Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there are some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user's behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key sharing various schemes have been proposed like third party auditing scheme but it will be failed, if the third party's security is compromised or if the third party is malicious. In this paper, we have used the symmetric key agreement algorithm named Diffie Hellman, it is key exchange algorithm which creates session key between two parties who want to communicate with each other and HMAC for the data integrity and OTP (One Time Password) is created which provides more security.
云计算是一种技术或分布式网络,用户可以在其中移动他们的数据和任何应用软件。但是云计算存在一些问题,主要是安全问题,因为每个用户都将他们的有用数据存储在网络上,所以他们希望他们的数据应该受到保护,免受任何未经授权的访问,任何不是以用户的名义进行的更改。有不同的加密技术用于安全目的,如FDE和FHE。为了解决密钥管理问题,人们提出了各种密钥共享方案,如第三方审计方案,但如果第三方的安全性受到损害或第三方恶意,则会失败。在本文中,我们使用了Diffie Hellman对称密钥协议算法,它是一种密钥交换算法,它在想要相互通信的双方之间创建会话密钥和HMAC,以保证数据的完整性,并创建了OTP (One Time Password),提供了更多的安全性。
{"title":"Enhancement in Homomorphic Encryption Scheme for Cloud Data Security","authors":"Samjot Kaur, V. Wasson","doi":"10.1109/NGMAST.2015.38","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.38","url":null,"abstract":"Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there are some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user's behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key sharing various schemes have been proposed like third party auditing scheme but it will be failed, if the third party's security is compromised or if the third party is malicious. In this paper, we have used the symmetric key agreement algorithm named Diffie Hellman, it is key exchange algorithm which creates session key between two parties who want to communicate with each other and HMAC for the data integrity and OTP (One Time Password) is created which provides more security.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129987927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The availability of cheap wireless sensors boosted the emergence of unstructured networks using wireless technologies with decentralised administration. However, a simple task such as learning the temperature needs a discovery service to find a thermometer among all the sensors. In general, resource discovery relies on flooding mechanisms that waste energy and compromises system availability. Energy efficient strategies limit the exploration area, but with a significant impact on latency. The paper proposes ABC (Adaptive Broadcast Cancellation), a new algorithm that uses the knowledge acquired in previous discoveries to accelerate queries towards the resource. Knowledge is stored in a variation of Bloom filters, thus contributing for an efficient utilization of the sensors limited memory.
{"title":"Adaptive Broadcast Cancellation Query Mechanism for Unstructured Networks","authors":"Rui Lima, Carlos Baquero, Hugo M. Miranda","doi":"10.1109/NGMAST.2015.41","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.41","url":null,"abstract":"The availability of cheap wireless sensors boosted the emergence of unstructured networks using wireless technologies with decentralised administration. However, a simple task such as learning the temperature needs a discovery service to find a thermometer among all the sensors. In general, resource discovery relies on flooding mechanisms that waste energy and compromises system availability. Energy efficient strategies limit the exploration area, but with a significant impact on latency. The paper proposes ABC (Adaptive Broadcast Cancellation), a new algorithm that uses the knowledge acquired in previous discoveries to accelerate queries towards the resource. Knowledge is stored in a variation of Bloom filters, thus contributing for an efficient utilization of the sensors limited memory.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Norshahila Ibrahim, Wan Fatimah, W. Ahmad, A. Shafie
Early exposure to devices such as smart phones and tablets among children as a learning tool has been very common nowadays. Learning using devices like iPads and tablets can stimulate children's motivation and concentration. Therefore, evaluation and measurement of user experience for mobile learning application become crucial. There were some studies have been done in order to get feedback from users in terms of comparing the application and getting perception rather than observing the quality of the application. This paper presented the study on evaluation of user experience for folktales mobile application called MFolktales by implementing user experience questionnaire tools. The objective of this study is to access the significance and impact of the MFolktales mobile application towards end users. The MFolktales mobile application has been developed based on a validated conceptual model, and the study includes the analysis and the definition of the design principles and requirements. This application contains an animation story module and several games modules which aim to promote Malay folk stories to children. This research is limited to children aged 5 to 7 years old. The prototype was tested on 15 kindergarten students from KEMAS (Community Development Department). As the results, the MFolktales got the positive impression in user perception and achieved as a good product in relative quality.
{"title":"User Experience Study on Folktales Mobile Application for Children's Education","authors":"Norshahila Ibrahim, Wan Fatimah, W. Ahmad, A. Shafie","doi":"10.1109/NGMAST.2015.73","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.73","url":null,"abstract":"Early exposure to devices such as smart phones and tablets among children as a learning tool has been very common nowadays. Learning using devices like iPads and tablets can stimulate children's motivation and concentration. Therefore, evaluation and measurement of user experience for mobile learning application become crucial. There were some studies have been done in order to get feedback from users in terms of comparing the application and getting perception rather than observing the quality of the application. This paper presented the study on evaluation of user experience for folktales mobile application called MFolktales by implementing user experience questionnaire tools. The objective of this study is to access the significance and impact of the MFolktales mobile application towards end users. The MFolktales mobile application has been developed based on a validated conceptual model, and the study includes the analysis and the definition of the design principles and requirements. This application contains an animation story module and several games modules which aim to promote Malay folk stories to children. This research is limited to children aged 5 to 7 years old. The prototype was tested on 15 kindergarten students from KEMAS (Community Development Department). As the results, the MFolktales got the positive impression in user perception and achieved as a good product in relative quality.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.
{"title":"Event-Driven Implicit Authentication for Mobile Access Control","authors":"Feng Yao, S. Yerima, Boojoong Kang, S. Sezer","doi":"10.1109/NGMAST.2015.47","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.47","url":null,"abstract":"In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashraf Ali, M. Alshamrani, A. Kuwadekar, K. Al-Begain
Mission Critical Communications and Services are of a special nature that needs special requirements. Therefore, there are many challenges that face implementing mission critical communication system over commercial mobile communications networks. Signaling of SIP messages in the access technology domain and IMS domain needs enhancement to ensure meeting the mission critical service requirements. LTE, as a broadband technology that is widely deployed nowadays for providing 4G communication networking services, is facing a lot of challenges in terms of its ability to provide multimedia services. And due to the special nature of Mission Critical Systems (MCS) that have stringent requirements for SIP signaling specifically, the need for investigating the SIP signaling performance over LTE based MCS is of great importance. In this paper, the performance metrics for an SIP signaling over LTE-MCS will be defined, and the overall system performance measures were evaluated via discrete event simulator.
{"title":"Evaluating SIP Signaling Performance for VoIP over LTE Based Mission-Critical Communication Systems","authors":"Ashraf Ali, M. Alshamrani, A. Kuwadekar, K. Al-Begain","doi":"10.1109/NGMAST.2015.68","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.68","url":null,"abstract":"Mission Critical Communications and Services are of a special nature that needs special requirements. Therefore, there are many challenges that face implementing mission critical communication system over commercial mobile communications networks. Signaling of SIP messages in the access technology domain and IMS domain needs enhancement to ensure meeting the mission critical service requirements. LTE, as a broadband technology that is widely deployed nowadays for providing 4G communication networking services, is facing a lot of challenges in terms of its ability to provide multimedia services. And due to the special nature of Mission Critical Systems (MCS) that have stringent requirements for SIP signaling specifically, the need for investigating the SIP signaling performance over LTE based MCS is of great importance. In this paper, the performance metrics for an SIP signaling over LTE-MCS will be defined, and the overall system performance measures were evaluated via discrete event simulator.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent years have seen a vast growth of location-based services (LBS) usage with the ubiquity of smart mobile devices. While reactive LBS act on the user's request, proactive LBS notify the user proactively of relevant location-specific content in case a dedicated area is entered. The usage scenarios of proactive LBS vary from location-based reminders to location-based marketing. With the increasing popularity of LBS also privacy concerns are raised, reclaiming the whereabouts of a user worth protecting. This is especially true for proactive LBS as they constantly share the location of the mobile device with the service and hence continuously track the user's location in order to act proactively. This paper introduces a context-sensitive privacy-awareness framework for mobile devices which enables mobile device users to individually define different privacy preferences for different contexts. It is intended to give the user full control over her/his sensitive location information to allow the user to determine whenever and wherever the user's location is allowed to be shared with 3rd party applications or services. As a proof of concept, a prototypical implementation is presented which enforces the user's context-sensitive privacy settings on mobile devices during the use of proactive LBS.
{"title":"A Context-Sensitive Privacy-Aware Framework for Proactive Location-Based Services","authors":"B. Deva, S. R. Garzon, Sarah Schunemann","doi":"10.1109/NGMAST.2015.27","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.27","url":null,"abstract":"The recent years have seen a vast growth of location-based services (LBS) usage with the ubiquity of smart mobile devices. While reactive LBS act on the user's request, proactive LBS notify the user proactively of relevant location-specific content in case a dedicated area is entered. The usage scenarios of proactive LBS vary from location-based reminders to location-based marketing. With the increasing popularity of LBS also privacy concerns are raised, reclaiming the whereabouts of a user worth protecting. This is especially true for proactive LBS as they constantly share the location of the mobile device with the service and hence continuously track the user's location in order to act proactively. This paper introduces a context-sensitive privacy-awareness framework for mobile devices which enables mobile device users to individually define different privacy preferences for different contexts. It is intended to give the user full control over her/his sensitive location information to allow the user to determine whenever and wherever the user's location is allowed to be shared with 3rd party applications or services. As a proof of concept, a prototypical implementation is presented which enforces the user's context-sensitive privacy settings on mobile devices during the use of proactive LBS.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
User equipments (UEs) such as smartphones and tablets are widely used in heterogeneous wireless networks which include different technologies like WiFi and Long Term Evolution (LTE) systems. Implementing traffic steering effectively for user equipments to maximize their quality of service has become a key challenge these years. Therefore, in this paper, we propose a device controlled mechanism. We mainly focus on history records of each available networks and distributively consider multi-criteria like Received Signal Strength (RSS) and energy consumption of battery as our performance matrics from UE side. Device controlled mechanism is a fully distributed traffic steering approach that runs at user equipments. At the same time, to benefit from the network knowledge, we propose to use network analytic mechanism to further enhance certain performance metrics. Our proposed approach and analytic mechanism can help user equipments to make efficient decisions and minimize battery power consumption. This is particularly important to distribute traffic load across different radio access with less energy consumption for user equipments. The traffic steering of radio accesses in this paper is modelled based on Reinforcement Learning (RL) mechanism which considers past experiences of user equipements and help them to improve their quality of satisfactions. Through extensive simulation scenarios, we demonstrate how such device controlled mechanism with multi-criteria metrics can improve received throughput values of user equipments and reduce energy consumption of equipments' batteries.
{"title":"Device-Controlled Traffic Steering in Mobile Networks","authors":"Menglan Jiang","doi":"10.1109/NGMAST.2015.13","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.13","url":null,"abstract":"User equipments (UEs) such as smartphones and tablets are widely used in heterogeneous wireless networks which include different technologies like WiFi and Long Term Evolution (LTE) systems. Implementing traffic steering effectively for user equipments to maximize their quality of service has become a key challenge these years. Therefore, in this paper, we propose a device controlled mechanism. We mainly focus on history records of each available networks and distributively consider multi-criteria like Received Signal Strength (RSS) and energy consumption of battery as our performance matrics from UE side. Device controlled mechanism is a fully distributed traffic steering approach that runs at user equipments. At the same time, to benefit from the network knowledge, we propose to use network analytic mechanism to further enhance certain performance metrics. Our proposed approach and analytic mechanism can help user equipments to make efficient decisions and minimize battery power consumption. This is particularly important to distribute traffic load across different radio access with less energy consumption for user equipments. The traffic steering of radio accesses in this paper is modelled based on Reinforcement Learning (RL) mechanism which considers past experiences of user equipements and help them to improve their quality of satisfactions. Through extensive simulation scenarios, we demonstrate how such device controlled mechanism with multi-criteria metrics can improve received throughput values of user equipments and reduce energy consumption of equipments' batteries.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Asuquo, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran
In the event of a disaster, there is a severe damage/destruction to physical infrastructures such as telecommunication and power lines which result in the disruption of communication in this areas. For such scenarios, Delay Tolerant Network (DTN) provides an alternative means of communication. In Delay Tolerant Networks (DTNs), a message from a source node may be delivered to the destination node despite the non-existence of an infrastructure and an end-to-end connectivity. However DTNs are susceptible to security threats such as DoS attacks targeted at disrupting relayed packets or dropping critical packets during a disaster rescue operation. DoS attacks consist of blackhole, grayhole, wormhole, packet flooding attacks etc. The scope of this paper is to study the impacts of blackhole and packet flooding attacks in a post disaster communication network using DTN. Various performance metrics in DTN have been used to study the impacts of different DoS attacks in DTN and a comprehensive analysis is presented.
{"title":"Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation","authors":"P. Asuquo, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran","doi":"10.1109/NGMAST.2015.65","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.65","url":null,"abstract":"In the event of a disaster, there is a severe damage/destruction to physical infrastructures such as telecommunication and power lines which result in the disruption of communication in this areas. For such scenarios, Delay Tolerant Network (DTN) provides an alternative means of communication. In Delay Tolerant Networks (DTNs), a message from a source node may be delivered to the destination node despite the non-existence of an infrastructure and an end-to-end connectivity. However DTNs are susceptible to security threats such as DoS attacks targeted at disrupting relayed packets or dropping critical packets during a disaster rescue operation. DoS attacks consist of blackhole, grayhole, wormhole, packet flooding attacks etc. The scope of this paper is to study the impacts of blackhole and packet flooding attacks in a post disaster communication network using DTN. Various performance metrics in DTN have been used to study the impacts of different DoS attacks in DTN and a comprehensive analysis is presented.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133059307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smartphones are mobile phones that execute application programs. Smartphones are practically everywhere, in every country and culture. Smartphones can tell where they are by GPS, a spatial sense, and what time it is, a temporal sense, relative to their GPS location. Groups of smartphone users form communities, creating a social sense. Smartphones often contain built-in sensors including temperature, proximity, accelerometer, gyroscope, magnetometer, barometric pressure, ambient light, camera, microphone, etc., as well as the ability to connect to external sensors over their wireless interfaces forming wireless sensor networks. Smartphones are connected to the Internet through their cellular data connections providing a globally established deployment of "things" on the Internet of Things (IoT). People carrying their smartphones represent a global source of continuous mobile Internet-connected sensor data. The resulting human, social, and environmental data represents an untapped global information resource of epic proportion. This paper explores the current research related to smartphone sensing as a service (S2aaS) and proposes an architecture for a web services framework for S2aaS called Spheres. Spheres will integrate wireless sensor network, mobile Internet, and cloud technologies into an open-source service-oriented architecture (SOA) providing crowdsourced smartphone sensor data aggregation and sharing in secure cloud deployments for private and public consumption. Spheres collected data can be overlaid visually on maps or incorporated into applications that require the data from sensors embedded in, or connected to, smartphones over specific regions and times of interest. In addition to specifying an architecture, this paper will identify the challenges expected to implement and demonstrate a prototype of Spheres on at least one smartphone platform with the cloud platform and web services deployed on the UMBC BlueWave high performance computing system.
{"title":"Spheres: A Web Services Framework for Smartphone Sensing as a Service","authors":"M. Gray","doi":"10.1109/NGMAST.2015.36","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.36","url":null,"abstract":"Smartphones are mobile phones that execute application programs. Smartphones are practically everywhere, in every country and culture. Smartphones can tell where they are by GPS, a spatial sense, and what time it is, a temporal sense, relative to their GPS location. Groups of smartphone users form communities, creating a social sense. Smartphones often contain built-in sensors including temperature, proximity, accelerometer, gyroscope, magnetometer, barometric pressure, ambient light, camera, microphone, etc., as well as the ability to connect to external sensors over their wireless interfaces forming wireless sensor networks. Smartphones are connected to the Internet through their cellular data connections providing a globally established deployment of \"things\" on the Internet of Things (IoT). People carrying their smartphones represent a global source of continuous mobile Internet-connected sensor data. The resulting human, social, and environmental data represents an untapped global information resource of epic proportion. This paper explores the current research related to smartphone sensing as a service (S2aaS) and proposes an architecture for a web services framework for S2aaS called Spheres. Spheres will integrate wireless sensor network, mobile Internet, and cloud technologies into an open-source service-oriented architecture (SOA) providing crowdsourced smartphone sensor data aggregation and sharing in secure cloud deployments for private and public consumption. Spheres collected data can be overlaid visually on maps or incorporated into applications that require the data from sensors embedded in, or connected to, smartphones over specific regions and times of interest. In addition to specifying an architecture, this paper will identify the challenges expected to implement and demonstrate a prototype of Spheres on at least one smartphone platform with the cloud platform and web services deployed on the UMBC BlueWave high performance computing system.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a rate adaptive technique for wind powered standalone (off-grid) roadside units (RSUs) in a motorway environment. In a non-rate adaptive system, the transient nature of renewable wind energy causes the RSUs to either transmit at full data rate or not transmit at all based on the availability of sufficient energy. In rate adaptation, the data rate of an RSU adapts according to the available energy. Further, the RSU saves transmission energy by operating at a lower data rate, even when enough energy is available. The saved energy, in turn, is used to maintain the data rate during energy deficiency, thereby minimizing outage and improving the quality of service (QoS). The performance analysis shows that the wind energy dependent rate adaptive RSU delivers a more energy efficient service with acceptable quality compared to a non-rate adaptive deployment in a renewable energy solely powered RSU. The proposed rate adaptive algorithm can be as well deployed to wind-powered communication base stations (BSs) and sensor networks.
{"title":"Wind Energy Dependent Rate Adaptation for Roadside Units","authors":"G. A. Audu, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2015.26","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.26","url":null,"abstract":"In this paper, we propose a rate adaptive technique for wind powered standalone (off-grid) roadside units (RSUs) in a motorway environment. In a non-rate adaptive system, the transient nature of renewable wind energy causes the RSUs to either transmit at full data rate or not transmit at all based on the availability of sufficient energy. In rate adaptation, the data rate of an RSU adapts according to the available energy. Further, the RSU saves transmission energy by operating at a lower data rate, even when enough energy is available. The saved energy, in turn, is used to maintain the data rate during energy deficiency, thereby minimizing outage and improving the quality of service (QoS). The performance analysis shows that the wind energy dependent rate adaptive RSU delivers a more energy efficient service with acceptable quality compared to a non-rate adaptive deployment in a renewable energy solely powered RSU. The proposed rate adaptive algorithm can be as well deployed to wind-powered communication base stations (BSs) and sensor networks.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}