Technical Program of LCN 2013 and Adjunct Workshops
Monday, October 21
08:00 - 08:50
Registration with Coffee and Tea
08:50 - 09:00
P2MNET: Welcome and Introduction
goSMART: Welcome and Introduction
SenseApp: Welcome and Introduction
09:00 - 10:30
P2MNET: QoS Analysis and Performance Evaluation
- Predicting Short 802.11 Sessions From RADIUS Usage Data
- A Performance Study of Hybrid Protocols for Opportunistic Communications
- QoS Analysis and Evaluations: Improving Cellular-based Distance Education
09:00 - 09:40
goSMART: Session 1
- SocialCycle: What Can a Mobile App Do to Encourage Cycling?
- Sharing Risk-Awareness for Reliable Resource Management in Smart Buildings
09:00 - 10:30
SenseApp: Applications for a Smarter Planet
- Going All the Way - Detecting and Transmitting Events with Wireless Sensor Networks in Logistics
- Processing and Visualizing Traffic Pollution Data in Hanoi City From a Wireless Sensor Network
- HazeWatch: A Participatory Sensor System for Monitoring Air Pollution in Sydney
09:40 - 10:30
goSMART Keynote: Prof. Rajiv Khosla, La Trobe University, Australia
Abstract: Wellness is important for development and sustainability of smart cities. This talk will share our experiences with design of Wellness robots like Sophie and Charlie and their trials in private homes in Australia. The talk will demonstrate integration of social design with technology design to enhance the subjective emotional well being of their human partners.
10:30 - 11:00
Coffee break
11:00 - 12:30
P2MNET: IEEE 802.11 and LTE Networks
- Grassmannian Beamforming for Coordinated Multipoint Transmission in Multicell Systems
- Implementation and Validation of Multimedia Broadcast Multicast Service for LTE/LTE-Advanced in OpenAirInterface Platform
- HOF: A History-based Offloading Framework for LTE Networks Using Mobile Small Cells and Wi-Fi
11:00 - 11:40
goSMART: Session 2
- Model-Free HVAC Control Using Occupant Feedback
- A Framework for Massive Access and Radio Resource Management in Urban WLANs
11:00 - 12:00
SenseApp Keynote: Dr. Raja Jurdak, CSIRO, Australia
Abstract: Long-term outdoor localisation
with battery-powered devices remains an unsolved challenge, mainly due
to the high energy consumption of GPS modules. The use of inertial
sensors and short-range radio can reduce reliance on GPS to prolong the
operational lifetime of tracking devices, but they only provide
coarse-grained control over GPS activity. An alternative yet promising
approach is to use context-sensitive mobility models to guide scheduling
and sampling decisions in localisation algorithms. In this talk, I will
present our work towards continental-scale long-term tracking of flying
foxes, as part of the National Flying Fox Monitoring Program in
Australia, using a model-driven approach. At the core of our approach is
the multimodal GPS-enabled Camazotz sensor node platform that has been
designed at CSIRO for flying fox collars, with a cumulative weight just
under 30g.
The project has already deployed tens of devices on live flying foxes,
which have been operating in the field for several months. We are using
the data from these devices to build mobility models and algorithms for
designing the next generation of software, as we will progressively
deploy more than 1000 nodes within the coming months. The progressive
deployment of nodes coupled with delay tolerance, constrained resources,
and incremental feature development raises interesting systems
challenges and opportunities, which I will highlight. The talk will also
provide a snapshot of the current data collection effort, and draw
lessons from our activities in this area over the past 18 months.
11:40 - 12:20
goSMART: Panel Discussion
More than half of the world's population
lives in urban areas today. The current trend of unprecedented migration
from rural areas to urban centers is expected to continue in the near
future. This increasing urbanization has placed continuous and
increasing pressure upon infrastructure, residential and commercial
properties, and social communities. Cities of the future can be models
of environmental efficiency, because increased density and better
management reduce the cost of service delivery, promote innovation, and
enable prosperity through economic development.
Sustainability requires that the wellbeing of society - the combination
of community liveability, environmental sustainability and economic
prosperity - is maintained or improved over time. Measuring
sustainability is about monitoring how each of these is tracking over
time. In recent times, there has been a lot of interest on defining and
quantifying suitable indicators for measuring sustainability of cities.
In this panel, we will investigate the latest research in this domain
and outline strategies for future research.
12:00 - 12:30
SenseApp: Understanding Frameworks, Protocols, Mechanisms, Components
- A Smart Data Forwarding Method Based on Adaptive Levels in Wireless Sensor Networks
- Wireless Underwater Power and Data Transfer
12:20 - 12:30
goSMART: Conclusions and Wrap-Up
12:30 - 13:30
Lunch break
13:30 - 15:00
P2MNET: Performance Evaluation of Wireless Networks
- Rethinking Connectivity Restoration in WSNs Using Feedback From a Low-cost Mobile Sensor Network Testbed
- EE-MAC: Energy Efficient Sensor MAC Layer Protocol
- Estimating Contention of IEEE 802.11 Broadcasts Based on Inter-Frame Idle Slots
13:30 - 14:30
ON-MOVE Keynote: Prof. Salil Kanhere, The University of New South Wales, Australia
Abstract: An increasing number of users today access the Internet from fast moving platforms, either directly through their personal devices or through broadband connectivity embedded in the vehicle. This trend is only expected to continue as in-car mobile broadband services are rapidly being introduced by the automotive industry. However, at vehicular speed, cellular network bandwidth becomes notoriously uncertain as the user moves through many different locations within the same Internet session. If we had better ways to reduce this uncertainty, we could improve the robustness of many real-time Internet applications that critically depend on the accurate knowledge of available network bandwidth. Based on real experiments on the roads of Sydney, this talk will first examine the extent of bandwidth uncertainty for vehicular Internet access. Then, a geo-intelligence framework will be presented that seeks to reduce this uncertainty by exploiting the geo-dependency property of cellular bandwidth. Finally, application of geointelligence to improve the performance of mobile streaming will be demonstrated. The talk will conclude with open issues and future directions of research in developing seamless geo-intelligence for mobile computing.
13:45 - 15:00
SenseApp: Routing, Development and Deployment Support
- CREST: An Epoch-Oriented Routing Control Plane for Low-Power and Lossy Networks
- All Eyes on Code: Using Call Graphs for WSN Software Optimization
- PROVIZ: An Integrated Visualization and Programming Framework for WSNs
14:30 - 15:00
ON-MOVE: Session 1
- Supporting User Mobility with Peer-to-Peer-based Application Mobility in Heterogeneous Networks
15:00 - 15:30
Coffee break
15:30 - 16:30
P2MNET: Multimedia over Vehicular Networks
- North-American Speed Limit Sign Detection and Recognition for Smart Cars
- Protocol of Change Pseudonyms for VANETs
15:30 - 18:00
ON-MOVE: Session 2
- A Novel Route Guidance Algorithm Using Beamforming Techniques for Vehicular Networks
- Multi-User-Type Travel Simulator Based on Open Travel Data
- Enhancing Safety Messages Dissemination Over 802.11p/DSRC
- Mobile Computing Application for Industrial Field Service Engineering: A Case for ABB Service Engineers
15:30 - 16:30
SenseApp: Outside the box: Innovative Applications
- SNOWWEB - Wirelessly Connected Weather Stations in Antarctica
- Toward a Rapidly Deployable RTI System for Tactical Operations
16:30 - 16:45
SenseApp: Best Paper Award and Conclusion
18:00 - 18:00
Workshops Monday - End of the technical program
Tuesday, October 22
08:00 - 08:30
Registration with Coffee and Tea
08:30 - 09:00
Opening and Welcome
09:00 - 10:00
Keynote 1: Kevin Bloch, Chief Technical Officer, Cisco Australia and New Zealand
Abstract: In its formative stages, SDN was popular in research and venture capital communities. However as organisations tackle issues such as complexity, automation and time to market, the industry has become involved in this transition. SDN potentially addresses some of these challenges at the same time as exposing new options for cloud, predictive analytics and the Internet of Everything. This presentation provides an industry perspective of the drivers, status and potential of SDN and the promise of infrastructure virtualisation and programmability.
10:00 - 10:30
Coffee break
10:30 - 12:10
1A: Plenary session: Best Paper Candidates
- Autonomous Deployment of Sensors for Maximized Coverage and Guranteed Connectivity in Underwater Acoustic Sensor Networks
- Let's Talk Together: Understanding Concurrent Transmission in Wireless Sensor Networks
- Efficient Multicast Delivery for Wireless Data Center Networks
- PopCache: Cache More or Less Based on Content Popularity for Information-Centric Networking
12:10 - 13:30
Lunch break
13:30 - 14:30
Keynote 2: Prof. Aruna Seneviratne, University of New South Wales & NICTA, Australia
Abstract: Mobile devices already produce
about 600 terabytes of data every month, through more than 1.5 million
cellular base stations and 5 billion mobile phones. Moreover, the rate
of data that is being produced is expected to grow exponentially over
time. Mobile broadband is fast becoming an essential part of modern
life. The ability to cater to this demand is severely hampered by the
shortage of radio frequency spectrum. So apart from developing new
technologies that use the spectrum efficiently, it is also necessary to
make the mobile systems smarter.
This talk will describe the techniques that are making systems smarter
through the provision of user centered/personalized services and
applications, and highlight one of the major challenges of designing
such systems, namely preservation of privacy of the users. It will
examine some the recent recommender systems, personalized content
delivery systems, and mobile applications to highlight the potential
privacy threat these applications and services pose to users. Then it
will outline some of the current solutions that are being proposed by
the research community and provide discussion of one such approach —
mobile service overlays — by focusing on the principles and practical
considerations that went into the design of a privacy-preserving user
generated content distribution system called mobitribe.
14:30 - 14:45
Invitation to LCN 2014
15:00 - 17:00
Demonstrations with Coffee
- SDN API for Access Network Virtualization
- Characterizing the Driving Style Behavior Using Artificial Intelligence Techniques
- Simulation of Congestion Management for Emergency Evacuation
- Showcase of a Fragment-based Distributed Cloud Storage System
- Regression Testing Framework for WSNs
- Demonstration of a Loosely Coupled M2M System Using Arduino, Android and Wiki Software
- Energy-Efficient Status Monitoring in Sensor Networks Using Adaptive Piggybacking
- Demonstration of a Simple, Versatile, Distributed Low-Power Wireless M2M Infrastructure
- Smarter Buildings for the Smart Grid? Let Them Forecast Their Power Consumption
- Concurrent Use of WiFi Channels to Provide QoS
- Energy-Efficient Security in Smart Metering Scenarios
Posters with Tea
- Protocol for Efficient Opportunistic Communication
- Spectrum Sensing Aided Long-Term Spectrum Management in Cognitive Radio Networks
- EnerSim: An Energy Consumption Model for Large-Scale Overlay Simulators
- Alleviating the Domino's Effect in Wireless Sensor Networks
- GRS: Global Resolution Service for Mobility Support in the Internet
- Minimally-Intrusive Frequent Round Trip Time Measurements Using Synthetic Packet-Pairs
- Adaptive QoS Control Adjusting Receive Buffer Sizes and Parallel TCP Connections on Information Gathering Server
- Leveraging Online Social Networks for a Real-time Malware Alerting System
- On the Use of a Cooperative Neighbor Position Verification Scheme to Secure Warning Message Dissemination in VANETs
- LTE-Advanced Handover: An Orientation Matching-Based Fast and Reliable Approach
- Delay-Constrained and Energy-Balanced Broadcasts for Low Duty-cycled Wireless Sensor Networks
- WiFi Fingerprint Localization in Open Space
- Evaluating a Framework for Different Networking Paradigms
- Comparative Performance Analysis of High-speed Transfer Protocols for Big Data
- An End-to-end Delay Metric for Multi-rate Wireless Mesh Networks with Cooperative Retransmission
- WiFi Indoor Positioning System Using Transmit Power Variation and kNN
- Detecting Heap-Spray Attacks in Drive-by Downloads: Giving Attackers a Hand
- Received Signal Strength Indicator and Its Analysis in a Typical WLAN System
- Security Analysis of a Protocol for Pollution Attack Detection
- STELA: A Transceiver Duty Cycle Management Strategy for Energy Efficiency in Wireless Communications
- UAS: Universal Anti-Spoofing by Incorporating Existing Mechanisms
- The OFELIA TUB-Island an Europe-Wide Connected OpenFlow Testbed
- A Genetic Algorithm for Spanning Tree Optimization in Sensor Networks
- Distributed Optimization of Event Dissemination Exploiting Interest Clustering
- An Improved Connectivity-based Boundary Detection Algorithm in Wireless Sensor Networks
- Evaluating the Energy-Efficiency of the Rich Uncle Key Exchange Protocol in WSNs
- Experiences From Security Research Using a Wireless Mesh Network Testbed
- Accurate QoS-based Service Selection Algorithm for Service Composition
17:00 - 17:00
LCN Tuesday - End of the technical program
18:00 - 22:00
Conference Banquet
Wednesday, October 23
08:30 - 09:00
Registration with Coffee and Tea
09:00 - 10:40
3A: WSN: Sensing and Monitoring
- Near Optimal Design of Multi-level WSNs for Environmental Monitoring
- Energy-Aware Cross-Layer Optimization for EEG-based Wireless Monitoring Applications
- Event-Driven Energy-Harvesting Wireless Sensor Network for Structural Health Monitoring
- BlockTree: Location-Aware Decentralized Monitoring in Mobile Ad Hoc Networks
3B: Network Traffic Control & Monitoring
- Approaches for Practical BitTorrent Traffic Control
- Multi-dimensional Aggregation for DNS Monitoring
- High Quality Streaming System with Hierarchical Cache Servers Based on Inter-Stream FEC Function
- DASHing YouTube: An Analysis of Using DASH in YouTube Video Service
3C: Quality of Service
- Improvement in Packet-Reordering with Limited Re-Sequencing Buffers: An Analysis
- QoE-cognizant Video Rate Adaptation Over Bandwidth-limited Network Paths
- A Game-Theoretic Spectrum Allocation Framework for Mixed Unicast and Broadcast Traffic Profile in Cognitive Radio Networks
10:40 - 10:55
Coffee break
10:55 - 12:30
2A: Multihop Networks
- On Path Exposure in Probabilistic Wireless Sensor Networks
- Data Filtering for Wireless Sensor Networks Using Forecasting and Value of Information
- Autonomous Discovery and Repair of Damage in Wireless Sensor Networks
- Quantifying Selfishness and Fairness in Wireless Multihop Networks
- An Energy Efficient Network Coding Approach for Wireless Body Area Networks
2B: Transport Protocols
- eCMT-SCTP: Improving Performance of Multipath SCTP with Erasure Coding Over Lossy Links
- DHash:A Cache-Friendly TCP Lookup Algorithm for Fast Network Processing
- Initial Spreading: a Fast Start-Up TCP Mechanism
- Evolution of TCP's Initial Window Size
- Using Delay-Gradient TCP for Multimedia-Friendly 'Background' Transport in Home Networks
2C: Scheduling and MAC
- Packet Transmission Scheduling for Enhancing Total Throughput Against Channel Fading in Wireless LAN
- DSH-MAC: Medium Access Control Based on Decoupled and Suppressed Handshaking for Long-delay Underwater Acoustic Sensor Networks
- Analysing and Reducing Network Inaccessibility in IEEE 802.15.4 Wireless Communications
- Advance Bandwidth Reservation for Energy Efficiency in High-performance Networks
- Rate Equilibria in WLANs with Block ACKs
12:30 - 13:30
Lunch break
13:30 - 15:10
4A: Delay Tolerant and Vehicular Networks
- An Adaptive Channel Coordination Mechanism for Vehicular Ad Hoc Networks
- Characterization of a Transoceanic Aircraft Delay Tolerant Network
- Assessing the Effectiveness of DTN Techniques Under Realistic Urban Environments
- Probabilistic Routing Based on Fine-Grained Contact Characterization in Delay Tolerant Networks
4B: Cloud Computing and Data Centers
- Throughput Maximization for Online Request Admissions in Mobile Cloudlets
- A Cloud Storage Overlay to Aggregate Heterogeneous Cloud Services
- SlickFlow: Resilient Source Routing in Data Center Networks Unlocked by OpenFlow
- Automated Diagnosis of Known and Unknown Soft-Failure in User Devices Using Transformed Signatures and Single Classifier Architecture
4C: Security
- Secure Connected Scalable Combinatorial KPS in WSN: Deterministic Merging, Localization
- Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
- SCADAVT--A Framework for SCADA Security Testbed Based on Virtualization Technology
- IP Agnostic Real-Time Traffic Filtering and Host Identification Using TCP Timestamps
15:10 - 16:20
Posters with Tea
- A Virtual Sensor Scheduling Framework for Heterogeneous Wireless Sensor Networks
- Performance Evaluation of IEEE 802.1Qbu: Experimental and Simulation Results
- QoS Assessment for Mission-critical Wireless Sensor Network Applications
- Topology-aware PEX for Improving BitTorrent
- A Novel MAC Protocol of Wireless LAN with High Throughput and Fairness
- Automatic Over-the-Air Provisioning for Wi-Fi Equipped M2M Devices
- Time Division Configuration Multiplexing of Wireless Interfaces
- Virtualized Network Isolation Using Software Defined Networks
- SOS Social Network-based Distributed Data Storage
- ACSP-Tree: A Tree Structure for Mining Behavioral Patterns From Wireless Sensor Networks
- Multi-Layer Optimization for Service Provider Transport Networks
- Cooperative Routing Protocol for Content-Centric Networking
- Virtual Topology Control with Multistate Neural Associative Memories
- IEEE 802.15.4 Based Hybrid MAC Protocol for Hybrid Monitoring WSNs
- Faster Distributed Localization of Large Numbers of Nodes Using Clustering
- The Use of Erasure Coding for Video Streaming Unicast Over Vehicular Ad Hoc Networks
- A Joint 3D Localization and Synchronization Solution for Wireless Sensor Networks Using UAV
- An Efficient ARP for Large-scale IEEE 802.11s-based Smart Grid Networks
- Reactive and Proactive Congestion Management for Emergency Building Evacuation
- X-Control: A Quasi-Distributed Fault Restoration Mechanism Using Logically Centralized Controllers
- Wireless Sensor Networks and LTE-A Network Convergence
- Component-based Wireless Sensor Networks: A Dynamic Paradigm for Synergetic and Resilient Architectures
- Network Performance of the JBoss Application Server
- Deferred Discard for Improving the Quality of Video Sent Across Congested Networks
- Resource Allocation by Pondering Parameters for Uplink System in LTE Networks
- Maximizing Topic Propagation Driven by Multiple User Nodes in Micro-Blogging
- Performance of Multi-Channel IEEE 802.11 WLANs with Bidirectional Flow Control
- Private and Resilient Data Aggregation
16:25 - 18:05
5A: Wireless and Home Networks
- A Framework to Rapidly Test SDN Use-Cases and Accelerate Middlebox Applications
- On the Use of Thin-client Set-Top Boxes for IPTV Services
- Can Dynamic Pricing Make Femto Users and Service Providers Happy?
- Capacity Analysis of Combined IPTV and VoIP Over IEEE 802.11n
5B: Information Centric & Opportunistic Networks
- A Community-Oriented Route Coordination Using Information Centric Networking Approach
- PCV: Predicting Contact Volume for Reliable and Efficient Data Transfers in Opportunistic Networks
- Enhanced Data Delivery Framework for Dynamic Information-Centric Networks (ICNs)
- Routing and Data Aggregation Toward a High Speed Sink in Wireless Sensor Networks
5C: Privacy
- On the Efficiency of Privacy-Preserving Path Hiding for Mobile Sensing Applications
- SmartRevoc: An Efficient and Privacy Preserving Revocation System Using Parked Vehicles
- Modeling Cooperative, Selfish and Malicious Behaviors for Trajectory Privacy Preservation Using Bayesian Game Theory
18:05 - 18:05
LCN Wednesday - End of the technical program
Thursday, October 24
08:30 - 08:45
Registration with Coffee and Tea
08:45 - 09:00
WLN: Welcome and Introduction
M2MCIP: Welcome and Introduction
09:00 - 10:00
M2MCIP: M2M Interfaces and Applications
- Electrocardiogram Monitoring on OpenMTC Platform
- A Contextual-adaptive Location Disclosure Agent for General Devices in the Internet of Things
- Mobile Tracking System Using OpenMTC Platform Based on Event Driven Method
09:00 - 10:30
WLN: On Sensor Networks & RFIDs
- Rapid Tag Collision Resolution Using Enhanced Continuous Wave Absence Detection
- Discrete Power Based Distance Clustering for Anti-Collision Schemes in RFID Systems
- A Value-Based Cache Replacement Approach for Information-Centric Networks
- Impact of Wireless Devices Over Real-time Applications: An Empirical Test-bed Analysis
09:15 - 09:30
PADE: Welcome and Introduction
09:30 - 10:30
PADE Keynote: Prof. Gene Tsudik, Univ. of California, Irvine, USA
Abstract:
Content-Centric Networking (CCN) is an alternative to host-centric
networking exemplified by today's Internet. CCN emphasizes content
distribution by making content directly addressable. Named-Data
Networking (NDN) is an example of CCN being considered as a candidate
next-generation Internet architecture. One key NDN feature is
router-side content caching that optimizes bandwidth consumption,
reduces congestion and provides fast fetching for popular content.
Unfortunately, the same feature is also detrimental to privacy of both
consumers and producers of content. As we show in this paper, simple and
difficult-to-detect timing attacks can exploit NDN routers as "oracles"
and allow the adversary to learn whether a nearby consumer recently
requested certain content. Similarly, probing attacks that target
adjacent content producers can be used to discover whether certain
content has been recently fetched. After analyzing the scope and
feasibility of such attacks, we propose and evaluate some efficient
countermeasures that offer quantifiable privacy guarantees while
retaining key features of NDN.
10:00 - 10:30
M2MCIP Keynote: Sanjay Jha, University of New South Wales, Sydney, Australia
Abstract: Machine to Machine (M2M) communication paradigm is expected to play a key role in realising the vision of Internet of Things (or Everything). In last decade, there has been a rapid increase in research, standardisation, and commercial activities in this new and emerging field. M2M communication is being used in a wide range of applications, such as logistics, inventory control, maintenance, environmental monitoring, farming as well as disaster recovery. This keynote address aims to discuss recent developments, future trends, and open challenges in the field.
10:30 - 11:00
Coffee break
11:00 - 12:00
M2MCIP: M2M Infrastructures and Data
- Towards a Simple, Versatile, Distributed Low-Power Wireless M2M Infrastructure
- IoT Service Platform Enhancement Through 'In-Situ' Machine Learning of Real-World Knowledge
- Open M2M Data - Position Paper
11:00 - 12:30
WLN Keynote: Prof. Albert Zomaya, The University of Sydney, Australia
Abstract: Wireless Sensor Networks have
been traditionally tasked with running a single application, however, in
recent years we have witnessed the emergence of Shared Sensor Networks
(SSNs) as integrated cyber-physical system infrastructures for a
multitude of applications. Instead of assuming an application-specific
network design, SSNs allow the underlying infrastructure to be shared
among multiple applications that can potentially belong to different
users. On one hand, a potential benefit of such design approach is to
increase the utilization of sensing and communication resources,
whenever the underlying network infrastructure covers the same
geographic area and the sensor nodes monitor the same physical variables
of common interest for different applications. On the other hand,
compared with the existing application-specific design, the SSN approach
poses several research challenges at different aspects of WSNs, such as
task scheduling and resource allocation.
The main goal of this talk is to provide the opportunity of
understanding what has been done and what still remains open in the
field of WSNs, and how the new design approaches and trends can be
exploited by a wide range of applications, especially in the emerging
era of the Internet of Things.
11:00 - 12:15
PADE: Session 1
- Privacy in Overlay-based Smart Traffic Systems
- What's the Value of Your Privacy? Exploring Factors That Influence Privacy-sensitive Contributions to Participatory Sensing Applications
- The Global Changing Privacy Landscape
12:00 - 12:30
M2MCIP: Round Table Discussion
12:15 - 12:20
PADE: Concluding remarks
12:30 - 13:30
Lunch break
13:30 - 15:00
WLN: On SDNs in Dynamically Changing Environments
- Optimization of the OpenFlow Controller in Wireless Environments for Enhancing Mobility
- Developing an Application Based on OpenFlow to Enhance Mobile IP Networks
- Performance Evaluation for Scientific Workflow Interoperability
13:30 - 14:10
WNM Keynote: Prof. Grenville Armitage, Swinburne University, Australia
Abstract:
A big challenge for internet researchers is making measurements that
actually tell us something useful, and can be used by other people. Both
of these are variations on the question of intrusiveness. If a
measurement technique is disruptive to the network under observation,
deployment will be unpopular and the information gathered may not be
broadly representative. If the captured information is considered
sensitive or personally-identifiable then sharing will be constrained,
and large-scale trends or insights hard to observe.
I hope to talk somewhat sensibly about the need for Internet measurement research to take both aspects into consideration.
13:40 - 13:50
WNS: Welcome and Introduction
13:50 - 14:35
WNS Keynote 1: Prof. Vijay Varadharajan, Macquarie University, Australia
Abstract: In this talk I will begin with a brief look at current trends in the technology scenery and some of the key security challenges that are impacting on business and society. In particular, security threats facing computer networks have become more technically sophisticated (dynamic and harder to detect), better organized (with an evolving set of bad guys with different motives) and with the readily availability of easy to use tools enabling even ordinary users to conduct severe attacks. At the same time, the consequences of failing to detect and prevent these attacks have increased. In addition to the economic consequences, these attacks can also impact the reliability of critical infrastructure and national security. Hence there is a need for security professionals and researchers to rethink about cyber threats and how to respond to them. However there are some significant technical challenges. First we will examine the notion of attribution which is one of the key issues when it comes to counteracting security attacks. The unauthenticated nature of the Internet makes attribution difficult and furthermore has implications on accountability. Then the talk will focus on attacks and risks in cloud computing and networking, where issues of security, trust and accountability are particularly significant. Cloud infrastructures with their shared multi-tenancy environment aggravate security threats. Trust that cloud providers will provide proper security measures to counteract the security threats and ensure availability of services and data stored data become paramount. Then we will conclude the talk by describing some of our current work on secure cloud infrastructure for services and secure cloud data storage.
14:10 - 15:00
WNM: Session 1
- Insights of File-Sharing System Forums
- Measuring the Accuracy of Open-Source Payload-Based Traffic Classifiers Using Popular Internet Applications
14:35 - 15:00
WNS: Session 1
- MaPIR: Mapping-Based Private Information Retrieval for Location Privacy in LBIS
15:00 - 15:30
Coffee break
15:30 - 16:10
WNS Keynote 2: Ben Whitham, Director of Cyber Security Solutions, M5 Network Security
This presentation outlines some of the practical trade-offs that security
architects face when designing and implementing remote security solutions.
The increasing storage and processing of data outside of traditional
network boundaries has presented new challenges to securing sensitive
organisational information. It is not realistic, nor fair, for
organisations to push all of the burdens of securing sensitive data stored
within a complex system on to the users of mobile or remote access
devices. However, central management is not as simple as it once was.
Organisations that rely on data collection from the remote device and
central auditing of this data need to address the changing landscape where
the organisation may not own the devices nor pay for data transportation.
Organisations must also address legitimate privacy concerns with what they
collect, what they audit and how they store and use the collected data.
15:30 - 18:00
WLN: On Resource management in M2M communications
- On Resource Management and Context-Awareness in LTE-Based Networks for Public Safety
- Interference-Aware Multipath Routing Protocols for Mobile Ad Hoc Networks
- Enabling Technologies of Energy Efficient Cooperative M2M Networks: Benefits and Challenges
- Performance Analysis of Mixed Polling Schemes with Multiple Classes of Self-Similar Traffic Input to Build Comprehensive SLAs
15:30 - 16:10
WNM Keynote 2: Prof. Matthew Roughan, University of Adelaide, Australia
Abstract:
We all know Mark Twain's aphorism "There are three kinds of lies: lies,
damned lies, and statistics." It alludes to the fact that getting
statistics right is hard, and so they are often subject to misuse.
Misinterpretations of statistical data, deliberate or otherwise, plague
many fields -- including Internet Measurement -- damaging evidence, and
confusing our understanding.
In this talk I will describe some of the most basic statistical
paradoxes and problems, and explain some of the related issues for those
working in Internet Measurement. I'll also talk a little about what we
are doing to fix those problem (apart from the frequent tellings off).
16:10 - 16:45
WNS: Session 2
- Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks
16:10 - 17:25
WNM: Session 2
- Estimating IPv4 Address Space Usage with Capture-Recapture
- An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis
- Link Quality Prediction for Multimedia Streaming Based on Available Bandwidth and Latency