2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)

22-25 Oct. 2017

Filter Results

Displaying Results 1 - 25 of 115
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for reuse | PDF file iconPDF (2729 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - xiii
    Request permission for reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2017, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2017, Page(s): xv
    Request permission for reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2017, Page(s):xvii - xviii
    Request permission for reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Message from the REUNS General Chairs

    Publication Year: 2017, Page(s): xix
    Request permission for reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • REUNS Workshop Committees

    Publication Year: 2017, Page(s): xx
    Request permission for reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Message from the CCSNA General Chairs

    Publication Year: 2017, Page(s): xxi
    Request permission for reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • CCSNA Workshop Committees

    Publication Year: 2017, Page(s): xxii
    Request permission for reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Message from the DS-IoT General Chairs

    Publication Year: 2017, Page(s): xxiii
    Request permission for reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • DS-IoT Workshop Committees

    Publication Year: 2017, Page(s): xxiv
    Request permission for reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • ActDetector: Detecting Daily Activities Using Smartwatches

    Publication Year: 2017, Page(s):1 - 9
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Detecting daily activities is helpful for health care and clinical medicine. In this paper, we present ActDetector, a smartwatch based application which detects 8 common daily activities, including sitting, walking, running, going upstairs, going downstairs, eating, driving and sitting in a vehicle. By leveraging the built-in sensors on smartwatch, a multi-level classification system is proposed w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M^2G: A Monitor of Monitoring Systems with Ground Truth Validation Features for Research-Oriented Residential Applications

    Publication Year: 2017, Page(s):10 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Research in the area of internet-of-things, cyberphysical-systems, and smart health often employ sensor systems at residences for continuous monitoring. Such research-oriented residential monitoring systems (RRMSs) usually face two major challenges, long-term reliable operation management and validation of system functionality with minimal human effort. Targeting these two challenges, this paper d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Private Space Monitoring with SoC-Based Smart Cameras

    Publication Year: 2017, Page(s):19 - 27
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (904 KB) | HTML iconHTML

    Cameras and other sensors are increasingly deployed for private space monitoring applications such as home monitoring, assisted/enhanced living and child monitoring. Since these cameras capture highly sensitive information and transfer it over public communication infrastructures, security and privacy is a major concern. This work presents a secure camera device along with a secure data delivery a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictability and Prediction of Human Mobility Based on Application-Collected Location Data

    Publication Year: 2017, Page(s):28 - 36
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    In the modern information society, accurate prediction of human mobility becomes increasingly essential in various areas such as city planning and resource management. With users' historical trajectories, the inherent patterns of their movements can be extracted and utilized to accurately predict the future movements. In this paper, based on a dataset of 100,000 individuals' actively uploaded loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Glossy-Based Wireless Networks from Packet Injection Attacks

    Publication Year: 2017, Page(s):37 - 45
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-message Authentication over Noisy Channel with Polar Codes

    Publication Year: 2017, Page(s):46 - 54
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W1, W2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BAN-GZKP: Optimal Zero Knowledge Proof Based Scheme for Wireless Body Area Networks

    Publication Year: 2017, Page(s):55 - 63
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    In this paper, we propose BAN-GZKP that optimizes the best to date secure lightweight and energy efficient authentication scheme, BANZKP, designed for WBAN networks. BANZKP is vulnerable to several security attacks such as the replay attack, DDoS attacks at sink and redundancy information crack. Also BANZKP needs an end-to-end authentication which is not compliant with the human body postural mobi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing Trust in Ubiquitous and Pervasive IoT Network

    Publication Year: 2017, Page(s):64 - 71
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh fra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QUAC: Quality-Aware Contract-Based Incentive Mechanisms for Crowdsensing

    Publication Year: 2017, Page(s):72 - 80
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    Crowdsensing is a sensing method which involves participants from general public to collect sensed data from their mobile devices, and also contribute and utilize a common database. To ensure a crowdsensing system to operate properly, there must be certain effective and efficient incentive mechanism to attract users and stimulate them to submit sensing data with high quality. Intuitively, the agre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SalsaAsst: Beat Counting System Empowered by Mobile Devices to Assist Salsa Dancers

    Publication Year: 2017, Page(s):81 - 89
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1549 KB) | HTML iconHTML

    Dancing is always challenging especially for beginners who may lack sense of rhythm. Salsa, as a popular style of dancing, is even harder to learn due to its unique overlapped rhythmic patterns made by different Latin instruments (e.g., Clave sticks, Conga drums, Timbale drums) together. In order to dance in synchronization with the Salsa beats, the beginners always need prompts (e.g., beat counti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.