Pub Date : 2016-08-18DOI: 10.1109/ISCC.2016.7543898
M. Calzarossa, L. Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glendon L. Moriarty
Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how, and when users utilize emotional support systems, this paper examines user and conversation characteristics on 7 Cups of Tea. 7 Cups of Tea is a massive, vibrant emotional support system with a community of listeners ready to help those with any number of emotional issues. Intriguing insights, including evidence of world-wide adoption of the service, the need to seek immediate support from many others, and a rich-get-richer phenomenon underscore a growing need for online emotional support systems and highlight important aspects to promote their long-term viability.
{"title":"Measuring the users and conversations of a vibrant online emotional support system","authors":"M. Calzarossa, L. Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glendon L. Moriarty","doi":"10.1109/ISCC.2016.7543898","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543898","url":null,"abstract":"Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how, and when users utilize emotional support systems, this paper examines user and conversation characteristics on 7 Cups of Tea. 7 Cups of Tea is a massive, vibrant emotional support system with a community of listeners ready to help those with any number of emotional issues. Intriguing insights, including evidence of world-wide adoption of the service, the need to seek immediate support from many others, and a rich-get-richer phenomenon underscore a growing need for online emotional support systems and highlight important aspects to promote their long-term viability.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-18DOI: 10.1109/ISCC.2016.7543895
S. Kazemi, M. Rasti
Two-tier networks consisting of macrocell and femtocells are provided as a solution to increase capacity and improve indoor coverage of cellular networks. In two-tier networks, when the spectrum is shared by macrocell and all of femtocells, the cross-tier and co-tier interference should be taken into account. In this paper, we investigate the power control problem of minimizing the aggregate transmit power for macro-tier and the joint power control and sub-channel allocation problem of maximizing the total rate for femto-tier, both in uplink transmission, while the cross-tier and co-tier interference are both taken into account. Then, to solve these problems, we propose distributed sub-optimal algorithms for both macro and femto-tier. Finally, simulation results are presented to confirm out performance of our proposed algorithm and to compare with the existing algorithm.
{"title":"Joint power control and sub-channel allocation for co-channel OFDMA femtocells","authors":"S. Kazemi, M. Rasti","doi":"10.1109/ISCC.2016.7543895","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543895","url":null,"abstract":"Two-tier networks consisting of macrocell and femtocells are provided as a solution to increase capacity and improve indoor coverage of cellular networks. In two-tier networks, when the spectrum is shared by macrocell and all of femtocells, the cross-tier and co-tier interference should be taken into account. In this paper, we investigate the power control problem of minimizing the aggregate transmit power for macro-tier and the joint power control and sub-channel allocation problem of maximizing the total rate for femto-tier, both in uplink transmission, while the cross-tier and co-tier interference are both taken into account. Then, to solve these problems, we propose distributed sub-optimal algorithms for both macro and femto-tier. Finally, simulation results are presented to confirm out performance of our proposed algorithm and to compare with the existing algorithm.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543712
Jacopo Cortellazzi, L. Foschini, Carlos Roberto de Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, G. D. Alperstedt
New sensors embedded into modern smartphones has led into a new data collection prospective in which people directly collect all the sensitive data. This feature has found different applications, in particular in the Smart Cities area, in order to establish dynamic communications between the citizens and the city government. This category of application is nestled into the Mobile Crowd Sensing (MCS) application group, due to their final purpose of sharing sensing data to an open platform that includes a huge number of people. This paper presents an extension of the general-purpose ParticipAct platform, a MCS application developed by the University of Bologna, focused on the needs of people with impaired mobility. The goal is specializing ParticipAct to enable a crowdsourcing platform that guarantees a solid support for their lifetime allowing reviewing and sharing opinions regarding public and private places and architectonic barriers of a city area. Showed results confirm the effectiveness of the developed application in terms of both its viability via integration with existing and widely diffused Geographical Information Systems (GIS), and its feasibility in terms of system and user-perceived performances.
{"title":"Crowdsensing and proximity services for impaired mobility","authors":"Jacopo Cortellazzi, L. Foschini, Carlos Roberto de Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, G. D. Alperstedt","doi":"10.1109/ISCC.2016.7543712","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543712","url":null,"abstract":"New sensors embedded into modern smartphones has led into a new data collection prospective in which people directly collect all the sensitive data. This feature has found different applications, in particular in the Smart Cities area, in order to establish dynamic communications between the citizens and the city government. This category of application is nestled into the Mobile Crowd Sensing (MCS) application group, due to their final purpose of sharing sensing data to an open platform that includes a huge number of people. This paper presents an extension of the general-purpose ParticipAct platform, a MCS application developed by the University of Bologna, focused on the needs of people with impaired mobility. The goal is specializing ParticipAct to enable a crowdsourcing platform that guarantees a solid support for their lifetime allowing reviewing and sharing opinions regarding public and private places and architectonic barriers of a city area. Showed results confirm the effectiveness of the developed application in terms of both its viability via integration with existing and widely diffused Geographical Information Systems (GIS), and its feasibility in terms of system and user-perceived performances.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543705
S. Mirri, Catia Prandi, M. Roccetti, P. Salomoni
A multimedia application (termed Di Piazza in Piazza) has been designed and developed that allows people to enjoy a narrative experience based on food and culinary traditions. Several kinds of digital content narrating the gastronomic culture of the Emilia Romagna region has been made available through a gestural interface within an installation to be exhibited in public spaces. The idea of using hands to access content came after the consideration that hands play a primary role in the relationship between humans and food. Our multimedia installation has gone on tour through several cities in Italy allowing to gather a huge amount of data whose analysis provides some important results. Among those: (a) the use of hands was mostly appreciated by visitors and (b) regional products and gastronomic traditions raised interest in visitors, thus confirming that a strong cultural relationship exists among people and food, in cultural terms.
设计和开发了一个多媒体应用程序(称为dipiazza in Piazza),使人们能够享受基于食物和烹饪传统的叙事体验。介绍艾米利亚罗马涅地区美食文化的几种数字内容通过手势界面在公共空间展示。在考虑到手在人类与食物的关系中起着主要作用之后,人们想到了用手来获取内容的想法。我们的多媒体装置已经在意大利的几个城市巡回演出,收集了大量的数据,这些数据的分析提供了一些重要的结果。其中包括:(a)游客对双手的使用大多表示赞赏;(b)地区产品和美食传统提高了游客的兴趣,从而证实了在文化方面,人与食物之间存在着牢固的文化关系。
{"title":"Food and gastronomic heritage: Telling a story of eyes and hands","authors":"S. Mirri, Catia Prandi, M. Roccetti, P. Salomoni","doi":"10.1109/ISCC.2016.7543705","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543705","url":null,"abstract":"A multimedia application (termed Di Piazza in Piazza) has been designed and developed that allows people to enjoy a narrative experience based on food and culinary traditions. Several kinds of digital content narrating the gastronomic culture of the Emilia Romagna region has been made available through a gestural interface within an installation to be exhibited in public spaces. The idea of using hands to access content came after the consideration that hands play a primary role in the relationship between humans and food. Our multimedia installation has gone on tour through several cities in Italy allowing to gather a huge amount of data whose analysis provides some important results. Among those: (a) the use of hands was mostly appreciated by visitors and (b) regional products and gastronomic traditions raised interest in visitors, thus confirming that a strong cultural relationship exists among people and food, in cultural terms.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543711
Philippe Massonet, S. Dupont, Arnaud Michot, A. Levin, M. Villari
Capacity, availability or resilience of clouds can be increased by interconnecting two or more cloud computing environments to form a cloud federation and share resources. Shared resources include compute and storage resources but also networking resources. By integrating software defined networks/ virtual networks (SDN), network function virtualization (NFV) and network function chaining (SFC) technologies into cloud management platforms it is possible to create more advanced and flexible cloud federation mechanisms. In this paper we show how to secure federated cloud networks and how to customise the security of each individual federated cloud network running in a cloud federation. We propose an architecture for securing federated cloud networks by enforcing a global security policy to all network segments of a federation, and local security policies on each network of the federation. Cloud stakeholders can specify the required security virtual network functions (VNF), how to configure them, and how to chain them in a service manifest. The proposed architecture is illustrated with a deep packet inspection case study. Future work on implementing the proposed architecture in an OpenStack federation is briefly discussed.
{"title":"An architecture for securing federated cloud networks with Service Function Chaining","authors":"Philippe Massonet, S. Dupont, Arnaud Michot, A. Levin, M. Villari","doi":"10.1109/ISCC.2016.7543711","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543711","url":null,"abstract":"Capacity, availability or resilience of clouds can be increased by interconnecting two or more cloud computing environments to form a cloud federation and share resources. Shared resources include compute and storage resources but also networking resources. By integrating software defined networks/ virtual networks (SDN), network function virtualization (NFV) and network function chaining (SFC) technologies into cloud management platforms it is possible to create more advanced and flexible cloud federation mechanisms. In this paper we show how to secure federated cloud networks and how to customise the security of each individual federated cloud network running in a cloud federation. We propose an architecture for securing federated cloud networks by enforcing a global security policy to all network segments of a federation, and local security policies on each network of the federation. Cloud stakeholders can specify the required security virtual network functions (VNF), how to configure them, and how to chain them in a service manifest. The proposed architecture is illustrated with a deep packet inspection case study. Future work on implementing the proposed architecture in an OpenStack federation is briefly discussed.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543746
Ilker K. Basaran, Hasan Bulut
As an emerging technology, Vehicular ad hoc networks (VANETs) aim to increase safety and comfort of driving in highways and urban streets. The conventional measures taken have a positive effect on the decline of casualties and injuries incurred by the accidents. But the number of incidents in the traffic still remains stable. VANETs intend to overcome this problem by providing additional information to the driver, thus allowing him to react faster and better in adverse situations. In order to achieve this, VANETs require efficient routing protocols for message transmission among vehicles. In this paper, we explore the performances of four prominent non-delay tolerant routing protocols, namely GPSR, GPSR+AGF, GSR, and GPSRJ+. Although relatively outdated, these protocols are initial inspiration to many routing methods and commonly used as comparison benchmark when a new routing protocol is to be introduced. The evaluation metrics that are used are Packet Delivery Ratio, Average Delay, Traffic Control Overhead, and Average Hop Count.
{"title":"Performance comparison of non Delay Tolerant VANET routing protocols","authors":"Ilker K. Basaran, Hasan Bulut","doi":"10.1109/ISCC.2016.7543746","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543746","url":null,"abstract":"As an emerging technology, Vehicular ad hoc networks (VANETs) aim to increase safety and comfort of driving in highways and urban streets. The conventional measures taken have a positive effect on the decline of casualties and injuries incurred by the accidents. But the number of incidents in the traffic still remains stable. VANETs intend to overcome this problem by providing additional information to the driver, thus allowing him to react faster and better in adverse situations. In order to achieve this, VANETs require efficient routing protocols for message transmission among vehicles. In this paper, we explore the performances of four prominent non-delay tolerant routing protocols, namely GPSR, GPSR+AGF, GSR, and GPSRJ+. Although relatively outdated, these protocols are initial inspiration to many routing methods and commonly used as comparison benchmark when a new routing protocol is to be introduced. The evaluation metrics that are used are Packet Delivery Ratio, Average Delay, Traffic Control Overhead, and Average Hop Count.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114505340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543772
Lei Wang, Qing Li, Yong Jiang, Jianping Wu
Link flooding attack (LFA), as a new type of DDoS attack, can degrade or even cut off network connectivity of a target area. This attack employs legitimate, low-density flows to flood a group of selected links. Therefore, these malicious flows can hardly be distinguished by traditional schemes. In this paper, we propose a scheme called Woodpecker, which makes the LFA more difficult to take effect. First, we select M routers and upgrade them into SDN switches that can maximize the network connectivity. Second, we propose a proactive probe approach to quickly locate the congested links and judge whether LFA occurs. Finally, Woodpecker employs centralized traffic engineering based on the upgraded nodes, which can make the traffic balanced enough to eliminate the routing bottlenecks likely to be utilized by the adversary. We evaluate our scheme by comprehensive experiments. The results show that: 1) the bandwidth utilization of LFA-attacked links can be reduced by around 50%; 2) the average packet loss rate and jitter can be effectively mitigated under LFA attacks.
{"title":"Towards mitigating Link Flooding Attack via incremental SDN deployment","authors":"Lei Wang, Qing Li, Yong Jiang, Jianping Wu","doi":"10.1109/ISCC.2016.7543772","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543772","url":null,"abstract":"Link flooding attack (LFA), as a new type of DDoS attack, can degrade or even cut off network connectivity of a target area. This attack employs legitimate, low-density flows to flood a group of selected links. Therefore, these malicious flows can hardly be distinguished by traditional schemes. In this paper, we propose a scheme called Woodpecker, which makes the LFA more difficult to take effect. First, we select M routers and upgrade them into SDN switches that can maximize the network connectivity. Second, we propose a proactive probe approach to quickly locate the congested links and judge whether LFA occurs. Finally, Woodpecker employs centralized traffic engineering based on the upgraded nodes, which can make the traffic balanced enough to eliminate the routing bottlenecks likely to be utilized by the adversary. We evaluate our scheme by comprehensive experiments. The results show that: 1) the bandwidth utilization of LFA-attacked links can be reduced by around 50%; 2) the average packet loss rate and jitter can be effectively mitigated under LFA attacks.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543779
Daojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao
Inter-App Communication (IAC) plays an important role in Android platform to share data and services among applications. However, the existence of IAC capability leaks could lead to the unauthorized privileged operations. In this paper, we first investigate the usage of IAC in Android applications to show the prevalence of IAC in the Android development model. To mitigate the threat caused by IAC capability leaks in Android, we develop a real-time monitoring and control system, called IacDroid, which distinguishes and prevents the IAC capability leak accurately in both third-party and in-rom applications at runtime. IacDroid extends the Binder IPC mechanism and the system service to construct context-based component call chains between multiple applications. By leveraging the call chains, the permission system is extended to detect and prevent the IAC capability leaks. IacDroid also presents an intuitive client-side solution to help users control the IAC capability leaks. We implement the prototype in Android 4.3, and present a comprehensive assessment with 500 Google Play applications and 36 malicious applications. The experimental results demonstrate that IacDroid can effectively prevent the IAC capability leaks with a negligible performance overhead.
{"title":"IacDroid: Preventing Inter-App Communication capability leaks in Android","authors":"Daojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao","doi":"10.1109/ISCC.2016.7543779","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543779","url":null,"abstract":"Inter-App Communication (IAC) plays an important role in Android platform to share data and services among applications. However, the existence of IAC capability leaks could lead to the unauthorized privileged operations. In this paper, we first investigate the usage of IAC in Android applications to show the prevalence of IAC in the Android development model. To mitigate the threat caused by IAC capability leaks in Android, we develop a real-time monitoring and control system, called IacDroid, which distinguishes and prevents the IAC capability leak accurately in both third-party and in-rom applications at runtime. IacDroid extends the Binder IPC mechanism and the system service to construct context-based component call chains between multiple applications. By leveraging the call chains, the permission system is extended to detect and prevent the IAC capability leaks. IacDroid also presents an intuitive client-side solution to help users control the IAC capability leaks. We implement the prototype in Android 4.3, and present a comprehensive assessment with 500 Google Play applications and 36 malicious applications. The experimental results demonstrate that IacDroid can effectively prevent the IAC capability leaks with a negligible performance overhead.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543803
Hongyun Zhang, F. Safaei, Le Chung Tran
Wireless Body Area Network (WBAN) has been considered as a revolutionary technology to address current healthcare needs. However, before the extensive deployment of WBAN, one main challenge to be met is how to balance the trade-off between data transmission rate and energy efficiency. In this paper, we utilize WBAN's spatial correlation characteristics during movement and propose an efficient cross-layer scheme, named A3NC, which combines analog network coding (ANC) and MAC layer channel allocation. Our simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency compared to the conventional approaches. Meanwhile, our scheme also maintains a better balance between correlated sensors' upload throughput.
{"title":"Joint analog network coding and channel allocation in the walking scenario for WBAN","authors":"Hongyun Zhang, F. Safaei, Le Chung Tran","doi":"10.1109/ISCC.2016.7543803","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543803","url":null,"abstract":"Wireless Body Area Network (WBAN) has been considered as a revolutionary technology to address current healthcare needs. However, before the extensive deployment of WBAN, one main challenge to be met is how to balance the trade-off between data transmission rate and energy efficiency. In this paper, we utilize WBAN's spatial correlation characteristics during movement and propose an efficient cross-layer scheme, named A3NC, which combines analog network coding (ANC) and MAC layer channel allocation. Our simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency compared to the conventional approaches. Meanwhile, our scheme also maintains a better balance between correlated sensors' upload throughput.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543880
Fazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, B. Kantarci, M. Erol-Kantarci, S. Schuckers
The widespread use of mobile technology has accelerated the popularity of social networking services, and has made these services convenient to access. This paper presents a behaviometric mobile application, namely TrackMaison (Track My activity in social networks). TrackMaison keeps track of social network service usage of smartphone users through data usage, location, usage frequency and session duration of five popular social network services. The data collected by the mobile application is presented to the smartphone user and is analyzed to aid in understanding mobile social network service usage. Furthermore, we introduce the social activity rate and sociability factor metrics where the former is a function of a user's relative data usage rate in social network services and the latter is a function of a user's relative session durations in social networks. By using TrackMaison tool, we identify three user behavior types. Those are active user profile, moderately active user profile and low active user profile. Through analysis of real data, we advocate that continuous identification/authentication of mobile device users is possible by using the introduced sociability metrics. We further present a case study on various Instagram user profiles, and show that low active profiles can be identified with negligible false acceptance rates (FAR) whereas a highly active user can be identified with a FAR as low as 3%.
{"title":"Mobile behaviometric framework for sociability assessment and identification of smartphone users","authors":"Fazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, B. Kantarci, M. Erol-Kantarci, S. Schuckers","doi":"10.1109/ISCC.2016.7543880","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543880","url":null,"abstract":"The widespread use of mobile technology has accelerated the popularity of social networking services, and has made these services convenient to access. This paper presents a behaviometric mobile application, namely TrackMaison (Track My activity in social networks). TrackMaison keeps track of social network service usage of smartphone users through data usage, location, usage frequency and session duration of five popular social network services. The data collected by the mobile application is presented to the smartphone user and is analyzed to aid in understanding mobile social network service usage. Furthermore, we introduce the social activity rate and sociability factor metrics where the former is a function of a user's relative data usage rate in social network services and the latter is a function of a user's relative session durations in social networks. By using TrackMaison tool, we identify three user behavior types. Those are active user profile, moderately active user profile and low active user profile. Through analysis of real data, we advocate that continuous identification/authentication of mobile device users is possible by using the introduced sociability metrics. We further present a case study on various Instagram user profiles, and show that low active profiles can be identified with negligible false acceptance rates (FAR) whereas a highly active user can be identified with a FAR as low as 3%.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"33 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}