{"title":"D2CyberSoft: A design automation tool for soft error analysis of Dependable Cybercars","authors":"Arslan Munir, F. Koushanfar","doi":"10.1109/CCNC.2016.7444823","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444823","url":null,"abstract":"Next generation of automobiles (also known as cybercars) will escalate the proliferation of electronic control units (ECUs) to implement novel distributed control applications such as steer-by-wire (SBW), brake-by-wire, etc. Although the use of electronic embedded systems improves performance, driving comfort, safety, and economy for the customer; this electronic control of automotive systems makes these systems susceptible to soft errors, which can significantly reduce the availability of these systems. Enhancing reliability and availability at a minimum additional cost is a major challenge in automotive systems design. In this paper, we propose D2CyberSoft-a design automation tool for cybercars that facilitate cybercar designers in selecting designs with minimum cost overhead to make safety-critical automotive functions less vulnerable to soft errors. D2CyberSoft aids designers by providing built-in models, easy to specify inputs, and easy to interpret outputs. We elaborate Markov models that form the basis of D2CyberSoft using SBW as a case study. We further provide evaluation insights obtained from D2CyberSoft.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering key moments in social media streams","authors":"C. Buntain, Jimmy J. Lin, J. Golbeck","doi":"10.1109/CCNC.2016.7444808","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444808","url":null,"abstract":"This paper introduces a general technique, called LABurst, for identifying key moments, or moments of high impact, in social media streams without the need for domain-specific information or seed keywords. We leverage machine learning to model temporal patterns around bursts in Twitter's unfiltered public sample stream and build a classifier to identify tokens experiencing these bursts. We show LABurst performs competitively with existing burst detection techniques while simultaneously providing insight into and detection of unanticipated moments. To demonstrate our approach's potential, we compare two baseline event-detection algorithms with our language-agnostic algorithm to detect key moments across three major sporting competitions: 2013 World Series, 2014 Super Bowl, and 2014 World Cup. Our results show LABurst outperforms a time series analysis baseline and is competitive with a domain-specific baseline even though we operate without any domain knowledge. We then go further by transferring LABurst's models learned in the sports domain to the task of identifying earthquakes in Japan and show our method detects large spikes in earthquake-related tokens within two minutes of the actual event.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leaky streams: Identifying variable bitrate DASH videos streamed over encrypted 802.11n connections","authors":"Andrew Reed, Benjamin Klimkowski","doi":"10.1109/CCNC.2016.7444944","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444944","url":null,"abstract":"In recent years, Dynamic Adaptive Streaming over HTTP (DASH) has become the primary method to deliver video on the Internet, with Netflix currently leading the industry. Thus, any method to determine the content of a wireless Netflix stream presents a potential privacy concern for the entire DASH industry. In this paper, we demonstrate that it is possible to identify the Netflix video being streamed over an encrypted 802.11n connection with high accuracy in less than five minutes. Moreover, our technique works in scenarios where it is difficult to capture data frames due to a wireless access point's use of enhancements such as beamforming and multi-input/multi-output transmission.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129933853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahra Movahedi, Sylvain Cherrier, Y. Ghamri-Doudane
{"title":"BeC3: A Crowd-centric composition testbed for the Internet of Things","authors":"Zahra Movahedi, Sylvain Cherrier, Y. Ghamri-Doudane","doi":"10.1109/CCNC.2016.7444764","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444764","url":null,"abstract":"With the emergence of IoT devices, such as smartphones, temperature and light devices, etc., the ways of creating IoT applications has changed. IoT applications are often created and managed by a set of central points (orchestration) for different users. However, users may desire to create and manage their own applications based on their own logic in a decentralized way (choreography). Hence, in this paper, we demonstrate BeC3, a tool for creating and deploying Crowd-based applications using the choreography method. BeC3 is based on D-LiTE, a lightweight RESTful virtual machine designed for IoT devices. The users could then compose the D-LiTe-enabled devices using the BeC3 tool. BeC3 provides a simple and intuitive way to compose interaction between IoT components.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129878960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of HCCA utilizing capture effect to support high QoS and DCF friendliness","authors":"M. Kanda, J. Katto, T. Murase","doi":"10.1109/CCNC.2016.7444802","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444802","url":null,"abstract":"With increase of mobile wireless LAN systems, frequency contamination by the overlapping basic service set (OBSS) becomes a critical issue. In this paper, we focus on HCF controlled channel access (HCCA) to alleviate the OBSS problem. HCCA considers single BSS (SBSS) environment only and suppresses traffic of co-existing DCF (distributed coordination function) based WiFi access points (APs). We propose two methods that utilize capture effects to improve the coexistence capability with DCF networks, that we call “DCF friendliness”. The first method adjusts transmission timing in HCCA WLAN by applying inter-AP coordination. The second method enables simultaneous communication with surrounding DCF WLANs by changing the frame interval of HCCA to “DIFS+1 SlotTime.” Simulations show that both the proposed method can achieve higher throughput and better DCF friendliness.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"54 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanjeeb Shrestha, Gengfa Fang, E. Dutkiewicz, Xiaojing Huang
{"title":"Effect of CSI quantization on the average rate in MU-MIMO WLANs","authors":"Sanjeeb Shrestha, Gengfa Fang, E. Dutkiewicz, Xiaojing Huang","doi":"10.1109/CCNC.2016.7444893","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444893","url":null,"abstract":"In Multi-User Multiple Input Multiple Output (MU-MIMO) Wireless Local Area Networks (WLANs), the optimal-solution such as Dirty Paper Coding (DPC) or the sub-optimal solution Zeroforcing Beamforming (ZFB) with perfect Channel State Information (CSI), is practically limited due to the complexity and the non-availability of perfect CSI at the Access Points (APs)/transmitters. In such a context, ZFB based on channel quantization available at the APs (ZFQ) is the obvious choice for the Multi-User transmission strategy. However, since the quantized CSI is used instead of the perfect CSI at the APs, the quantization error and its impact on the average rate for ZFQ have to be quantified in MU-MIMO WLAN settings. In this paper, we derive a closed-form expression for the upper bound of the channel quantization error and the average rate reduction due to the quantization error with respect to the perfect CSI at the APs. In MU-MIMO WLAN settings, our analytical and numerical studies show that, with an increasing number of antennas at the clients, both the quantization error bound and the average rate reduction increase for ZFQ, in comparison to the ZFB with the perfect CSI.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takashi Kamimoto, Kenta Mori, Sayaka Umeda, Yuri Ohata, H. Shigeno
{"title":"Cache protection method based on prefix hierarchy for content-oriented network","authors":"Takashi Kamimoto, Kenta Mori, Sayaka Umeda, Yuri Ohata, H. Shigeno","doi":"10.1109/CCNC.2016.7444816","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444816","url":null,"abstract":"Cache pollution attack is one of the prominent problems for Named Data Networking (NDN). Attackers pollute a cache of NDN by contents which are not popular among normal users. Normal users take more time to obtain contents due to the attack. There are some countermeasures against cache pollution attack in NDN, but most of them focus on full content names. Using full names needs a large amount of storage cost. In this paper, we propose a cache protection method against cache pollution attack based on hierarchy of content name prefixes in Named Data Networking (CPMH). CPMH can defend caches from malicious users and alleviate the influence of attack after detecting it. The purpose of CPMH is maintaining the accessibility of normal users to obtain contents. CPMH alleviates cache hit ratio degradation caused by attack. In CPMH, each router identifies the prefixes of contents requested by attackers based on hierarchy of content name prefixes and protects its own cache. We compare CPMH with the related work by simulation. As a result, we confirm the effectiveness of CPMH against cache pollution attack.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121645988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Train ticket gate system employing optical wireless communications","authors":"Khemry Khourn, Jiang Liu, S. Shimamoto","doi":"10.1109/CCNC.2016.7444790","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444790","url":null,"abstract":"This paper presents a novel ticket gate system employing optical wireless communication used at a train station in Japan. The proposed system needs two optical wireless card readers attached to two inner sides of the gate. According to our study, we found that the proposed system has higher received power compared to the conventional train ticket gate system. It also has higher probability of success as long as the communication distance is less than 0.28 meters. As a result, the proposed system has a better performance compared to the conventional one and its availability is guaranteed.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131679300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Filip Lemic, V. Handziski, G. Caso, L. D. Nardis, A. Wolisz
{"title":"Enriched Training Database for improving the WiFi RSSI-based indoor fingerprinting performance","authors":"Filip Lemic, V. Handziski, G. Caso, L. D. Nardis, A. Wolisz","doi":"10.1109/CCNC.2016.7444904","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444904","url":null,"abstract":"The interest for RF-based indoor localization, and in particular for WiFi RSSI-based fingerprinting, is growing at a rapid pace. This is despite the existence of a trade-off between the accuracy of location estimation and the density of a laborious and time consuming survey for collecting training fingerprints. A generally accepted concept of increasing the density of a training dataset, without an increase in the amount of physical labor and time needed for surveying an environment for additional fingerprints, is to leverage a propagation model for the generation of virtual training fingerprints. This process, however, burdens the user with an overhead in terms of implementing a propagation model, defining locations of virtual training fingerprints, generating virtual fingerprints, and storing the generated fingerprints in a training database. To address this issue, we propose the Enriched Training Database (ETD), a web-service that enables storage and management of training fingerprints, with an additional “enriching” functionality. The user can leverage the enriching functionality to automatically generate virtual training fingerprints based on propagation modeling in the virtual training points. We further propose a novel method for defining locations of virtual training fingerprints based on modified Voronoi diagrams, which removes the burden of defining virtual training points manually and which automatically “covers” the regions without sufficient density of training fingerprints. The evaluation in our testbed shows that the use of automated generation of virtual training fingerprints in ETD results in more than 25% increase in point accuracy and 15% in room-level accuracy of fingerprinting.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134350801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor localization using FM and DVB-T signals","authors":"Roberto Carvalho, Shangyi Yang, Yao-Hua Ho, Ling-Jyh Chen","doi":"10.1109/CCNC.2016.7444902","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444902","url":null,"abstract":"Indoor localization systems aim to accurately and cost-effectively locate targets. While numerous indoor localization solutions based on Wi-Fi, Bluetooth, ZigBee and other technologies have been proposed, they fail to achieve satisfactory performance. The accuracy of these solutions is often affected by obstacles such as shelf, human etc; due to the hight frequency of the signals, which weaken the ability of signals to penetrate obstacles. Moreover, high accuracy comes at the expense of more hardware, labor-expensive deployment. To overcome these limitations, we propose an indoor localization system based on Software Defined Radio (SDR), using FM and DVB-T signals. Our system achieves sub-meter accuracy at low cost with low site survey overhead. Additionally, we investigate the temporal and window effect on different sizes of training data.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116985909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}