WINSYS 2017 Abstracts


Area 1 - Sensor Networks and Ad Hoc Communications

Full Papers
Paper Nr: 4
Title:

Game-theoretic End-to-end Throughput Optimisation in Wireless Sensor Networks

Authors:

Evangelos D. Spyrou and Dimitri K. Mitrakos

Abstract: One of the most important problems in the Wireless Sensor Network community is the enhancement of the end-to-end throughput that strengthens the reliability of the network. Transmission power adjustment may play a key role in accomplishing better throughput. Increasing transmission power to make the signal strength better is the intuitive solution; however, this may introduce certain problems such as interference and more energy consumption. However, decreasing the transmission power may result in a weak signal strength that may result in unreliable links, which also affect throughput significantly. One of the most important metrics for link reliability is the Expected Transmission Count (ETX). We take the additive ETX from the basestation to every node and we aim to optimise the route throughput by setting the transmission power accordingly. We address these trade-offs and we propose a game-theoretic solution that aims to maximize the end-to-end throughput between network nodes, while using the optimal transmission power. In this paper, we provide the conditions for the convergence of our algorithm to a pure Nash equilibrium. We show that our algorithm converges to the global optimum and that it is Lyapunov stable. We provide evidence that our algorithm converges to the best response dynamics under the fictitious play learning algorithm.

Short Papers
Paper Nr: 17
Title:

Coverage and Mobile Sensor Placement for Vehicles on Predetermined Routes: A Greedy Heuristic Approach

Authors:

Junade Ali and Vladimir Dyo

Abstract: Road potholes are not only nuisance but can also damage vehicles and pose serious safety risks for drivers. Recently, a number of approaches have been developed for automatic pothole detection using equipment such as accelerometers, image sensors or LIDARs. Mounted on vehicles, such as taxis or buses, the sensors can automatically detect potholes as the vehicles carry out their normal operation. While prior work focused on improving the performance of a standalone device, it simply assumed that the sensors would be installed on the entire fleet of vehicles. When the number of sensors is limited it is important to select an optimal set of vehicles to make sure that they do not cover similar routes in order to maximize the total coverage of roads inspected by sensors. The paper investigates this problem for vehicles that follow pre-determined routes, formulates it as a linear optimization problem and proposes a solution based on a greedy heuristic. The proposed approach has been tested on an official London bus route dataset containing 713 routes and showed up to 78% improvement compared to a random sensor placement selected as a baseline algorithm.

Posters
Paper Nr: 20
Title:

An Offline Outdoor Navigation System with Full Privacy

Authors:

Prakhar Kaushik, Vishal Saraswat and Francesco Buccafurri

Abstract: GPS navigation systems are a potential threat to user privacy in case of curious providers, espionage and many other aspects. Users tend to place blind trust into GPS applications without realizing the ease at which the GPS can be spoofed or their position compromised via either the hardware or software. Thus, when a high level of privacy assurance is required, the GPS should be completely switched off. This paper presents an efficient method, a smartphone-based alternative solution, for an outdoor offline navigation system, which works in the absence of GPS, wireless, and cellular signals. The proposed approach exploits the various digital and mathematical resources present to use DEM data and sensor data to minimize errors in the calculated position data.

Area 2 - Wireless and Mobile Technologies

Full Papers
Paper Nr: 12
Title:

A Q-learning-based Scheduler Technique for LTE and LTE-Advanced Network

Authors:

Souhir Feki, Faouzi Zarai and Aymen Belghith

Abstract: Long Term Evolution Advanced (LTE-A) is a mobile communication standard used for transmitting data in cellular networks. It inherits all principal technologies of LTE such as flexible bandwidth, Orthogonal Frequency Division Multiplexing Access (OFDMA) and provides new functionalities to enhance the performance and capacity. For some time, LTE-A must co-exist with the 2G and 3G cellular networks, so resource management, potential interference, interworking necessities, etc. are an important issues. The Radio Resource Management (RRM) main function is to ensure the efficient use of available radio resources, making use of the available adaptation techniques, and to serve users depending on their Quality of Service (QoS) parameters. In this paper, we propose a novel dynamic Q-learning based Scheduling Algorithm (QLSA) for downlink transmission in LTE and LTE-A cellular network based on the Q-learning algorithm and adaptable to variations in channel conditions. The main objective of the proposed algorithm is to make a good trade-off between fairness and throughput and to provide Quality of Service (QoS) guarantee to Guaranteed Bit Rate (GBR) services. Performances of QLSA are compared with existing scheduling algorithms and simulation results show that the proposed QLSA provides the best trade-off fairness/throughput.

Paper Nr: 13
Title:

Multi-layer Cooperative Intrusion Detection System for Cloud Environment

Authors:

Saadia Ghribi, Amel Meddeb Makhlouf and Faouzi Zarai

Abstract: In recent years, Cloud Computing had met a rapid development and an increasing popularity that have boosted the rate of its adoption. Pay for use, low-cost and rapid elasticity are some of advantages provided by Cloud Computing. However, this technology is facing many security challenges caused basically by the virtualization feature. Thus, Intrusion Detection is become crucial to secure the cloud environment. In fact, many security solutions have been proposed to overcome security issues and increase customers’ trust on Cloud Computing paradigm. After discussing existing Intrusion Detection Systems, deployed for Cloud Computing, we propose, in this paper, an approach that is based on cooperative and distributed intrusion detection, where a Cooperative Intrusion Detection approach is deployed for the Cloud Computing architecture in order to reinforce its security. In the implementation, many DDOS attacks type have been launched to test the performance of the proposed IDS. The experiment has lead to an effective Cloud IDS with lower false positive rate.

Paper Nr: 15
Title:

Crowdsourcing Location Sensitive Data for Dynamic Scenario by Adaptive Role Assignment

Authors:

Anubhuti Garg and Amiya Nayak

Abstract: The existing technique for performing crowdsourced, location-based sensing activity minimizes energy consumption by eliminating the use of GPS by some devices. For this, server detects a set of participants for the role of broadcaster which must turn-on their GPS to collect location information and broadcast it to neighbouring devices for their position calculation. However, if new devices join the region then they cannot participate in the ongoing sensing task until next localization phase when server reassigns role to all participants. In addition to this, if devices leave the region then their neighbouring devices may require a change of role. The current work does not provide solution to such dynamic scenarios. We provide time and energy efficient approach to allocate role adaptively to participants when they join or leave the region of interest. For this we propose incremental algorithms to assign role for the new participants joining the region and for modifying the roles of existing participants when some devices leave the region. This also eliminates the need for rerunning the role-assignment algorithm over the entire set of participants for every insertion and deletion. The proposed solutions are capable of saving 95-99.9% of the role assignment time without compensating energy needs.

Short Papers
Paper Nr: 1
Title:

Cryptographic Wireless Communication Device

Authors:

Alexander Boruchinkin, Anastasia Tolstaya and Andrey Starikovskiy

Abstract: The total increase in the use of mobile devices inevitably leads to an increase in the number of different security threats. The cryptographic device described in this article provides a secure (encrypted) transmission of data. It alerts the user if the crypto headset at the opposite end of the link is not trusted, thus extending the offending model (i.e. a list of the potential opportunities of the offender) to the possibility of to the possibility of substituting one of the encrypting devices. All functions for encryption and decryption are enclosed in a separate unit that connects to the phone via Bluetooth. The crypto headset specifications were compared with the closest analogues and ensures a higher level of security for each group of consumers: the corporate sector, government agencies, and individual users.

Paper Nr: 2
Title:

Switchable Phased Antenna Array with Passive Elements for 5G Mobile Terminals

Authors:

Igor Syrytsin, Shuai Zhang and Gert Frolund Pedersen

Abstract: In this paper, a reconfigurable phased antenna array system is constructed for the mobile terminals in the context of 5G communication system. The proposed antenna system operates at the resonance frequency of 28 GHz. The reconfigurability of the antenna element is achieved by using a passive slot antenna element with a switch. The passive element acts as a reflector when the switch is turned off, and thus, change in the main beam direction occurs. The antenna system consists of two sub-arrays on each of the short edges of the ground plane. The coverage efficiency of over 70 % at 10 dBi threshold gain is achieved by the proposed reconfigurable phased antenna array.

Paper Nr: 19
Title:

Frame Aggregation Size Determination for IEEE 802.11ac WLAN Considering Channel Utilization and Transfer Delay

Authors:

Tomokazu Moriyama, Ryo Yamamoto, Satoshi Ohzahata and Toshihiko Kato

Abstract: In order to improve the throughput over WLAN, the IEEE 802.11ac standard, which has been used recently, introduces the frame aggregation and MU-MIMO (multi-user multiple-input and multiple-output) mechanisms. The frame aggregation concatenates multiple data frames in one MAC data unit. MU-MIMO provides SDMA (space division multiple access), which allows multiple STAs (stations) to share space resources. In an 802.11ac WLAN, MU-MIMO is used in the downlink data transfer in a way that data frames to multiple STAs are aggregated separately and transmitted at the same time. When traffic loads to individual STAs are different, however, it is possible that there is a waste in space and time resources. In order to avoid this waste, several methods to control the frame aggregation size for MU-MIMO are proposed. Those methods focus mainly on increasing the channel utilization, and so they have a problem that there is a large delay in transmitting an aggregated data unit. In this paper, we propose a new method to determine the frame aggregation size considering both channel utilization and delay data frames suffer from in transmission queues. A performance evaluation result shows that our method provides high channel efficiency with keeping transmission delay in a relatively small value.

Posters
Paper Nr: 6
Title:

A MIH-based Framework for Network Selection in Future HetNets

Authors:

Amina Gharsallah, Nouri Omheni, Faouzi Zarai and Mahmoud Neji

Abstract: The heterogeneity is one of the key concepts of the Next Generation Wireless Networks (NGWNs). How to provide mobile users with the best connection anytime and anywhere become more important. In this paper, we propose an efficient vertical handover framework based on Media Independent Handover (MIH) technology, to address network selection in Heterogeneous Networks (HetNets) environments. A performance analysis is done and results are compared with existing algorithms for vertical handover. Results demonstrate a significant improvement with our developed approach.

Area 3 - Mobile Software and Services

Short Papers
Paper Nr: 8
Title:

Semantic Resource Discovery with CoAP in the Internet of Things

Authors:

Ali Yachir, Badis Djamaa, Kheireddine Zeghouani, Marwen Bellal and Mohammed Boudali

Abstract: The Constrained Application Protocol (CoAP) is a lightweight and power-efficient Internet standard specifically designed for M2M communication in the Internet of Things (IoT). CoAP provides a set of mechanisms for IoT interactions including request/response, publish/subscribe and resource discovery. For the latter, a Resource Directory (RD) solution is proposed to register and store information about IoT resources to be queried by users. Such a solution, however, only allows syntactic discovery. In this paper, we extend CoAP with lightweight semantic-rich information by defining appropriate CoRE link format attributes describing both IoT resources and user requests. Such an extension is integrated with the RD to facilitate semantic resources discovery. Implementation and thorough evaluations of the proposed approach show important performance enhancements when compared with the default RD solution.

Paper Nr: 21
Title:

Discovering Good Links Between Objects in the Internet of Things

Authors:

Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera, Luca Console and Assunta Matassa

Abstract: The Internet of Things is an emerging paradigm allowing the control of the physical world via the Internet protocol and both human-to-machine and machine-to-machine communication. In this scenario, one of the most challenging issues is how to choose links among objects in order to guarantee an effective access to services and data. In this paper, we present a new selection criterion that improves the classical approach. To reach this goal, we extract knowledge coming from the social network of humans, as owners of objects, and we exploit a recently proven property called interest assortativity. The preliminary experimental results reported in this paper give a first evidence of the effectiveness of our approach, which performs better than classical strategies. This is achieved by choosing only not redundant links in such a way that network connectivity is preserved and power consumption is reduced.