The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the Technical Program Committee, we welcome all of you to the IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC 2016) in the beautiful Coral Beach Hotel in Paphos, Cyprus! We are indeed delighted that this year's IEEE IWCMC accomplishes its goal under the conference theme “Connectivity for Everything” and continues its tradition of providing the premier...
Vehicular ad hoc networks (VANETs) are expected to play a big role in our lives in the near future; they will both improve traffic safety and revolutionize the driving experience. Their expected deployment in autonomous cars will induce attackers to design new methods to target these systems, and to organize the vehicles they compromise into vehicular botnets. Vehicular botnets enable new attacks...
In this paper, we address several security issues in our previously proposed content retrieval scheme for Disruption Tolerant Networks (DTNs). The content retrieval is built upon the social-tie relationships among DTN nodes for routing and content lookup service placement. Malicious nodes can launch attacks by advertising falsified social-tie information to attract and drop packets intended for other...
We describe a Vehicular M2M (VM2M) overlay network over random access channel (RACH) in LTE that aims to emulate the control channel (CCH) of vehicular ad hoc networks (VANETs). VM2M overlay is implemented over a dedicated subset of preamble codes, at the physical layer, and uses a medium access control (MAC) layer modeled as IEEE 802.15.4 carrier sense multiple access (CSMA/CA) mechanism. We evaluate...
We investigate the performance of a wireless sensor network composed of a number of IEEE 802.15.4 clusters interconnected in a linear structure. To equalize node lifetime, we utilize randomized sleep at the individual node level and rotation of the bridge role among the nodes located in shared areas between the clusters. Our Markov chain analysis indicates that the proposed mechanism is capable of...
In this paper, we develop a novel optimal anchors placement strategy tailored for anisotropic WSNs. By resorting to the well-known particle swarm optimization (PSO), we derive the optimal anchors' positions that minimize the average location estimation error (LEE). We show that our placement strategy provides substantial accuracy gains if used instead of the conventional ones and that it is able to...
High performance of visible light communication (VLC) systems requires overcoming the limitations imposed by the optical wireless channel distortions resulting from path loss and temporal dispersion. In order to design techniques to combat the effects of channel distortions, an accurate VLC channel model is needed. In this paper, we propose a new regular-shaped geometry-based multiple bounce model...
The identification of the services that generate traffic is crucial for ISPs and companies to plan and monitor the network. The widespread deployment of encryption and the convergence of the web services towards HTTP/HTTPS challenge traditional classification techniques. Algorithms to classify traffic are left with little information, such as server IP addresses, flow characteristics and queries performed...
In this work, we analyze the use of a WiFi network deployed in a large-scale technical university. To this extent, we leverage three weeks of WiFi traffic data logs and characterize the spatio-temporal correlation of the traffic at different granularities (each individual access point, groups of access points, entire network). The spatial correlation of traffic across nearby access points is also...
Detecting explicit user actions, i.e., requests for web pages such as hyper-link clicks, from passive traces is fundamental for many applications, such as network forensics or content popularity estimation. Every URL explicitly visited by a user usually triggers further automatic URL requests to obtain all objects that compose the web page. HTTP traces provide a summary of all URLs requested by users,...
Sparse code multiple access (SCMA) is a novel kind of air interface technology which can dramatically improve spectral efficiency of wireless radio access. Different from conventional CDMA and OFDMA, SCMA achieves the non-orthogonal multiple access of frequency domain. On the other hand, Multiple-Input Multiple-Output (MIMO) can make full use of spatial-domain resource to improve system performance...
In Long Term Evolution (LTE) networks, User Equipments (UE)s should proceed Random Access CHannel (RACH) procedure to attach to the Base Station and access the channel. One limitation of this procedure is the congestion that may appear when high number of UEs are simultaneously trying to attach to the channel. Such use-case happens when high number of Machine Type Communication (MTC) devices are deployed...
The demand for increasingly challenging data rates in cellular networks has motivated the pursuit to exploit abundant bandwidth at the millimeter waves (mmWave) spectrum, which offers large bandwidths and near free-space path loss for line of sight links. However, this solution comes at the cost of limited communication range. Thus, mmWave basestations (BS) are expected to be densely deployed to maximize...
The point process theory and stochastic geometry are usually used to model cellular networks in two-dimensional (2-D) space. However, the well known 2-D models are appropriate for rural or suburban areas but are not suitable for dense urban environments, where a large number of heterogeneous small cells are deployed in the new generation networks. By the integration of the millimeter wave (mmWave)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.