Xavier Calle Heredia, Pablo Andrés Barbecho Bautista, M. Aguilar-Igartua
{"title":"Performance Evaluation of Cooperative LTE-DSRC Vehicular Network","authors":"Xavier Calle Heredia, Pablo Andrés Barbecho Bautista, M. Aguilar-Igartua","doi":"10.1145/3479240.3488528","DOIUrl":"https://doi.org/10.1145/3479240.3488528","url":null,"abstract":"Intelligent Transport Systems (ITS) are fundamental to reaching the concept of smart cities. However, the incoming development of vehicular applications will originate an increase in long-term evolution (LTE) traffic demand, so an approach consists of reducing the cell coverage area. This paper presents an alternative solution to deal with areas with a lack of coverage originated by the deployment of LTE micro-cells. We propose a heterogeneous network algorithm named Multi-Metric Heterogeneous Network Algorithm (MMHNA), which uses LTE and dedicated short-range communications (DSRC) technologies. The objective is to extend the LTE communication range with the support of DSRC technology through a forwarding process. This proposal will allow vehicles to send messages to a server directly connected to the evolved Node B (eNB), i.e., the radio network node for LTE networks, even if the sending vehicle is out of range of the eNB.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78095149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous
{"title":"Towards a Throughput and Energy Efficient Association Strategy for Wi-Fi/LiFi Heterogeneous Networks","authors":"Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous","doi":"10.1145/3479240.3488514","DOIUrl":"https://doi.org/10.1145/3479240.3488514","url":null,"abstract":"In very dense or ultra-dense scenarios wherein Wi-Fi alone may not be enough to accommodate the needs of all stations, LiFi (Light Fidelity) access points can help alleviate the strain on the Wi-Fi by offloading some Wi-Fi traffic to LiFi. We study the issue of associating stations in a Wi-Fi/LiFi heterogeneous network composed of a Wi-Fi access point and multiples LiFi access points. We propose a conceptually simple and easy to implement solution to search and find an efficient mapping for the associations between stations and access points using analytical performance models for the individual throughput of each station and for the overall network energy consumption. Using two realistic deployments of heterogeneous networks for offices, we have evaluated the effectiveness of our solution at discovering better trade-offs than baseline strategies. Our numerical results show that significant gains can be obtained in terms of the throughput of the stations as well as overall energy consumption.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91349970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro
{"title":"Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data","authors":"A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3479240.3488533","DOIUrl":"https://doi.org/10.1145/3479240.3488533","url":null,"abstract":"In many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between nodes (the users). In more recent cases, tracing contacts between individuals has shown to be a strong strategy in mapping the transmission of contagious diseases, such as COVID-19. However, sharing contact data can impose threats to the safety of participants regarding their social and mobility behavior. As an example, we can infer acquaintances, as well as home and work locations. This work presents a strategy to anonymize contact tracing data by utilizing mix-zones, a well-defined concept to anonymize data in a given region. Called social mix-zones, it considers the number of contacts happening in a location, producing anonymized data and protecting the personal integrity of the individuals. We validate the proposal using two real contact tracing data, showing that social mix-zones can cover a large portion of contacts, reducing the risk of malicious location attacks.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77301414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green Road Intersections by Efficient Traffic Light Scheduling Algorithm","authors":"Maram Bani Younes, A. Boukerche","doi":"10.1145/3479240.3488508","DOIUrl":"https://doi.org/10.1145/3479240.3488508","url":null,"abstract":"Reducing the fuel consumption and gas emissions of traveling vehicles over the road networks have been intensively investigated over the road networks. Vehicles produce a high percentage of pollution to the atmosphere that encourages governments and organizations to invest and work toward reducing their emissions. The behavior of the same vehicle varies over downtown and highway scenarios in terms of efficiency and pollution parameters. This is due to the effects of the architectural design of the traversed road and the driving behavior. In this work, we propose an efficient traffic light scheduling algorithm. It considers the real-time traffic characteristics of the competing traffic flows at a signalized road intersection. This is to produce an efficient schedule that minimizes the total required fuel of vehicles and produces less emissions while passing safely through that intersection. An extensive set of experiments have been used to verify the performance of the proposed scheduling algorithm compared to other efficient traffic light scheduling algorithms.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82336804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung
{"title":"Providing Internet Access for Post-Disaster Communications using Balloon Networks","authors":"Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung","doi":"10.1145/3479240.3488497","DOIUrl":"https://doi.org/10.1145/3479240.3488497","url":null,"abstract":"Natural disasters such as earthquake, tsunami, land sliding, wildfires, flood and hurricane have frequently happened in many places around the world. Once disaster occurred, communication networks and information systems may be damaged, depending on the level of destruction. When communication networks are seriously affected, residents in the disaster area cannot communicate their situations and needs. In recent years, social networks play a vital role in connecting people and providing support with woe for survivors and their family during natural catastrophes around the world. Therefore, it is necessary to provide Internet services to the affected area at the earliest, so that victims can use the emergency communication network to confirm their safety. From the literature study, it was observed that the balloon networks satisfy the needs of post disaster communications. In this paper, a prototype system for a balloon network is constructed using two wireless nodes in the sky for establishing emergency communications. The Internet service is provided for the network using WiFi and tested for disaster communications, e.g., accessing social network sites and VoIP calls. Finally, we evaluate the performance of the disaster communications to analyze the suitability of balloon networks during post disaster communications. From the results it is observed that a WiFi balloon network can be deployed easily to provide Internet services to the affected area to meet users' needs.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85244192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PUF-based Authentication Mechanism for OSCORE","authors":"J. Díaz, Florina Almenáres","doi":"10.1145/3479240.3488526","DOIUrl":"https://doi.org/10.1145/3479240.3488526","url":null,"abstract":"Within environment generated when deploying Internet of Things (IoT) solutions, there is a need to do it securely. Authentication of the devices against the applications deployed on the servers, which receive or send data to the IoT devices must be carried out. Standard IoT protocols, such as CoAP or MQTT, define secure communica- tions through protocols on transport, network or application layers. Nevertheless, a shortcoming when protocols using secret keys are used lies in the management of such keys, which is out of scope of the specifications. For this reason, this article presents an authenti- cation solution for OSCORE (Object Security for Constrained RESTful Environments) based on PUFs (Physical Unclonable Functions) that makes it possible to establish a secure mechanism for the exchange and management of keys. The performance of this proposal has been evaluated, showing its viability.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79613206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Session 4: Enhancement of Wireless Ad hoc Networks","authors":"I. Guérin Lassous","doi":"10.1145/3501373","DOIUrl":"https://doi.org/10.1145/3501373","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77647930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar
{"title":"Improving the Realism of the Physical Layer of NS-3 by Considering the PAPR Problem of the IEEE 802.11p Transmitter","authors":"Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar","doi":"10.1145/3479240.3488509","DOIUrl":"https://doi.org/10.1145/3479240.3488509","url":null,"abstract":"NS-3 is a network simulator used for the research and development of Vehicular Ad-hoc Networks (VANETs). It allows the IEEE 802.11p standard simulation, which is part of IEEE Wireless Access in the Vehicular Environment (WAVE). One of the limitations of the 802.11p standard in NS-3 is using a simplified theoretical model of the Packet Error Rate (PER). This standard uses for the Physical Layer (PHY) the Orthogonal Frequency Division Multiplexing (OFDM) technique, which suffers from high Peak to Average Power Ratio (PAPR). This high PAPR of the signal causes degradation of the PER when it passes through a non-linear amplifier. In this work, we study the effect of the high PAPR over the PER using a MATLAB implementation of the 802.11p PHY. We also analyze the effect of using the Orthogonal Pilot Sequences (OPS) technique for PAPR reduction. The results show that the high PAPR affects the PER of high data rates, which use 16-QAM and 64-QAM modulation. Finally, these results are extended to NS-3 simulations as a new model of the IEEE 802.11p PHY with high realism since it considers the effect of the non-linear HPA. The NS-3 results show a similar trend compared to the MATLAB simulations.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77930242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza
{"title":"Performance Evaluation in Misbehaviour Detection Techniques for DoS Attacks in VANETs","authors":"Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza","doi":"10.1145/3479240.3488510","DOIUrl":"https://doi.org/10.1145/3479240.3488510","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) provides communication between vehicles and roadside infrastructures to improve safety, traffic efficiency, and comfort. VANET requires the implementation of precise security mechanisms to guarantee safety because attackers are always searching for methods to exploit network vulnerabilities. A common and harmful threat is the Denial of Service (DoS) attack. DOS is performed by malicious nodes to block vehicle communications and to interrupt network availability. In this work, we evaluate three different misbehavior detection mechanisms: threshold, behavioral, and cooperative. These methods are compared using the F2MD simulation environment with four DoS attacks: Normal, Random, Sybil, and DDoS. The performance of the misbehavior detection mechanisms is evaluated by accuracy, recall, and precision. Our comparative results demonstrate that the threshold-based method outperforms the other two in the proposed simulation scenario.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85611121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}