IEEE ComSoc International Communications Quality and Reliability Workshop
14-17 May 2018 – Austin, Texas

2015 Technical Paper Abstracts

                                    best-paper-award

Dmitri Papadimitriou accepting Best Paper Award     

from Miki Yamamoto and Ana Goulart, TPC Co-Chairs

  

Best Paper! – Nonparametric Statistical Methods to Analyze the Internet Connectivity Reliability by Dimitri Papadimitriou and Davide Careglio

Abstract – Facing computational complexity when modeling network reliability by means of parametric models and corresponding statistical methods, in the present study, we apply nonparametric statistical methods, such as the Kaplan-Meier survival probability estimator and the mean cumulative function, to characterize the dynamic properties (in particular, the stability properties) of the Internet routing paths and their relationship with the corresponding forwarding path(s).  Providing systematic methodology for quantifying these properties aims at enabling reliability assessment of the Internet connectivity (also referred to as reachability in computer networking).  The motivation for studying the dynamic properties (in particular, the stability properties) of the Internet routing paths and their relationship to forwarding paths stems from three main reasons.  The first translates the fact that transient but frequent changes in the spatio-temporal properties of routing paths may affect the performance and operating conditions of the corresponding forwarding paths; hence, their reliability.  The second reason is that frequent instabilities when observed for the same (subset of) path(s) that can be attributed to a spatially localized portion(s) of the Internet may reveal that the underlying physical topology is more prone to failures; hence, showing limited reliability.  The third results from the increasing operational need to provide for a longer term estimation of the Internet routing-forwarding system performance and operating conditions using well-proven statistical analysis accounting for recurrence of events and correlation between instability events.

 

An Improving Strategy for LTE Downlink Scheduling Algorithms Based on QoS Requirement by Zhipeng Jiang, Wei Zhang, Suixiang Gao and Lei Zhou

Abstract – LTE is an all IP network.  The scheduling in its downlink channels is a key problem.  Although many algorithms have been designed and analyzed, the QoS for the users in poor channel conditions are not enough to be ensured sometimes.  We design a method to enhance the capacity of the system, which is a modifying strategy available for most existing algorithms.  Our intuition is to allocate more resources to the users in poorer channel conditions without declining the QoS of the users in better channel.  Simulations show that our strategy can satisfy the QoS for more users.

 

Energy-efficient Information Dissemination Based on Received Signal Strength in Wireless Sensor Networks by Hiroyuki Hisamatsu, Go Hasegawa and Masayuki Murata

Abstract – Power-saving is one of the important issues in wireless sensor networks and many studies on power-saving in wireless sensor networks have been done.  However, most of these studies have focused on saving power in gathering the information.  In this paper, we tackle the issue of the energy-efficient information dissemination in wireless sensor networks.  We propose method of disseminating information while optimizing electric power consumption in wireless sensor networks.  Our new dissemination method employs flooding and uses the receiver signal strength to determine the broadcast timing. In our method, the node farthest from the sending node will rebroadcast the message first and a broadcast is canceled when a node scheduled to broadcast receives a duplicate of the scheduled message from other nodes.  We evaluate our proposed method by simulation.  As a result, it is found that the electric power consumption of the proposal method in the entire network is one-third that of the flooding method at the maximum.  Furthermore, we show that the farther the transmitting distance of the wireless radio wave becomes, the more efficiently our method can disseminate information to the network.

 

An Integrated Signaling-Encryption Mechanism to Reduce Error Propagation in wireless Communications: Performance Analyses by Mohammed M. Olama, Mustafa M. Matalagh and Miljko Bobrek

Abstract – Traditional encryption techniques require packet overhead, produce processing time delay, and suffer from severe quality of service deterioration due to fades and interference in wireless channels.  These issues reduce the effective transmission data rate (throughput) considerably in wireless communications, where data rate with limited bandwidth is the main constraint.  In this paper, performance evaluation analyses are conducted for an integrated signaling-encryption mechanism that is secure and enables improved throughput and probability of bit-error in wireless channels.  This mechanism eliminates the drawbacks stated herein by encrypting only a small portion of an entire transmitted frame, while the rest is not subject to traditional encryption but goes through a signaling process (designed transformation) with the plaintext of the portion selected for encryption.  We also propose to incorporate error correction coding solely on the small encrypted portion of the data to drastically improve the overall bit-error rate performance while not noticeably increasing the required bit-rate.  We focus on validating the signaling-encryption mechanism utilizing Hamming and convolutional error correction coding by conducting an end-to-end system-level simulation-based study. T he average probability of bit-error and throughput of the encryption mechanism are evaluated over standard Gaussian and Rayleigh fading-type channels and compared to the ones of the conventional advanced encryption standard (AES).

 

Traffic Classification on Mobile Core Network Considering Regularity of Background Traffic by Masaki Suzuki, Masafumi Watari, Shigehiro Ano and Masato Tsuru

Abstract – Recent widespread use of smartphones and rich multimedia contents has brought a considerable increase in mobile traffic.  Therefore, the characteristics of smartphone traffic need to be considered when designing mobile core networks.  Smartphone traffic is categorized by whether it is generated from user interaction (foreground (FG) traffic) or not (background (BG) traffic), and such traffic types can be managed differently to efficiently maintain the communication quality in the case of network congestion.  However, it is difficult to distinguish such traffic types and their characteristics solely by IP addresses/port numbers.  In addition, the increase in HTTPS traffic makes application-level packet inspection difficult.  In this paper, we propose a traffic classification method on a mobile core network.  The proposed method captures packets on the mobile core network, constructs TCP flows, and labels each flow by considering the regularity of BG traffic and the randomness of FG traffic using a Support Vector Machine (SVM) classifier with selected feature indexes obtained from the TCP/IP layer.  Also, we attempt to restrict the indexes that can be obtained in the observation of the initial part of each TCP flow in order to reduce the calculation cost.  The proposed method is evaluated in terms of the classification accuracy using experimental data through the Wi-Fi connections of smartphones.  The full-index classifier using 40 indexes classifies FG and BG traffic with 97.2% accuracy and the shortcut-index classifier using restricted 36 indexes also indicates 94.4% accuracy.

 

Implementing Attacks for Modbus/TCP Protocol in a Real-Time Cyber Physical System Test Bed by Bo Chen, Nishant Pattanaik, Ana Goulart, Karen L. Butler-Perry and Deepa Kundur

Abstract – To understand security vulnerabilities of communication protocols used in power systems, a real-time framework can be developed to conduct vulnerability studies.  The framework should implement protection mechanisms against vulnerabilities and study their effectiveness.  In this paper, a real-time cyber-physical framework or test bed is presented.    It integrates a real-time power system simulator and a communication system simulator to study the cyber and physical system vulnerabilities in smart power grids.  The power system simulation is implemented using the Real-Time Digital Simulator (RTDS®) power grid simulator, with LabVIEW and PXI modules that simulate the supervisory control and data acquisition (SCADA) system and intelligent electronic devices (IEDs).  The communication system simulation is implemented using Opnet’s System-in-the-Loop (SITL) simulator and open source Linux tools and servers.  Results of two cyber-attacks on the Modbus/TCP protocol are discussed and improvements to the test bed for protocol attack detection and mitigation is proposed.

 

Receiver-driven Congestion Control for Content Oriented Application with Multiple Sources by Yusaku Hayamizu and Miki Yamamoto

Abstract – In content oriented application, such as P2P, a user does not care about where content is obtained and a content file can be downloaded from anywhere it is obtained.  In some P2P systems, e.g. BitTorrent, a content file is divided into small parts, chunks, and each chunk is downloaded from anywhere.  In this many-to-one communication style, one TCP session is set up for each pair of a sender and a receiver.  If these sessions go through the same bottleneck link, many-to-one communication might obtain unfairly large throughput.  In this paper, we propose a new receiver-driven congestion control for this many-to-one communications.  Our proposed congestion control detects bottleneck-sharing flows and clusters them.  Window coupling technique is applied for these clustered flows, which enables these flows to obtain fair aggregated throughput.   Our simulation results show that our proposed receiver-driven congestion control fairly shares a bottleneck link with regular TCP.

 

PCI Reduction Method Suitable for Type-II HARQ with SR-ARQ by Fumiki Uzawa, Tomofumi Koyama, Kazuhiko Mitsuyama, Naohiko Iai, Katsunori Aoki and Takefumi Hiraguri

Abstract – Hybrid automatic repeat request (HARQ) can make efficient and reliable transmission possible for radio communications.  However, in the HARQ scheme, packet control information (PCI), such as HARQ block identifiers (HARQ block ids) in selective repeat ARQ (SR-ARQ), are required and the reduction of PCI overhead is an issue.  In particular, type-II HARQ handles a large amount of PCI because it includes the HARQ block ids and sub-block ids.  The sub-block id identifies the set of parity bits in the HARQ block of the corresponding sub-block, and is used to combine the sub-blocks.  This report proposes a method of PCI reduction suitable for type-II HARQ with SR-ARQ.  The method can inform the HARQ block id and sub-block id of each HARQ block by sending only the information on how many HARQ blocks are contained in each 1st, 2nd, 3rd, and 4th transmission group.  The estimated size of reduced PCI and simulation results of our TDD communication system confirms that the proposed method greatly reduces PCI and improves data throughput compared to a conventional method.

 

Benchmarking the Session Initiation Protocol (SIP) by Yueqing Zhang, Arthur Clouet, Oluseyi S. Awotayo, Carol Davids and Vijay K. Gurbani

Abstract – Measuring and comparing performance of an Internet multimedia signaling protocol across varying vendor implementations is a challenging task.  Tests to measure the performance of the protocol as it is exhibited on a vendor device and conditions of the laboratory setup to run the tests have to be normalized such that no special favour is accorded to a particular vendor implementation.  In this paper, we describe a performance benchmark to measure the performance of a device that includes a Session Initiation Protocol (SIP) proxy function.  This benchmark is currently being standardized by the Internet Engineering Task Force (IETF).  We implemented the algorithm that has been proposed in the IETF to measure the performance of a SIP server.  We provide the test results of running the benchmark on Asterisk, the popular open source SIP private branch exchange (PBX).