WINSYS 2018 Abstracts


Area 1 - Sensor Networks and Ad Hoc Communications

Full Papers
Paper Nr: 15
Title:

Supporting Alzheimer’s Residential Care - A Novel Indoor Localization System

Authors:

Andrea Masciadri, Ilaria Carlini, Sara Comai and Fabio Salice

Abstract: This work illustrates a localization system specifically designed to be applied in “Il Paese Ritrovato”, a highly innovative health-care facility for people affected by Alzheimer’s disease in Monza, Italy. Patients are provided with an iBeacon bracelet broadcasting data packets that are collected through the use of a dense network of devices acting as receiving antennas. The system evaluates the path-loss of the received signal and corrects the computed position with a probabilistic approach to avoid wall-crossing. Localization data are merged with information from other IoT devices such as smart sensors, appliances and expert annotations; the resulting dataset will be extremely important to analyze behaviors, habits and social interactions among patients.
Download

Short Papers
Paper Nr: 13
Title:

A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments

Authors:

Wided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat and Kuei-Fang Hsiao

Abstract: Fog computing is a technology, which benefits from both Cloud Computing and Internet of Things paradigms. Instead of centralizing the information stored in the cloud, the idea in the fog environment is to use devices located at the edge of the network to prevent congestion during data exchanges. Since its development, the fog computing was integrated in numerous applications, including, connected vehicles (v2x), and smart cities, among others. Furthermore, the fog environment is highly variable within the resources as it varies dynamically. Therefore, a careful management of resources is essential for maximizing the efficiency of this distributed environment. That is why, the access control to resources is one of the challenging issues to be taken into account to enhance security in fog environments. In this paper, we develop a novel distributed fog-cloud computing mechanism for access control based on trust and risk estimation. We evaluate the performance of the novel approach through appropriate simulations, which improves system performance by minimizing the time spent to have permissions to access services and optimizing the overall system resource utilization.
Download

Paper Nr: 8
Title:

Automatic Attendance Control System based on BLE Technology

Authors:

Miran Borić, Ana Fernández Vilas and Rebeca P. Díaz Redondo

Abstract: As an emerging low power wireless technology, Bluetooth Low Energy lately has become an essential part of the Internet of Things world. Its pervasiveness has given the possibility for many different, otherwise manually driven, concepts to work in a different, enhanced, and more automated fashion. In this paper, we present an automatic attendance control system based on the interaction between a modified BLE iBeacon mechanism and users’ smart devices. As such, the system can recognize users according to predefined profiles and eventually broadcast valuable information that corresponds to recognized profiles. The proof of concept shows that this is a promising approach regarding automating specific tasks, recognizing users and interacting with them less complexly.
Download

Paper Nr: 22
Title:

A Wireless Sensor Network as a Living Lab for the Development of Solutions for IoT and Smart Cities

Authors:

Jorge Arturo Pardiñas-Mir, Luis Rizo-Dominguez and Luis Eduardo Pérez-Bernal

Abstract: As internet connectivity and digital solutions spread all over, it has become necessary to have the possibility of experimenting and developing solutions for the Internet of Things (IoT) into a laboratory with similar conditions as those of the big scale application. Living Labs are a solution for such a need and in this paper we present the implementation of a living lab based on a wireless sensor network (WSN) aimed to help the learning of this technology by giving the opportunity of experimenting and developing solutions. The WSN works primarily on the ZigBee protocol but, being an educational and developing tool, it also permits to add devices working in other protocols like WiFi, 3G and Sigfox, that we have already experienced. The system includes the possibility that the collected data be kept into an internet server and be able to be displayed to users through a mobile application.
Download

Area 2 - Wireless and Mobile Technologies

Full Papers
Paper Nr: 7
Title:

Cloudless Wide Area Friend-to-Friend Networking Middleware for Smartphones

Authors:

Jo Inge Arnes and Randi Karlsen

Abstract: Swirlwave is a middleware that enables peer-to-peer and distributed computing for Internet-connected devices that lack publicly reachable Internet Protocol (IP) addresses, that can be expected to disconnect from the network for periods of time, and that frequently change network locations. This is the typical case for smartphones. The middleware fits into the friend-to-friend subcategory of peer-to-peer systems, meaning that the overlay network is built on top of already existing trust relationships among its users. It is independent of clouds and application servers, it supports encryption for confidentiality and authentication, and it aims to be easily extensible for new applications. The solution described in this paper is implemented for smartphones running the Android operating system, but its principles are not limited to this.
Download

Paper Nr: 14
Title:

Radio Resource Allocation Algorithm for Device to Device based on LTE-V2X Communications

Authors:

Ahlem Masmoudi, Souhir Feki, Kais Mnif and Faouzi Zarai

Abstract: Communication is important to regain transportation by accommodating real-time, easily reliable, and actionable information flows to allow safety, mobility and environmental applications. Device-to-Device (D2D) communication has become an emerging technology for wireless network engineers to optimize the network performance. It is considered as an enabler for Vehicle-to-everything (V2X) applications, with stringent reliability and latency requirements due to its ability to improve traffic efficiency, safety and comfort. In this paper, we investigate the radio resource management (RRM) for D2D-based V2X communications including both vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication. A new algorithm called Efficient Resources Allocation for V2X Communications (ERAVC) is proposed in order to maximize the sum rate of V2I users while guaranteeing the reliability requirement of V2Vusers. Simulation results indicate promising performance of the proposed ERAVC scheme compared with another existing method.
Download

Short Papers
Paper Nr: 5
Title:

A New Approach to Spread-spectrum OFDM

Authors:

Mohammad Kaisb Layous Alhasnawi, Ronald G. Addie and Shahab Abdulla

Abstract: Orthogonal frequency division multiplexing (OFDM) systems are reviewed and the Shannon bound is discussed as a criterion of efficient spectrum use and a design criterion. The problem of efficient sharing of spectrum by wireless communication systems is discussed and combined use of direct-sequence spread-spectrum (DSSS) coding and OFDM is proposed as an approach which can achieve efficient spectrum sharing. A system which enables DSSS, with codes from the Galois field of order f where f is a prime larger than 2, to be used efficiently in conjunction with OFDM is then defined, analysed, and implemented. Experiments with this system are described.
Download

Paper Nr: 23
Title:

Dual-polarized Dual-band Mobile 5G Antenna Array

Authors:

Igor Syrytsin, Shuai Zhang and Gert F. Pedersen

Abstract: In this paper, a dual-band dual-polarized phased antenna array for 5G mobile terminals is proposed. The array has a bandwidth of 3.6 GHz and two resonances at 30.5 and 32.8 GHz. The array has a clearance of 2.85 mm and fed with two ports in simulation to excite the notch and dipole parts of the proposed antenna structure. Finally, the proposed antenna element is combined into two arrays with different configurations. It is shown that it is better to use the array of 8 elements than to use two 4-element sub-arrays with orthogonal orientation.
Download