2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

筛选
英文 中文
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility 临时蜂窝网络不可达车辆的数据传播协议
Ergys Puka, P. Herrmann
{"title":"A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility","authors":"Ergys Puka, P. Herrmann","doi":"10.1109/WoWMoM.2019.8793021","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793021","url":null,"abstract":"The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we present a method to reduce the waiting time occurring when a vehicle intends to send a message via a cellular network but is currently in a dead spot without sufficient coverage. We use a hybrid network approach combining cellular network access with ad-hoc networks between vehicles that are nearby. In particular, we introduce a data dissemination protocol that allows the vehicles connected through an ad-hoc network to find out which one will most likely leave the dead spot first. Messages can then be sent to this vehicle that forwards them as soon as it regains cellular network access. Further, we developed an initial implementation of this protocol using the technology WiFi Direct that is realized on many mobile phones. Implementation details of the prototype as well as analysis results regarding data transmission time limits of fast driving vehicles are discussed in the article as well.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"19 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Water Consumption Estimates from a Bottle-Attachable Sensor Using Heuristic Fusion 利用启发式融合改进可装瓶传感器的用水量估算
Henry K. Griffith, S. Biswas
{"title":"Improving Water Consumption Estimates from a Bottle-Attachable Sensor Using Heuristic Fusion","authors":"Henry K. Griffith, S. Biswas","doi":"10.1109/WoWMoM.2019.8792985","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792985","url":null,"abstract":"This paper demonstrates a strategy for improving aggregate (i.e.: multiple drink) water consumption estimates obtained from a bottle-attachable IMU sensor through heuristic fusion. Aggregate consumption is estimated based upon residual container volume using a Gaussian process regression model trained on over 1,500 drinks. The model estimates the fill level of the bottle using hand-engineered features describing the estimated inclination during drinking. Fill level estimates are fused with an empirically parameterized heuristic consumption model. For initial proof-of-concept, fusion is performed using complementary and Kalman filtering. Both techniques are evaluated for 32 dedicated testing experiments containing 12 drinks each. Root mean square fill ratio estimation errors are reduced by 17.3% and 39.6% versus raw sensor estimates using the complementary and Kalman fusion frameworks, respectively.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On-Demand Video-Streaming Quality of Experience Maximization in Mobile Edge Computing 移动边缘计算中点播视频流体验质量最大化
Ayman Younis, Tuyen X. Tran, D. Pompili
{"title":"On-Demand Video-Streaming Quality of Experience Maximization in Mobile Edge Computing","authors":"Ayman Younis, Tuyen X. Tran, D. Pompili","doi":"10.1109/WoWMoM.2019.8793052","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793052","url":null,"abstract":"Mobile Edge Computing (MEC) has recently emerged as a promising paradigm to enhance mobile networks' performance by providing cloud-computing capabilities to the edge of the Radio Access Network (RAN) with the deployment of MEC servers right at the Base Stations (BSs). Meanwhile, in-network caching and video transcoding have become important complementary technologies to lower network cost and to enhance Quality of Experience (QoE) for video-streaming users. In this paper, we aim at optimizing the QoE for dynamic adaptive video streaming by taking into account the Distortion Rate (DR) characteristics of videos and the coordination among MEC servers. Specifically, a novel Video-streaming QoE Maximization (VQM) problem is cast as a Mixed-Integer Nonlinear Program (MINLP) that jointly determines the integer video resolution levels and video transmission data rates. Due to the challenging combinatorial and non-convex nature of this problem, the Dual-Decomposition Method (DDM) is employed to decouple the original problem into two tractable subproblems, which can be solved efficiently using standard optimization solvers. Realtime experiments on a wireless video streaming testbed have been performed on a FDD-downlink LTE emulation system to characterize the performance and computing resource consumption of the MEC server under various realistic conditions. Emulation results of the proposed strategy show significant improvement in terms of users' QoE over traditional approaches.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive Low-Power Wireless Sensor Network Architecture for Smart Street Furniture-based Crowd and Environmental Measurements 基于智能街道设备的人群和环境测量的自适应低功耗无线传感器网络架构
Mohamed A. Nassar, Len Luxford, Peter Cole, G. Oatley, P. Koutsakis
{"title":"Adaptive Low-Power Wireless Sensor Network Architecture for Smart Street Furniture-based Crowd and Environmental Measurements","authors":"Mohamed A. Nassar, Len Luxford, Peter Cole, G. Oatley, P. Koutsakis","doi":"10.1109/WoWMoM.2019.8793006","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793006","url":null,"abstract":"Street furniture such as bins, seats and bus shelters can become “smart” with the inclusion of wireless sensor nodes, which consist of environmental sensors, wireless modules, processors and microcontrollers. One of the most crucial challenges for smart street furniture is how to manage power consumption efficiently without affecting data freshness. In this work, we propose a novel Wireless Sensor Network (WSN)architecture for smart street furniture. Unlike existing WSNs which are based on a one-way communication model between wireless sensor nodes and the server, the proposed architecture employs a two-way communication model and a dynamic adaptation of the time interval of measurements to balance between power consumption and data updates. Our approach also provides a real-time low-power design for wireless sensor nodes which efficiently communicate the updated data instead of sending the same data on a regular basis. To the best of our knowledge, this is the first work in the relevant literature which extends the functionality of the wireless module in wireless sensor nodes to act not only as a station sending environmental data but also as soft Access Point (AP), sensing MAC addresses and WiFi signal strengths from surrounding WiFi-enabled devices. We have conducted experiments on the Murdoch University campus and our results show that our proposal improves lifetime of wireless sensor nodes up to 293 % compared to static architectures similar to the ones that have been proposed in the literature. Moreover, network bandwidth is improved up to 38% without affecting data freshness. Finally, storage space for the database at the server is reduced up to 99%.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131011535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Assessment of Off-The-Shelf Mm Wave Radios for Drone Communications 用于无人机通信的现成毫米波无线电性能评估
Guillermo Bielsa, M. Mezzavilla, Joerg Widmer, S. Rangan
{"title":"Performance Assessment of Off-The-Shelf Mm Wave Radios for Drone Communications","authors":"Guillermo Bielsa, M. Mezzavilla, Joerg Widmer, S. Rangan","doi":"10.1109/WoWMoM.2019.8793001","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793001","url":null,"abstract":"This paper presents experiments to assess and understand the feasibility of millimeter-wave (mmWave) radios for aerial links at low altitude, namely drone communications. In this preliminary study, a Commercial Off-The-Shelf (COTS) mm Wave radio is attached to a DJI Matrice 600 Pro drone. The measurement campaign reveals that while the technology is promising, the range is extremely limited, i.e., approximately 30m. Our analysis shows that the poor range is likely due to low-directionality of today's COTS devices as well as poor rate adaptation in mobile environments. More antennas at both the transmitter and the receiver, along with better 3D beamforming, will be essential to boosting the communication range and thus making this a viable technology for use cases such as high definition real-time monitoring in disaster response scenarios or rapid deployment of multi-Gbps aerial links to expand connectivity in underserved areas.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SafeFlow-x: An Efficient and Complete Strategy for Multiparty Trust Negotiation Over Distributed Networks SafeFlow-x:一种高效完备的分布式网络多方信任协商策略
M. Allouzi, J. Khan
{"title":"SafeFlow-x: An Efficient and Complete Strategy for Multiparty Trust Negotiation Over Distributed Networks","authors":"M. Allouzi, J. Khan","doi":"10.1109/WoWMoM.2019.8792991","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792991","url":null,"abstract":"Multiparty Trust Negotiation (MTN) is an emerging methodology for establishing trust between peers by gradually requesting and disclosing digitally signed credentials. However, a MTN strategy must be utilized to search for a successful negotiation based on the Access Control Policies (ACP). Previous work in this area focused on establishing trust between two parties (ATN), yet real life scenarios involved more than two parties in the negotiation process. Even if multiparty is involved, the Access Control Policies (ACP)proposed are either Identity based Access control policies (IBAC)as well as static policies, where the client has no say in decisions, like in the single sign-on systems, Shibboleth [11], and OpenID [14]; or the process is state full and has a high communication cost like in Zhang and Winslett work [9]. This paper provides a formal definition for the multiparty trust negotiation problem and proposes a novel MTN strategy, SafeFlow-$x$. SafeFlow-x is a stateless, safe, efficient and complete strategy. In the worst case, its communication complexity is $O(n)$, where $n$ is the total number of credentials requested, and its computational complexity is $O(k)$, where $k$ is the total size of peer's ACP when no cyclic dependencies occur.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Variable Length Address Assignment Scheme for 6LoWPAN 一种6LoWPAN的变长地址分配方案
C. Hickman, Feng Wang
{"title":"A Variable Length Address Assignment Scheme for 6LoWPAN","authors":"C. Hickman, Feng Wang","doi":"10.1109/WoWMoM.2019.8793025","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793025","url":null,"abstract":"Low-Power and Lossy Networks (LLNs) are an enabling technology for many Internet of Things (IoT) applications. To allow LLNs to interoperate with the Internet, an address autoconfiguration protocol must be used to assign network addresses. However, the potentially vast number of IoT devices puts a massive strain on IP addressing. In this paper, we present a variable-length address allocating scheme for 6LoWPAN. Our analysis and evaluation results show that the proposed variable-length addresses could guarantee the scalability property of hierarchical addressing, and alleviate the inefficiency of address space due to fixed-length addresses.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129109732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Expressive Data-Centric Multicast on RPL in Low-Power Networks 低功耗网络RPL中表达性数据中心组播
J. Oostvogels, Stefanos Peros, Stéphane Delbruel, D. Hughes
{"title":"Expressive Data-Centric Multicast on RPL in Low-Power Networks","authors":"J. Oostvogels, Stefanos Peros, Stéphane Delbruel, D. Hughes","doi":"10.1109/WoWMoM.2019.8793007","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793007","url":null,"abstract":"Applications for the Internet of Things (IoT)are often data-centric. Data-centric routing then enables messages to reach relevant consumers while avoiding flooding and explicit resource discovery. This kind of routing thus provides energy savings as well as a convenient programming abstraction: messages can be addressed to nodes that advertise features matching a constraint. In low-power wireless mesh networks, such feature-oriented routing traditionally relies on costly and inflexible network overlays. Recent work establishes lightweight support for diverse data-centric traffic patterns, but sacrifices expressiveness of feature-oriented functionality and hence applicability. It is also unclear whether the energy consumption advantages offered by data-centric routing extend to this new lightweight approach. To address these concerns, this paper introduces the SMRFET system. SMRFET improves the expressiveness of state-of-the-art feature-oriented routing by supporting numeric rather than binary features. The system integrates data-centric functionality into group-based multicast and thus adds only a small amount of overhead: experiments show that SMRFET significantly reduces the required amount of message passing relative to alternative systems for group communication. Additionally, SMRFET can be reconfigured to handle memory constraints: its performance degrades gracefully as the amount of memory allocated to it decreases. SMRFET therefore brings lightweight and expressive group communication to the wireless IoT.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Strategies for Network Slicing Negotiation in a Dynamic Resource Market 动态资源市场下的网络切片协商策略
Alessandro Lieto, Eugenio Moro, Ilaria Malanchini, Silvio Mandelli, A. Capone
{"title":"Strategies for Network Slicing Negotiation in a Dynamic Resource Market","authors":"Alessandro Lieto, Eugenio Moro, Ilaria Malanchini, Silvio Mandelli, A. Capone","doi":"10.1109/WoWMoM.2019.8792999","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792999","url":null,"abstract":"One of the disruptive innovations introduced by 5G networks is the opportunity for a new group of stakeholders to be actively involved in the management of network slices with the role of tenants. This allows to go beyond the user-centric QoS paradigm of 4G, and to include tools for handling the aggregate performance of multiple services and user groups and to focus on slice resource management, also at the new 5G NR interface. So far, research efforts have privileged a first solution based on the concept of isolation between slices. However, proposed solutions are not particularly efficient due to the loss of pooling gains, and not very reliable due to variable channel conditions that with slice limited resources make performance not easily predictable. We propose a slice management framework where the shared resources are negotiated by tenants in a real-time market based on slice instantaneous demands. Our model, based on game theory, allows tenants to optimize their service strategies acquiring resources when and where it is necessary, according to the level of quality and reliability requested by the specific traffic types they handle. In this paper, we focus on modeling the game theoretical framework and on characterizing its equilibria in a multi-tenant scenario.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries 物联网和互联网暴露风险:使用Shodan查询进行风险评估
Areej Albataineh, I. Alsmadi
{"title":"IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries","authors":"Areej Albataineh, I. Alsmadi","doi":"10.1109/WoWMoM.2019.8792986","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792986","url":null,"abstract":"Since its introduction several years ago, Shodan has been used in several research projects related to security assessment of IoT devices publicly facing the Internet. Despite the fact that many of the queries that can expose those devices are publicly known, yet subsequent assessments continue to indicate the existence of instances of those vulnerabilities. In this paper, we conducted a remote security assessment based on an extended dataset from original public Shodan queries (with known terms to expose vulnerabilities). Based on our own assessment for the terms in the public Shodan queries, we updated the list to cover other important query terms that were reported for remote back-door access. Results showed that many of those public queries in the original Shodan list can still exploit several systems and devices facing the Internet. Similarly, many of the newly added queries indicate existing vulnerabilities in some live systems in the US in particular and also worldwide. Vulnerabilities related to default or trivial passwords in IoT devices were reported in SHINE and other assessment projects. Nonetheless, many of those vulnerabilities that are easy to fix, still exist in publicly visible IoT devices.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信