WINSYS 2014 Abstracts


Area 1 - Sensor, Mesh and Ad Hoc Communications and Networks

Posters
Paper Nr: 7
Title:

An Effective Alert-Message Routing Protocol for Urban VANETs

Authors:

Hsing-Lung Chen, Han-Ju Hsieh and Shu-Hua Hu

Abstract: Vehicular Ad-hoc Networks (VANETs) have become a very popular issue in recent years. VANETs are one kind of Mobile Ad-hoc Networks (MANETs), but it possesses different properties, such as faster node’s mobility and quick topological change. Therefore, the methods employed on MANETs would not be suitable for VANETs. VANETs have many kinds of applications such as increasing driving safety, decreasing traffic congestion and offering better driving services. One of the most important issues is how to disseminate “alert message” efficiently such that, when an accident happens, it could be warning drivers off to increase driving safety. The traditional method, flooding, provides a good reachability but it may causes “Broadcast Strom Problem”, resulting in bandwidth abuse. In this paper, we propose the bidirectional broadcasting scheme (BBS) which ensures bidirectional broadcasting on any kinds of roads, such that it could be suitable for both street and highway scenarios. The simulations are conducted with network simulator NS2. The simulation results show that the proposed scheme can achieve high reachability and low bandwidth usage.

Area 2 - Wireless and Mobile Technologies

Full Papers
Paper Nr: 4
Title:

Resource Allocation in GMD and SVD-based MIMO System

Authors:

Andreas Ahrens, Francisco Cano-Broncano and César Benavente-Peces

Abstract: Singular-value decomposition (SVD)-based multiple-input multiple output (MIMO) systems, where the whole MIMO channel is decomposed into a number of unequally weighted single-input single-output (SISO) channels, have attracted a lot of attention in the wireless community. The unequal weighting of the SISO channels has led to intensive research on bit- and power allocation even in MIMO channel situation with poor scattering conditions identified as the antennas correlation effect. In this situation, the unequal weighting of the SISO channels becomes even much stronger. In comparison to the SVD-assisted MIMO transmission, geometric mean decomposition (GMD)-based MIMO systems are able to compensate the drawback of weighted SISO channels when using SVD, where the decomposition result is nearly independent of the antennas correlation effect. The remaining interferences after the GMD-based signal processing can be easily removed by using dirty paper precoding as demonstrated in this work. Our results show that GMD-based MIMO transmission has the potential to significantly simplify the bit and power loading processes and outperforms the SVD-based MIMO transmission as long as the same QAM-constellation size is used on all equally-weighted SISO channels.

Paper Nr: 8
Title:

A Simultaneous Network Search Scheme for Fast Roaming and Handover of the Simultaneous Voice and LTE Mobile Devices

Authors:

Minsuk Ko, Myungchul Kim and Sungwon Kang

Abstract: Most of the countries in the world are currently providing 2G or 3G mobile communication services with limited coverage of LTE services. Therefore when an LTE service user moves into or around such countries, the LTE terminal needs to roam or handover to 2G or 3G network for service quality. For LTE terminals that can be connected to 3GPP Legacy (such as GSM, UMTS, and HSPA) and CDMA networks, it normally takes more than 2 minutes to select one of several candidate networks for roaming and 20 seconds to 2 minutes to handover to other networks before getting out of the LTE service area, which is considered very long by many LTE users. This paper proposes a scheme for fast roaming and handover that simultaneously searches for multiple networks with a Dual RF LTE terminal for both voice and data communication. In our experiment with the simultaneous network search implemented in a commercial LTE terminal with dual RF, the network selection time for roaming was reduced by 15% to 40% and the delay time for handover in LTE network was reduced by 90%.

Short Papers
Paper Nr: 21
Title:

Assessing the Cooperativeness of Users in Wi-Fi Networks

Authors:

Szymon Szott, Grzegorz Ptaszek and Lucjan Janowski

Abstract: Wi-Fi networks are based on the cooperation of users in sharing a common resource – the radio channel. This is a security risk because users may behave selfishly to increase their own throughput but at the same time decrease the overall network performance. Many scientific analyses have focused on this problem, but none have taken into account real user behavior. We present the initial results of a work-in-progress in which we studied a group of users in terms of their online behavior as well as their psychological characteristics. We have found that users behave selfishly in a wireless setting, regardless of their cooperative nature. We provide lessons learned as well as pose open questions for further research in this field.

Paper Nr: 22
Title:

Impact of the IEEE 802.11aa Intra-AC Prioritization on QoE for H.264 Compression

Authors:

Katarzyna Kosek-Szott, Marek Natkaniec, Lukasz Prasnal and Lucjan Janowski

Abstract: Recently, a new 802.11aa amendment has been released. Its main goal is to increase quality of service support for audio-video traffic streams. Among others, it defines the intra-access category prioritization mechanism coupled with appropriate traffic selection procedures, in order to increase the granularity of traffic prioritization in comparison to the currently used EDCA. This paper presents the preliminary study of the possible impact of the new feature on quality of experience (QoE) in case of H.264 video streams. The obtained results show that IEEE 802.11aa and 802.1Q parameters should be tuned to efficiently use the available bandwidth.

Paper Nr: 23
Title:

Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations

Authors:

Imen El Bouabidi, Salima Smaoui, Faouzi Zarai, Mohammad S. Obaidat and Lotfi Kamoun

Abstract: In charge of several critical functionalities, the Neighbor Discovery Protocol (NDP) is used by IPv6 nodes to find out nodes on the link, to learn their link-layer addresses to discover routers, and to preserve reachability information about the paths to active neighbors. Given its important and multifaceted role, security and efficiency must be ensured. However, NDP is vulnerable to critical attacks such as spoofing address, denial-of-service (DoS) and reply attack. Thus, in order to protect the NDP protocol, the Secure Neighbor Discovery (SEND) was designed. Nevertheless, SEND’s protection still suffers from numerous threats and it is currently incompatible with the context of mobility and especially with the proxy Neighbor Discovery function used in Mobile IPv6. To overcome these limitations, this paper defines a new protocol named Improved Secure Neighbor Discovery (ISEND) which adapt SEND protocol to the context of mobility and extend it to new functionalities. The proposed protocol (ISEND) has been modeled and verified using the Security Protocol ANimator software (SPAN) for the Automated Validation of Internet Security Protocols and Applications (AVISPA) which have proved that authentication goals are achieved. Hence, the scheme is safe and efficient when an intruder is present.

Posters
Paper Nr: 3
Title:

Identification Technology of Mobile Phone Devices Using RFF

Authors:

Saulius Japertas, Aurelijus Budnikas and Gedeiminas Činčikas

Abstract: The vulnerability of the device identifiers, such as IP and MAC addresses, IMEI and IMSI codes, etc. creates threat to the information security, integrity and reliability. One of the solutions of this threat is usage of Radio Frequency Fingerprinting (RFF) technology for identifying wireless devices based on their unique radiation “fingerprint” as opposed to their addresses or codes. In this work identification problems of mobile radio stations (from here in – mobile phones) are being analyzed and identification methodology for identifying them based on the mathematical processing of front and rear fronts is proposed. All of this provides new insight in the field of signal detection and identification, thus by using this method only the original data is received. The purpose of this work is identification of a mobile phone, working on the DCS (digital cellular service) frequency, based on the phone’s radiated signal time characteristics.

Paper Nr: 5
Title:

Monitoring Wi-Fi Radiation Levels at Residences in Kuwait - A Field Survey

Authors:

Fuad Alkoot

Abstract: Many are questioning the health effects of EMF radiation transmitted by mobile phone network or simply the Wi-Fi networks at public and private locations. High frequency radiation has been linked to various types of illnesses and recently has been categorised as class 2B carcinogen. The Wi-Fi source has been considered as safe due to the low emitted radiation levels compared to the standard limits. However, many are questioning the adequacy of these limits. Additionally, the technology has become very common in the majority of residences resulting in an accumulation of several networks in each house. This increases the amount of radiation and supports the possibly of increased hazard. In this study, we aim at documenting the state of radiation due to WLAN sources at 2.4GHz at various residences in Kuwait. Results indicate that apartments in building complexes suffer from higher radiation sources due to the higher population density at these buildings. Although houses suffer from a smaller number of neighbouring Access Points they also show a high radiation level. Levels at the surveyed house reach -51dBA/m, which is equivalent to 0.024% of the ICNIRP limit.