Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758519
B. Jolly, A. Willig, A. McDonald, M. Pannell, G. Plank
Antarctica is a harsh and challenging continent to study, particularly with regard to scientific equipment. This paper presents SNOWWEB, a Wireless Sensor Network equipped with environmental sensors designed to capture distributed meteorological measurements in Antarctica and report them in real-time to a base station. To accomplish this we used XBee Pro S2B transceivers utilising the ZigBee standard. Combined with high gain omnidirectional antennae we were able to establish reliable multi-hop links with inter-node distances spanning up to 10 km during testing in Antarctica in January 2013. Over a one week period we experienced exceptional network performance, despite a snowstorm, with all stations reporting as expected.
研究南极洲是一个严酷和具有挑战性的大陆,特别是在科学设备方面。本文介绍了SNOWWEB,这是一个配备环境传感器的无线传感器网络,旨在捕获南极洲的分布式气象测量数据,并将其实时报告给基站。为了实现这一点,我们使用了使用ZigBee标准的XBee Pro S2B收发器。结合高增益全向天线,我们能够在2013年1月在南极洲的测试中建立可靠的多跳链路,节点间距离可达10公里。在一周的时间里,我们经历了非凡的网络性能,尽管有暴风雪,所有的站点都按照预期报告。
{"title":"SNOWWEB - Wirelessly connected weather stations in Antarctica","authors":"B. Jolly, A. Willig, A. McDonald, M. Pannell, G. Plank","doi":"10.1109/LCNW.2013.6758519","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758519","url":null,"abstract":"Antarctica is a harsh and challenging continent to study, particularly with regard to scientific equipment. This paper presents SNOWWEB, a Wireless Sensor Network equipped with environmental sensors designed to capture distributed meteorological measurements in Antarctica and report them in real-time to a base station. To accomplish this we used XBee Pro S2B transceivers utilising the ZigBee standard. Combined with high gain omnidirectional antennae we were able to establish reliable multi-hop links with inter-node distances spanning up to 10 km during testing in Antarctica in January 2013. Over a one week period we experienced exceptional network performance, despite a snowstorm, with all stations reporting as expected.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758526
F. Al-turjman, Ashraf E. Al-Fagih, H. Hassanein
Information-Centric Networks (ICNs) represent a content-based model which addresses user's requests regardless of the content's location or the nature of its original publisher. The performance of an ICN is highly dependent on replicating the content across the caches of a multitude of nodes in the network. Given the high data turnover rates of contemporary applications and the finite nature of caching space, efficient caching algorithms play a crucial role in determining which data item can be safely dropped in order to accommodate for more important items. In this paper, we present a value-based cache replacement approach that executes a Least Valuable First (LVF) policy. Our approach employs a utility function that uses delay, popularity and age parameters to determine which item to drop from the cache. We present simulation results comparing our approach to other dominant cache replacement policies under varying conditions such as data popularity, in-network cache ratio and connectivity degree. Results show that our approach outperforms in terms of time-to-hit, hit rate, in-network delay and data publisher load.
以信息为中心的网络(ICNs)代表了一种基于内容的模型,它处理用户的请求,而不考虑内容的位置或原始发布者的性质。ICN的性能高度依赖于在网络中众多节点的缓存中复制内容。考虑到当前应用程序的高数据周转率和缓存空间的有限性,高效的缓存算法在确定哪些数据项可以安全地删除以容纳更重要的项方面起着至关重要的作用。在本文中,我们提出了一种基于值的缓存替换方法,该方法执行最小值优先(Least value First, LVF)策略。我们的方法使用了一个实用函数,该函数使用延迟、流行度和年龄参数来确定要从缓存中删除的条目。我们给出了仿真结果,将我们的方法与其他主要的缓存替换策略在不同条件下(如数据流行度、网络内缓存比率和连接程度)进行了比较。结果表明,我们的方法在命中时间、命中率、网络内延迟和数据发布者负载方面优于其他方法。
{"title":"A value-based cache replacement approach for Information-Centric Networks","authors":"F. Al-turjman, Ashraf E. Al-Fagih, H. Hassanein","doi":"10.1109/LCNW.2013.6758526","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758526","url":null,"abstract":"Information-Centric Networks (ICNs) represent a content-based model which addresses user's requests regardless of the content's location or the nature of its original publisher. The performance of an ICN is highly dependent on replicating the content across the caches of a multitude of nodes in the network. Given the high data turnover rates of contemporary applications and the finite nature of caching space, efficient caching algorithms play a crucial role in determining which data item can be safely dropped in order to accommodate for more important items. In this paper, we present a value-based cache replacement approach that executes a Least Valuable First (LVF) policy. Our approach employs a utility function that uses delay, popularity and age parameters to determine which item to drop from the cache. We present simulation results comparing our approach to other dominant cache replacement policies under varying conditions such as data popularity, in-network cache ratio and connectivity degree. Results show that our approach outperforms in terms of time-to-hit, hit rate, in-network delay and data publisher load.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758535
Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun
Mobile Internet Protocol (IP) has been developed to maintain permanent IP addresses for mobile users while they are moving from one point to another where the Mobile Terminal (MT) device will have two IP addresses: a static home address and a care-of address which will be changed and re-attached at each point of the movement of the MT. However, a location update message is required to be sent to the home agent for each new connection. This will potentially increase the handoff latency and leads to high load on the global Internet. This paper presents the concepts and the challenges of Mobile IP networks and then proposes the use of OpenFlow approach as an alternate transport mechanism to perform routing and to provide network connectivity for Mobile IP networks. The proposed application determines calculations and reroutes the subsequent packets. OpenFlow aims to optimize routing path and handoff performance by using controller's application and exchanges controllers' information.
{"title":"Developing an application based on OpenFlow to enhance mobile IP networks","authors":"Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun","doi":"10.1109/LCNW.2013.6758535","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758535","url":null,"abstract":"Mobile Internet Protocol (IP) has been developed to maintain permanent IP addresses for mobile users while they are moving from one point to another where the Mobile Terminal (MT) device will have two IP addresses: a static home address and a care-of address which will be changed and re-attached at each point of the movement of the MT. However, a location update message is required to be sent to the home agent for each new connection. This will potentially increase the handoff latency and leads to high load on the global Internet. This paper presents the concepts and the challenges of Mobile IP networks and then proposes the use of OpenFlow approach as an alternate transport mechanism to perform routing and to provide network connectivity for Mobile IP networks. The proposed application determines calculations and reroutes the subsequent packets. OpenFlow aims to optimize routing path and handoff performance by using controller's application and exchanges controllers' information.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121310838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758513
A. Mammeri, A. Boukerche, Jingwen Feng, Renfei Wang
Traffic sign detection and recognition system is becoming an essential component of smart cars. Speed-Limit Sign (SLS) is one of the most important traffic signs, since it is used to regulate the speed of vehicles in downtown and highways. The recognition of SLS by drivers is mandatory. In this paper, we investigate SLS detection and recognition system. We focus on North-American speed limit signs, including Canadian and U.S. signs. A modified version of Histogram of Oriented Gradients (HOG) is used to detect and recognize SLS through a set of two-level SVM-based classifiers. Moreover, we build our online database called North-American Speed Limit Signs (NASLS) which includes four SLS categories; white, yellow, black and orange signs. We show through an extensive set of experiments that our system achieves an accuracy of more than 94% of SLS recognition.
交通标志检测与识别系统正在成为智能汽车必不可少的组成部分。限速标志(SLS)是最重要的交通标志之一,因为它用于调节市中心和高速公路上的车辆速度。司机必须承认SLS。本文对SLS检测与识别系统进行了研究。我们专注于北美的限速标志,包括加拿大和美国的标志。采用改进的HOG (Histogram of Oriented Gradients)方法,通过一组两级svm分类器对SLS进行检测和识别。此外,我们还建立了北美限速标志(NASLS)在线数据库,其中包括四个SLS类别;白色、黄色、黑色和橙色的标志。我们通过一系列广泛的实验表明,我们的系统达到了超过94%的SLS识别准确率。
{"title":"North-American speed limit sign detection and recognition for smart cars","authors":"A. Mammeri, A. Boukerche, Jingwen Feng, Renfei Wang","doi":"10.1109/LCNW.2013.6758513","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758513","url":null,"abstract":"Traffic sign detection and recognition system is becoming an essential component of smart cars. Speed-Limit Sign (SLS) is one of the most important traffic signs, since it is used to regulate the speed of vehicles in downtown and highways. The recognition of SLS by drivers is mandatory. In this paper, we investigate SLS detection and recognition system. We focus on North-American speed limit signs, including Canadian and U.S. signs. A modified version of Histogram of Oriented Gradients (HOG) is used to detect and recognize SLS through a set of two-level SVM-based classifiers. Moreover, we build our online database called North-American Speed Limit Signs (NASLS) which includes four SLS categories; white, yellow, black and orange signs. We show through an extensive set of experiments that our system achieves an accuracy of more than 94% of SLS recognition.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758530
H. Coskun, T. Pfeifer, Asma Elmangoush, A. Al-Hezmi
Advances in the field of wireless sensors in particular and machine-to-machine communication in general are converging into the Internet of Things (IoT). Real and virtual `things' will create a pervasive information space that will hold vast amounts of data. The challenge is to give mobile users an on-demand access to this space, to discover and gather data dynamically from available sensors in the surroundings and enable collaboration by allowing the sharing of own data. Open M2M Data is a new paradigm in usage and delivery of (machine) data. The information space described above will be made accessible on-demand by bringing device-to-device (D2D) and machine type communication (MTC) together and introducing Linked Data principles into the machine-to-machine (M2M) platforms.
{"title":"Open M2M data - Position paper","authors":"H. Coskun, T. Pfeifer, Asma Elmangoush, A. Al-Hezmi","doi":"10.1109/LCNW.2013.6758530","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758530","url":null,"abstract":"Advances in the field of wireless sensors in particular and machine-to-machine communication in general are converging into the Internet of Things (IoT). Real and virtual `things' will create a pervasive information space that will hold vast amounts of data. The challenge is to give mobile users an on-demand access to this space, to discover and gather data dynamically from available sensors in the surroundings and enable collaboration by allowing the sharing of own data. Open M2M Data is a new paradigm in usage and delivery of (machine) data. The information space described above will be made accessible on-demand by bringing device-to-device (D2D) and machine type communication (MTC) together and introducing Linked Data principles into the machine-to-machine (M2M) platforms.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758495
S. Itaya, Rie Tanaka, Shinichi Doi, Keiji Yamada, P. Davis
Sustainable resource management using smart monitoring and control systems in large building complexes aims to achieve performance goals of tenants while reducing costs and reducing resource consumption. However conventional methods of optimizing resource use for normal activity may increase susceptibility to internal or external system failures. We present a cooperative approach to resource management in multi-tenant buildings that includes sharing of risk awareness and show that it is effective for increasing the reliability of resource supply for all tenants.
{"title":"Sharing risk-awareness for reliable resource management in smart buildings","authors":"S. Itaya, Rie Tanaka, Shinichi Doi, Keiji Yamada, P. Davis","doi":"10.1109/LCNW.2013.6758495","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758495","url":null,"abstract":"Sustainable resource management using smart monitoring and control systems in large building complexes aims to achieve performance goals of tenants while reducing costs and reducing resource consumption. However conventional methods of optimizing resource use for normal activity may increase susceptibility to internal or external system failures. We present a cooperative approach to resource management in multi-tenant buildings that includes sharing of risk awareness and show that it is effective for increasing the reliability of resource supply for all tenants.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"93 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758500
N. Nguyen, R. Knopp, N. Nikaein, C. Bonnet
Evolved Multimedia Broadcast Multicast Service (eMBMS) is a point-to-multipoint content delivery solution designed for LTE/LTE-A. It distributes efficiently the broadcast and multicast service to a massive number of mobile devices located in a given geographical area. eMBMS can be used to boost the network's capability for providing high-quality multimedia service in high user-density area such a stadium during an entertainment or sport event. The aim of this paper is to validate and evaluate the performance of eMBMS following the 3GPP standard (release 10) implemented in the context of the OpenAirInterface SDR platforms. The difference between the OpenAirInterface in-lab system validation platform with respect to existing simulation/emulation tools such as OPNET, matlab, NS-2/3 is that firstly it is built with a high level of realism supporting real-time operation (based on RTAI and RT-Preempt); secondly it is part of the integration and validation chain for a real-time RF experimentation. The results show that eMBMS performance in the OpenAirInterface satisfies the requirement of 3GPP standard in terms of BLER. Furthermore, the theoretical user throughput proposed by 3GPP have been validated through experimentation.
{"title":"Implementation and validation of Multimedia Broadcast Multicast Service for LTE/LTE-advanced in OpenAirInterface platform","authors":"N. Nguyen, R. Knopp, N. Nikaein, C. Bonnet","doi":"10.1109/LCNW.2013.6758500","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758500","url":null,"abstract":"Evolved Multimedia Broadcast Multicast Service (eMBMS) is a point-to-multipoint content delivery solution designed for LTE/LTE-A. It distributes efficiently the broadcast and multicast service to a massive number of mobile devices located in a given geographical area. eMBMS can be used to boost the network's capability for providing high-quality multimedia service in high user-density area such a stadium during an entertainment or sport event. The aim of this paper is to validate and evaluate the performance of eMBMS following the 3GPP standard (release 10) implemented in the context of the OpenAirInterface SDR platforms. The difference between the OpenAirInterface in-lab system validation platform with respect to existing simulation/emulation tools such as OPNET, matlab, NS-2/3 is that firstly it is built with a high level of realism supporting real-time operation (based on RTAI and RT-Preempt); secondly it is part of the integration and validation chain for a real-time RF experimentation. The results show that eMBMS performance in the OpenAirInterface satisfies the requirement of 3GPP standard in terms of BLER. Furthermore, the theoretical user throughput proposed by 3GPP have been validated through experimentation.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130067958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758540
Amr H. El Mougy, H. Mouftah
Long-Term Evolution (LTE) has now become the leading candidate for facilitating interoperability and information sharing among different types of first responders, in what has come to be commonly known as Public Safety Networks (PSNs). However, research has shown that the bandwidth assigned to these networks will not be sufficient to support the offered load and the Quality of Service (QoS) requirements of the applications. Thus, resource management and context-awareness become significantly important in maximizing the efficiency of the network and prioritizing the traffic according to its importance. This paper aims to formulate the problems of resource management and context-awareness in PSNs. Therefore, the main challenges and requirements of these problems will be identified. In addition, a condensed survey of some important resource management and context-awareness techniques will be offered. Furthermore, a conceptual framework that encompasses ideas for these topics in different layers will be proposed as a guide for future researchers.
{"title":"On resource management and context-awareness in LTE-based networks for Public Safety","authors":"Amr H. El Mougy, H. Mouftah","doi":"10.1109/LCNW.2013.6758540","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758540","url":null,"abstract":"Long-Term Evolution (LTE) has now become the leading candidate for facilitating interoperability and information sharing among different types of first responders, in what has come to be commonly known as Public Safety Networks (PSNs). However, research has shown that the bandwidth assigned to these networks will not be sufficient to support the offered load and the Quality of Service (QoS) requirements of the applications. Thus, resource management and context-awareness become significantly important in maximizing the efficiency of the network and prioritizing the traffic according to its importance. This paper aims to formulate the problems of resource management and context-awareness in PSNs. Therefore, the main challenges and requirements of these problems will be identified. In addition, a condensed survey of some important resource management and context-awareness techniques will be offered. Furthermore, a conceptual framework that encompasses ideas for these topics in different layers will be proposed as a guide for future researchers.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132129576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758518
W. Tesfay, M. Aleksy, K. Andersson, M. Lehtola
The increasing digitalization of our daily lives is gaining a new momentum recently in what is called the post-desktop era of computing. This wide spread in digitalization is made possible by the introduction of handy devices specifically of mobile phones, laptop computers, Smartphones, and tablets. This new trend in shaping up technological advancement presents new opportunities for mobile information presentation, processing, and synthesis in different spheres of application such as providing industrial field services engineering support. Industrial field service engineers execute sets of work orders on daily basis plans. These work order executions demand the availability of digital information anywhere anytime to process them faster. This paper presents a scenario where the newly emerging Smartphone features such as augmented reality, audio / video processing, and near field communication sensing can be used to develop a prototype that supports industrial field service engineers in the contemporary field service engineering taskforces. It employs real world use-cases and carrying out quantitative prototype usability test analysis.
{"title":"Mobile computing application for industrial field service engineering: A case for ABB service engineers","authors":"W. Tesfay, M. Aleksy, K. Andersson, M. Lehtola","doi":"10.1109/LCNW.2013.6758518","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758518","url":null,"abstract":"The increasing digitalization of our daily lives is gaining a new momentum recently in what is called the post-desktop era of computing. This wide spread in digitalization is made possible by the introduction of handy devices specifically of mobile phones, laptop computers, Smartphones, and tablets. This new trend in shaping up technological advancement presents new opportunities for mobile information presentation, processing, and synthesis in different spheres of application such as providing industrial field services engineering support. Industrial field service engineers execute sets of work orders on daily basis plans. These work order executions demand the availability of digital information anywhere anytime to process them faster. This paper presents a scenario where the newly emerging Smartphone features such as augmented reality, audio / video processing, and near field communication sensing can be used to develop a prototype that supports industrial field service engineers in the contemporary field service engineering taskforces. It employs real world use-cases and carrying out quantitative prototype usability test analysis.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131022586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.1109/LCNW.2013.6758514
Adetundji Adigun, B. A. Bensaber, Ismaïl Biskri
We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least two vehicles to change their pseudonym in the same time interval. We evaluate in this work, the bandwidth used by considering the vehicles speed in each approach. The proposed protocol is based on equidistant distribution of the road side unit and uses the average of speed permitted on the road to evaluate lifetime t of the communication's pseudonyms and certificates. The exchange of information is based on asymmetric and symmetric cryptography scheme and it uses hash function. Our protocol provides authentication, non-repudiation and privacy.
{"title":"Protocol of change pseudonyms for VANETs","authors":"Adetundji Adigun, B. A. Bensaber, Ismaïl Biskri","doi":"10.1109/LCNW.2013.6758514","DOIUrl":"https://doi.org/10.1109/LCNW.2013.6758514","url":null,"abstract":"We propose in this paper a security protocol based on periodic change of pseudonyms. The idea is to avoid illegal traceability of vehicles during their communications and preserve their privacy and confidential information. Two different approaches are proposed. In the first approach, each vehicle asks the central authority a new communication pseudonym after a time t. While in the second approach, each vehicle generates itself after a time t, a new communication pseudonym. Our objective is to permit at least two vehicles to change their pseudonym in the same time interval. We evaluate in this work, the bandwidth used by considering the vehicles speed in each approach. The proposed protocol is based on equidistant distribution of the road side unit and uses the average of speed permitted on the road to evaluate lifetime t of the communication's pseudonyms and certificates. The exchange of information is based on asymmetric and symmetric cryptography scheme and it uses hash function. Our protocol provides authentication, non-repudiation and privacy.","PeriodicalId":290924,"journal":{"name":"38th Annual IEEE Conference on Local Computer Networks - Workshops","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}