Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651846
P. Thulasiraman, Yizhong Wang
Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%.
{"title":"A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks","authors":"P. Thulasiraman, Yizhong Wang","doi":"10.1109/CCNC.2019.8651846","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651846","url":null,"abstract":"Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651724
Vinay Kumar, Sujay Mohan, Rakesh Kumar
Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.
{"title":"A Voice Based One Step Solution for Bulk IoT Device Onboarding","authors":"Vinay Kumar, Sujay Mohan, Rakesh Kumar","doi":"10.1109/CCNC.2019.8651724","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651724","url":null,"abstract":"Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651864
N. Taherkhani, K. Kiasaleh
In this paper, we propose the subcarrier-index modulation with Reed Solomon encoded Optical Orthogonal Frequency Division Multiplexing with index modulation (IM-RS-OFDM) scheme for visible light communication (VLC). In this technique, the data is encoded using an RS codeword and then part of the redundancy introduced by the frame which exceeds the clipping range are punctured and their corresponding subcarriers are set as inactive, where the indices of these inactive subcarriers are used to transmit extra information bits. The puncturing of the redundancy aids in mitigating clipping noise generated due to the dynamic range constraints of the optical transmitter by shortening the number of active subcarriers, while the locations of the punctured subcarriers are exploited to convey more bits in order to compensate for the reduction in spectral efficiency caused by coding redundancy. In the proposed scheme, the bipolar transmitting signal is clipped and biased according to DC bias optical OFDM (DCO-OFDM) system, and a Log-Likelihood ratio (LLR) calculation based detector is used to find the indices of punctured symbols in the codeword. Our simulation results show that the new scheme offers a better bit error rate performance compared to the conventional coded OFDM-based visible light communication.
{"title":"Subcarrier-Index Modulation for Reed Solomon Encoded OFDM-Based Visible Light Communication","authors":"N. Taherkhani, K. Kiasaleh","doi":"10.1109/CCNC.2019.8651864","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651864","url":null,"abstract":"In this paper, we propose the subcarrier-index modulation with Reed Solomon encoded Optical Orthogonal Frequency Division Multiplexing with index modulation (IM-RS-OFDM) scheme for visible light communication (VLC). In this technique, the data is encoded using an RS codeword and then part of the redundancy introduced by the frame which exceeds the clipping range are punctured and their corresponding subcarriers are set as inactive, where the indices of these inactive subcarriers are used to transmit extra information bits. The puncturing of the redundancy aids in mitigating clipping noise generated due to the dynamic range constraints of the optical transmitter by shortening the number of active subcarriers, while the locations of the punctured subcarriers are exploited to convey more bits in order to compensate for the reduction in spectral efficiency caused by coding redundancy. In the proposed scheme, the bipolar transmitting signal is clipped and biased according to DC bias optical OFDM (DCO-OFDM) system, and a Log-Likelihood ratio (LLR) calculation based detector is used to find the indices of punctured symbols in the codeword. Our simulation results show that the new scheme offers a better bit error rate performance compared to the conventional coded OFDM-based visible light communication.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127809688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651886
Alexandre Mouradian, C. Campolo, A. Molinaro, A. Berthet, V. Vèque
Broadcast traffic in IEEE 802.11 vehicular networks is known to suffer from poor performance due to the lack of recovery mechanisms from packet losses, based on the rules of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. This may have a detrimental impact on cooperative vehicular safety applications that build on the reliable regular broadcasting of status messages by vehicles in a local neighborhood. Full-Duplex (FD) techniques can improve the broadcast CSMA/CA performance by letting a sending vehicle sense the channel while transmitting, thus enabling “collision detection”. The vehicle, consequently, can abort the packet prone to collision and reattempt a later transmission. In this paper, we define a stochastic geometry model that captures the collision detection capability of FD-enabled vehicles, while accurately characterizing the interference power generated by other vehicles on a road segment, and the dynamics of the backoff mechanism used for broadcast packet retransmissions. The model provides helpful insights into the FD broadcast CSMA/CA behaviour, highlighting a clear relationship between the settings for the carrier sense threshold and the collision detection threshold and the number of covered receivers on the road.
{"title":"Characterizing Full-Duplex V2V Broadcast Performance through Stochastic Geometry","authors":"Alexandre Mouradian, C. Campolo, A. Molinaro, A. Berthet, V. Vèque","doi":"10.1109/CCNC.2019.8651886","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651886","url":null,"abstract":"Broadcast traffic in IEEE 802.11 vehicular networks is known to suffer from poor performance due to the lack of recovery mechanisms from packet losses, based on the rules of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. This may have a detrimental impact on cooperative vehicular safety applications that build on the reliable regular broadcasting of status messages by vehicles in a local neighborhood. Full-Duplex (FD) techniques can improve the broadcast CSMA/CA performance by letting a sending vehicle sense the channel while transmitting, thus enabling “collision detection”. The vehicle, consequently, can abort the packet prone to collision and reattempt a later transmission. In this paper, we define a stochastic geometry model that captures the collision detection capability of FD-enabled vehicles, while accurately characterizing the interference power generated by other vehicles on a road segment, and the dynamics of the backoff mechanism used for broadcast packet retransmissions. The model provides helpful insights into the FD broadcast CSMA/CA behaviour, highlighting a clear relationship between the settings for the carrier sense threshold and the collision detection threshold and the number of covered receivers on the road.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651783
Oleksandr Zhdanenko, Jianhui Liu, Roberto Torre Arranz, S. Mudriievskyi, H. Salah, Giang T. Nguyen, F. Fitzek
This demonstration shows both the utility of Mobile Edge Cloud (MEC) for 5G connected cars, as well as the impact of MEC server selection (i.e. migration) strategy on latency. The demonstration simulates cars moving according to a realistic model inside the city of Munich, and implements different MEC server selection strategies. A player can steer an ambulance using a controller, and can also choose one among four server selection strategies while driving. With each strategy, the player will experience a different latency.
{"title":"Demonstration of Mobile Edge Cloud for 5G Connected Cars","authors":"Oleksandr Zhdanenko, Jianhui Liu, Roberto Torre Arranz, S. Mudriievskyi, H. Salah, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC.2019.8651783","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651783","url":null,"abstract":"This demonstration shows both the utility of Mobile Edge Cloud (MEC) for 5G connected cars, as well as the impact of MEC server selection (i.e. migration) strategy on latency. The demonstration simulates cars moving according to a realistic model inside the city of Munich, and implements different MEC server selection strategies. A player can steer an ambulance using a controller, and can also choose one among four server selection strategies while driving. With each strategy, the player will experience a different latency.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122214419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651697
Yukino Yamaoka, Jiang Liu, S. Shimamoto
Currently, non-invasive blood pressure monitoring with using a cuff is commonly used. However, this monitoring method is not suitable for some people who cannot wear the cuff and who might feel uncomfortable and troublesome. Non-contact measurement method provides a safer and more comfortable way to measure blood pressure. This paper describes the research on a non-contact pulse and blood pressure monitoring system. The frequencies of millimeter waves used in this experiment are 28GHz and 32GHz, which are the same as 5G millimeter wave signal. In this experiment, the millimeter waves are transmitted and reflected to the body and measure the reception intensity. As the results, we can detect pulse by utilizing millimeter waves, however, the relationship between blood pressure and millimeter waves needs further investigation.
{"title":"Detections of pulse and blood pressure employing 5G millimeter wave signal","authors":"Yukino Yamaoka, Jiang Liu, S. Shimamoto","doi":"10.1109/CCNC.2019.8651697","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651697","url":null,"abstract":"Currently, non-invasive blood pressure monitoring with using a cuff is commonly used. However, this monitoring method is not suitable for some people who cannot wear the cuff and who might feel uncomfortable and troublesome. Non-contact measurement method provides a safer and more comfortable way to measure blood pressure. This paper describes the research on a non-contact pulse and blood pressure monitoring system. The frequencies of millimeter waves used in this experiment are 28GHz and 32GHz, which are the same as 5G millimeter wave signal. In this experiment, the millimeter waves are transmitted and reflected to the body and measure the reception intensity. As the results, we can detect pulse by utilizing millimeter waves, however, the relationship between blood pressure and millimeter waves needs further investigation.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131511861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651840
Yilang Wu, Amitangshu Pal, Junbo Wang, K. Kant
Spatial clustering of the events scattered over a geographical region has many important applications, including the assessment of needs of the people affected by a disaster. In this paper we consider spatial clustering of social media data (e.g., tweets) generated by smart phones in the disaster region. Our goal in this context is to find high density areas within the affected area with abundance of messages concerning specific needs that we call simply as “situations”. Unfortunately, a direct spatial clustering is not only unstable or unreliable in the presence of mobility or changing conditions but also fails to recognize the fact that the “situation” expressed by a tweet remains valid for some time beyond the time of its emission. We address this by associating a decay function with each information content and define an incremental spatial clustering algorithm (ISCA) based on the decay model. We study the performance of incremental clustering as a function of decay rate to provide insights into how it can be chosen appropriately for different situations.
{"title":"Incremental Spatial Clustering for Spatial Big Crowd Data in Evolving Disaster Scenario","authors":"Yilang Wu, Amitangshu Pal, Junbo Wang, K. Kant","doi":"10.1109/CCNC.2019.8651840","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651840","url":null,"abstract":"Spatial clustering of the events scattered over a geographical region has many important applications, including the assessment of needs of the people affected by a disaster. In this paper we consider spatial clustering of social media data (e.g., tweets) generated by smart phones in the disaster region. Our goal in this context is to find high density areas within the affected area with abundance of messages concerning specific needs that we call simply as “situations”. Unfortunately, a direct spatial clustering is not only unstable or unreliable in the presence of mobility or changing conditions but also fails to recognize the fact that the “situation” expressed by a tweet remains valid for some time beyond the time of its emission. We address this by associating a decay function with each information content and define an incremental spatial clustering algorithm (ISCA) based on the decay model. We study the performance of incremental clustering as a function of decay rate to provide insights into how it can be chosen appropriately for different situations.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651714
Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka
Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.
无线局域网(Wireless Local Area network, wlan)的部署越来越密集。在多站密集分布的环境中,同信道干扰严重影响系统性能。IEEE 802.11ax任务组专注于空间重用,利用有限的频率资源来解决这个问题。虽然现有的空间重用研究已经有了一定的进展,但对其他基本服务集(bss)的干扰以及与每个接入点(AP)的合作等方面的考虑还不够充分。为了提高通信公平性,我们提出了公平动态灵敏度和传输功率控制(fairDSTPC),该控制基于AP合作来调整CCAT和传输功率。通过在ap之间交换吞吐量和发送数据帧数等信息,改善了导致BSS吞吐量最差的通信环境。仿真结果表明,与现有方法和遗留系统相比,该方法取得了较好的效果。在开放空间场景中,我们的方法达到了比现有方法高两倍的5%文件下行吞吐量,同时保持了5%的文件上行吞吐量和总吞吐量。
{"title":"Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN","authors":"Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka","doi":"10.1109/CCNC.2019.8651714","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651714","url":null,"abstract":"Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128100089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651876
Maha Alaslani, B. Shihada
Internet of Multimedia Things (IoMT) applications such as real-time multimedia based security and monitoring in smart homes, hospitals, cities, and smart transportation management systems are of the most difficult systems to deploy. These services are highly time sensitive and require Quality of service (QoS) guarantees. QoS requirements are key factors that lead to variations of multimedia traffic quality and the Quality of Experience (QoE) for the end users. IoMT devices transmit measurements to a predefined IoMT application server subject to maximum QoS constraint. The delay and dropping are essential constraints as delayed packets are considered useless for the IoMT applications. Our objective is to obtain an approximate expression of the blocking probability due to either buffer overflow or violating certain end-to-end threshold. For this purpose, we employ M/G/1 framework for our network. We validate the proposed analytical model and demonstrate the blocking probability and end-to-end delay. We anticipate that our results are critical for optimizing IoMT network design and deployment.
{"title":"Analyzing Latency and Dropping in Today’s Internet of Multimedia Things","authors":"Maha Alaslani, B. Shihada","doi":"10.1109/CCNC.2019.8651876","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651876","url":null,"abstract":"Internet of Multimedia Things (IoMT) applications such as real-time multimedia based security and monitoring in smart homes, hospitals, cities, and smart transportation management systems are of the most difficult systems to deploy. These services are highly time sensitive and require Quality of service (QoS) guarantees. QoS requirements are key factors that lead to variations of multimedia traffic quality and the Quality of Experience (QoE) for the end users. IoMT devices transmit measurements to a predefined IoMT application server subject to maximum QoS constraint. The delay and dropping are essential constraints as delayed packets are considered useless for the IoMT applications. Our objective is to obtain an approximate expression of the blocking probability due to either buffer overflow or violating certain end-to-end threshold. For this purpose, we employ M/G/1 framework for our network. We validate the proposed analytical model and demonstrate the blocking probability and end-to-end delay. We anticipate that our results are critical for optimizing IoMT network design and deployment.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132973525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}