Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006652
Qingqing Li, J. P. Queralta, Tuan Anh Nguyen Gia, H. Tenhunen, Zhuo Zou, Tomi Westerlund
A recent trend in the IoT is to shift from traditional cloud-centric applications towards more distributed approaches embracing the fog and edge computing paradigms. In autonomous robots and vehicles, much research has been put into the potential of offloading computationally intensive tasks to cloud computing. Visual odometry is a common example, as realtime analysis of one or multiple video feeds requires significant on-board computation. If this operations are offloaded, then the on-board hardware can be simplified, and the battery life extended. In the case of self-driving cars, efficient offloading can significantly decrease the price of the hardware. Nonetheless, offloading to cloud computing compromises the system's latency and poses serious reliability issues. Visual odometry offloading requires streaming of video-feeds in real-time. In a multivehicle scenario, enabling efficient data compression without compromising performance can help save bandwidth and increase reliability.
{"title":"Visual Odometry Offloading in Internet of Vehicles with Compression at the Edge of the Network","authors":"Qingqing Li, J. P. Queralta, Tuan Anh Nguyen Gia, H. Tenhunen, Zhuo Zou, Tomi Westerlund","doi":"10.23919/ICMU48249.2019.9006652","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006652","url":null,"abstract":"A recent trend in the IoT is to shift from traditional cloud-centric applications towards more distributed approaches embracing the fog and edge computing paradigms. In autonomous robots and vehicles, much research has been put into the potential of offloading computationally intensive tasks to cloud computing. Visual odometry is a common example, as realtime analysis of one or multiple video feeds requires significant on-board computation. If this operations are offloaded, then the on-board hardware can be simplified, and the battery life extended. In the case of self-driving cars, efficient offloading can significantly decrease the price of the hardware. Nonetheless, offloading to cloud computing compromises the system's latency and poses serious reliability issues. Visual odometry offloading requires streaming of video-feeds in real-time. In a multivehicle scenario, enabling efficient data compression without compromising performance can help save bandwidth and increase reliability.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121771689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006637
T. Kondo, Kaori Maeda
Mobile devices such as mobile phones and tablets are daily devices as personal viewing of various streaming. They have potentials as a big virtual screen by a tiling display. It is important to keep video quality among tiled video displays in the case of cloud video streaming through the Internet. To solve this issue, we design and develop a mobile tiled display system which supports dynamic tiling adapting to the situation of mobile devices and network status. The proposed system has a dynamic grouping mechanism by devices properties and network status using attribute-based cryptography. Only authorized devices can join the group of the tiled display. Since the video resource is assumed to be on clouds, we introduce edge computing in the architecture of the system and it enables effective processing of video streaming for real-time adapting to variation of distinction of devices.
{"title":"Cloud-based Dynamic Tiled Display Adapting to Grouping by Distinction of Mobile Devices","authors":"T. Kondo, Kaori Maeda","doi":"10.23919/ICMU48249.2019.9006637","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006637","url":null,"abstract":"Mobile devices such as mobile phones and tablets are daily devices as personal viewing of various streaming. They have potentials as a big virtual screen by a tiling display. It is important to keep video quality among tiled video displays in the case of cloud video streaming through the Internet. To solve this issue, we design and develop a mobile tiled display system which supports dynamic tiling adapting to the situation of mobile devices and network status. The proposed system has a dynamic grouping mechanism by devices properties and network status using attribute-based cryptography. Only authorized devices can join the group of the tiled display. Since the video resource is assumed to be on clouds, we introduce edge computing in the architecture of the system and it enables effective processing of video streaming for real-time adapting to variation of distinction of devices.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122516332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006643
Naoya Yoshimura, T. Maekawa, Takahiro Hara
Owing to the growing demand for wearable context-aware applications, activity recognition technologies have attracted great attention. A neural network has been recently used as a recognition algorithm because of its discrimination and feature extraction ability. While understanding the network provides us useful information to improve its performance, visualization techniques for neural networks have been not explored yet in the human activity recognition field. We propose a visualization method tailored to human activity recognition that generates acceleration signals which maximize the activation of a unit in a neural network. We introduce a new regularization method based on a low pass filter to suppress high-frequency components induced in the generation process to improve the interpretability of the signals.
{"title":"Preliminary Investigation of Visualizing Human Activity Recognition Neural Network","authors":"Naoya Yoshimura, T. Maekawa, Takahiro Hara","doi":"10.23919/ICMU48249.2019.9006643","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006643","url":null,"abstract":"Owing to the growing demand for wearable context-aware applications, activity recognition technologies have attracted great attention. A neural network has been recently used as a recognition algorithm because of its discrimination and feature extraction ability. While understanding the network provides us useful information to improve its performance, visualization techniques for neural networks have been not explored yet in the human activity recognition field. We propose a visualization method tailored to human activity recognition that generates acceleration signals which maximize the activation of a unit in a neural network. We introduce a new regularization method based on a low pass filter to suppress high-frequency components induced in the generation process to improve the interpretability of the signals.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124399865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006665
J. Funasaka, Hiroyasu Obata, K. Ishida
Wireless LANs have been used all over the world as an access line with high throughput. In addition, Internet users can connect to servers through multiple TCP connections. However, too many TCP connections will degrade the total throughput on a wireless network. In this paper, we evaluate the conditions in terms of the number of TCP connections to obtain the highest total throughput on an IEEE 802.11g network. Besides, the direction of data flow and TCP versions, CUBIC, Compound, and NewReno are taken into account. The results will offer reference data to develop dynamic adjusting method of the number of TCP connections on wireless networks.
{"title":"Number of TCP Connections to Saturate Bandwidth of Wireless Networks","authors":"J. Funasaka, Hiroyasu Obata, K. Ishida","doi":"10.23919/ICMU48249.2019.9006665","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006665","url":null,"abstract":"Wireless LANs have been used all over the world as an access line with high throughput. In addition, Internet users can connect to servers through multiple TCP connections. However, too many TCP connections will degrade the total throughput on a wireless network. In this paper, we evaluate the conditions in terms of the number of TCP connections to obtain the highest total throughput on an IEEE 802.11g network. Besides, the direction of data flow and TCP versions, CUBIC, Compound, and NewReno are taken into account. The results will offer reference data to develop dynamic adjusting method of the number of TCP connections on wireless networks.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006648
Miya Fukumoto, Takuya Yoshihiro
Low-Power Wide-Area networks (LPWA) are useful to collect data from tiny devices distributed in a wide geographic area of land. Since LPWA devices often need to save power consumption and are less functional, localization of devices are addressed as one of the important practical problems. UNB (Ultra Narrow Band)-based LPWA networks such as Sigfox are one of the major LPWA services for IoT applications, which has a long communication range more than 10km. However, due to the long-range communications and the property of UNB-based modulation, it is preferable to use RSSI (Radio Signal Strength Indicator) in localization so that position estimation errors are large. In this paper, we propose a method to improve accuracy of device localization by utilizing portable Access Points (APs). We use a vehicle equipped with a portable AP to collect RSSI measurements. By introducing distance-based weighting technique, we improve the localization accuracy in combination with stationary and portable APs. Through evaluation in Wakayama city, we demonstrated that the portable AP and the new weighting technique effectively work in UNB-based LPWA networks.
低功耗广域网(LPWA)对于从分布在广泛地理区域的小型设备收集数据非常有用。由于低功耗广域网设备往往需要节省功耗,且功能较差,因此设备的本地化成为重要的实际问题之一。Sigfox等基于UNB(超窄带)的LPWA网络是物联网应用的主要LPWA服务之一,其通信距离超过10公里。但由于通信距离较远,且基于unb调制的特性,定位时更倾向于采用RSSI (Radio Signal Strength Indicator,无线电信号强度指示器),位置估计误差较大。本文提出了一种利用便携式接入点(ap)来提高设备定位精度的方法。我们使用配备便携式AP的车辆收集RSSI测量值。通过引入基于距离的加权技术,结合固定式和便携式ap,提高了定位精度。通过和歌山市的评估,我们证明了便携式AP和新的加权技术在基于unb的LPWA网络中有效工作。
{"title":"Improving Accuracy of Localization with Portable APs in Ultra-Narrow-Band-based LPWA Networks","authors":"Miya Fukumoto, Takuya Yoshihiro","doi":"10.23919/ICMU48249.2019.9006648","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006648","url":null,"abstract":"Low-Power Wide-Area networks (LPWA) are useful to collect data from tiny devices distributed in a wide geographic area of land. Since LPWA devices often need to save power consumption and are less functional, localization of devices are addressed as one of the important practical problems. UNB (Ultra Narrow Band)-based LPWA networks such as Sigfox are one of the major LPWA services for IoT applications, which has a long communication range more than 10km. However, due to the long-range communications and the property of UNB-based modulation, it is preferable to use RSSI (Radio Signal Strength Indicator) in localization so that position estimation errors are large. In this paper, we propose a method to improve accuracy of device localization by utilizing portable Access Points (APs). We use a vehicle equipped with a portable AP to collect RSSI measurements. By introducing distance-based weighting technique, we improve the localization accuracy in combination with stationary and portable APs. Through evaluation in Wakayama city, we demonstrated that the portable AP and the new weighting technique effectively work in UNB-based LPWA networks.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006640
Y. Owada, Goshi Sato, K. Temma, T. Kuri, M. Inoue, Takeshi Nagano
In this study, we develop a regional area information distribution network platform that includes distributed server functions and the mesh network system called NerveNet. NerveNet is a network system comprising a Layer 2 Virtual Local Area Network (VLAN) switch hardware and a CPU board with Linux based operating system. Conventional NerveNets only run on dedicated switching hardware, and interconnect base stations with dedicated links because various unexpected tag VLAN frames are exchanged over the links. We developed a new NerveNet Base Station (BS) software called “NerveNet OS,” that can run on a variety of personal computers (PC) especially single-board computers using software switching technologies. In addition, we developed an Layer 2 SSL-VPN over TCP/UDP functions to interconnect BSs over non-dedicated links such as a commercial network, mobile operator network or the Internet. We installed the NerveNet OS on a Raspberry pi 3 Model B hardware and examined the switching performance.
在本研究中,我们开发了一个包含分布式服务器功能和网状网络系统NerveNet的区域信息分发网络平台。NerveNet是一个由二层VLAN (Layer 2 Virtual Local Area network)交换机硬件和Linux操作系统的CPU板组成的网络系统。传统的nervenet只在专用的交换硬件上运行,并且由于各种意外的标签VLAN帧在链路上交换,因此只能通过专用链路连接基站。我们开发了一种新的NerveNet基站(BS)软件,称为“NerveNet OS”,它可以在各种个人计算机(PC)上运行,特别是使用软件交换技术的单板计算机。此外,我们开发了基于TCP/UDP功能的第2层SSL-VPN,通过非专用链路(如商业网络、移动运营商网络或互联网)互连BSs。我们在Raspberry pi 3 Model B硬件上安装了NerveNet OS,并测试了其切换性能。
{"title":"An Implementation of Layer 2 Overlay Mesh Network and Edge Computing Platform for IoT","authors":"Y. Owada, Goshi Sato, K. Temma, T. Kuri, M. Inoue, Takeshi Nagano","doi":"10.23919/ICMU48249.2019.9006640","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006640","url":null,"abstract":"In this study, we develop a regional area information distribution network platform that includes distributed server functions and the mesh network system called NerveNet. NerveNet is a network system comprising a Layer 2 Virtual Local Area Network (VLAN) switch hardware and a CPU board with Linux based operating system. Conventional NerveNets only run on dedicated switching hardware, and interconnect base stations with dedicated links because various unexpected tag VLAN frames are exchanged over the links. We developed a new NerveNet Base Station (BS) software called “NerveNet OS,” that can run on a variety of personal computers (PC) especially single-board computers using software switching technologies. In addition, we developed an Layer 2 SSL-VPN over TCP/UDP functions to interconnect BSs over non-dedicated links such as a commercial network, mobile operator network or the Internet. We installed the NerveNet OS on a Raspberry pi 3 Model B hardware and examined the switching performance.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/icmu48249.2019.9006634
{"title":"[Copyright notice]","authors":"","doi":"10.23919/icmu48249.2019.9006634","DOIUrl":"https://doi.org/10.23919/icmu48249.2019.9006634","url":null,"abstract":"","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115048826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006646
Qingqing Li, F. Yuhong, J. P. Queralta, Tuan Anh Nguyen Gia, H. Tenhunen, Zhuo Zou, Tomi Westerlund
Offloading computationally intensive tasks such as lidar or visual odometry from mobile robots has multiple benefits. Resource constrained robots can make use of their network capabilities to reduce the data processing load and be able to perform a larger number tasks in a more efficient manner. However, previous works have mostly focused on cloud offloading, which increases latency and reduces reliability, or high-end edge devices. Instead, we explore the utilization of FPGAs at the edge for computational offloading with minimal latency and high parallelism. We present the potential for modelling feature-based odometry in VHDL and utilizing FPGA implementations.
{"title":"Edge Computing for Mobile Robots: Multi-Robot Feature-Based Lidar Odometry with FPGAs","authors":"Qingqing Li, F. Yuhong, J. P. Queralta, Tuan Anh Nguyen Gia, H. Tenhunen, Zhuo Zou, Tomi Westerlund","doi":"10.23919/ICMU48249.2019.9006646","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006646","url":null,"abstract":"Offloading computationally intensive tasks such as lidar or visual odometry from mobile robots has multiple benefits. Resource constrained robots can make use of their network capabilities to reduce the data processing load and be able to perform a larger number tasks in a more efficient manner. However, previous works have mostly focused on cloud offloading, which increases latency and reduces reliability, or high-end edge devices. Instead, we explore the utilization of FPGAs at the edge for computational offloading with minimal latency and high parallelism. We present the potential for modelling feature-based odometry in VHDL and utilizing FPGA implementations.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006658
S. Seno
With the advance of IoT (Internet of Things), the amount of sensor data transmitted on wireless sensor networks (WSNs) around us are increasing tremendously thanks to rapid growth of various IoT applications. Such sensor data are vulnerable to security threats if not secured by proper security measures built upon WSN protocols. One of the most important security measures is data authentication for transmitted data. Naturally there have been a lot of works on authentication of WSN packets through transmission channel, including IEEE 802.11i which defines the security features of the wireless LAN. However, most of such works have limited their authentication scope on data packets. Although some works propose authentication for packets other than data packets, they usually require an extension of the existing packet format such as IEEE 802.11, or they make use of its undefined fields, and thus they will introduce the risk of interoperability problems with existing networks. This paper proposes a novel packet authentication method for Layer 2 networks which addresses the above two issues. The proposed method is applicable to not only data packets but also other types of packets, and it does not require modification of the standard packet format. It employs a packet's FCS (Frame Check Sequence) field for both authentication and frame error detection and it can be safely introduced to existing WSNs.
{"title":"Layer 2 Packet Authentication for IoT Sensor Networks","authors":"S. Seno","doi":"10.23919/ICMU48249.2019.9006658","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006658","url":null,"abstract":"With the advance of IoT (Internet of Things), the amount of sensor data transmitted on wireless sensor networks (WSNs) around us are increasing tremendously thanks to rapid growth of various IoT applications. Such sensor data are vulnerable to security threats if not secured by proper security measures built upon WSN protocols. One of the most important security measures is data authentication for transmitted data. Naturally there have been a lot of works on authentication of WSN packets through transmission channel, including IEEE 802.11i which defines the security features of the wireless LAN. However, most of such works have limited their authentication scope on data packets. Although some works propose authentication for packets other than data packets, they usually require an extension of the existing packet format such as IEEE 802.11, or they make use of its undefined fields, and thus they will introduce the risk of interoperability problems with existing networks. This paper proposes a novel packet authentication method for Layer 2 networks which addresses the above two issues. The proposed method is applicable to not only data packets but also other types of packets, and it does not require modification of the standard packet format. It employs a packet's FCS (Frame Check Sequence) field for both authentication and frame error detection and it can be safely introduced to existing WSNs.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.23919/ICMU48249.2019.9006653
Y. Musaka, Yoshitaka Nakamura, H. Inamura, Xiaohong Jiang
In Japan, an Earthquake and Tsunami Warning System (ETWS) in LTE is being adopted to provide emergency warning for quick evacuation. This paper proposes to enhance the ETWS by leveraging the device to device (D2D) communications in LTE. In particular, we propose to extend the coverage of e node B (eNB)s through relaying among User Equipment (UE)s with Proximity Service (ProSe) device to device (D2D) capability, such that the important ETWS messages may reach people even out of the coverage area of eNBs. By exploiting the distribution information of UEs around the eNB, we also develop a new relaying scheme to reduce the number of transmissions in the relaying process, such that an efficient dissemination of ETWS messages can be achieved. The experiment results based on a network scenario with UE density of 24 UEsjkm2 or more indicate that by applying the proposed relaying scheme, the total number of transmissions can be reduced as high as 27% on average.
{"title":"Transmission Reduction Scheme in an Emergency Warning System with LTE D2D","authors":"Y. Musaka, Yoshitaka Nakamura, H. Inamura, Xiaohong Jiang","doi":"10.23919/ICMU48249.2019.9006653","DOIUrl":"https://doi.org/10.23919/ICMU48249.2019.9006653","url":null,"abstract":"In Japan, an Earthquake and Tsunami Warning System (ETWS) in LTE is being adopted to provide emergency warning for quick evacuation. This paper proposes to enhance the ETWS by leveraging the device to device (D2D) communications in LTE. In particular, we propose to extend the coverage of e node B (eNB)s through relaying among User Equipment (UE)s with Proximity Service (ProSe) device to device (D2D) capability, such that the important ETWS messages may reach people even out of the coverage area of eNBs. By exploiting the distribution information of UEs around the eNB, we also develop a new relaying scheme to reduce the number of transmissions in the relaying process, such that an efficient dissemination of ETWS messages can be achieved. The experiment results based on a network scenario with UE density of 24 UEsjkm2 or more indicate that by applying the proposed relaying scheme, the total number of transmissions can be reduced as high as 27% on average.","PeriodicalId":348402,"journal":{"name":"2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125695586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}