-
A Message From the Editor-in-Chief IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2020-12-04 Qian Zhang
Presents the introductory editorial for this issue of the publication.
-
A Cost-Driven Approach to Caching-as-a-Service in Cloud-Based 5G Mobile Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-08 Seyed Ehsan Ghoreishi; Dmytro Karamshuk; Vasilis Friderikos; Nishanth Sastry; Mischa Dohler; A. Hamid Aghvami
The exploding volumes of mobile video traffic call for deploying content caches inside mobile operator networks. With in-network caching, users’ requests for popular content can be served from a content cache deployed at mobile gateways in vicinity to the end user. This inherently reduces the load on the content servers and the backbone of operator's network. In light of the increasing trend in virtualization
-
A High-Availability Data Collection Scheme based on Multi-AUVs for Underwater Sensor Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-27 Guangjie Han; Xiaohan Long; Chuan Zhu; Mohsen Guizani; Wenbo Zhang
In this paper, a high-availability data collection scheme based on multiple autonomous underwater vehicles (AUVs) (HAMA) is proposed to improve the performance of the sensor network and guarantee the high availability of the data collection service. Multi-AUVs move in the network and their trajectory is predefined. The nodes near the trajectory of an AUV directly send their data to the AUV while the
-
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-04 Jongho Won; Seung-Hyun Seo; Elisa Bertino
Unmanned Vehicles (UVs) have been being utilized for various applications, such as surveillance, search/rescue, and monitoring. The information they transmit is critical for decision-making. However, UVs are vulnerable to white-box attacks due to improvements in reverse engineering techniques and the openness of their software. Therefore, attackers with sufficient knowledge of a target UV can steal
-
Auction-Based Data Transaction in Mobile Networks: Data Allocation Design and Performance Analysis IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-05 Jun Du; Erol Gelenbe; Chunxiao Jiang; Zhu Han; Yong Ren
Mobile data traffic is experiencing unprecedented increases due to the proliferation of highly capable smartphones, laptops and tablets, and mobile data offloading can be used to move traffic from cellular networks to other wireless infrastructures such as small-cell base stations. This work addresses the related issue of data allocation, by proposing a novel infrastructure independent method based
-
Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-04 Rhongho Jang; Jeonil Kang; Aziz Mohaisen; DaeHun Nyang
In this paper, we introduce a powerful hardware-based rogue access point (PrAP), which can relay back and forth traffic between a legitimate AP and a wireless station, and act as a man-in-the-middle attacker. Our PrAP is built of two dedicated wireless routers interconnected physically, and can relay traffic rapidly between a station and a legitimate AP. Through experiments, we demonstrate that the
-
Clustered Virtualized Network Functions Resource Allocation based on Context-Aware Grouping in 5G Edge Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-26 Sooeun Song; Changsung Lee; Hyoungjun Cho; Goeun Lim; Jong-Moon Chung
With the wide spread of various smart devices and the proliferation of internet of things (IoT) sensors, the amount of traffic on mobile networks is rapidly increasing, and applications with extreme requirements are increasing. Network function virtualization (NFV) and mobile edge computing (MEC) are emerging as core technologies to satisfy users’ real-time service demands. Adapting NFV technology
-
Coexistence Performance and Limits of Frame-Based Listen-Before-Talk IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-27 Gordon J. Sutton; Ren Ping Liu; Y. Jay Guo
Frame-based listen-before-talk (FB-LBT) has been adopted as one of the channel access mechanism for Wi-Fi/LTE coexistence. We aim to explore the limits of FB-LBT by developing theoretical models to characterize the FB-LBT channel access performance under the coexistence of LTE and Wi-Fi. We first derive a steady-state model to calculate the spectrum share occupied by LTE under the assumption that the
-
Habit2vec: Trajectory Semantic Embedding for Living Pattern Recognition in Population IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-01 Hancheng Cao; Fengli Xu; Jagan Sankaranarayanan; Yong Li; Hanan Samet
Recognizing representative living patterns in population is extremely valuable for urban planning and decision making. Thanks to the growing popularity of location-based applications and check-ins on social networking sites, Point of Interest (POI) of a location is quite often available in the trajectory data, which expresses user living semantics. However, adopting trajectory semantics for living
-
Image and WLAN Bimodal Integration for Indoor User Localization IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-04 Milan D. Redžić; Christos Laoudias; Ioannis Kyriakides
Recently, we experience the increasing prevalence of wearable cameras, some of which feature Wireless Local Area Network (WLAN) connectivity, and the abundance of mobile devices equipped with on-board camera and WLAN modules. Motivated by this fact, this work presents an indoor localization system that leverages both imagery and WLAN data for enabling and supporting a wide variety of envisaged location-aware
-
Label Coloring Based Beaconing Schedule in Duty-Cycled Multihop Wireless Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-27 Quan Chen; Hong Gao; Lianglun Cheng; Yingshu Li
Beaconing is a fundamental networking service where each node broadcasts a packet to all its neighbors locally. Unfortunately, the problem Minimum Latency Beaconing Schedule (MLBS) in duty-cycled scenarios is not well studied. Existing works always have rigid assumption that each node is only active once per working cycle. Aiming at making the work more practical and general, MLBS problem in duty-cycled
-
Machine Learning Based Network Analysis Using Millimeter-Wave Narrow-Band Energy Traces IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-26 Maria Scalabrin; Guillermo Bielsa; Adrian Loch; Michele Rossi; Joerg Widmer
Next-generation wireless networks promise to provide extremely high data rates, especially exploiting the so-called millimeter-wave frequency range. Gaining information from spectrum usage is becoming important to provide smart adaptation capabilities to future network protocol stacks. Issues such as deafness, misaligned antennas, or blockage may severely impact network performance, and their identification
-
Optimization Model for Cross-Domain Network Slices in 5G Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-18 Rami Akrem Addad; Miloud Bagaa; Tarik Taleb; Diego Leonel Cadette Dutra; Hannu Flinck
Network Slicing (NS) is a key enabler of the upcoming 5G and beyond system, leveraging on both Network Function Virtualization (NFV) and Software Defined Networking (SDN), NS will enable a flexible deployment of Network Functions (NFs) belonging to multiple Service Function Chains (SFC) over various administrative and technological domains. Our novel architecture addresses the complexities and heterogeneities
-
Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-15 F. Bouhafs; M. Seyedebrahimi; A. Raschellà; M. Mackay; Q. Shi
Current interference management solutions for dense IEEE 802.11 Wireless Local Area Networks (WLANs) rely on locally measuring the cumulative interference at the Acess Point (AP) in charge of adjusting the spectrum resources to its clients. These solutions often result in coarse-grained spectrum allocation that often leaves many wireless users unsatisfied and increases the spectrum congestion problem
-
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-05 Xing Liu; Jiqiang Liu; Sencun Zhu; Wei Wang; Xiangliang Zhang
While much effort has been made to detect and measure the privacy leakage caused by the advertising (ad) libraries integrated in mobile applications, analytics libraries, which are also widely used in mobile apps have not been systematically studied for their privacy risks. Different from ad libraries, the main function of analytics libraries is to collect users’ in-app actions. Hence, by design analytics
-
Probing into the Physical Layer: Moving Tag Detection for Large-Scale RFID Systems IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-25 Chuyu Wang; Lei Xie; Wei Wang; Yingying Chen; Tao Xue; Sanglu Lu
Logistics monitoring is a fundamental application that utilizes RFID systems to manage numerous tagged-objects. Due to the frequent rearrangement of tagged-objects, a fast RFID-based tracking approach is highly desired for accurate logistics distribution. However, traditional RFID systems usually take tens of seconds to interrogate hundreds of RFID tags, not to mention the time delay involved to locate
-
Reliability-Optimal Cooperative Communication and Computing in Connected Vehicle Systems IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-26 Jianshan Zhou; Daxin Tian; Yunpeng Wang; Zhengguo Sheng; Xuting Duan; Victor C.M. Leung
The emergence of vehicular networking enables distributed cooperative computation among nearby vehicles and infrastructures to achieve various applications that may need to handle mass data by a short deadline. In this paper, we investigate the fundamental problems of a cooperative vehicle-infrastructure system (CVIS): how does vehicular communication and networking affect the benefit gained from cooperative
-
Theoretical Framework for Estimating Target-Object Shape by Using Location-Unknown Mobile Distance Sensors IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-03-12 Hiroshi Saito; Tatsuaki Kimura
This paper proposes a theoretical framework for estimating a target-object shape, the location of which is not given. The framework uses mobile distance sensors and speed meters typically mounted on vehicles, the locations of which are also unknown. Each sensor continuously measures the distance from it to the target object. The proposed framework does not require any positioning function, anchor-location
-
A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-25 Victor Sucasas; Georgios Mantas; Joaquim Bastos; Francisco Damião; Jonathan Rodriguez
Crowdsensing requires scalable privacy-preserving authentication that allows users to send anonymously sensing reports, while enabling eventual anonymity revocation in case of user misbehavior. Previous research efforts already provide efficient mechanisms that enable conditional privacy through pseudonym systems, either based on Public Key Infrastructure (PKI) or Group Signature (GS) schemes. However
-
ARETE: On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-19 Zhenzhe Zheng; Yanqing Peng; Fan Wu; Shaojie Tang; Guihai Chen
Although data has become an important kind of commercial goods, there are few appropriate online platforms to facilitate the trading of mobile crowd-sensed data so far. In this paper, we present the first architecture of mobile crowd-sensed data market, and conduct an in-depth study of the design problem of online data pricing and reward sharing. To build a practical mobile crowd-sensed data market
-
Bird-MAC: Energy-Efficient MAC for Quasi-Periodic IoT Applications by Avoiding Early Wake-up IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-14 Daewoo Kim; Jinhwan Jung; Yoonpyo Koo; Yung Yi
We propose a new MAC protocol for IoT applications, called Bird-MAC, which is highly energy efficient in the applications where IoT sensors report monitoring status in a quasi-periodic manner, as in structural health monitoring and static environmental monitoring. Two key design ideas of Bird-MAC are: (a) no need of early-wake-up of transmitters and (b) taking the right balance between synchronization
-
Channel Access Optimization with Adaptive Congestion Pricing for Cognitive Vehicular Networks: An Evolutionary Game Approach IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-25 Daxin Tian; Jianshan Zhou; Yunpeng Wang; Zhengguo Sheng; Xuting Duan; Victor C.M. Leung
Cognitive radio-enabled vehicular nodes as unlicensed users can competitively and opportunistically access the radio spectrum provided by a licensed provider and simultaneously use a dedicated channel for vehicular communications. In such cognitive vehicular networks, channel access optimization plays a key role in making the most of the spectrum resources. In this paper, we present the competition
-
Dynamic Channel Bonding in Spatially Distributed High-Density WLANs IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-15 Sergio Barrachina-Muñoz; Francesc Wilhelmi; Boris Bellalta
In this paper, we discuss the effects on throughput and fairness of dynamic channel bonding (DCB) in spatially distributed high-density wireless local area networks (WLANs). First, we present an analytical framework based on continuous-time Markov networks (CTMNs) for depicting the behavior of different DCB policies in spatially distributed scenarios, where nodes are not required to be within the carrier
-
Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-28 Sihua Shao; Abdallah Khreishah; Issa Khalil
Visible light communication (VLC)-based indoor localization approaches enjoy many advantages, such as utilizing ubiquitous lighting infrastructure, high location accuracy, and no interruption to RF-based devices. However, existing VLC-based localization methods lack a real-time backward channel from the device to landmarks and necessitate computation at the device, which make them unsuitable for real-time
-
Fair and Efficient Caching Algorithms and Strategies for Peer Data Sharing in Pervasive Edge Computing Environments IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-27 Yaodong Huang; Xintong Song; Fan Ye; Yuanyuan Yang; Xiaoming Li
Edge devices with sensing, storage, and communication resources (e.g., smartphones, tablets, connected vehicles, and IoT nodes) are increasingly penetrating our daily lives. Many novel applications can be created through sharing data among nearby peer edge devices. In such applications, caching data at some edge devices can greatly improve data availability, retrieval robustness, and delivery latency
-
Leveraging Acoustic Signals for Vehicle Steering Tracking with Smartphones IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-18 Xiangyu Xu; Jiadi Yu; Yingying Chen; Yanmin Zhu; Minglu Li
Given the increasing popularity, mobile devices are exploited to enhance active driving safety nowadays. Among all safety services provided for vehicles, tracking the rotation angle of steering wheel in real time can monitor the vehicles’ dynamics and drivers’ behaviors at the same time. In this paper, we propose a steering tracking system, SteerTrack , which tracks the rotation angle of the steering
-
Near-Optimal and Truthful Online Auction for Computation Offloading in Green Edge-Computing Systems IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-25 Deyu Zhang; Long Tan; Ju Ren; Mohamad Khattar Awad; Shan Zhang; Yaoxue Zhang; Peng-Jun Wan
Utilizing the intelligence at the network edge, edge computing paradigm emerges to provide time-sensitive computing services for Internet of Things. In this paper, we investigate sustainable computation offloading in an edge-computing system that consists of energy harvesting-enabled mobile devices (MDs) and a dispatcher. The dispatcher collects computation tasks generated by IoT devices with limited
-
Never Use Labels: Signal Strength-Based Bayesian Device-Free Localization in Changing Environments IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-26 Peter Hillyard; Neal Patwari
Device-free localization (DFL) methods use measured changes in the received signal strength (RSS) between many pairs of RF nodes to provide location estimates of a person inside the wireless network. Fundamental challenges for RSS DFL methods include having a model of RSS measurements as a function of a person's location, and maintaining an accurate model as the environment changes over time. Current
-
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-21 Yushi Cheng; Xiaoyu Ji; Tianyang Lu; Wenyuan Xu
Wireless cameras are widely deployed in surveillance systems for security guarding. However, the privacy concerns associated with unauthorized videotaping, are drawing increasing attention recently. Existing detection methods for unauthorized wireless cameras are either limited by their detection accuracy or requiring dedicated devices. In this paper, we propose DeWiCam , a lightweight and effective
-
Optimizing Social Welfare of Live Video Streaming Services in Mobile Edge Computing IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-26 Yi-Hsuan Hung; Chih-Yu Wang; Ren-Hung Hwang
The live video streaming services have been suffered from the limited backhaul capacity of the cellular core network and occasional congestions due to the cloud-based architecture. Mobile Edge Computing (MEC) brings the services from the centralized cloud to nearby network edge to improve the Quality of Experience (QoE) of cloud services, such as live video streaming services. Nevertheless, the resource
-
Performance Analysis of Scheduled Access Mode of the IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-26 Tanumay Manna; Iti Saha Misra
In this paper, we present an analytical model for the scheduled access mechanism of IEEE 802.15.6 based Wireless Body Area Network (WBAN) taking into account the impact of non-ideal transmission channel. We provide a thorough analysis and closed form expressions for the frame delay, reliability of data transfer, throughput, energy consumption, and Energy Efficiency (EE) of the sensor nodes with medium
-
Spatial and Temporal Management of Cellular HetNets with Multiple Solar Powered Drones IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-26 Ahmad Alsharoa; Hakim Ghazzai; Abdullah Kadri; Ahmed E. Kamal
This paper proposes an energy management framework for cellular heterogeneous networks (HetNets) supported by dynamic solar powered drones. A HetNet composed of a macrocell base station (BS), micro cell BSs, and drone small cell BSs are deployed to serve the networks’ subscribers. The drones can land at pre-planned locations defined by the mobile operator and at the macrocell BS site where they can
-
TagBreathe: Monitor Breathing with Commodity RFID Systems IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-25 Yanwen Wang; Yuanqing Zheng
Breath monitoring helps assess the general personal health and gives clues to chronic diseases. Yet, current breath monitoring technologies are inconvenient and intrusive. For instance, typical breath monitoring devices need to attach nasal probes or chest bands to users. Wireless sensing technologies have been applied to monitor breathing using radio waves without physical contact. Those wireless
-
Unraveling Impact of Critical Sensing Range on Mobile Camera Sensor Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-25 Xiaoying Gan; Zesen Zhang; Luoyi Fu; Xudong Wu; Xinbing Wang
In camera sensor networks (CSNs), full view coverage, meaning that any direction of any point in the operational region is covered by at least one camera sensor, plays a significant role in object identification. While prior work is dedicated to static CSNs for the sake of critical condition to achieve full view coverage, such performance still remains unknown in mobile CSNs. In this paper, we take
-
Decentralized Asynchronous Coded Caching Design and Performance Analysis in Fog Radio Access Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-01 Yanxiang Jiang; Wenlong Huang; Mehdi Bennis; Fu-Chun Zheng
In this paper, we investigate the problem of asynchronous coded caching in fog radio access networks (F-RANs). To minimize the fronthaul load, the encoding set collapsing rule and encoding set partition method are proposed to establish the relationship between the coded-multicasting contents for asynchronous and synchronous coded caching. Furthermore, a decentralized asynchronous coded caching scheme
-
Supervisory Performance Control of Concurrent Mobile Apps for Energy Efficiency IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-07 Marco Brocanelli; Xiaorui Wang
Two critical quality factors for mobile devices (e.g., smartphones, tablets) are battery life and user-perceived performance of User Interface (UI) events, e.g., responsiveness of user action events and frame rate of video playback events. Unfortunately, state-of-the-art solutions have at least one of the following three limitations: 1) they cannot efficiently handle concurrent UI events of multiple
-
A Machine Learning approach to 5G Infrastructure Market optimization IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-01 Dario Bega; Marco Gramaglia; Albert Banchs; Vincenzo Sciancalepore; Xavier Costa-Perez
It is now commonly agreed that future 5G Networks will build upon the network slicing concept. The ability to provide virtual, logically independent “slices” of the network will also have an impact on the models that will sustain the business ecosystem. Network slicing will open the door to new players: the infrastructure provider, which is the owner of the infrastructure, and the tenants, which may
-
A Signal-Level Transfer Learning Framework for Autonomous Reconfiguration of Wearable Systems IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2018-10-30 Ramyar Saeedi; Assefaw Gebremedhin
Machine learning algorithms, which form the core intelligence of wearables, traditionally deduce a computational model from a set of training data to detect events of interest. However, in the dynamic environment in which wearables operate, the accuracy of a computational model drops whenever changes in configuration or context of the system occur. In this paper, using transfer learning as an organizing
-
Composite Amplitude-Shift Keying for Effective LED-Camera VLC IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-01 Yanbing Yang; Jun Luo
LED-Camera Visible Light Communication (VLC) is gaining increasing attention, thanks to its readiness to be implemented with Commercial Off-The-Shelf devices and its potential to deliver pervasive data services indoors. Nevertheless, existing LED-Camera VLC systems employ mainly low-order modulations such as On-Off Keying (OOK) given the simplicity of their implementation, yet such rudimentary modulations
-
DPavatar: A Real-time Location Protection Framework for Incumbent Users in Cognitive Radio Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-05 Jianqing Liu; Chi Zhang; Beatriz Lorenzo; Yuguang Fang
Dynamic spectrum sharing between licensed incum- bent users (IUs) and unlicensed wireless industries has been well recognized as an efficient approach to solving spectrum scarcity as well as creating spectrum markets. Recently, both U.S. and European governments called a ruling on opening up spectrum that was initially licensed to sensitive military/federal systems. However, this introduces serious
-
Energy- and Mobility-Aware Scheduling for Perpetual Trajectory Tracking IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-05 Philipp Sommer; Kai Geissdoerfer; Raja Jurdak; Brano Kusy; Jiajun Liu; Kun Zhao; Adam Mckeown; David Westcott
Energy-efficient location tracking with battery-powered devices using energy harvesting necessitates duty-cycling of GPS to prolong the system lifetime. We propose an energy- and mobility-aware scheduling framework that adapts to real-world dynamics to achieve optimal long-term tracking performance. To forecast energy, the framework uses an exponentially weighted moving average filter to compute a
-
Hardware-assisted, Low-cost Video Transcoding Solution in Wireless Networks IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-12 Jongwon Yoon; Suman Banerjee
Wireless video streaming has become an extremely popular application in recent years. Internet video streaming to mobile devices, however, faces several challenges, e.g., unstable wireless connections, long latency, high jitter and etc. Bitrate adaptive streaming and video transcoding solutions are widely used to address the above-mentioned issues, however, there are still several shortcomings of these
-
HyTasker: Hybrid Task Allocation in Mobile Crowd Sensing IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-12 Jiangtao Wang; Feng Wang; Yasha Wang; Leye Wang; Zhaopeng Qiu; Daqing Zhang; Bin Guo; Qin Lv
Task allocation is a major challenge in Mobile Crowd Sensing (MCS). While previous task allocation approaches follow either the opportunistic or participatory mode, this paper proposes to integrate these two complementary modes in a two-phased hybrid framework called HyTasker. In the offline phase, a group of workers (called opportunistic workers) are selected, and they complete MCS tasks during their
-
Interactive Context for Mobile OS Resource Management IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-12 Meng Zhu; Kai Shen
This paper presents an application-transparent execution context for mobile operating systems that reflects the criticality of current execution on user interactivity. We track Android/Linux system-level events including semantic syscalls, UI actions, and standard inter-process and intra-process communication interfaces that signal the initiation and propagation of interactivity-related executions
-
LaSR: A Supple Multi-Connectivity Scheduler for Multi-RAT OFDMA Systems IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2018-10-18 Luis Diez; Andres Garcia-Saavedra; Victor Valls; Xi Li; Xavier Costa-Perez; Ramon Aguero
Network densification over space and spectrum is expected to be key to enabling the requirements of next generation mobile systems. The pitfall is that radio resource allocation becomes substantially more complex. In this paper we propose LaSR, a practical multi-connectivity scheduler for OFDMA-based multi-RAT systems. LaSR makes optimal discrete control actions by solving a sequence of simple optimization
-
Offloading Computations to Mobile Devices and Cloudlets via an Upgraded NFC Communication Protocol IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-12 Dimitris Chatzopoulos; Carlos Bermejo Fernandez; Sokol Kosta; Pan Hui
The increasing complexity of smartphone applications and services necessitate high battery consumption, but the growth of smartphones' battery capacity is not keeping pace with these increasing power demands. To overcome this problem, researchers gave birth to the Mobile Cloud Computing (MCC) research area. In this paper, we advance on previous ideas, proposing and implementing a Near Field Communication
-
On the Interaction of Charging-Aware Mobility and Wireless Capacity IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-26 Wanxin Gao; Ioanis Nikolaidis; Janelle Harms
Today's mobile battery-powered communication devices require that users access chargers via wired and, recently, wireless recharging facilities. For a device departing from a location with a given energy “budget”, a plausible strategy is to seek a charger location once the energy is exhausted. We present a model of mobile nodes that captures the paths followed by the nodes with depleted energy seeking
-
Real-time Crowd Monitoring using Seamless Indoor-Outdoor Localization IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-05 Tarun Kulshrestha; Divya Saxena; Rajdeep Niyogi; Jiannong Cao
Human identification and monitoring are critical in many applications, such as surveillance, evacuation planning. Human identification and monitoring are not an easy task in the case of a large and densely populated crowd. However, none of the existing solutions consider seamless localization, identification, and tracking of the crowd for surveillance in both indoor and outdoor environments with significant
-
RSS Models for Respiration Rate Monitoring IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-05 Hüseyin Yiǧitler; Ossi Johannes Kaltiokallio; Roland Hostettler; Alemayehu Solomon Abrar; Riku Jantti; Neal Patwari; Simo Särkkä
Received signal strength based respiration rate monitoring is emerging as an alternative non-contact technology. These systems make use of the radio measurements of short-range commodity wireless devices, which vary due to the inhalation and exhalation motion of a person. The success of respiration rate estimation using such measurements depends on the signal-to-noise ratio, which alters with properties
-
Security Properties of Gait for Mobile Device Pairing IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-07 Arne Bruesch; Le Nguyen; Dominik Schürmann; Stephan Sigg; Lars C. Wolf
Gait has been proposed as a feature for mobile device pairing across arbitrary positions on the human body. Results indicate that the correlation in gait-based features across different body locations is sufficient to establish secure device pairing. However, the population size of the studies is limited and powerful attackers with e.g. capability of video recording are not considered. We present a
-
Shortest-Latency Opportunistic Routing in Asynchronous Wireless Sensor Networks with Independent Duty-Cycling IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-07 Xinming Zhang; Lei Tao; Fan Yan; Dan Keun Sung
For opportunistic routing in independent duty cycled wireless sensor networks (WSNs), a sender dynamically determines a relay candidate set depending on the real-time network conditions. Due to independent and varying duty cycle length, the sender may handle different waking-up orders of the potential forwarders when it tries to forward data packets at different time instants. Conventional opportunistic
-
Signature Verification Using Critical Segments for Securing Mobile Transactions IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-02-05 Yanzhi Ren; Chen Wang; Yingying Chen; Mooi Choo Chuah; Jie Yang
The explosive usage of mobile devices enables conducting electronic transactions involving direct signature on such devices. Thus, user signature verification becomes critical to ensure the success deployment of online transactions such as approving legal documents and authenticating financial transactions. Existing approaches mainly focus on user verification targeting the unlocking of mobile devices
-
Performance and Pitfalls of 60 GHz WLANs Based on Consumer-Grade Hardware IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2020-01-16 Swetank Kumar Saha; Shivang Aggarwal; Hany Assasa; Adrian Loch; Naveen Muralidhar Prakash; Roshan Shyamsunder; Daniel Steinmetzer; Dimitrios Koutsonikolas; Joerg Widmer; Matthias Hollick
Wireless networks operating in the 60 GHz band have the potential to provide very high throughput but face a number of challenges (e.g., high attenuation, beam training, and coping with mobility) which are widely accepted but often not well understood in practice. Understanding these challenges, and especially their actual impact on consumer-grade hardware is fundamental to fully exploit the high physical
-
An Application Placement Technique for Concurrent IoT Applications in Edge and Fog Computing Environments IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2020-01-15 Mohammad Goudarzi; Huaming Wu; Marimuthu Palaniswami; Rajkumar Buyya
Fog/Edge computing emerges as a novel computing paradigm that harnesses resources in the proximity of the Internet of Things (IoT) devices so that, alongside with the cloud servers, provide services in a timely manner. However, due to the ever-increasing growth of IoT devices with resource-hungry applications, fog/edge servers with limited resources cannot efficiently satisfy the requirements of the
-
Autonomous UAV Trajectory for Localizing Ground Objects: A Reinforcement Learning Approach IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2020-01-15 Dariush Ebrahimi; Sanaa Sharafeddine; Pin-Han Ho; Chadi Assi
Disaster management, search and rescue missions, and health monitoring are examples of critical applications that require object localization with high precision and sometimes in a timely manner. In the absence of the global positioning system (GPS), the radio received signal strength index (RSSI) can be used for localization purposes due to its simplicity and cost-effectiveness. However, due to the
-
IoT and HIP's Opportunistic Mode IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2020-01-15 Adel Fuchs; Ariel Stulman; Andrei Gurtov
Key sharing has always been a complex issue. It became even more challenging for the Internet of Things (IoT), where a trusted third party for global management rarely exists. With authentication and confidentiality lacking, things resort to a leap of faith (LoF) paradigm where it is assumed that no attacker is present during the initial configuration. In this paper we focus on the Host Identity Protocol
-
The Design of Dynamic Probabilistic Caching with Time-Varying Content Popularity IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2020-01-15 Jie Gao; Shan Zhang; Lian Zhao; Xuemin Shen
In this paper, we design dynamic probabilistic caching for the scenario when the instantaneous content popularity may vary with time while it is possible to predict the average content popularity over a time window. Based on the average content popularity, optimal content caching probabilities can be found, e.g., from solving optimization problems, and existing results in the literature can implement
-
A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-01-16 Amit Kumar Sikder; Hidayet Aksu; A. Selcuk Uluagac
Sensors (e.g., light, gyroscope, and accelerometer) and sensing-enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor Application Programming Interface (API). In this way
-
A Pragmatic Approach to Clear Channel Assessment Threshold Adaptation and Transmission Power Control for Performance Gain in CSMA/CA WLANs IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-01-14 William Jones; R. Eddie Wilson; Angela Doufexi; Mahesh Sooriyabandara
We propose practical sets of rules for adapting Clear Channel Assessment (CCA) and Transmit Power (TP) parameters by simulating ensembles of randomly generated wireless networks and collecting throughput statistics. The rules’ performances depend strongly on network topology, with increases in throughput in many cases. However, networks with a high clustering coefficient are often adversely effected
-
Cellular Fronthaul Offloading Using Device Fogs, Caching, and Network Coding IEEE Trans. Mob. Comput. (IF 5.112) Pub Date : 2019-01-22 Kameliya Kaneva; Neda Aboutorab; Sameh Sorour; Mark C. Reed
This paper considers a device-based Fog Radio Access Network (F-RAN), where users’ smart devices (denoted by F-UEs) can be exploited to cache popular files so as to communicate them when requested by other F-UEs among them. This architecture restricts the involvement of the central baseband processing unit (BBU) to serving those F-UEs not immediately served by their peers, thus offloading the BBU's
Contents have been reproduced by permission of the publishers.