Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583492
P. Tilanus, B. Ran, M. Faeth, Dimitris Kelaidonis, V. Stavroulaki
Today there are more sensors and actuators in isolated intranets of things than in the overall internet of things (IoT). This paper discusses the motives to open up an intranet of things and make the things part of the global IoT, identifies the requirements from the involved parties, and extracts the essential architectural implications from these requirements. The proposed solution comprises the definition and control of Access Rights to the discovery and use of Virtual Objects (VO). This approach builds upon the widely accepted view that Virtual Objects serve as digital representation and gateway to Real World Objects (sensors, actuators, etc), and where VO databases serve to find these virtual counterparts. The Access Rights determine not only who may use a function of a Virtual Object and the conditions for that access, but also determine their discoverability when searching the database of virtual objects counterparts. Access Rights solve important requirements for security, privacy, and accountability, that are prerequisite to the expected economic and innovation benefits of an internet of things across organisational domains. Since verification of Access Rights to a VO plays a central role in the deployment of the IoT the scalable implementation with semantic technologies remains a challenge.
{"title":"Virtual Object access rights to enable multi-party use of sensors","authors":"P. Tilanus, B. Ran, M. Faeth, Dimitris Kelaidonis, V. Stavroulaki","doi":"10.1109/WoWMoM.2013.6583492","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583492","url":null,"abstract":"Today there are more sensors and actuators in isolated intranets of things than in the overall internet of things (IoT). This paper discusses the motives to open up an intranet of things and make the things part of the global IoT, identifies the requirements from the involved parties, and extracts the essential architectural implications from these requirements. The proposed solution comprises the definition and control of Access Rights to the discovery and use of Virtual Objects (VO). This approach builds upon the widely accepted view that Virtual Objects serve as digital representation and gateway to Real World Objects (sensors, actuators, etc), and where VO databases serve to find these virtual counterparts. The Access Rights determine not only who may use a function of a Virtual Object and the conditions for that access, but also determine their discoverability when searching the database of virtual objects counterparts. Access Rights solve important requirements for security, privacy, and accountability, that are prerequisite to the expected economic and innovation benefits of an internet of things across organisational domains. Since verification of Access Rights to a VO plays a central role in the deployment of the IoT the scalable implementation with semantic technologies remains a challenge.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583427
Karim Emara
Location privacy is one of the main challenges in vehicular ad hoc networks (VANET), which aim to protect vehicles from being tracked. Most of research work concern changing pseudonyms effectively to avoid linking messages through them. However, the sensitive information the vehicles send periodically in beacon messages make them vulnerable to tracking even if beacons are totally anonymous. In this thesis, we consider how to protect vehicles from being tracked while they are sharing sensitive information in beacons. The high beacon rate, high precision of shared information and strict latency constraints of application are the main challenges to our objective. We propose two solutions for this issue. The first one is to send the precise information only every period of time while sending inaccurate beacons in between. The second solution is to use secure group communication to prevent attacker from overhearing broadcast information. Both choices will be implemented and evaluated against a state-of-the-art tracker.
{"title":"Location privacy in vehicular networks","authors":"Karim Emara","doi":"10.1109/WoWMoM.2013.6583427","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583427","url":null,"abstract":"Location privacy is one of the main challenges in vehicular ad hoc networks (VANET), which aim to protect vehicles from being tracked. Most of research work concern changing pseudonyms effectively to avoid linking messages through them. However, the sensitive information the vehicles send periodically in beacon messages make them vulnerable to tracking even if beacons are totally anonymous. In this thesis, we consider how to protect vehicles from being tracked while they are sharing sensitive information in beacons. The high beacon rate, high precision of shared information and strict latency constraints of application are the main challenges to our objective. We propose two solutions for this issue. The first one is to send the precise information only every period of time while sending inaccurate beacons in between. The second solution is to use secure group communication to prevent attacker from overhearing broadcast information. Both choices will be implemented and evaluated against a state-of-the-art tracker.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583441
Victor Ramiro, E. Lochin, P. Sénac, T. Rakotoarivelo
Compared to wired networks, Delay/Disruption Tolerant Networks (DTN) are challenging to monitor due to their lack of infrastructure and the absence of end-to-end paths. This work studies the feasibility, limits and convergence of monitoring such DTNs. More specifically, we focus on the efficient monitoring of intercontact time distribution (ICT) between DTN participants. Our contribution is two-fold. First we propose two schemes to sample data using monitors deployed within the DTN. In particular, we sample and estimate the ICT distribution. Second, we evaluate this scheme over both simulated DTN networks and real DTN traces. Our initial results show that (i) there is a high correlation between the quality of sampling and the sampled mobility type, and (ii) the number and placement of monitors impact the estimation of the ICT distribution of the whole DTN.
{"title":"On the limits of DTN monitoring","authors":"Victor Ramiro, E. Lochin, P. Sénac, T. Rakotoarivelo","doi":"10.1109/WoWMoM.2013.6583441","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583441","url":null,"abstract":"Compared to wired networks, Delay/Disruption Tolerant Networks (DTN) are challenging to monitor due to their lack of infrastructure and the absence of end-to-end paths. This work studies the feasibility, limits and convergence of monitoring such DTNs. More specifically, we focus on the efficient monitoring of intercontact time distribution (ICT) between DTN participants. Our contribution is two-fold. First we propose two schemes to sample data using monitors deployed within the DTN. In particular, we sample and estimate the ICT distribution. Second, we evaluate this scheme over both simulated DTN networks and real DTN traces. Our initial results show that (i) there is a high correlation between the quality of sampling and the sampled mobility type, and (ii) the number and placement of monitors impact the estimation of the ICT distribution of the whole DTN.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583501
Tayeb Lemlouma, Sébastien Laborie, P. Roose
In this work, we propose a framework for automatic dependency evaluation that can notify the changes of the elderly dependency, hence providing persons with required services in time. In order to validate our approach, we target the French dependent population. Especially, we focus our proposal on the AGGIR dependency model used in the French medical field. Our objective is to provide a flexible architecture and an extensible model linked to opened data that can refer to a wide variety of services (hardware sensors and software; simple or composed services).
{"title":"Toward a context-aware and automatic evaluation of elderly dependency in smart homes and cities","authors":"Tayeb Lemlouma, Sébastien Laborie, P. Roose","doi":"10.1109/WoWMoM.2013.6583501","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583501","url":null,"abstract":"In this work, we propose a framework for automatic dependency evaluation that can notify the changes of the elderly dependency, hence providing persons with required services in time. In order to validate our approach, we target the French dependent population. Especially, we focus our proposal on the AGGIR dependency model used in the French medical field. Our objective is to provide a flexible architecture and an extensible model linked to opened data that can refer to a wide variety of services (hardware sensors and software; simple or composed services).","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583432
Sarogini Grace Pease
Provision of instantaneous, mobile and dependable media communications in military and disaster scenarios must overcome certain wireless network issues: lack of reliable existing infrastructure, immutability of safety-certified protocols and layer-2 dynamics with contributing factors including hidden transmitters and fading channels. This extended abstract investigates a cross-layer methodology to provide timely MANET communications through optimal channel selection and dynamic contention reduction, without protocol modification. This is done using ROAM: a new Real-time Optimised Ad hoc Middleware based architecture that has been implemented and validated in the ns2-MIRACLE simulator.
{"title":"ROAM: Supporting safety critical applications in MANETs with cross-layer middleware","authors":"Sarogini Grace Pease","doi":"10.1109/WoWMoM.2013.6583432","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583432","url":null,"abstract":"Provision of instantaneous, mobile and dependable media communications in military and disaster scenarios must overcome certain wireless network issues: lack of reliable existing infrastructure, immutability of safety-certified protocols and layer-2 dynamics with contributing factors including hidden transmitters and fading channels. This extended abstract investigates a cross-layer methodology to provide timely MANET communications through optimal channel selection and dynamic contention reduction, without protocol modification. This is done using ROAM: a new Real-time Optimised Ad hoc Middleware based architecture that has been implemented and validated in the ns2-MIRACLE simulator.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WOWMOM.2013.6583449
Vangelis Angelakis, A. Capone, Alexandros G. Fragkiadakis, S. Napoli, Stefanos Papadakis, G. Perantinos, Vassilis Spitadakis, E. Tragos, D. Yuan
The MESH-WISE project is aiming to address key fundamental issues in wireless mesh networking that span from fundamental performance characterization to prototyping heterogeneous-access mesh networking solutions for emergency response scenarios. In this paper we present the infrastructures that will be leveraged in this project and the latest results that have been acquired from the ones that are deployed. We further discuss the state of the art in academic and industrial resource and network management platforms and discuss how we will use existing know-how towards a centralized solution.
{"title":"Experience from testbeds and management platforms towards mesh networking with heterogeneous wireless access","authors":"Vangelis Angelakis, A. Capone, Alexandros G. Fragkiadakis, S. Napoli, Stefanos Papadakis, G. Perantinos, Vassilis Spitadakis, E. Tragos, D. Yuan","doi":"10.1109/WOWMOM.2013.6583449","DOIUrl":"https://doi.org/10.1109/WOWMOM.2013.6583449","url":null,"abstract":"The MESH-WISE project is aiming to address key fundamental issues in wireless mesh networking that span from fundamental performance characterization to prototyping heterogeneous-access mesh networking solutions for emergency response scenarios. In this paper we present the infrastructures that will be leveraged in this project and the latest results that have been acquired from the ones that are deployed. We further discuss the state of the art in academic and industrial resource and network management platforms and discuss how we will use existing know-how towards a centralized solution.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583475
Sascha Gübner, C. Lindemann
Recently, two trends in wireless communication are observable. First, traffic patterns tend to be unsaturated, due to an enormous increase of traffic types like mobile video and voice streaming. Second, new standards like IEEE 802.11n or IEEE 802.11ac allow huge physical data rates up to several Gbit/s. However, to utilize these data rates an efficient usage of the new frame aggregation feature is necessary. We formulate an analytical model that captures the impact of frame aggregation on routing and transform it into an integer linear program. Furthermore, we propose a heuristic approach that simplifies the computational complexity and show both through extensive simulations and real-world testbed experiments that an aggregation-aware routing scheme helps to efficiently aggregate several unsaturated flows and leads to decreased end-to-end delay and decreased contention in wireless multi-hop networks.
{"title":"Aggregation-aware routing in wireless multi-hop networks with frame aggregation","authors":"Sascha Gübner, C. Lindemann","doi":"10.1109/WoWMoM.2013.6583475","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583475","url":null,"abstract":"Recently, two trends in wireless communication are observable. First, traffic patterns tend to be unsaturated, due to an enormous increase of traffic types like mobile video and voice streaming. Second, new standards like IEEE 802.11n or IEEE 802.11ac allow huge physical data rates up to several Gbit/s. However, to utilize these data rates an efficient usage of the new frame aggregation feature is necessary. We formulate an analytical model that captures the impact of frame aggregation on routing and transform it into an integer linear program. Furthermore, we propose a heuristic approach that simplifies the computational complexity and show both through extensive simulations and real-world testbed experiments that an aggregation-aware routing scheme helps to efficiently aggregate several unsaturated flows and leads to decreased end-to-end delay and decreased contention in wireless multi-hop networks.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114138191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583425
Imran Khan
Wireless Sensor Networks (WSNs) are used in many application areas including health, agriculture and gaming. New advances in sensor technology make it pertinent to consider sharing a deployed WSN infrastructure by multiple applications, including applications which are designed after the WSN deployment. For my PhD research I propose a novel WSN virtualization framework that allows multiple users to run their application tasks over underlying WSN resources in a transparent way. This paper presents the overview of the proposed WSN virtualization framework, related work, current status and future work.
{"title":"Design and analysis of virtualization framework for Wireless Sensor Networks","authors":"Imran Khan","doi":"10.1109/WoWMoM.2013.6583425","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583425","url":null,"abstract":"Wireless Sensor Networks (WSNs) are used in many application areas including health, agriculture and gaming. New advances in sensor technology make it pertinent to consider sharing a deployed WSN infrastructure by multiple applications, including applications which are designed after the WSN deployment. For my PhD research I propose a novel WSN virtualization framework that allows multiple users to run their application tasks over underlying WSN resources in a transparent way. This paper presents the overview of the proposed WSN virtualization framework, related work, current status and future work.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583362
M. Aymerich, Roger Baig, P. Garcia, Ivan Vilata i Balaguer, Axel Neumann, Davide Vega, E. López, Felix Freitag, L. Navarro
Community-Lab is a testbed for researchers to carry out experiments within wireless community networks. Community networks are an emergent model of infrastructures built with off-the-shelf communication equipment that aims to satisfy a community's demand for Internet access and ICT services. Community-Lab consists of a set of nodes that are integrated in existing community networks, thus giving researchers access to community networks and allowing them to conduct experimental evaluation of applications deployed there. ICT services and applications beyond Internet access are an important milestone - yet not completely reached - to add value to community networks. The challenging environment of community networks however needs a careful evaluation of application performance to make the user experience successful. This paper focuses on demonstrating the deployment of applications in Community-Lab. By means of selected applications, we show how Community-Lab can be used by researchers to perform experiments with applications in community networks.
{"title":"Deploying applications with Community-Lab in wireless community networks","authors":"M. Aymerich, Roger Baig, P. Garcia, Ivan Vilata i Balaguer, Axel Neumann, Davide Vega, E. López, Felix Freitag, L. Navarro","doi":"10.1109/WoWMoM.2013.6583362","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583362","url":null,"abstract":"Community-Lab is a testbed for researchers to carry out experiments within wireless community networks. Community networks are an emergent model of infrastructures built with off-the-shelf communication equipment that aims to satisfy a community's demand for Internet access and ICT services. Community-Lab consists of a set of nodes that are integrated in existing community networks, thus giving researchers access to community networks and allowing them to conduct experimental evaluation of applications deployed there. ICT services and applications beyond Internet access are an important milestone - yet not completely reached - to add value to community networks. The challenging environment of community networks however needs a careful evaluation of application performance to make the user experience successful. This paper focuses on demonstrating the deployment of applications in Community-Lab. By means of selected applications, we show how Community-Lab can be used by researchers to perform experiments with applications in community networks.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583465
L. Seitz, G. Selander, C. Gehrmann
This paper describes a framework that allows fine-grained and flexible access control to connected devices with very limited processing power and memory. We propose a set of security and performance requirements for this setting and derive an authorization framework distributing processing costs between constrained devices and less constrained back-end servers while keeping message exchanges with the constrained devices at a minimum. As a proof of concept we present performance results from a prototype implementing the device part of the framework.
{"title":"Authorization framework for the Internet-of-Things","authors":"L. Seitz, G. Selander, C. Gehrmann","doi":"10.1109/WoWMoM.2013.6583465","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583465","url":null,"abstract":"This paper describes a framework that allows fine-grained and flexible access control to connected devices with very limited processing power and memory. We propose a set of security and performance requirements for this setting and derive an authorization framework distributing processing costs between constrained devices and less constrained back-end servers while keeping message exchanges with the constrained devices at a minimum. As a proof of concept we present performance results from a prototype implementing the device part of the framework.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}