Ad Hoc & Sensor Wireless Networks最新文献

筛选
英文 中文
Performance Evaluation of Cooperative LTE-DSRC Vehicular Network LTE-DSRC协同车载网络性能评估
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488528
Xavier Calle Heredia, Pablo Andrés Barbecho Bautista, M. Aguilar-Igartua
{"title":"Performance Evaluation of Cooperative LTE-DSRC Vehicular Network","authors":"Xavier Calle Heredia, Pablo Andrés Barbecho Bautista, M. Aguilar-Igartua","doi":"10.1145/3479240.3488528","DOIUrl":"https://doi.org/10.1145/3479240.3488528","url":null,"abstract":"Intelligent Transport Systems (ITS) are fundamental to reaching the concept of smart cities. However, the incoming development of vehicular applications will originate an increase in long-term evolution (LTE) traffic demand, so an approach consists of reducing the cell coverage area. This paper presents an alternative solution to deal with areas with a lack of coverage originated by the deployment of LTE micro-cells. We propose a heterogeneous network algorithm named Multi-Metric Heterogeneous Network Algorithm (MMHNA), which uses LTE and dedicated short-range communications (DSRC) technologies. The objective is to extend the LTE communication range with the support of DSRC technology through a forwarding process. This proposal will allow vehicles to send messages to a server directly connected to the evolved Node B (eNB), i.e., the radio network node for LTE networks, even if the sending vehicle is out of range of the eNB.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78095149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Throughput and Energy Efficient Association Strategy for Wi-Fi/LiFi Heterogeneous Networks 面向Wi-Fi/LiFi异构网络的吞吐量和能效关联策略
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488514
Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous
{"title":"Towards a Throughput and Energy Efficient Association Strategy for Wi-Fi/LiFi Heterogeneous Networks","authors":"Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous","doi":"10.1145/3479240.3488514","DOIUrl":"https://doi.org/10.1145/3479240.3488514","url":null,"abstract":"In very dense or ultra-dense scenarios wherein Wi-Fi alone may not be enough to accommodate the needs of all stations, LiFi (Light Fidelity) access points can help alleviate the strain on the Wi-Fi by offloading some Wi-Fi traffic to LiFi. We study the issue of associating stations in a Wi-Fi/LiFi heterogeneous network composed of a Wi-Fi access point and multiples LiFi access points. We propose a conceptually simple and easy to implement solution to search and find an efficient mapping for the associations between stations and access points using analytical performance models for the individual throughput of each station and for the overall network energy consumption. Using two realistic deployments of heterogeneous networks for offices, we have evaluated the effectiveness of our solution at discovering better trade-offs than baseline strategies. Our numerical results show that significant gains can be obtained in terms of the throughput of the stations as well as overall energy consumption.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91349970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data 社交混合区域:匿名化联系人追踪数据中的个人信息
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488533
A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro
{"title":"Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data","authors":"A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3479240.3488533","DOIUrl":"https://doi.org/10.1145/3479240.3488533","url":null,"abstract":"In many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between nodes (the users). In more recent cases, tracing contacts between individuals has shown to be a strong strategy in mapping the transmission of contagious diseases, such as COVID-19. However, sharing contact data can impose threats to the safety of participants regarding their social and mobility behavior. As an example, we can infer acquaintances, as well as home and work locations. This work presents a strategy to anonymize contact tracing data by utilizing mix-zones, a well-defined concept to anonymize data in a given region. Called social mix-zones, it considers the number of contacts happening in a location, producing anonymized data and protecting the personal integrity of the individuals. We validate the proposal using two real contact tracing data, showing that social mix-zones can cover a large portion of contacts, reducing the risk of malicious location attacks.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77301414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Green Road Intersections by Efficient Traffic Light Scheduling Algorithm 基于高效红绿灯调度算法的绿色道路交叉口
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488508
Maram Bani Younes, A. Boukerche
{"title":"Green Road Intersections by Efficient Traffic Light Scheduling Algorithm","authors":"Maram Bani Younes, A. Boukerche","doi":"10.1145/3479240.3488508","DOIUrl":"https://doi.org/10.1145/3479240.3488508","url":null,"abstract":"Reducing the fuel consumption and gas emissions of traveling vehicles over the road networks have been intensively investigated over the road networks. Vehicles produce a high percentage of pollution to the atmosphere that encourages governments and organizations to invest and work toward reducing their emissions. The behavior of the same vehicle varies over downtown and highway scenarios in terms of efficiency and pollution parameters. This is due to the effects of the architectural design of the traversed road and the driving behavior. In this work, we propose an efficient traffic light scheduling algorithm. It considers the real-time traffic characteristics of the competing traffic flows at a signalized road intersection. This is to produce an efficient schedule that minimizes the total required fuel of vehicles and produces less emissions while passing safely through that intersection. An extensive set of experiments have been used to verify the performance of the proposed scheduling algorithm compared to other efficient traffic light scheduling algorithms.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82336804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing Internet Access for Post-Disaster Communications using Balloon Networks 利用气球网络为灾后通讯提供互联网接入服务
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488497
Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung
{"title":"Providing Internet Access for Post-Disaster Communications using Balloon Networks","authors":"Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung","doi":"10.1145/3479240.3488497","DOIUrl":"https://doi.org/10.1145/3479240.3488497","url":null,"abstract":"Natural disasters such as earthquake, tsunami, land sliding, wildfires, flood and hurricane have frequently happened in many places around the world. Once disaster occurred, communication networks and information systems may be damaged, depending on the level of destruction. When communication networks are seriously affected, residents in the disaster area cannot communicate their situations and needs. In recent years, social networks play a vital role in connecting people and providing support with woe for survivors and their family during natural catastrophes around the world. Therefore, it is necessary to provide Internet services to the affected area at the earliest, so that victims can use the emergency communication network to confirm their safety. From the literature study, it was observed that the balloon networks satisfy the needs of post disaster communications. In this paper, a prototype system for a balloon network is constructed using two wireless nodes in the sky for establishing emergency communications. The Internet service is provided for the network using WiFi and tested for disaster communications, e.g., accessing social network sites and VoIP calls. Finally, we evaluate the performance of the disaster communications to analyze the suitability of balloon networks during post disaster communications. From the results it is observed that a WiFi balloon network can be deployed easily to provide Internet services to the affected area to meet users' needs.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85244192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A PUF-based Authentication Mechanism for OSCORE 基于puf的OSCORE认证机制
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488526
J. Díaz, Florina Almenáres
{"title":"A PUF-based Authentication Mechanism for OSCORE","authors":"J. Díaz, Florina Almenáres","doi":"10.1145/3479240.3488526","DOIUrl":"https://doi.org/10.1145/3479240.3488526","url":null,"abstract":"Within environment generated when deploying Internet of Things (IoT) solutions, there is a need to do it securely. Authentication of the devices against the applications deployed on the servers, which receive or send data to the IoT devices must be carried out. Standard IoT protocols, such as CoAP or MQTT, define secure communica- tions through protocols on transport, network or application layers. Nevertheless, a shortcoming when protocols using secret keys are used lies in the management of such keys, which is out of scope of the specifications. For this reason, this article presents an authenti- cation solution for OSCORE (Object Security for Constrained RESTful Environments) based on PUFs (Physical Unclonable Functions) that makes it possible to establish a secure mechanism for the exchange and management of keys. The performance of this proposal has been evaluated, showing its viability.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79613206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1: Vehicular Networks 会议详情:会议1:车辆网络
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3501370
M. Aguilar Igartua
{"title":"Session details: Session 1: Vehicular Networks","authors":"M. Aguilar Igartua","doi":"10.1145/3501370","DOIUrl":"https://doi.org/10.1145/3501370","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80519374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 4: Enhancement of Wireless Ad hoc Networks 会议详情:会议4:无线自组织网络的增强
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3501373
I. Guérin Lassous
{"title":"Session details: Session 4: Enhancement of Wireless Ad hoc Networks","authors":"I. Guérin Lassous","doi":"10.1145/3501373","DOIUrl":"https://doi.org/10.1145/3501373","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77647930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Realism of the Physical Layer of NS-3 by Considering the PAPR Problem of the IEEE 802.11p Transmitter 考虑IEEE 802.11p发射机的PAPR问题提高NS-3物理层的真实感
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488509
Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar
{"title":"Improving the Realism of the Physical Layer of NS-3 by Considering the PAPR Problem of the IEEE 802.11p Transmitter","authors":"Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar","doi":"10.1145/3479240.3488509","DOIUrl":"https://doi.org/10.1145/3479240.3488509","url":null,"abstract":"NS-3 is a network simulator used for the research and development of Vehicular Ad-hoc Networks (VANETs). It allows the IEEE 802.11p standard simulation, which is part of IEEE Wireless Access in the Vehicular Environment (WAVE). One of the limitations of the 802.11p standard in NS-3 is using a simplified theoretical model of the Packet Error Rate (PER). This standard uses for the Physical Layer (PHY) the Orthogonal Frequency Division Multiplexing (OFDM) technique, which suffers from high Peak to Average Power Ratio (PAPR). This high PAPR of the signal causes degradation of the PER when it passes through a non-linear amplifier. In this work, we study the effect of the high PAPR over the PER using a MATLAB implementation of the 802.11p PHY. We also analyze the effect of using the Orthogonal Pilot Sequences (OPS) technique for PAPR reduction. The results show that the high PAPR affects the PER of high data rates, which use 16-QAM and 64-QAM modulation. Finally, these results are extended to NS-3 simulations as a new model of the IEEE 802.11p PHY with high realism since it considers the effect of the non-linear HPA. The NS-3 results show a similar trend compared to the MATLAB simulations.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77930242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation in Misbehaviour Detection Techniques for DoS Attacks in VANETs VANETs中DoS攻击错误行为检测技术的性能评价
IF 0.9 4区 计算机科学
Ad Hoc & Sensor Wireless Networks Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488510
Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza
{"title":"Performance Evaluation in Misbehaviour Detection Techniques for DoS Attacks in VANETs","authors":"Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza","doi":"10.1145/3479240.3488510","DOIUrl":"https://doi.org/10.1145/3479240.3488510","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) provides communication between vehicles and roadside infrastructures to improve safety, traffic efficiency, and comfort. VANET requires the implementation of precise security mechanisms to guarantee safety because attackers are always searching for methods to exploit network vulnerabilities. A common and harmful threat is the Denial of Service (DoS) attack. DOS is performed by malicious nodes to block vehicle communications and to interrupt network availability. In this work, we evaluate three different misbehavior detection mechanisms: threshold, behavioral, and cooperative. These methods are compared using the F2MD simulation environment with four DoS attacks: Normal, Random, Sybil, and DDoS. The performance of the misbehavior detection mechanisms is evaluated by accuracy, recall, and precision. Our comparative results demonstrate that the threshold-based method outperforms the other two in the proposed simulation scenario.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85611121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信