skip to main content
10.1145/2815317acmconferencesBook PagePublication PagesmswimConference Proceedingsconference-collections
Q2SWinet '15: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MSWiM'15: 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems Cancun Mexico November 2 - 6, 2015
ISBN:
978-1-4503-3757-1
Published:
02 November 2015
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2015 ACM Symposium on QoS and Security for Wireless and Mobile Networks -- Q2SWinet'15. This year's symposium continues its tradition of being the premier forum for exchanging ideas, discussing solutions, and sharing experiences among researchers, professionals, and application developers, both from industry and academia. As with the previous editions of the Q2SWinet symposium series, the scope of this year's symposium will remain on general issues related to QoS and security in wireless and mobile networks networking and computing.

The call for papers attracted several submissions from Asia, Canada, Europe, Africa, and the United States. The program committee accepted 25 full papers and 2 short papers that cover a variety of topics, including next generation access control models, engineering and analysis techniques for QoS, and security administration. We hope that these proceedings will serve as a valuable reference for researchers and developers in QoS, security and wireless networking.

Skip Table Of Content Section
SESSION: Emerging Trends in Mobile Systems I
research-article
An Enhanced Quality of Context Evaluating Approach in the e-Health Sensor Platform

This paper presents an enhanced approach to the evaluation of Quality of Context (QoC) parameters in a ubiquitous Ambient Assisted Living (AAL) e-Health platform, supporting the care of people with special needs (elderly or with health problems) thus ...

research-article
Recommendations for IPsec Configuration on Homenet and M2M Devices

Although there is a strong need to deploy secure communications in home networks and for Machine-to-Machine (M2M) environment, to our knowledge the impact of authenticated encryption migration has not been evaluated yet. As the security performance ...

SESSION: Security in Wireless Networks I
research-article
Autonomic Management of Replica Voting based Data Collection Systems in Malicious Environments

We describe a model-based approach to QoS management in a replica voting based data collection system. The voting among replicated data collection devices achieves trusted data delivery to the end-user in a hostile environment: such as data corruptions ...

research-article
Spraying Techniques for Securing Key Exchange in Large Ad-hoc Networks

Massive ad-hoc mobile networks with fluctuating topologies, as is expected for the Internet of Things (IoT), vehicular networks (VANETs), and others, allow for new solutions for the initial key exchange problem. Spraying data on multiple paths is a ...

research-article
On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds

Common anonymizers focus only on a part of the users' personal identification information, namely on the network addresses of the communicating parties. In the light of the entire communication stack, even if the network addresses are perfectly ...

SESSION: QoS and QoE for Wireless Networks and Systems I
research-article
A Proxy Gateway Solution to Provide QoS in Tactical Networks and Disaster Recovery Scenarios

Many important public services, such as security and public health, as well as the modern tactical military scenarios, rely on Service-oriented Architectures (SoAs) and commercial off-the-shelf (COTS) components to enable the quick development and ...

research-article
A Managing QoE Approach for Provisioning User Experience Aware Services Using SDN

Provision and delivery of services with quality is a classic research problem, however the computational resources available in the network infrastructure of providers are, usually, managed with conventional Quality of Service (QoS) parameters. This ...

research-article
Evaluation of Quality Service Voice over Internet Protocol in WiMAX Networks based on IP/MPLS Environment

A case study that allows the interconnection of a Wimax structure supported on a MPLS Core is proposed, in order to take advantage of the benefits that offers MPLS working together with traffic engineering, virtual private networks and with the Diffserv ...

SESSION: Emerging Trends in Mobile Systems II
research-article
Architectural Design of an Optimal Routed Network-based Mobility Management Function for SDN-based EPC Networks

4G/5G EPC over Network Functions Virtualization (NFV) complemented with Software Defined Networking (SDN) framework is envisioned to be a novel paradigm of network architecture that supports a variety of access technologies and solves growth challenges ...

research-article
OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks

High-quality simulation tools are crucial to evaluate the energy efficiency of applications and protocols for wireless sensor networks in the most realistic way. Sensor node emulators like Avrora are well-suited for homogeneous networks but can not cope ...

research-article
Can We Predict Future Link States in Wireless Smart Grid?

For rapid deployment and low cost installation, a wired electric power delivery network should be supported by a wireless information communication network, which is called a wireless smart grid in this paper. In a wireless smart grid, every time when ...

research-article
Sharing the Cost of Lunch: Energy Apportionment Policies

Energy consumption has become a hot topic in computer and communication technologies pinpointing the need to carefully analyse system efficiency. The energy consumption of a system is determined by the usage patterns of system components and complex ...

research-article
Inferring Smartphone Positions Based on Collecting the Environment's Response to Vibration Motor Actuation

Smartphones have become ubiquitous in recent years and offer many useful services to their users, such as notifications about incoming calls and messages, or news updates in real-time. These notifications however do not consider the current user's and ...

SESSION: QoS and QoE for Wireless Networks and Systems II
research-article
Location Assisted Coding (LAC): Embracing Interference in Free Space Optical Communications

As the number of wireless devices grows, the increasing demand for the shared radio frequency (RF) spectrum becomes a critical problem. Unlike wired communications in which, theoretically, more fibers can be used to accommodate the increasing bandwidth ...

research-article
Reliability Evaluation of Imperfect K-Terminal Stochastic Networks using Polygon-to Chain and Series-parallel Reductions

In this paper, we propose a mathematical model for determining the exact value of the reliability of Mobile Ad hoc (MANET) and Wireless Sensor (WSN) Networks which are considered in this research as a collection of Imperfect Stochastic Networks (ISN). ...

research-article
Bounding Degrees on RPL

RPL is an open routing protocol standardized by the ROLL group of IETF for constrained IP smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy Networks (LLNs). Unfortunately, RPL suffers from significant packet loss due ...

research-article
Performance Evaluation of the VB-TDMA Protocol for Long-term Tracking and Monitoring of Mobile Entities in the Outdoors

The Virtual Beacon-Time Division Multiple Access (VB-TDMA) communication protocol has been proposed in [12] for a growing class of applications which require GPS tracking of autonomous mobile entities in the outdoors, and the long-term continuous ...

poster
An Open Source Platform for Perceived Video Quality Evaluation

To ensure the best multimedia service quality in order to well address users' expectations, a new concept named Quality of Experience (QoE) has appeared. Two methods can be used to evaluate the user satisfaction, a subjective one and an objective one. ...

SESSION: Security in Wireless Networks II
research-article
Noah: Keyed Noise Flooding for Wireless Confidentiality

Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and ...

research-article
Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks

This paper addresses the general issue of securely transmitting captured images within constrained networks, as those of Wireless Multimedia Sensor Networks (WMSN)s. In particular, it focuses on handling transmission errors due either to unreliable ...

research-article
Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri Net

Security is a crucial problem for Wireless Mesh Networks (WMNs), and secure routing is a prerequisite for network security. Secure routing averts lots of network attacks. In this paper, a secure routing scheme called Single Trip Detection Mechanism (...

research-article
E-BIAS: A Pervasive EEG-Based Identification and Authentication System

Security systems using brain signals or Electroencephalography (EEG), is an emerging field of research. Brain signal characteristics such as chaotic nature and uniqueness, make it an appropriate information source to be used in security systems. In this ...

poster
QoS Management for WiFi MAC Layer Processing in the Cloud: Demo Description

We present a demo of Quality of Service Management for CloudMAC, which combines SDN with NFV for processing WLAN MAC layer management frames in the Cloud. With CloudMAC, enterprise WLANs can be managed in the cloud which enables simple support for ...

Contributors
  • IBM Research - Zurich
  • University of Bologna

Index Terms

  1. Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          Overall Acceptance Rate46of131submissions,35%
          YearSubmittedAcceptedRate
          Q2SWinet '22471634%
          Q2SWinet '14301447%
          Q2SWinet '10541630%
          Overall1314635%