Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784952
M. Ramilli, M. Prandini
Social networks heavily rely on the concept of reputation. Some platforms implement formalized systems to express reputation, for example as a rating, but the concept is broader and very often the reputation of a user, the perceived quality of a product, the popularity of a TV show or any other subject of published information stems from a more informal collection of comments and recommendations. Thus, guaranteeing the authenticity of the published data has become very important, and various systems have been developed to deal with this problem. However, in this paper we are going to demonstrate that the most commonly adopted filtering techniques do not adequately protect the messaging platforms from the automated injection of comments. The adopted methodology is quite empirical, but nonetheless it allows to point out not only the existence of the vulnerability, but also to make some educated guess about the reasons behind the failure of the tested filters. In the conclusion, we trace a possible path leading to a more effective solution.
{"title":"Comment Spam Injection Made Easy","authors":"M. Ramilli, M. Prandini","doi":"10.1109/CCNC.2009.4784952","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784952","url":null,"abstract":"Social networks heavily rely on the concept of reputation. Some platforms implement formalized systems to express reputation, for example as a rating, but the concept is broader and very often the reputation of a user, the perceived quality of a product, the popularity of a TV show or any other subject of published information stems from a more informal collection of comments and recommendations. Thus, guaranteeing the authenticity of the published data has become very important, and various systems have been developed to deal with this problem. However, in this paper we are going to demonstrate that the most commonly adopted filtering techniques do not adequately protect the messaging platforms from the automated injection of comments. The adopted methodology is quite empirical, but nonetheless it allows to point out not only the existence of the vulnerability, but also to make some educated guess about the reasons behind the failure of the tested filters. In the conclusion, we trace a possible path leading to a more effective solution.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128754570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784902
Alejandro Ruiz-Rivera, Dheeraj K. Klair, Kwan-Wu Chin
This paper studies the energy efficiency of twelve Pure and Slotted Aloha tag reading protocol variants via simulation. We compare their energy consumption in three collision resolution phases: 1) success, 2) collision, and 3) idle. Our extensive simulation results show that Pure Aloha with fast mode and muting has the lowest energy consumption, and hence is most suited for deployment in energy-constrained environments.
{"title":"A Simulation Study on the Energy Efficiency of Pure and Slotted Aloha Based RFID Tag Reading Protocols","authors":"Alejandro Ruiz-Rivera, Dheeraj K. Klair, Kwan-Wu Chin","doi":"10.1109/CCNC.2009.4784902","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784902","url":null,"abstract":"This paper studies the energy efficiency of twelve Pure and Slotted Aloha tag reading protocol variants via simulation. We compare their energy consumption in three collision resolution phases: 1) success, 2) collision, and 3) idle. Our extensive simulation results show that Pure Aloha with fast mode and muting has the lowest energy consumption, and hence is most suited for deployment in energy-constrained environments.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"10 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129459057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784900
Jari T. Savolainen, Harri Hirvola, S. Iraji
Electrical identifiers are rushing to overtake and replace traditional identification methods, like barcodes. Advantages of these new technologies are bigger data capacity and rate, more reliable reading and no need for line of sight. NFC tags are widely used already for example in libraries, but the representative of newer technology in UHF frequency band, EPC, is just around the corner. In this paper, we present the integration of EPC RFID reader to the mobile phone, as a functional cover. Furthermore, we propose ways to provide services to the user who reads EPC tags.
{"title":"EPC UHF RFID Reader: Mobile Phone Integration and Services","authors":"Jari T. Savolainen, Harri Hirvola, S. Iraji","doi":"10.1109/CCNC.2009.4784900","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784900","url":null,"abstract":"Electrical identifiers are rushing to overtake and replace traditional identification methods, like barcodes. Advantages of these new technologies are bigger data capacity and rate, more reliable reading and no need for line of sight. NFC tags are widely used already for example in libraries, but the representative of newer technology in UHF frequency band, EPC, is just around the corner. In this paper, we present the integration of EPC RFID reader to the mobile phone, as a functional cover. Furthermore, we propose ways to provide services to the user who reads EPC tags.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784863
Long Cheng, Canfeng Chen, Jian Ma, Yimin Chen
Utilizing mobile devices such as PDAs, cell phones to collect and deliver sensor data is considered as a promising application in future ubiquitous computing environment. In such application scenarios, the human factor is becoming increasingly important. In this paper, we propose a group-level incentive scheme targeted for encouraging mobile users to collect sensor data. Such idea of widening the scope of incentive from device-level to group-level is inspired by the incentive scheme of blood donation in real life. Mobile users earn credits by collecting and delivering sensor data with their mobile devices and they may consume the credits to access the services provided by wireless sensor networks applications. The main idea of the group-level incentive scheme is to group mobile users into social groups and share credits so that credits earned by one user can be consumed by another user in the same group. Through theoretical analysis and simulation we illustrate the potential of the proposed solution.
{"title":"A Group-Level Incentive Scheme for Data Collection in Wireless Sensor Networks","authors":"Long Cheng, Canfeng Chen, Jian Ma, Yimin Chen","doi":"10.1109/CCNC.2009.4784863","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784863","url":null,"abstract":"Utilizing mobile devices such as PDAs, cell phones to collect and deliver sensor data is considered as a promising application in future ubiquitous computing environment. In such application scenarios, the human factor is becoming increasingly important. In this paper, we propose a group-level incentive scheme targeted for encouraging mobile users to collect sensor data. Such idea of widening the scope of incentive from device-level to group-level is inspired by the incentive scheme of blood donation in real life. Mobile users earn credits by collecting and delivering sensor data with their mobile devices and they may consume the credits to access the services provided by wireless sensor networks applications. The main idea of the group-level incentive scheme is to group mobile users into social groups and share credits so that credits earned by one user can be consumed by another user in the same group. Through theoretical analysis and simulation we illustrate the potential of the proposed solution.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123630370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784898
I. Joe, Sung-Min Jung
In this paper, we propose a novel MAC protocol (RP-MAC) with a receiver preamble for wireless sensor networks. Energy efficiency is the most critical and fundamental factor in wireless sensor networks, because sensor nodes rely on the limited power source. For energy efficiency, the existing MAC protocols such as B-MAC and X-MAC change the active and sleep states periodically with a duty cycle. Even if these protocols work well in the sleep state, transmission overhead due to the preamble is very large when changing to the active state, because the sender transmits a preamble repetitively. In our approach, the receiver transmits instead a preamble only once, thereby minimizing the overhead. With this concept we implement real source code working on the telosb platform with TinyOS 1.1.15 version. The test results show that the proposed protocol provides better performance in terms of energy efficiency and delay compared to X-MAC.
{"title":"RP-MAC: A Receiver Preamble MAC Protocol for Wireless Sensor Networks","authors":"I. Joe, Sung-Min Jung","doi":"10.1109/CCNC.2009.4784898","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784898","url":null,"abstract":"In this paper, we propose a novel MAC protocol (RP-MAC) with a receiver preamble for wireless sensor networks. Energy efficiency is the most critical and fundamental factor in wireless sensor networks, because sensor nodes rely on the limited power source. For energy efficiency, the existing MAC protocols such as B-MAC and X-MAC change the active and sleep states periodically with a duty cycle. Even if these protocols work well in the sleep state, transmission overhead due to the preamble is very large when changing to the active state, because the sender transmits a preamble repetitively. In our approach, the receiver transmits instead a preamble only once, thereby minimizing the overhead. With this concept we implement real source code working on the telosb platform with TinyOS 1.1.15 version. The test results show that the proposed protocol provides better performance in terms of energy efficiency and delay compared to X-MAC.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784913
K. Tsukamoto, H. Ueda, H. Tamura, K. Kawahara, Y. Oie
In this paper, we focus on the problem of tracking a moving target in a wireless sensor network (WSN) in which the capability of each sensor is relatively limited in order to construct large-scale WSNs at a reasonable price. In our prior study, we proposed a simple multi-point surveillance scheme for a moving target in a WSN and demonstrated that the scheme achieved high tracking probability with low power consumption. However, we have not suggested guidelines for designing the WSN to completely satisfy the wide range of user requirements. Therefore, in this study, we examine the relationship between tracking probability and sensor density through simulations, and then derive an approximate expression representing the relationship. As a result, we show guidelines for sensor density, tracking probability, and the number of monitoring sensors that satisfy a variety of application demands.
{"title":"Design of Wireless Sensor Network for Multi-Point Surveillance of a Moving Target Based on the Relationship Between Tracking Probability and Sensor Density","authors":"K. Tsukamoto, H. Ueda, H. Tamura, K. Kawahara, Y. Oie","doi":"10.1109/CCNC.2009.4784913","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784913","url":null,"abstract":"In this paper, we focus on the problem of tracking a moving target in a wireless sensor network (WSN) in which the capability of each sensor is relatively limited in order to construct large-scale WSNs at a reasonable price. In our prior study, we proposed a simple multi-point surveillance scheme for a moving target in a WSN and demonstrated that the scheme achieved high tracking probability with low power consumption. However, we have not suggested guidelines for designing the WSN to completely satisfy the wide range of user requirements. Therefore, in this study, we examine the relationship between tracking probability and sensor density through simulations, and then derive an approximate expression representing the relationship. As a result, we show guidelines for sensor density, tracking probability, and the number of monitoring sensors that satisfy a variety of application demands.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784742
Y. Liu, C. Ngo
Relay enhanced cellular (REC) system and orthogonal frequency division multiple access (OFDMA) technology are regarded as the key features of 4G communication systems. How to utilize resource wisely in OFDMA-based REC systems is an important and challenging research topic. This paper reviews the major issues in designing radio resource management (RRM) algorithms for REC systems. A new resource allocation algorithm is proposed with joint considerations on fairness, resource balancing, resource reuse, and multi-user diversity.
{"title":"Radio Resource Allocation for Relay Enhanced Cellular Systems","authors":"Y. Liu, C. Ngo","doi":"10.1109/CCNC.2009.4784742","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784742","url":null,"abstract":"Relay enhanced cellular (REC) system and orthogonal frequency division multiple access (OFDMA) technology are regarded as the key features of 4G communication systems. How to utilize resource wisely in OFDMA-based REC systems is an important and challenging research topic. This paper reviews the major issues in designing radio resource management (RRM) algorithms for REC systems. A new resource allocation algorithm is proposed with joint considerations on fairness, resource balancing, resource reuse, and multi-user diversity.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"73 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784847
Rahim Kacimi, R. Dhaou, A. Beylot
Temperature control is a major concern in cold chain monitoring and traceability services for the largest cause of food poisoning. Considerable work has examined the use of wireless solutions in warehouses. However, the maintaining of the chain during the transportation phase remains very crucial. In this paper, we present new wireless sensor network (WSN) solution for cold chain monitoring. This solution is based on self-organizing protocols and aims at saving energy in order to increase the sensor lifetime and as a result the global network longevity within the given context. Furthermore, this solution does not need any base station or central equipment. To save energy, periodical active/sleep schedule is adopted in the design of our protocols which were dimensioned and validated by an analytical model described in this paper.
{"title":"Using Energy-Efficient Wireless Sensor Network for Cold Chain Monitoring","authors":"Rahim Kacimi, R. Dhaou, A. Beylot","doi":"10.1109/CCNC.2009.4784847","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784847","url":null,"abstract":"Temperature control is a major concern in cold chain monitoring and traceability services for the largest cause of food poisoning. Considerable work has examined the use of wireless solutions in warehouses. However, the maintaining of the chain during the transportation phase remains very crucial. In this paper, we present new wireless sensor network (WSN) solution for cold chain monitoring. This solution is based on self-organizing protocols and aims at saving energy in order to increase the sensor lifetime and as a result the global network longevity within the given context. Furthermore, this solution does not need any base station or central equipment. To save energy, periodical active/sleep schedule is adopted in the design of our protocols which were dimensioned and validated by an analytical model described in this paper.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124378209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784840
A. Annamalai, C. Tellambura, J. Matyjas
A new exponential-type integral for the generalized M-th order Marcum Q-function QM(α,β) is obtained when M is not necessarily an integer. This new representation includes a classical formula due to Helstrom for the special case of positive integer order M and an additional integral correction term that vanishes when M assumes an integer value. The new form has both computational utility (numerous existing computational algorithms for QM(α,β) are limited to integer M) and analytical utility (e.g., performance evaluation of selection diversity receiver in correlated Nakagami-m fading with arbitrary fading severity index, unified analysis of binary and quaternary modulations over generalized fading channels, and development of a Markovian threshold model for block errors in correlated Nakagami-m fading channels). Tight upper and lower bounds for QM(α,β) that holds for any arbitrary real order M≥0.5 are also derived.
{"title":"A New Twist on the Generalized Marcum Q-Function QM(a, b) with Fractional-Order M and Its Applications","authors":"A. Annamalai, C. Tellambura, J. Matyjas","doi":"10.1109/CCNC.2009.4784840","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784840","url":null,"abstract":"A new exponential-type integral for the generalized M-th order Marcum Q-function QM(α,β) is obtained when M is not necessarily an integer. This new representation includes a classical formula due to Helstrom for the special case of positive integer order M and an additional integral correction term that vanishes when M assumes an integer value. The new form has both computational utility (numerous existing computational algorithms for QM(α,β) are limited to integer M) and analytical utility (e.g., performance evaluation of selection diversity receiver in correlated Nakagami-m fading with arbitrary fading severity index, unified analysis of binary and quaternary modulations over generalized fading channels, and development of a Markovian threshold model for block errors in correlated Nakagami-m fading channels). Tight upper and lower bounds for QM(α,β) that holds for any arbitrary real order M≥0.5 are also derived.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-01-11DOI: 10.1109/CCNC.2009.4784821
Taekyu Kim, Seungbeom Lee, Sin-Chong Park
This paper reports preliminary work with an RFID based real time location system (RTLS) designed for location and guidance of people in welfare facilities like the sanatorium which has the both of indoor and out door environment. The system consists of a number of fixed RF readers and a number of active RFID tags carried by the target object, or senior people. We compare the performance of several RTLS schemes which use the received signal strength indication (RSSI) values emitted by the moving active RFID tags. Traditional trilateration, fingerprinting, and well-known LANDMARC approaches are evaluated and compared using the SystemC-based computer simulation. Results show a mean estimated error (MEE) performance of 3m with the 130 tags according to the position updated frequency in our simulation environment.
{"title":"Effect of Collision on Movement Tracking Using Active RFID Power Measurement","authors":"Taekyu Kim, Seungbeom Lee, Sin-Chong Park","doi":"10.1109/CCNC.2009.4784821","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784821","url":null,"abstract":"This paper reports preliminary work with an RFID based real time location system (RTLS) designed for location and guidance of people in welfare facilities like the sanatorium which has the both of indoor and out door environment. The system consists of a number of fixed RF readers and a number of active RFID tags carried by the target object, or senior people. We compare the performance of several RTLS schemes which use the received signal strength indication (RSSI) values emitted by the moving active RFID tags. Traditional trilateration, fingerprinting, and well-known LANDMARC approaches are evaluated and compared using the SystemC-based computer simulation. Results show a mean estimated error (MEE) performance of 3m with the 130 tags according to the position updated frequency in our simulation environment.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}