Arnaud Oglaza, R. Laborde, P. Zaraté, A. Benzekri, F. Barrère
{"title":"Difficulties to enforce your privacy preferences on Android? Kapuer will help you","authors":"Arnaud Oglaza, R. Laborde, P. Zaraté, A. Benzekri, F. Barrère","doi":"10.1109/CCNC.2016.7444795","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444795","url":null,"abstract":"Smartphones and mobile computing have changed our world and we are now over connected. Millions of applications are available to help us in every way possible. However applications can collect data from users for different purposes. Many private data are used to profile users. How to control privacy in this environment? We propose a system called Kapuer that improves the management of applications permissions on Android by combining access control and decision support. We present in this article the Android implementation of Kapuer.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandesh Uppoor, Cezary Ziemlicki, Stefano Secci, Z. Smoreda
{"title":"On mobile traffic distribution over cellular backhauling network nodes","authors":"Sandesh Uppoor, Cezary Ziemlicki, Stefano Secci, Z. Smoreda","doi":"10.1109/CCNC.2016.7444869","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444869","url":null,"abstract":"The rapid growth of mobile traffic and the emergence of advanced mobile services and infrastructures are shifting significant attention toward the cellular network back-hauling infrastructure. At this network segment, there is a growing interest in understanding spatio-temporal mobile traffic distributions at different network levels, in order to better define flexible networking solutions for forthcoming smart 5G infrastructures including, for instance, mobile edge computing features. In this work we study these aspects and characterize the load on cellular access networks using real-world anonymized subscriber data, from the Lyon metropolitan area in France, providing statistical distribution to the research community. We find that the traffic distribution at Node-B level is best fit by a Weibull distribution, and that at the radio network aggregation it is best fit by a hybrid Weibull-Pareto distribution.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"160 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed S. Abdalzaher, Karim G. Seddik, O. Muta, A. A. El-Rahman
{"title":"Using Stackelberg game to enhance node protection in WSNs","authors":"Mohamed S. Abdalzaher, Karim G. Seddik, O. Muta, A. A. El-Rahman","doi":"10.1109/CCNC.2016.7444900","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444900","url":null,"abstract":"In this paper, we propose a game-theoretic protection model for Wireless Sensor Network (WSN) nodes within a cluster based on a Stackelberg game. The proposed game approach is developed for two different attack-defense scenarios. In the first scenario, the attacker selects to attack a group of nodes that have a protection degree below a specific threshold. In the second scenario, the attacker targets the nodes that have been reported to be least protected in the previous round. Simulation results indicate the improved performance of the proposed protection model as compared to the no-defense case.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anders Lindgren, F. Abdesslem, B. Ahlgren, O. Schelén, A. Malik
{"title":"Design choices for the IoT in Information-Centric Networks","authors":"Anders Lindgren, F. Abdesslem, B. Ahlgren, O. Schelén, A. Malik","doi":"10.1109/CCNC.2016.7444905","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444905","url":null,"abstract":"This paper outlines the tradeoffs involved in utilizing Information-Centric Networking (ICN) for Internet of Things (IoT) scenarios. It describes contexts and applications where the IoT would benefit from ICN, and where a host-centric approach would be better. Requirements imposed by the heterogeneous nature of IoT networks are discussed in terms of connectivity, power availability, computational and storage capacity. Design choices are then proposed for an IoT architecture to handle these requirements, while providing efficiency and scalability. An objective is to not require any IoT specific changes of the ICN architecture per se, but we do indicate some potential modifications of ICN that would improve efficiency and scalability for IoT and other applications.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130580888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Non Destructive Interference based receiver-initiated MAC protocol for wireless sensor networks","authors":"Ye Liu, Qi Chen, Hao Liu, Chen Hu, Qing Yang","doi":"10.1109/CCNC.2016.7444932","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444932","url":null,"abstract":"Non-destructive concurrent transmissions recently attract widespread attention in wireless sensor networks research community, and many studies demonstrate that non-destructive interference in concurrent transmissions enables routing-free packet transmission with low latency and increased reliability. In this paper, we present a new MAC protocol, called Non-Destructive Interference MAC (NDI-MAC), that integrates non-destructive simultaneous transmissions into receiver-initiated protocols, achieving energy efficient and low latency data transmission under a variety of traffic loads. The capture effect is exploited in NDI-MAC to finish rendezvous between multiple senders and receivers. NDI-MAC also relies on triggercast, a distributed middleware to trigger synchronous packet transmissions with constructive interference. So as to ensure single-hop reliability, backcast primitive is used under unicast traffic. Evaluation results show that NDI-MAC achieves high performance in terms of energy consumption and data delivery latency under data dissemination and collection traffic.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Cyber Physical social Systems for smart cities: A semantic web perspective","authors":"A. Costanzo, A. Faro, D. Giordano, C. Spampinato","doi":"10.1109/CCNC.2016.7444777","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444777","url":null,"abstract":"Aim of the paper is to give a demonstration of the main Cyber-Physical-Systems (CPSs) and social networking facilities used to implement an ubiquitous city platform called Wi-City-Plus provided with mobile and centralized decision support systems (DSSs) taking advantage of all the data of city interest, including social data, and those sensed by networked monitoring devices. In particular, the paper adopts a semantic web approach that allow us to model such data by a suitable ontology specifically designed to support the main user scenarios in smart cities and to implement both the technical interoperability and the service integration envisaged by the CPS ideal model.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124988547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antônio A. M. Maia, Leandro T. C. Melo, Fernando Magno Quintão Pereira, O. V. Neto, Leonardo B. Oliveira
{"title":"SMOV: Array Bound-Check and access in a single instruction","authors":"Antônio A. M. Maia, Leandro T. C. Melo, Fernando Magno Quintão Pereira, O. V. Neto, Leonardo B. Oliveira","doi":"10.1109/CCNC.2016.7444872","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444872","url":null,"abstract":"A Buffer Overflow (BOF) continues to be among the top open doors to worms and malware. Earlier in 2014, the security world was taken by surprise when researches unveiled a BOF in OpenSSL. Languages like C and C++, widely used for system development and for a large variety of applications, do not provide native Array-Bound Checks (ABC). A myriad of proposals endeavor memory protection for such languages by employing both software- and hardware-based solutions. Due to numerous reasons, none of them have yet reached the mainstream. In this work we propose a novel approach to achieve an array bound-check and a memory access (when allowed) within a single instruction. We discuss how it can be implemented on variable-length ISAs and provide a reference implementation. Our results indicate that our solution can run programs 1,79× faster than the software-based approach.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115285386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstration of a joint power harvesting and communication technology for smartphone centric ubiquitous sensing applications","authors":"Ranjana Joshi, H. Nie","doi":"10.1109/EIT.2015.7293351","DOIUrl":"https://doi.org/10.1109/EIT.2015.7293351","url":null,"abstract":"With the popularization of smartphones, various smartphone centric ubiquitous sensing applications have emerged, which use a smartphone in conjunction with external sensors for data acquisition, processing, display, communication, and storage. Because smartphones do not have a universal data interfaces, many ubiquitous sensing applications use the earphone and the microphone channels of the 3.5mm audio interface for data communications so that they can work with different types of smartphones. The earphone channels of the 3.5mm audio interface can only send AC signal out of a smartphone, and hence DC power needs to be harvested from the earphone channels. In this demonstration, a joint power harvesting and communication technology to harvest double or more power from both earphone channels (instead of one earphone channel) without affecting data communications is demonstrated with a prototype system, which can power external a microcontroller and sensors through the 3.5mm audio interface of a smartphone, display sensor measurement results on the smartphone, and control the outputs of the microcontroller from the smartphone.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Bronzino, Dragoslav Stojadinovic, C. Westphal, D. Raychaudhuri
{"title":"Exploiting network awareness to enhance DASH over wireless","authors":"F. Bronzino, Dragoslav Stojadinovic, C. Westphal, D. Raychaudhuri","doi":"10.1109/CCNC.2016.7444942","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444942","url":null,"abstract":"The introduction of Dynamic Adaptive Streaming over HTTP (DASH) helped reduce the consumption of resources in video delivery, but its client-based rate adaptation is unable to optimally use the available end-to-end network bandwidth. We consider the problem of optimizing the delivery of video content to mobile clients while meeting the constraints imposed by the available network resources. Observing the bandwidth available in the network's two main components, core network, transferring the video from the servers to edge nodes close to the client, and the edge network, which is in charge of transferring the content to the user via wireless links, we aim to find an optimal solution by exploiting the predictability of future user requests of sequential video segments, as well as the knowledge of available infrastructural resources at the core and edge wireless networks in a given future time window. Instead of regarding the bottleneck of the end-to-end connection as our throughput, we distribute the traffic load over time and use intermediate nodes between the server and the client for buffering video content to achieve higher throughput, and ultimately significantly improve the Quality of Experience for the end user in comparison with current solutions.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Wang, A. Sathiaseelan, J. Crowcroft, J. Kangasharju
{"title":"LiteLab: Efficient large-scale network experiments","authors":"Liang Wang, A. Sathiaseelan, J. Crowcroft, J. Kangasharju","doi":"10.1109/CCNC.2016.7444732","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444732","url":null,"abstract":"Novel network systems need to be carefully evaluated before their actual deployments in developing regions. However, large-scale network experiment is a challenging task. Simulations, emulations, and real-world testbeds all have their advantages and disadvantages. In this paper we present LiteLab, a light-weight platform specialized for large-scale networking experiments. We cover in detail its design, key features, and architecture. We also perform an extensive evaluation of Lite-Lab's performance and accuracy and show that it is able to both simulate network parameters with high accuracy, and also able to scale up to very large networks. LiteLab is flexible, easy to deploy, and allows researchers to perform large-scale network experiments with a short development cycle. We have used LiteLab for many different kinds of network experiments and are planning to make it available for others to use as well.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"20 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}