2017. 1st Issue

Table of contents 

Full issue   (7,4 MB)

 

PAPERS FROM OPEN CALL

Andras Kalmar and Rolland Vida
CAEsAR: Making the RPL Routing Protocol Context-Aware 
Due to the continuous development in hardware-, radio-, and sensor technologies, and the efforts of standardization organizations, the Internet of Things is not just a vision anymore, but it slowly becomes a part of our everyday life. The number of deployed sensors and actuators in our environment is increasing day-by-day transforming the physical world into an intelligent environment enabling context-aware services. To fully support this transformation we need to adapt the basic principles of communication. We do not want to know the IP addresses of individual sensor for example, we would rather like to query them based on their context. Also, we are often interested in the information itself, no matter which device provides it.
In this paper we extend our formerly proposed addressing scheme for RPL networks (CAEsAR) to make it even more efficient. CAEsARv2 uses RPL trees and aggregates context information in Bloom-filters (BF) or bit vectors along the tree. With this addressing scheme the RPL protocol itself is enhanced to support context-based multicast, service-discovery and data- centric communication. Compared to our original proposal, in CAEsARv2 we get shorter update messages, as a result of assign- ing distinct data structures (Bloom filters or bit vectors) to each of the context parameters. We also show that by storing IP addresses also in Bloom filters, similarly to other context parameters, routing entries become shorter and evenly distributed among the nodes. Through simulations we demonstrate that the efficiency of Bloom-filter and bit vector aggregation in CAEsARv2 is not affected significantly by the radio ranges of the nodes in the network. Finally, through experimental results we show that, in case of correlation between geographical proximity and measured values, CAEsARv2 can adapt more efficiently to context changes than the centralized publish/subscribe messaging systems.
 

Subhash Kak
Oblivious Transfer with Verification 
Although random sequences can be used to denerate probability events, they come with the risk of cheating in an unsupervised situation. In such cases, the oblivious transfer protocol may be used and this paper presents a variation to the DH key-exchange to serve as this protocol. A method to verify the correctness of the procedure, without revealing the random numbers used by two more parties, is also proposed.
 

PRACTICAL PAPERS OF APPLIED RESEARCH

Vlasta Stavova, Vashek Matyas, Mike Just and Martin Ukrop
Factors Influencing the Purchase of Security Software for Mobile Devices – Case Study 
We investigated whether we could nudge users to purchase a premium version of mobile security software after using a trial version for 2-3 months. Our three interface designs used two persuasion methods: two decoy interfaces that attempted to nudge users to purchasing longer duration licenses, and one interface that used reciprocity in order to determine the value that people associated with the security software. We had approximately 60,000 participants for our study who completed a questionnaire, and again we had approximately 60,000 who were exposed to proposed variants. There were 12,000 participants who intersected both data samples, from which we also analyzed purchase decision patterns across our wide participant range, including users of English, German, Slovak, and Czech language versions. Our results indicate that factors such as gender, age, home country, and attitudes towards privacy and data sensitivity each had a significant impact on whether or not a premium license was purshased.
 

 

FROM IEEE COMMUNICATIONS MAGAZINE

Peter Rost, Albert Banchs, Ignacio Berberana, Markus Breitbach, Mark Doll, Heinz Droste, Christian Mannweiler, Miguel A. Puente, Konstantinos Samdanis and Bessem Sayadi
Mobile Network Architecture Evolution Toward 5G 
As a chain is as strong as its weakest element, so are the efficiency, flexibility, and robustness of a mobile network, which relies on a range of different functional elements and mechanisms. Indeed, the mobile network architecture needs particular attention when discussing the evolution of 3GPP EPS because it is the architecture that integrates the many different future technologies into one mobile network. This article discusses 3GPP EPS mobile network evolution as a whole, analyzing specific architecture properties that are critical in future 3GPP EPS releases. In particular, this article discusses the evolution toward a "network of functions," network slicing, and software-defined mobile network control, management, and orchestration. Furthermore, the roadmap for the future evolution of 3GPP EPS and its technology components is detailed and relevant standards defining organizations are listed.

 

CALL FOR PAPERS / PARTICIPATION

IEEE SENSORS 2017, Glasgow, Scotland, UK

3th Cloudification of the Internet of Things 2017 - CloT 2017, Brussels, Belgium

ADDITIONAL

Guidelines for our Authors

free

Technical Co-Sponsors


  

  

Supporter



 

National Cooperation Fund, Hungary