首页 > 最新文献

2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Spatial locality in pocket switched networks 口袋交换网络中的空间局部性
Tekenate E. Amah, M. Kamat, K. A. Bakar, W. Moreira, Antonio Oliveira, M. Batista
The current Internet design falls short in scenarios characterized by intermittent connectivity and absence of supporting infrastructure. Pocket switched networking allows communication between portable handheld user devices in such environments through the store-carry-forward paradigm. This involves storing data in device memory, exploiting user movement to physically transport the data, and forwarding through available short-range wireless interfaces. In this regard, user devices can be leveraged as data mules for point-to-point communication in two main scenarios: (i) conveying data between major infrastructures in urban areas (e.g., transporting sensor data to gateways in smart cities); and (ii) extending wireless coverage to provide connectivity in developing regions (e.g., bridging user devices and remote Internet access points). User movement in such scenarios exhibit spatial locality, which is the preference to a geographical location than others. This feature influences the data transfer opportunities that exist between different sets of users. This paper investigates the impact of locality on routing in pocket switched networks by: (i) evaluating the performance of existing routing strategies for point-to-point communication over different degrees of locality; and (ii) providing insights towards enhancing routing performance for realizing the aforementioned application scenarios through locality awareness.
目前的互联网设计在间歇性连接和缺乏支持基础设施的情况下存在不足。口袋交换网络允许在这种环境中通过存储-携带-向前范式在便携式手持用户设备之间进行通信。这包括将数据存储在设备内存中,利用用户移动来物理传输数据,并通过可用的短距离无线接口进行转发。在这方面,用户设备可以在两个主要场景中用作点对点通信的数据骡子:(i)在城市地区的主要基础设施之间传输数据(例如,将传感器数据传输到智能城市的网关);(ii)扩大无线覆盖范围,在发展中地区提供连接(例如,桥接用户设备和远程互联网接入点)。在这种情况下,用户移动表现出空间局部性,这是对地理位置的偏好。此特性影响存在于不同用户集之间的数据传输机会。本文研究了局部性对口袋交换网络中路由的影响:(i)评估了不同局部性程度的点对点通信的现有路由策略的性能;(ii)通过位置感知为实现上述应用场景提供增强路由性能的见解。
{"title":"Spatial locality in pocket switched networks","authors":"Tekenate E. Amah, M. Kamat, K. A. Bakar, W. Moreira, Antonio Oliveira, M. Batista","doi":"10.1109/WoWMoM.2016.7523583","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523583","url":null,"abstract":"The current Internet design falls short in scenarios characterized by intermittent connectivity and absence of supporting infrastructure. Pocket switched networking allows communication between portable handheld user devices in such environments through the store-carry-forward paradigm. This involves storing data in device memory, exploiting user movement to physically transport the data, and forwarding through available short-range wireless interfaces. In this regard, user devices can be leveraged as data mules for point-to-point communication in two main scenarios: (i) conveying data between major infrastructures in urban areas (e.g., transporting sensor data to gateways in smart cities); and (ii) extending wireless coverage to provide connectivity in developing regions (e.g., bridging user devices and remote Internet access points). User movement in such scenarios exhibit spatial locality, which is the preference to a geographical location than others. This feature influences the data transfer opportunities that exist between different sets of users. This paper investigates the impact of locality on routing in pocket switched networks by: (i) evaluating the performance of existing routing strategies for point-to-point communication over different degrees of locality; and (ii) providing insights towards enhancing routing performance for realizing the aforementioned application scenarios through locality awareness.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134368948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhanced Ultrawideband methods for 5G LOS sufficient positioning and mitigation 增强型超宽带方法用于5G LOS充分定位和缓解
Akeem A. Adebomehin, S. Walker
The 5G network prospect of seamlessly connected global devices with delay-tolerant communication, millisecond latency and gigabits per second data rate suggests the need for high resolution location-aware systems with new methods for positioning services. Traditional geo-positioning methods have been characterized by detection and mitigation of NLOS paths where discrimination between LOS and NLOS components are cast into a hypothesis-testing problem. This explains the focus of most related works on range measurements. It is however believed that Ultrawideband (UWB) promises better positioning methods for accuracy-critical situations expected in 5G setting. This paper outlines probable 5G wireless architecture as a road map to UWB in future wireless environments. It also proposes EULOSTECH; an algorithm for enhanced UWB LOS sufficiency positioning technique and mitigation method for cognitive 5G wireless setting. Results obtained from simulation experiments have been impressive and the highlights are presented in this paper. It is believed that the proposed solution has potential for robust and cost efficient localization in 5G setting as well as prospect to decongest licensed spectrums in 5G wireless environment with UWB.
5G网络的前景是无缝连接全球设备,具有可容忍延迟的通信、毫秒级延迟和每秒千兆比特的数据速率,这表明需要具有新定位服务方法的高分辨率位置感知系统。传统的地理定位方法的特点是检测和缓解非近地光路径,其中非近地光和非近地光分量之间的区分是一个假设检验问题。这解释了大多数相关工作的重点是距离测量。然而,人们认为,超宽带(UWB)有望为5G环境中预期的精度关键情况提供更好的定位方法。本文概述了可能的5G无线架构,作为未来无线环境中实现超宽带的路线图。它还建议EULOSTECH;一种用于认知5G无线设置的增强UWB LOS充分性定位技术和缓解方法算法。仿真实验的结果令人印象深刻,本文给出了其中的重点。据信,所提出的解决方案具有在5G环境中实现强大且经济高效的本地化的潜力,并有望通过超宽带在5G无线环境中减少许可频谱的拥挤。
{"title":"Enhanced Ultrawideband methods for 5G LOS sufficient positioning and mitigation","authors":"Akeem A. Adebomehin, S. Walker","doi":"10.1109/WoWMoM.2016.7523540","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523540","url":null,"abstract":"The 5G network prospect of seamlessly connected global devices with delay-tolerant communication, millisecond latency and gigabits per second data rate suggests the need for high resolution location-aware systems with new methods for positioning services. Traditional geo-positioning methods have been characterized by detection and mitigation of NLOS paths where discrimination between LOS and NLOS components are cast into a hypothesis-testing problem. This explains the focus of most related works on range measurements. It is however believed that Ultrawideband (UWB) promises better positioning methods for accuracy-critical situations expected in 5G setting. This paper outlines probable 5G wireless architecture as a road map to UWB in future wireless environments. It also proposes EULOSTECH; an algorithm for enhanced UWB LOS sufficiency positioning technique and mitigation method for cognitive 5G wireless setting. Results obtained from simulation experiments have been impressive and the highlights are presented in this paper. It is believed that the proposed solution has potential for robust and cost efficient localization in 5G setting as well as prospect to decongest licensed spectrums in 5G wireless environment with UWB.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134002787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Revisiting 802.11 power consumption modeling in smartphones 重新审视智能手机中的802.11功耗建模
S. K. Saha, Pratham Malik, Selvaganesh Dharmeswaran, Dimitrios Koutsonikolas
WiFi activity is a major source of power consumption in today's smartphones. Consequently, accurately WiFi power consumption models are extremely useful for researchers and app developers. Among a large number of models proposed recently, a model introduced by Serrano et al. was the first to add a new component - a per-frame energy toll incurred as a frame traverses the protocol stack - to the power consumption of the wireless NIC. The authors called this new component cross-factor and validated the accuracy of the model on a large number of devices, mostly 802.11g wireless routers and APs. This paper examines the validity of the model introduced by Serrano et al. on today's smartphones. We try to answer two questions: (i) Can the model accurately estimate the power consumption due to WiFi activity in today's smartphones given the complexity of modern smartphone architectures? (ii) Does the model remain valid in the case of 802.11n/ac interfaces, and if yes, can it reflect the impact of the new MAC features (e.g., MIMO, channel bonding) on the WiFi power consumption? Additionally, we study the impact of the power saving mode (PSM) which was ignored in the original model and show that ignoring PSM results in significant overestimation of the total power consumption at low frame generation rates. Accordingly, we propose a new model that works across the full range of frame generation rates and verify its accuracy for a wide range of parameters and devices.
WiFi活动是当今智能手机耗电量的主要来源。因此,准确的WiFi功耗模型对研究人员和应用程序开发人员非常有用。在最近提出的大量模型中,Serrano等人提出的模型是第一个在无线网卡的功耗中添加新组件的模型——当帧遍历协议栈时产生的每帧能量收费。作者将这种新组件称为交叉因素,并在大量设备(主要是802.11g无线路由器和ap)上验证了该模型的准确性。本文考察了Serrano等人在当今智能手机上引入的模型的有效性。我们试图回答两个问题:(i)考虑到现代智能手机架构的复杂性,该模型能否准确估计当今智能手机中WiFi活动造成的功耗?(ii)该模型在802.11n/ac接口的情况下是否仍然有效,如果有效,能否反映新的MAC特性(如MIMO、信道绑定)对WiFi功耗的影响?此外,我们研究了在原始模型中被忽略的省电模式(PSM)的影响,并表明忽略省电模式会导致在低帧生成速率下对总功耗的严重高估。因此,我们提出了一个新的模型,该模型可以在整个帧生成速率范围内工作,并验证了它在广泛的参数和设备范围内的准确性。
{"title":"Revisiting 802.11 power consumption modeling in smartphones","authors":"S. K. Saha, Pratham Malik, Selvaganesh Dharmeswaran, Dimitrios Koutsonikolas","doi":"10.1109/WoWMoM.2016.7523500","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523500","url":null,"abstract":"WiFi activity is a major source of power consumption in today's smartphones. Consequently, accurately WiFi power consumption models are extremely useful for researchers and app developers. Among a large number of models proposed recently, a model introduced by Serrano et al. was the first to add a new component - a per-frame energy toll incurred as a frame traverses the protocol stack - to the power consumption of the wireless NIC. The authors called this new component cross-factor and validated the accuracy of the model on a large number of devices, mostly 802.11g wireless routers and APs. This paper examines the validity of the model introduced by Serrano et al. on today's smartphones. We try to answer two questions: (i) Can the model accurately estimate the power consumption due to WiFi activity in today's smartphones given the complexity of modern smartphone architectures? (ii) Does the model remain valid in the case of 802.11n/ac interfaces, and if yes, can it reflect the impact of the new MAC features (e.g., MIMO, channel bonding) on the WiFi power consumption? Additionally, we study the impact of the power saving mode (PSM) which was ignored in the original model and show that ignoring PSM results in significant overestimation of the total power consumption at low frame generation rates. Accordingly, we propose a new model that works across the full range of frame generation rates and verify its accuracy for a wide range of parameters and devices.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132986147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Xcastor: Secure and scalable group communication in ad hoc networks Xcastor:在自组织网络中安全且可扩展的组通信
Milan Schmittner, M. Hollick
Mobile ad hoc networks (MANETs) are emerging as a practical technology for emergency response communication in the case a centralized infrastructure malfunctions or is not available. Using smartphones as communication devices, MANETs may be readily established among the civilian population of affected areas. Beneficiaries would be civilian first responders, which may form small collaborating groups. Communication in such groups must be reliable for disaster response to be effective. In this paper, we address the issue of reliable group communication on the network layer. We design and implement the first secure explicit multicast routing protocol called Xcastor, in which we extend the secure and scalable routing concept of the Castor unicast routing protocol towards supporting reliable communication for large numbers of small groups. By simulation, we show significant performance improvements over Castor.
移动自组织网络(manet)正在成为在集中基础设施出现故障或不可用的情况下进行应急响应通信的实用技术。使用智能手机作为通信设备,可以很容易地在受影响地区的平民人口中建立manet。受益者将是平民第一反应者,他们可能组成小型合作小组。这些群体之间的沟通必须可靠,才能有效应对灾难。本文主要研究网络层的可靠群通信问题。我们设计并实现了第一个安全的显式多播路由协议Xcastor,在该协议中,我们扩展了Castor单播路由协议的安全和可扩展路由概念,以支持大量小组的可靠通信。通过模拟,我们展示了相对于Castor的显著性能改进。
{"title":"Xcastor: Secure and scalable group communication in ad hoc networks","authors":"Milan Schmittner, M. Hollick","doi":"10.1109/WOWMOM.2016.7523512","DOIUrl":"https://doi.org/10.1109/WOWMOM.2016.7523512","url":null,"abstract":"Mobile ad hoc networks (MANETs) are emerging as a practical technology for emergency response communication in the case a centralized infrastructure malfunctions or is not available. Using smartphones as communication devices, MANETs may be readily established among the civilian population of affected areas. Beneficiaries would be civilian first responders, which may form small collaborating groups. Communication in such groups must be reliable for disaster response to be effective. In this paper, we address the issue of reliable group communication on the network layer. We design and implement the first secure explicit multicast routing protocol called Xcastor, in which we extend the secure and scalable routing concept of the Castor unicast routing protocol towards supporting reliable communication for large numbers of small groups. By simulation, we show significant performance improvements over Castor.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129177396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy efficient line-of-sight millimeter wave small cell backhaul: 60, 70, 80 or 140 GHz? 高效视距毫米波小蜂窝回程:60,70,80或140 GHz?
A. Mesodiakaki, A. Kassler, E. Zola, M. Ferndahl, T. Cai
Spectrum scarcity together with high capacity demands make the use of millimeter wave (mmWave) frequencies an interesting alternative for next generation, i.e., fifth generation (5G), networks. Although mmWave is expected to play a key role for both access network and backhaul (BH), its initial use in the BH network seems more straight-forward. This stems from the fact that, in the BH case, its deployment is less challenging due to the fixed locations of BH transceivers. Still, provided that mmWave spectrum consists of several subbands, each one with different characteristics and thus different deployment constraints (e.g., channel bandwidth, maximum transmission power), a comparison is required in order to gain a better insight into the potentials of each solution. To that end, in this paper, the main mmWave candidate frequency bands are compared in terms of range, throughput and energy consumption. In our results, the bandwidth availability, the maximum transmission power as well as the antenna gains of each BH technology are taken into account, as defined by the Federal Communications Commission. The results are also compared with current industry-oriented state-of-the-art transceiver characteristics in order to gain further insights into the maximum achievable gains of each subband.
频谱稀缺和高容量需求使得使用毫米波(mmWave)频率成为下一代(即第五代(5G)网络的有趣替代方案。虽然毫米波预计将在接入网和回程(BH)中发挥关键作用,但它在BH网络中的最初用途似乎更为直接。这源于这样一个事实,即在BH的情况下,由于BH收发器的固定位置,其部署挑战性较小。尽管如此,假设毫米波频谱由几个子带组成,每个子带具有不同的特性,因此具有不同的部署约束(例如,信道带宽,最大发射功率),则需要进行比较,以便更好地了解每种解决方案的潜力。为此,在本文中,主要毫米波候选频段在范围,吞吐量和能耗方面进行了比较。在我们的结果中,考虑了联邦通信委员会定义的带宽可用性,最大传输功率以及每种BH技术的天线增益。结果还与当前面向行业的最先进的收发器特性进行了比较,以便进一步了解每个子带的最大可实现增益。
{"title":"Energy efficient line-of-sight millimeter wave small cell backhaul: 60, 70, 80 or 140 GHz?","authors":"A. Mesodiakaki, A. Kassler, E. Zola, M. Ferndahl, T. Cai","doi":"10.1109/WoWMoM.2016.7523521","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523521","url":null,"abstract":"Spectrum scarcity together with high capacity demands make the use of millimeter wave (mmWave) frequencies an interesting alternative for next generation, i.e., fifth generation (5G), networks. Although mmWave is expected to play a key role for both access network and backhaul (BH), its initial use in the BH network seems more straight-forward. This stems from the fact that, in the BH case, its deployment is less challenging due to the fixed locations of BH transceivers. Still, provided that mmWave spectrum consists of several subbands, each one with different characteristics and thus different deployment constraints (e.g., channel bandwidth, maximum transmission power), a comparison is required in order to gain a better insight into the potentials of each solution. To that end, in this paper, the main mmWave candidate frequency bands are compared in terms of range, throughput and energy consumption. In our results, the bandwidth availability, the maximum transmission power as well as the antenna gains of each BH technology are taken into account, as defined by the Federal Communications Commission. The results are also compared with current industry-oriented state-of-the-art transceiver characteristics in order to gain further insights into the maximum achievable gains of each subband.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115514842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Evolution of vehicular congestion control without degrading legacy vehicle performance 不降低传统车辆性能的车辆拥塞控制演变
Bin Cheng, Ali Rostami, M. Gruteser, Hongsheng Lu, J. Kenney, G. Bansal
Channel congestion is one of the major challenges for IEEE 802.11p-based vehicular ad hoc networks. To tackle the challenge, several algorithms have been proposed and some of them are being considered for standardization. Situations could arise where vehicles with different algorithms operate in the same network. Our previous work has investigated the performance of a mixed-algorithm vehicular network for the CAM-DCC and LIMERIC algorithms and identified that the CAM-DCC vehicles could potentially experience a performance degradation after introducing the LIMERIC vehicles into the network. In this work, we study whether it is possible to eliminate or bound this degradation. We propose a CBP target adjustment mechanism which controls the CBP target of LIMERIC vehicles according to vehicle density and mixing situation of the two algorithms in the network to limit the performance degradation of CAM-DCC vehicles to a desired level. The proposed mechanism is evaluated via both MATLAB and ns-2 simulations and the simulation results indicate that the performance degradation of the CAM-DCC vehicles is controlled as expected with only negligible impact on the performance of LIMERIC vehicles, which still perform similar or better than CAM-DCC vehicles.
信道拥塞是基于IEEE 802.11p的车辆自组织网络面临的主要挑战之一。为了应对这一挑战,已经提出了几种算法,其中一些正在考虑标准化。使用不同算法的车辆在同一网络中运行的情况可能会出现。我们之前的工作已经研究了CAM-DCC和LIMERIC算法的混合算法车辆网络的性能,并确定在将LIMERIC车辆引入网络后,CAM-DCC车辆可能会出现性能下降。在这项工作中,我们研究是否有可能消除或限制这种降解。提出了一种CBP目标调整机制,根据网络中车辆密度和两种算法混合的情况对LIMERIC车辆的CBP目标进行控制,将CAM-DCC车辆的性能退化限制在理想的水平。通过MATLAB和ns-2仿真对所提出的机制进行了评估,仿真结果表明,CAM-DCC车辆的性能退化得到了预期的控制,对LIMERIC车辆的性能影响可以忽略不计,LIMERIC车辆的性能仍然与CAM-DCC车辆相当甚至更好。
{"title":"Evolution of vehicular congestion control without degrading legacy vehicle performance","authors":"Bin Cheng, Ali Rostami, M. Gruteser, Hongsheng Lu, J. Kenney, G. Bansal","doi":"10.1109/WoWMoM.2016.7523573","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523573","url":null,"abstract":"Channel congestion is one of the major challenges for IEEE 802.11p-based vehicular ad hoc networks. To tackle the challenge, several algorithms have been proposed and some of them are being considered for standardization. Situations could arise where vehicles with different algorithms operate in the same network. Our previous work has investigated the performance of a mixed-algorithm vehicular network for the CAM-DCC and LIMERIC algorithms and identified that the CAM-DCC vehicles could potentially experience a performance degradation after introducing the LIMERIC vehicles into the network. In this work, we study whether it is possible to eliminate or bound this degradation. We propose a CBP target adjustment mechanism which controls the CBP target of LIMERIC vehicles according to vehicle density and mixing situation of the two algorithms in the network to limit the performance degradation of CAM-DCC vehicles to a desired level. The proposed mechanism is evaluated via both MATLAB and ns-2 simulations and the simulation results indicate that the performance degradation of the CAM-DCC vehicles is controlled as expected with only negligible impact on the performance of LIMERIC vehicles, which still perform similar or better than CAM-DCC vehicles.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of cooperative ARQ systems for wireless industrial networks 无线工业网络协同ARQ系统性能分析
Martin Serror, Yulin Hu, Christian Dombrowski, Klaus Wehrle, J. Gross
The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations.
无线通信的普及引起了人们对在工业环境中建立这种技术的高度兴趣。支持无线的主要理由是减少部署和维护成本,以及增加灵活性。与家庭和办公环境相比,工业环境包括关键任务的机器对机器应用程序,对可靠性和延迟的要求非常严格,分别为1-10-9 PDR和1ms。实现这两个目标的一种方法是利用空间多样性的协作式自动重复请求(ARQ)。提出了一种用于关键任务通信的无线多用户分时多址协同ARQ系统。我们使用中断容量模型分析地评估了两种设计方案,以研究是否应该在具有完美信道状态信息(CSI)的多天线AP集中执行消息中继,还是在具有平均CSI的同时发射站分散执行消息中继。结果表明,在实现一定分集的情况下,两种方案都能实现目标通信保障,即使站数增加,系统性能也保持稳定。
{"title":"Performance analysis of cooperative ARQ systems for wireless industrial networks","authors":"Martin Serror, Yulin Hu, Christian Dombrowski, Klaus Wehrle, J. Gross","doi":"10.1109/WoWMoM.2016.7523534","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523534","url":null,"abstract":"The proliferation of wireless communications has lead to a high interest to establish this technology in industrial settings. The main arguments in favor of wireless are reduced costs in deployment and maintenance, as well as increased flexibility. In contrast to home and office environments, industrial settings include mission-critical machine-to-machine applications, demanding stringent requirements for reliability and latency in the area of 1-10-9 PDR and 1ms, respectively. One way to achieve both is cooperative Automatic Repeat reQuest (ARQ), which leverages spatial diversity. This paper presents a wireless multi-user Time Division Multiple Access system with cooperative ARQ for mission-critical communication. We evaluate two design options analytically, using an outage-capacity model, to investigate whether the relaying of messages should be performed centrally at a multi-antenna AP with perfect Channel State Information (CSI) or decentrally at simultaneously transmitting stations with average CSI. Results indicate that both options are able to achieve the targeted communication guarantees when a certain degree of diversity is implemented, showing a stable system performance even with an increasing number of stations.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123694005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device 量化安全物联网的成本:基于arm的设备上ECC签名的开销和能耗
Max Mossinger, Benedikt Petschkuhn, Johannes Bauer, R. C. Staudemeyer, M. Wójcik, H. C. Pöhls
In this paper, we document the overhead in terms of runtime, firmware size, communication and energy consumption for Elliptic Curve Cryptography (ECC) signatures of modern ARM-based constrained devices. The experiments we have undertaken show that the cryptographic capabilities of the investigated Zolertia Re-Mote based on a TI's CC2538 chipset running Contiki OS is indeed suitable for the Internet-of-Things (IoT): Computing a signature using a curve with a 192-bit key length adds an additional runtime of roughly 200 ms. However, we found that in comparison to sending an unsigned message approximately two-thirds of the runtime overhead is spent on cryptographic operations, while sending the signed message accounts for the remainder. We give real measurements which can be used as a basis for analytical models. Our measurements show that the saving gained by using curves with lower security levels (i. e., 160-bit key length) is not worth the sacrifice in protection. While signatures add non-negligible overhead, we still think that the additional 200 ms (signing with secp192r) is worth consideration. This paper gives an indication of the true costs of cryptographically protected message integrity which is greater or equal to the cost of encryption. We show what needs to be spent in order to verify the origin of the data in the application, since in the IoT it will have travelled through many `things'.
在本文中,我们记录了现代基于arm的受限设备的椭圆曲线加密(ECC)签名在运行时,固件大小,通信和能耗方面的开销。我们进行的实验表明,所研究的基于TI CC2538芯片组运行Contiki操作系统的Zolertia Re-Mote的加密功能确实适用于物联网(IoT):使用具有192位密钥长度的曲线计算签名增加了大约200毫秒的额外运行时间。然而,我们发现,与发送未签名消息相比,大约三分之二的运行时开销花在了加密操作上,而发送签名消息则占了其余部分。我们给出了可以作为分析模型基础的实际测量结果。我们的测量表明,使用较低安全级别(即160位密钥长度)的曲线所获得的节省不值得在保护方面做出牺牲。虽然签名会增加不可忽略的开销,但我们仍然认为额外的200毫秒(使用secp192r签名)值得考虑。本文给出了加密保护消息完整性的真实代价,该代价大于或等于加密的代价。我们展示了为了验证应用程序中数据的来源需要花费什么,因为在物联网中,数据将经过许多“事物”。
{"title":"Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device","authors":"Max Mossinger, Benedikt Petschkuhn, Johannes Bauer, R. C. Staudemeyer, M. Wójcik, H. C. Pöhls","doi":"10.1109/WoWMoM.2016.7523559","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523559","url":null,"abstract":"In this paper, we document the overhead in terms of runtime, firmware size, communication and energy consumption for Elliptic Curve Cryptography (ECC) signatures of modern ARM-based constrained devices. The experiments we have undertaken show that the cryptographic capabilities of the investigated Zolertia Re-Mote based on a TI's CC2538 chipset running Contiki OS is indeed suitable for the Internet-of-Things (IoT): Computing a signature using a curve with a 192-bit key length adds an additional runtime of roughly 200 ms. However, we found that in comparison to sending an unsigned message approximately two-thirds of the runtime overhead is spent on cryptographic operations, while sending the signed message accounts for the remainder. We give real measurements which can be used as a basis for analytical models. Our measurements show that the saving gained by using curves with lower security levels (i. e., 160-bit key length) is not worth the sacrifice in protection. While signatures add non-negligible overhead, we still think that the additional 200 ms (signing with secp192r) is worth consideration. This paper gives an indication of the true costs of cryptographically protected message integrity which is greater or equal to the cost of encryption. We show what needs to be spent in order to verify the origin of the data in the application, since in the IoT it will have travelled through many `things'.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Hybrid indoor localization using multiple Radio Interfaces 混合室内定位使用多个无线电接口
Islam Alyafawi, Simon Kiener, T. Braun
This paper presents a hybrid approach for real-time indoor localization without interaction with end users or network operators. The proposed solution uses signal strength information from multiple Radio Interfaces (RIs) to estimate locations of target devices. This solution benefits from different characteristics of radio signals at each RI to overcome challenges such as multipath propagation. The proposed algorithms may combine signal information prior to or after the localization process. The system operates blindly without a priori knowledge of the environment layout or target devices' radio settings. Results of real indoor experiments with both WiFi and GSM show an improvement by the proposed hybrid solution with a median error of 1.6m compared to 2.3m for WiFi and 3.0m for GSM.
本文提出了一种无需与终端用户或网络运营商交互的室内实时定位混合方法。该方案利用来自多个无线电接口(RIs)的信号强度信息来估计目标设备的位置。该解决方案得益于每个RI的无线电信号的不同特性,以克服多径传播等挑战。所提出的算法可以在定位过程之前或之后组合信号信息。系统在没有环境布局或目标设备无线电设置先验知识的情况下盲目操作。WiFi和GSM的真实室内实验结果表明,该混合方案的中值误差为1.6m,优于WiFi的2.3m和GSM的3.0m。
{"title":"Hybrid indoor localization using multiple Radio Interfaces","authors":"Islam Alyafawi, Simon Kiener, T. Braun","doi":"10.1109/WoWMoM.2016.7523525","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523525","url":null,"abstract":"This paper presents a hybrid approach for real-time indoor localization without interaction with end users or network operators. The proposed solution uses signal strength information from multiple Radio Interfaces (RIs) to estimate locations of target devices. This solution benefits from different characteristics of radio signals at each RI to overcome challenges such as multipath propagation. The proposed algorithms may combine signal information prior to or after the localization process. The system operates blindly without a priori knowledge of the environment layout or target devices' radio settings. Results of real indoor experiments with both WiFi and GSM show an improvement by the proposed hybrid solution with a median error of 1.6m compared to 2.3m for WiFi and 3.0m for GSM.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129643362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security threat assessment of simultaneous multiple Denial-of-Service attacks in IEEE 802.22 Cognitive Radio networks IEEE 802.22认知无线网络中同时多重拒绝服务攻击的安全威胁评估
Ismail K. Ahmed, A. Fapojuwo
The Cognitive Radio (CR) is a fully-reconfigurable wireless device that can intelligently sense, manage, and exploit temporarily-vacant licensed spectrum bands during the absence of incumbent users. Broadly, the IEEE 802.22 is the first complete Wireless Regional Area Network (WRAN) standard that utilizes CR technology in the opportunistic access of white spaces in the television (TV) bands. Intrinsically, the increased CR networks' vulnerabilities alongside the experienced growth of attackers' capabilities, creates a strain on CR network designers to act accordingly. However, most of the existing efforts solely examined the issues of Denial-of-Service (DoS) attacks of IEEE 802.22 networks, such as Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification (SSDF) attack, each treated in isolation. One main challenge in CR network security domain is to efficiently represent possible simultaneous multiple security threats, and assess their effects. Unlike the previous works, this paper addresses the aforementioned challenge through using the holistic approach of assessing the combined effect of simultaneous multiple DoS attacks. The Bayesian Attack Graph (BAG) model is utilized in this paper to capture the probabilistic dependencies among IEEE 802.22 DoS threat-environment and known vulnerabilities. The simulation results indicate up to 51.3% increase in the probability of DoS in IEEE 802.22 networks considering simultaneous multiple attacks in comparison to the most severe sole attack. Finally, the paper introduces the BAG model as a feasible CR vulnerability metric that can facilitate the creation of a security tightening plan.
认知无线电(CR)是一种完全可重构的无线设备,可以在现有用户不在时智能地感知、管理和利用暂时空置的许可频段。总的来说,IEEE 802.22是第一个完整的无线区域网络(WRAN)标准,它利用CR技术在电视(TV)频段的空白空间中进行机会访问。从本质上讲,随着攻击者能力的增长,CR网络漏洞的增加给CR网络设计者带来了相应的压力。然而,大多数现有的努力仅仅检查了IEEE 802.22网络的拒绝服务(DoS)攻击问题,例如主用户仿真(PUE)攻击和频谱感知数据伪造(SSDF)攻击,每个攻击都是孤立处理的。如何有效地表示可能同时存在的多个安全威胁,并评估其影响是CR网络安全领域面临的一个主要挑战。与之前的工作不同,本文通过使用评估同时多个DoS攻击的综合影响的整体方法来解决上述挑战。本文利用贝叶斯攻击图(BAG)模型捕捉IEEE 802.22 DoS威胁环境与已知漏洞之间的概率依赖关系。仿真结果表明,与最严重的单一攻击相比,考虑同时多重攻击的IEEE 802.22网络中DoS的概率增加了51.3%。最后,本文介绍了BAG模型作为一种可行的CR漏洞度量,可以方便地创建安全收紧计划。
{"title":"Security threat assessment of simultaneous multiple Denial-of-Service attacks in IEEE 802.22 Cognitive Radio networks","authors":"Ismail K. Ahmed, A. Fapojuwo","doi":"10.1109/WoWMoM.2016.7523510","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523510","url":null,"abstract":"The Cognitive Radio (CR) is a fully-reconfigurable wireless device that can intelligently sense, manage, and exploit temporarily-vacant licensed spectrum bands during the absence of incumbent users. Broadly, the IEEE 802.22 is the first complete Wireless Regional Area Network (WRAN) standard that utilizes CR technology in the opportunistic access of white spaces in the television (TV) bands. Intrinsically, the increased CR networks' vulnerabilities alongside the experienced growth of attackers' capabilities, creates a strain on CR network designers to act accordingly. However, most of the existing efforts solely examined the issues of Denial-of-Service (DoS) attacks of IEEE 802.22 networks, such as Primary User Emulation (PUE) attack and Spectrum Sensing Data Falsification (SSDF) attack, each treated in isolation. One main challenge in CR network security domain is to efficiently represent possible simultaneous multiple security threats, and assess their effects. Unlike the previous works, this paper addresses the aforementioned challenge through using the holistic approach of assessing the combined effect of simultaneous multiple DoS attacks. The Bayesian Attack Graph (BAG) model is utilized in this paper to capture the probabilistic dependencies among IEEE 802.22 DoS threat-environment and known vulnerabilities. The simulation results indicate up to 51.3% increase in the probability of DoS in IEEE 802.22 networks considering simultaneous multiple attacks in comparison to the most severe sole attack. Finally, the paper introduces the BAG model as a feasible CR vulnerability metric that can facilitate the creation of a security tightening plan.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1