{"title":"Hybrid cellular-MANETs: An energy-aware routing design","authors":"Chenyu Zheng, Lijun Chen, D. Sicker","doi":"10.1109/WONS.2014.6814716","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814716","url":null,"abstract":"It is well-recognized that our dependence on mobile communications grows; however, users of wireless devices may encounter inadequate coverage due to a variety of shortage and outage circumstances. This is an especially urgent issue in disaster areas where the access to outside world is critical for rescue operations. In this paper, we present a self-organizing communication framework for extending wireless coverage for mobile devices, without requiring modifications of existing wireless infrastructures. Participating devices form a hybrid cellular - mobile ad hoc network, relaying data off net through the nodes that have cellular connections. We design a low-complexity, energy-aware, multi-path data routing mechanism for this frame-work. The proposed routing includes two major components: a baseline routing that includes a locally reactive and hence low-complexity routing sub-component to handle mobility; and an energy-aware multi-path routing that is motivated by an energy optimization problem and uses only local information. Packet-level simulations show that the proposed routing scheme achieves good performance in delay, packet delivery, and energy consumption. In addition, we implement this framework on Android devices and conduct phone-in-the-loop emulations. The results from the emulation show that the proposed routing scheme can achieve more efficient energy utilization.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LEDBAT performance in sub-packet regimes","authors":"Ioannis Komnios, A. Sathiaseelan, J. Crowcroft","doi":"10.1109/WONS.2014.6814738","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814738","url":null,"abstract":"Wireless Community Networks in the developing world satisfy the basic needs of remote users to information access. However, community networks in developing regions usually rely on low-bandwidth backhaul links that are shared amongst a large user base, driving these links to sub-packet regimes where the per-flow throughput is less than one packet per RTT. TCP performance significantly degrades in such conditions, resulting in severe unfairness and high packet loss rates. In this paper, we investigate the performance of scavenger transport methods, namely LEDBAT and its fair modification fLEDBAT, in the sub-packet regime of shared backhaul links in developing regions. Our intention is to explore the feasibility of using such scavenger transport methods for uploading content over bandwidth constrained backhauls. Our findings show that LEDBAT achieves higher link efficiency and fairness compared to TCP in a variety of sub-packet regime scenarios. When TCP and LEDBAT flows share the same link in the sub-packet regime, LEDBAT flows are more aggressive, consuming more resources than TCP. Therefore, we conclude that a more conservative strategy after consecutive timeouts and shared bottleneck detection mechanisms need to be incorporated into the core LEDBAT algorithm, in order to correctly adjust its congestion window in the sub-packet regime.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy savings in opportunistic networks","authors":"S. T. Kouyoumdjieva, G. Karlsson","doi":"10.1109/WONS.2014.6814722","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814722","url":null,"abstract":"A major challenge in mobile wireless devices for opportunistic networks is to minimize the energy consumption. The minimization however should not come at a cost of reduced application throughput (i.e. goodput). This work evaluates the potential performance gains for mobile nodes that adopt a duty-cycling scheme in an opportunistic context. We present an analytical framework for evaluating the energy consumption of nodes based on a probabilistic estimation of effective contact durations, and we validate this framework on a mobility scenario. We further perform extensive trace-driven simulations and demonstrate that a duty-cycling scheme considerably improves the performance of opportunistic content distribution systems by decreasing the energy consumption without significantly affecting the goodput.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Margit Mutschlechner, Bijun Li, R. Kapitza, F. Dressler
{"title":"Using Erasure Codes to overcome reliability issues in energy-constrained sensor networks","authors":"Margit Mutschlechner, Bijun Li, R. Kapitza, F. Dressler","doi":"10.1109/WONS.2014.6814720","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814720","url":null,"abstract":"We study the use of Erasure Codes (ECs) for transmitting information from mobile sensor nodes to stationary base stations. In particular, we are interested in improving the overall communication reliability of the wireless communication. Our scenario is wildlife monitoring in which bats are equipped with tiny sensor nodes, just being capable to store a few kB of data and to exchange information over a wireless communication link. This link is used, on the one hand, for determining contact times between individuals. On the other hand, these contacts are communicated in aggregated form to stationary base stations. Since the channel quality may vary quickly due to the continuous movements of bats and the heterogeneous environment, the communication is in general assumed to be highly unreliable. Conventional reliability improving approaches such as full data replication or on-demand retransmission are too expensive or even not possible due to very strict energy constraints and asymmetric channels. ECs allow to enhance the reliability of data transmissions by transmitting redundant data. In this work, we investigate the trade-off between reliability achieved and the cost in form of additional transmissions, i.e., the additional energy costs. Our results clearly show that ECs improve the communication reliability considerably with almost no impact on the resulting delay.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alvaro Torres, Yusheng Ji, C. Calafate, Juan-Carlos Cano, P. Manzoni
{"title":"V2X solutions for real-time video collection","authors":"Alvaro Torres, Yusheng Ji, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1109/WONS.2014.6814731","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814731","url":null,"abstract":"Quickly identifying the severity of highway acci-dents, as well as the resources required to assist the people involved in those accidents, is a basic requirement for future intelligent transportation systems. In this context, vehicular communication technologies currently being standardized are able to provide novel solutions to address this problem. In this work we study the feasibility of combining vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to deliver a video stream from the place of the accident to the traffic authorities. Our approach relies on vehicles as data relays, thus having the additional advantage of providing drivers with a clear view about the accident, thereby helping to reduce stress and improving traffic flow. An experimental analysis comparing different traffic flooding mechanisms for wireless networks show that the proposed system is viable for highways with moderate/high amounts of traffic, although highlighting the need for more efficient mechanisms specifically addressing broadcast propagation in highway envi-ronments.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Segata, Bastian Bloessl, Stefan Joerer, F. Dressler, R. Cigno
{"title":"Supporting platooning maneuvers through IVC: An initial protocol analysis for the JOIN maneuver","authors":"Michele Segata, Bastian Bloessl, Stefan Joerer, F. Dressler, R. Cigno","doi":"10.1109/WONS.2014.6814733","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814733","url":null,"abstract":"Driving vehicles in platoons has the potential to improve traffic efficiency, increase safety, reduce fuel consumption, and make driving experience more enjoyable. A lot of effort is being spent in the development of technologies, like radars, enabling automated cruise control following and ensuring emergency braking if the driver does not react in time; but these technologies alone do not empower real platooning. The initial idea of building dedicated infrastructures for platoons, has been set aside favouring the philosophy that foresees scenarios, where automated vehicles share the road with human-driven ones. This arises interesting new questions regarding the interactions between the two categories of vehicles. In this paper we focus on the analysis of interferences caused by non-automated vehicles during a JOIN maneuver. We define the application layer protocol to support the maneuver, together with situations that can prevent successful termination, and describe how they can be detected. The validity of the approach is proven by means of simulations, showing either that the maneuver can successfully be performed, or safely be aborted. Finally, we analyze the impact of the Packet Error Rate (PER) on the failure rate of the maneuver, showing that packet losses mainly affect the maneuver from a coordination point of view, rather than stability of the system, i.e., even at high loss rates, cars never violated a minimum safety distance.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124543734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Liberouter: Towards autonomous neighborhood networking","authors":"Teemu Kärkkäinen, J. Ott","doi":"10.1109/WONS.2014.6814739","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814739","url":null,"abstract":"We present the Liberouter framework, a complete communication system design (and its implementation) to enable neighborhood networking without relying on the Internet infrastructure for information exchange. The core is a low-cost router platform that serves as WLAN access points, individual or (dis)connected ones, and offers message storage and relaying in combination with a distributed app store. It allows bootstrapping Android devices to become additional routers (and thus expand the network) and install applications. It also instruments other mobile devices to assist in message forwarding and offers web-based access to content of the neighborhood stored locally.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rest-based sensor networks with OData","authors":"Matthias Thoma, Theofilos Kakantousis, T. Braun","doi":"10.1109/WONS.2014.6814719","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814719","url":null,"abstract":"RESTful services gained a lot of attention recently, even in the enterprise world, which is traditionally more web-service centric. Data centric RESfFul services, as previously mainly known in web environments, established themselves as a second paradigm complementing functional WSDL-based SOA. In the Internet of Things, and in particular when talking about sensor motes, the Constraint Application Protocol (CoAP) is currently in the focus of both research and industry. In the enterprise world a protocol called OData (Open Data Proto-col) is becoming the future RESTful data access standard. To integrate sensor motes seamlessly into enterprise networks, an embedded OData implementation on top of CoAP is desirable, not requiring an intermediary gateway device. In this paper we introduce and evaluate an embedded OData implementation. We evaluate the OData protocol in terms of performance and energy consumption, considering different data encodings, and compare it to a pure CoAP implementation. We were able to demonstrate that the additional resources needed for an OData/JSON implementation are reasonable when aiming for enterprise interoperability, where OData is suggested to solve both the semantic and technical interoperability problems we have today when connecting systems.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing active probing for practical intrusion detection in Wireless Multihop Networks","authors":"R. Carmo, M. Hollick","doi":"10.1109/WONS.2014.6814725","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814725","url":null,"abstract":"Practical intrusion detection in Wireless Multihop Networks (WMNs) is a hard challenge. It has been shown that an active-probing-based network intrusion detection system (AP-NIDS) is practical for WMNs. However, understanding its interworking with real networks is still an unexplored challenge. In this paper, we investigate this in practice. We identify the general functional parameters that can be controlled, and by means of extensive experimentation, we tune these parameters and analyze the trade-offs between them, aiming at reducing false positives, overhead, and detection time. The traces we collected help us to understand when and why the active probing fails, and let us present countermeasures to prevent it.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Norbert Goebel, M. Koegel, M. Mauve, Kalman Graffi
{"title":"Trace-based simulation of C2X-communication using cellular networks","authors":"Norbert Goebel, M. Koegel, M. Mauve, Kalman Graffi","doi":"10.1109/WONS.2014.6814730","DOIUrl":"https://doi.org/10.1109/WONS.2014.6814730","url":null,"abstract":"Simulation of cellular network communication is complex and typically requires a high degree of knowledge about the underlying network and its parameters. At the same time simulating cellular networks is important for the automotive industry in order to be able to test the feasibility of applications that use car-to-x-communication before performing costly field tests. In this paper we propose a trace-based simulation model derived from real-world measurements. It does not require any information about the network besides information that can be readily measured by a regular user, it is much faster than regular simulation, and it has been validated by comparing simulation results to real world measurements.","PeriodicalId":386988,"journal":{"name":"2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)","volume":"32 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125709155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}