References of "Engel, Thomas 50001752"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailCoordination Mechanisms for Floating Content in Realistic Vehicular Scenario
Manzo, Gaetano; Soua, Ridha UL; Di Maio, Antonio UL et al

in Coordination Mechanisms for Floating Content in Realistic Vehicular Scenario (2017)

The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the ... [more ▼]

The increasing interest in vehicular communications draws attention to scalability and network congestion problems and therefore on techniques to offload the traffic, typically carried through the infrastructure, to the Vehicle-to-vehicle (V2V) network. Floating content (FC) represents a promising paradigm to share ephemeral content without direct support from infrastructure. It is based on constraining geographically within the Anchor Zone (AZ) the opportunistic replication of a given content among vehicles, in a way that strikes a balance between minimization of resource usage and content availability. Existing works on FC performance modeling are based on standard, homogeneous synthetic mobility models, and it is hence unclear how they actually fit in realistic mobility scenarios. Moreover, the approaches to FC dimensioning they propose assume users have full knowledge of Spatio-temporal mobility patterns, which is hard to achieve in practice. Finally, despite FC is an infrastructure-less communication paradigm, some form of infrastructure support could be available in the vast majority of those application scenarios for which it has been proposed. In this paper, we perform a first attempt at tackling these issues. We focus on how to dimension an Anchor Zone in a realistic vehicular scenario. We propose the first set of simple dimensioning strategies, based on the estimation of some key mobility parameters and of FC performance. We assess such strategies on measurement-based vehicular traces, providing a first indication of their relative performance, and of the feasibility of FC in practical scenarios. [less ▲]

Detailed reference viewed: 162 (13 UL)
Peer Reviewed
See detailPoster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity
Derrmann, Thierry UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Poster (2016, December 08)

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of ... [more ▼]

Recent technological advances in communication technology have provided new ways to understand human mobility. Connected vehicles with their rising market penetration are particularly representative of this trend. They become increasingly interesting, not only as sensors, but also as participants in Intelligent Transportation System (ITS) applications. More specifically, their pervasive connectivity to cellular networks enables them as passive and active sensing units. In this paper, we introduce LuST-LTE, a package of open-source simulation tools that allows the simulation of vehicular traffic along with pervasive LTE connectivity. [less ▲]

Detailed reference viewed: 247 (22 UL)
Full Text
Peer Reviewed
See detailEnabling SDN in VANETs: What is the Impact on Security?
Di Maio, Antonio UL; Palattella, Maria Rita UL; Soua, Ridha UL et al

in Sensors (2016), 16(12), 2077

The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ ... [more ▼]

The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture. [less ▲]

Detailed reference viewed: 274 (21 UL)
Full Text
Peer Reviewed
See detailTowards Characterizing Bluetooth Discovery in a Vehicular Context
Bronzi, Walter UL; Derrmann, Thierry UL; Castignani, German UL et al

in Vehicular Networking Conference (VNC), 2016 IEEE (2016, December)

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever ... [more ▼]

Bluetooth has, in recent years, gained more and more momentum. New commodity objects and wearables im- plementing Bluetooth Smart technology (Low Energy) are re- leased everyday. In particular, the ever increasing number of discoverable devices both inside and outside a populated area gives us an encouraging insight on future research directions for this technology. In this paper, based on a sensing system developed as an Android application, we evaluate Bluetooth Classic and Low Energy discovery characteristics from a vehic- ular perspective. By recording information about devices nearby (e.g. the number of discovered devices, their signal strength, manufacturer information) and the GPS location we can derive interesting information about a driver’s situation, as well as his/her environment. Presented results indicate that the amount of discovered devices and signal strengths are dependent on velocity and road category. Finally, future work and discussions address potential use-case applications based only on Bluetooth discovery, such as low energy and privacy friendly road and traffic context awareness. The sensing system used in this article is free online under the MIT License. [less ▲]

Detailed reference viewed: 237 (23 UL)
Full Text
Peer Reviewed
See detailDemo Abstract: Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Activity Traces
Faye, Sébastien UL; Tahirou, Ibrahim UL; Engel, Thomas UL

in Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016) (2016, November 14)

Human mobility is one of the key topics to be considered in the networks of the future, both by industrial and research communities that are already focused on multidisciplinary applications and user ... [more ▼]

Human mobility is one of the key topics to be considered in the networks of the future, both by industrial and research communities that are already focused on multidisciplinary applications and user-centric systems. If the rapid proliferation of networks and high-tech miniature sensors makes this reality possible, the ever-growing complexity of the metrics and parameters governing such systems raises serious issues in terms of privacy, security and computing capability. In this demonstration, we show a new system, able to estimate a user's mobility profile based on anonymized and lightweight smartphone data. In particular, this system is composed of (1) a web analytics platform, able to analyze multimodal sensing traces and improve our understanding of complex mobility patterns, and (2) a smartphone application, able to show a user's profile generated locally in the form of a spider graph. In particular, this application uses anonymized and privacy-friendly data and methods, obtained thanks to the combination of Wi-Fi traces, activity detection and graph theory, made available independent of any personal information. [less ▲]

Detailed reference viewed: 177 (14 UL)
Full Text
Peer Reviewed
See detailUnderstanding User Daily Mobility Using Mobile and Wearable Sensing Systems
Faye, Sébastien UL; Engel, Thomas UL

in Proceedings of the 2016 International Conference on Information and Communications Technology Convergence - ICTC 2016 (2016, October)

Recent technological advances and the ever-greater developments in sensing and computing continue to provide new ways of understanding our daily mobility. Smart devices such as smartphones or smartwatches ... [more ▼]

Recent technological advances and the ever-greater developments in sensing and computing continue to provide new ways of understanding our daily mobility. Smart devices such as smartphones or smartwatches can, for instance, provide an enhanced user experience based on different sets of built-in sensors that follow every user action and identify its environment. Monitoring solutions such as these, which are becoming more and more common, allow us to assess human behavior and movement at different levels. In this article, we focus on the concept of human mobility. With the participation of 13 individuals, we carried out an experiment to discover how groups of sensors currently available in smartphones and smartwatches can help to distinguish different profiles and patterns of human mobility. We show that it is possible to use not only motion sensors but also physiological sensors and environmental data provided, for instance, by Wi-Fi. Finally, detailed study of these categories enables us to offer a way of representing the mobility of individual users, based on anonymized traces and graph theory. [less ▲]

Detailed reference viewed: 238 (11 UL)
Full Text
Peer Reviewed
See detailPOSTER: Fingerprinting Tor Hidden Services
Mitseva, Asya UL; Panchenko, Andriy UL; Lanze, Fabian et al

Poster (2016, October)

Detailed reference viewed: 283 (30 UL)
Full Text
Peer Reviewed
See detailSDN coordination for CCN and FC content dissemination in VANETs
Soua, Ridha UL; Kalogeiton, Eirini; Manzo, Gaetano et al

in Proceedings of the 8th International Conference on Ad Hoc Networks (ADHOCNETS), Ottawa, ON, Canada (2016, September 26)

Content dissemination in Vehicular Ad-hoc Networks has a myriad of applications, ranging from advertising and parking notifications, to traffic and emergency warnings. This heterogeneity requires ... [more ▼]

Content dissemination in Vehicular Ad-hoc Networks has a myriad of applications, ranging from advertising and parking notifications, to traffic and emergency warnings. This heterogeneity requires optimizing content storing, retrieval and forwarding among vehicles to deliver data with short latency and without jeopardizing network resources. In this paper, for a few reference scenarios, we illustrate how approaches that combine Content Centric Networking (CCN) and Floating Content (FC) enable new and efficient solutions to this issue. Moreover, we describe how a network architecture based on Software Defined Networking (SDN) can support both CCN and FC by coordinating distributed caching strategies, by optimizing the packet forwarding process and the availability of floating data items. For each scenario analyzed, we highlight the main research challenges open, and we describe a few possible solutions. [less ▲]

Detailed reference viewed: 225 (22 UL)
Full Text
Peer Reviewed
See detailA Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data
Faye, Sébastien UL; Louveton, Nicolas UL; Gheorghe, Gabriela UL et al

in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2016), 7(3),

The rapid emergence of new technologies in recent decades has opened up a world of opportunities for a better understanding of human mobility and behavior. It is now possible to recognize human movements ... [more ▼]

The rapid emergence of new technologies in recent decades has opened up a world of opportunities for a better understanding of human mobility and behavior. It is now possible to recognize human movements, physical activity and the environments in which they take place. And this can be done with high precision, thanks to miniature sensors integrated into our everyday devices. In this paper, we explore different methodologies for recognizing and characterizing physical activities performed by people wearing new smart devices. Whether it’s smartglasses, smartwatches or smartphones, we show that each of these specialized wearables has a role to play in interpreting and monitoring moments in a user's life. In particular, we propose an approach that splits the concept of physical activity into two sub-categories that we call micro- and macro-activities. Micro- and macro-activities are supposed to have functional relationship with each other and should therefore help to better understand activities on a larger scale. Then, for each of these levels, we show different methods of collecting, interpreting and evaluating data from different sensor sources. Based on a sensing system we have developed using smart devices, we build two data sets before analyzing how to recognize such activities. Finally, we show different interactions and combinations between these scales and demonstrate that they have the potential to lead to new classes of applications, involving authentication or user profiling. [less ▲]

Detailed reference viewed: 199 (14 UL)
Full Text
Peer Reviewed
See detailTowards Privacy-Neutral Travel Time Estimation from Mobile Phone Signalling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Faye, Sébastien UL et al

in Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2) (2016, September)

Today’s mobile penetration rates enable cellular signaling data to be useful in diverse fields such as transportation planning, the social sciences and epidemiology. Of particular interest for these ... [more ▼]

Today’s mobile penetration rates enable cellular signaling data to be useful in diverse fields such as transportation planning, the social sciences and epidemiology. Of particular interest for these applications are mobile subscriber dwell times. They express how long users stay in the service range of a base station. In this paper, we want to evaluate whether dwell time distributions can serve as predictors for road travel times. To this end, we transform floating car data into synthetic dwell times that we use as weights in a graph-based model. The model predictions are evaluated using the floating car ground truth data. Additionally, we show a potential link between handover density and travel times. We conclude that dwell times are a promising predictor for travel times, and can serve as a valuable input for intelligent transportation systems. [less ▲]

Detailed reference viewed: 347 (20 UL)
Full Text
Peer Reviewed
See detailHeat is in the Eye of the Beholder: Towards Better Authenticating on Smartglasses
Gheorghe, Gabriela UL; Louveton, Nicolas UL; Martin, Benoît et al

in Proceedings of the 9th International Conference on Human System Interaction (HSI'16) (2016, July)

Smart and wearable devices are trendy electronic objects that have become increasingly popular in recent years. Those devices are, by definition, tightly connected with the user's personal activities ... [more ▼]

Smart and wearable devices are trendy electronic objects that have become increasingly popular in recent years. Those devices are, by definition, tightly connected with the user's personal activities. Authentication is therefore a critical feature for both identifying users and personalizing the services on the device. In particular, the emergence of smartglasses changed the way we thought a wearable could assist users in their daily activities. As designed by commercial providers, smartglasses are sold with a very specific set of interactions capabilities. These capabilities have a strong impact on how comfortably or safely users may authenticate to their smartglasses. For this reason, we investigate in this paper the different authentication methods available for smartphones and we comparatively position the smartglasses in the design space of authentication methods. We propose a new approach based on touch input on an arbitrary surface using thermal camera input. This approach aims to circumvent the lack of touch surface provided by smartglasses, while maintaining an acceptable level of security. [less ▲]

Detailed reference viewed: 293 (9 UL)
Full Text
Peer Reviewed
See detailNot a Tile Out of Place: Toward Creating Context-Dependent User Interfaces on Smartglasses
Pecci, Isabelle; Martin, Benoît; Kacem, Imed et al

in Proceedings of the 9th International Conference on Human System Interaction (HSI'16) (2016, July)

Despite the rapid pace of gadgets released on the market, research in the area of usable interfaces for wearables is lagging behind. Smartglasses are new wearables that embed diverse sensors but also have ... [more ▼]

Despite the rapid pace of gadgets released on the market, research in the area of usable interfaces for wearables is lagging behind. Smartglasses are new wearables that embed diverse sensors but also have small displays, and this makes it hard for the wearer to visualize real-time data. To bridge this gap, the contribution of this paper is threefold. First, we propose a data representation model to combine applications and services that match user activities and contexts. Second, we present an approach of showing relevant services to the user based on 'tiles' (such as those in recent Microsoft Windows interfaces) while considering the device constraints. Finally, we suggest that combining those two aspects can open the way to personalized services for the end user, creating new ways of interacting with applications and devices. [less ▲]

Detailed reference viewed: 311 (9 UL)
See detailLuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity
Derrmann, Thierry UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Presentation (2016, June 30)

Detailed reference viewed: 187 (20 UL)
Full Text
Peer Reviewed
See detailToward a Characterization of Human Activities using Smart Devices: A Micro/Macro Approach
Faye, Sébastien UL; Louveton, Nicolas UL; Gheorghe, Gabriela UL et al

in Proceedings of the 7th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World (2016, April)

The emergence of new connected devices has opened up new opportunities and allowed to imagine concepts that bring computer sciences and social sciences closer together. In particular, today's increasingly ... [more ▼]

The emergence of new connected devices has opened up new opportunities and allowed to imagine concepts that bring computer sciences and social sciences closer together. In particular, today's increasingly sophisticated miniature sensors allow to track and understand human activities and behavior with a great precision. Taking different approaches and perspectives, we use in this paper smartwatches and smartglasses to explore these behaviors and show that these objects, considered by many as gadgets, have an important role to play in understanding the lives of individuals. The main objective of this work is to introduce two new scales of activity detection, which lacks a formal and consistent definition in the literature. First, we propose a model that precisely detects and interprets movements made by a person wearing smart devices. Then, we use this model to show different interactions between those micro-activities and bigger chunks of behaviors we call macro-activities. Using a new concept based on 3D visualization, we finally show that combining those two scales and using a limited dataset, it is possible to distinguish between different individuals when they are performing very similar activities. The findings of this study lead the way to enhanced user profiling. [less ▲]

Detailed reference viewed: 371 (38 UL)
Full Text
Peer Reviewed
See detailContent and Context Aware Strategies for QoS Support in VANETs
Rizzo, Gianluca; Palattella, Maria Rita UL; Braun, Torsen et al

in Proc. of Int. Conf. on Advanced Information Networking and Applications (AINA-2016) (2016, March)

Detailed reference viewed: 214 (18 UL)
Full Text
Peer Reviewed
See detailWebsite Fingerprinting at Internet Scale
Panchenko, Andriy UL; Lanze, Fabian UL; Zinnen, Andreas et al

in Proceedings of the 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016) (2016, February)

Detailed reference viewed: 596 (33 UL)
Full Text
Peer Reviewed
See detailUnderstanding the Social impact of ICN: between myth and reality
Piro, Giuseppe; Signorello, Salvatore UL; Palattella, Maria Rita UL et al

in Springer AI & Society: Journal of Knowledge, Culture and Communication (2016)

The Information Centric Networking (ICN) paradigm is attracting more and more interest from the research community due to its peculiarities that make it one of the best candidates for constructing the ... [more ▼]

The Information Centric Networking (ICN) paradigm is attracting more and more interest from the research community due to its peculiarities that make it one of the best candidates for constructing the Future Internet. For this reason, there are many papers in literature that study how to transform ICN principles in reality in order to magnify its relevance for the society. In order to provide a solid summary of the state of the art, the present contribution tries to summarize the main findings related to this research field. In particular, an overview on the most important ICN architectures, their main aspects, common networking approaches, and differences, is provided. Moreover, the work carried out in standardization bodies, with particular attention to the list of baseline scenarios defined in this context, is illustrated. Also the main international projects that are trying to integrate ICN networking primitives in pioneering use cases are presented, describing proposed architectures and related challenges for enabling information-centric primitives in current network infrastructures. Finally, the work highlights design principles and core components to build ICN-enabled network devices. [less ▲]

Detailed reference viewed: 344 (14 UL)
Full Text
Peer Reviewed
See detailInternet of Things in the 5G Era: Enablers, Architecture and Business Models
Palattella, Maria Rita UL; Dohler, Mischa; Grieco, Luigi Alfredo et al

in IEEE Journal on Selected Areas In Communications (2016)

The IoT paradigm holds the promise to revolutionize the way we live and work by means of a wealth of new services, based on seamless interactions between a large amount of heterogeneous devices. After ... [more ▼]

The IoT paradigm holds the promise to revolutionize the way we live and work by means of a wealth of new services, based on seamless interactions between a large amount of heterogeneous devices. After decades of conceptual inception of the IoT, in recent years a large variety of communication technologies has gradually emerged, reflecting a large diversity of application domains and of communication requirements. Such heterogeneity and fragmentation of the connectivity landscape is currently hampering the full realization of the IoT vision, by posing several complex integration challenges. In this context, the advent of 5G cellular systems, with the availability of a connectivity technology which is at once truly ubiquitous, reliable, scalable, and cost-efficient, is considered as a potentially key driver for the yet-to emerge global IoT. In the present paper, we analyze in detail the potential of 5G technologies for the IoT, by considering both the technological and standardization aspects. We review the present-day IoT connectivity landscape, as well as the main 5G enablers for the IoT. Last but not least, we illustrate the massive business shifts that a tight link between IoT and 5G may cause in the operator and vendors ecosystem. [less ▲]

Detailed reference viewed: 787 (24 UL)
Full Text
Peer Reviewed
See detailLuxembourg SUMO Traffic (LuST) Scenario: Traffic Demand Evaluation
Codeca, Lara UL; Frank, Raphaël UL; Faye, Sébastien UL et al

in IEEE Intelligent Transportation Systems Magazine (2016)

Both the industrial and the scientific communities are working on problems related to vehicular traffic congestion, intelligent transportation systems, and mobility patterns using information collected ... [more ▼]

Both the industrial and the scientific communities are working on problems related to vehicular traffic congestion, intelligent transportation systems, and mobility patterns using information collected from a variety of sources. Usually, a vehicular traffic simulator, with an appropriate scenario for the problem at hand, is used to reproduce realistic mobility patterns. Many mobility simulators are available, and the choice is made based on the type of simulation required, but a common problem is finding a realistic traffic scenario. The aim of this work is to provide and evaluate a scenario able to meet all the basic requirements in terms of size, realism, and duration, in order to have a common basis for evaluations. In the interest of building a realistic scenario, we used information from a real city with a typical topology common in mid-size European cities, and realistic traffic demand and mobility patterns. In this paper, we show the process used to build the Luxembourg SUMO Traffic (LuST) Scenario, and present a summary of its characteristics together with our evaluation and validation of the traffic demand and mobility patterns. [less ▲]

Detailed reference viewed: 383 (52 UL)
Full Text
Peer Reviewed
See detailA Generic Framework to Support Application-Level Flow Management in Software-Defined Networks
Dolberg, Lautaro UL; François, Jérôme; Chowdhury, Shihabur Rahman et al

in Conference on Network Softwarization (Netsoft) (2016)

Detailed reference viewed: 153 (4 UL)