{"title":"Artificial Neural Network-based Estimation of Individual Localization Errors in Fingerprinting","authors":"Filip Lemic, J. Famaey","doi":"10.1109/CCNC46108.2020.9045648","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045648","url":null,"abstract":"Location information is among the main enablers of context-aware applications and wireless networks. Practical localization services are able to generate location estimates that are generally erroneous. To maximize its usability and benefits, each location estimate should be leveraged jointly with the corresponding estimate of its localization error. Hence, we propose an Artificial Neural Network (ANN)-based method for the estimation of individual localization errors. We do that for fingerprinting, one of the most prominent localization solutions for GPS-constrained environments. First, we provide insights on how to optimally hyperparameterize the proposed method. We do that by exploring its hyperparameter’ space in order to find its close-to-optimal hyperparameterization for different environments and fingerprinting technologies. We believe the provided insights can serve to reduce the overhead of deploying the method in new environments. Second, we demonstrate that the method, when hyperparameterized according to the provided insights, substantially outperforms the current state-of-the-art. The improvement is more than 25% in the best case scenario.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115997426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Drone Positioning Measuring in Internet-of-Drones","authors":"Chao-Yang Lee","doi":"10.1109/CCNC46108.2020.9045111","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045111","url":null,"abstract":"Recently, an unmanned aerial vehicles (UAVs) known as drones which offer advantages in mobility purposes due to its convenience, flexibility, and utility above other platforms. Several sensors, such as GPS receiver combining with the control module, attached to the autopilot system which enables navigation and autonomic flighting. However, due to its notoriously poor-quality positioning acquisition from a low-cost GPS device. For autonomic flighting tasks, UAV must have precise localization information while flighting. Recently, smart cities have become an important technology, and the Internet of Drones (IoD) is one of the popular technologies in smart cities, which is a combination of the Internet of Things (IoT) and drones. Therefore, communication technologies may be a satisfactory localization solution for the real-time and the cost that it requires. This study proposes a cooperative drone positioning measuring in internet-of-drones. Every drone connected, share their localization information, distance measuring information to other drones to obtain both of ego-drone's and obstacles' high accuracy position. Finally, the simulation result reveals the proposed method could increase the positioning accuracy through the IoD.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"32 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Root Of Trust for IoT Security In Smart Home Systems","authors":"Samah S. Mansour, Adrian P. Lauf","doi":"10.1109/CCNC46108.2020.9045412","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045412","url":null,"abstract":"Authentication is a key challenge in Internet of Things (IoT), and it is a foundation for data integrity and confidentiality. Security and privacy preservation are crucial for the integration of IoT in our daily life. Due to the resource-constrained nature of IoT sensors, it is not applicable to utilize traditional cryptography techniques in IoT domains. Wireless network devices are used for IoT in a wide range of applications. In this paper, we propose an efficient and secure authentication architecture for IoT. Compared to the existing constrained applications Protocols, the proposed architecture increases efficiency by minimizing the number of message exchanges and implementing lightweight cryptosystem. Also, the proposed architecture increases security by eliminating any key storage on device memory as well as third party certificate authority. The main idea of the proposed architecture is to integrate lightweight cryptography and hardware security approaches to be the basis to face the current security challenges.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai Samejima, Ryota Okumura, K. Mizutani, H. Harada
{"title":"Wireless Smart Ubiquitous Network by CSL-based Low Power MAC Protocol","authors":"Kai Samejima, Ryota Okumura, K. Mizutani, H. Harada","doi":"10.1109/CCNC46108.2020.9045735","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045735","url":null,"abstract":"The wireless smart ubiquitous network (Wi-SUN) has been attracting much attention as one of the candidates of wireless sensor networks (WSNs) for the Internet-of-Things (IoT). In considering that the Wi-SUN is applied to the IoT system in the environment where the power supply cannot be easily secured, such as structure monitoring systems, it is imperative to establish the technology enabling the Wi-SUN system to operate with only a battery for a prolonged time. The key enabling technology for the low operation in the Wi-SUN system is a low-power media access control (MAC) protocol. The coordinated sampled listening (CSL) protocol is one of the standardized low-power MAC protocol. In this paper, we demonstrate the feasibility of the CSL-based protocol and verify its detailed characteristics by implementing the CSL-based protocol into the actual Wi-SUN dongles to construct the CSL-based low-power networks. The experimental and computer simulation results demonstrate the feasibility and reliability of the CSL-based protocol.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"45 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel System Design for Reducing Cost and Power Consumption in a Multi-SIM User Equipment","authors":"Kumud Sinha, T. Vrind, Lalit Pathak, D. Das","doi":"10.1109/CCNC46108.2020.9045345","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045345","url":null,"abstract":"User Equipment (UE) with more than one Subscriber Identity Module (SIM) is designed usually with a single Radio Frequency Integrated Circuit (RFIC), with one Rx and one Tx path component, for reduction of cost. The RFIC components are shared for serving requests from as many SIMs (Subscriber Identify Module) in the UE, leading to Physical Channel Resource (PCR) wastage for the operator during the tune away periods. We present a novel technique to arrive at the number of Rx and Tx paths components, that should be deployed when designing a Multi-SIM UE with limited PCR wastage. Through mathematical modelling, supported with simulations, our proposal gives the right number (e.g. 2 each) of Rx and Tx paths to be used while designing up to Quad-SIM (4 SIMs) UE. This results in saving up to 33.3 % both in the cost of the RFIC component selection and peak power consumption of the Quad-SIM UE as compared to literature.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134182111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cuttlefish: A Flexible and Lightweight Middleware for Combining Heterogeneous IoT Devices","authors":"Andreas Pamboris, Charalampos Kozis, H. Herodotou","doi":"10.1109/CCNC46108.2020.9045316","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045316","url":null,"abstract":"The Internet of Things (IoT) extends connectivity beyond traditional computing devices to different types of smart objects, equipped with various sensors and actuators. These objects range from smart lightbulbs and thermostats to smart watches and fitness trackers, or even heavy machinery used in various industrial sectors. Due to device heterogeneity, the complexity of developing applications that require the collection and sharing of data across multiple IoT devices is high, as developers need to be familiar with a diverse set of supported services and APIs. While existing approaches have proposed solutions to this challenge, they rely on the use of resource-intensive cloud-based components, they do not offer the degree of extensibility desired by developers, and they often trade off some of the richness of real-time data for ease of use. Cuttlefish is a flexible and lightweight middleware that offers a unified API to help with the development of applications that utilize multiple heterogeneous IoT devices. It abstracts away much of the complexity involved with orchestrating different devices at runtime. At the same time, it avoids the aforementioned caveats of existing approaches through a simple and efficient design, yet one that offers a rich set of capabilities to developers.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"50 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Laroui, Boubakr Nour, Hassine Moungla, H. Afifi, M. A. Cherif
{"title":"Mobile Vehicular Edge Computing Architecture using Rideshare Taxis as a Mobile Edge Server","authors":"Mohammed Laroui, Boubakr Nour, Hassine Moungla, H. Afifi, M. A. Cherif","doi":"10.1109/CCNC46108.2020.9045741","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045741","url":null,"abstract":"We propose to utilize rideshare taxis as infrastructure for both communication and computation. Rideshare overlays become hence Mobile Edge Nodes. End-users utilize near rideshare taxis as edge servers to receive video chunks for live video streaming. The set cover problem (SCP) is used to formulate the rideshare taxis coverage optimization inside the city. It provides the maximum number of rideshare taxis that cover end-users routes which guarantee the efficiency of communication services. Simulation results show that the proposed architecture dramatically enhances the quality of service and the overall communication performance in terms of execution time and energy consumption.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123471288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the quest for 5G Network Slicing","authors":"Farouk Messaoudi, P. Bertin, A. Ksentini","doi":"10.1109/CCNC46108.2020.9045327","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045327","url":null,"abstract":"The imminent arrival of 5G will drive changes in communications service provider networks, leveraging on Network Function Virtualization (NFV) and Software Defined Networking (SDN) technologies. The upcoming 5G ecosystem will address vertical markets to give rise to a plethora of novel services with different requirements, such as Ultra-Reliable Low-Latency Communication (URLLC), machine Massive Type Communications (mMTC), and enhanced Mobile Broadband (eMBB). To be able to offer such variety of services with different needs over the same network infrastructure, this latter should be split into multiple logical networks known as network slices. In this paper, we propose an architecture design for 5G network slicing inspired by ONF and 3GPP models. We provide and analyse our experiment results of instantiating multiple networks slices with our scalable 4G/5G VNFs in a Network Slice as a Service (NSaaS) approach on a real platform.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125479692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo, Yusuke Aoki, K. Abe, Y. Teranishi
{"title":"Detouring Skip Graph: A Structured Overlay Utilizing Detour Routes","authors":"Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo, Yusuke Aoki, K. Abe, Y. Teranishi","doi":"10.1109/CCNC46108.2020.9045594","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045594","url":null,"abstract":"Skip Graph, one of the structured overlays, provides a scalable network owing to the routing path lengths of O (log n), where $n$ denotes the total number of nodes. However, there is a problem that most of the routing paths are quite longer than the shortest paths because each node in the network knows only its neighbors, rather than the global topology. In general, long routing paths lead to long delay times and low fault tolerance. Herein, we propose Detouring Skip Graph, which shortens the path lengths through the use of detour routes. It does not require construction of extra links or modification of its topology; thereby, it can succeed in shortening them while maintaining the advantages of Skip Graph. The evaluation experiments show that the average path length was shortened by approximately 20%-30% in comparison with Skip Graph.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"570 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127793508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game theoretic approach applied in cybersecurity information exchange framework","authors":"Ankit Thakkar, S. Badsha, S. Sengupta","doi":"10.1109/CCNC46108.2020.9045430","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045430","url":null,"abstract":"In CYBersecurity information EXchange (CYBEX) framework, Cyber Threat Intelligence (CTI) is shared among multiple organizations with a view of creating situational awareness. But there is a possibility that malicious organizations coexist with regular ones in this framework, which can get hold of the threat data shared by other organizations and can use it for carrying out malicious activities. We formulate the aforementioned problem as an incomplete information game assuming that whenever CYBEX receives any information, it processes the information for anomaly detection. We find the mixed strategy Nash equilibrium probabilities and corresponding Bayesian belief updates. We simulate the game to find the best response strategies with which regular and malicious organizations can play to increase their payoffs. Based on the best response strategies of organizations, we analyze that achieving more anomaly detection rate while keeping the processing rate minimum is the best action strategy with which CYBEX can play to increase the gain of both CYBEX and regular organizations over malicious organizations. We also find the approximate average minimum processing rate and anomaly detection rate with which CYBEX can play in order to maintain the payoff of itself and regular organizations higher than the malicious ones.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}