235 research outputs found

    An Android-Based Mechanism for Energy Efficient Localization Depending on Indoor/Outdoor Context

    Get PDF
    Today, there is widespread use of mobile applications that take advantage of a user\u27s location. Popular usages of location information include geotagging on social media websites, driver assistance and navigation, and querying nearby locations of interest. However, the average user may not realize the high energy costs of using location services (namely the GPS) or may not make smart decisions regarding when to enable or disable location services-for example, when indoors. As a result, a mechanism that can make these decisions on the user\u27s behalf can significantly improve a smartphone\u27s battery life. In this paper, we present an energy consumption analysis of the localization methods available on modern Android smartphones and propose the addition of an indoor localization mechanism that can be triggered depending on whether a user is detected to be indoors or outdoors. Based on our energy analysis and implementation of our proposed system, we provide experimental results-monitoring battery life over time-and show that an indoor localization method triggered by indoor or outdoor context can improve smartphone battery life and, potentially, location accuracy

    Virtual Track: Applications and Challenges of the RFID System on Roads

    Get PDF
    The RFID System on Roads (RSR), which includes RFID tags deployed on roads and RFID readers installed on vehicles, is an essential platform for future transportation systems. It can provide unique features that are missing from the current systems, including lane level position, road traffic control information, vehicle distance estimation, real time driving behavior analysis, and so on. Based on these features, several novel vehicular applications can be implemented, which can significantly improve the transportation safety and efficiency. Specifically, the proposed applications on RSR include Assisted Navigation Systems, Electrical Traffic Control, Unmanned Patrol Systems, Vehicle Distance Estimation, Parking Assistant System, Route Tracing and Access Control, Unmanned Ground Vehicles. We also investigate the corresponding engineering/system and research challenges for implementing RSR and its applications in this article

    Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Get PDF
    Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended

    A game theoretic analysis on block withholding attacks using the zero-determinant strategy

    Get PDF
    In Bitcoin's incentive system that supports open mining pools, block withholding attacks incur huge security threats. In this paper, we investigate the mutual attacks among pools as this determines the macroscopic utility of the whole distributed system. Existing studies on pools' interactive attacks usually employ the conventional game theory, where the strategies of the players are considered pure and equal, neglecting the existence of powerful strategies and the corresponding favorable game results. In this study, we take advantage of the Zero-Determinant (ZD) strategy to analyze the block withholding attack between any two pools, where the ZD adopter has the unilateral control on the expected payoffs of its opponent and itself. In this case, we are faced with the following questions: who can adopt the ZD strategy? individually or simultaneously? what can the ZD player achieve? In order to answer these questions, we derive the conditions under which two pools can individually or simultaneously employ the ZD strategy and demonstrate the effectiveness. To the best of our knowledge, we are the first to use the ZD strategy to analyze the block withholding attack among pools

    Online auction-based relay selection for cooperative communication in CR networks

    Get PDF
    Cognitive radio and cooperative communication are two new network technologies. So, the combination of these two new technologies is a novel solution to solve the problem of spectrum scarcity. Two main challenges exist in the integration of cognitive radio and cooperative communication. First, there is a lack of incentives for the participating wireless devices to serve as relay nodes. Second, there is not an effective relay selection policy. In this paper, we propose an online auction-based relay selection scheme for cooperative communication in cognitive radio (CR) networks. Specifically, we design an auction scheme through adopting stopping theory. The proposed scheme ensures that the primary user (PU) can effectively select a CR relay to transmit its packets in a given time bound. In addition, we have analytically proven the truthfulness and the individual rationality of our online auction scheme. Extensive simulations demonstrate that the proposed relay selection scheme can always successfully and efficiently select a proper relay for a PU and can achieve a higher cooperative communication throughput compared with the conventional schemes

    Enabling smartphone-based HD video chats by cooperative transmissions in CRNs

    Get PDF
    Smartphones have been equipped with the cameras that can shoot HD videos, and the video chat apps such as Skype are becoming popular. We can, therefore, intuitively predict the trend that users are expecting to enjoy HD video chats via utilizing their smartphones. Most of the current Internet services, however, cannot support the live HD video transmissions because of their low uplink rate. In order to overcome this limit, we propose to offload the uplink transmissions to cooperative users via cognitive radio networks. Specifically, we first divide the video stream into several substreams according to the H.264/SVC standard and the cooperative users’ uplink rates. Then, the cooperative users are selected by employing our proposed optimal multiple stopping method. Finally, the substreams are assigned to the selected cooperative users by a 0-1 Knapsack-based allocation algorithm. The simulation results demonstrate that our proposed scheme can successfully support 720P HD video chats

    De-anonymyzing scale-free social networks by using spectrum partitioning method

    Get PDF
    Social network data is widely shared, forwarded and published to third parties, which led to the risks of privacy disclosure. Even thought the network provider always perturbs the data before publishing it, attackers can still recover anonymous data according to the collected auxiliary information. In this paper, we transform the problem of de-anonymization into node matching problem in graph, and the de-anonymization method can reduce the number of nodes to be matched at each time. In addition, we use spectrum partitioning method to divide the social graph into disjoint subgraphs, and it can effectively be applied to large-scale social networks and executed in parallel by using multiple processors. Through the analysis of the influence of power-law distribution on de-anonymization, we synthetically consider the structural and personal information of users which made the feature information of the user more practical
    • …
    corecore