{"title":"Not all content is created equal: effect of popularity and availability for content-centric opportunistic networking","authors":"Pavlos Sermpezis, T. Spyropoulos","doi":"10.1145/2632951.2632976","DOIUrl":"https://doi.org/10.1145/2632951.2632976","url":null,"abstract":"Mobile users are envisioned to exploit direct communication opportunities between their portable devices, in order to enrich the set of services they can access through cellular or WiFi networks. Sharing contents of common interest or providing access to resources or services between peers can enhance a mobile node's capabilities, offload the cellular network, and disseminate information to nodes without internet access. Interest patterns, i.e. how many nodes are interested in each content or service (popularity), as well as how many users can provide a content or service (availability) impact the performance and feasibility of envisioned applications. In this paper, we establish an analytical framework to study the effects of these factors on the delay and success probability of a content/service access request through opportunistic communication. We also apply our framework to the data offloading problem and provide insights for its optimization.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realizing the transformative impact of computing and data in a networked world","authors":"F. Jahanian","doi":"10.1145/2632951.2633208","DOIUrl":"https://doi.org/10.1145/2632951.2633208","url":null,"abstract":"The computer and information science and engineering disciplines are at the center of an ongoing societal transformation. The explosive growth of scientific and social data, wireless connectivity at broadband speeds for a countless number of mobile endpoints, and seamless access to resources in the 'cloud' are transforming the way we work, learn, play, and communicate. Furthermore, the proliferation of mobile devices and new applications is leading to increasing complexity and growth of network traffic. I will talk about how digitalization, virtualization, and mobility are reshaping our economy, society, and daily lives. I will also talk about these trends catalyze new opportunities for foundational research. I will further explore how advances in computing and communication serve as key drivers of economic competitiveness and how they will be crucial to achieving national priorities.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121655926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster: environment-adaptive clock calibration for wireless sensor networks","authors":"Meng Jin, Dingyi Fang, Xiaojiang Chen, Zhe Yang, Chen Liu, Dan Xu, Xiaoyan Yin","doi":"10.1145/2632951.2635936","DOIUrl":"https://doi.org/10.1145/2632951.2635936","url":null,"abstract":"In this paper, we propose a novel clock calibration approach, which addresses two key challenges for clock calibration in Wireless Sensor Networks: excessive communication overhead and the trade-off between accuracy and cost. To achieve this, our approach leverages the fact that the clock skew is highly correlated to temperature, which can serve as both an assistant for clock skew estimation and a regulatory factor for the duty-cycled design. Our approach is one order of magnitude more power-efficient than communication based approaches since the calibration largely relies on local temperature information. In addition, our approach provides a nice feature of self-adaptive period, which can substantially promote the system flexibility. We present the theory behind our approach, and provide preliminary results of a simulated comparison of our approach and some recent approaches.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster: crowdsourcing to smartphones: social network based human collaboration","authors":"Shuhui Yang, Jonathon Thormann","doi":"10.1145/2632951.2635934","DOIUrl":"https://doi.org/10.1145/2632951.2635934","url":null,"abstract":"Crowdsourcing is an increasingly popular solution for human intelligence tasks (HITs). Existing systems consist centralized control platforms. We are exploring a more comprehensive system in which a smartphone network is adopted as an effective supplement for location and time sensitive tasks. Additionally, social networks are used for more efficient potential worker selection. The system architecture is designed featuring the dual communication paradigm, Internet-based centralized communication mode and the wifi-based ad hoc communication mode.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115373208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ESync: an energy synchronized charging protocol for rechargeable wireless sensor networks","authors":"Liang He, Lingkun Fu, Likun Zheng, Yu Gu, Peng Cheng, Jiming Chen, Jianping Pan","doi":"10.1145/2632951.2632970","DOIUrl":"https://doi.org/10.1145/2632951.2632970","url":null,"abstract":"Different from energy harvesting which generates dynamic energy supplies, the mobile charger is able to provide stable and reliable energy supply for sensor nodes, and thus enables sustainable system operations. While previous mobile charging protocols either focus on the charger travel distance or the charging delay of sensor nodes, in this work we propose a novel Energy Synchronized Charging (ESync) protocol, which simultaneously reduces both of them. Observing the limitation of the Traveling Salesman Problem (TSP)-based solutions when nodes energy consumptions are diverse, we construct a set of nested TSP tours based on their energy consumptions, and only nodes with low remaining energy are involved in each charging round. Furthermore, we propose the concept of energy synchronization to synchronize the charging re- quests sequence of nodes with their sequence on the TSP tours. Experiment and simulation demonstrate ESync can reduce charger travel distance and nodes charging delay by about 30% and 40% respectively.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting mobile users in database-driven opportunistic spectrum access","authors":"Bo Gao, J. Park, Yaling Yang","doi":"10.1145/2632951.2632984","DOIUrl":"https://doi.org/10.1145/2632951.2632984","url":null,"abstract":"In database-driven opportunistic spectrum access, location information of secondary users plays an important role. In a database query-and-update procedure, a secondary user reports to the geolocation database of its location information, so that the updated knowledgebase facilitates location-aided incumbent protection and network coexistence. However, such database-driven spectrum sharing becomes very challenging when the secondary users are mobile. In this paper, we propose a probabilistic coexistence framework that supports mobile users by incorporating the solutions to solve two core problems: (i) white space allocation (WSA) at the database and (ii) location update control (LUC) at the users. We frame the two problems such that they interact through dynamic control of the users' location uncertainty levels. For WSA, we derive a centralized real-time solution to mitigate mutual interference among secondary users and protect primary users against harmful interference. For LUC, we design a local two-level strategy to enable both movement-driven and interference-driven control of location uncertainty. This strategy makes an appropriate trade-off between the effectiveness of interference mitigation and the cost of database queries. To evaluate our algorithms, we have carried out both theoretical model-driven and real-world trace-driven simulation experiments. Our simulation results show that the proposed framework can determine and adapt the database query intervals of mobile users to achieve near-optimal interference mitigation with minimal location updates.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to build vehicular networks in the real world","authors":"J. Barros","doi":"10.1145/2632951.2633209","DOIUrl":"https://doi.org/10.1145/2632951.2633209","url":null,"abstract":"There are now 1 billion vehicles in the world waiting to be connected to the Internet. At the same time, vehicular communication technologies have matured to a point in which massive deployment is both possible and feasible. One option for deployment is to wait for car manufacturers to embed DSRC/WAVE interfaces inside their latest models. However, since only 9% of the world's fleet is new every year, this would result in a time span of up to 20 years until 90% of the vehicles are finally connected. Another option is to rely entirely on cellular communications, such as GPRS, EDGE, 3G and LTE. This cellular only approach is impractical due to the capital expenses required for telecom operators to meet the demands of the impending tsunami of mobile data (expected to grow 1800% until 2016). Clearly, there is need for a low-cost wireless networking solution that can be placed in any vehicle and offers reliable connectivity, improved quality of experience and higher safety for drivers and passengers. This solution, we will argue, is vehicular mesh networking.\u0000 Drawing from five years of research and our experience with a large testbed with hundreds of taxis and buses, currently under deployment in Porto, Portugal, we will address how city-scale deployment can be achieved and what kind of connectivity, bandwidth, quality of service and application support can be provided as the density of Internet gateways and the density of connected vehicles grows towards widespread deployment. Some attention will also be given to relevant issues in system design such as channel modeling, mobility patterns, networking protocols and large-scale simulation with manageable complexity. Finally, we will show how a vehicular mesh network can be used as a highly dense urban scanner, producing real-time data on-the-move, which can be leveraged from the cloud to help manage future cities, protect our environment and improve our quality of life.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruihao Zhu, Zhijing Li, Fan Wu, K. Shin, Guihai Chen
{"title":"Differentially private spectrum auction with approximate revenue maximization","authors":"Ruihao Zhu, Zhijing Li, Fan Wu, K. Shin, Guihai Chen","doi":"10.1145/2632951.2632974","DOIUrl":"https://doi.org/10.1145/2632951.2632974","url":null,"abstract":"Dynamic spectrum redistribution---under which spectrum owners lease out under-utilized spectrum to users for financial gain---is an effective way to improve spectrum utilization. Auction is a natural way to incentivize spectrum owners to share their idle resources. In recent years, a number of strategy-proof auction mechanisms have been proposed to stimulate bidders to truthfully reveal their valuations. However, it has been shown that truthfulness is not a necessary condition for revenue maximization. Furthermore, in most existing spectrum auction mechanisms, bidders may infer the valuations---which are private information---of the other bidders from the auction outcome. In this paper, we propose a Differentially privatE spectrum auction mechanism with Approximate Revenue maximization (DEAR). We theoretically prove that DEAR achieves approximate truthfulness, privacy preservation, and approximate revenue maximization. Our extensive evaluations show that DEAR achieves good performance in terms of both revenue and privacy preservation.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster: near field communication based access control for wireless medical devices","authors":"X. Hei, Xiaojiang Du, Shan Lin","doi":"10.1145/2632951.2635944","DOIUrl":"https://doi.org/10.1145/2632951.2635944","url":null,"abstract":"Security of wireless medical devices is critical for patient safety because security attacks may directly hurt patients' health. In this paper, we design a novel access control scheme based on bi-channel and multi-factor authentication for wireless medical devices. Our scheme utilizes near field communication (NFC) to perform device pairing, which supports key exchange between a device and a reader in short communication range (<= 6cm) with bounded response time. To further defend against attacks when a malicious reader is placed within the device's communication range in crowded situations, we design a crowd detection algorithm using WiFi and user's smart phone to assist the key exchange. Our analyses and experiments show that our security schemes are effective and efficient.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster: the construction of reeb graph and its applications in 3D sensor networks","authors":"Wenping Liu, Zhifeng Liu, Hongbo Jiang","doi":"10.1145/2632951.2635941","DOIUrl":"https://doi.org/10.1145/2632951.2635941","url":null,"abstract":"Existing algorithms for topology extraction focus on only one topology feature, either skeleton or segmentation, in 2D or 3D sensor networks, most of which requiring complete boundary information. As boundary information is not easily obtained, especially in sparse 3D sensor networks, and extracting these two features separately is very expensive, in this study, we propose to simultaneously extract the line-like skeleton of 2D/3D sensor networks and decompose the network into nice pieces, by constructing the Reeb graph. The Reeb graph has been envisioned as a powerful tool for encoding the topology of an object in computer graphics and computational geometry, where the key is to select the right feature function f. Without using boundary information, we first construct a cut graph, and then regard the distance of a node to the nearest cut as the function f such that the corresponding Reeb graph is pose independent, based on which the skeleton extraction and network decomposition are simultaneously conducted. Some simulation results are presented to show the efficiency of the algorithm.","PeriodicalId":425643,"journal":{"name":"ACM Interational Symposium on Mobile Ad Hoc Networking and Computing","volume":"21 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123788284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}