It is our great pleasure to welcome you to the 2015 ACM Symposium on QoS and Security for Wireless and Mobile Networks -- Q2SWinet'15. This year's symposium continues its tradition of being the premier forum for exchanging ideas, discussing solutions, and sharing experiences among researchers, professionals, and application developers, both from industry and academia. As with the previous editions of the Q2SWinet symposium series, the scope of this year's symposium will remain on general issues related to QoS and security in wireless and mobile networks networking and computing.
The call for papers attracted several submissions from Asia, Canada, Europe, Africa, and the United States. The program committee accepted 25 full papers and 2 short papers that cover a variety of topics, including next generation access control models, engineering and analysis techniques for QoS, and security administration. We hope that these proceedings will serve as a valuable reference for researchers and developers in QoS, security and wireless networking.
Proceeding Downloads
An Enhanced Quality of Context Evaluating Approach in the e-Health Sensor Platform
- Débora Cabral Nazário,
- Adroaldo de Andrade,
- Lucas Borges,
- Willian Romeu Ramos,
- José Leomar Todesco,
- Mário Antônio Ribeiro Dantas
This paper presents an enhanced approach to the evaluation of Quality of Context (QoC) parameters in a ubiquitous Ambient Assisted Living (AAL) e-Health platform, supporting the care of people with special needs (elderly or with health problems) thus ...
Recommendations for IPsec Configuration on Homenet and M2M Devices
Although there is a strong need to deploy secure communications in home networks and for Machine-to-Machine (M2M) environment, to our knowledge the impact of authenticated encryption migration has not been evaluated yet. As the security performance ...
Autonomic Management of Replica Voting based Data Collection Systems in Malicious Environments
We describe a model-based approach to QoS management in a replica voting based data collection system. The voting among replicated data collection devices achieves trusted data delivery to the end-user in a hostile environment: such as data corruptions ...
Spraying Techniques for Securing Key Exchange in Large Ad-hoc Networks
Massive ad-hoc mobile networks with fluctuating topologies, as is expected for the Internet of Things (IoT), vehicular networks (VANETs), and others, allow for new solutions for the initial key exchange problem. Spraying data on multiple paths is a ...
On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds
Common anonymizers focus only on a part of the users' personal identification information, namely on the network addresses of the communicating parties. In the light of the entire communication stack, even if the network addresses are perfectly ...
A Proxy Gateway Solution to Provide QoS in Tactical Networks and Disaster Recovery Scenarios
Many important public services, such as security and public health, as well as the modern tactical military scenarios, rely on Service-oriented Architectures (SoAs) and commercial off-the-shelf (COTS) components to enable the quick development and ...
A Managing QoE Approach for Provisioning User Experience Aware Services Using SDN
Provision and delivery of services with quality is a classic research problem, however the computational resources available in the network infrastructure of providers are, usually, managed with conventional Quality of Service (QoS) parameters. This ...
Evaluation of Quality Service Voice over Internet Protocol in WiMAX Networks based on IP/MPLS Environment
A case study that allows the interconnection of a Wimax structure supported on a MPLS Core is proposed, in order to take advantage of the benefits that offers MPLS working together with traffic engineering, virtual private networks and with the Diffserv ...
Architectural Design of an Optimal Routed Network-based Mobility Management Function for SDN-based EPC Networks
4G/5G EPC over Network Functions Virtualization (NFV) complemented with Software Defined Networking (SDN) framework is envisioned to be a novel paradigm of network architecture that supports a variety of access technologies and solves growth challenges ...
OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks
High-quality simulation tools are crucial to evaluate the energy efficiency of applications and protocols for wireless sensor networks in the most realistic way. Sensor node emulators like Avrora are well-suited for homogeneous networks but can not cope ...
Can We Predict Future Link States in Wireless Smart Grid?
For rapid deployment and low cost installation, a wired electric power delivery network should be supported by a wireless information communication network, which is called a wireless smart grid in this paper. In a wireless smart grid, every time when ...
Sharing the Cost of Lunch: Energy Apportionment Policies
Energy consumption has become a hot topic in computer and communication technologies pinpointing the need to carefully analyse system efficiency. The energy consumption of a system is determined by the usage patterns of system components and complex ...
Inferring Smartphone Positions Based on Collecting the Environment's Response to Vibration Motor Actuation
Smartphones have become ubiquitous in recent years and offer many useful services to their users, such as notifications about incoming calls and messages, or news updates in real-time. These notifications however do not consider the current user's and ...
Location Assisted Coding (LAC): Embracing Interference in Free Space Optical Communications
As the number of wireless devices grows, the increasing demand for the shared radio frequency (RF) spectrum becomes a critical problem. Unlike wired communications in which, theoretically, more fibers can be used to accommodate the increasing bandwidth ...
Reliability Evaluation of Imperfect K-Terminal Stochastic Networks using Polygon-to Chain and Series-parallel Reductions
In this paper, we propose a mathematical model for determining the exact value of the reliability of Mobile Ad hoc (MANET) and Wireless Sensor (WSN) Networks which are considered in this research as a collection of Imperfect Stochastic Networks (ISN). ...
Bounding Degrees on RPL
RPL is an open routing protocol standardized by the ROLL group of IETF for constrained IP smart objects. It is one of the emergent protocols dedicated for Low Power and Lossy Networks (LLNs). Unfortunately, RPL suffers from significant packet loss due ...
Performance Evaluation of the VB-TDMA Protocol for Long-term Tracking and Monitoring of Mobile Entities in the Outdoors
The Virtual Beacon-Time Division Multiple Access (VB-TDMA) communication protocol has been proposed in [12] for a growing class of applications which require GPS tracking of autonomous mobile entities in the outdoors, and the long-term continuous ...
An Open Source Platform for Perceived Video Quality Evaluation
To ensure the best multimedia service quality in order to well address users' expectations, a new concept named Quality of Experience (QoE) has appeared. Two methods can be used to evaluate the user satisfaction, a subjective one and an objective one. ...
Noah: Keyed Noise Flooding for Wireless Confidentiality
Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and ...
Secure and Error Resilient Approach for Multimedia Data Transmission in Constrained Networks
This paper addresses the general issue of securely transmitting captured images within constrained networks, as those of Wireless Multimedia Sensor Networks (WMSN)s. In particular, it focuses on handling transmission errors due either to unreliable ...
Secure Routing against Wormhole Attack and Its Formal Verification based on Timed Colored Petri Net
Security is a crucial problem for Wireless Mesh Networks (WMNs), and secure routing is a prerequisite for network security. Secure routing averts lots of network attacks. In this paper, a secure routing scheme called Single Trip Detection Mechanism (...
E-BIAS: A Pervasive EEG-Based Identification and Authentication System
Security systems using brain signals or Electroencephalography (EEG), is an emerging field of research. Brain signal characteristics such as chaotic nature and uniqueness, make it an appropriate information source to be used in security systems. In this ...
QoS Management for WiFi MAC Layer Processing in the Cloud: Demo Description
We present a demo of Quality of Service Management for CloudMAC, which combines SDN with NFV for processing WLAN MAC layer management frames in the Cloud. With CloudMAC, enterprise WLANs can be managed in the cloud which enables simple support for ...
Index Terms
- Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Q2SWinet '22 | 47 | 16 | 34% |
Q2SWinet '14 | 30 | 14 | 47% |
Q2SWinet '10 | 54 | 16 | 30% |
Overall | 131 | 46 | 35% |