signal strengths from surrounding WiFi-enabled devices. We have conducted experiments on the Murdoch University campus and our results show that our proposal improves lifetime of wireless sensor nodes up to 293 % compared to static architectures similar to the ones that have been proposed in the literature. Moreover, network bandwidth is improved up to 38% without affecting data freshness. Finally, storage space for the database at the server is reduced up to 99%.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131011535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guillermo Bielsa, M. Mezzavilla, Joerg Widmer, S. Rangan
{"title":"Performance Assessment of Off-The-Shelf Mm Wave Radios for Drone Communications","authors":"Guillermo Bielsa, M. Mezzavilla, Joerg Widmer, S. Rangan","doi":"10.1109/WoWMoM.2019.8793001","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793001","url":null,"abstract":"This paper presents experiments to assess and understand the feasibility of millimeter-wave (mmWave) radios for aerial links at low altitude, namely drone communications. In this preliminary study, a Commercial Off-The-Shelf (COTS) mm Wave radio is attached to a DJI Matrice 600 Pro drone. The measurement campaign reveals that while the technology is promising, the range is extremely limited, i.e., approximately 30m. Our analysis shows that the poor range is likely due to low-directionality of today's COTS devices as well as poor rate adaptation in mobile environments. More antennas at both the transmitter and the receiver, along with better 3D beamforming, will be essential to boosting the communication range and thus making this a viable technology for use cases such as high definition real-time monitoring in disaster response scenarios or rapid deployment of multi-Gbps aerial links to expand connectivity in underserved areas.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SafeFlow-x: An Efficient and Complete Strategy for Multiparty Trust Negotiation Over Distributed Networks","authors":"M. Allouzi, J. Khan","doi":"10.1109/WoWMoM.2019.8792991","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792991","url":null,"abstract":"Multiparty Trust Negotiation (MTN) is an emerging methodology for establishing trust between peers by gradually requesting and disclosing digitally signed credentials. However, a MTN strategy must be utilized to search for a successful negotiation based on the Access Control Policies (ACP). Previous work in this area focused on establishing trust between two parties (ATN), yet real life scenarios involved more than two parties in the negotiation process. Even if multiparty is involved, the Access Control Policies (ACP)proposed are either Identity based Access control policies (IBAC)as well as static policies, where the client has no say in decisions, like in the single sign-on systems, Shibboleth [11], and OpenID [14]; or the process is state full and has a high communication cost like in Zhang and Winslett work [9]. This paper provides a formal definition for the multiparty trust negotiation problem and proposes a novel MTN strategy, SafeFlow-$x$. SafeFlow-x is a stateless, safe, efficient and complete strategy. In the worst case, its communication complexity is $O(n)$, where $n$ is the total number of credentials requested, and its computational complexity is $O(k)$, where $k$ is the total size of peer's ACP when no cyclic dependencies occur.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Variable Length Address Assignment Scheme for 6LoWPAN","authors":"C. Hickman, Feng Wang","doi":"10.1109/WoWMoM.2019.8793025","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793025","url":null,"abstract":"Low-Power and Lossy Networks (LLNs) are an enabling technology for many Internet of Things (IoT) applications. To allow LLNs to interoperate with the Internet, an address autoconfiguration protocol must be used to assign network addresses. However, the potentially vast number of IoT devices puts a massive strain on IP addressing. In this paper, we present a variable-length address allocating scheme for 6LoWPAN. Our analysis and evaluation results show that the proposed variable-length addresses could guarantee the scalability property of hierarchical addressing, and alleviate the inefficiency of address space due to fixed-length addresses.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129109732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Oostvogels, Stefanos Peros, Stéphane Delbruel, D. Hughes
{"title":"Expressive Data-Centric Multicast on RPL in Low-Power Networks","authors":"J. Oostvogels, Stefanos Peros, Stéphane Delbruel, D. Hughes","doi":"10.1109/WoWMoM.2019.8793007","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793007","url":null,"abstract":"Applications for the Internet of Things (IoT)are often data-centric. Data-centric routing then enables messages to reach relevant consumers while avoiding flooding and explicit resource discovery. This kind of routing thus provides energy savings as well as a convenient programming abstraction: messages can be addressed to nodes that advertise features matching a constraint. In low-power wireless mesh networks, such feature-oriented routing traditionally relies on costly and inflexible network overlays. Recent work establishes lightweight support for diverse data-centric traffic patterns, but sacrifices expressiveness of feature-oriented functionality and hence applicability. It is also unclear whether the energy consumption advantages offered by data-centric routing extend to this new lightweight approach. To address these concerns, this paper introduces the SMRFET system. SMRFET improves the expressiveness of state-of-the-art feature-oriented routing by supporting numeric rather than binary features. The system integrates data-centric functionality into group-based multicast and thus adds only a small amount of overhead: experiments show that SMRFET significantly reduces the required amount of message passing relative to alternative systems for group communication. Additionally, SMRFET can be reconfigured to handle memory constraints: its performance degrades gracefully as the amount of memory allocated to it decreases. SMRFET therefore brings lightweight and expressive group communication to the wireless IoT.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessandro Lieto, Eugenio Moro, Ilaria Malanchini, Silvio Mandelli, A. Capone
{"title":"Strategies for Network Slicing Negotiation in a Dynamic Resource Market","authors":"Alessandro Lieto, Eugenio Moro, Ilaria Malanchini, Silvio Mandelli, A. Capone","doi":"10.1109/WoWMoM.2019.8792999","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792999","url":null,"abstract":"One of the disruptive innovations introduced by 5G networks is the opportunity for a new group of stakeholders to be actively involved in the management of network slices with the role of tenants. This allows to go beyond the user-centric QoS paradigm of 4G, and to include tools for handling the aggregate performance of multiple services and user groups and to focus on slice resource management, also at the new 5G NR interface. So far, research efforts have privileged a first solution based on the concept of isolation between slices. However, proposed solutions are not particularly efficient due to the loss of pooling gains, and not very reliable due to variable channel conditions that with slice limited resources make performance not easily predictable. We propose a slice management framework where the shared resources are negotiated by tenants in a real-time market based on slice instantaneous demands. Our model, based on game theory, allows tenants to optimize their service strategies acquiring resources when and where it is necessary, according to the level of quality and reliability requested by the specific traffic types they handle. In this paper, we focus on modeling the game theoretical framework and on characterizing its equilibria in a multi-tenant scenario.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries","authors":"Areej Albataineh, I. Alsmadi","doi":"10.1109/WoWMoM.2019.8792986","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792986","url":null,"abstract":"Since its introduction several years ago, Shodan has been used in several research projects related to security assessment of IoT devices publicly facing the Internet. Despite the fact that many of the queries that can expose those devices are publicly known, yet subsequent assessments continue to indicate the existence of instances of those vulnerabilities. In this paper, we conducted a remote security assessment based on an extended dataset from original public Shodan queries (with known terms to expose vulnerabilities). Based on our own assessment for the terms in the public Shodan queries, we updated the list to cover other important query terms that were reported for remote back-door access. Results showed that many of those public queries in the original Shodan list can still exploit several systems and devices facing the Internet. Similarly, many of the newly added queries indicate existing vulnerabilities in some live systems in the US in particular and also worldwide. Vulnerabilities related to default or trivial passwords in IoT devices were reported in SHINE and other assessment projects. Nonetheless, many of those vulnerabilities that are easy to fix, still exist in publicly visible IoT devices.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}