{"title":"Energy-Efficient HTTP Adaptive Streaming with Hybrid TCP/UDP Over Heterogeneous Wireless Networks","authors":"Yunmin Go, Hyunmin Noh, Goeon Park, Hwangjun Song","doi":"10.1109/WoWMoM.2019.8793028","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793028","url":null,"abstract":"In this work, we propose an energy-efficient HTTP adaptive streaming with hybrid TCP/UDP over heterogeneous wireless networks. Unlike the existing HTTP adaptive streaming system, the proposed system can utilize both TCP and UDP to overcome the performance degradation problem of TCP and improve the energy efficiency. The proposed system handles the types of transport protocols, requested video quality, and amount of data received through each wireless network as control variables based on network conditions, buffer occupancy, and energy condition of mobile terminal. When UDP is selected, the proposed system employs Raptor code as a forward error correction scheme to support a reliable data delivery, and adaptively chooses the proper Raptor code parameters such as symbol size and amount of redundant data, and requests redundant data from the server to reduce the overhead. The proposed system is fully implemented in an Android-based mobile terminal and tested in real WiFi and LTE networks. The experiment results show that the proposed system can achieve good energy efficiency while providing a seamless high-quality HTTP adaptive streaming service.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Hofbauer, Christoph Schmittner, Manuela Brandstetter, Markus Tauber
{"title":"Autonomous CPS Mobility Securely Designed","authors":"David Hofbauer, Christoph Schmittner, Manuela Brandstetter, Markus Tauber","doi":"10.1109/WoWMoM.2019.8793050","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793050","url":null,"abstract":"In the last years the interconnection and ongoing development of physical systems combined with cyber resources has led to increasing automation. Through this progress in technology, autonomous vehicles, especially autonomous trains are getting more attention from industry and are already under test. The use of autonomous trains is known for increasing operation efficiency and reduction of personnel and infrastructure costs, which is mostly considered for main tracks. However, for less-used secondary lines, autonomous trains and their underlying sensor infrastructure are not yet considered. Thus, a system needs to be developed, which is less expensive for installation and operation of these trains and underlying infrastructure for secondary lines. Therefore, this position paper describes the process of how to derive an approach to help develop a digital interlocking system at design time for the use with secondary railway lines. In this work, we motivate the necessary research by investigating gaps in existing work as well as presenting a possible solution for this problem, a meta-model. The model considers safety, security as well as interoperability like 5G and socio-technical aspects to provide a holistic modeling approach for the development of the interlocking system for industrial secondary line use cases.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)","authors":"Isaac J. Jensen, D. Selvaraj, P. Ranganathan","doi":"10.1109/WoWMoM.2019.8793027","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793027","url":null,"abstract":"Unmanned Aerial Vehicle (UAV) technology is quickly growing with a wide range of current and planned future applications. As the technology grows in usage, the data gathered by UAV systems as well as the UAVs themselves will become bigger targets for cyber-attacks. New cyber security technologies, such as the immutable ledger technology known as blockchain, should therefore be applied to provide a defense against the growing threat of cyber-attacks. This paper explores blockchain technology, first through a general overview of its components and characteristics, and then at what security improvements it can provide to a system. Following this exploration, the application of blockchain to a UAV swarm environment is briefly expanded on. Lastly, one such blockchain framework known as Hyperledger Fabric is explored, that could potentially be applied to a swarm of UAVs to increase its security.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VL-ROUTE: A Cross-Layer Routing Protocol for Visible Light Ad Hoc Network","authors":"Jithin Jagannath, T. Melodia","doi":"10.1109/WoWMoM.2019.8793030","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793030","url":null,"abstract":"Visible Light Ad Hoc Networks (LANETs)is being perceived as an emerging technology to complement Radio Frequency (RF)based ad hoc networks to reduce congestion in the overloaded RF spectrum. LANET is intended to support scenarios requiring dense deployment and high data rates. In Visible Light Communication (VLC), most of the attention has been centered around physical layer with emphasis on point-to-point communication. In this work, we focus on designing a routing protocol specifically to overcome the unique challenges like blockage and deafness that render routes in LANETs highly unstable. Therefore, we propose a cross-layer optimized routing protocol (VL-ROUTE)that interacts closely with the Medium Access Control (MAC)layer to maximize the throughput of the network by taking into account the reliability of routes. To accomplish this in a distributed manner, we carefully formulate a Route Reliability Score (RRS)that can be computed by each node in the network using just the information gathered from its immediate neighbors. Each node computes an RRS for every known sink in the network. RRS of a given node can be considered as an estimate of the probability of reaching a given sink via that node. The RSS value is then integrated to the utility based three-way handshake process used by the MAC protocol (VL-MAC)to mitigate the effects of deafness, blockage, hidden node, and maximize the probability of establishing full-duplex links. All these factors contribute towards maximizing the network throughput. Extensive simulation of VL-ROUTE shows 124% improvement in network throughput over a network that uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)along with shortest path routing. Additionally, VL-ROUTE also showed up to 21% improvement in throughput over the network that uses VL-MAC along with a geographic routing.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Getting the Most Out of Your VNFs: Flexible Assignment of Service Priorities in 5G","authors":"F. Malandrino, C. Chiasserini","doi":"10.1109/WoWMoM.2019.8792983","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8792983","url":null,"abstract":"Through their computational and forwarding capabilities, 5G networks can support multiple vertical services. Such services may include several common virtual (network)functions (VNFs), which could be shared to increase resource efficiency. In this paper, we focus on the seldom studied VNF-sharing problem, and decide (i)whether sharing a VNF instance is possible/beneficial or not, (ii)how to scale virtual machines hosting the VNFs to share, and (iii)the priorities of the different services sharing the same VNF. These decisions are made with the aim to minimize the mobile operator's costs while meeting the verticals' performance requirements. Importantly, we show that the aforementioned priorities should not be determined a priori on a per-service basis, rather they should change across VNFs since such additional flexibility allows for more efficient solutions. We then present an effective methodology called FlexShare, enabling near-optimal VNF-sharing decisions in polynomial time. Our performance evaluation, using real-world VNF graphs, confirms the effectiveness of our approach, which consistently outperforms baseline solutions using per-service priorities.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132528537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Multi-Hop Forwarding in 6LoWPANs Through Software-Defined Networking","authors":"G. Tanganelli, A. Virdis, E. Mingozzi","doi":"10.1109/WoWMoM.2019.8793044","DOIUrl":"https://doi.org/10.1109/WoWMoM.2019.8793044","url":null,"abstract":"Wireless Sensor Networks (WSNs)play a major role in the expansion of the Internet of Things (IoT)market as they allow the deployment of low cost and low power networks possibly in large areas. The introduction of the 6LoWPAN standard allowed WSN to move into the IPv6 era, with a seamless integration of sensors into external networks. The recent application of IoT in industrial systems is now introducing new traffic patterns - machine to machine (M2M)above the others - and communication challenges that can modify the classical multipoint-to-point pattern of WSN, having the sink as the root of every communication. To solve these problems, we propose an architecture to enable an efficient and controlled multi-hop forwarding over 6LoWPANs. We base our approach on the standard 6LoWPAN protocol stack and we exploit the Software Defined Networking paradigm to achieve network reconfigurability. We evaluate the performance of our architecture in a simulated environment, with both multipoint-to-point and M2M traffic, and we demonstrate its feasibility in a real testbed.","PeriodicalId":372377,"journal":{"name":"2019 IEEE 20th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"15 S1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}