[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3267129acmconferencesBook PagePublication PagesmswimConference Proceedingsconference-collections
Q2SWinet'18: Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
ACM2018 Proceeding
  • General Chair:
  • Peter Müller,
  • Program Chair:
  • Ahmed Mostefaoui
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems Montreal QC Canada 28 October 2018- 2 November 2018
ISBN:
978-1-4503-5963-4
Published:
25 October 2018
Sponsors:

Reflects downloads up to 14 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2018 ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2018), to be held at Montreal (Canada). As with the previous seven editions of the Q2SWinet symposium series, this year's symposium continues its tradition being a meeting point and a forum for exchanging ideas, discussing solutions, and sharing experiences among researchers, professionals, and application developers, both from industry and academia on general issues related to QoS and security in wireless and mobile networking and computing.

The call for paper attracted submissions from North-America (USA and Canada), South-America (Brazil, etc.), Europe (France, Portugal, etc.), Asia (China, Singapore, etc.) and Africa, which demonstrates the World-Wide range of the symposium. The program committee reviewed all papers and accepted 18 technical papers for presentation, which represents an acceptance ratio of 29%.

Skip Table Of Content Section
SESSION: Security in IoT Networks
research-article
Detecting Forwarding Misbehavior In Clustered IoT Networks

Internet of Things (IoT) devices in clustered wireless networks can be compromised by compromising the gateway which they are associated with. In such scenarios, an adversary who has compromised the gateway can affect the network's performance by ...

research-article
TTBA: An RFID-based Tracking System for Two Basic Actions in Free-Weight Exercises

People have been spending much time on free-weight exercises that can strengthen the muscles, connective tissues and tendons. To decrease the risk of injury and reap the benefit of free-weight exercises, a monitoring system which helps users exercise ...

research-article
Secure Management of Autonomous Vehicle Platooning

Platooning is an emerging Intelligent Transportation Systems (ITS) application that can have a huge impact on road traffic. It allows vehicles to travel in a convoy manner, very close to each other with constant speeds and gaps.

It uses Vehicular Ad hoc ...

research-article
A Novel Proactive Handover Scheme for Achieving Energy-Efficient Vehicular Networks

Recently, the Vehicular Network (VN) has gained a lot of attention from researchers around the world. By allowing wireless communication, VNs enable information exchanging among vehicles, which in turn let drivers become more aware of their surrounding ...

SESSION: Wireless Communications
research-article
Actor-Oriented Design Patterns for Performance Modeling of Wireless Communications in Cyber-physical Systems

The work at hand proposes a set of modeling recipes to address the aggressive development time window of current and future wireless communications in cyber-physical systems. These systems pose a significant challenge in meeting Time-to-Market due to ...

research-article
The Analysis of Synchronous All-to-All Communication Protocols for Wireless Systems

Many applications running over low-power and lossy wireless networks and wireless sensor networks (WSNs) rely heavily on a number of all-to-all communication primitives for services such as data aggregation, voting and consensus. Starting with the Chaos ...

research-article
Interference Comparison between OFDM & FH-OFDM Systems

Orthogonal Frequency Division Multiplexing (OFDM) is a common modulation technique that is being used in many of modern wireless communications and standards due to its excellent spectral efficiency and immunity to multipath interference in fading ...

SESSION: Protocols
research-article
On TCP Simulation Fidelity in ns-2

The Network Simulator version 2, also known as ns-2, is a widely used platform for network and protocol performance evaluation. Over the years it has benefited from numerous studies in improving its simulation fidelity. Nevertheless, this study ...

research-article
A Service Slicing Strategy with QoS for LTE-based Cellular Networks

This paper introduces a service slicing strategy for managing Quality of Service in LTE-based cellular networks by managing resource blocks in the uplink direction based on resource pooling. An algorithm is devised to optimize and allocate resource ...

research-article
Local Topology Aware Probabilistic Routing

Gossip-based packet forwarding is used in unstructured networks is to reduce traffic overhead in dense networks and to minimize early gossip termination in sparse networks. Unlike in flooding, where packets are forwarded to all the neighbors, in Gossip-...

SESSION: Data Management in IoT Systems
research-article
MQTT+: Enhanced Syntax and Broker Functionalities for Data Filtering, Processing and Aggregation

In the last few years, the Message Queueing Telemetry Transport (MQTT) publish/subscribe protocol emerged as the de facto standard communication protocol for IoT, M2M and wireless sensor networks applications. Such popularity is mainly due to the ...

research-article
CEEPS4IoT: Context-aware Energy Efficient Publish/Subscribe for Internet of Things

Data collection in Internet of Things is greatly impaired by the redundant or unwanted reportings provided by sensors deployed in urban area. The service provider/ application is typically unaware of an objects context while collecting its readings. ...

research-article
Athena: A Knowledge Fusion Algorithm for the Internet of Things

Internet of things (IoT) is envisioned as the interconnection of the Internet with sensing and actuating devices. IoT systems are usually designed to collect massive amounts of data from multiple and possibly conflicting sources. Nevertheless, data must ...

SESSION: Wireless Sensors Networks
research-article
Building a Coverage Hole-free Communication Tree

Wireless networks are present everywhere but their management can be tricky since their coverage may contain holes even if the network is fully connected. In this paper we propose an algorithm that can build a communication tree between nodes of a ...

research-article
Optimal Transmission Thresholds for QoS Guarantees in WSNs

In Wireless Sensor Networks (WSNs), each node typically transmits several control and data packets in a contention fashion to the sink. In this work, we mathematically analyze and study three unscheduled transmission schemes for control packets in a ...

research-article
Evaluation of Channels Blacklists in TSCH Networks with Star and Tree Topologies

The Time-Slotted Channel Hopping (TSCH) mode, defined by the IEEE 802.15.4e protocol, aims to reduce the effects of narrowband interference and multipath fading on some channels through the frequency hopping method. To work satisfactorily, this method ...

research-article
An Energy-Efficient Node Deployment Strategy for Energy Harvesting-aided Wireless Sensor Networks

Due to the limited battery capacity, energy is the most crucial constraint for improving the performance of widely adopted Wireless Sensor Networks (WSNs). Hence, conserving energy and improving the energy efficiency are important in designing a ...

SESSION: Video Networks
research-article
Virtualized End-to-End Management Functions for Aggregated Control of Video Traffic Flows

The paper describes the management and control (M&C) functions of various network nodes in an end-to-end rate-adaptive video transport system. Mobile user devices download video clips by sharing the underlying network path from an ingress node. At the ...

research-article
Joint Design of WiFi Mesh Network for Video Surveillance Application

The ability to transmit high volumes of data over a long distance makes WiFi mesh networks an ideal transmission solution for remote video surveillance. Instead of independently manipulating the node deployment, channel and interface assignment, and ...

Contributors
  • IBM Research - Zurich
  • University of Franche-Comté

Index Terms

  1. Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
            Index terms have been assigned to the content through auto-classification.
            Please enable JavaScript to view thecomments powered by Disqus.

            Recommendations

            Acceptance Rates

            Overall Acceptance Rate 46 of 131 submissions, 35%
            YearSubmittedAcceptedRate
            Q2SWinet '22471634%
            Q2SWinet '14301447%
            Q2SWinet '10541630%
            Overall1314635%