Mobile users can open program in new tab for better viewing.

Open program in new tab

Day 1 17/11/2020
Room #1

Opening & Welcome Remarks 09:00 - 09:15

General Chair: Jalel Ben Othman. TPC Co-chairs: Moayad Aloqaily, Kobbane Abdellatif, Feng Yan

Tutorial: Resource Scheduling in Cloud-Radio Access Networks 09:15 - 10:00

Dr. Sahar Hoteit, Paris SACLAY University/ CentraleSupélec

Break 10:00 - 10:15

Small Coffee Break

Session 01 10:15 - 12:30

Paper Presentations 1
10:15 - 10:45
Cost-Effective Controller Placement Problem for Software Defined Multihop Wireless Networks

In an SDN architecture, solving the controller placement problem (CPP) in a multi-controller environment plays an important role on network performance in terms of delay, reliability, control overhead, etc. In this architecture, control overhead, referred to as the network cost in this paper, consists of controller-device communications to discover the network topology, and exchange configurations and set up flow tables as well as inter-controller communications, if needed, to synchronize different network views and achieve the global view of the network. In software defined multihop wireless networking (SDMWN), because of the capacity limitation and the effect of interference on wireless links, and an in-band architecture in some types of networks to exchange both data and control traffic, it is important to solve the CPP while minimizing control overhead to reduce energy consumption, have lower packet losses and improve reliability. In this paper, the objective is to solve the CPP in SDMWN while minimizing the number of required control packets to be exchanged in the control plane. The novelty of our work is that we consider the characteristics of SDMWN and the capacity of wireless links to solve the CPP and select routes among network devices and controllers in the network. Our results demonstrate the impact of different factors such as the number of controllers, the capacity of wireless links and the arrival rate of new flows in devices on control overhead in SDMWN.
Authors: Afsane Zahmatkesh (Carleton University), Thomas Kunz (Carleton University), Chung-Horng Lung (Carleton University),
Hide Authors & Abstract

Show Authors & Abstract
10:45 - 11:15
Analysis and performance of topology inference in mobile ad hoc networks

This paper examines the performance of a strategy for mapping the topology of a mobile ad hoc network (MANET), providing insight for network defenders to understand how much information an adversary could discern about a target network. Using this topology inference strategy, a network eavesdropper collects frame emission start- and end-times and uses these to detect the presence of link layer acknowledgements between devices and ultimately constructs a network topology. We show how the performance of this simple strategy varies as a function of the amount of data collected by the eavesdropper over time, the size of the target network, the speed of the nodes, and the nodes’ data generation rate. We derive analytical results that allow for the rapid computation of expected true positive rate and false positive rate for topology inference in a MANET; these are compared against simulation results. The analytical results are used to derive a sensible window of observation over which to perform inference, with guidance on when to discard stale data. The results are also used to recommend strategies for network defenders to frustrate the performance of an adversary’s network inference.
Authors: David Brown (Defence R&D Canada), Mazda Salmanian (DRDC), Tricia Willink (Defence R&D Canada),
Hide Authors & Abstract

Show Authors & Abstract
11:15 - 11:45
Model-based and Machine Learning Approaches for Designing Caching and Routing Algorithms

In this paper, we compare and contrast model-based and machine learning approaches for designing caching and routing strategies to improve cache network performance (e.g., delay, hit rate). We first outline the key principles used in the design of model-based strategies and discuss the analytical results and bounds obtained for these approaches. By conducting experiments on real- world traces and networks, we identify the interplay between content popularity skewness and request stream correlation as an important factor affecting cache performance. With respect to routing, we show that the main factors impact- ing performance are alternate path routing and content search. We then discuss the applicability of multiple machine learning models, specifically reinforcement learning, deep learning, transfer learning and probabilistic graphical models for the caching and routing problem.
Authors: Anand Seetharam (Binghamton University), Adita Kulkarni (Binghamton University),
Hide Authors & Abstract

Show Authors & Abstract
11:45 - 12:30
Flexibility of Decentralized Energy Restoration in WSNs

Wireless Rechargeable Sensor Networks (WSN) using a mobile charger have become more and more popular thanks to the advances in wireless power transfer and battery material. The strategy followed by the charger to decide which sensor to be recharged next, is considered effective if only few sensing holes exist at any time, and their duration is short-lived. Ideally, the strategy will allow the system to be immortal; that is, all sensors are operational at all times. A recharging strategy is said to be flexible if it is effective for a wide range of parameters (i.e., for different applications). In this paper, we analyze a simple decentralized recharging strategy which is based on local learning, operates without any a-priori knowledge of the network, has small memory requirements, and uses only local communication. We study the effectiveness and flexibility of such a technique under a variety of ranges of the network parameters, showing its applicability to various contexts. We focus on three classes of applications that differ in network size (number of sensors), level of sensitivity of collected data, transmission rate, battery capacity, and type of mobile charger used to replenish energy. Our experiments show that in all those different settings, this simple local learning strategy is highly effective, achieving total immortality or near immortality in all cases.
Authors: Osama Aloqaily (University Of Ottawa),
Hide Authors & Abstract

Show Authors & Abstract

Lunch Break 12:30 - 13:30

Keynote 1: The Role of Intelligence in 5G and Beyond: Thoughts and Discussions 13:30 - 14:30

Prof. Shiwen Mao, IEEE Fellow, Auburn University

Session 02 14:30 - 16:00

15:00 - 15:20
Vehicle Software Update Over ICN Architectures

The Internet Protocol (IP) architecture could not fully sat- isfy Vehicular Ad-hoc Networks (VANETs) needed eciency due to the dynamic topology and high mobility in VANETs. This paper presents a technique to update the software of Electronic Control Units (ECUs) in a vehicle using Information Centric Network (ICN) architecture. The proposed technique replaces Flashing Over The Air (FOTA) using IP with FOTA using ICN. The importance of FOTA is illustrated as well as the impact of applying the ICN architecture on VANETs. Through our experiments, we compare between the known FOTA over IP and newly introduced FOTA technique over ICN.
Authors: Ali Elgammal (Nile University, Valeo Egypt), Mena Safwat (Nile University, Valeo Egypt), Wael Badawy (Badr University), Eslam G. AbdAllah (Concordia University of Edmonton), Marianne A. Azer (Nile University), Changcheng Huang (Carleton University),
Hide Authors & Abstract

Show Authors & Abstract
15:20 - 16:40
An IoT-based Non-Invasive Diabetics Monitoring System for Crucial Conditions

Diabetes is among the major chronic disease around the world since the Glucose level could change drastically and lead to critical conditions reaching to death sometimes. To avoid this, diabetes patient are always advised to track their glucose level at least three times a day. Fingertip pricking - as the traditional method for glucose level tracking - leads patients to be distress and it might infect the skin. In some cases, tracking the glucose level might be a hard job especially if the patient is a child. In this manuscript, we present an optimum solution to this drawback by adopting the Wireless Sensor Network (WSN)-based non-invasive strategies. Near-Infrared (NIR) -as an optical method of the non-invasive technique - has been adopted to help diabetic patients in continuously monitoring their blood without pain. The proposed solution will alert the patients' parents or guardians of their situation when they about to reach critical conditions specially at night by sending alarms and notifications by Short Messages (SMS) along with the patients current location to up to three people.
Authors: Safa Otoum (Zayed University), Hermon Yehdego (CTI- Zayed University), Omar Alfandi (Zayed University),
Hide Authors & Abstract

Show Authors & Abstract
Day 2 18/11/2020
Room #1

Session 01 09:00 - 12:00

09:00 - 09:30
Joint Mobility-Aware UAV Placement and Routing in Multi-hop UAV Relaying Systems

Unmanned Aerial Vehicles (UAVs) have been extensively utilized to provide wireless connectivity in rural and under-developed areas, enhance network capacity and provide support for peaks or unexpected surges in user demand, mainly due to their fast deployment, cost-efficiency and superior communication performance resulting from Line of Sight (LoS)-dominated wireless channels. In order to exploit the benefits of UAVs as base stations or relays in a mobile network, a major challenge is to determine the optimal UAV placement and relocation strategy with respect to the mobility and traffic patterns of the ground network nodes. Moreover, considering that the UAVs form a multi-hop aerial network, capacity and connectivity constraints have significant impacts on the end-to-end network performance. To this end, we formulate the joint UAV placement and routing problem as a Mixed Integer Linear Program (MILP) and propose an approximation that leads to a LP rounding algorithm and achieves a balance between time-complexity and optimality.
Authors: Anousheh Gholami (University of Maryland, College Park), Nariman Torkzaban (University of Maryland, College Park), John Baras (University of Maryland), Chrysa Papagianni (Nokia Bell Labs, Antwerp, Belgium),
Hide Authors & Abstract

Show Authors & Abstract
09:30 - 10:00
Carrot and Stick: Incentivizing Cooperation Between Nodes in Multihop Wireless Ad Hoc Networks

A novel, holistic approach to cooperation incentivization in multihop wireless ad hoc networks is introduced. The concept utilizes a reputation metric to tailor a response to rational nodes' behavior and thus promote cooperation while balancing network traffic among network nodes and protecting well-behaving nodes from excessive network load.
Authors: Karol Rydzewski (Gdańsk University of Technology),
Hide Authors & Abstract

Show Authors & Abstract
10:00 - 10:30
Efficient Backbone Routing in Hierarchical MANETs

Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in large-scale Mobile Ad-Hoc Networks (MANETs) which are formed by interconnecting smaller clusters through a backbone. To support end-to-end routing in such networks, we employ a hierarchical approach as follows. The clusters are MANETs, running OLSR locally. Each cluster has a gateway, and the gateways are interconnected through a backbone. In this paper, we study four different solutions to provide end-to-end connectivity through the backbone: flooding all data packets through the backbone, modifying an ad-hoc routing protocol such as OLSR and AODV, or using a P2P overlay for routing purposes. Running extensive simulations in OMNeT++, our results highlight the strengths and weaknesses of each approach. Flooding, albeit a very simple approach, appears to be quite competitive with more complex routing solutions, with good performance and low overheads.
Authors: Thomas Kunz (Carleton University),
Hide Authors & Abstract

Show Authors & Abstract
10:30 - 11:00
A Stochastic Traffic Model For Congestion Detection in Multi-lane Highways

Vehicular Ad Hoc Networks (VANETs) represents a significant leap forward in the deployment of intelligent transport systems. These networks enables vehicles to instantly exchange trac information with the aim of smoothing trac ows and intensifying drivers comfort. In this context, this study addresses the issue of trac congestion description and detection in multi-lane highways. By making use of collected information, a Markov chain based mobility model is proposed to predict the future road trac states. Based on the obtained stationary distribution probabilities, performance criteria in steady-state are inferred and computed for di erent road con gurations. The numerical results validates the model demonstrated in the paper.
Authors: Jalel ben Othman (Université Paris- Saclay, CNRS, CentraleSupélec & Université Sorbonne Paris Nord), El Joubari Oumaima (Université Paris-Saclay, CNRS, CentraleSupélec), Véronique Vèque (Université Paris-Saclay, CNRS, CentraleSupélec),
Hide Authors & Abstract

Show Authors & Abstract
11:00 - 11:30
Transmission Power-Control Certificate Omission in Vehicular Ad hoc Networks

The frequent dissemination of safety-related beacons among neighboring vehicles in VANET is fundamental for cooperative awareness. Nevertheless, this has over the years raised the concern for security and as such, the current state-of-the-art requires all safety-related beacons to carry a certificate and a digital signature as a security mechanism to ensure authenticity and integrity. Unfortunately, this security mechanism is characterized by an increase in beacon payload size which induces an overhead in communication under dense traffic conditions. Several works have been published in the literature investigating how to reduce this overhead without compromising the level of security and vehicle cooperative awareness acheived. The Neighbor-based Certificate Omission scheme was proposed to address this issue but on evaluation under a dense traffic scenario, the scheme reduced the level of cooperative awareness acheieved among vehicles as it was unable to obtain a fair balance between the number of incurred cryptographic packet loss (packets dropped because the vehicle had no corresponding certificate to verify it) and network packet loss (packets dropped because of network channel congestion). In this paper, we propose a Transmission Power-control Certificate Omission scheme, which seeks to achieve a better balance between the number of incurred cryptographic packet loss and network packet loss to maximize vehicle cooperative awareness even under dense traffic conditions.
Authors: Emmanuel Charleson Dapaah (University of Göttingen), Parisa Memarmoshrefi (University of Goettingen), Dieter Hogrefe (University of Goettingen),
Hide Authors & Abstract

Show Authors & Abstract
11:30 - 12:00
New results on Q-routing protocol for wireless networks

In the 90s, Q-routing assisted by reinforcement learning was introduced by Boyan and Littman with interesting results in terms of quality of service. Some recent works continue to promote the idea through improvement of the algorithm or specialized extensions. In this paper, we propose a simple modification to workaround the greedy behaviour of Q-routing by considering epoch notion. In comparison with the original Q-routing and the standard OLSRv2 under Qualnet simulator, we show that our extension provides an interesting improvement in terms of packet delivery ratio on the original irregular grid of Boyan and Littman with wireless links.
Authors: Alexis Bitaillou (University of Nantes), Benoît Parrein (University of Nantes), Guillaume Andrieux (University of Nantes),
Hide Authors & Abstract

Show Authors & Abstract

Keynote 2: Opportunistic and Cooperative Forwarding in Mobile Ad-hoc Networks 12:30 - 13:30

Prof. Cheng Li, Memorial University of Newfoundland

CVNET Workshop 14:00 - 17:00