2010 ieee 6th international conference on wireless and ...ieee 6th international conference on...
TRANSCRIPT
![Page 1: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/1.jpg)
2010IEEE6thInternationalConferenceon
WirelessandMobileComputing,NetworkingandCommunications
![Page 2: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/2.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
1
Welcome
WiMob’2010
WelcomeMessagefromtheGeneralChairs
On behalf of the Organizing Committee, we would like welcome you to the Sixth Annual IEEEInternational Conference on Wireless and Mobile Computing, Networking and Communications(WiMob). The tremendousadvances inwirelesscommunicationsandmobilecomputing,combinedwith the rapid evolution in smart appliances and devices have generated new challenges and
![Page 3: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/3.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
2
problems requiring solutions that rely on interactions between different network layers andapplications in order to offer advancedmobile services.WiMob’2010 addresses threemain areas:WirelessCommunications,MobileNetworking,UbiquitousComputingandApplications.IEEEWiMobhasgrowntobecomeoneof themajorevents in theseareas,and itaims tostimulate interactionsamong participants and enable them to exchange new ideas and practical experiences in theirrespectiveareas.
This year conference is being held in the Sheraton on the Falls hotel, Niagara Falls, Canada, fromOctober11to13,2010.Theconferencereceivedsubmissionsfrom50differentcountries,withthemaintrackreceiving228submissionsoutofwhich66paperswereselectedfororalpresentation.Inadditiontothemainprogram,theconferenceisco‐hostingthefollowingsixworkshops:
‐ Third IEEE International Workshop on Selected Topics in Mobile and Wireless Computing(STMWC'10),
‐ Second International Workshop on Network Assurance and Security Services in UbiquitousEnvironments(NASSUE2010),
‐ FirstWorkshoponCooperativeMobileProtocolsandApplications(CMPA2010),‐ FirstInternationalWorkshoponVEhicularCOmmunicationsandNetworking(VECON2010),‐ FirstInternationalWorkshoponAdvancesinWirelessSensorandActuatorNetworks(AWSAN
2010),‐ FirstInternationalWorkshoponPerformanceEnhancementsinMIMO‐OFDMSystems(PEMOS
2010).
Wewould like to thank theTPCCo‐Chairs,TPCmembersandall the reviewers, theWorkshopCo‐Chairs, the Publicity Co‐Chairs and the Publication Chair and all the members of the organizingcommitteefortheirassistanceinmakingthisconferenceasuccess.Wewouldalsotothankourtwodistinguished keynote speakers, Dr. Weihua Zhuang and Dr. Pierre Boucher who have agreed toaddresstheconferenceattendees.
WewouldalsoliketoacknowledgethecontinuingsponsorshipofIEEEWiMobbytheIEEEComputerSocietyandIEEE.
We look forwardtoseeingyouat theconference,andwehopethatyouenjoytheconferenceandyourstayinNiagaraFalls
AbderrahimBenslimane AliMiri
GeneralChairforIEEEWiMob2010 GeneralCo‐ChairforIEEEWiMob2010
![Page 4: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/4.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
3
Abderrahim Benslimane is Full Professor of Computer Science andEngineering at the University of Avignon (France) since September2001. He has been as Associate Professor at the University ofTechnology of Belfort‐Montbéliard since September 1994. Heobtained the title to supervise researches (HDR 2000) from theUniversity of Cergy‐Pontoise, France. He received the PhD degree(1993), DEA (MS 1989) from the Franche‐Comte University of
Besançon,andBS(1987)fromtheUniversityofNancy,allinComputerScience.
Hisresearchandteachinginterestsareinwirelessad‐hocandsensornetworks.Particularly,heworkson multicast routing, inter‐vehicular communications, Quality of service, energy conservation,localization, intrusion detection andMAC layer performance evaluation. Hewas also interested inspecification and verification of communication protocols, group communication algorithms andmultimedia synchronization. He has several refereed international publications (book, journals andconferences)inallthosedomains.
He has served as technical program chair and co‐chair, member of a number of internationalconferences. He has been reviewer of a great number of journals, of national research projectssponsoredbytheANR/Telecom.HeistheheaderofComputerNetworksandMultimediaApplicationsteam(RAM)oftheComputerLaboratoryofAvignon.
He was responsible of the speciality RTM (Networks, Telecoms andMultimedia), Professional andResearch,of theMaster (MsC)ComputerEngineeringandMathematic,TechniquesandSciencesoftheUniversityofAvignon2001‐2006.
Heisinvolvedinmanynationalandinternationalprojects.Heismemberofmanyeditorialboardsofinternationaljournals.HechairsmanyIEEEinternationalconferences.Heparticipatestothesteeringand the program committee of many IEEE international conferences. He is IEEE senior member,member of the CA of the IEEE French section, of the Technical Committee IEEE ComSocCommunicationsandInformationSecurity(CISTC),Vice‐PresidentoftheFranceIEEEstudentactivitiesandoftheSPECIF/FranceandVice‐chairpublicationsofCISTCIEEECOMSOC.Hewasmemberofthe“ConseilNationaldesUniversités”2003‐2007(27èmesection).
Hehasmanyinternationalcollaborations,forsupervisingMsCandPhDstudents.HesupervisedmanyPh.Dthesisinlocalizationinsensornetworks,securityinadhocnetworks,QoSinWiMAXandcrosslayer energy conservation in ad hoc networks and many MsC research supervision (and cosupervision) of students in Univ. Avignon, Univ. Montreal, Univ. Concordia, Ecole Polytecnique ofMontreal.
![Page 5: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/5.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
4
He iseditorialmemberofmany international journals, general chairofWiMobandsymposiumco‐chairinGlobecomandICC.Hewasguesteditorofmanyspecialissues.
AliMirihasbeenaFullProfessoratSchoolofComputerScience,RyersonUniversity, Toronto since 2009. He has also been with the School ofInformation Technology and Engineering and Department ofMathematicsandStatisticssince2001asanAssistantProfessor,andlaterasanAssociateProfessorin2005andaFullProfessorat2008.Heisthefounder and the director of Computational Laboratory in Coding andCryptography (CLiCC) at the University of Ottawa. He has held visitingpositions at the Fields Institute for Research inMathematical Sciences,Toronto in2006,andUniversitédeCergy‐Pontoise,France in2007,andAlicanteandAlbeceteUniversitiesinSpainin2008.Hisresearchinterests
includecomputernetworks,digital communication,andsecurityandprivacy technologiesand theirapplications.Bycombininghisexpertise inmathematics, computerscienceandengineering,hehasmadesignificantcontributionstotheseareas,writingandco‐authoringmorethan120peer‐reviewedpapersininternationalconferenceandjournals.Dr.Mirihasservedinmorethan50organizingandtechnical program committees of international conferences and workshops. He has chaired/co‐chairedThe14thworkshoponSelectedAreas inCryptography(SAC),2007,TheFieldsworkshoponNew Direction on Cryptography, 2008, IFIP Conference in Wireless Sensor and Actor Networks(WSAN),2008,TheCanadianWorkshopinInformationTheory(CWIT),2009,TheEighthInternationalConferenceonPrivacy, Security,andTrust (PST),2010, IEEE InternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications(WiMoB),2010,andhewillco‐chairingThe18thworkshoponSelectedAreas inCryptography (SAC),2011.Hehas servedasaguesteditor forJournal of Ad Hoc and SensorWireless Networks, Journal of Telecommunications Systems, and iscurrentlyservingontheeditorialboardofInternationalJournalOnAdvancesinInternetTechnology.
HeisamemberofProfessionalEngineersOntario,ACMandaseniormemberofIEEE.
![Page 6: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/6.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
5
General Information
Registration
Delegatesmayregisteron:
• Monday,October11:8:00AMto5:00PM
• Tuesday,October12:8:00AMto3:00PM
• Wednesday,October13:8:00AMto10:00AM
WirelessInternetAccess
Username: wimob
Password: Conference
![Page 7: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/7.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
6
Program at a glance Sunday,October10
Time UpperFallsviewStudioB
05:00PM–7:30PM ReceptionMonday,October11Time StrategyRoom1 StrategyRoom2 StrategyRoom3
08:30AM
Keynote:VehicularNetworking:ChallengesandOpportunities
09:30AM Break@PrefunctionSpaceStrategyRoom10:00AM WirelessandAd‐HocNetworks(I) MobileNetworking 12:00PM Lunch@GreatRoomB01:20PM WirelessandAd‐HocNetworks(II) SensorNetworks(I) 3:00PM Break@PrefunctionSpaceStrategyRoom03:30PM VehicularCommunications
05:20PMNASSUE:SecondInternationalWorkshoponNetworkAssuranceandSecurityServicesinUbiquitousEnvironments(NASSUE2010)
SensorNetworks(II)
Tuesday,October12Time StrategyRoom1 StrategyRoom2 StrategyRoom3
08:40AMSTWMC1:ThirdIEEEInternationalWorkshoponSelectedTopicsinMobileandWirelessComputing(STMWC'10)‐1
CMPA:FirstWorkshoponCooperativeMobileProtocolsandApplications(CMPA2010)
10:10AM Break@PrefunctionSpaceStrategyRoom
10:30AM
STWMC2:ThirdIEEEInternationalWorkshoponSelectedTopicsinMobileandWirelessComputing(STMWC'10)‐2
VECON1:FirstInternationalWorkshoponVEhicularCOmmunicationsandNetworking(VECON2010)‐1
12:10PM Lunch@GreatRoomB
01:20PM
AWSAN:FirstInternationalWorkshoponAdvancesinWirelessSensorandActuatorNetworks(AWSAN2010)
VECON2:FirstInternationalWorkshoponVEhicularCOmmunicationsandNetworking(VECON2010)‐2
3:00PM Break@PrefunctionSpaceStrategyRoom
03:30PM
STWMC3:ThirdIEEEInternationalWorkshoponSelectedTopicsinMobileandWirelessComputing(STMWC'10)‐3
PEMOS:FirstInternationalWorkshoponthePerformanceEnhancementsinMIMO‐OFDMSystems(PEMOS2010)
![Page 8: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/8.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
7
6:30PM Dinner@GreatRoomB
Wednesday,October13Time StrategyRoom1 StrategyRoom2 StrategyRoom3
08:30AM
Keynote:Towards50BillionDevices:ASustainableEvolutionofMobileNetworks
9:30AM Break@PrefunctionSpaceStrategyRoom10:00AM AirInterfaces SmartSystems 12:00PM Lunch@GreatRoomB01:20PM MobilityandNomadicity(I) NextGenerationNetworks(I) 3:00PM Break@PrefunctionSpaceStrategyRoom03:30PM NextGenerationNetworks(II) MobilityandNomadicity(II)
![Page 9: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/9.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
8
KeynoteSpeakersDr.WeihuaZhuangProfessor,PhD,FIEEE,PEng,TierI(Senior)CanadaResearchChairTitle:VehicularNetworking:ChallengesandOpportunitiesAbstractVehicularadhocnetworks(VANETs)aimatprovidingcommunicationsamongvehicles,andbetweenvehiclesandnearbyroadsideequipment,withverylimitedornoinfrastructuresupport.VANETsareenvisionedtobeacornerstoneforroadsafety,intelligenttransportation,mobileInternet
access,andmanylocationdependentcommercialapplications.Thegrowingimportanceofinter‐vehicularcommunicationshasbeenrecognizedbygovernments,academia,andindustry.Incomparisonwithgeneral‐purposemobileadhocnetworks,VANETshaveuniquefeaturesthatprovideopportunitiesforoptimizations,
butalsohavecomplexaspectsthatchallengethesystemdesignandimplementation,suchasveryfastnetworktopologychangesduetohighvehiclespeed.Thispresentationwillprovideanoverviewofvehicular
communicationnetworks,discussresearchchallengesandopenissue,andprovidesomesolutionstoresourceallocation,networkcontrol,andserviceprovisioninginVANETs.
BioWeihua Zhuang received theB.Sc. andM.Sc. degrees fromDalianMaritimeUniversity, China, and thePh.D.degreefromtheUniversityofNewBrunswick,Canada,allinelectricalengineering.InOctober1993,shejoined
the Department of Electrical and Computer Engineering, University of Waterloo, Canada, as an AssistantProfessor. Shewas promoted to the rank of Associate Professorwith tenure in July 1997, and then to FullProfessor in July 2002. Since May 2010, she has been a Tier I (Senior) Canada Research Chair in wireless
communicationnetworks.HercurrentresearchfocusesonresourceallocationandQoSprovisioninginwirelessnetworks. She is a co‐author of the textbook Wireless Communications and Networking, which has beenpublished by Prentice Hall since 2003, and has been translated to Chinese and published by the Publishing
HouseofElectronicsIndustryinChinasince2004.Dr.Zhuangisaco‐recipientoftheBestPaperAwardsfromIEEEVTC‐Fall2010,IEEEWCNC2007and2010,IEEE
ICC2007,andtheInternationalConferenceonHeterogeneousNetworkingforQuality,Reliability,SecurityandRobustness (QShine) 2007 and 2008. She received the Outstanding Performance Award in 2005, 2006, and2008fromtheUniversityofWaterlooforoutstandingachievementsinteaching,research,andservice,andthe
Premier'sResearchExcellenceAward in 2001 from theOntarioGovernment fordemonstratedexcellenceofscientificandacademiccontributions.Dr. Zhuang is the Editor‐in‐Chief of IEEE Transactions on Vehicular Technology, and an Editor of EURASIP
JournalonWirelessCommunicationsandNetworking,InternationalJournalofSensorNetworks,andtheETRIJournal.Shewasaneditorof IEEETransactionsonWirelessCommunications(2005‐2009).She istheTPCCo‐ChairforWirelessNetworksSymposiumofIEEEGlobecom2008,CrossLayerDesignsandProtocolsSymposium
of Int.Wireless Communications andMobile Computing Conference (IWCMC) 2007 and 2006, and theACMWorkshoponWirelessMultimediaNetworkingandPerformanceModeling(WMuNeP)2005.SheisaFellowofIEEEandanIEEECommunicationsSocietyDistinguishedLecturer.Dr.ZhuangisalicensedProfessionalEngineer
in the Province of Ontario, Canada. She is the Chair of the Vehicular Technology Chapter, IEEE Kitchener‐Waterloo Section.
![Page 10: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/10.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
9
KeynoteSpeakers(cont.)
Dr.PierreBoucherDIRECTOR,RESEARCHEricssonCanadaInc.Title:Towards50BillionDevices:ASustainableEvolutionofMobileNetworksAbstractMobilenetworksareevolvingrapidlyandwillbemovingfromconnectingpeopletoconnectingthings.This
posessomeresearchchallengesintermsofnetworkefficiencybutalsointermsoftheuseofthesenewkindsofnetworksonourdailylives.
BioPierreBoucher isDirector forResearchat Ericsson’sR&Dcenter inMontreal.He is responsible for research
activities on broadband systems and networks for the R&D center’s collaborative research and innovationprojects with universities and institutions. Areas covered by his group include next generation networks,service architectures and advanced radio applications. His interests are in the application of networked
multimediatechnologies like IMS insectorssuchashealthcareandentertainment.Pierre isalsochairmanofPrompt,aresearchpromotionorganization.HerepresentsEricssononvariousboardspromotingresearchandinnovation in the telecommunications sector and in the community. such as CATA, ADRIQ and
TechnoMontréal.Priortohis15yearsatEricsson,PierreworkedforRogersinNetworkResearchwithafocusonOSSsystems.
![Page 11: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/11.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
10
ExecutiveCommitteeGeneralChair
AbderrahimBenslimane(UniversityofAvignon,France)
GeneralCo‐Chair
AliMiri(RyersonUniversity,Canada)
TPCCo‐Chair
NaveenChilamkurti(LaTrobeUniversity,Australia)
ShiguoLian(FranceTelecomR&DBeijing,P.R.China)
JelenaMisic(RyersonUniversity,Canada)
TarikTaleb(NECEuropeLtd.,Germany)
FinanceChair
AliMiri(RyersonUniversity,Canada)
WorkshopCo‐Chair
LuisOrozcoBarbosa(UniversidaddeCastillaLaMancha,Spain)
JoanGarcia‐Haro(PolytechnicUniversityofCartagena,Spain)
PublicationChair
SaeedSamet(UniversityofOttawa,Canada)
LocalArrangementCo‐Chair
AlaganAnpalagan(RyersonUniversity,Canada)
AlirezaSadeghian(RyersonUniversity,Canada)
PublicityCo‐Chair
AbbasJamalipour(UniversityofSydney,Australia)
![Page 12: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/12.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
11
JaimeLloret(UniversidadPolitécnicadeValencia,Spain)
AbderrezakRachedi(UniversityParis‐EstMarne‐la‐Vallée,France)
JustinZhan(CarnegieMellonUniversity,Japan)
SteeringCommittee
Chair
SamuelPierre(EcolePolytechniquedeMontreal,Canada)
Members
AbderrahimBenslimane(UniversityofAvignon,France)
PierreBoucher(EricssonCanada,Canada)
MiesoDenko(UniversityofGuelph,Canada)
VanThanhDo(Telenor/NorwegianUniversityofScienceandTechnology,Norway)
IbrahimHabib(CityUniversityofNewYork,USA)
KhaledBenLetaief(HongKongUniversityofScience&Technology,HongKong)
HusseinMouftah(UniversityofOttawa,Canada)
GuyPujolle(UniversityofParis6,France)
![Page 13: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/13.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
12
Monday, October 11, 2010 8:30–9:30AM
Keynote:VehicularNetworking:ChallengesandOpportunities
Speaker:Dr.WeihuaZhuang
Room:StrategyRoom3
Chair:AliMiri(RyersonUniversity&UniversityofOttawa,Canada)
10:00AM‐12:00PM
WirelessandAd‐HocNetworks(I)
Room:StrategyRoom1
Chair:JoanGarcia‐Haro(PolytechnicUniversityofCartagena,Spain)
EffectiveTrafficControlforMilitaryTacticalWirelessMobileAd‐hocNetwork
Ji‐SangYou(AgencyforDefenseDevelopment,Korea)
TheMIL‐STD‐188‐220isthemilitarytacticalwirelessmobilead‐hoccommunicationstandardwhichmakesasmoothdataandvoicecommunicationpossible.ThisstandardisknownastheInteroperabilityStandardforDigitalMessageTransferDeviceSubsystems.However,thestandardhastheproblemtogeneratethemeaninglesstrafficduetothefailureoftopologyupdate,inthecaseoftransmittingtheonlypacketnotrequiringtheacknowledgmentstothedestinationnodeawayfromtheradiopropagationscope.Moreover,asourcerequirestheintranetend‐to‐endacknowledgmentfromalldestinationstoconfirmapacketdelivery,regardlessofthehopdistancetodestinationnodes.Thismethodhastheproblemtogenerateunnecessarytrafficinthecasetoconfirmthepacketdeliverywithin1‐hopdistance.Inordertoresolvetheseproblems,thispaperhasproposedthemethodsthatrestrainthemeaninglesstrafficgenerationandsimplifytheprocedurethatconfirmsapacketdeliverywithin1‐hopdistance.
PerformanceofTransparentConductivePolymerAntennasinaMIMOAd‐hocNetwork
NicholasJ.Kirsch(DrexelUniversity,USA);NicholasVacirca(DrexelUniversity,USA);TimothyKurzweg(DrexelUniversity,USA);AdamFontecchio(DrexelUniversity,USA);KapilDandekar(DrexelUniversity,USA)
Multipleantennacommunicationsystemsareasolutiontomeetthedemandforpervasivecomputingandubiquitouswirelesscommunications.Asmultipleantennacommunicationsystemsbecomemorebroadlydeployed,integratingunobtrusiveantennasintovariousformfactorsisbecomingincreasinglyimportant.Antennasthatareflexibleandtransparentcaneasethisdesignconstraint.Inthispaper,wepresentadipoleconductivepolymerantennaarraythatisflexibleandtransparent.Thefocusofthispaperistoshowhowwellthisantennaworksinacommunicationsnetworkbyevaluatingchannelcapacityandpacketerrorrate.
BandwidthBalancinginMobileAdHocNetworks
CongzhouZhou(ColumbiaUniversity,USA);NickMaxemchuk(ColumbiaUniversity,USA)
![Page 14: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/14.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
13
Inthispaper,weextendsbandwidthbalancingtechniqueinwirednetworkstooperateinmobileadhocnetworks(MANETs).InbandwidthbalancinginDistributed‐Queue‐Dual‐Bus(DQDB),differentnodesoccupythesamechannel,andinformationaboutthebandwidthistransferredbetweennodesintheunusedbandwidth.Similarly,inwirelessnetworks,thecapacityonachannelissharedbyseveralsourcesatdifferentnodesandthebandwidthinformationcanbemonitoredonthesharedmedium.Usingthebandwidthbalancingtechnique,weintroduceaflowcontrolschemeforMANETsthatlimitseachflowateachnodeinatransmissionregiontotakeonlyafractionoftheremainingcapacity.ExtensivesimulationsdemonstratethatourflowcontrolschemeiseffectiveandcanprovideQualityofService(QoS)guaranteesforflowsinMANETs.
AnimprovedMap‐basedLocationServiceforVehicularAdHocNetworks
NadiaBrahmi(Irseem‐Esigelec,France);MounirBoussedjra(IRSEEM‐ESIGELECTechnopoleduTechnopôleduMadrillet,France);JosephMouzna(Esigelec‐Irseem,France);KiranCornelio(I&CT,MIT,Manipal,India);ManoharaPai(ManipalInstituteofTechnology,ManipalUniversity,India)
Routingremainsoneofthekeychallengesinvehicularnetworksduetotheirspecialpropertiessuchasthehighmobilityandtheintermittentconnectivity.AlmostalltheefficientroutingsolutionsproposedforVANETsarebasedongeographicinformationprovidedbythenavigationsystemswidelydeployedinthenewgenerationofvehicles.Typically,intheseposition‐basedprotocols,asourcenodehastodiscoverthelocationofdestinationnodebeforesendingthedata.Inthispaper,weproposeadistributedhierarchicallocationservicecalledDensityawareMap‐BasedLocationService(DMBLS)forVehicularAd‐hocNetworks.DMBLSmakesuseofthestreetdigitalmapsandthetrafficdensityinformationtodefineathreelevel‐hierarchyoflocationsservers.Thisinfrastructure‐lessschemehasproventoberobusttonodemobilityandwellsuitedtodynamicnetworks.SimulationsresultsobtainedwithdifferentscenariosdemonstratethatDMBLSachievespromisingperformancesintermsoflocationquerysuccessratioaswellasthequeryandupdatedelayswithagoodaccuracy.
CapabilityReconciliationforVirtualDeviceCompositioninMobileAdHocNetworks
EricKarmouch(UniversityofOttawa,Canada);AmiyaNayak(SITE,UniversityofOttawa,Canada)
Theproliferationofnetworkedappliancesordedicatedfunctionconsumerdeviceswithembeddedprocessorsandnetworkconnectioncapabilitiesisdrivingthevirtualdeviceconcept,wherebysuchappliancescanbecontrolled,monitored,managed,andextendedbeyondwhattheywereinitiallydesignedtodo.Thedynamicandadhocnatureofthediscoveryandcompositionofsuchdevicesandtheservicestheyprovideinevitablyleadstocapabilitydifferences,wherebytheinputofaserviceBisnotcompatiblewiththeoutputofaserviceA;AandBneedingtobecomposed.Moreover,currentschemesforservicecompositioninMANETsdonotconsidercapabilitydifferences.WepresentadistributedconstraintsatisfactionproblemforcapabilityreconciliationinMANETs,andthroughsimulationshowitseffectivenessandefficiency.
ASemanticDatabaseFrameworkforContextManagementinHeterogeneousWirelessNetworks
MehdiLoukil(TELECOMSudParis,France);TakouaGhariani(InstitutTelecom/TelecomSudParis,France);BadiiJouaber(InstitutTELECOM‐TelecomSudParis,France);DjamalZeghlache(InstitutTELECOM,TELECOMSudParis,France)
Recentdevelopmentsincomputerscienceandnetworkingraisetheneedtodevelopnewfamiliesofapplicationsthataresensitivetouserandambientcontexts.Theobjectiveistoofferpersonalizedservicesthatcanbeadaptedtousers'needswithinheterogeneous,complexanddynamicenvironments.Thisrequiresenhancedandgenericsolutionsforcontextrepresentationandretrievalaswellasfortheinteractionsbetweenheterogeneoussystemcomponents.Inthispaper,weproposeaconceptualmodelandasoftwareframeworkusingsemanticontologiestobuildsemanticcontextdatabases.Thisapproachisthenappliedtotheheterogeneouswirelessnetworks'usecase.ContextualinformationisimplementedusingfirstorderlogicandOWLtopromoteexpressivenessandinteroperability.Thedifferentstepstobuildtheframeworkaredetailed.Measurementsandperformanceresultsarethenprovided.
![Page 15: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/15.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
14
10:00AM‐12:00PM
MobileNetworking
Room:StrategyRoom2
Chair:SrinivasSampalli(DalhousieUniversity,Canada)
ATabuSearchDSAAlgorithmforRewardMaximizationinCellularNetworks
HanyKamal(Telecom‐ParisTech,France);MarceauCoupechoux(TELECOMParisTech,France);PhilippeGodlewski(EcoleNationaleSuperieuredeTelecommunication,France)
Inthispaper,wepresentandanalyzeaTabuSearch(TS)algorithmforDSA(DynamicSpectrumAccess)incellularnetworks.Westudyamono‐operatorcasewheretheoperatorisprovidingpacketservicestotheend‐users.Theobjectiveofthecellularoperatoristomaximizeitsrewardwhiletakingintoaccountthetrade‐offbetweenthespectrumcostandtherevenuesobtainedfromend‐users.Theserevenuearemodeledhereasanincreasingfunctionoftheachievedthroughput.Resultsshowthatthealgorithmallowstheoperatortoincreaseitsrewardbytakingadvantageofthespatialheterogeneityofthetrafficinthenetwork,ratherthanassuminghomogeneoustrafficforradioresourceallocation.OurTS‐basedDSAalgorithmisefficientintermsoftherequiredmemoryspaceandconvergencespeed.Resultsshowthatthealgorithmisfastenoughtosuitadynamiccontext.
RobustnessinContext‐AwareMobileComputing
HannesWolf(UniversityofStuttgart,Germany);KurtRothermel(UniversityofStuttgart,Germany,Germany);KlausHerrmann(UniversityofStuttgart,Germany)
Highlevelcontextrecognitionandsituationdetectionareanenablingtechnologiesforunobtrusivemobilecomputingsystems.Significantprogresshasbeenmadeinprocessingandmanagingcontextinformation,leadingtosophisticatedframeworks,middlewares,andalgorithms.Despitegreatimprovements,contextawaresystemsstillrequireasignificantlyincreasedrecognitionaccuracyforhigh‐levelcontextinformationonuncertainsensordatatoenabletherobustexecutionofcontext‐awareapplications.RecentlyAdaptablePervasiveWorkflows(APF)shavebeenpresentedasinnovativeprogrammingparadigmformobilecontext‐awareapplications.WeproposeanovelFlowContextSystem(FlowCon)thatbuildsuponAPFs.FlowConusesstructuralinformationfromtheAPFtoincreaseaccuracyofuncertainhigh‐levelcontextinformationupto49%.Thiswaywemakeanimportantsteptoenablerobustexecutionofmobilecontext‐awareapplications.
MobileSystemsLocationPrivacy:"MobiPriv"ARobustKAnonymousSystem
LeonStenneth(UniversityofIllinoisatChicago,USA);PhilipYu(UniversityofIllinoisChicago,USA);OuriWolfson(UniversityofIllinois,USA)
Withtherapidadvancementofpositioningandtrackingcapabilities(mobilephones,on‐boardnavigationsystems)locationbasedservicesarerapidlyincreasing.Privacyinlocationbasedsystemsisaddressedinmanypapers.Ourworkisfocusedonthetrustedthirdpartyprivacyframeworkthatutilizestheconceptofk‐anonymitywithorwithoutl‐diversity.InpreviousanonymizationmodelsKmaybedefinedasapersonalizationparameterofthemobileuserorasuniformsystemparameterforallmobileusers.Clearly,Kotherusersmaynotbeavailableatthetimeofrequestinthesesystems.Theserequestsarediscardedbecausethequalityofservice(QoS)theyrequirecannotbesatisfied.Inthispaperweintroduceanovelsuiteofalgorithmscalled
![Page 16: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/16.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
15
MobiPrivthatguaranteesa100%successrateofprocessingamobilerequestusingk‐anonymitywithdiversityconsiderations.Weevaluatedoursuiteofalgorithmsexperimentallyagainstpreviouslyproposedanonymizationalgorithmsusingrealworldtrafficvolumedata,realworldroadnetworkandmobileusersgeneratedrealisticallybyamobileobjectgenerator.
IWanttoGoHome:EmpoweringtheLostMobileDevice
ChiZhang(PolytechnicInstituteofNYU,USA);RobertFisher(CarnegieMellonUniversity,USA);JoelWein(Polytechnic,USA)
Itisestimatedthatover8millioncellphonesarelostorstoleneachyear[7];oftenthelossofacellphonemeansthelossofpersonaldata,timeandenormousaggravation.Inthispaperwepresentmachine‐learningbasedalgorithmsbywhichacellphonecandiscernthatitmaybelost,andtakestepstoenhanceitschancesofbeingsuccessfullyrecovered.WeusedatacollectedfromtheRealityMiningproject[10]tocreateasuiteofrealistictestcasesthatmodellostcellphonebehavior.Onthesedatasetsourbestalgorithmscanidentifycasesofalostmobiledevice,basedonitsbehaviorovertheprevious3hours,withcloseto100%accuracy.Inaddition,thealgorithmgeneratesfalsepositiveidentificationswithprobabilitylessthan3%;forindividualswithrelativelypredictablelifestylestheFalsePositiveRateissubstantiallyless.WealsousetheRealityMiningdatatoconstructasetoftestcasesthatmodelthebehaviorofastolenphone,andshowthatsimilaralgorithmictechniquesgivereasonableresultsinthissettingaswell.
TheResource‐OrientedMobileWebServerforLong‐LivedServices
FahadAijaz(RWTHAachenUniversity,Germany)
TheWebServersaregloballyacceptedastheback‐boneoftheInternet.Theresearchersintheareaoftheenterprisecomputinghavestudied,analyzedandimplementedseveralarchitecturestooptimizetheperformanceofthelarge‐scaleWebServers.However,duetotheconvergenceoftheITandthemobilecommunicationdomains,themobilenodesnowarealsobeenviewedastheservicehostingplatforms.TheaimofthisarticleistopresentanoptimizedMobileWebServerarchitectureforprovisioningtheMobileWebServices(MobWS)aslengthyprocesses.Forthatreason,theasynchronousinteractionstrategyisderived,andlaterusedtocomprehensivelydiscusstheserverarchitecture,whichisbasedontheRepresentationalStateTransfer(REST)designprinciples.ThemanuscriptpresentsadetailedperformanceevaluationofthearchitectureandcomparestheresultswiththeserverbasedontheSimpleObjectAccessProtocol(SOAP)standard.TheresultsshowpromisingperformanceimprovementsduetothereducedpayloadrequirementsoftheRESTserver.
CompensationforHPANonlinearityandI/QImbalanceinMIMOBeamformingSystems
JianQi(UniversityofQuebec,INRS‐EMT,Canada);SoniaAissa(UniversityofQuebec,INRS‐EMT,Canada)
Inthispaper,weinvestigatetheeffectsofhigh‐poweramplifier(HPA)nonlinearityandin‐phaseandquadrature‐phase(I/Q)imbalanceontheperformanceofmultiple‐inputmultiple‐output(MIMO)transmitbeamforming(TB)systems.Specifically,weproposeacompensationmethodforHPAnonlinearityandI/QimbalancetogetherinMIMOTBsystems.TheperformanceoftheMIMOTBsystemunderstudyisevaluatedintermsoftheaveragesymbolerrorprobability(SEP)andsystemcapacity,consideringtransmissionoveruncorrelatedfrequency‐flatRayleighfadingchannels.Numericalresultsareprovidedandshowtheeffectsofseveralsystemparameters,suchastheHPAparameters,image‐leakageratio,numbersoftransmitandreceiveantennas,lengthofpilotsymbols,andmodulationorderofphase‐shiftkeying(PSK),onperformance.
![Page 17: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/17.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
16
1:20PM‐3:00PM
WirelessandAd‐HocNetworks(II)
Room:StrategyRoom1
Chair:RafaelCepeda(ToshibaResearchEuropeLtd,UnitedKingdom)
ANewAlgorithmforBackboneFormationinAdHocWirelessNetworksofNodeswithDifferentTransmissionRanges
HosseinKassaei(ConcordiaUniversity,Canada);LataNarayanan(ConcordiaUniversity,Canada)
Weconsidertheproblemofbackboneformationinadhocwirelessnetworkscomposedofheterogeneousnodes.Avirtualbackboneinanadhocwirelessnetworkprovidesahierarchicalinfrastructurethatcanbeusedtoaddressimportantchallengessuchasefficientrouting,multicasting/broadcasting,activity‐scheduling,andenergyefficiency.Wemodelawirelessnetworkinwhichnodeshavedifferenttransmissionrangesbyadiskgraph.AvirtualbackboneinsuchanetworkcanbemodeledbyaStronglyConnectedDominatingandAbsorbentSet(SCDAS)intheassociateddiskgraph.Forpracticalreasons,itisdesirabletominimizethesizeofthisbackbone.Inthispaper,weproposeanefficientdistributedalgorithmfortheconstructionofanSCDASinadhocnetworksmodeledbydiskgraphs.OuralgorithmreliesonlocalinformationintheconstructionoftheSCDAS.Italsoprovidestheflexibilitytoadjustthetradeoffbetweenthedegreeoflocalityofinformationexchangeandthesizeofthesetsitgenerates.ExtensivesimulationresultsshowthattheSCDASconstructedbyouralgorithmissignificantlysmallerthanthatgeneratedbythealgorithmspriortoourwork.
MinimalTCBforMANETNodes
VinayThotakura(MississippiStateUniversity,USA);MahalingamRamkumar(MississippiStateUniversity,USA)
SecuringanyMANETroutingprotocolrequiresmeasurestoensurethatroutinginformationadvertisedbyanode(toitsneighbors)isconsistentwithroutinginformationassimilatedbyanode(fromitsneighbors).Weinvestigateaminimaltrustedcomputingbase(TCB)forMANETnodestoachievethisrequirement.WeoutlinelowcomplexityTCBfunctionswhichcanbeexecutedinsidetrustworthyboundariesofresourcelimitedtrustworthyMANETmodules.TheTCBfunctionsareusedtomaintainatableofactiveneighbors,createroutingrecords(RR),authenticateRRstoTMMsinneighboringnodes,receiveauthenticatedRRs,andupdateRRssubjecttosimplerules.EvenwhilethedynamicRRdatabaseofeverynodeisstoredoutsidetheTMM,bystoringtherootofanindexorderedMerklehashtree(IOMT)(anovelconstructproposedinthispaper)theTMMscanensurethatnodescannotmodify,replayorevenhideRRsthatexistinthedynamicdatabase.
Client‐basedIntrusionPreventionSystemfor802.11WirelessLANs
YaqingZhang(DalhousieUniversity,Canada);SrinivasSampalli(DalhousieUniversity,Canada)
DenialofService(DoS)attackson802.11wirelessLANscanbecausedbymanagementframessentbyrogueaccesspoints.Unfortunately,suchattackscanbesuccessfulevenifthewirelessnetworkisprotectedbyahigh‐levelsecurityprotocolsuchasWiFiProtectedAccessVersion2(WPA2).Wepresentanovelclient‐basedschemeforthepreventionofsuchintrusions.ByusingaMediumAccessControl(MAC)filteringmechanism,the"smart"clientisabletodifferentiatebetweenlegitimateandforgedmanagementframes.Theproposedmechanismisnoncryptographic,haslowoverheadsandcanbedeployedinexistingIEEE802.11WLANs.We
![Page 18: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/18.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
17
havebuiltandtestedaprototypeofourscheme.WedemonstratethatourmechanismcanprotectwirelessclientsagainstmanagementframeDoSattackslaunchedattheMAClayer.
InterferenceAwareSchedulingforUltraWidebandNetworks
HolgerRosier(RWTHAachenUniversity,Germany);JensFrerichs(CommunicationNetworks(ComNets)ResearchGroup,RWTHAachenUniversity,Germany);SebastianMax(RWTHAachenUniversity,Germany)
WirelessPersonalAreaNetworks(WPANs)areusedforawidevarietyofapplications.FormerWPANs,likeBluetooth,offerdataratesonlyforlowratecommunication.Nowadays,consumerelectronicdeviceshavehighdemandsoncommunicationsystems,e.g.forhighdefinitionvideotransmission.UsersexpectfutureWPANstoactlikewiredsystemsbymeansofreliability,thatis,packetlossanddistortion.Multimediasystemsareubiquitous;hence,itcanbeexpected,thatfutureWPANshavetooperateindensenetworktopologies.ForthatreasonnewtechnologieshavetobeevaluatedintermsofinterferencemitigationandtheirabilitytocooperatewithSimultaneouslyOperatingPiconets(SOPs).ThispaperfocusesonUltraWideband(UWB)communicationaccordingtoECMA‐368,calledWiMedia.WiMedia'sreservation‐basedmediumaccessforhighthroughputandstrictQoSrequirementsisevaluatedtakinginter‐piconetinterferenceintoaccount.Strategiesfordistributedinterferenceawareschedulingareproposedandexaminedbysimulationtoshowsystemcapacityforgivenscenarios.
SoftZFMIMOdetectionforturbocodes
PingpingShang(ChonbukNationalUniversity,Korea);SooyoungKim(ChonbukNationalUniversity,Korea);KwonhueChoi(YeungnamUniversity,KOREA,Korea)
Inthispaper,wepresentasoftzeroforcing(ZF)schemeforturbo‐codedmulti‐inputmulti‐output(MIMO)schemes.Thecomplexityofmaximumlikelihood(ML)softdetectionforturbocodedMIMOschemesincreasesexponentiallybythenumberofantennasandmodulationorders,andthusitisaNPhardproblem.Inthispaper,wedividethesoftdetectionprocessasthreesequentialstepsandthishighlyreducesthecomputationalcomplexity.ThethreesequentialstepsincludeZFdetectionofthetransmittedmodulationsymbol,softdemapping,andapplicationofproperchannelgain.WedemonstratethesimulationresultsonfastandslowfadingchannelsandshowthattheproposedsoftZFschemecanachievejustadBpowerlosswithdramaticallyreduceddetectioncomplexitycomparedtoMLdetection.
![Page 19: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/19.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
18
1:20PM‐3:00PM
SensorNetworks(I)
Room:StrategyRoom2
Chair:AshayDhamdhere(UniversityofNewSouthWales,Australia)
MASY:MAnagementofSecretkeYsforFederatedMobileWirelessSensorNetworks
JefMaerien(K.U.Leuven,Belgium);SamMichiels(KatholiekeUniversiteitLeuven,Belgium);ChristopheHuygens(KatholiekeUniversiteitLeuven,Belgium);WouterIJoosen(UniversityofLeuven,Belgium)
WirelessSensorNetworksarebecomingfederatedandmobileenvironments.Thesenewcapabilitiesposealotofnewpossibilitiesandchallenges.Oneofthesechallengesistocreateasecureenvironmenttoallowmultipletrustedcompaniestoshareandmergetheirsensornetworkinfrastructure.Themostbasicneedforasecureenvironmentisthedeploymentofkeymaterial.However,mostcurrentdayresearchassumespre‐sharedsecretsbetweenthesensornodesofmost,ifnotall,companiesinafederation.Thesesolutionsareoftennotscalablenormobileenoughtomeetrealisticbusinessrequirements.Additionally,mostkeydeploymentprotocolstotallyomitanyconnectivitywithback‐endinfrastructure.ThispaperproposesanoveldeploymentprotocolforMAnagementofSecretKeys(MASY).MASYallowssecuredeploymentofakeytoasensornodewhenitentersapreviouslyunknownnetwork.Byoff‐loadingthetrustcreationprocesstotheresource‐richback‐endinfrastructure,theburdenofthesensornodesremainsverylimited.
ALightweightDynamicOptimizationMethodologyforWirelessSensorNetworks
ArslanMunir(UniversityofFlorida,Gainesville,Florida,USA);AnnGordon‐Ross(UniversityofFlorida,USA);SusanLysecky(UniversityofArizona,USA);RomanLysecky(UniversityofArizona,USA)
TechnologicaladvancementsinembeddedsystemsduetoMoore'slawhaveleadtotheproliferationofwirelesssensornetworks(WSNs)indifferentapplicationdomains(e.g.defense,healthcare,surveillancesystems)withdifferentapplicationrequirements(e.g.lifetime,reliability).Manycommercial‐off‐the‐shelf(COTS)sensornodescanbespecializedtomeettheserequirementsusingtunableparameters(e.g.voltage,frequency)tospecializetheoperatingstate.Sinceasensornode'sperformancedependsgreatlyonenvironmentalstimuli,dynamicoptimizationsenablesensornodestoautomaticallydeterminetheiroperatingstatein‐situ.However,dynamicoptimizationmethodologydevelopmentgivenalargedesignspaceandresourceconstraints(memoryandcomputational)isaverychallengingtask.Inthispaper,weproposealightweightdynamicoptimizationmethodologythatintelligentlyselectsinitialtunableparametervaluestoproduceahigh‐qualityinitialoperatingstateinone‐shotfortime‐criticalorhighlyconstrainedapplications.Furtheroperatingstateimprovementsaremadeusinganefficientgreedyexplorationalgorithm,achievingoptimalornear‐optimaloperatingstateswhileexploringonly0.04%ofthedesignspaceonaverage.
UsingLQItoImproveClusterHeadLocationsinDenseZigBeebasedWirelessSensorNetworks
CherifDiallo(InstitutTELECOM;TelecomSudParis,France);MichelMarot(InstitutTELECOM;TelecomSudParis,France);MoniqueBecker(InstitutTELECOM;TelecomSudParis,France)
![Page 20: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/20.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
19
InWSN,itisnotoftendesirabletousetheGPStechnology.Indeed,theuseofGPSisexpensiveandmayreducetheoverallnetworkperformance.Moreover,indoorreceptionoftheGPSsignalisnotpossible.TheLinkQualityIndicator(LQI)isdefinedinthe802.15.4standard,butitscontextofuseisnotspecifiedinthisstandard.SomeworksontheLQI,fewofwhicharefieldexperiments,haveshownthattheLQIdecreasesasthedistanceincreases.However,thechallengeofclusteringmechanismsistoformthesmallestnumberofclustersbymaximizingdistancesseparatingclusterheadstoprovideanefficientcoverofthenetworkandalsominimizestheclusteroverlaps.Thisreducestheamountofchannelcontentionbetweenclusters,andalsoimprovestheefficiencyofalgorithmsthatrunattheleveloftheclusterheads.ThereforeweproposeananalyticalmodelbasedontheuseoftheLQIinordertoderiveanoptimallyone‐dominatingsetinwhichthesmallerdistanceseparatingtwoclusterheadsisimproved.
RelayNodePlacementforWirelessSensorNetworksDeployedinTunnels
RuoshuiLiu(UniversityofCambridge,UnitedKingdom)
NodeplacementplaysasignificantroleintheeffectiveandsuccessfuldeploymentofWirelessSensorNetworks(WSNs),i.e.,meetingdesigngoalssuchascosteffectiveness,coverage,connectivity,lifetimeanddatalatency.Inthispaper,weproposeanewstrategytoassistintheplacementofRelayNodes(RNs)foraWSNmonitoringundergroundtunnelinfrastructure.Byapplyingforthefirsttimeanaccurateempiricalmeanpathlosspropagationmodelalongwithawellfittedfadingdistributionmodelspecificallydefinedforthetunnelenvironment,weaddresstheRNplacementproblemwithguaranteedlevelsofradiolinkperformance.ThesimulationresultsshowthatthechoiceofappropriatepathlossmodelandfadingdistributionfortypicalenvironmentsisvitalinthedeterminationofthenumberandthepositionsofRNs.Furthermore,weadaptatwo‐tierclusteringmulti‐hopframeworkinwhichthefirsttieroftheRNplacementismodeledastheminimumsetcoverproblem,andthesecondtierplacementissolvedusingthesearch‐and‐findalgorithm.Theimplementationoftheproposedschemeisevaluatedbysimulation,anditlaysthefoundationsforfurtherworkinWSNplanningforundergroundtunnelapplications.
Priority‐BasedNodeSelectionandSchedulingforWirelessMultimediaSensorNetworks
MohammadAlaei(UniversitatPolitècnicadeCatalunya(UPC),Spain);JoseM.Barcelo‐Ordinas(UniversitatPolitècnicadeCatalunya(UPC),Spain)
Acriticalaspectofapplicationswithwirelesssensornetworksisnetworklifetime.Sensingandcommunicationsconsumeenergyparticularlyinwirelessmultimediasensornetworks(WMSN)duetohugeamountofdatageneratedbythemultimediasensors.Therefore,judiciouspowermanagementandsensorschedulingcaneffectivelyextendnetworklifetime.Inthispaperweconsidertheproblemofschedulingmultimediasensoractivitiestomaximizenetworklifetime.Theenvironmentisdividedindomainsmonitoredbyclustersofmultimediasensornodes.Networklifetimeincrementisachievedbycooperationbetweenmultimediasensorsintwopriority‐basedways:Intra‐clustercooperationandInter‐clustercooperation.Wewillseethatthelifetimeofclusternodesisconsiderablyincreasedundertheproposednodeselectionandschedulingprocedures.Asforbigclusters,thelifetimeevenisprolongedto5.5timeswithrespecttotheordinaryun‐cooperativenodeawakening.
![Page 21: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/21.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
20
3:30PM‐5:10PM
VehicularCommunications
Room:StrategyRoom1
Chair:JuanJoseAlcarazEspin(TechnicalUniversityofCartagena,Spain)
Aprivacy‐awarelocationserviceforVANETsusingChaum'smixes
FlorianScheuer(UniversityofRegensburg,Germany);MatthiasBrecht(UniversityofRegensburg,Germany);HannesFederrath(UniversityofRegensburg,Germany)
ProtectingtheprivacyofVANETusersisanimportantissue.WepresentinthispaperanarchitecturethataimsatthisgoalbyintegratingChaum'smixnetworkintoadistributedbutinfrastructure‐basedlocationserviceforposition‐basedrouting.Inadditionweenabletheusertodecidewhenhewantstorevealhispositiontoanyoneelse.ThusneitherentityoftheVANETisinfullknowledgeaboutthelocationandtheidentityofanyuseratthesametime.TheproposedsystemcanbeintegratedinmostpublishedVANETsecurityframeworksandourevaluationshowsthatanimplementationisfeasible.
HowtoDisseminateVehicularDataEfficientlyinbothHighwayandUrbanEnvironments?
MohamedCherif(FranceTelecom,France);Sidi‐MohammedSenouci(UniversityofBourgogne‐ISATNevers,France);BertrandDucourthial(UniversitédeTechnologiedeCompiègne,France)
Vehicularnetworksareaclassofmobilenetworksinwhichvehiclesareequippedwithradiointerfacesandarethereforeabletocommunicatewithaninfrastructure(ifexisting)orothervehiclesinanopportunisticway.Informationdisseminationenjoyswideapplicabilityinthesetypesofnetworks,rangingfromtrafficinformationandwarnings,toparkingavailability,fuelprices,roadconditions,andadvertisements.Hence,weproposeanefficientdisseminationprotocol:ROD(RoadOrientedDissemination)thatconsistsintwomodules:(i)OptimizedDistanceDeferTransfermodule,and(ii)StoreandForwardmodule.Thisprotocolpermitstoincreasethedeliveryratioandoptimizethebandwidthusebylimitingthenumberofvehicleshavingtorelayeachpacket.Theprotocolhasbeenimplementedandtestedontheroads.Inthispaperwereportitsperformancestudies,performedbymeansofsimulations,andwecomparethemtootherdisseminationprotocolsresults.PerformancestudyshowsinterestingresultsofRODcomparedtoexistingsolutions.
Mapcast:AMap‐ConstrainedBroadcastSolutionforVANETs
HectorAgustinCozzetti(IstitutoSuperioreMarioBoella,Italy);RiccardoM.Scopigno(IstitutoSuperioreMarioBoella,Italy);LucaCasone(STMicroelectronics,Italy);GiuseppeBarba(STMicroelectronics,Italy)
SolutionsforVehicularAd‐HocNetwork(VANET)arechallengingduetotheintrinsicnatureofthenetworkwhichinvolves,bydefinition,nodemobility,scarceornullfixednodesand,atthecurrentstateofart,lackofsolutionsforthereal‐timetrackingofpositions.MoreoverVANETsaremeanttoprovideprimarilyasolutionfortheimprovementofroadsafety,bytheproperforwardingofmessages:thismakestheoverallservicescenarioevenmorecriticalduetothedelay‐constraintsandthescalabilityissues.Whilesomesolutionshavealreadybeenproposedinliteraturetooptimizemessagemulti‐hopforwardingbasedonmutualpositionsofnodesandexploitingCSMA/CAMACmechanisms,inthispaperanovelsolutionispresented:itextendstheintuitive
![Page 22: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/22.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
21
conceptsofGeo‐Broadcast(thatis,broadcastforwardingbasedondistances)towardsamorepreciseideaofMap‐Drivenforwarding(orMapcast),wherethereal‐liferoadtopologyleadsforwardingpolicies.Mapcastsolvessomeissuesleftopenbypreviousartandsimulativelyshowsinterestingpotentials.
AdaptingStatisticalBroadcasttoLinearlyOrientedNetworksforVANETs
MichaelJSlavik(FloridaAtlanticUniversity,USA);ImadMahgoub(FloridaAtlanticUniversity,USA)
Broadcastisacriticalcomponentinad‐hocwirelessnetworks.Somevehicularnetwork(VANET)applicationsinparticularusebroadcastcommunicationsextensively.VANETsexhibitawidevarietyofnodedensityanddistributionpatterns,sobroadcastprotocolsdesignedtosupporttheseapplicationsmustbeadaptivetothoseconditions.Weshowthatthedistancemethodofstatisticalbroadcastcanbeusedtodesignaprotocolthatperformswellinone‐dimensionalortwo‐dimensionaluniformlydistributednetworks,butnotboth.Weproposeusingthequadratmethodofspatialanalysistocharacterizethedistributionpatternateachnodeandusetheresultingmetric,K,asafactorincomputingthestatisticalthresholdfunction.Theresult,theDistribution‐AdaptiveDistance(DAD)method,isshowntoexhibitahighlevelofreachabilityandefficientbandwidthutilizationacrossarangeofdistributionpatternsfrompurelylineartopurelytwo‐dimensionalandsparselydistributedtodenselydistributed.Moregenerally,thedesignmethodologypresentedinthisworkprovidesaprocedureenablingstatisticalbroadcastprotocoldesignerstobuildprotocolsthatareadaptivetobothnodedensityandnodedistribution.ThiscapabilityisakeyprerequisitefordesignofpracticalbroadcastprotocolstosupportVANETapplications.
PerformanceModelingofSafetyMessageDeliveryinVehicularAdHocNetworks
GhadaBadawy(RyersonUniversity,Canada);JelenaMisic(RyersonUniversity,Canada);TerenceD.Todd(McMasterUniversity,Canada);DongmeiZhao(McMasterUniversity,Canada)
Vehicularad‐hocnetworks(VANETs)willenableawidevarietyoffutureinter‐vehicleandvehicle‐to‐roadsideapplications.Theseserviceswillspanalargerangeoffunctionality,suchasthosesupportingvehicularsafety,tothoseusedforbest‐effortroadsideadvertising.Tosupportthiswiderange,theIEEE802.11pstandarddefinessevencommunicationchannels,consistingofasinglecontrolchannelforsafetyapplications,andsixservicechannelswhichcanbeusedforotherpurposes.Toallowasingleradiointerfacetosupportbothtypesofapplications,thestandarddefinesachannelcoordinationmechanismthatallowsthevehicularradiotoalternatelyaccessthecontrolandservicechannels.Whenthishappensitisveryimportantthatsafetymessagesaretransmittedwithhighreliabilityandlowlatency.Usinganalyticalmodels,thispaperprovidesaperformanceevaluationofvehicularsafetymessagedelivery.Ourresultsshowthatthemechanismdefinedinthestandardcansatisfytheneededlatencyrequirements,butcannotsatisfytherequiredreliabilityforsafetymessagedelivery.
![Page 23: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/23.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
22
3:30PM‐5:10PM
SensorNetworks(II)Room:StrategyRoom2
Chair:NidalNasser(UniversityofGuelph,Canada)
DynamicServicePolicy‐basedClusteredWirelessSensorNetworks
AkramulAzim(UniversityofWaterloo,Canada);MohammadMahfuzulIslam(BUET,Bangladesh)
Energyisoneofthemainobstaclestodeploywirelesssensornetworks(WSNs)becausetinysensornodescannotaccommodatesufficientenergyforachievingthedesiredlevelofusage.Theclusteringprotocolsofwirelesssensornetworkattainstheacmepopularityamongtheresearchersbecauseofmakingeffectiveusageofenergypreservedinsensornodesthroughimplementingclusteringconceptsbasedonlocalityandelectingaclusterheadforeachofthem.Wegetmotivationsfromtheenergysavingclusteringschemesandproposeanenhancementofclusteringschemesbysavingenergyandprolongingthelifetimeofsensornetworksignificantly.TheLowEnergyAdaptiveClusteringHierarchy(LEACH)achievesasupremepopularityforitssimplicityandapplicabilityinWSNs.AlargenumberofworksexistthatmodifiesLEACHtostrengthentheapplicabilityofthisschemeinpracticallife,butonlylimitedtotheclusterset‐upphase.Inthispaper,weobserveamajorproblemthatexistsinalloftheclusteringprotocolbasedonLEACH.LEACHanditsvariantencounterprematuredeathofclusterheadsbecauseofthisfixedroundtimeproblem.Ourproposeddynamicservicepolicybasedschemedecreasestheprematuredeathofclusterheadandthepacketslosssignificantly.
Energy‐AwareMulti‐HopTransmissionforSensorNetworksbasedonAdaptiveModulation
AbdellahChehri(UniversityofOttawa,Canada);HusseinMouftah(UniversityofOttawa,Canada)
WirelessSensornetworks(WSN)havebecomeafocusofresearchinthelastfewyears.WSNiscomposedofsmallbattery‐powereddevicesthathassensorsandwirelesscommunicationcapabilities.EnergymanagementisoneofthekeyissuesinWSNsbecauseitdirectlyimpactsthenetworklife‐time.Inordertoovercomethisrestriction,severalenergy‐efficientapproachesfordifferentlayershavebeeninvestigated.Inthispaper,energyoptimizationonphysicallayerisanalyzed.Thenode'spowerconsumptionisoptimizedthroughscalingthemodulationschemeusedinnodecommunications.Resultsshowthatanoptimalmodulationschemecanleadtotheminimumpowerconsumptionoverthewholewirelesssensornetwork.
Performancestudyofmultiplecover‐setstrategiesformission‐criticalvideosurveillancewithwirelessvideosensors
PhamCongDuc(Univ.ofPau,France);AbdallahMakhoul(UniversityofFranche‐Comté,France)
AWirelessVideoSensorNetwork(WVSN)consistsofasetofsensornodesequippedwithminiaturizedvideocameras.Unlikeomni‐directionalsensors,thesensingregionofavideonodeislimitedtothefieldofviewofitscamera.Inthispaper,westudytheproblemofcoveragebyvideosensorsinrandomlydeployedWVSN.Wefocusontheperformanceofvariousfastcoversetconstructionstrategiesforenablingefficientschedulingofnodesinmission‐criticalsurveillanceapplications.Simulationresultsshowtheperformanceofthevariousstrategiesintermsofpercentageofcoverage,networklifetime,intrusionstealthtimeandnumberofintrusiondetection.
CharacterizingLinkandPathReliabilityinLarge‐ScaleWirelessSensorNetworks
![Page 24: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/24.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
23
TurgayKorkmaz(UniversityofTexasatSanAntonio,USA);KamilSarac(UniversityofTexasatDallas,USA)
Reliabledatatransfer(RDT)isoneofthekeyissuesinwirelesssensornetworks(WSNs)andcanbeachievedbyusinglink‐levelre‐transmissionsandmulti‐pathrouting.AnotherkeyissueisthescalabilityofWSNs.Inthispaper,wetrytobetterunderstandandcharacterize/quantifytherelationshipsbetweenreliabilityandscalability,andidentifypossibledesignoptionsforthefutureRDTprotocolsinlarge‐scaleWSNs.Withthisinmind,weconductactualexperimentstocharacterizelinkreliabilitymeasuresinanactualsensornetworksetting.WethenusedthesemeasuresandanalyzehowcommonlyusedRDTmechanismsimpactoverallpathreliability.Ingeneral,ouranalysisshowsthatthecombinationoflink‐levelre‐transmissionsandmulti‐pathroutingisaviablesolutioninsmall‐scaleWSNs.However,duetotheincreasedlengthofpathsbetweensensornodesandsinksinlarge‐scaleWSNs,itbecomescostlytosustaintheoverallreliabilityatanacceptablelevel.Therefore,thefutureRDTprotocolsshouldfocusonminimizingthepathlengthsusinghierarchicalstructuresinlarge‐scaleWSNs.ItisalsonecessarytocoupleRDTprotocolswithroutingprotocolsthatcantakelinkreliabilitymeasuresintoaccount.
Mobility‐assistedDetectionoftheReplicationAttacksinMobileWirelessSensorNetworks
XiaomingDeng(UniversityofScienceandTechnologyofChina,P.R.China);YanXiong(UniversityofScienceandTechnologyofChina,P.R.China);DepinChen(UniversityofScienceandTechnologyofChina,P.R.China)
Wirelesssensornetworksareoftendeployedinharshenvironments,wheretheadversaryisabletocapturecertainsensors.Onceasensoriscompromised,theadversarycaneasilyreplicateitanddeployseveralreplicasbackintothenetworkforfurthermaliciousactivities.Althoughanumberofprotocolshavebeenproposedtotacklesuchnodereplicationattacks,fewoftheseschemesaresuitableformobilewirelesssensornetworks.Inthispaper,weproposetwonovelmobility‐assisteddistributedsolutionstonodereplicationdetectioninmobilewirelesssensornetworks.Inbothprotocols,afterreceivingthetime‐locationclaims,witnessescarrytheseclaimsaroundthenetworkinsteadoftransmittingthem.Thatmeansdataareforwardedonlywhenappropriatewitnessesencountereachother.Unary‐Time‐LocationStorage&Exchange(UTLSE)detectsthereplicasbyeachofthetwoencounteredwitnesseswhichstoresonlyonetime‐locationclaim.Multi‐Time‐LocationStorage&Diffusion(MTLSD),bystoringmoretime‐locationclaimsforeachtrackednodeandintroducingtime‐locationclaimsdiffusionamongwitnesses,providesexcellentresiliencyandsub‐optimaldetectionprobabilitywithmodestcommunicationoverhead.Duetothemobility‐assistedproperty,ourprotocolsdonotrelyonanyspecificroutingprotocol,whichmakesthemsuitableforvariousmobilesettings.Ourtheoreticalanalysisandsimulationresultsshowthatourprotocolsareefficientintermsofdetectionperformance,communicationoverheadandstorageoverhead.
ALoad‐DistributiveQoSRoutingProtocolforMulti‐ServiceWirelessMeshNetworks
MehdiKhabazian(INRS‐EMT,Canada);SoniaAissa(UniversityofQuebec,INRS‐EMT,Canada)
Thispaperproposesanovelroutingprotocolformulti‐servicewirelessmeshnetworks(WMNs).Ourprotocolprovisionsqualityofservice(QoS)usingbandwidthreservationandbandwidthsplittingmechanismsinthenetworklayerandenhanceddistributedcontentionaccessmechanismintheMAClayer.Aperformanceanalysisisconductedandtheresultsshowthattheproposedresourcemanagementmechanismenableshigh‐prioritytrafficstobetteraccessnetworkresourcesandachievelowerdelays.Low‐prioritytraffics,ontheotherhand,mayberoutedthroughhighernumberofhopsandmayexperiencemoredelaysormeetloweravailablebandwidth.Theproposedbandwidthoffermechanismresultsinanefficienttrafficloaddistributioninthenetworkandeliminatesbottle‐necksituations.TheresultsalsoshowtheinteractionbetweentheMACandroutingprotocolsintermsofjointQoSprovisioning.
![Page 25: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/25.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
24
Wednesday, October 13
8:30AM‐9:30AMKeynote:Towards50BillionDevices:ASustainableEvolutionofMobileNetworksPierreBoucher,EricssonCanadaRoom:StrategyRoom3Chair:AbderrahimBenslimane(UniversityofAvignon&LIA/CERI,France)
10:00AM‐11:40AMAirInterfacesRoom:StrategyRoom1Chair:ShihabJimaa(KhalifaUniversity,UAE)
EffectofChannelInterferenceonIndoorWirelessLocalAreaNetworkPositioningEddieChan(TheHongKongPolytechnicUniversity,HongKong);GeorgeBaciu(TheHongKongPolytechnicUniversity,HongKong)
Localizationsystemsforindoorareashaverecentlybeensuggestedthatmakeuseofexistingwirelesslocal
areanetwork(WLAN)infrastructureandlocationfingerprintingapproach.However,mostexistingresearchworkignoreschannelinterferencebetweenwirelessinfrastructuresandthiscouldaffectaccurateandprecise
positioning.Abetterunderstandingofthepropertiesofchannelinterferencecouldassistinimprovingthepositioningaccuracywhilesavingsignificantamountsofresourcesinthelocation‐awareinfrastructure.Thispaperinvestigatestowhatextentthepositioningaccuracyisaffectedbychannelinterferencebetweenaccess
points.Twosetsofexperimentscomparehowthepositioningaccuracyisaffectedinthreedifferentchannelassignmentschemes:ad‐hoc,sequential,andorthogonaldataisanalyzedtounderstandwhatfeaturesofchannelinterferenceaffectpositioningaccuracy.Theresultsshowthatchoosinganappropriatechannel
assignmentschemecouldmakelocalization10%moreaccurateandreducethenumberofaccesspointsthatarerequiredby15%.Theexperimentalanalysisalsoindicatesthatthechannelinterferenceusuallyobeysaright‐skeweddistributionandpositioningaccuracyisheavilydependentonchannelinterferencebetween
accesspoints(APs).
OntheImpactofMultipathPropagationandDiversityinPerformanceofIterativeBlockDecisionFeedbackEqualizersFábioCoelho(UniversidadeNovadeLisboa,Portugal);RuiDinis(ISR‐IST,TechnicalUniversityofLisbon,Portugal);NunoSouto(ISCTE/InstitutodeTelecomunicações,Portugal);PauloMontezuma(FCT‐UNL,Portugal)
SCmodulation(Single‐Carrier)withFDE(Frequency‐DomainEqualization)combinedwithiterative(turbo)FDEschemeshasexcellentperformanceinseverelytime‐dispersivechannels,makingitapromisingcandidatefor
futurebroadbandwirelesssystems.Infact,itwasobservedthattheperformancecanbeclosetotheMFB(MatchedFilterBound).InthispaperweconsideraclassofiterativeFDEschemesandwestudytheimpactofthenumberofmultipathcomponentsandthediversityorderonitsperformance.Itisshownthatforahigh
numberofseparablemultipathcomponentstheasymptoticperformanceapproachestheMFB,evenwithoutdiversity.WhenwehavediversitytheperformanceapproachestheMFBfaster,evenwhenwehavejustasmallnumberofseparablemultipathcomponents.
ParallelsoftZFdetectionforturbo‐codedQO‐STBCscheme
![Page 26: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/26.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
25
UnheePark(ElectronicsandTelecommunicationsResearchInstitute,Korea);SooyoungKim(ChonbukNationalUniversity,Korea);YoungminKim(ChonbkNationalUniversty,Korea);Dae‐SubOh(ElectronicsandTelecommunicationsResearchInstitute,Korea);Bon‐JunKu(ElectronicsandTelecommunicationsResearchInstitute,Korea)
Azeroforcing(ZF)decoderusingthepseudoinverseofachannelmatrixisgenerallyusedfordetectionofquasi‐orthogonalspacetimeblockcoding(QO‐STBC).ThisZFdetectionforQO‐STBCshouldsacrificenotonlythedecodingcomplexitybutalsothediversitygaincomparedtoasimplelineardetectionfororthogonalSTBC
schemes.ThisdisadvantageofQO‐STBCschemesaremainlyresultfromtheinterferencetermsinthedetectionmatrix.Inthispaper,weproposeaparalleldetectionschemeforQO‐STBC,whichmayenhancethecomputationalefficiencycomparedtotheconventionalZFscheme,especiallywhencombiningwithturbo
codes.Wepresentaveryefficientsoftdecisionmetricstobeusedattheiterativedecoderforturbocodes.Thesimulationresultsinthispaperrevealthattheproposeddetectionschemeproducesanalmostthesameperformancetothatofthethemaximumlikelihood(ML)detection,withgreatlyenhancedcomputational
efficiency.
AnID‐basedAuthenticationSchemeFortheIEEE802.11sMeshNetworkAymenBoudguiga(Telecom&ManagementSudParis,France);MarylineLaurent(InstitutTélécom,TélécomSudParis,France)
NowadaysauthenticationinWirelessMeshNetworks(WMN)referstothe802.1XauthenticationmethodsoraPresharedkeyauthentication,andmakesuseofcertificatesorsharedsecrets.Inwirelessenvironments,
managementofcertificatesisdisadvantageous.CertificatesrequiredeployingaPublicKeyInfrastructure(PKI)andCertificationAuthorities(CA)andtheyrequiredefiningacertificatemanagementpolicytocontrolthegeneration,transmissionandrevocationofcertificates.Managementofcertificatesisacumbersometaskand
doesnotmatchthelimited(powerandmemory)resourcesavailableatwirelessnodes.MoreoveritdoesnotmatchthenonpermanentconnectivitytoCA.Inthispaper,weproposeanID‐basedmethod,asanalternativetothePKI,toprovidenodeswithprivateandpublickeys,andwepresentanauthenticationschemethatuses
theID‐basedcryptographicconcepts.Asillustratedinthepaper,theauthenticationschemeisshownassuitabletotheWMNnetworks.
ComputationallyEfficientLatticeReductionforMIMO‐OFDMSystemsWeiLiu(OregonStateUniversity,USA);KwonhueChoi(YeungnamUniversity,KOREA,Korea);HuapingLiu(OregonStateUniversity,USA)
Weproposeacomputationallyefficientlatticereduction(LR)algorithmformultiple‐inputmultiple‐output
(MIMO)orthogonalfrequencydivisionmultiplexing(OFDM)systemsinfrequency‐selectivefadingchannels.Inourproposedalgorithm,weexploittheinherentfeatureofunimodulartransformationmatrixPthatremainsthesameforfrequencycomponentswhichhaverelativelyhighamplitudecorrelation.Weeliminatethe
redundantcalculationsbyreducingbrute‐forceLRiterationsamongadjacentsubcarriers.WesimulatetheerrorperformanceandcomplexityoftheproposedalgorithmundervariousMIMO‐OFDMsystemconfigurations.TheresultsdemonstratethattheproposedalgorithmcouldsignificantlyreducetheLR
complexitybyupto90%multiplicationsand99%divisionsofbrute‐forceLRwhilemaintainingthesystemperformance.
![Page 27: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/27.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
26
10:00AM‐11:40AM
SmartSystemsRoom:StrategyRoom2
ANovelReducedComplexityDetectionSchemeforDistributedSingle‐CarrierFrequencyDomainEqualizationHomaEghbali(SimonFraserUniversity,Canada);SamiMuhaidat(SimonFraserUniversity,Canada);NaofalAl‐Dhahir(UniversityofTexasatDallas,USA)
Inthispaper,weproposeanewdetectionschemeforsinglecarrierfrequency‐domainequalization(SC‐FDE)forrelay‐assistedtransmissionscenariooverfrequencyselectivechannels.Weshowthat,byincorporating
linearprocessingtechniques,ournewreceiversignificantlyoutperformstheminimummeansquareerror(MMSE)‐distributed(D)‐SC‐FDEreceiverintermsoftheerrorrateperformance.SimulationresultsandcomplexityanalysisdemonstratethatourproposedreceiveroutperformstheconventionalcooperativeMMSE‐
SC‐FDEreceiverbyperformingclosetomatchedfilterbound(MFB),whileincurringaminimaladditionalcomputationalcomplexity
MinimumBitErrorRateMultiuserDetectionofSDMA‐OFDMSystemUsingDifferentialEvolutionaryAlgorithmJehadAbabneh(JordanUniversityofScienceandTechnology,Jordan);TaimourAldalgamouni(JordanUniversityofScienceandTechnology,Jordan);AsmaaAlqudah(JordanUniversityofScienceandTechnology,Jordan)
Spacedivisionmultipleaccessaidedorthogonalfrequencydivisionmultiplexing(SDMA‐OFDM)isapromising
techniqueforhighdataratefuturewirelesscommunications.Inthispaper,aminimumbiterrorrate(MBER)differentialevolution(DE)algorithmbasedmultiuserdetector(MUD)forSDMA‐OFDMsystemisproposed.Theproposedalgorithmdirectlyminimizesthebiterrorrate(BER)costfunctionbyselectingtheoptimumweight
vectors.SimulationresultsshowthattheproposedDEbasedMUDoutperformstheminimummean‐squarederror(MMSE)basedMUDintermsoftheachievableBER.SimulationresultsalsoshowthattheperformanceoftheDEbasedMUDiscomparabletothatoftheparticleswarmoptimization(PSO)basedMUD.
CooperativeRelayinginInterferenceLimitedCognitiveRadioNetworksAsaduzzamanAsad(UniversityofUlsan,Korea);Hyung‐YunKong(UniversityofUlsan,Korea)
Inthispaper,weconsideracooperativerelayingbasedcognitiveradio(CR)networksinwhichtheprimaryreceiversareprotectedbypeakinterferencepowerconstraint.Insuchscenario,findingthetransmission
opportunitywithatargetdataratebymaintainingtheinterferencepowerconstraintistheprimegoalofthesystem.Weshowthatcooperativerelayingtechniquescansignificantlyreducetheoutageprobabilityequivalently,improvethetransmissionopportunityoftheCRnetworksinslow‐fadingchannels.Weconsider
bothdistributedspacetimecode(DSTC)basedsimultaneoustransmissionandsinglerelayselectionbasedtransmissionfromtherelays.TheexactexpressionsoftheoutageprobabilitiesofdifferentcooperativerelayingschemesarederivedforarbitrarynumberofrelaysandinterferencepowerconstraintinRayleighfading
![Page 28: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/28.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
27
environment.ResultsshowthatthesinglerelayselectionbasedschemesoutperformtheDSTCbasedscheme,
intermsofbothoutageprobabilityandimplementationcomplexity,inmulti‐relayCRnetwork.
COPAL:AnAdaptiveApproachtoContextProvisioningFeiLi(ViennaUniversityofTechnology,Austria);SchahramDustdar(ViennaUniversityofTechnology,Austria);SanjinSehic(ViennaUniversityofTechnology,Austria)
Context‐awareservicesneedtoacquirecontextinformationfromheterogeneouscontextsources.Thediversityofservicerequirementsoncontextchallengescontextprovisioningsystemaswellasitsprogramming
model.ThispaperproposesCOPAL(COntextProvisioningforALl)‐‐‐anadaptiveapproachtocontextprovisioning.COPALisatfirstacontextprovisioningsystem,whichprovidesloose‐couplingbetweencontextanditsprocessing.ThecomponentarchitectureofCOPALensuresnewcontextprocessingfunctionscanbe
addeddynamically.Asetofcontextprocessingpatternsareproposedtocustomizecontextattributesandcomposecontextprovisioningschemes.TheCOPALcomponentsandmodelsarereflectedinaDomainSpecificLanguage(DSL),whichcanfurtherreducethedevelopmenteffortsoncontextprovisioningbyautomaticcode
generation.AnmotivatingscenarioisusedthroughoutthepapertoillustrateCOPALapproach.
ChannelAwareDeferringStrategiestoImprovePacketSchedulinginOFDMASystemsIsraelGuío(UniversityofZaragoza,Spain);AngelaHernández‐Solana(UniversityofZaragoza,Spain);VanesaMontero(UniversityofZaragoza,Spain);JavierLafuente‐Martínez(UniversityofZaragoza,Spain);AntonioValdovinos(UniversityofZaragoza,Spain)
Inthispaper,weanalyzetheperformancegainachievedwhenachannel‐awaredeferring(CaD)strategyisappliedtodefertheallocationofuserswithtransitorybadchannelstateinamobileOFDMAsystem.Users
withgoodchannelconditionsreceivemoreresourcesandtheradioresourceutilizationimproves.ToreducetheimpactoftheCaDstrategyonthequalityofservice(QoS)provisioningforthedeferredusers,adelay‐
dependentcriterionisalsoapplied.WeshowthattheCaDsignificantlyreducesboththedroppingrateandthemeandelayforthemostrestrictivetrafficinamulti‐servicescenario,underacertainpowerandsubcarrierallocation(PSA)algorithmthatefficientlycontrolstheinter‐cellinterference(ICI).
TOA‐BasedLateralDistanceMeasurementSystemUsingUWBImpulseRadioKeiichiNakamura(TheUniversityofTokyo,Japan);ShinsukeKobayashi(TheUniversityofTokyo,Japan);HisanoriMatsumoto(YRPUbiquitousNetworkingLaboratory,Japan);NoboruKoshizuka(TheUniversityofTokyo,Japan);KenSakamura(TheUniversityofTokyo,Japan)
Lateraldistancebetweentwotrafficparticipantsisanimportantcontextforintelligenttransportationsystemsforrealizingacollisionpredictionsystem.Obtaininglateraldistancerequirescostlyhardware,prohibitingtrafficparticipantssuchaspedestriansand/orbicycliststoreceivebenefitsoflateraldistanceinformationfor
securingtheirsafety.Inthispaper,atime‐of‐arrival(TOA)basedbilaterationisproposedforestimatingrelativelateraldistanceusingultra‐widebandimpulseradio(UWB‐IR).RangingerrorofUWB‐IRsystemsaffectingtheestimationaccuracyoflateraldistanceiscopedwithapplyingalowpassfiltertoangulardata.
Experimentalresultsshowthattheestimationerrorisreducedfrom8mto3mwhentherelativedistancebetweenatargetvehicleandapedestrianislessthan15m,usingaportableUWB‐IRsystemwith30cmrangingaccuracy.
![Page 29: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/29.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
28
1:20PM‐3:00PM
MobilityandNomadicity(I)Room:StrategyRoom1
Chair:GeorgeBaciu(TheHongKongPolytechnicUniversity,HongKong)
Multi‐GatewayMulti‐pathRoutingProtocolfor802.11sWMNHuYun(UniversityofScienceandTechnologyofChina,P.R.China)
Toenhancethecapacityofwirelessmeshnetwork,multi‐gatewayarchitectureisinvited.Weuseengineeringmethodstodevelopanimplementablemultipathmulti‐gatewayroutingprotocol(MPMG)extendedfromHWMPtoprovidemultipathfunctionality.Wefirstlydeveloparoutingprotocolwithlowermanagement
overhead,thenwedevelopthreeoptimizingstrategytodealwiththebottleneckproblemsappearinginsimulations.AtlastweproposeanimplementableMPMGandevaluateitintypicalscenarios.PerformancecomparisonsofMPMGwithHWMP,AODVandOLSRaredonebyNS‐2.Thesimulationresultsshowthat
MPMGoutperformstheotherthreeroutingprotocols.SpeciallyMPMGimprovesthenetworkthroughputby12.8%andreducesroutingoverheadbyabout80%comparedtoHWMP.
AnSSPFormulationofRoutinginDTNNetworksYoussefIraqi(KhalifaUniversity,UAE)
InthispaperwepresentaStochasticShortestPath(SSP)formulationofroutinginDTNnetworkswhereallthe
nodesarepotentiallymobileandwhereonlyanaggregatemobilityinformationisavailable.Wepresentasolutiontotheoptimalcaseandpresenttwoheuristicstosolvetheproblem.Extensivesimulationsassesstheperformanceoftheproposedschemes.
PromotingCongestionControlinOpportunisticNetworksAndrewGrundy(UniversityofNottingham,UnitedKingdom);MilenaRadenkovic(UniversityofNottingham,UnitedKingdom)
Weareconcernedwithcongestionawareforwardingalgorithmswithinopportunisticnetworks.Weremovethereoccurringassumptionofunlimitedstorage,makingitevidentthatcongestionisaprominentproblem
thatneedstobeaddressed.Weproposeacontext‐driven,distributedcongestioncontrolalgorithmthatadaptivelychoosesthenexthopbasedoncontacthistory,contactstatistics,aswellasstoragestatistics.Weaimtodistributedtheloadawayfromthestoragehotspotsinordertospreadthetrafficaround.Weperform
anextensivesetoftracedrivensimulationsfor"several‐to‐many"communicationpatternsinopportunisticnetworks.Weshowthatcongestioncontrolisanessentialcomponenttobeincludedinthetransferofdatainopportunisticnetworks,whichisachievablebydisseminatingstatisticsconcerninganodesstateofavailability.
Ourresultsshowathatbyusingtheavailabilityheuristicitispossibletoachievehigherlevelsofsentanddeliveredpackets.
Pareto‐MetaheuristicMulti‐ObjectiveNetworkOptimizationforOFDMA‐basedSystems
![Page 30: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/30.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
29
AnasF.AlRawi(UniversityofNewcastleUponTyne,UnitedKingdom);BayanSharif(UniversityofNewcastleUponTyne,UnitedKingdom);CharalamposC.Tsimenidis(NewcastleUniversity,UnitedKingdom)
Inthispaper,anewplanningmethodisproposedforthenextgenerationwirelessnetworksthatarebasedonOrthogonalFrequencyDivisionMultipleAccess(OFDMA).Asaconsequenceofthewidevarietyservice
demandsintermsofdatarateandQualityofService(QoS),thetrafficpatternisconsideredtobeheterogeneous.Therefore,thecomplexityofobtainingBaseStations(BSs)positionsincreaseswiththerandomnessofthetrafficdistribution.Inadditiontothischallenge,thecapacityofeachBSislimiteddueto
powerandbandwidthconstraints,propagationlosses,Gaussianantennapattern,andtheCo‐ChannelInterference(CCI),whichinturnincreasethecomplexitymeasuresforanefficientnetworkdesign.AccordingtoNashEquilibrium,combinedefficientsystemsmustperformequallytoachievecertainperformance.This
impliesthatthetrafficofacellularsystemshouldbeequallydistributedoveralltheBSstoachievethehighestnetworkperformance.Hence,weformulatetheplanningproblemasanon‐linearmulti‐objectiveoptimization
problem.TheoptimumsolutionshouldnotdominatethethroughputofoneBSovertheothersandthisisreferredtoasParetooptimal.However,loadingallcellsequallymaynotbepossibleincertaintrafficdistributions.Therefore,theproposedmethodtendstoapproachtheoptimalsolutionbytacklingtheproblems
ofBSpositioningandresourceallocationsimultaneously.Weadoptahybridapproach,i.e.Pareto‐Metaheuristic(PMH)thatachievesabalancedthroughputoverallcellsaswellasminimizingthenumberoftheinstalledBSstargetingacertainserviceoutageprobability.Simulationresultsshowthat,inadditionto
maximizingtheindividualcellthroughput,thenetworkthroughputvariationdecreasesasthenumberofiterationincreases.
ExperimentalStudyofMobilityintheSoccerFieldwithApplicationtoReal‐TimeAthleteMonitoringVijaySivaraman(UniversityofNewSouthWales,Australia);SarthakGrover(IndianInstituteofTechnologyRoorkee,India);AlexanderKurusingal(UniversityofNewSouthWales,Australia);AshayDhamdhere(UniversityofNewSouthWales,Australia);AlisonBurdett(ToumazTechnologiesLtd.,UnitedKingdom)
Livemonitoringofathletesduringsportingeventscanhelpmaximiseperformancewhilepreventinginjury,and
enablenewapplicationssuchasreferee‐assistandenhancedtelevisionbroadcastservices.Amajorchallengeistheextractionofathletephysiologicaldatainreal‐time,sincetheradiorangeofbody‐wornsensordevicesislimited,necessitatingmulti‐hoproutingmechanisms.However,littleisknownaboutthehighlydynamic
operatingconditionsonasoccerfieldunderwhichcommunicationprotocolsneedtooperate.Inthisworkweconductfieldexperimentsinwhichweoutfitfirst‐divisionsoccerplayerswithsensordevicesandrecordtheirinter‐connectivityduringarealgame.Ourfirstcontributionprofilesthekeypropertiesofthedynamicwireless
topologiesarisinginthesoccerfield,andhighlightstheconsequencesforroutingmechanisms.Weshowthatthetopologyisingeneralsparse,withshortencountersandpower‐lawdistributedinter‐encounters.Importantly,theco‐ordinatedmovementofplayersinthefieldgivesrisetosignificantcorrelationsamongst
links,anaspectthatcanpotentiallybeexploitedbyrouting.Oursecondcontributiondevelopsamodelforgeneratingsynthetictopologiesthatmirrorconnectivityinarealsoccergame,andcanbeusedforsimulationstudiesofroutingmechanisms.Itsnoveltyliesinexplicitlymodellingtheunderlyingauto‐correlationandcross‐
correlationpropertiesofthelinks,fromwhichderivedmeasuressuchasinter‐encountertimesand
![Page 31: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/31.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
30
neighbourhooddistributionsfollow.Ourstudyisanimportantfirststeptowardsunderstandingandmodelling
dynamictopologiesassociatedwithsportsmonitoring,andpavesthewayforthedesignofreal‐timeroutingalgorithmsforsuchenvironments.
![Page 32: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/32.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
31
1:20PM‐3:00PM
NextGenerationNetworks(I)Room:StrategyRoom2
DimensioningoftheLTEAccessTransportNetworkforElasticInternetTrafficXiLi(UniversityofBremen,Germany);UmarToseef(UniversityofBremen,Germany);ThusharaLWeerawardane(UniversityofBremen,Germany);WojciechBigos(NokiaSiemensNetworks,Poland);DominikDulas(NokiaSiemensNetworks,Poland);CarmelitaGoerg(UniversityofBremen,Germany);AndreasTimm‐Giel(HamburgUniversityofTechnology,Germany);AndreasKlug(NokiaSiemensNetworks,Germany)
ThispaperproposesefficientanalyticalmodelstodimensiontherequiredtransportbandwidthsfortheLong
TermEvolution(LTE)accessnetworkfortheelasticInternettraffic(whichiscarriedbytheTCPprotocol).ThedimensioningmodelsarebasedontheuseofProcessorSharingqueuingtheorytoguaranteeadesiredend‐to‐endapplicationQoStarget.Forvalidatingtheanalyticaldimensioningmodels,adevelopedLTEsystem
simulationmodelisused.Extensivesimulationsareperformedwithvarioustrafficandnetworkscenarios.Theanalyticalresultsderivedfromtheproposeddimensioningmodelsarecomparedagainstthesimulationresults.Thepresentedresultsdemonstratethattheproposedanalyticalmodelscanappropriatelyestimatethe
applicationperformancesofdifferentQoSprioritiesandthusbeusedforthelinkdimensioningforvarioustrafficandnetworkscenarios.
SchedulingandResourceAllocationforMulticlassServicesinLTEUplinkSystemsOscarDelgado(ConcordiaUniversity,Canada);BrigitteJaumard(ConcordiaUniversity,Canada)
WeproposetwoschedulingandresourceallocationschemesthatdealwithQualityofService(QoS)requirementsinUplinkLongTermEvolution(LTE)systems.QoSforamulticlasssystemhasbeenseldomtakenintoaccountinpreviousresourceallocationalgorithmsforLTEuplink.Inoneofthenewalgorithms,we
investigatethepossibilityofassigningmorethanoneresourceblockanditsconsequencesonsatisfyingstringentQoSrequirementsinthecontextofheavytraffic,eitherintermsofend‐to‐enddelaysorofminimumrates.Systemcapacityandthenumberofeffectivelyservedrequestsareusedasperformancemetrics.
NumericalresultsshowthatitispossibletomanageamulticlassschemewhilesatisfyingtheQoSconstraintsofallrequests.Allowingtheassignmentofmorethanoneresourceblockperrequestdidnotappeartobeameaningfuladvantage.Indeed,itisonlyusefulwhenthereisanheavytraffic,andsomeofoftherequestshave
stringentQoSrequirements.Butthen,satisfyingthoserequestscanonlybedoneattheexpenseofreducingtheoverallsystemcapacityandoflimitingthenumberofusersthatcanbeserved.
SpectralEfficiencyPerformanceofMBSFN‐enabledLTENetworksChristosBouras(UniversityofPatrasandRACTI,Greece);AntoniosAlexiou(UniversityofPatras,Greece);VasileiosKokkinos(RACTIandUniversityofPatras,Greece);GeorgeTsichritzis(UniversityofPatrasandRACTI,Greece);AndreasPapazois(RACTIandUniversityofPatras,Greece)
LongTermEvolution(LTE)constitutesthelateststeptowardsthe4thgeneration(4G)ofradiotechnologies
designedtoincreasethecapacityandspeedofmobilecommunications.TosupportMultimedia
![Page 33: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/33.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
32
Broadcast/MulticastServices(MBMS),LTEoffersthepossibilitytotransmitMultimediaBroadcastmulticast
serviceoveraSingleFrequencyNetwork(MBSFN),whereatime‐synchronizedcommonwaveformistransmittedfrommultiplecellsforagivenduration.Thisenablesover‐the‐aircombining,thusimprovingtheSignaltoInterferenceplusNoiseRatio(SINR)andspectralefficiency(SE)significantlycomparedto
conventionalMBMSoperation.Inthispaper,weanalyticallycalculatetheSEperformanceachievedinaMBSFNareaforadynamicallychangingusertopologyanddifferentmodulationandcodingschemes(MCS).Finally,basedontheSEmeasurement,wedeterminetheMCSschemethateithermaximizesorachievesatargetSE
forthecorrespondinguserdistribution
EfficientResourceAllocationforDevice‐to‐DeviceCommunicationUnderlayingLTENetworkMohammadZulhasnine(CarletonUniversity,Canada);ChangchengHuang(CarletonUniversity,Canada);AnandSrinivasan(CarletonUniversity,Canada)
D2D(device‐to‐device)communicationasanunderlayingcellularnetworkempowersuser‐drivenrichmultimediaapplicationsandalsohasproventobenetworkefficientoffloadingeNodeBtraffic.However,D2D
transmittersmaycausesignificantamountofinterferencetotheprimarycellularnetworkwhenradioresourcesaresharedbetweenthem.Duringthedownlink(DL)phase,primarycellUE(userequipment)maysufferfrominterferencefromtheD2Dtransmitter.Ontheotherhand,theimmobileeNodeBisthevictimof
interferencebytheD2Dtransmitterduringtheuplink(UL)phasewhenradioresourcesareallocatedrandomly.SuchinterferencecanbeavoidedotherwisediminishifradioresourceallocatedintelligentlywiththecoordinationfromtheeNodeB.Inthispaper,weformulatetheproblemofradioresourceallocationtotheD2D
communicationsasamixedintegernonlinearprogramming(MINLP).SuchanoptimizationproblemisnotoriouslyhardtosolvewithinfastschedulingperiodoftheLongTermEvolution(LTE)network.Wethenproposeanalternativegreedyheuristicalgorithmthatcanlesseninterferencetotheprimarycellularnetwork
utilizingchannelgaininformation.Wealsoperformextensivesimulationtoprovetheefficacyoftheproposedalgorithm.
ARBR:AdaptiveReinforcement‐BasedRoutingforDTNAhmedElwhishi(UniversityofWaterloo,Canada)
Abstract‐‐‐ThispaperintroducesanovelroutingprotocolinDelayTolerantNetworks(DTNs),aimingtosolvetheonlinedistributedroutingproblem.Bymanipulatingacollaborativereinforcementlearningtechnique,agroupofnodescancooperatewitheachotherandmakeaforwardingdecisionforthestoredmessagesbased
onacostfunctionateachcontactwithanothernode.Theproposedprotocolischaracterizedbynotonlyconsideringthecontacttimestatisticsunderanovelcontactmodel,butalsolooksintothefeedbackonuserbehaviorandnetworkconditions,suchascongestionandbufferoccupancysampledduringeachprevious
contactwithanyothernode.Therefore,theproposedprotocolcanachievehighefficiencyviaanadaptiveandintelligentroutingmechanismaccordingtonetworkconditions.Extensivesimulationisconductedtoverifytheproposedprotocol,whereacomparisonismadewithanumberofexistingencounter‐basedroutingprotocols
intermofthenumberoftransmissionsofeachmessage,messagedeliverydelay,anddeliveryratio.
![Page 34: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/34.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
33
3:30PM‐5:30PMNextGenerationNetworks(II)Room:StrategyRoom1
Chair:AmirQayyum(M.A.JinnahUniversity,Islamabad&CenterofResearchinNetworksandTelecom,Pakistan)
AdaptiveMultiuserMIMOTransmissioninWirelessSystemswithCooperatingCellsJinheeLee(KoreaUniversity,Korea);Young‐ChaiKo(KoreaUniversity,Korea);Hong‐ChuanYang(UniversityofVictoria,Canada)
Inmulticellwirelesssystemswithinsufficientfrequencyreuse,usertransmissionwillsufferother‐cellinterference(OCI).CellcooperationisaneffectivewaytomitigateOCIandincreasethesystemsumrate.Anadaptiveschemeforservingoneuserineachcellwasproposedin[1].Inthispaper,wegeneralizethatscheme
byservingmorethanoneuserineachcellwithadaptivezeroforcingbeamforming(ZF)strategies.Basedonourderivedstatisticsofthesignal‐to‐noiseplusinterferenceratios,wechoosetheschemetomaximizethetotalergodicsum‐ratebasedonuserlocations.Throughthenumericalexamples,weshowthatthetotalsystemsum
ratecanbeimprovedbyselectingappropriatetransmittingstrategyadaptively.Asaresult,ourproposedsystemcanexplorespatialmultiplexinggainwithoutadditionalpowerandthusimprovestotalsystemsumratesignificantly.
Orientation‐basedWi‐FiPositioningontheGoogleNexusOneEddieChan(TheHongKongPolytechnicUniversity,HongKong);GeorgeBaciu(TheHongKongPolytechnicUniversity,HongKong)
Whilelocalizationsystemsforindoorareasusingtheexistingwirelesslocalareanetwork(WLAN)infrastructurehaverecentlybeenproposed,wirelessLANlocalizationapproachessufferfromanumberofsignificant
drawbacks.Tobeginwith,thereisinaccuratepositiontrackingduetotheorientationofthemobiledeviceandsignalfluctuation.Inthispaper,weapplyaorientationfilterandaNewtonTrustRegion(TR)algorithmtoeliminatethenoisylocationestimation.WeimplementthelocalizationalgorithmontheNexuswhichisaWi‐Fi
enableddevicewithadigitalcompass.Ourexperimentalanalysisshowsthatorientation‐basedTrustRegionmethodenhancesourpreviousworkwith10%feweraccesspointsand7%moreaccurateforlocationestimation.Theproposedorientation‐basedTrustRegionmethodleadstosubstantiallymoreaccurateand
robustlocalizationsystem.
HybridStreamingDeliveryoverDVB‐HBroadcastandWiMAXMobileNetworksHsin‐TaChiao(IndustrialTechnologyResearchInstitute(ITRI),Taiwan);Chi‐TeTseng(IndustrialTechnologyResearchInstitute(ITRI),Taiwan);Jhih‐WeiJiang(IndustrialTechnologyResearchInstitute(ITRI),Taiwan);Hsin‐AnHou(ITRI,Taiwan)
Hybridstreamingdeliveryoverconvergedmobileandbroadcastnetworkscanenableoperatorstotransmitmultimediacontentsinamoreefficientandflexibleway.Consequently,thefunctionsrelatedtohybrid
streamingdeliveryarerecentlystandardizedintheIP‐basedservicelayerstandardsforDVB‐H,i.e.DVB‐IPDCandOMABCASTstandards.Inbothstandards,seamlessserviceswitchingisoneofthekeybuildingblocksforachievinghybridstreamingdelivery.Inthispaper,wedescribetheexperiencesforimplementingthefunction
![Page 35: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/35.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
34
ofstreamingserviceswitchingbetweenDVB‐HbroadcastandWiMAXmobilenetworksaccordingtothe
abovementionedstandards.Inourimplementation,instantiatingtwosetsofaudioandvideocodecsinparallelduringserviceswitchingisavoidforreducingtherequiredhardwareresourcesinaterminal.Inaddition,theexperimentresultsofstreamingserviceswitchingareprovidedtoshowtheperformanceofour
implementationinanextremetestenvironmentwherethelevelofaDVB‐Hsignalcouldbevariedrapidlyforsimulatingtheobservedroomorbuildingpenetrationlossforamovingterminal.
RobustData‐PartitionedVideoStreamingoveraWiMAXChannelLaithAAl‐Jobouri(UniversityofEssex,UnitedKingdom);MartinFleury(UniversityofEssex,UnitedKingdom);MohammadGhanbari(UniversityofEssex,UnitedKingdom)
Thispaperdemonstratesarobustlayeredvideoschemebasedondata‐partitioningandintendedforIPTV
streamingoverwirelessbroadband.Equalerrorprotectionthroughratelesscodingisapplied,wherebyhigher‐priorityDPpacketsareprotectedbyappropriateselectionofquantizationparameterandpictureslicing,soastoregulatepacketsize.Bothpacketdropsfromcongestionandadversechannelconditionsareshowntobe
affectedbypacketsizeinthemobileWiMAXchannelinvestigated.Themainproposalisforadaptiveratelesscodinginwhichadditionalredundantdataareretransmittedtohealcorruptedpackets.However,thoughthesepacketsarealwaysrepairable,delayincreasesasthepercentageofcorruptedpacketsincreases,whichaffects
thedesignparameters.Intra‐refreshMBsareaddedtopreventtheobjectivevideoqualityfallingbelowanacceptablelevel.Pictureslicingfurtherreducesthepacketsizetoincreaserobustnessinthefaceofmeasurementnoiseduringchannelestimationandtheeffectsofslowandfastfading.
StrategyofSelf‐organizationinSensorsandActuatorsNetworksBilelRomdhani(UniversitédeLyonINRIA,INSALyonF‐69621,France,France);DominiqueBarthel(OrangeLabs,France);FabriceValois(INSALyon,France)
InWirelessSensorsandActuatorsNetworks(WSANs),actuatornodesarenodesricherinresources(processing
capacity,powertransmissionandenergystorage)andbettersuitedthansensornodestoprocessthedata,makedecisionsbasedonsensedvaluesandperformappropriateactions.Inaddition,inordertoprovidetimelyaction,coordinationbetweensensorsandactuatorsisnecessary.Thus,inadditiontotheclassicalenergy
constraintsofWirelessSensorNetworks(WSNs),WSANsalsoimposenewchallengessuchashowtosupportandbenefitfromthenodesheterogeneitywhilepreservingenergyintheself‐poweredsensornodes.Newcommunicationprotocols,specifictoWSANs,areneeded.Inthispaper,weproposeahybridself‐organizing
data‐collectionprotocolinordertoprovideenergyefficiency,lowend‐to‐enddelayandhighdeliveryratiowhiletakingadvantageoftheresourceavailableontheactuatorsnodesinthenetwork.Thisnewself‐organizationprotocolconstructsitsstructurefromtheactuatorsandotherresource‐plentifulnodes.The
natureofthestructureisdifferentinsideandoutsideoftransmissionrangeoftheseresourcefulnodes.
ABitCollisionDetectionBasedQueryTreeprotocolforAnti‐CollisioninRFIDSystemHaosongGou(PusanNationalUniversity,Korea);YounghwanYoo(PusanNationalUniversity,Korea)
Anti‐collisionalgorithmsintheRFIDsystemcanbedividedintotwocategories:ALOHAbasedandbinarytree
basedalgorithm.Eachofthemhasitsownadvantagesordisadvantages.TheQTprotocol,asaclassicbinarytreebasedalgorithm,wasproposedtoachievethereliablethroughputofidentificationbyusingprefixtoavoid
collisions.ThispaperproposesanimprovedQTprotocolcalledBitcollisiondetectionbasedQueryTree(BQT)byadoptingindividualbitcollisiondetection,whichcandetectthecollisionineachbit.Itcanreducethecollisionforthetagswhichhavethesameprefixandaccelerateidentificationprocess.Thesimulationresults
![Page 36: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/36.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
35
andanalysisshowthatourBQTprotocolcouldreducethecollisionsandachievemuchbetterperformanceon
tagidentification.
![Page 37: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/37.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
36
3:30PM‐5:30PMMobilityandNomadicity(II)Room:StrategyRoom2
Chair:AndreasPapazois(RACTIandUniversityofPatras,Greece)
AnytimeandAnywhereMonitoringFortheElderlyYunfengChen(UniversityofGuelph,Canada);NidalNasser(UniversityofGuelph,Canada)
Inthispaperweproposeasystemarchitecturefortelemonitoringsystem.Theproposedarchitectureisnot
limitedtoonlyindoorenvironment.Byemployingamobilephonethatimplementsapersonalserver,thesystemalsosupportsthemonitoringofoldpeoplewhileawayfromhome.Inadditiontothesystemarchitecture,wealsoproposethemiddlewarearchitectureforthepersonalserverandthecross‐layerprotocol
stackarchitectureforthesensornode.Themiddlewareandthecross‐layerstackimprovetheflexibilityandexpansibilityofthesystem.
AComparativeAssessmentofRoutingforMobileNetworksDevanBingRehunathan(UniversityofStAndrews,UnitedKingdom);SaleemNBhatti(UniversityofStAndrews,UnitedKingdom)
Wirelessmobiledevicesarebecomingincreasinglyprevalentinsociety.Asaresult,aggregationofnetworkconnectivitythroughtheuseofmobilenetworksisbecomingincreasinglyrelevanttoserviceprovidersaswell
asformobileusers.ThecurrentapproachbeingpursuedwithintheIETFMobileExtensionsforIPv6(MEXT)WG,isbasedontheNetworkMobility(NEMO)architecture.NEMOusesIP‐in‐IPtunnellingforprovidingmobilenetworkcapabilityonanexistingIPv6network.Thisapproachcanresultinnon‐optimalroutingbetween
sourceanddestinationnodes.OtherproposalssuchasOptiNetsextendNEMOandtrytoaddressissuessuchassub‐optimalrouting.Therearealternativeapproachesalsobeingproposed,suchastheIdentifierLocatorNetworkProtocol(ILNPv6),whichisbasedontheuseofnaming,toenableaflexibleandintegratedmobile
networkcapabilitybasedonIPv6.Wehaveconductedacomparativeanalysisofthecostofprovidingoptimalrouting,intermsofpacketandbandwidthoverhead,basedonanemulation,usingdatafromtheLondonCircleLinemetropolitanrailwayasascenario.Ouranalysisshowsthatthesedifferentapproachestomobilityoffer
significantlydifferentperformancetrade‐offsinroutingformobilenetworks,dependingontheconstraintsofthenetworkscenario.
ARUM:aCooperativeMiddlewareandanExperimentationPlatformforMobileSystemsMatthieuRoy(LAAS‐CNRS,UniversityofToulouse,France);Marc‐OlivierKillijian(Laboratoired'Analyseetd'ArchitecturedesSystèmes(LAAS‐CNRS),France);GaëtanSéverac(LAAS‐CNRS,UniversityofToulouse,France)
Inthispaper,wepresentamiddlewarearchitecturefordependablemobilesystemsandanexperimentationplatformforitsevaluation.Theproposedarchitectureincludesthreebuildingblockstailoredformobile
cooperativeapplications:aProximityMap,aTrustandCooperationOracle,andaCooperativeDataBackupservice.Toillustrateourplatform,wedevelopedaDistributedBlack‐boxapplication,whoseaimistorecordcriticaldatawhiletoleratingthefailureofanode,andimplementedahardwareevaluationplatformofmobile
![Page 38: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/38.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
37
systemsforexperimentingwiththeapplication.Weprovideheresomeinsightsonthedevelopmentofthe
platform,focusingonwirelesscommunication.
AnEco‐FriendlyRoutingProtocolforDelayTolerantNetworksTamerAAbdelKader(UniversityofWaterloo,Canada)
Insparsemobilenetworks,nodesareconnectedatdiscreteperiodsoftime.Thisdisconnectionmaylastforlongperiodsinurbanandruralareas.Inaddition,mobilenodesareenergyandbuffersensitive,suchasin
mobilesensornetworks.Thelimitedpowerandstorageresources,combinedwiththeintermittentconnectionhavecreatedachallengingenvironmentforinter‐nodenetworking.ThistypeofnetworksisoftenreferredtoasDelayTolerantnetworks(DTN).RoutingprotocolsdevelopedforDTNfocusedmainlyonmaximizingthe
deliveryratioandminimizingtheend‐to‐enddelay.Therefore,theytendtospreadmanycopiesofthesamepacketintothenetwork,assumingtheavailabilityofbufferandpower.Decreasingnumberoftransmissions
reducesenergyconsumptionwhichhelpsinmaintainingacleanenvironment.Inthispaper,weformulateamathematicalmodelforoptimalroutinginDTNtoachieveminimumnumberoftransmissions.Inaddition,westudyandanalyzetheDTNheuristicroutingprotocols.Afterthat,weproposeanEco‐friendlyroutingprotocol,
EFR‐DTN,thatefficientlyusesimpleinformationprovidedfromthenetworktoachieveminimumenergyconsumption,whilemaintaininghigherdeliveryratiothantheotherprotocols.Simulationresultsshowtheoutperformanceoftheproposedprotocolunderdifferentbuffercapacities,trafficloads,andpacketTTL
values.
OntheImplementationofEnd‐to‐EndMobilityManagementFramework(EMF)EhsanElahi(M.A.JinnahUniversity,IslamabadPakistan,Pakistan);MuhammadYousaf(CASE,Islamabad,Pakistan);AmbreenSheikh(MuhammadAliJinnahUniversity,Islamabad,Pakistan,Pakistan);MuhammadMaazRehan(CoReNeT,M.A.JinnahUniversity,Islamabad,Pakistan);MuhammadOmerChughtai(CoReNeT,Pakistan);AmirQayyum(M.A.JinnahUniversity,Islamabad,Pakistan)
Traditionallythemobilityproblemhasbeensolvedmostlyatnetworklayer.HowevertheEnd‐to‐EndMobility
ManagementFramework(EMF)[1]providesthesolutiontothisproblemabovethetransportlayer.EMFovercomessomelimitationsofcurrentmobilitymanagementsolutionsbyeffectivelyprovidingmobilityservicessuchassofthandover,willfulhandover,locationupdatesetc.EMFneitherrequiresanysupportof
additionalentitiesinthenetworknorrequiresthechangesinthecurrentimplementationofTCP.ThispaperdescribesaportableimplementationdesignoftheEMFframeworkalongwiththetradeoffsinvolvedinimplementingtheframework.Theresultsofsomeexperimentsforperformanceanalysisarealsopresented
thatquantifytheprotocolandcomputationaloverheads.
VirtualKeyboardBCIusingEyeblinksinEEGRajeshSingla(DrBRAmbedkarNIT,India);RameshwarJha(DrBRAmbedkarNIT,India);BrijilChambayil(DrBRAmbedkarNIT,India)
ABrainComputerInterface(BCI)providesanewcommunicationchannelbetweenhumanbrainandthe
computer.ThispaperisconcentratedondevelopingaBCIsystem,aVirtualKeyboardusingtheLabVIEWplatform.TheEEGsignalcontainsthetechnicalartifacts(noisefromtheelectricpowersource,amplitudeartifact,etc.)andbiologicalartifacts(eyeartifacts,ECGandEMGartifacts).Eyeblinkisoneofthemainartifacts
![Page 39: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/39.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
38
intheEEGsignal.ButinthiscontexttheEyeblinksarenotartifactsandarecontrolsignalstoselectthe
blocks/charactersintheVirtualKeyboard.Thekurtosiscoefficientandamplitudecharacteristicsoftheeyeblinksignalsareusedtodetectthecontrolsignals.
![Page 40: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/40.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
39
Workshops
1. NASSUE:SecondInternationalWorkshoponNetworkAssuranceandSecurityServicesinUbiquitousEnvironments(NASSUE2010)
2. CMPA:FirstWorkshoponCooperativeMobileProtocolsandApplications(CMPA2010)
3. STWMC:ThirdIEEEInternationalWorkshoponSelectedTopicsinMobileandWirelessComputing(STMWC'10)3.1. STWMC1:WirelessCommunications3.2. STWMC2:UbiquitousComputing,ServicesandApplications3.3. STWMC3:MobileNetworking,MobilityandNomadicity
4. VECON:FirstInternationalWorkshoponVEhicularCOmmunicationsandNetworking(VECON2010)4.1. VECON14.2. VECON2
5. AWSAN:FirstInternationalWorkshoponAdvancesinWirelessSensorandActuatorNetworks(AWSAN2010)
6. PEMOS:FirstInternationalWorkshoponthePerformance
EnhancementsinMIMO‐OFDMSystems(PEMOS2010)
![Page 41: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/41.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
40
1. NASSUE:SecondInternationalWorkshoponNetworkAssuranceandSecurityServicesinUbiquitousEnvironments(NASSUE2010)
Thisworkshopisfocusedonnetworkassuranceandsecurity(NAS)measure,whichhasbecomeanimportantresearchissueinubiquitousenvironments(UE).TheobjectiveofthisworkshopistoprovideaneffectiveforumfororiginalscientificandengineeringadvancesinNASissuesinUE.ItwillhighlightthevariousaspectsofNAS‐especiallyonthecruciallinkagebetweenavailability,compliance,andsecurity.NASSUE2010aimstobringtogetherresearchers,practitioners,developers,andpolicymakerstoshareandexchangeideasandtolearnaboutlatestdevelopments,problemsandsolutionsrelatedtoNASissuesinUE.
WorkshopProgramChairs
• BinodVaidya,Univ.ofOttawa,Canada• Shiuh‐JengWang,CentralPoliceUniv.,Taiwan• JoelRodrigues,Inst.ofTelecommunications,UnivofBeiraInterior,Portugal
InternationalAdvisoryCommittee
• DimitrisMakrakis,UnivofOttawa,Ottawa,Canada• PascalLorenz,UnivofHauteAlsace,France
PublicityChair
• SuryaNepal,CSIROICTCentre,Australia
TechnicalProgramCommittee
• BinodVaidya,UnivofOttawa,Canada• Shiuh‐JengWang,CentralPoliceUniv,Taiwan• JoelRodrigues,Inst.ofTelecommunications,UnivofBeiraInterior,Portugal• ByungRaeCha,GIST,Korea• K.P.Chow,UnivofHongKong,HongKong• JiankunHu,RMIT,Australia• Min‐ShiangHwang,NationalChungHsingUniv,Taiwan• SeungjooKim,SungkyunkwanUniv,Korea• ChaeHoonLim,SejongUniv,Korea• SuryaNepal,CSIROICTCentre,Australia• AntonioNogueira,UnivofAveiro,Portugal• KhaledSalah,KingFahdUnivofPetroleum&Minerals,SaudiArabia• NingZhang,UnivofManchester,UK• YanpingYu,ZhejiangGongshangUniv,China• HuifangChen,ZhejiangUniv,China• SteveMarsh,CommunicationsResearchCentre,Canada• XinxinFan,UnivofWaterloo,Canada• AmrYoussef,ConcordiaUniv,Canada• BidiYing,UnivofOttawa,Canada
![Page 42: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/42.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
41
NASSUE 2010 Monday, October 11 5:20PM‐7:00PMRoom:StrategyRoom1Chair:BinodVaidya(UniversityofOttawa,Canada)
ImprovedTwo‐factorUserAuthenticationinWirelessSensorNetworksBinodVaidya(UniversityofOttawa,Canada);DimitriosMakrakis(UniversityofOttawa,Canada);HusseinMouftah(UniversityofOttawa,Canada)
Wirelesssensornetworks(WSNs)areconsideredduetotheubiquitousnature,easeofdeployment,andwiderangeofpossibleapplications.WSNscanbedeployedinunattendedenvironments,wherearegisteredusercanlogintothenetworkandaccessdatacollectedbythelinkedsensors.Authenticatingusersinresourceconstrainedenvironmentsisoneofthemajorsecurityconcerns.Sincesensornodeshavelimitedresourcesandcomputationpower,itisdesirablethattheauthenticationprotocolissimpleandefficient.In2009,M.L.Dasproposedatwo‐factorauthenticationforWSNs,whereauserhastoprovepossessionofboth,apasswordandasmartcard.Sincehisschemeutilizesonlycryptographicone‐wayhashfunctionandexclusive‐ORoperation,itiswell‐suitedforresourceconstrainedenvironments.However,KhanandAlgahathbarpointedoutthatDas'sschemehassomeflawsandisvulnerabletovariousattacksandproposedanalternativesolution.Inthispaper,weshowthatboth,Das'sandKhan‐Algahathbar'sschemeshaveflawsandremainvulnerabletovariousattacksincludingstolensmartcardattacks.Toovercomethesecurityweaknessesofbothschemes,weproposeanimprovedtwo‐factoruserauthenticationthatisresilienttostolensmartcardattacksaswellasothercommontypesofattacks.Weprovidesecurityevaluationoftheproposedprotocolsshowingitsrobustnesstovariousattacksandanalyzedthescheme'sperformancetodetermineitsefficiency.Comparedtothepreviousschemes,itisprovenmorerobustandprovidesbettersecurity.
Pre‐broadcastbasedTimeEfficientPrivacyProtocolforSecureVehicularCommunicationsBidiYing(UniversityofOttawa,Canada);DimitriosMakrakis(UniversityofOttawa,Canada)
Privacyandsecurityaretwoimportantissuesinvehicularnetworks.Userswishtomaintainlocationprivacyandanonymity,meaningtheidentity,location/directionofmoveoftheirvehiclesremainsunknowntoeverybodywithpossibleexceptionlawenforcementauthoritiesresponsiblebylawtoknowandmaintainsuchprivateinformation.Inthispaper,weproposeaPre‐broadcastbasedTimeEfficientPrivacy(PTEP)scheme,which,insteadofperforminganyasymmetricverification,usesMessageAuthenticationCode(MAC)functionalityandHASHoperationstoauthenticatemessages.Moreover,weusetwo‐levelkey(upper‐levelhashchainandlow‐levelhashchain)whichassistsavoidingmessagelosses.AnalysisshowsthattheproposedPTEPschemesuperiorperformanceintermsofpacketlossrateandpacketlatency.Inaddition,itcanbeusedtoserveemergencyandroutinemessagesaswell,whilemostofexistingsolutionscanonlyworkwithroutinemessages.
AFrameworkTowardaSelf‐OrganizingandSelf‐HealingCertificateAuthorityGroupinaContentAddressableNetworkAnuchartTassanaviboon(UniversityofWaterloo,Canada)
Public‐keyprovisioninanInternetscaleiscrucialforsecuringpeer‐to‐peer(P2P)applications.Thispaperproposesaframeworkforaself‐organizingandself‐healingcertificateauthority(CA)inaContentAddressable
![Page 43: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/43.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
42
Network(CAN)thatcanprovidecertificateswithoutacentralizedTrustedThirdParty(TTP).Inourframework,aCAgroupisinitializedbybootstrappingnodesandthengrowstoamaturestatebyitself.Basedonourgroupmanagementpolicies,themembershipintheCAgroupisdynamicandhasauniformdistributionovertheP2Pcommunity.Meanwhile,aByzantineagreementalgorithmisdeployedtomaintainthehonestmajorityoftheCAgroup;allsharesoftheCAgrouparerefreshedgraduallyandcontinuously.Asecurityanalysisshowsthattheframeworkenablekeyregistrationandcertificateissuewithresistancetoman‐in‐the‐middle(MITM),collusionandnodeimpersonationattacks.
FormingVirtualizedSecureFrameworkforLocationBasedServices(LBS)usingDirectAnonymousAttestation(DAA)protocolHanunahOthman(UniversityTeknologiMARA,Malaysia);HabibahHashim(UniversitiTeknologiMARA,Malaysia);Jamalul‐lailAbManan(MIMOSBerhad,Malaysia);MohdAmeerYuslanRazmi(UniversitiTeknologiMARA,Malaysia)
Thetremendousgrowthinmobileandwirelesscommunicationscomeswithmorepervasiveapplications.Currentmobiledeviceplatformdoesnotallowalocalorremoteusertoattestthetargetplatform.Thelimitationofusingexistingsoftware‐basedaloneprotectioncanbeeasilyaffectedbymaliciouscodesanditcannotassureitsownintegrity.Inthispaper,weexploreanewapproachofanonymityissuesinPrivacyEnhancingTechnologies(PETs)whichwillresultintheprivacyenhancementofuserpersonaldataandlocationinformationinmobilenetworkservices.Wecreatethefoundationforrunningtrustedapplications,networkandservicesontopofexistingMobileLocationProtocol(MLP).AlsoformingVirtualizedSecureFrameworkbetweenmobiledevices(clients)andLocationBasedServices(LBS)ServerinVirtualMachine(VM)environmentbasedonDirectAnonymousAttestationprotocol.TrustedPlatformModule(TPM)actsasabasisforsoftwaresecuritymechanismsandtopreserveprivacyofuser'sinformationstoredintrustedplatform.Virtualizationisneededtoimprovetheutilizationofexistingcomputingresourcesandtoreducehardware.EverysingledevicesfoundinaphysicalmachinewillbevirtuallycreatedbythesesoftwaretoactlikeaphysicaldevicesintheVMs.DAAprotocolisproposedtoanonymouslyverifytheauthorityofusersandpreservingprivacyofuser'sprivatelocationinformation.
ATrustEvaluationModelusingControlledMarkovProcessforMANETKevinOuyang(UniversityofOttawa,Canada);BinodVaidya(UniversityofOttawa,Canada);DimitriosMakrakis(UniversityofOttawa,Canada)
AdistributedtrustevaluationmodelispresentedforMANETsbywhichuncertaintiesoftrustaretransformedintoprobabilityvectorsgivingtheprobabilitydistributionoftrustlevels.Thesystemevolvesovertimeasafinite‐stateMarkovprocesswithvarianttransitionmatrixes.Weattempttopredictthetrustworthinessvaluesofentitiesthataredeterminedbytheirinherenterrorpatterns.TheMarkovprocessisassociatedtoaBonus‐MalusSystemandcontrolledbytheestimatederrorpatternsofindividualentitiesinvolved.Aswell,aniterationalgorithmisdesignedtopreventinaccuratepredictionsfortrustvaluesbecauseofthepropertiesofMarkovprocess.ThesimulationresultsdemonstratethatourmodelisabletopredictlocaltrustsuccessfullyforentitiesinMANETsbyestimatingtheiractualerrorpatternsaccurately.
![Page 44: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/44.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
43
2. CMPA:FirstWorkshoponCooperativeMobileProtocolsandApplications(CMPA2010)
Cooperativecommunicationhasemergedasapromisingtechniqueformodernwirelesscommunicationsystems.Certaincharacteristicsofmobileenvironmentscreateanaturalneedfornodestocooperateamongthemselvestoovercomecertainlimitations.Thesecharacteristicsinclude(1)adversechannelconditionsandlackofresources(intermsofbandwidth)whichnecessitatecooperationatthephysicallayer(2)lackofinfrastructurewhichcreatestheneedfornodestocooperateinad‐hocroutingprotocolsforexample.(3)limited‐resourcedeviceswhichmightcreateaneedtoapplicationstocooperateanddistributecomputingtasksandsharetheirexcessofprocessingpower.Theworkshopisseekingpapersonon‐goingresearchthatinvolvescooperationinmobileenvironmentsatanylayeroftheprotocolstack.
WorkshopChairs:
• AshrafMatrawy,CarletonUniversity• MohamedHossamAhmed,MemorialUniversityofNewfoundland• MuhammadJaseemuddin,RyersonUniversity
![Page 45: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/45.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
44
CMPA 2010 Tuesday, October 12 8:40AM‐10:00AM
Room:StrategyRoom2
Chair:MuhammadJaseemuddin(RyersonUniversity,Canada)
JointRoutingandRelaySelectioninDAFMulti‐HopCooperativeAdhocNetworks
SalahAbdulhadi(RyersonUniversity,Canada)
Cooperativediversitytechniqueshaverecentlyreceivedalotofattentionduetotheirabilitytoprovidespatialdiversityinfadingwirelessenvironment,thusincreaseslinkreliability,provideshighercapacityandreducestransmitpowerforthesamelevelofperformance.Inthispaperwestudyajointproblemofrelayselection,powerallocationandroutinginmultihopwirelessadhocnetworksbasedoncooperativetransmission.Inparticular,anoptimalroutingstrategyisproposedtominimizetheend‐to‐endtotaltransmissionpowersubjecttoend‐to‐endtargetrate.Anad‐hocroutingstrategyisproposedtofindanoptimalroute(intermsoftotaltransmitpowerminimizing)fordecode‐andforwardstrategybasedonthewellknownDijikstraalgorithmwhichcanbeeasilyimplementedindistributedway.Simulationresultsshowthattheproposedstrategyhasgreatimprovementintermsofpowersavingcomparedwithtraditionalnon‐cooperativeshortestpathalgorithms,bymorethan70%insomesimulationscenario.
Design,ImplementationandEvaluationofaStructuredP2PAlgorithmforVehicularCommunicationSystems
VivianPrinz(TechnischeUniversitätMünchen,Germany);RolandBader(BMWResearchandTechnologyGmbH,Germany);WolfgangWoerndl(TechnicalUniversityofMunich–DepartmentofInformatics,Germany)
Distributedinformationmanagementisparticularlypowerfulinvehicularnetworks.Forexample,itenablesvehicularcommunicationsystemstopersistentlyprovideup‐to‐the‐minuteinformationaboutaccessibleparkingspaces,existinghazardsortrafficdensitiesandtokeeptheseitemsuptodate.TheVehicularInformationSpaceframework(VIS)implementsdistributedinformationmanagement.VehiclesrunningtheVISformakindofdistributeddatabase.Theyareabletoprovideinformationitemsinalocation‐awareandfullydistributedmanner.Moreover,theycanretrieve,modifyanddeletetheseitems.Forthispurpose,theVISdividesthevehicularnetworkintoseparate,interactingsegmentseachrunningtheVISStructuredP2PAlgorithm(VSPA).ThisarticlefocusesontheVSPA'sdesign,implementationandevaluation.ThealgorithmisbasedonfeaturesderivedfromexistingstructuredP2Palgorithmsandextendedtosuitthespecificcharacteristicsofvehicularnetworks.SimulationstudiesshowthattheVSPAoverlaystatemaintainsconsistentgivenlong‐runsimulations.Oninconsistencies,theoverlaystabilizesrapidly.Thisisevaluatedusinganurbantrafficenvironmentimplyingfewmessagesfornetworkadjustments.Also,itisexaminedonamotorwaygivenhighvehiculardensityandhighdataloadtoinvestigatescalability.Finally,weshowthattheVSPAisabletorebuildanoverlayincaseofanetworkbreakdown.
![Page 46: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/46.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
45
AnEfficientRelayAssignmentSchemeforMultiuserCognitiveRadioNetworkswithDiscretePowerControl
UditPareek(SimonFraserUniversity,Canada);MuhammadNaeem(SimonFraserUniversity,Canada);DanielLee(SimonFraserUniversity,Canada)
Inthispaper,wepresentabinaryparticleswarmoptimization(BPSO)basedlow‐complexityinterferenceawarerelayassignmentschemeformultipleusercognitiveradionetworkswithdiscretepowercontrol.First,weformulatethejointrelayassignment,sourceandrelay'spowerallocationasamixedintegernonlinearprogrammingproblem.Thisisfurtherreducedintoanintegerprogrammingproblem.WeproposeaBPSObasedrelayassignmentschemewithdiscretepowercontrolatsourceandrelaysfortheintegerprogrammingproblem.Theproposedschemehaslowcomputationalcomplexityandsimulationresultsshowthatitsperformanceisclosetotheoptimalexhaustivesearchalgorithm.
RelaySelectionApproachesforWirelessCooperativeNetworks
TauseefJamal(UniversityLusofona,Portugal);PauloM.Mendes(UniversityLusofona,Portugal)
Wirelessnetworksarecharacterizedbyhavinglimitedresourcesaccessedbyalargenumberofmobilestationswithdistinctcapabilities.Insuchchallengedenvironmentthedynamiccontrolofresourcesisofmajorimportancetomitigatethelimitationsofwirelessnetworks,suchastheimpactoflowdataratestationsandwirelesschanneloscillations.Suchaugmentedusageofwirelessresourcescanbeimplementedbaseduponcooperativerelayingschemes,whichhavethepotentialtosupportthedesiredsystemperformanceandnetworklifetime.However,theintroductionofcooperativerelayraisesseveralproblemssuchastheissueforrelayselectionandresourceallocation.Duetothesignificantnumberofdifferentcooperativerelayingapproaches,thisarticleaimstoprovideasystematicanalysisandclassificationofmajorrelayselectionprocedures,andtoidentifyopenresearchdirectionsaswellasthemostsuitableevaluationmethodsforanefficientanalysisofdifferentapproaches.
![Page 47: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/47.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
46
3. STWMC:ThirdIEEEInternationalWorkshoponSelectedTopicsinMobileandWirelessComputing(STMWC'10)3.1. WirelessCommunications3.2. UbiquitousComputing,ServicesandApplications3.3. MobileNetworking,MobilityandNomadicity
![Page 48: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/48.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
47
STMWC2010 - 1 Tuesday, October 12 8:40AM‐10:00AM
Room:StrategyRoom1
Chair:PhamCongDuc(Univ.ofPau,France)
NetworkAssistedAuctioningforCognitiveRadios
JiaLong(CarletonUniversity,Canada);ChangchengHuang(CarletonUniversity,Canada);JamesYan(CarletonUniversity,Canada)
Inthispaper,theuseofacentralizedservertoassistcognitiveradiousersinaccessingbandsinlicensedspectrumsisproposed.Typicalcognitiveradiosareopportunisticusersofspectrumbands.Therefore,theymustscanthespectrumtodetectexistingusersinordertoavoidinterference.Theuseofacentralizedservercanremovetheneedforspectrumscanningifallusersinformtheserverabouttheirpresence.Theserverwillcoordinateanddistributechannelstocognitiveradiousersusingauctioningmechanisms.Ourapproachremovestheneedforcognitiveradiouserstospectrumscan.Scanningcanbecostlyintermsoftimeandpowerconsumption.Inaddition,collisionsbetweenusersduetohiddennodeproblemcanberemoved.Theuseofacentralizedserverallowsforhigherlayersolutionthatwouldallowusersofdifferentwirelesstechnologiestocommunicate.Duetoitsflexibilityofuseacrossdifferentwirelessnetworks,SIPisadoptedasthecommunicationprotocolbetweenthecentralserverandtheprimaryandsecondaryusersofthelicensedspectrum.UsingaSIPservertocoordinatechannelallocationthroughauctioningapproachcangeneraterevenuefortheincumbentnetwork.Resultsshowthatrevenuecanbegeneratedwhilestillmeetingthegoalofefficientspectrumutilization.
ServiceDiscoveryformobilemulti‐domainmulti‐languageenvironments
NorShahnizaKamalBashah(NorwegianUniversityofScienceandTechnology,Norway);AtifBhatti(NorwegianUniversityofScienceandTechnology,Norway);ImranAslamChoudhary(NorwegianUniversityofScienceandTechnology,Norway);IvarJørstad(UbisafeAS,Norway);VanThanhDo(Telenor/NorwegianUniversityofScienceandTechnology,Norway)
Inmobilemulti‐domainmulti‐languageenvironments,aservicecanbeanythingandintroducedbyanybody.Consequently,sameorequivalentservicesmayhavedifferentnamesandserviceswithsamenameortypemaybecompletelydifferent.Existingservicediscoverysystemsareincapableofhandlingthesesituations.Weproposeaservicediscovery,whichisabletodiscoverallthesenewservicetypes.Inaddition,itiscapabletofindservicesthatarenotexactmatchesoftherequestedones.MoresemanticsareintroducedthroughattributeslikeEquivalenceClass,ParentTypeandKeywords.
EfficientMobileObjectLocalizationUsingRFID
KirtiChawla(UniversityofVirginia,USA);GabrielRobins(UniversityofVirginia,USA);LiuyiZhang(UniversityofVirginia,USA)
![Page 49: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/49.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
48
Location‐awarenessofmobileobjectsisthekeytoseveralemergingubiquitouscomputingapplications.WeshowthatRFIDtechnologycanbeleveragedtoachievemobileobjectlocalizationinaninexpensive,powerefficient,scalable,widelyapplicable,flexible,anduser‐friendlymanner.WeoutlinethechallengesthatcanadverselyaffectRFID‐basedlocalizationtechniques,andproposesolutionstomitigatethem.Also,wepresentseveralalgorithmsforRFID‐basedmobileobjectlocalization,comparingfavorablywithpreviousmethodsintermsofaccuracy,speed,reliability,andscalability.
UsingWebTechnologiesinAssessmentofContext‐AwarePervasive/UbiquitousSystems:ATouristGuideService
WaldirRibeiroPiresJunior(FederalUniversityofMinasGerais,Brazil);AntonioA.F.Loureiro(FederalUniversityofMinasGerais,Brazil);RicardoAugustoRabelo(UFMG/DCC,Brazil)
Animportantaspectinthedesignofpervasive/ubiquitousapplicationsistoevaluatethembeforetheirdeploymentinrealscenarios.Apossiblestrategytoassessthemistoperformsimulationsthatprovideusefulinsightsandresultstotheapplicationdesigner.However,thesimulationofpervasive/ubiquitousapplicationsandenvironmentshasproventobeaconsiderablechallengeforseveralreasons.Forinstance,manyofthetechnologies(e.g.,hardwareandsoftware)requiredtoassessthemeitherdonotyetexistorarenotmomentarilyavailableoraccessibleintermsofcostandreadiness,nottomentionotherimportantrequirementssuchasmonitoring,communicationmanagementandprofile/contextstatetrackingofentitiesinthesystem.Inordertomakethisprocesssimplerandfeasible,wedefinedaWebassessmenttoolthatprovidesasimulationapproachforubiquitousenvironmentsbyusingWebtechnologiessuchasAsynchronousJavaScriptandXML,Webapplicationframeworksandamapping/locationWebservice.Usingthesetechnologies,weimplementedapervasiveservice:atouristguideservice.Withthistool,wewereabletoevaluatetheproposedservivequantitativelybystudyingtheinteractionsbetweentheusers/entitiesinvolved,monitortheirprofile/contextstates,andtracktheirmovementsacrossapredefinedmaparea.
![Page 50: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/50.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
49
STMWC2010 - 2 Tuesday, October 12 10:30AM‐11:50AM
Room:StrategyRoom1
Chair:BijanRaahemi(UniversityofOttawa,Canada)
SEAODV:ASecurityEnhancedAODVRoutingProtocolforWirelessMeshNetworks
CeliaLi(Student,Canada);ZhuangWang(Student,Canada);CungangYang(RyersonUniversity,Canada)
Inthispaper,weproposeaSecurityEnhancedAODVroutingprotocol(SEAODV)forwirelessmeshnetworks(WMN).SEAODVemploysBlom'skeypre‐distributionschemetocomputethepairwisetransientkey(PTK)throughthefloodingofenhancedHELLOmessageandsubsequentlyusestheestablishedPTKtodistributethegrouptransientkey(GTK).PTKandGTKauthenticateunicastandbroadcastroutingmessagesrespectively.InWMN,auniquePTKissharedbyeachpairofnodes,whileGTKissharedsecretlybetweenthenodeandallitsone‐hopneighbours.Amessageauthenticationcode(MAC)isattachedastheextensiontotheoriginalAODVroutingmessagetoguaranteethemessage'sauthenticityandintegrityinahop‐by‐hopfashion.SecurityanalysisandperformanceevaluationshowthatSEAODVismoreeffectiveinpreventingidentifiedroutingattacksandoutperformsARANandSAODVintermsofcomputationcostandrouteacquisitionlatency.
EffectsofMobilityonStabilityinVehicularAdHocNetworks
LirenZhang(UnitedArabEmiratesUniversity,UAE)
Thispaperfocusesonthecharacterizationofvehiclemobilityinvehicularadhocnetworks(VANETs).Theperformanceofvehiclemobilityintermsoflinkavailabletimeandthenumberofinter‐vehiclelinkchangesformaintainingactivelinksinVANETisanalyzedusingboththehandoverandrandommovingmodels.Thetheoreticalanalysisisverifiedbysimulationexperiments.Thenumericalresultsindicatethatthevehiclerandommovinganalyticalmodelisabletoprovideamoreaccuratedescriptionofthecomplicatedvehiclemovingbehaviorthantheconventionalrandomwaypointmobilitymodel,especiallywhenvehiclesaremovingrelativelyfast.
SmoothingofVideoTransmissionRatesforanLTENetwork
KhaledShuaib(UnitedArabEmiratesUniversity,UAE);FaragSallabi(UAEUniversity,UAE)
Videosmoothingtechniquescanbeusedtofacilitatemoreeffectivetransmissionandtopreservebettervideoquality.Inthispaperwedevelopasemi‐optimalvideosmoothingapproachtomanagethetransmissionratesofMPEG‐4andH.264videooveraQoS‐basedwirelessLTEnetwork.Theproposedtechniqueutilizesasmoothingbufferwithpre‐definedthresholdstosmooththetransmissionrateswhileassumingminimalinformationaboutthevideotobetransmitted.Theresultsobtainedshowedasignificantimprovementsinsmoothingtransmissionratevariability.Inaddition,weshowamodelforthewirelessLTEchannelanduseitasafeedbacktomanagesmoothingandregulateandmapthetransmissionratesbasedontheavailabilityofnetworkresources.
![Page 51: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/51.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
50
PowerAllocationForNon‐RegenerativerelayinginCognitiveRadioSystems
MuhammadNaeem(SimonFraserUniversity,Canada);UditPareek(SimonFraserUniversity,Canada);DanielLee(SimonFraserUniversity,Canada)
Inthispaper,wepresentalow‐complexitypowerallocationschemefornon‐regenerative(amplifyandforward)relayingforcognitiveradiosystems.Themainobjectiveofpowerallocationistomaximizethesignaltonoiseratio(SNR)atthedestinationundertheconstraintofacceptableinterferencetotheprimaryusers(PU).Inthispaper,weproposeaniterativepowerallocationusingSNRupperBound(IPAUB)fornon‐regenerativerelaying.Theproposedalgorithmhaslowcomputationalcomplexity,anditseffectivenessisverifiedthroughsimulationresults.
![Page 52: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/52.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
51
STMWC2010 – 3 Tuesday, October 12 3:30PM‐5:30PMRoom:StrategyRoom1
Chair:MatthieuRoy(LAAS‐CNRS,UniversityofToulouse,France)
Sensors‐ActuatorsCooperationinWSANsforFire‐FightingApplications
PawelKulakowski(AGHUniversityofScienceandTechnology,Poland);EusebiCalle(UniversityofGirona,Spain);JoseLuisMarzo(UniversitatdeGirona,Spain)
Wirelesssensorandactuatornetworksforenvironmentaloperationsarediscussedinthispaper.Ascenarioofaforestbeingunderfireisanalyzed.Whiletheforestfiredetectionisaclassicalapplicationforsensor
networks,herethisresearchareaisextended,takingintoaccountactuatorsandfocusingonsensors‐actuatorscooperation.First,thespreadingofthefireisillustrated,adaptingawell‐knownmodelbasedonpercolationtheoryandexplainingitsrelationswithepidemicspropagationmodels.Then,itisshownhowthetemperature
datagatheredbysensorscanbeusedbyactuatorstoautomaticallyperformactionstobattlewithblaze.Finally,thesimulationresultsarepresented,documentingthecorrectnessofthedecisionstakenbythesystemandtheefficiencyoffire‐fightingactionsrelatedtothesensorsdensity.
ANeighbor‐basedHoldoffReductionSchemeforDistributedSchedulinginWirelessMeshNetworks
SaraLakani(AzadUniversityofScienceAndResearch,Iran);HosseinGhaffarian(IranUniversityofScienceandTechnology(IUST),Iran);MahmoodFathy(bournemouthuniversity,UnitedKingdom);BijanRaahemi(UniversityofOttawa,Canada)
TheIEEE802.16standardofwirelessmeshnetworksincludesvariousschedulingalgorithms,bothcentralized
anddistributed,todeterminethepropertimeslotthateachwirelessnodecantransmititsdata.Inthispaper,weintroduceanewschedulingschemetoimprovescalabilityandresourceutilizationinwirelessmeshnetworkswhereallnodescompetetogainaccesstothetransmissiontimeslot.Inourproposedmethod,the
transmissiontimeofanodeismodifiedaccordingtothetransmissionstatusofitsneighbors,resultinginashorterholdofftime,andconsequently,reducingthetransmissiondelayandthroughput.ThesimulationresultsconfirmtheefficiencyandperformanceoftheproposedalgorithmovertheIEEE802.16‐meshstandard
intermsofthroughputanddelay.
CompromiseinDecodingforaConcatenatedTurboandSpace‐timeBlockCodedSystem
XuanxuanLv(ZheJiangUniversity,P.R.China);MinjianZhao(ZhejiangUniversity,P.R.China);JieZhong(ZhejiangUniversity,P.R.China);CenPeng(ZhejiangUniversity,P.R.China);JunZheng(ZhejiangUniversity,P.R.China);LipingYang(ZhejiangUniversity,P.R.China)
Inthispaper,weinvestigatetheperformanceofiterativedecodingforconcatenatedTurbocodedandSpace‐
timeblockcoded(STBC)system.Inourproposedsystemthesoftparitybitneedstobeestimated,whichdiffers
![Page 53: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/53.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
52
fromtraditionalTurbodecoding,asthereceiveradoptsiterativedecodingnotonlytoTurbocodesbutthe
entiresystem.Inthiscaseasimplifiedandeffectivemethodofobtainingthesoftinformationofparitybitispresented,resultinginamoderateincreaseofcomplexity.Simulationresultsdemonstratethatperformanceimprovementcanbeobtainedusingtheiterativeschemecomparedwithnon‐iterativedecodingsystem.
Meanwhiletheincreaseofcomplexityinexchangeforperformanceimprovementisconsidered.Ourproposedschememakesanoptimaltrade‐offbetweencomplexityandperformancefortransmittinginRayleighfadingchannel.
EvaluationofsoftdetectionofSTBCschemesforturbocodes
YoungminKim(ChonbuknationalUniversity,Korea);SooyoungKim(ChonbukNationalUniversity,Korea)
Inthispaper,wepresentanefficientturbo‐codedspacetimeblockcoding(STBC)schemesinblockfading
channels.Ithasbeenreportedthatproperutilizationofsoftdecisioninformationisoneoftheimportantfactorsaffectingtheperformanceofturbocodes.IfaSTBCschemeisusedwithturbocodes,theoutputoftheSTBCdecodermustbefedintoaturbocodedecoderintheformofsoftdecisioninformation.Inaddition,the
performanceofaturbocodeissubjecttohowmuchdiversechannelinformationadecodercanutilizeinacodeword.InthispaperweevaluatetheperformanceofturbocodedSTBCschemesoverblockfadingchannels,andpresentanefficientSTBCschemewithverysimplemaximumlikelihooddetectioncapability.
BasebandMIMOreceiverarchitectureforMC‐CDMAanditsFPGAimplementation
IsabelleLaRoche(UniversitéLaval,Canada);SebastienRoy(LavalUniversity,Canada);PaulFortier(LavalUniversity,Canada);Jean‐FrancoisBeaumont(DefenceResearchandDevelopmentCanada‐Ottawa,Canada)
Abasebandmulti‐input,multi‐output(MIMO)multi‐carriercodedivisionmultipleaccess(MC‐CDMA)downlink
systemmeetingwidebandCDMA(WCDMA)bandwidthrequirementsissimulatedanditsreceiverpartisimplementedintoafieldprogrammablegatearray(FPGA).Thereceiverwasdesignedbyintegratinganexistingsingle‐input,single‐output(SISO)fixed‐pointMC‐CDMAreceiverwithanexistingfloating‐pointMIMOreceiver.
ThereceiveremploystemporalmultiplexinginordertouseasingleVerticalBellLaboratoriesLAyeredSpace‐Time(V‐BLAST)detector.SimulationresultsofacompleteMIMOMC‐CDMAsystemshowimprovementsovertheSISOcase.Implementationresultsshowthatitispossibletoimplementthisreceiverdesignintoasingle
FPGAdevice.
![Page 54: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/54.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
53
4. VECON:FirstInternationalWorkshoponVEhicularCOmmunicationsandNetworking(VECON2010)4.1. VECON14.2. VECON2
Thegoalofthisworkshopistopresentanddiscussrecentadvancesintheareaofvehicularwirelesscommunicationsandnetworking.Significanteffortsarebeingcarriedoutbyindustry,academiaandgovernmentagenciestoimprovesafety,decreasefuelconsumption,andincreasethecapacityofexistingroadwaysbyexploitingvehicularcommunicationsandnetworkingtechnologies.Thesetechnologies,whicharegenerallyreferredtoasVANET(VehicularAd‐hocNetworks)orbythemoregeneraltermVCS(VehicularCommunicationSystems),includevehicle‐to‐infrastructure,vehicle‐to‐vehiclecommunicationsandcanbebasedonshort‐andmedium‐rangecommunicationaswellasoncellularsystems.ThedevelopmentanddeploymentofVCSarealsoconsideredoneofthemostcriticalissuesfortheIntelligentTransportationSystem(ITS)industry.
WorkshopCo‐chairs
• JuanJoseAlcaraz,PolytechnicUniversityofCartagena(UPCT),Spain• EstebanEgea‐Lopez,PolytechnicUniversityofCartagena(UPCT),Spain
TechnicalProgramCommitte
• JoseMariaBarcelo,UPC,Spain• PaoloBellavista,UniversitadiBologna,Italy• CarlosJesusBernardos,UC3M,Spain• VicenteCasares‐Giner,UPV,Spain• NirbhayChaubey,ISTAR,India• JacekDanda,AGHUniversity,Poland• FelipeGarcia‐Sanchez,UPCT,Spain• PawelKulakowski,AGHUniversity,Poland• ChristophMecklenbrauker,TUWien,Austria• XavierPerez‐Costa,NECLaboratoriesEurope,Germany• VicentPla,UPV,Spain• JavierVales‐Alonso,UPCT,Spain• OliverYang,UniversityofOttawa,Canada
![Page 55: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/55.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
54
VECON 2010 -1 Tuesday, October 12 10:30AM‐11:50AM
Room:StrategyRoom2
Chair:JuanJoseAlcarazEspin(TechnicalUniversityofCartagena,Spain)
TestingviabilityofrelaypoliciesforreactiveCCAapplicationsinVANETs
Juan‐BautistaTomas‐Gabarron(PolytechnicUniversityofCartagena,Spain);EstebanEgea‐Lopez(PolytechnicUniversityofCartagena(UPCT),Spain);JoanGarcia‐Haro(PolytechnicUniversityofCartagena,Spain);RocíoMurciaHernández(PolytechnicUniversityofCartagena,Spain)
RelayingmechanismsforChainCollisionAvoidance(CCA)applicationsinVehicularAd‐hocNetworks(VANETs)arecrucialwhenonehoptransmissionsarenotenoughtoreachallofthevehiclesinaplatoonatriskofaccident.TakingintoaccountthatCCA‐relatedinformationmustbedistributedtoasmanyvehiclesaspossibleintheshortestaffordabletime,areasonablewaytodeterminetheviabilityofusingsuchrelaypoliciesisbyevaluatingthedelaytospreadinformationtoallrecipientsandtheassociatedoccupationofthecommunicationschannel.Furthermore,theinherenttransitiontoreachfulltechnologypenetrationinthemarketrequirestostudyhowthesystemofvehicleswillbehaveatdifferentstagesofdeploymentandhowdifferentrelayingmechanismsmayaffectthegeneralfunctionalityofthesystemandwhatistheinfluenceofbackgrounddatatrafficwhichcanobviouslyworsenthesuccessfuldeliveryrate(SDR)ofwarningnotificationmessages.
DYMES:aDynamicMessagingServiceforVANETs
AdrianHolzer(EcolePolytechniquedeMontréal,Canada);SaidaMaaroufi(EcolePolytechniquedeMontréal,Canada);SamuelPierre(EcolePolytechniquedeMontreal,Canada)
Applicationsaimedatenhancingtheexperienceofvehiculartransportationhavebeenincreasinginrecentyearswiththewidespreaddiffusionofsmartmobiledeviceswithnetworkcapabilitiesandaccesstouserlocation.Suchapplicationsincludenavigationsystemsandlocation‐basedtimetables.However,mostoftheseapplicationsonlyuseindividualcontextualinformationinordertoprovideusefulservicestotheenduser.Sharingcontextualinformationwithotheruserscanopenahostofnewpossibilities,suchasprovidinglivetrafficmonitoring,wherethelocationandspeedofindividualcarsissharedandindicatestheflowoftraffic;orfriendlocating,wherethelocationoffriendscanbedisplayedonamap.Inthispaper,wearguethatthereisalackofspecializedprogrammingsupportforsuchapplicationsandwepresentDYMES,adynamicmessagingservicedevisedtohelpfillthisgap.CentraltoDYMESisadynamicpublish/subscribesystem,whichthepublicationofdynamiccontextualinformationandthecreationofdynamiccontext‐basedmessagefilters.WepresentthecoreAPIsprovidedbyDYMESandillustratetheirusageviatwotypicalVANETapplications.Furthermore,weidentifyanddiscussimplementationissueswhichguidethearchitecturalchoicesinourongoingwork.
TrafRoute:ADifferentApproachtoRoutinginVehicularNetworks
![Page 56: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/56.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
55
RaphaelFrank(UniversityofLuxembourg,Luxemburg);EugenioGiordano(UniversityofCaliforniaatLosAngeles,USA);PasqualeCataldi(EURECOM,France);MarioGerla(UniversityofCaliforniaatLosAngeles,USA)
Inthenearfuturevehicularnetworksbasedonwirelesstechnologywillbepartofourlives.Efficientandrobustroutingalgorithmswillplayakeyroleinthesuccessofsuchtechnology.InthispaperwepresentTrafRoute,anefficientandrobustroutingschemeforvehicularnetworks,suitableforbothVehicle‐to‐VehicleandVehicle‐to‐Infrastructurecommunications.TrafRouteintroducesanovelapproachtoroutingthatinvolveslandmark‐basedroutesandforwarderself‐election,exploitingtheknowledgeoftheunderlyingroadnetwork.WedemonstrateTrafRoute'sefficiencyandrobustnessthroughsimulationstudiesperformedwithaccuratemobilityandpropagationmodels.
UnifiedPseudonymDistributioninVANETs
JosephBenin(GeorgiaInstituteofTechnology,USA);MichaelNowatkowski(UnitedStatesMilitaryAcademyatWestPoint,USA);HenryOwen(GeorgiaInstituteofTechnology,USA)
VANETscontinuetomatureandtheirinstallationisbecomingareality.Manyideashavebeenexchangedonhowbesttobalanceprivacyandsecurity.Theuseofpseudonymshasbeenalmostuniversallyacceptedasacriticalpartofthisequation.Simulatedresults,usingns‐3,demonstratetheneedformorethanasingleRSUcontactforpseudonymrefillduetothelimitednumberofcertificatesthatcanbeissuedinthattransit.ThispaperprovidesauniversalprotocolusingmultipleRSUsandmultipleservicechannelsforthedistributionofpseudonymsforrefill,intra‐regional,andinter‐regionalpurposes.
![Page 57: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/57.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
56
VECON 2010 - 2 Tuesday, October 12 1:20PM‐3:00PMRoom:StrategyRoom2Chair:EstebanEgea‐Lopez(PolytechnicUniversityofCartagena(UPCT),Spain)
ReactiveServiceLocationinIEEEWAVE
AndryCruzDiaz(GlasgowCaledonianUniversity,UnitedKingdom);TuleenBoutaleb(GlasgowCaledonianUniversity,UnitedKingdom);HuanXNguyen(GlasgowCaledonianUniversity,UnitedKingdom);HuagloryTianfield(GlasgowCaledonianUniversity,UnitedKingdom)
TheIEEEWirelessAccessinVehicularEnvironments(WAVE)familyofstandardsistheleadingworldwidestandardisationeffortintermsofDedicatedShortRangeCommunications(DSRC),anditaimsatdefiningacommonsetofrequirementsandfunctionalitiesthatarenecessaryinordertoenableintercommunicationandinteroperabilitybetweenthenodesinaVehicularAdhocNetwork(VANET).Nonetheless,WAVEdoesnotaimatdefiningafullsoftwarearchitectureforVANETdespiteitsconstitutingstandardsoutlineagivenstructurethatspansthecompleteprotocolstack,therefore,merecompliancetoitsguidelinesdoesnotimplythatthelevelsofcooperativenessrequiredbyadistributed,heterogeneousanddynamicsystemlikethosesupportedbyVANET,areachieved.WAVEprovides,however,thenecessaryprimitivesthatallowfortheadoptionofaService‐OrientedArchitecture(SOA)forVANETthatguaranteesmeetingthegoalsofthosenetworksandthesystemsthatdependonthem.Thispaperdescribeshowtoaccomplishreactiveservicelocation,adesiredfunctionalityinthecontextofanSOAforVANET;basedonthecombinationandfurtherenhancementoftheelementsalreadyspecifiedbyWAVE,exemplifyinghowcomplexobjectivescanbeattainedfromthebasicsetoffunctionalitiesinaWAVE‐compliantnode.
SecureCompressionofPrivacy‐preservingWitnessesinVehicularAdHocNetworks
BoQin(UniversitatRoviraiVirgili,Spain);QianhongWu(UniversitatRoviraiVirgili,Spain);LeiZhang(UniversitatRoviraiVirgili,Spain);JosepDomingo‐Ferrer(UniversitatRoviraiVirgili,Spain)
Vehicularadhocnetworks(VANETs)aredesignedtoimprovetrafficsafetyandefficiency.Tothisend,thetrafficcommunicationmustbeauthenticatedtoguaranteetrustworthinessforguidingdriversandestablishingliabilityincaseoftrafficaccidentinvestigation.CryptographicauthenticationtechniqueshavebeenextensivelyexploitedtosecureVANETs.Applyingcryptographicauthenticationtechniquessuchasdigitalsignaturesraiseschallengestoefficientlystoresignaturesonmessagesgrowingwithtime.Toalleviatefromtheconflictbetweentrafficliabilityinvestigationandlimitedstoragecapacityinvehicles,thispaperproposestoaggregatesignaturesinVANETs.Ourproposalcanpreserveprivacyforhonestvehiclesandtracemisbehavingones,andprovidesapracticalbalancebetweensecurityandprivacyinVANETs.Withourproposal,cryptographicwitnessesofsafety‐relatedtrafficmessagescanbesignificantlycompressedsothattheycanbestoredforalongperiodforliabilityinvestigation.Ourproposalallowsalargenumberoftrafficmessagestobeverifiedasiftheywereasingleone,whichspeedsuptheresponseofvehiclestotrafficreports.
ArchitectureofaSimulationPlatformfortheSmartNavigationServiceInvestigation
![Page 58: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/58.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
57
AndreaToppan(IEIITCNRsez.Bologna,Italy);AlessandroBazzi(WiLab,IEIIT‐BO/CNR,UniversityofBologna,Italy);BarbaraMMasini(UniversityofBologna,Italy);PaoloToppan(WiLab,IEIIT‐BO/CNR,Italy);OresteAndrisano(UniversityofBologna,Italy)
Efficientmobilitymanagementisanissueofvasteconomicimportanceforitsconsequencesonurbanandsuburbanmobility.Inthiscontext,telecommunicationsaregainingakeyrole,allowingtoincreasepeoplesafety,trafficefficiency,andtravelcomfort.Toinvestigatethetelecommunicationsystemsbehaviorinnewinfomobilityscenarios,advancedsimulationstoolsareneededjointlytakingintoaccountrealisticroadtrafficmobilityandtelecommunicationnetworksprotocolsinalltheiraspects.InthispaperwediscussthearchitectureofacomplexandcompletesimulationplatformwearedevelopingonthebehalfoftheItalianprojectPEGASUS:thechoiceoftrafficsimulators,thenetworksimulationandtheirinterfacewillbepresentedanddescribed.
OPAL‐VCN:Open‐Air‐LabforVehicularCommunicationNetworks
AlexanderGladisch(UniversityofRostock,Germany);RobilW.Daher(UniversityofRostock,Germany);MartinKrohn(UniversityofRostock,Germany);DjamshidTavangarian(UniversityofRostock,Germany)
VehicularCommunicationNetworks(VCNs)provideapromisingcommunicationplatformforIntelligentTransportationSystem(ITS)servicesaswellasforvalueaddedservicesindifferentroadsystems.DespitethehighdemandontestfieldsforVCNrelatedtechnicalsolutionsandservices,therearecurrentlyveryfewtestfieldsfortheimmenserequirementontestandR&Dactivities.Moreover,theknownVCN‐relatedtestfieldssuchassim‐TDandVII‐CaliforniamainlyfocusonV2Xcommunication,whilethereislessconsiderationoftherequirementsofrelatedroadsidebackbonenetworks.ThispaperpresentstheOpen‐Air‐LabforVCNs(OPAL‐VCN),concentratingonroadsidebackbonenetworksspecifiedforVCNrequirements.TheOPAL‐VCNdealswiththedesign,developmentandinstallationofareal‐worldtestfieldforVCNs,andcomprisesatestfieldofatotallengthofatleast30kmontheGermanhighwayA19/A20nearRostock(inMecklenburg‐WesternPomerania).Moreover,theOPAL‐VCNtestfieldisbasedonawirelessmulti‐layerroadsidebackbonenetworkthatemploysmodularandscalablesystemarchitecture.Consequently,OPAL‐VCNprovidesaneffectiveplatformforR&DactivitiesaswellasforeducationandindustryandcanbeusedasbasisforinvestigatinganddevelopingVCNrelatedtechnologiesandservices.
TheCaseforaNetworkAdaptationFrameworkinVANETs
CarlosCaloca(Ensenada´sCenterforScientificResearchandAdvancedEducation,Mexico);J.AntonioGarcía(Ensenada´sCenterforScientificResearchandAdvancedEducation,Mexico);ThierryDelot(UniversityLilleNorthofFrance,France)
ThediversecommunicationrequirementsofdifferentvehicularapplicationsandtheinnatedynamicityofVANETnetworkscomplicatethedesignofanetworklayerproposalthatisadequateforallapplicationsandnetworkconditions.ThispaperhighlightsthenecessityforadaptationofnetworkprotocolsinVANETs,anddescribesourongoingworkonaplatform(adaptationframework)thatwillprovideVANETdevelopersanenvironmentwheretheycanbuildthenetworkprotocolsthatadaptbasedoncontextdecisions.Thedesignofouradaptationframeworkreliesheavilyontheseparationofconcernsprinciplebyseparatingtheadaptiveprotocolinsubcomponents,andwemodeltheadaptationasacombinationofthesesubcomponents;fortheprotocolsubcomponentwedefinespecificpointswheretheadaptationcantakeplace.Thesesubcomponentswillbedevelopedandcompiledindependentlyofadaptationframeworkcode,andlinktotheframeworkatruntime,thisthankstotheuseofaplug‐inplatformandcomponent‐orientedprogramming.Wedescribetheframeworkarchitectureandhowtheframeworkinteractswiththeusers,applicationsandthenetwork
![Page 59: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/59.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
58
protocols.Lastlywebrieflytalkabouttheframework'sinitialimplementationandacasestudythatwearedevelopingtotesttheadaptationframework.
![Page 60: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/60.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
59
5. AWSAN:FirstInternationalWorkshoponAdvancesinWirelessSensorandActuatorNetworks(AWSAN2010)
Wirelesssensorandactuatornetworks(WSANs),asaresearchtopic,arecurrentlythesubjectofintensiveworld‐wideresearchactivities.Thesensortechnologypromisesmultipleapplications:frommonitoringanenvironmentindangerousregionsorenemyforcesinabattlefieldtocontrollingtrafficinstreets,inventoryinstorehousesandtrackingpatientsinhospitals.Ontheonehand,smallandcheapsensingdevicescreatepossibilitiesforgatheringhugeamountsofdatainanon‐intrusiveway.Ontheotherhand,actuatorsaddanewnetworkdimensionandcapabilities:thewholesystemcanalsoreacttotheforthcomingevents.ThegoaloftheFirstInternationalWorkshoponAdvancesinWSANsistogatherpeoplefromacademiaandindustryanddiscussthemostemergingissuesandfuturechallengesinthisarea.
WorkshopChair:
• PawelKulakowski,AGHUniversityofScienceandTechnology,Poland
TechnicalProgramCommittee:
• ChiaraBuratti,UniversityofBologna,Italy• SudhakarGanti,UniversityofVictoria,Canada• Antonio‐JavierGarcia‐Sanchez,TechnicalUniversityofCartagena,Spain• FelipeGarcia‐Sanchez,TechnicalUniversityofCartagena,Spain• PawelKulakowski,AGHUniversityofScienceandTechnology,Poland• MiguelLopez‐Guerrero,UniversidadAutonomaMetropolitana,Mexico• FernandoLosilla,TechnicalUniversityofCartagena,Spain• WieslawLudwin,AGHUniversityofScienceandTechnology,Poland• AntonioG.Ruzzelli,UniversityCollegeDublin,Ireland• CedomirStefanovic,UniversityofNoviSad,Serbia• DejanVukobratovic,UniversityofStrathclyde,UK
![Page 61: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/61.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
60
AWSAN 2010 Tuesday, October 12 1:20PM‐3:00PMRoom:StrategyRoom1Chair:PawelKulakowski(AGHUniversityofScienceandTechnology,Poland)
Range‐FreeLocalizationforAir‐DroppedWSNsbyFilteringNodeEstimationImprovements
EvaGarcia(UniversityofCastilla‐LaMancha,Spain);AurelioBermudez(UniversityofCastilla‐LaMancha,Spain);RafaelCasado(UniversityofCastilla‐LaMancha,Spain)
Somesensornetworkapplicationsinvolveanaerialdeploymentofmanysensornodesoveraparticularareaofinterest.Inthiscontext,currentrange‐freelocalizationproposals,basedonaniterativerefinementandexchangeofnodeestimations,arenotdirectlyapplicable,becausetheyintroduceahightrafficoverhead.Inthispaper,weproposetocontrolthisoverheadbymeansofavoidingthetransmissionofcertainlocalizationpackets.Thecriterionappliedbythisnewlocalizationtechniquetofilterpacketsisbasedontheamountofimprovementshownafterupdatinganestimationandthetimefromthelasttransmission.Wealsotunethisfilterinordertofindanoptimaltrade‐offbetweenthebenefitintrafficandthepenaltyintime.
ReliabilityModelforExtendingClusterLifetimeusingBackupClusterHeadsinCluster‐BasedWirelessSensorNetworks
ShafiqUllahHashmi(UniversityofOttawa,Canada);Sk.Md.MizanurRahman(UniversityofOttawa,Canada);HusseinMouftah(UniversityofOttawa,Canada);NicolasD.Georganas(UniversityofOttawa,Canada)
Incluster‐basedtwo‐tierWirelessSensorNetworks(WSNs),thecluster‐headnodes(CHs)gatherdatafromsensorsandthentransmittothebasestation.Whentheseclusterheadnodesstarttodie,thecoverageoftherespectiveclustersislostanditleavestheregionunmonitored.EveniftheCHsarerotatedandreassignedaftersometime,untilthenextrotationthatclusterinquestionwillbeoutofclusterhead,causingalossofinformationandlossofcoverage.ToselectaBackupClusterHead(BCH)issuggestedforthoseCHswhichareclosetodepletetheirenergy[1].WhentheCHdies,BCHtakesovertheresponsibilityandcontinuestoworkasanewclusterhead.Inthispaperwepresentananalyticalmodelofclusterreliabilityincluster‐basedWSNusingBCH,basedonMarkovchainmodel.Weusenon‐homogeneousMarkovprocess,alongwithForwardChapman‐Kolmogorovequationstoillustratetheclustermonitoringperiodinafinitethreestatespacemodel.WetesttheaccuracyofthemodelbyapplyingtheprobabilitiesoffailureofCHandBCHnodes,forafixednumberofsensornodesinacluster.Theresultsshowthatthepresentedmodelisabletomatchthebehaviouroftheclusterstatetransitionaccuratelyandvalidatesthesimulationresultsandanalysispublishedin[1].
AnIEEE802.15.4/ZigBeeBasedWirelessSensorNetworkforEnergyEfficientBuildings
CengizGezer(UniversityofBologna,Italy);MicheleNiccolini(UniversityofBologna,Italy);ChiaraBuratti(UniversityofBologna,Italy)
Realizingenergyefficientcontrolstrategiesinthebuildingsisoneoftheinnovativeandchallengingfieldofapplicationforwirelesssensornetworks.Toachievethegoalofreducedenergyconsumptionandoptimized
![Page 62: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/62.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
61
useofenergyinthebuildings,thedeploymentofsensorsandactuatorsiscrucial.Simpleaffordablesensorscanbeusedtomonitorthepowerconsumedbyeachapplianceinthebuildinginordertoturnthemon/offwhenitisefficientintheuseofenergy.TheARTEMISJointUndertakingprojecteDIANA(EmbeddedSystemsforEnergyEfficientBuildings)fundedbytheEuropeanCommissionaimstoimproveenergyefficiencyinbuildingsbyusingembeddedtechnologies.IntheeDIANAplatformtheenergyconsumedbyhouseholdorofficeappliancesismonitoredbyusingIEEE802.15.4/Zigbee‐compliantdevices.TheaimofthestudyistoshowthefeasibilityoftheIEEE802.15.4/ZigbeetechnologytotheeDIANAapplicationscenarioandtoprovideguidelinesforthenetworkdesign.Forthispurposetwostudieshavebeencarriedout:(i)asimulationanalysisofalargeapartmentwheremanynodesaredeployed;(ii)arealtestbedcomposedofIEEE802.15.4/ZigBee‐compliantdevices.Inthefirstcaseperformance,intermsofpacketerrorrate,averagedelayandenergyconsumption,isevaluatedbyvaryingthenumberofnodesindifferenttrafficconditions.Inthesecondcase,instead,thestatisticsofthedelayisprovided.Thestudyshowsthatsimulationresultsareinlinewiththeresultsachievedthroughthemeasurements.MoreoverresultsfulfiltheeDIANArequirements.
Energy‐awareRoutingProtocolforMobileSensorNetworksUsingLearningAutomataAlgorithms
MaryamKalantary(AzaduniversityinQazvin,Iran);MohammadRezaMeybodi(AmirkabirUniversityofTechnology,Iran)
Thispaperproposesanenergy‐awarelocation‐basedroutingprotocolformobilesensornetworksthatconsistoffrequentlymovingsensors.Ourproposedprotocoluseslearningautomatatoselectbestroutesthatmaximizedeliveryratioandnetworklifetime.Theprotocolusesthelocationandremainingenergyinformationofsensorstoassignacostfunctiontoeachsensornode.Eachnodeinnetworkisequippedwithalearningautomatonwhichselectsleast‐costpathsforeachpacket.Simulationresultsshowthattheproposedmethodachieveshigherdeliveryratio,lowerroutingoverheadandlowerenergyconsumption.
Configuration&DeploymentofSensorNetworkApplicationsusingFilesystemAbstractions
BhanuPisupati(IndianaUniversity,USA);GeoffreyBrown(IndianaUniversity,USA)
Largescalesensornetworksarenontrivialtodeployduetotheirheterogeneous,distributednature.Thispaperpresentsatechniquetoconfigureanddeploysensorapplicationsonheterogeneousnetworksthatisbasedontheuseofvirtualfilesystemabstractions.Theapproachcanaugmentexistingsensorsoftwarebuildprocedureswiththeabilitytoconfigureanddeploysoftware,allusingthefilesystemframework.Thepaperpresentsanarchitecturetoimplementtheideaandillustratesitsusebymeansofaprototype.Automationoftheconfigurationanddeploymentprocessesbyuseofscriptingbasedtechniquesimplementedusingthefilesystemabstractionsisdescribed.
![Page 63: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/63.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
62
6. PEMOS:FirstInternationalWorkshoponthePerformanceEnhancementsinMIMO‐OFDMSystems(PEMOS2010)
Orthogonalfrequencydivisionmultiplexing(OFDM)isapromisingmodulationtechniqueforhighdataratewirelesstransmission.OFDMcombinedwithmultipleantennasatthetransmitterandreceiver(i.e.,MIMO)toincreasethediversitygainand/ortoenhancethesystem’sperformanceontime‐variantandfrequency‐selectivefadingchannels,resultinginaMIMO‐OFDMconfiguration.Combiningbothtechniquesenablestoenhancetheoverallperformance.Thisworkshopbringstogetheracademicsandactiveresearchanddevelopmentprofessionalsworkinginthefieldofwirelesscommunication’soptimizationtopromoteexchangeofresearchideasandpossiblecollaboration.AudiencewillbeexposedtomanyperformanceoptimizationsinMIMO‐OFDMsystemsandwillbeabletorecognizetheimpactofsuchenhancementonthereliabilityandtheefficiencyofthestandardMIMO‐OFDMcommunicationsystem.PEMOS2010willintroducetheresearchcommunity(industry,academia,andGovernment)totheup‐to‐dateresearchintheareaofMIMO‐OFDMwirelesscommunicationsystemsandpromoteteamcollaborationamongorganizationshavingrelevantexpertisetoexecuteanadvancedresearchinthisarea.
WorkshopChair
• ShihabJimaa,KhalifaUniversity,UAE
TechnicalChair
• IbrahimAbualhaol,KhalifaUniversity,UAE
PublicationCo‐Chairs
• ReyadEl‐Khazali,KhalifaUniversity,UAE• AliDawood,KhalifaUniversity,UAE
PublicityCo‐Chairs
• LuisWeruaga,KhalifaUniversity,UAE• YoussefIraqi,KhalifaUniversity,UAE
WebDesignChair
• TarekEl‐Far,KhalifaUniversity,UAE
TechnicalProgramCommittee
• TetsuyaShimamura,SaitamaUniversity,JAPAN• RezaMalekian,AzadUniversity,IRAN• AlaeddinAbu‐Abed,UniversityofCentralOklahoma,USA• AliHazmi,TampereUniversityofTechnology,Finland• ArafatAl‐Dweik,KhalifaUniversityofScience,Technology,andResearch,UAE• BayanSharif,NewcastleUpon‐TyneUniversity,UK• CharalamposTsimenidis,NewcastleUpon‐TyneUniversity,UK• IyadAlFalujah,CerionOptimizationIncorporation,USA• KhaledEl‐Maleh,QualcommIncorporation,USA• KhalidMubarak,KhalifaUniversityofScience,Technology,andResearch,UAE• KhalidQaraqe,TexasA&MUniversityatQatar,Qatar
![Page 64: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/64.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
63
• MohammadM.Banat,JordanUniversityofScienceandTechnology,Jordan• MustafaMatalgah,UniversityofMississippi,USA• RaedShubair,KhalifaUniversityofScience,Technology,andResearch,UAE• RidhaHamila,UniversityofQatar,Qatar• SalamaSaidIkki,UniversityofWaterloo,Canada• SalehAl‐Araji,KhalifaUniversityofScience,Technology,andResearch,UAE• YichuangSun,UniversityofHertfordshire,UK
![Page 65: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/65.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
64
PEMOS 2010 Tuesday, October 12 3:30PM‐5:30PM
Room:StrategyRoom2Chair:ShihabJimaa(KhalifaUniversity,UAE)
PAPRReductionbyNulledSubcarrierDistortioninPer‐subcarrierAntennaSelectionSystemsRafaelCepeda(ToshibaResearchEuropeLtd,UnitedKingdom);JustinCoon(ToshibaTRL,UnitedKingdom)
Weproposearate‐losslesstechniqueforreducingthepeak‐to‐averagepowerratio(PAPR)inorthogonal
frequency‐divisionmultiplexingsystemsemployingantennaselectiononaper‐subcarrierbasis.Theproposedtechnique,whichisfromthefamilyoftheactiveconstellationextension(ACE)approachtoPAPRreduction,exploitsthenulledsubcarriers(foragivenantenna)thatarisethroughtheantennaselectionprocesstoreduce
thePAPRbyintroducingacontrolledlevelofdistortiontothesesubcarriers.WeshowthatthenewschemeiscapableofachievingamuchlowerPAPRthantraditionalACEmethodsappliedtoper‐subcarrierantenna
selectionsystems.Moreover,wedemonstratethroughsimulationanalysesthatthedistortiontransmittedonthenulledsubcarrierswillnothinderpracticalsystemperformance.
BitandPowerAllocationStrategyforAMC‐basedMIMO‐OFDMAWiMAXSystemsMuayadAl‐Janabi(NewcastleUniversity,UnitedKingdom);CharalamposC.Tsimenidis(NewcastleUniversity,UnitedKingdom);BayanSharif(UniversityofNewcastleUponTyne,UnitedKingdom);StephaneY.LeGoff(UniversityofNewcastleuponTyne,UnitedKingdom)
Inthispaper,weproposeabitandpowerallocationstrategyforadaptivemodulationandcoding(AMC)basedspatialmultiplexingmulti‐input‐multi‐output(MIMO)orthogonalfrequencydivisionmultipleaccess(OFDMA)systems.Thisstrategyaimstomaximizetheaveragesystemthroughputbyallocatingtheavailableresources
optimallyamongtheutilizedbandsdependingonthecorrespondingchannelconditionsandthetotaltransmissionpowerconstraints.Theaveragesystemthroughputisrepresentedasatrade‐offcriterionbetweenthespectralefficiencyandbiterrorrate(BER).TheconsideredAMCtechniqueutilizesdistinct
modulationandcodingscheme(MCS)optionsratherthanadoptingfixedoruncodedapproaches.ThetransmitterdividestheOFDMAframeateachtransmitantennaintobandsdependingonthenumberofactiveusersinanassignedbasestation(BS).ThesimulationresultsshowsuperiorperformanceoftheMIMO‐AMC‐
OFDMAsystem,whichadoptstheproposedstrategy,overotherconventionalschemes.
Time‐VaryingChannelEstimationUsingAmplitude‐DivisionBasedParallelNLMSTechniqueRubaiyatYasmin(SaitamaUniversity,Japan);TetsuyaShimamura(SaitamaUniversity,Japan)
Inthispaper,weproposeachannelestimationtechniquetocombattherapidlytime‐varyingcharacteristicsofmultipathchannel.Theproposedmethodusesanormalizedleastmeansquare(NLMS)basednoveladaptationschemewithamplitude‐divisiontechnique.Itsupposesmultiplelineartransversalfiltersasestimators,which
arearrangedinaparallelfashion.Thecoefficientvectorsforeachestimatorareformedwiththeamplitude‐
![Page 66: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/66.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
65
divisionbasedclassificationtechniqueaccordingtotheinformationofthechannelcoefficientvalues.The
coefficientvectorselectedateachiterationisadaptedwiththeNLMSalgorithmtohandlethetimevariationeffectoftherapidlytime‐varyingchannel.ComputersimulationresultsdemonstratethattheproposedestimatorprovidebettertrackingperformancethantheconventionalNLMSestimatorandamplitude‐division
parallelLMS(ADPLMS)estimatorforasecondorderMarkovcommunicationchannelinvariousfaderateconditions.
MIMO‐OFDMwithPilot‐AidedChannelEstimationforWiMaxSystemsFabienDelestre(Universityofhertfordshire,UnitedKingdom)
ThispaperdescribesachannelestimationschemeforMultipleInputMultipleOutput(MIMO)‐OrthogonalFrequencyDivisionMultiplexing(OFDM)systemsbasedontrainingsequence.Wefirstdevelopanapproachto
channelestimationwhichiscrucialforthedecodingofthetransmitteddata.WethendiscusstheimplementationoftheproposedmethodforWiMaxsystemsundervariouschannelconditions.TheefficiencyofthenewalgorithmisdemonstratedthroughthesimulationoftheMIMO‐OFDMsystemfortwoandfour
transmitantennasanddifferentnumberofreceiveantennas.TheSpace‐TimeCodingwith192informationsubcarrierspercodewordisusedasdefinedintheWiMaxstandard.Throughsimulations,itisshownthattheproposedmethodhasbetween1.5dBand2dBlosscomparedtotheidealcasewherethechannelcoefficients
areknownatthereceiver.Insummary,withtheproposedchannelestimationtechnique,combiningdiversityusingSpace‐TimeCodeswithOFDMisprovedtobeapromisingtechniqueforthepresentandfuturewirelesscommunications.
IterativeDetectionforZero‐PaddedOFDMinNon‐RegenerativeCooperativeWirelessNetworksHomaEghbali(SimonFraserUniversity,Canada);SamiMuhaidat(SimonFraserUniversity,Canada)
Zero‐PaddingOrthogonalFrequencyDivisionMultiplexing(ZP‐OFDM)hasrecentlybeenintroducedtoavoid
coded‐OFDM'shighdecodingcomplexity.Varioussub‐optimalZP‐OFDMreceivershavebeendevelopedintheliteraturetotradeoffperformancewithimplementationcomplexity.Inthispaper,weproposeanewiterativedetectionschemeforZP‐OFDMtransmissionstailoredtobroadbandcooperativenetworkswithsinglerelay
andamplify‐and‐forwardrelaying.Byavoidingchanneldependentmatrixinversion,whichisthecaseinminimummeansquareerror(MMSE)‐ZP‐OFDMtransmissions,andincorporatinglinearprocessingtechniques,weshowthatourproposedreceiverisabletobringsignificantcomplexityreductioninthereceiverdesign,
whileoutperformingcooperativeMMSE‐ZP‐OFDM.
Random‐BasedFairAllocationinMulti‐RelayCooperativeOFDMSystemIbrahimYAbualhaol(KhalifaUniversity,UAE);YoussefIraqi(KhalifaUniversity,UAE)
Inthispaper,anovelMulti‐relayAdaptiveRandomSelection(MARS)strategyinadual‐hopmulti‐relayOFDMsystemisproposed.Inthisstrategy,therelayscooperateaccordingtocontributionfactorssuggestedbyeachrelay.TheselectionoftheOFDMsub‐channelsisbasedonuniformrandomdistributionwherethethresholds
oftheuniformrandomvariableareassociatedwiththecontributionfactors.Thisapproachguaranteesfairnessinallocatingtheresourcesineachrelay.TheapproachiscomparedwithstaticallocationoftheOFDMsub‐channels.TheMARSstrategyistestedinamultirelaysystemoverflatandselectiveRayleighfadingchannels.
SimulationresultsshowthesuperiorityoftheproposedschemeinimprovingtheOFDMsystemperformancein
![Page 67: 2010 IEEE 6th International Conference on Wireless and ...IEEE 6th International Conference on Wireless and Mobile Computing, Networking ... 18th workshop on Selected Areas in Cryptography](https://reader036.vdocuments.mx/reader036/viewer/2022071502/61226dec09ace15aef7a39ee/html5/thumbnails/67.jpg)
2010IEEE6thInternationalConferenceonWirelessandMobileComputing,NetworkingandCommunications
66
termsofBER.Theperformanceisachievedbycreatingavirtualdiversitybyrandomizingtheallocationwhere
nochannelinformationisrequired.