2018 IEEE 43rd Conference on Local Computer Networks (LCN) Program
Sunday, September 30
Sunday, September 30 17:00 - 19:00
REG: Welcome Reception and Early Registration
Monday, October 1
Monday, October 1 8:00 - 9:00
Registration: Registration
Monday, October 1 9:00 - 9:20
WS-OM-WELCOME: OnMove: Opening and Welcome
Monday, October 1 9:00 - 10:00
WS-SA-Keynote: SenseApp: Keynote
Global urbanization, quality of life in cities-from air quality to mobility to equitable opportunity-and reducing negative impacts of cities on the natural environment are among the grand challenges of the 21st century. Within these challenges are critical research questions, suggesting that partnerships between the scientific community and city planners, designers, and operators-as well as city dwellers-will be essential. Catlett will discuss a series of collaborative interactions between the science community in Chicago and the City of Chicago, including the motivation and process behind the NSF-funded Array of Things project and how it is being replicated in other cities.
Monday, October 1 9:20 - 10:00
WS-OM1: Paper session 1
- Performance Analysis of Anomaly Based Network Intrusion Detection Systems
- Tracking-based Cooperative Caching in VANETs for Social Networking
Monday, October 1 10:00 - 10:30
CB1: Coffee break
Monday, October 1 10:30 - 11:30
WS-OM-Keynote: OnMove: Keynote
The success of intelligent transportation systems (ITS) relies on their ability to provide drivers and municipalities with accurate real-time information. Crowdsourcing has been shown effective in navigation systems where traffic congestion information is updated by drivers. Robust Crowdsensing for Intelligent Road Services presents a framework to collect crowd-based information, monitoring road conditions and hazards; and, driver-based information, including driving style, preferences, skills and experience, to build representative driver profiles. Our proposed system, iDriveSense, integrates sensor technologies available in both the vehicles and the driver smartphones to provide advanced, robust localization and accurate monitoring of vehicle dynamics and driver behavior. Robustness is achieved through calibration and cross-referencing on two levels: a single-driver level and a cloud multi-driver level. Moreover, we design efficient route selection algorithms based on driver preferences, supported by road conditions monitored and reported in real time. This includes learning route preferences based on monitoring both the routes taken by drivers, and the drivers' competence levels on different road types.
Monday, October 1 10:30 - 12:00
WS-SA1: SenseApp: Practical Issues in Building Sensor Network Applications
- YetiOS: An Adaptive Operating System for Wireless Sensor Networks
- Effective but Lightweight Online Selftest for Energy-Constrained WSNs
- EpiFi: An In-Home IoT Architecture for Epidemiological Deployments
Monday, October 1 11:30 - 12:30
WS-OM2: OnMove - paper session 2
- A Belief Rule Based Flood Risk Assessment Expert System Using Real Time Sensor Data Streaming
- Hybrid Approach for Disaster Recovery Using P2P Communications in Android
- Paving the Way for Connected Cars with Adaptive AUTOSAR and AGL
Monday, October 1 12:30 - 13:30
LB1: Lunch on your own
Monday, October 1 13:30 - 14:30
WS-5GIOT1: 5G-IoT: Paper session 1
- The Role of 5G Networks in the Field of Medical Sciences Education
- Dynamically Shared Wide-Area Cellular Communication for Hyper-dense IoT Devices
- Packet Dropping and Decoding Statistics for Linear Network Coded Broadcast with Feedback
WS-CN-Keynote: COGNINETS: Keynote
Monday, October 1 14:30 - 15:30
WS-CN1: COGNINETS: Paper session 1
- An Overview of Cognitive Network Solutions
- Performance Bounds of Secondary User's Transmission Under Fading Channel
- Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward
Monday, October 1 15:30 - 16:00
CB2: Tea break
Monday, October 1 16:00 - 17:30
NSWMD: NSWMD
- An Android Wear OS Framework for Sensor Data and Network Interfaces
- Modeling Context-Adaptive Energy-Aware Security in Mobile Devices
- Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems
- Analysis of MAC Protocols for Real-Time Monitoring of Heart and Respiratory Signals
WS-CN2: COGNINETS: Panel Session
Tuesday, October 2
Tuesday, October 2 8:00 - 9:00
Registration: Registration
Tuesday, October 2 9:00 - 9:30
LCN-Welcome: Opening and Welcome
Tuesday, October 2 9:30 - 10:30
LCN-Keynote1: Sensor-less Sensing: The Future of Ubiquitous Context-Awareness
This talk will cover different RF-based device-free systems used for intrusion detection, localisation, activity recognition, among others based on ubiquitous wireless technologies such as WiFi, FM, and cellular networks. The talk ends by a road-map for open research challenges and future directions.
Tuesday, October 2 10:30 - 11:00
CB3: Coffee break
Tuesday, October 2 11:00 - 12:30
LCN-Plenary: 1: Plenary session: Best Paper Candidates
- Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark
- Improving Wireless Network Performance Under MPTCP Based Multipath Access
- Learning-based Adaptive Data Placement for Low Latency in Data Center Networks
Tuesday, October 2 12:30 - 13:30
LB2: Lunch
Tuesday, October 2 13:30 - 15:30
LCN-2A: 2A: Ad-hoc and sensor networks
- Collaborative Decentralized Resource Reservation for Emergency Communication Networks
- A Novel AID Shuffle Mechanism for RAW Slot Assignment in IEEE 802.11Ah Networks
- Joint Routing and Wireless Resource Allocation in Multihop LTE-D2D Communications
- Topology Preserving Map for Wireless Sensor Networks Equipped with Directional Antennas
LCN-2B: 2B: Internet of Things and Sensor Networks
- Decoding Superposed LoRa Signals
- Estimating Room Occupancy in a Smart Campus Using WiFi Soft Sensors
- On Probabilistic Connected Components in Underwater Sensor Networks
- IaaS-Aided Access Control for Information-Centric IoT
LCN-2C: 2C: Green networking
- Experimental Evaluation of an Energy-Delay Aware Web Routing Method
- Maximizing the Wearable Network Lifetime Through Virtualized Application Function Chaining
- Link Scheduling in Rechargeable Wireless Sensor Networks with Harvesting Time and Battery Capacity Constraints
- Multi-Level Fog Based Resource Allocation Model for EVs Energy Planning in Smart Grid
Tuesday, October 2 15:30 - 17:30
Demo: Demonstrations with Coffee
- Decentralized Disaster Area Detection in Mobile Networks
- Developing a Framework for Large Scale Security Analysis of Web Applications
- EPredictor: An Experimental Platform for Community Evolution Prediction Tests
- Resilient Machine-to-Machine Communication for an Information-centric Industrial IoT
- Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network
- Low-cost Prototypes of IDN (ILDA Digital Network) Consumers for ILDA Laser Projector and DMX512 Service
- Application-based QoS Support with P4 and OpenFlow: A Demonstration Using Chameleon
LCN-P1: Poster Session 1 with Tea
- Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks
- Exploring Deployment Strategies for the Tor Network
- Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes
- 100 Gbit/s End-to-End Communication: Adding Flexibility with Protocol Templates
- FireFlow - High Performance Hybrid SDN-Firewalls with OpenFlow
- Analysis of Bundle Throughput over LTP
- Scalable Downward Routing for Wireless Sensor Networks and Internet of Things Actuation
- Evaluation of Multi-Gateway LoRaWAN with Different Data Traffic Models
- A Search into a Suitable Channel Access Control Protocol for LoRa-Based Networks
- MaxStream: SDN-based Flow Maximization for Video Streaming with QoS Enhancement
- A Case for Systematic Detection and Rigorous Location of SDN Control Conflicts
- Intelligent Caching in Dense Small-Cell Networks with Limited External Resources
- An SDN-based Approach for Defending Against Reflective DDoS Attacks
- In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control
- Dynamic Placement of Extended Service Function Chains: Steiner-based Approximation Algorithms
- Common Knowledge Based Transfer Learning for Traffic Classification
- FSE-NG for Managing Real Time Media Flows and SCTP Data Channel in WebRTC
- Group Identification in Crowded Environments Using Proximity Sensing
- Mobile Users Location Prediction with Complex Behavior Understanding
- PLS: Proactive Load Shifting for Distributed SDN Controllers
- HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things
Tuesday, October 2 18:00 - 22:00
LCN-CB: Conference Banquet
Wednesday, October 3
Wednesday, October 3 8:00 - 9:00
Registration: Registration
Wednesday, October 3 9:00 - 10:30
LCN-N2W: N2Women Meeting
Wednesday, October 3 10:30 - 11:00
CB4: Coffee break
Wednesday, October 3 11:00 - 12:00
LCN-Keynote2: Security and Privacy Considerations for Legacy and Future IoT Systems
For several years now, IoT (Internet of Things) sensors and their corresponding cyber-infrastructure systems have been in place in various application domains including scientific instrumentation, power grid, health-care and others, becoming legacy IoT systems to care for by many IoT cyber-infrastructure providers. Furthermore, with the development of new sensing IoT devices, new IoT services and systems are emerging, waiting to be deployed. In this talk, we examine security challenges that are coming up with the legacy IoT systems, and discuss possible solutions via edge computing to enable older IoT devices serve longer in various IoT application domains. We present a concrete example, the BRACELET edge-cloud solution, to illustrate the protection of aging IoT devices in scientific instrumentation domain. We also elaborate on security and privacy threats in future IoT systems, give examples, and discuss the "good and bad" with new sensors/IoT devices in health-care domain.
Wednesday, October 3 12:00 - 12:30
LCN-2019: Invitation to LCN 2019
Wednesday, October 3 12:30 - 13:30
LB3: Lunch
Wednesday, October 3 13:30 - 15:00
LCN-3A: 3A: Adaptive networking applications
- Self-Optimizing Scanning Parameters for Seamless Handover in IEEE 802.11 WLAN
- Empirical Study for Dynamic Adaptive Video Streaming Service Based on Google Transport QUIC Protocol
- A Multi-dimension Measurement Study of a Large Scale Campus WiFi Network
LCN-3B: 3B: Vehicular networks
- Context-based BSM Aggregation for Broad-Scale Applications in Vehicular Networks
- Broadcast Speedup in Vehicular Networks via Information Teleportation
- Taxi Dispatch Planning via Demand and Destination Modeling
LCN-3C: 3C: Realtime and Multimedia Communications
- Towards Improved DASH Adaptation in NDN: An Emulative Analysis
- Plato: Learning-based Adaptive Streaming of 360-Degree Videos
- Bitrate Adaptation-aware Cache Partitioning for Video Streaming over Information-Centric Networks
Wednesday, October 3 15:00 - 16:30
LCN-P2: Poster Session 2 with Coffee
Second half of the short paper poster presentations.
- Iterative Discovery of Multiple Disjoint Paths in Switched Networks with Multicast Frames
- Real-time Smartphone Indoor Tracking Using Particle Filter with Ensemble Learning Methods
- PAST-HOAS: Fast Setup of Per-Address Sink Routing Trees by Reverse Flooding
- Concurrent Transmission-based Packet Concatenation in Wireless Sensor Networks
- Low-complexity Dynamic Resource Slicing for Mixed Traffics in Virtualized Radio Access Network
- Virtual Terrain Nullification Using Phased Array Antennas for Wireless Ad Hoc Networks
- Geometric Monitoring in Action: a Systems Perspective for the Internet of Things
- Efficient Location Sensing in Longitudinal Cohort Studies
- Graph-Aware Deep Learning Based Intelligent Routing Strategy
- Strictly Prioritized Transmission of Urgent Data Based on MAC Coordination in WSNs
- BCXP: Blockchain-Centric Network Layer for Efficient Transaction and Block Exchange over Named Data Networking
- Generative Adversarial Networks Based Industrial Protocol Construction in the Fog Computing
- Multidimensional Resource Consumption Analysis of Co-Located VMs Using PCA
- Exploiting Correlation for Query Resolution in Multi-attribute Structured Peer-to-Peer Networks
- Automated Representation of Road Anomalies Using Machine Learning Based Methods and Smartphone Sensors
- PCach: The Case for Pre-Caching Your Mobile Data
- Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning
- Latency Measurement of Service Function Chaining on OpenStack Platform
- Segment Routed Traffic Engineering with Bounded Stretch in Software-Defined Networks
- Virtual Forces Based UAV Fleet Mobility Models for Air Pollution Monitoring
Wednesday, October 3 16:30 - 18:00
LCN-4A: 4A: Network Management
- ILP Formulation for Monitoring-Cycle Construction Using Segment Routing
- Whack-a-Mole: Software-defined Networking Driven Multi-level DDoS Defense for Cloud Environments
- An Incremental Approach for Swift OpenFlow Anomaly Detection
LCN-4B: 4B: Software-defined networks
- Representative Measurement Point Selection to Monitor Software-defined Networks
- VirtualStack: Flexible Cross-layer Optimization via Network Protocol Virtualization
- OSDF: An Intent-based Software Defined Network Programming Framework
LCN-4C: 4C: Security and privacy
- Anonymous Datagrams over DNS Records
- Improving Quantization for Channel Reciprocity Based Key Generation
- Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations
Thursday, October 4
Thursday, October 4 8:00 - 9:00
Registration: Registration
Thursday, October 4 9:00 - 10:30
LCN-Panel: What Blockchain offers for Networking Community: From Fundamental Research Challenges to Opportunities for its Applications
Moderator: Dr. Kemal Akkaya, Florida International University, Miami, FL
Panelists:
- Dr. Salil Kanhere, University of New South Wales, Australia
- Dr. Nikita Borisov, University of Illinois Urbana-Champaign, IL
- Dr. Klaus Wehrle, RWTH Aachen, Germany
Thursday, October 4 10:30 - 11:00
CB5: Coffe Break
Thursday, October 4 11:00 - 13:00
LCN-5A: 5A: Information-centric networking
- Exploiting Correlations in Request Streams: A Case for Hybrid Caching in Cache Networks
- LRU-2 Vs 2-LRU: An Analytical Study
- GATE and FENCE: Geo-Blocking Protocols for Named Data Networking
- FCTree: A Space Efficient FIB Data Structure for NDN Routers
LCN-5B: 5B: Internet of Things
- Automatic Device Classification from Network Traffic Streams of Internet of Things
- Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things
- Secure Low Latency Communication for Constrained Industrial IoT Scenarios
- Real-time Performance Evaluation of LTE for IIoT
LCN-5C: 5C: Performance Evaluation
- GoldenEye: Stream-Based Network Packet Inspection Using GPUs
- On the Practical Irrelevance of Metrics on Segment Routing Traffic Engineering Optimization
- CLF: An Online Coflow-Aware Packet Scheduling Algorithm
- Blow Up the CPU Chains! OpenCL-assisted Network Protocols