Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651706
A. Noda
Tiny sensors, such as temperature and posture sensors, distributed over the body surface will provide more detailed information about the body’s status than a single-point measurement by sensor-loaded wearable devices including smartwatches. Power/data transfer to/from the distributed tiny sensors is an inevitable issue. In this presentation, wireless access to batteryless and antennaless sensors distributed on a conductive textile will be demonstrated. A double-sided conductive textile is used as a power and signal transmission bus. The two conductive surfaces, isolated from each other, work as a transmission line that conveys dc power and radio-frequency (RF) signals simultaneously. In the demonstration system, two RF carriers are modulated with Inter-Integrated Circuit (I2C)-formatted digital signals to transfer bitstreams from each sensor. Hence, the system is compatible with off-the-shelf I2C-interfaced digital sensor ICs. A demonstration system with distributed temperature sensors will be presented as an example of implementation; nevertheless, other various sensors, e.g., humidity sensors, accelerometers, and electromyography sensors, can be utilized in the same system.
{"title":"Demonstration of Wireless Access to Batteryless and Antennaless Sensors Distributed on Clothes","authors":"A. Noda","doi":"10.1109/CCNC.2019.8651706","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651706","url":null,"abstract":"Tiny sensors, such as temperature and posture sensors, distributed over the body surface will provide more detailed information about the body’s status than a single-point measurement by sensor-loaded wearable devices including smartwatches. Power/data transfer to/from the distributed tiny sensors is an inevitable issue. In this presentation, wireless access to batteryless and antennaless sensors distributed on a conductive textile will be demonstrated. A double-sided conductive textile is used as a power and signal transmission bus. The two conductive surfaces, isolated from each other, work as a transmission line that conveys dc power and radio-frequency (RF) signals simultaneously. In the demonstration system, two RF carriers are modulated with Inter-Integrated Circuit (I2C)-formatted digital signals to transfer bitstreams from each sensor. Hence, the system is compatible with off-the-shelf I2C-interfaced digital sensor ICs. A demonstration system with distributed temperature sensors will be presented as an example of implementation; nevertheless, other various sensors, e.g., humidity sensors, accelerometers, and electromyography sensors, can be utilized in the same system.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125354331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651845
F. D. Hartog, F. Bouhafs, Q. Shi
Cyber-physical systems rely more and more on wireless technologies that operate in unmanaged, unlicensed frequency bands. Already today, this leads to security issues and a significant degradation of network performance due to interference and traffic congestion. Only collaboration between stakeholders leads to a sustainable solution. To facilitate collaboration, we designed a platform that heavily relies on the concept of Software-Defined Networking, introducing a central controller for programmable radio parameters. Part of this solution is a Brokering Platform that automates negotiation for spectral resources between access point (AP) operators. In this article we present a novel architecture for a Brokering Platform. We also propose secure distribution of Brokering Platform functionality over the APs using blockchain.
{"title":"Toward secure trading of unlicensed spectrum in cyber-physical systems","authors":"F. D. Hartog, F. Bouhafs, Q. Shi","doi":"10.1109/CCNC.2019.8651845","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651845","url":null,"abstract":"Cyber-physical systems rely more and more on wireless technologies that operate in unmanaged, unlicensed frequency bands. Already today, this leads to security issues and a significant degradation of network performance due to interference and traffic congestion. Only collaboration between stakeholders leads to a sustainable solution. To facilitate collaboration, we designed a platform that heavily relies on the concept of Software-Defined Networking, introducing a central controller for programmable radio parameters. Part of this solution is a Brokering Platform that automates negotiation for spectral resources between access point (AP) operators. In this article we present a novel architecture for a Brokering Platform. We also propose secure distribution of Brokering Platform functionality over the APs using blockchain.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651691
Ruslan Dautov, G. Tsouri
Wireless Physical Layer Security (WPLS) provides attractive lightweight data security methods suitable for resource constrained Wireless Body Area Networks (WBANs). As WPLS methods entirely rely on wireless transmission, they are prone to eavesdropping. Most previous work assume that the eavesdropper’s channel is independent if it is more than half a wavelength away from the legitimate participants. In this paper, we demonstrate that due to unique properties of WBANs, this assumption does not hold. In particular, the body shadowing phenomenon gives rise to negative correlation that can be easily exploited by the eavesdropper without being anywhere near the legitimate parties.
{"title":"On the Negatively Correlated Eavesdropper in Indoor Wireless Body Area Networks","authors":"Ruslan Dautov, G. Tsouri","doi":"10.1109/CCNC.2019.8651691","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651691","url":null,"abstract":"Wireless Physical Layer Security (WPLS) provides attractive lightweight data security methods suitable for resource constrained Wireless Body Area Networks (WBANs). As WPLS methods entirely rely on wireless transmission, they are prone to eavesdropping. Most previous work assume that the eavesdropper’s channel is independent if it is more than half a wavelength away from the legitimate participants. In this paper, we demonstrate that due to unique properties of WBANs, this assumption does not hold. In particular, the body shadowing phenomenon gives rise to negative correlation that can be easily exploited by the eavesdropper without being anywhere near the legitimate parties.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114305181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651712
Huanzhuo Wu, I. Tsokalo, David Kuss, H. Salah, Lukas Pingel, F. Fitzek
This proposal for demonstration focuses on network slicing as an enabler for flexible and efficient Industrial IoT (IIoT) networks. We show that by using network slicing in a novel three-layer architecture, self-organization and flexibility, as well as maximization of network efficiency can be achieved in IIoT networks. A practical scenario of conditional monitoring is demonstrated by means of distributing sensor devices on site to engage the audience.
{"title":"Demonstration of Network Slicing for Flexible Conditional Monitoring in Industrial IoT Networks","authors":"Huanzhuo Wu, I. Tsokalo, David Kuss, H. Salah, Lukas Pingel, F. Fitzek","doi":"10.1109/CCNC.2019.8651712","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651712","url":null,"abstract":"This proposal for demonstration focuses on network slicing as an enabler for flexible and efficient Industrial IoT (IIoT) networks. We show that by using network slicing in a novel three-layer architecture, self-organization and flexibility, as well as maximization of network efficiency can be achieved in IIoT networks. A practical scenario of conditional monitoring is demonstrated by means of distributing sensor devices on site to engage the audience.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"2 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120837133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651870
Jaewook Lee, Haneul Ko, Sangheon Pack
In vehicular edge clouds, tasks from vehicles are processed nearby edge nodes (ENs) and thus low latency services can be provided. However, under high vehicular mobility, frequent service migration between two ENs and increased handover latency can be observed. In this paper, we introduce a trajectory-aware edge node clustering (TENC) scheme in which multiple ENs form a cluster depending on the trajectory of a target vehicle. To attain the optimal performance, we formulate an optimization problem by means of a constrained Markov decision process (CMDP). Evaluation results demonstrate that the obtained optimal policy can minimize service delay significantly.
{"title":"Trajectory-Aware Edge Node Clustering in Vehicular Edge Clouds","authors":"Jaewook Lee, Haneul Ko, Sangheon Pack","doi":"10.1109/CCNC.2019.8651870","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651870","url":null,"abstract":"In vehicular edge clouds, tasks from vehicles are processed nearby edge nodes (ENs) and thus low latency services can be provided. However, under high vehicular mobility, frequent service migration between two ENs and increased handover latency can be observed. In this paper, we introduce a trajectory-aware edge node clustering (TENC) scheme in which multiple ENs form a cluster depending on the trajectory of a target vehicle. To attain the optimal performance, we formulate an optimization problem by means of a constrained Markov decision process (CMDP). Evaluation results demonstrate that the obtained optimal policy can minimize service delay significantly.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117326245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651709
Anu Jagannath, Jithin Jagannath, Brendan Sheaffer, A. Drozd
A low cost, portable, robust jammer detection, and localization device is proposed and developed in this work. Intentional or unintentional use of jammers is detrimental to the seamless operation of emergency rescue and public safety missions as it disrupts the critical communication devices. The proposed device employs robust parallel detection algorithms based on Kurtosis and FRactional Fourier Transform (FRFT) to detect the most common types of Radio Frequency Interference (RFI) that affects critical communication signals. As part of preliminary performance analysis, the proposed detection technique is compared to the conventional energy detectors (employed in many commercial interference detectors) and shown to achieve significant improvement (~ 40dB) in probability of detection. The developed device is envisioned to revolutionize the low cost, portable spectrum interference monitoring sector.
{"title":"Developing a Low Cost, Portable Jammer Detection and Localization Device for First Responders","authors":"Anu Jagannath, Jithin Jagannath, Brendan Sheaffer, A. Drozd","doi":"10.1109/CCNC.2019.8651709","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651709","url":null,"abstract":"A low cost, portable, robust jammer detection, and localization device is proposed and developed in this work. Intentional or unintentional use of jammers is detrimental to the seamless operation of emergency rescue and public safety missions as it disrupts the critical communication devices. The proposed device employs robust parallel detection algorithms based on Kurtosis and FRactional Fourier Transform (FRFT) to detect the most common types of Radio Frequency Interference (RFI) that affects critical communication signals. As part of preliminary performance analysis, the proposed detection technique is compared to the conventional energy detectors (employed in many commercial interference detectors) and shown to achieve significant improvement (~ 40dB) in probability of detection. The developed device is envisioned to revolutionize the low cost, portable spectrum interference monitoring sector.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115419994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651805
Stephanie M. Soares, Marcelo M. Carvalho
This paper presents a discrete-time Markov model for the operation of a station in a single-hop IEEE 802.11ah network under saturated traffic and ideal channel conditions. In the proposed model, each beacon interval has only one RAW group that is further divided into a number of RAW slots to which stations are evenly assigned with equal priority. A novel feature in the model is the consideration of the event of RAW slot completion time using a specific probability. Two empirical expressions for this probability are proposed, and we study the average aggregate throughput for various numbers of RAW slots and stations in the network. Numerical results derived from the analytical model show similar behavior to those obtained with an IEEE 802.11ah model available for the ns-3 simulator.
{"title":"Throughput Analytical Modeling of IEEE 802.11ah Wireless Networks","authors":"Stephanie M. Soares, Marcelo M. Carvalho","doi":"10.1109/CCNC.2019.8651805","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651805","url":null,"abstract":"This paper presents a discrete-time Markov model for the operation of a station in a single-hop IEEE 802.11ah network under saturated traffic and ideal channel conditions. In the proposed model, each beacon interval has only one RAW group that is further divided into a number of RAW slots to which stations are evenly assigned with equal priority. A novel feature in the model is the consideration of the event of RAW slot completion time using a specific probability. Two empirical expressions for this probability are proposed, and we study the average aggregate throughput for various numbers of RAW slots and stations in the network. Numerical results derived from the analytical model show similar behavior to those obtained with an IEEE 802.11ah model available for the ns-3 simulator.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122791910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651806
Hong-Yunn Chen, Cheng-Fu Chou, L. Golubchik
Millimeter Wave (Mm Wave) massive multiple-input multiple-output (MIMO) has become an advantageous technology for gigabit-per-second data transmission in 5G wireless communication. To achieve low-cost and energy-efficient hardware components, one-bit quantized massive MIMO systems have been proposed for the receiver hardware architecture. The main focus of this work is leveraging the advantages of a state of the art one-bit quantized massive MIMO system for design of an adaptive-bit massive MIMO system. Hence, in this work, by leveraging the benefits of variational approximate message passing (VAMP), a novel MMSE-based VAMP algorithm is proposed for the adaptive-bit quantized massive MIMO system. That is, two novel modules, i.e., an adaptive ADC bit allocation method and an MMSE-based VAMP, are proposed for mm Wave communications of the hybrid MIMO receiver architecture. With the MMSE-based VAMP, our adaptive ADC bit allocation method is able to decrease the quantization of signals distortion by improving the flexible resolutions of ADC. Through simulations, compared with existing works, our proposed adaptive ADC bit allocation algorithm, together with MMSE-based VAMP, is able to achieve higher capacity, sum rate, and energy efficiency in most communication architectures.
{"title":"Adaptive-bit Quantized Massive MIMO Systems with MMSE-based Variational Approximate Message Passing","authors":"Hong-Yunn Chen, Cheng-Fu Chou, L. Golubchik","doi":"10.1109/CCNC.2019.8651806","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651806","url":null,"abstract":"Millimeter Wave (Mm Wave) massive multiple-input multiple-output (MIMO) has become an advantageous technology for gigabit-per-second data transmission in 5G wireless communication. To achieve low-cost and energy-efficient hardware components, one-bit quantized massive MIMO systems have been proposed for the receiver hardware architecture. The main focus of this work is leveraging the advantages of a state of the art one-bit quantized massive MIMO system for design of an adaptive-bit massive MIMO system. Hence, in this work, by leveraging the benefits of variational approximate message passing (VAMP), a novel MMSE-based VAMP algorithm is proposed for the adaptive-bit quantized massive MIMO system. That is, two novel modules, i.e., an adaptive ADC bit allocation method and an MMSE-based VAMP, are proposed for mm Wave communications of the hybrid MIMO receiver architecture. With the MMSE-based VAMP, our adaptive ADC bit allocation method is able to decrease the quantization of signals distortion by improving the flexible resolutions of ADC. Through simulations, compared with existing works, our proposed adaptive ADC bit allocation algorithm, together with MMSE-based VAMP, is able to achieve higher capacity, sum rate, and energy efficiency in most communication architectures.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122862355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651749
Shohei Maruyama, T. Yendo, Yoshifumi Shiraki, Takashi G. Sato, T. Moriya
Visible light communication (VLC) is a wireless communication technology that employs visible light as a communication medium. Image-sensor-based VLC is suitable for multi-channel communication because multiple transmitters can be captured concurrently. In this paper, we propose a communication method for image-sensor-based VLC using multiple frames, which are intended to aid the simultaneous measurement of a multi-channel biological signal. The proposed method estimates the phase difference between the transmitter and the receiver using multiple frames shot at different timings compared to LED blinking, and communication is established through phase shift keying. Moreover, the proposed method is resistant to phase differences between the transmitter and the receiver, which is unavoidable in asynchronous communication. Through experiments, we confirmed that communication is possible using our proposed method.
{"title":"Phase Estimation Method Using Multiple Frames in Image-Sensor-Based Visible Light Communication","authors":"Shohei Maruyama, T. Yendo, Yoshifumi Shiraki, Takashi G. Sato, T. Moriya","doi":"10.1109/CCNC.2019.8651749","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651749","url":null,"abstract":"Visible light communication (VLC) is a wireless communication technology that employs visible light as a communication medium. Image-sensor-based VLC is suitable for multi-channel communication because multiple transmitters can be captured concurrently. In this paper, we propose a communication method for image-sensor-based VLC using multiple frames, which are intended to aid the simultaneous measurement of a multi-channel biological signal. The proposed method estimates the phase difference between the transmitter and the receiver using multiple frames shot at different timings compared to LED blinking, and communication is established through phase shift keying. Moreover, the proposed method is resistant to phase differences between the transmitter and the receiver, which is unavoidable in asynchronous communication. Through experiments, we confirmed that communication is possible using our proposed method.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124867887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651715
Tasnuva Mahjabin, Yang Xiao
Domain Name System (DNS) is an important infrastructure of the Internet. However, DNS can be attacked by flooding DNS servers with tongs of DNS queries within a short time period. In this short paper, we analyze DNS attacks and propose a mitigation process.
{"title":"Mitigation Process for DNS Flood Attacks","authors":"Tasnuva Mahjabin, Yang Xiao","doi":"10.1109/CCNC.2019.8651715","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651715","url":null,"abstract":"Domain Name System (DNS) is an important infrastructure of the Internet. However, DNS can be attacked by flooding DNS servers with tongs of DNS queries within a short time period. In this short paper, we analyze DNS attacks and propose a mitigation process.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}