- Registration 8:00-9:00
- Opening Ceremonies 9:00-9:15
Preben Mogensen received the M.Sc. and Ph.D. degree from Aalborg University, Denmark, in 1988 and 1996 respectively. He has since 1988 worked in various positions at Aalborg University; since 2000 as Professor in mobile communication systems. Dr. Mogensen is currently heading the Wireless Communications Networks (WCN) section at Aalborg University. He has co-authored more than 300 international journal and conference papers in various domains of wireless communication. Since 1995 Preben Mogensen has also been part time associated with Nokia (2007-2014 with NSN) in a position of Principal Engineer. In 2009 he was nominated NSN fellow. His current research focus is 5G, MTC and network evolution.
Commercial launch of the forthcoming 5th generation (5G) mobile communication system is expected to start from 2020. 5G has three key drivers: To provide perception of un-limited access to services in the "cloud". To be ultra fast responsive for real time remote and automation control, and to give reliable and secure connectivity to an enormous number of low power and low cost devices (Internet of Things = IoT). Some of the key radio technologies to reach these 5G targets are to move up in frequency bands to have access to more spectrum, to densify the network by deploying ultra dense small cells, and to enhance the transmission efficiency by MIMO and advanced transceivers. Finally the overall 5G network architecture will be programmable and software driven. This presentation will discuss Nokia's view on 5G.
- Break 10:30-11:00
Authors Radhia Khdhir, 20446312 (LETI, Tunisia); Kais Mnif (ENET'COM, University of Sfax & Ecole de Technologie Supérieure, Tunisia)
This paper addressed the problem of packet scheduling (PS) on the 3GPP Long Term Evolution (LTE) downlink (DL). The main contribution of this work was to propose a new scheduling and resource allocation scheme that deals with QoS requirements. The performance of the proposed approach was compared with previous resources allocation and scheduling algorithms such as Best-CQI, RR, and QoE downlink schedulers. Simulation results show that it is possible to achieve a considerable gain in both system's throughput and fairness.
Authors Ranko Maric, Tomislav Grgic, Maja Matijasevic and Ignac Lovrek (University of Zagreb, Croatia)
Efficient management of scarce access network resources for growing volume of Machine-to-Machine (M2M) communications play an important role in a Long Term Evolution (LTE) network. Understanding the communication requirements of machine-to-machine (M2M) services, and linking them to technical, as well as economic aspects, is a crucial step towards "smarter" charging of such services. We discuss the capabilities of M2M services to postpone their communication in LTE's core network, called the Evolved Packet Core (EPC), to avoid times when usage of network resources would be expensive (e.g., while the network is congested). We introduce a context of a group of machines, which describes the postponement capabilities of M2M communication, which is used as an input to the online charging process. We illustrate the proposed approach and its benefits using a smart home M2M service as an example.
Authors Salim Bitam (University of Biskra & LESIA Laboratory, Algeria); Abdelhamid Mellouk (UPEC, University Paris-Est Creteil Val de Marne, France)
A Vehicular Ad Hoc Network (VANET) is a rapidly evolving field with growing 5th generation mobile networks and peer-to-peer services to deliver both safety and traffic benefits. However, message transmission in VANET suffers from several disadvantages such as the frequent intermittent connectivity because of high velocity of VANET vehicles and to their limited capacity in terms of bandwidth. To ensure reliable connectivity, we propose in this paper, a new message dissemination protocol for VANET based on cloud computing, called Cloud computing-based message Dissemination protocol for VANET (ClouDiV). Considered as a geographic protocol, ClouDiV provides an adaptive dissemination of safety and non-safety messages through a cloud computing architecture. Simulation results taken with ns-2 in realist urban settings showed that ClouDiV improves the connectivity performances criteria in spite of network size.
Authors Almudena Díaz Zayas, Alvaro Manuel Recio Perez, Cesar Augusto Garcia Perez and Pedro Merino (University of Malaga, Spain)
The flat architecture adopted in LTE increases the scalability of the network in order to accommodate large volumes of user traffic, reduces packet latency and the cost per byte. At the same time the enhanced Node B (eNB) has increased its complexity which have implied the emergency of new challenges in the field of experimental performance tests . To cope with these challenges access to a real and controlled experimentation environment is needed. Nevertheless the high cost of laboratory equipment makes it difficult to carry out realistic experiments for most of the research teams, who usually relay their work on simulations. A combination of highly configurable equipment and software tools accessed remotely seems to be the best solution to advance on QoS over LTE. PerformLTE testbed provides a controlled environment where LTE end-to-end IP communication, including radio impairments and network perturbations, can be reproduced.
Authors Jose Oscar Fajardo, Ianire Taboada and Fidel Liberal (University of the Basque Country, Spain)
This paper deals with the classical problem of radio resource management in LTE MIMO, with special focus to the specific radio channel characteristics in commercial LTE networks. First, we provide some conclusions about the Channel Quality Information traces obtained through field testing. From this analysis, we perform a series of experiments by means of an LTE emulator in order to evaluate the accuracy of different fading models used in the 3GPP. As a first outcome of the paper, we infer several fine-grain channel characteristics useful to feed further research work in the area of LTE MIMO. As a second contribution of the paper, we analyze the performance of classical schedulers (i.e., Round Robin, Best CQI and Proportional Fair) under the obtained LTE MIMO channel conditions. Specifically, we analyze the impact of the channel feedback reporting rate in scenarios with multiple greedy sources.
- Lunch 13:00-14:00
AuthorsRaul Armando Fuentes Samaniego (Télécom SudParis, France); Ana Cavalli (Telecom SudParis, France); Juan Nolazco Flores (Tecnologico de Monterrey, Campus Monterrey, Mexico); Javier Baliosian (University of the Republic, Uruguay)
The Internet of Things (IoT) is one of the most novel networking paradigms and there are yet too many technologies defining themselves as IoT complicating the scenario for developing a fully IoT environment. The situation becomes even harder when security and privacy are considered. In this paper, we present a survey on the security aspects of an IoT conformed by wireless sensors communicating through the IEEE 802.15.4 standard. This survey follows a revision of the state of art in a layer-by-layer systematic analysis.
Authors Christos J Bouras (University of Patras CTI&P-Diophantus & University of Patras, Greece); Vaggelis Kapoulas (Computer Technology Institute and Press - Diophantus, Greece); Enea Tsanai (University of Patras, Greece)
Vehicular Ad Hoc Networks (VANETs) are considered as a special case of mobile Ad Hoc Networks (MANETs) and recently are gaining a great attention from the research community. The need for improved road safety, traf-fic efficiency and direct communication along with the great complexity in routing makes VANETs a very challenging field. In this paper, we propose an enhancement mechanism for the GPSR routing protocol and present its perfor-mance for urban and highway scenarios. Its performance is compared to the performance of the most common MANET routing protocols adopted in VANETs. The proposed enhancement is shown to be beneficial in most occa-sions as it outperforms the rest of the tested routing protocols.
AuthorsLuis J. Mariscal (Universidad de Málaga, Spain); Alicia Triviño (University of Malaga, Spain); Fernando Boavida (University of Coimbra, Portugal)
Routing in wireless mesh networks is of paramount importance to their good performance. As this type of network is becoming key to many application scenarios, there is the need to guarantee that routing is as efficient as possible. Despite extensive research work carried out in the past, existing routing algorithms have problems in terms of latency, throughput, network overhead, and/or scalability, depending on their type. In the current paper we propose a hybrid wireless mesh networks routing algorithm that addresses the referred problems, exploring the ant colony optimisation paradigm. The algorithm, named AntWMNet, was extensively studied through simulation using OMNET++, and the results show that it clearly outperforms the reference AODV algorithm.
AuthorsLarissa Pimentel (Federal University of Pará, Brazil); Denis Lima Rosário and Marcos Seruffo (Federal University of Para, Brazil); Zhongliang Zhao and Torsten Ingo Braun (University of Bern, Switzerland)
User experience on watching live videos must be satisfactory even under the influence of different network conditions and topology changes, such as happening in Flying Ad-Hoc Networks (FANETs). Routing services for video dissemination over FANETs must be able to adapt routing decisions at runtime to meet Quality of Experience (QoE) requirements. In this paper, we introduce an adaptive beaconless opportunistic routing protocol for video dissemination over FANETs with QoE support, by taking into account multiple types of context information, such as link quality, residual energy, buffer state, as well as geographic information and node mobility in a 3D space. The proposed protocol takes into account Bayesian networks to define weight vectors and Analytic Hierarchy Process (AHP) to adjust the degree of importance for the context information based on instantaneous values. It also includes a position prediction to monitor the distance between two nodes in order to detect possible route failure.
- Break 15:45-16:15
AuthorsAhmed Abujoda and Panagiotis Papadimitriou (Leibniz Universität Hannover, Germany)
Middleboxes, such as firewalls, NATs, proxies, and application accelerators are known for their undesirable implications on traffic (mainly due to packet headers or payload modifications) and for hindering connection establishment when certain protocols are in use (e.g., UDP, SCTP). Since many of these implications occur in middleboxes within ISPs or cellular networks, we present a software-defined network (SDN) architecture that can foster the collaboration between end-hosts and ISPs. In particular, an end-host can express a desirable behavior from the network, specified as an invariant (e.g., no IP header or payload modification), and the ISP, in turn, can establish a connection through middleboxes that preserve this invariant. We discuss the proposed architecture and the requirements for invariant preserving middlebox traversal. We further propose an algorithm for the selection of the best path through a sequence of invariant-preserving middleboxes. We use simulations to assess the efficiency of our approach.
AuthorsArnaud Durand, Mikael Gasparian and Thomas Rouvinez (Uni Fribourg, Switzerland); Imad Aad (Swisscom, Switzerland); Torsten Ingo Braun (University of Bern, Switzerland); Tuan Trinh Anh (Budapest University of Technology and Economics, Hungary)
In this paper we present BitWorker, a platform for community distributed computing based on BitTorrent. Any splittable task can be easily specified by a user in a meta-information task file, such that it can be downloaded and performed by other volunteers. Peers find each other using Distributed Hash Tables, download existing results and compute missing ones. Unlike existing distributed computing schemes relying on centralized coordination point(s), our scheme is totally distributed, therefore highly robust. We evaluate the performance of BitWorker using mathematical models and real tests, showing processing and robustness gains. BitWorker is available for download and use by the community.
AuthorsAryan TaheriMonfared and Chunming Rong (University of Stavanger, Norway)
Today, a cloud user can select a specific type of VM for deployment based on needs (e.g. memory or storage size). In terms of networking, however, no similar mechanism exists which allows users to select a virtual network based on characteristics such as link speed and QoS. The lack of such a mechanism makes it difficult to manage VMs along their associated networks and limits the efficacy of cloud suppliers. This paper presents virtual network flavours for differentiated forwarding of traffic across the underlay networks. The flavours enable tenants to select network properties including maximum rate, maximum number of hops between two VMs, and priority. Measures such as metering, queueing, and shaping facilitate steering traffic through a set of paths to satisfy tenants' requirements and are also beneficial for the legacy network. These measures are implemented and controlled in the overlay and underlay using Software Defined Networking (SDN) mechanisms.
AuthorsLefteris Mamatas (University of Macedonia, Greece); Aleka Papadopoulou (Aristotle University of Thessaloniki, Greece); Vassilis Tsaoussidis (Democritus University of Thrace, Greece)
The capability of a mobility model to detect certain patterns of user behavior (e.g., walking habits) enables solutions for a number of challenging networking problems. We argue that the limited viewpoint of a single mobile node and its scarce resources are major obstacles for accurate estimations. Targeting at hybrid network environments, we offload prediction capabilities to the fixed nodes that may be available in the area, offering a global view and the capability of resource-demanding calculations. Here, we introduce a solution running on top of the infrastructure nodes that: (i) implements a mobility model which provides a number of mobility forecasts to the mobile users in the area, (ii) supports proactively the routing decisions of opportunistic mobile devices being taken at times there is not connectivity. We demonstrate the efficiency of our mobility model using scenarios deployed in a preselected city center, where mobile nodes seek for Internet access.
- Gala Dinner 20:00-00:00
Joerg Widmer is Research Professor at Institute IMDEA Networks in Madrid, Spain. He received his M.S. and PhD degrees in computer science from the University of Mannheim, Germany in 2000 and 2003, respectively. His research focuses primarily on wireless networks, ranging from MAC layer design and interference management to future mobile network architectures. From 2005 to 2010, he was manager of the Ubiquitous Networking Research Group at DOCOMO Euro-Labs in Munich, Germany, leading several projects in the area of mobile and cellular networks. Before, he worked as post-doctoral researcher at EPFL, Switzerland on ultra-wide band communication and network coding. He was a visiting researcher at the International Computer Science Institute in Berkeley, CA, USA and University College London, UK. Joerg Widmer authored more than 100 conference and journal papers and three IETF RFCs, holds 13 patents, serves on the editorial board of IEEE Transactions on Communications, and regularly participates in program committees of several major conferences. Recently he was awarded an ERC consolidator grant as well as a Spanish Ramon y Cajal grant. He is senior member of IEEE and ACM.
State-of-the-art wireless communication already operates close to Shannon capacity and one of the most promising options to further increase data rates is to increase the communication bandwidth. Very high bandwidth channels are only available in the extremely high frequency part of the radio spectrum, the millimeter wave band (mm-wave). Upcoming communication technologies, such as IEEE 802.11ad, are already starting to exploit this part of the radio spectrum to achieve data rates of several GBit/s. However, communication at such high frequencies also suffers from high attenuation and signal absorption, often restricting communication to line-of-sight (LOS) scenarios and requiring the use of highly directional antennas. This in turn requires a radical rethinking of wireless network design. On the one hand side, such channels experience little interference, allowing for a high degree of spatial reuse and potentially simpler MAC and interference management mechanisms. On the other hand, such an environment is extremely dynamic and channels may appear and disappear over very short time intervals, in particular for mobile devices. This talk will highlight some of the challenges of and possible approaches for networking in the mm-wave band.
- Break 10:00-10:130
AuthorsPiotr Srebrny (Nevion, Norway); Dag Sørbø (Bekk Consulting AS, Norway); Thomas Plagemann (University of Oslo, Norway)
File transfers are and will in the future be responsible for a substantial part of the Internet traffic. However, with present solutions transfers of popular files lead to a lot of redundant data transfers in the network. In this paper, we investigate how a link level caching scheme can reduce the number of redundant data transfers. We serve requests from clients that download a file concurrently, but arrived at different times in such a way that they get at a given point in time the same data chunk of the file. This enables link caches to efficiently remove the redundancy. The data chunks are rearranged at the client to compose the original file. Through implementation and experimental studies we show that this approach especially when encoding the original file with fountain codes clearly outperforms traditional file servers in terms of file server capacity and bandwidth consumption.
AuthorsVignesh Renganathan Raja, Abhishek Pandey and Chung–Horng Lung (Carleton University, Canada)
Software Defined Networking (SDN) has received considerable attention for both experimental and real networks. The programmability of the centralized control plane utilizes the global view of the network to provide better solutions for complex problems in SDN. This results in an increase in robustness and reliability of network functions running in SDN. This paper is motivated by recent advancement in SDN and increasing popularity of multicasting applications by proposing a technique to increase the resiliency of multicasting in SDN. Multicasting is a group communication technology, which uses the network infrastructure efficiently by sending the data only once from one or multiple sources to a group of receivers. Multicasting applications, e.g., live video streaming and video conferencing, are popular and delay sensitive applications in the Internet. Failures in the ongoing multicast session can cause packet losses and delay and hence affect quality of service (QoS). In this paper, we present a technique to protect a multicasting tree constructed by Openflow switches in SDN. The proposed algorithm can detect link or node failures from the multicasting tree and then determines which part of the multicasting tree requires changes in the flow table to recover from the failure. We also implement a prototype of the algorithm in the POX controller and measure its performance by emulating failures in different tree topologies in Mininet.
AuthorsLamine Amour (Paris Est Creteil University, France); Sami Souihi (University Paris Est UPEC, France); Said Hoceini and Abdelhamid Mellouk (UPEC, University Paris-Est Creteil Val de Marne, France)
Quality of Service (QoS) optimization are not sufficient to ensure users needs. That's why, operators are investigating a new concept called Quality of Experience (QoE), to evaluate the real quality perceived by users. This concept becomes more and more important, but still hard to estimate. This estimation can be influenced by a lot of factors called: Quality of Experience Influence Factors (QoE IFs). In this work, we survey and review existing approaches to classify QoE IFs. Then, we present a new modular and extensible classification architecture. Finally, regarding the proposed classification, we evaluate some QoE estimation approaches to highlight the fact that categories do not affect in the same the user perception.
Authors Francisco Lozano, Mari Carmen Aguayo–Torres, Gerardo Gomez, Carlos Cardenas, Juana Baños
Over the Top video streaming services has grown very rapidly in recent years, with the emerge of diverse online video stores. One of the popular over the top services is Netflix. The significant increase of user data consumption by this type of services affects the performance of communications networks, and operators need methods to estimate how well the network behaves. In this paper a network traffic analysis of Netflix is presented. The traffic study has been performed with diverse devices and access technologies. A model for quality of experience (QoE) evaluation, based on application performance metrics, has been applied to estimate Mean Opinion Score (MOS) by end users.
AuthorsRute C. Sofia (COPELABS, University Lusofona, Portugal)
This paper describes a software-based tool that tracks mobile node roaming and infers the time-to-handover as well as the preferential handover target, based on behavior inference solely derived from regular usage data captured in visited wireless networks. The paper presents the tool architecture; computational background for mobility estimation; operational guidelines concerning how the tool is being used to track several aspects of roaming behavior in the context of wireless networks. The preferential target selection is validated against real traces, in terms of prediction accuracy.
AuthorsOussama Ghorbel (CES Research Unit, National School of Engineers of Sfax, Tunisia); Mohamed Wassim Jmal (CES Laboratory & National School of Engineering, Sfax, Tunisia); Mohamed Abid (ENIS Institute, Tunisia); Hichem Snoussi (University of Technology of Troyes, France)
In this paper, we propose Distributed and Efficient One-class Outliers Detection Classifier (DEOODC) based on Mahalanobis Kernel (MK) used for outlier detection in wireless sensor networks (WSNs). For this case, the task amounts to create a useful model based on KPCA to recognize data as normal or outliers using nonlinear function. On account of the attractive capability, KPCA-based methods have been extensively investigated, and have showed excellent performance. Within this setting, we propose Kernel PCA based Mahalanobis kernel as a new outlier detection method using Mahalanobis distance to implicitly calculate the mapping of the data points in the feature space so that we can separate outlier points from normal pattern of data distribution. The use of KPCA based on real word data are reported showing that the proposed method performs better in finding outliers in WSNs when compared to the One-Class SVM detection approach.
AuthorsMiguel Lopez and Francisco Pelayo (University of Granada, Spain)
Modern BCIs are non-invasive, wireless, wearable and EEG-based systems capable to transduce brain signals into cognitive information and stream it out in form of data. BCIs have rarely been considered as part of the network. Thus, data communication approaches have not even tried. The consequence is a suboptimal communication in terms of performance, usability and reliability. In this paper we present BCI as a paradigm in Wireless Body Area Networks (WBANs) that interfaces multisensorial sources with the user brain. The BCI-WBAN concept treats cognitive processes as communication end-points in which sensorial information is consumed by cognitive processes. In the context of WBAN, BCIs implement the functionalities of the lower layers of communication open system: signal transduction into data, access control to the physical and cognitive media and data transmission. The BCI-WBAN paradigm extends the scope of WBAN from mere biosignal sensing by adding interpretation of neural correlates of cognitive information.
- Lunch 13:00-14:00
AuthorsEnrica Zola (Technical University of Catalonia, Spain); Francisco Barcelo–Arroyo (Universitat Politecnica de Catalunya (UPC), Spain); Israel Martin–Escalona (Technical University of Catalonia, Spain)
Knowledge of the physical location of the nodes is known to improve performance in wireless networks. This is especially true in MANETs, where routing protocols face a continuously changing topology. In the past, routing protocols such as Beacon-Less Routing (BLR) used the location information of the nodes to build the forwarding path in a distributed manner. In this work, we borrow the forwarding approach in BLR and apply it in the route discovery process of DYMO. Under the assumption of nodes knowing their own location, the receiving nodes will compute a delay. The node with lower delay will resend the RREQ first. The rest of forwarding nodes will drop the RREQ once they receive this first RREQ. Thus the best forwarding node is selected in a distributed manner. This modification is expected to reduce the amount of RREQs circulating in the network, lessening the routing overhead.
AuthorsSusana Perez and Josemari Cabero (TECNALIA, Spain); Iñigo Urteaga (Stony Brook University, USA)
This paper proposes the HURRy (HUman Routines used for Routing) protocol, which infers and benefits from the social behaviour of nodes in disruptive networking environments. HURRy incorporates the contact duration to the information retrieved from historical encounters among neighbours, so that smarter routing decisions can be made. The specification of HURRy is based on the outcomes of a thorough experiment, which highlighted the importance of distinguishing between short and long contacts and deriving mathematical relations in order to optimally prioritize the available routes to a destination. HURRy introduces a novel and more meaningful rating system to evaluate the quality of each contact and overcome the limitations of other routing approaches in social environments.
AuthorsMohamed Ahmed M. Hail (University of Lübeck, Germany); Marica Amadeo and Antonella Molinaro (University Mediterranea of Reggio Calabria, Italy); Stefan Fischer (University of Lübeck, Germany)
Information-Centric Networking (ICN) is a communication paradigm for the future Internet that matches the pattern of information-oriented applications and provides in-network caching. Thanks to such properties, ICN has been recently considered as a solution for the IoT. However, IoT shows challenging features: many devices are resource-constrained and applications usually originate transient information. As a consequence, ICN-IoT solutions requires new design choices. Among them, it is crucial understanding if constrained devices can successfully implement ICN caching and forwarding functionalities, and what are the delivery performance. To provide hints in such a context, in this paper we evaluate the performance of different caching/replacement policies and forwarding strategies in an ICN-IoT wireless network. A novel forwarding scheme is also defined to reduce the load on constrained devices. Simulation results show that the devised caching and forwarding operations are beneficial for delivery performance: they reduce the traffic volume and save the devices' energy resources.
AuthorsLuis F Urquiza–Aguiar (Universitat Politècnica de Catalunya (UPC), Spain); Carolina Tripp–Barba (Universidad Autonoma de Sinaloa, Mexico); José Estrada–Jiménez (Escuela Politécnica Nacional (EPN), Ecuador); Mónica Aguilar Igartua (Universitat Politècnica de Catalunya (UPC), Spain)
This paper offers an empirical study of the impact of the way in how the distance between two nodes is measured by a geographical routing protocol for VANETs to take its forwarding decision. The distance equations used in this work are obtained by setting the order parameter of the Minkowski distance function. Simulation results from a realistic city topology indicate that the use of dominant distance can improve some classical performance metrics like the packet delivery ratio, average number of hops or end-to-end packet delay.
AuthorsBernd Meijerink and Geert Heijenk (University of Twente, The Netherlands)
There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is needed to efficiently transmit data to more than one receiver. It is important PPDR users can switch seamlessly between wireless networks. This paper describes improvements to multicast in Fast handovers for Proxy Mobile IPv6 (PFMIPv6) to provide seamless mobility to its users. We also identify and explore the specific problems stemming from difference in end-to-end delay between the old and new path during handovers for multicast traffic. A novel mechanism to determine the delay difference between two paths in a PFMIPv6 system is described and an implementation of this system is evaluated. It is shown the proposed approach can prevent multicast packet loss during a handover.
- Break 15:45-16:15
AuthorsHela Limam (University of Tunis; SOIE-ISG, Tunisia); Jalel Akaichi (University of Tunis, Tunisia)
Many works were interested in studying the ways of organizing Web services into communities which allowed the onset of a variety of definitions and models. The new paradigm , launched by the use of Web services communities models was adopted by users in various fields such as those related to marketing, commerce, health care, etc. However, the proposed conceptual models suffer from dispersed points of view that have to be unified in order to offer generic conceptual support for experts and clerical users. The purpose of this work is to propose a unified conceptual model able to unify different points of view through a generic UML description profile of Web services communities characteristics well adapted to new concepts imposed by the use of communities. Thanks to the proposed unified model, users will be able to build themselves their communities regardless the case of study involving Web services.
AuthorsCarlos Anastasiades and Torsten Ingo Braun (University of Bern, Switzerland)
Information-centric networking (ICN) addresses drawbacks of the Internet protocol, namely scalability and security. ICN is a promising approach for wireless communication because it enables seamless mobile communication, where intermediate or source nodes may change, as well as quick recovery from collisions. In this work, we study wireless multi-hop communication in Content-Centric Networking (CCN), which is a popular ICN architecture. We propose to use two broadcast faces that can be used in alternating order along the path to support multi-hop communication between any nodes in the network. By slightly modifying CCN, we can reduce the number of duplicate Interests by 93.4% and the number of collisions by 61.4%. Furthermore, we describe and evaluate different strategies for prefix registration based on overhearing. Strategies that configure prefixes only on one of the two faces can result in at least 27.3% faster data transmissions.
AuthorsSajeh Zairi (LIP2 Laboratory, Tunisia); Mezni Anis (University of Tunis El Manar, Tunisia); Belhassen Zouari (LIP2 Laboratory, University of Tunis El Manar, Tunisia)
The Control of energy consumption by sensor networks and the maximization of the sensor network lifetime are the most fundamental issues. Due to the variety of protocols dedicated to the different sensor's layers and the difficulty of a real network deployment, designers need some mechanisms and tools to validate the energy consumption and to observe its impact on the network's lifetime before deployment. In this context, we have proposed a modeling approach considering the global behavior of a sensor network and allowing the estimation of the network's energy consumption. This approach is based on the concept of components oriented modeling and the expressiveness of Colored Petri Nets (CPN). Thus, the global model representing sensor behavior is obtained by interfacing different models each one representing the behavior of a particular component of the sensor.
AuthorsSarwar Morshed and Geert Heijenk (University of Twente, The Netherlands)
Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The underlying TR modulation in TR-MAC provides faster synchronization and signal acquisition without requiring channel estimation and complex rake receiver in the receiver side. TR modulation also enables multiple access for a pair of nodes using different frequency offsets. This paper introduces an explicit expression that allows the TR-MAC protocol to minimize its energy consumption, depending on the experienced traffic load. Furthermore, an implementation of the protocol in the OMNeT++ simulator with MiXiM simulation framework is introduced, and analytical results introduced in  are verified by simulation results obtained using the simulator.
AuthorsMohamed–Lamine Messai (University of A. Mira Bejaia, Algeria); Hamida Lagraa Seba (Université Lyon1 & EZUS-Lyon, France); Makhlouf Aliouat (Ferhat Abbes Setif 1 University, Algeria)
In Wireless Sensor Networks (WSNs), the clustering is the suitable topology to save the energy of sensor nodes. In this paper, we provide a new secured cluster formation by proposing a symmetric key management scheme for hierarchical WSNs. Our scheme is called EAHKM (Energy Aware Hierarchical Key Management in WSNs). EAHKM needs the pre-distribution of only three keys in each sensor nodes before deployment, and it ensures a secure clusters formation after deployment. EAHKM assures the establishment of a pairwise key between each sensor node and its cluster head, thus the establishment of a broadcast key in each cluster in the network. Through simulation results, EAHKM provides an energy-efficient, flexible and scalable solution to the key management problem in hierarchical WSNs, and it presents a good resilience to node compromising attacks than other hierarchical key management schemes.
- Closing Ceremony 18:00-18:15