Guozi Sun, Siqi Huang, W. Bao, Yitao Yang, Zhiwei Wang
{"title":"A privacy protection policy combined with privacy homomorphism in the Internet of Things","authors":"Guozi Sun, Siqi Huang, W. Bao, Yitao Yang, Zhiwei Wang","doi":"10.1109/ICCCN.2014.6911856","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911856","url":null,"abstract":"Recently, IOT (Internet of Things) develops very rapidly. However, the personal privacy protection is one of directly important factors that impact the large-scale applications of IOT. To solve this problem, this paper proposes a privacy protection policy based on privacy homomorphism. It can protect the security of personal information well by processing the needs of users without acquiring of plaintext. In another aspect, it also greatly improves the performance of the original multiplication homomorphism algorithm.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-bit sensing based target localization (MSTL) algorithm in wireless sensor networks","authors":"Quanlong Li, Qing Yang, Shaoen Wu","doi":"10.1109/ICCCN.2014.6911739","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911739","url":null,"abstract":"Efficient and accurate target localization is one of the most fundamental problems in Wireless Sensor Networks (WSN), and has been studied for several years. Due to its simplicity and low energy consumption, binary sensing model is widely used in the literature to achieve fast target localization but with low accuracy. To improve localization accuracy, we propose a novel multi-bit sensing model where multi-bit information is sent by sensors to report the relative distances between a target and the sensors. Based on this sensing model, a new target localization algorithm is proposed, which can improve localization precision by estimating a targets position within a reduced area. Furthermore, the proposed algorithm works well with irregular sensing boundary caused by noise, channel fading, and obstacles. Simulation results show that the multi-bit sensing based target localization (MSTL) algorithm could improve localization accuracy by 50%.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130820140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN","authors":"Xiang Lan, Sanfeng Zhang","doi":"10.1109/ICCCN.2014.6911724","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911724","url":null,"abstract":"Network coded opportunistic routing (NCOR) is a potential communication paradigm in wireless multi-hop networks (WMN) with lossy links. It leverages the multipath diversity of wireless networks and applies network coding to resist random erasures. Related optimization work minimizing transmission cost or maximizing throughput are based on the collision-free assumption, which either requires perfect schedule of MAC layer or only considers low traffic load and thus few packet collisions will occur. However, the assumption doesn't hold true because real WMNs often need to support content distribution service and bear a high level of traffic load, and 802.11 protocols cannot guarantee an ideal schedule with no collisions. In order to achieve an optimal forwarding rate distribution and reduce conflicting packets, this paper proposes a throughput optimization algorithm which takes into consideration the channel capacity and interference between neighboring nodes. Based on this algorithm, we implement a practical NCOR protocol aiming at achieving maximum throughput named MT-NCOR. Through extensive experiments, we show that MT-NCOR outperforms the state-of-art NCOR protocols in both throughput and total cost, especially in networks backing high traffic loads.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, A. Tokuta
{"title":"Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors","authors":"Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, A. Tokuta","doi":"10.1109/ICCCN.2014.6911787","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911787","url":null,"abstract":"A wireless sensor network is said to form a belt-barrier for a region if it is able to detect any object moving from outside the region to inside. Recently, Cheng and Tsai found if camera sensors are used to form a belt-barrier, the breadth of the barrier becomes an important quality factor to ensure high quality of monitoring (QoM). Then, they proposed the minimum β-breadth belt-barrier construction problem ((β, 1)-B3CP) whose goal is to select a minimum number of camera sensors to form a β-breadth belt-barrier, which ensures the width of the picture of any object which moves through the barrier is at least β. In this paper, we perform more thorough investigation of the problem and introduce a new polynomial time exact algorithm for the problem under the assumption that the angle of each camera is fixed. Our simulation result shows our algorithm outperforms Cheng and Tsai's algorithm. We also introduce a variation of (β, 1)-B3CP, namely (β, k)-B3CP, which aims to construct k node-disjoint β-breadth belt-barrier for fault-tolerance purpose, propose a new heuristic algorithm for it, and conduct simulations to evaluate its performance.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121196329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Age-based cooperative caching in information-centric networking","authors":"Zhongxing Ming, Mingwei Xu, Dan Wang","doi":"10.1109/ICCCN.2014.6911725","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911725","url":null,"abstract":"Information-Centric Networking (ICN) provides substantial flexibility for users. One of the most important features of ICN is the universal in-network caching. The characteristics of ICN make it substantially different from traditional caching systems. In this paper we propose an age-based cooperative caching scheme in response to the special characteristics of ICN. We leverage the coupling between routing and caching in ICN to develop a light-weight collaboration mechanism that adaptively pushes popular contents to the network edge. We evaluate our approach using real traces and realistic network topology. Results show that our approach can significantly reduce network delay and traffic, and outperforms existing schemes.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach","authors":"Jun Huang, Yanxiao Zhao, K. Sohraby","doi":"10.1109/ICCCN.2014.6911738","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911738","url":null,"abstract":"Device-to-Device (D2D) communication is envisioned as a promising technology to significantly improve the performance of current cellular infrastructures. Allocating resources to the D2D link, however, raises an enormous challenge to the co-existing D2D and cellular communications due to mutual interference. While there have been many resource allocation solutions proposed for D2D underlaying cellular network, they have primarily focused on the intracell scenario while leaving the intercell settings untouched. In this paper, we investigate the resource allocation problem for intercell D2D communications underlaying cellular networks, where D2D link is located in the overlapping area of two neighboring cells. We present three inter-cell D2D scenarios regarding the resource allocation problem. To address this problem, we develop a repeated game model under these scenarios. Distinct from existing works, we characterize the communication infrastructure, namely Base Stations (BSs), as players competing resource allocation quota for D2D demand, and define the utility of each player as the payoff from both cellular and D2D communications using radio resources. We also propose a resource allocation algorithm and protocol based on the equilibrium derivations. Numerical results indicate that the developed model not only significantly enhances the system performance including sum rate and sum rate gain, but also sheds lights on resource configurations for intercell D2D scenarios.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-attribute routing protocol for opportunistic network environments","authors":"Sadaf Yasmin, R. N. B. Rais, A. Qayyum","doi":"10.1109/ICCCN.2014.6911876","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911876","url":null,"abstract":"In opportunistic networks, nodes hold packets in permanent storage and make independent routing decisions on sporadically emerging links. This helps to achieve connectivity even if an end-to-end contemporaneous path does not exist between a pair of nodes. Next-hop decision is generally dependent on future probability of encounters with a destination node while other constraints on nodes' resources are ignored. We argue, in this paper that considering multiple parameters related to destination dependent and independent characteristics of a node, while determining its next-hop fitness, can help achieve better performance in resource-stringent opportunistic network environments. Our proposed routing protocol, MARS, not only gets itself cognizant of mobility patterns present within the network but also combines these mobility patterns with other stochastic information about nodes' characteristics. With the help of simulations, we show that MARS is able to achieve high delivery rates and comparable end-to-end latency with well-known routing protocols while maintaining its overhead to a significantly low limit.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel assignment based on conflict-area for reducing interference in large-scale WLANs","authors":"Wenqi Sun, Hewu Li, Jianping Wu","doi":"10.1109/ICCCN.2014.6911872","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911872","url":null,"abstract":"Using unlicensed spectrums is a key factor in popularity of WLANs. Meanwhile, the interference is becoming severer in coming time because of network expansion. Assigning channels for AP in distributed way only reduce interference around single AP rather than reducing system interference. However systematic optimizations usually require real-time information which increase complexity for applying. This paper identifies a idea for optimizing system interference from the view of several sub-areas. Actually, interferences spread regionally depending on signal propagation. Conflict-areas are divided according to the interfering range. We define an index to present interference in conflict-areas and the goal is to minimize maximum index of the areas. It means that interferences of the whole network are comparatively low and distributed evenly. Both the theoretical evaluation and experiments in real network show that the conflict-area method is reasonable. Average interferences in most conflict-areas under experiments are reduced (about 50%) or remain unchanged (about 40%).","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"3 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote speakers: Big data science and social networks — Accelerating insights and building value","authors":"A. Choudhary, John C.S. Lui, K. Ross","doi":"10.1109/ICCCN.2014.6911711","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911711","url":null,"abstract":"These keynote discusses the following: Big Data Science and Social Networks - Accelerating Insights and Building Value; Sampling Theory of Large Networks; Mining Online Social Networks: Opportunities and Privacy Issues.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114394280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-DARWIN: Energy Aware Disaster Recovery Network using WiFi Tethering","authors":"M. Raj, K. Kant, Sajal K. Das","doi":"10.1109/ICCCN.2014.6911770","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911770","url":null,"abstract":"In this paper, we propose a novel architecture called Energy Aware Disaster Recovery Network using WiFi Tethering (E-DARWIN). The underlying idea is to make use of WiFi Tethering technology ubiquitously available on wireless devices, like smartphones and tablets, to set up an ad hoc network for data collection in disaster scenarios. To this end, we design novel mechanisms, which aid in autonomous creation of the ad hoc network, distribution of data capturing task among the devices, and collection of data with minimum delay. Specifically, we design and implement a distributed coalition formation game for distributing the data capturing task among wireless devices based on their capabilities, available energy, and network participation for higher network lifetime. Finally, we evaluate the performance of the proposed architecture using a prototype application implemented on Android platform and large-scale simulations.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}