It is our great pleasure to welcome you to the 2018 ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2018), to be held at Montreal (Canada). As with the previous seven editions of the Q2SWinet symposium series, this year's symposium continues its tradition being a meeting point and a forum for exchanging ideas, discussing solutions, and sharing experiences among researchers, professionals, and application developers, both from industry and academia on general issues related to QoS and security in wireless and mobile networking and computing.
The call for paper attracted submissions from North-America (USA and Canada), South-America (Brazil, etc.), Europe (France, Portugal, etc.), Asia (China, Singapore, etc.) and Africa, which demonstrates the World-Wide range of the symposium. The program committee reviewed all papers and accepted 18 technical papers for presentation, which represents an acceptance ratio of 29%.
Proceeding Downloads
Detecting Forwarding Misbehavior In Clustered IoT Networks
Internet of Things (IoT) devices in clustered wireless networks can be compromised by compromising the gateway which they are associated with. In such scenarios, an adversary who has compromised the gateway can affect the network's performance by ...
TTBA: An RFID-based Tracking System for Two Basic Actions in Free-Weight Exercises
People have been spending much time on free-weight exercises that can strengthen the muscles, connective tissues and tendons. To decrease the risk of injury and reap the benefit of free-weight exercises, a monitoring system which helps users exercise ...
Secure Management of Autonomous Vehicle Platooning
- Fábio Gonçalves,
- Bruno Ribeiro,
- Vadym Hapanchak,
- Sara Barros,
- Oscar Gama,
- Paulo Araújo,
- Maria João Nicolau,
- Bruno Dias,
- Joaquim Macedo,
- António Costa,
- Alexandre Santos
Platooning is an emerging Intelligent Transportation Systems (ITS) application that can have a huge impact on road traffic. It allows vehicles to travel in a convoy manner, very close to each other with constant speeds and gaps.
It uses Vehicular Ad hoc ...
A Novel Proactive Handover Scheme for Achieving Energy-Efficient Vehicular Networks
Recently, the Vehicular Network (VN) has gained a lot of attention from researchers around the world. By allowing wireless communication, VNs enable information exchanging among vehicles, which in turn let drivers become more aware of their surrounding ...
Actor-Oriented Design Patterns for Performance Modeling of Wireless Communications in Cyber-physical Systems
The work at hand proposes a set of modeling recipes to address the aggressive development time window of current and future wireless communications in cyber-physical systems. These systems pose a significant challenge in meeting Time-to-Market due to ...
The Analysis of Synchronous All-to-All Communication Protocols for Wireless Systems
Many applications running over low-power and lossy wireless networks and wireless sensor networks (WSNs) rely heavily on a number of all-to-all communication primitives for services such as data aggregation, voting and consensus. Starting with the Chaos ...
Interference Comparison between OFDM & FH-OFDM Systems
Orthogonal Frequency Division Multiplexing (OFDM) is a common modulation technique that is being used in many of modern wireless communications and standards due to its excellent spectral efficiency and immunity to multipath interference in fading ...
On TCP Simulation Fidelity in ns-2
The Network Simulator version 2, also known as ns-2, is a widely used platform for network and protocol performance evaluation. Over the years it has benefited from numerous studies in improving its simulation fidelity. Nevertheless, this study ...
A Service Slicing Strategy with QoS for LTE-based Cellular Networks
This paper introduces a service slicing strategy for managing Quality of Service in LTE-based cellular networks by managing resource blocks in the uplink direction based on resource pooling. An algorithm is devised to optimize and allocate resource ...
Local Topology Aware Probabilistic Routing
Gossip-based packet forwarding is used in unstructured networks is to reduce traffic overhead in dense networks and to minimize early gossip termination in sparse networks. Unlike in flooding, where packets are forwarded to all the neighbors, in Gossip-...
MQTT+: Enhanced Syntax and Broker Functionalities for Data Filtering, Processing and Aggregation
In the last few years, the Message Queueing Telemetry Transport (MQTT) publish/subscribe protocol emerged as the de facto standard communication protocol for IoT, M2M and wireless sensor networks applications. Such popularity is mainly due to the ...
CEEPS4IoT: Context-aware Energy Efficient Publish/Subscribe for Internet of Things
Data collection in Internet of Things is greatly impaired by the redundant or unwanted reportings provided by sensors deployed in urban area. The service provider/ application is typically unaware of an objects context while collecting its readings. ...
Athena: A Knowledge Fusion Algorithm for the Internet of Things
Internet of things (IoT) is envisioned as the interconnection of the Internet with sensing and actuating devices. IoT systems are usually designed to collect massive amounts of data from multiple and possibly conflicting sources. Nevertheless, data must ...
Building a Coverage Hole-free Communication Tree
Wireless networks are present everywhere but their management can be tricky since their coverage may contain holes even if the network is fully connected. In this paper we propose an algorithm that can build a communication tree between nodes of a ...
Optimal Transmission Thresholds for QoS Guarantees in WSNs
- Edgar Romo-Montiel,
- Mario Eduardo Rivero-Ángeles,
- Herón Molina-Lozano,
- Gerardo Rubino,
- Ricardo Menchaca-Méndez,
- Rolando Menchaca-Méndez
In Wireless Sensor Networks (WSNs), each node typically transmits several control and data packets in a contention fashion to the sink. In this work, we mathematically analyze and study three unscheduled transmission schemes for control packets in a ...
Evaluation of Channels Blacklists in TSCH Networks with Star and Tree Topologies
The Time-Slotted Channel Hopping (TSCH) mode, defined by the IEEE 802.15.4e protocol, aims to reduce the effects of narrowband interference and multipath fading on some channels through the frequency hopping method. To work satisfactorily, this method ...
An Energy-Efficient Node Deployment Strategy for Energy Harvesting-aided Wireless Sensor Networks
Due to the limited battery capacity, energy is the most crucial constraint for improving the performance of widely adopted Wireless Sensor Networks (WSNs). Hence, conserving energy and improving the energy efficiency are important in designing a ...
Virtualized End-to-End Management Functions for Aggregated Control of Video Traffic Flows
The paper describes the management and control (M&C) functions of various network nodes in an end-to-end rate-adaptive video transport system. Mobile user devices download video clips by sharing the underlying network path from an ingress node. At the ...
Joint Design of WiFi Mesh Network for Video Surveillance Application
The ability to transmit high volumes of data over a long distance makes WiFi mesh networks an ideal transmission solution for remote video surveillance. Instead of independently manipulating the node deployment, channel and interface assignment, and ...
Index Terms
- Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Q2SWinet '22 | 47 | 16 | 34% |
Q2SWinet '14 | 30 | 14 | 47% |
Q2SWinet '10 | 54 | 16 | 30% |
Overall | 131 | 46 | 35% |