IEEE Catalog Number: ISBN: CFP22CCN-POD 978-1-6654-3162-0 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC 2022) Virtual Conference 8 – 11 January 2022 Pages 1-524 1/2
IEEE Catalog Number: ISBN:
CFP22CCN-POD 978-1-6654-3162-0
2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC 2022)
Virtual Conference 8 – 11 January 2022
Pages 1-524
1/2
Copyright © 2022 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP22CCN-POD ISBN (Print-On-Demand): 978-1-6654-3162-0 ISBN (Online): 978-1-6654-3161-3 ISSN: 2331-9852 Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com
TABLE OF CONTENTS PERFORMANCE EVALUATION OF ORBITAL ANGULAR MOMENTUM MODE MULTIPLEXING SYSTEMS IMPAIRED BY PHASE NOISE ........................................................................ 1
Peyman Neshaastegaran, Ming Jian
WAVEFORM COMPARISON UNDER HARDWARE LIMITATIONS FOR 6G SUB-THZ COMMUNICATIONS ......................................................................................................................................... 7
Le Hang Nguyen, Volker Braun, Hardy Halbauer, Thorsten Wild
MULTIPLE AUVS FOR OCEAN PHENOMENA MONITORING: A REVIEW ........................................... 13 Ansa Shermin S, Sarang C. Dhongdi
ENHANCEMENT OF ROAD WEATHER SERVICES USING VEHICLE SENSOR DATA ........................ 20 Toon Bogaerts, Sylvain Watelet, Chris Thoen, Tom Coopman, Joris Van Den Bergh, Maarten Reyniers, Dirck Seynaeve, Wim Casteels, Steven Latré, Peter Hellinckx
TOWARDS 6G ZERO TOUCH NETWORKS: THE CASE OF AUTOMATED CLOUD-RAN DEPLOYMENTS ............................................................................................................................................... 26
Bini Angui, Romuald Corbel, Veronica Quintuna Rodriguez, Emile Stephan
DELAY CONSIDERATIONS FOR RELIABLE COMMUNICATIONS IN LORAWAN .............................. 32 Joar Blom Rydell, Oliver Otterlind, Ismail Butun
COMMUNICATION-LOSS TRADE-OFF IN FEDERATED LEARNING: A DISTRIBUTED CLIENT SELECTION ALGORITHM .............................................................................................................. 38
Minoo Hosseinzadeh, Nathaniel Hudson, Sam Heshmati, Hana Khamfroush
CLOUDRAFT: A CLOUD-BASED FRAMEWORK FOR REMOTE EXPERIMENTATION FOR MOBILE NETWORKS ...................................................................................................................................... 44
Sabarish Krishna Moorthy, Chencheng Lu, Zhangyu Guan, Nicholas Mastronarde, George Sklivanitis, Dimitris Pados, Elizabeth Serena Bentley, Michael Medley
HYBRID RIS-ASSISTED COOPERATIVE COMMUNICATION MODEL DESIGN AND PERFORMANCE ANALYSIS .......................................................................................................................... 50
Abhilash Kumar Pandey, Amrith Aathmaram, B. Sainath
A STUDY ON ITERATIVE EQUALIZATION FOR DFTS-OFDM WAVEFORM UNDER SUB-THZ CHANNELS .............................................................................................................................................. 56
Roberto Bomfin, Ahmad Nimr, Gerhard Fettweis
MQTT-4EST: RULE-BASED WEB EDITOR FOR SEMANTIC-AWARE TOPIC NAMING IN MQTT ................................................................................................................................................................. 62
Tobias Christian Piller, David Maria Merz, Abdelmajid Khelil
MULTIPURPOSE SENSING PLATFORM FOR IMPROVED ROAD SAFETY ........................................... 70 Miguel Carvalhosa, João Almeida, Paulo C. Bartolomeu, Joaquim Ferreira
IOT INTEROPERABILITY WITH W3C WEB OF THINGS .......................................................................... 77 Michael Lagally, Michael McCool
ON INCREASING PASSWORD SECURITY AWARENESS USING A SERIOUS GAME .......................... 82 Giovanni Delnevo, Luca Deluigi, Davide Evangelisti, Simone Magnani
GAMIFICATION OF A UNIVERSITY-LEVEL WEB TECHNOLOGIES COURSE: A FIVE YEARS EXPERIENCE ...................................................................................................................................... 88
Giovanni Delnevo, Chiara Ceccarini, Paola Salomoni, Catia Prandi
UDP-BASED EXTREMELY LOW LATENCY STREAMING ....................................................................... 94 Seohyang Kim, Seungyoung Shin, Joonseok Moon
JOINT CONTENT VALUATIONS AND PROACTIVE CACHING FOR CONTENT DISTRIBUTION NETWORKS ....................................................................................................................... 100
Youssef A. Youssef, John Tadrous, Sameh Hosny, Mohammed Nafie
MIGRATION-AWARE OPTIMIZED RESOURCE ALLOCATION IN B5G EDGE NETWORKS ............ 106 Tadeus Prastowo, Ayub Shah, Luigi Palopoli, Roberto Passerone, Giuseppe Piro
LATENCY AND NETWORK AWARE PLACEMENT FOR CLOUD-NATIVE 5G/6G SERVICES ....................................................................................................................................................... 114
Kiranpreet Kaur, Fabrice Guillemin, Veronica Quintuna Rodriguez, Francoise Sailhan
PRIORITIZED TRAFFIC SHAPING FOR LOW-LATENCY MEC FLOWS IN MEC-ENABLED CELLULAR NETWORKS .............................................................................................................................. 120
Po-Hao Huang, Fu-Cheng Hsieh, Wen-Jen Hsieh, Chi-Yu Li, Ying-Dar Lin
A NOVEL REQUEST HANDLER ALGORITHM FOR MULTI-ACCESS EDGE COMPUTING PLATFORMS IN 5G ....................................................................................................................................... 126
Gayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera, Indika A. M. Balapuwaduge, Madhusanka Liyanage
COMPETING TCP CONGESTION CONTROL ALGORITHMS OVER A SATELLITE NETWORK ...................................................................................................................................................... 132
Pinhan Zhao, Benjamin Peters, Jae Chung, Mark Claypool
ACK-LESS RATE ADAPTATION FOR IEEE 802.11BC ENHANCED BROADCAST SERVICES USING SIM-TO-REAL DEEP REINFORCEMENT LEARNING ............................................. 139
Takamochi Kanda, Yusuke Koda, Koji Yamamoto, Takayuki Nishio
IMPOS: AN IMAGE-BASED INDOOR POSITIONING SYSTEM .............................................................. 144 Yunzhi Li, Rajeswari Hita Kambhamettu, Yidan Hu, Rui Zhang
DE-PRIORITIZATION IMPACT OF LCH-BASED PRIORITIZATION FOR INDUSTRIAL INTERNET OF THINGS IN 3GPP NR ........................................................................................................... 151
Sangkyu Baek, Anil Agiwal, Jaehyuk Jang
KINESTHETIC CODING BASED ON THE FAST WAVELET TRANSFORM FOR REMOTE-CONTROLLING A QUADROTOR DRONE ................................................................................................. 157
Frank Engelhardt, Sophie Herbrechtsmeyer, Mesut Günes
SUM-RATE OPTIMIZATION FOR VISIBLE-LIGHT-BAND UAV NETWORKS BASED ON PARTICLE SWARM OPTIMIZATION ......................................................................................................... 163
Yuwei Long, Nan Cen
A UAV FLIGHT METHOD FOR NON-UNIFORM USER DISTRIBUTIONS IN AERIAL WIRELESS RELAY NETWORKS ................................................................................................................. 169
Hiroyuki Asano, Hiraku Okada, Chedlia Ben Naila, Masaaki Katayama
FULL-DUPLEX AERIAL COMMUNICATION SYSTEM FOR MULTIPLE UAVS WITH DIRECTIONAL ANTENNAS ......................................................................................................................... 175
Tao Yu, Kiyomichi Araki, Kei Sakaguchi
20-µS ACCURACY TIME-SYNCHRONIZATION METHOD USING BLUETOOTH LOW ENERGY FOR INTERNET-OF-THINGS SENSORS .................................................................................... 181
Masayasu Harada, Shintaro Izumi, Ryosuke Kozeni, Yukiko Yoshikawa, Toru Ishii, Hiroshi Kawaguchi, Shohei Uemura, Kaname Araki
ENERGY EFFICIENT VIRTUAL NETWORK EMBEDDING IN VIRTUALIZED WIRELESS SENSOR NETWORKS .................................................................................................................................... 187
Vahid Maleki Raee, Amin Ebrahimzadeh, Marsa Rayani, Roch. H. Glitho, May El Barachi, Fatna Belqasmi
BLUETOOTH MESH TECHNOLOGY FOR THE JOINT MONITORING OF INDOOR ENVIRONMENTS AND MOBILE DEVICE LOCALIZATION: A PERFORMANCE STUDY ................. 193
Leonardo Montecchiari, Angelo Trotta, Luciano Bononi, Marco Di Felice
ADAPTIVE EARLY EXIT OF COMPUTATION FOR ENERGY-EFFICIENT AND LOW-LATENCY MACHINE LEARNING OVER IOT NETWORKS .................................................................... 200
Eric Samikwa, Antonio Di Maio, Torsten Braun
CONSTRAINED DEEP REINFORCEMENT LEARNING FOR SMART LOAD BALANCING ................ 207 Omar Houidi, Djamal Zeghlache, Victor Perrier, Pham Tran Anh Quang, Nicolas Huin, Jérémie Leguay, Paolo Medagliani
ENERGY-AWARE OPTIMIZATION OF UAV BASE STATIONS PLACEMENT VIA DECENTRALIZED MULTI-AGENT Q-LEARNING ................................................................................... 216
Babatunji Omoniwa, Boris Galkin, Ivana Dusparic
SELF-OPTIMIZATION OF CELLULAR NETWORKS USING DEEP REINFORCEMENT LEARNING WITH HYBRID ACTION SPACE ............................................................................................. 223
Mariam Aboelwafa, Ghada Alsuhli, Karim Banawan, Karim G. Seddik
RIRL: A RECURRENT IMITATION AND REINFORCEMENT LEARNING METHOD FOR LONG-HORIZON ROBOTIC TASKS ............................................................................................................ 230
Zhitao Yu, Jian Zhang, Shiwen Mao, Senthilkumar Cg Periaswamy, Justin Patton
EVALUATING EFFICIENCY AND SECURITY OF CONNECTED AND AUTONOMOUS VEHICLE APPLICATIONS ............................................................................................................................ 236
Curtis R. Taylor, Jason M. Carter, Shean Huff, Eric Nafziger, Jackeline Rios-Torres, Bob Zhang, Joseph Turcotte
A PRACTICAL IMPLEMENTATION OF PHYSICAL LAYER SECURITY IN WIRELESS NETWORKS .................................................................................................................................................... 240
Sayed Amir Hoseini, Fayçal Bouhafs, Frank Den Hartog
SECURING REMOTE USER AUTHENTICATION IN INDUSTRIAL INTERNET OF THINGS .............. 244 K Nimmy, Sriram Sankaran, Krishnashree Achuthan, Prasad Calyam
SMARTCRYPT: SECURE STORING AND SHARING OF TIME SERIES DATA STREAMS IN IIOT .................................................................................................................................................................. 248
Subir Halder, Thomas Newe
LEARNPHI: A REAL-TIME LEARNING MODEL FOR EARLY PREDICTION OF PHISHING ATTACKS IN IOV .......................................................................................................................................... 252
Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Anna Maria Vegni, Marica Amadeo
MALWARE FAMILY CLASSIFICATION VIA RESIDUAL PREFETCH ARTIFACTS ............................ 256 Adam Duby, Teryl Taylor, Yanyan Zhuang
NR-U AND WI-FI COEXISTENCE ENHANCEMENT EXPLOITING MULTIPLE BANDWIDTH PARTS ASSIGNMENT ......................................................................................................... 260
Mehdi Haghshenas, Maurizio Magarini
DESIGNING A 5G ARCHITECTURE TO OVERCOME THE CHALLENGES OF THE TELEOPERATED TRANSPORT AND LOGISTICS .................................................................................... 264
Johann M. Marquez-Barja, Dries Naudts, Vasilis Maglogiannis, Seilendria A. Hadiwardoyo, Ingrid Moerman, Matthijs Klepper, Geerd Kakes, Xiangyu Lian, Wim Vandenberghe, Rakshith Kusumakar, Joost Vandenbossche
4G/5G PERFORMANCE OF A MULTI-RAT UAV FOR MEDICAL PARCEL DELIVERY ...................... 268 Henrique Carvalho De Resende, João Francisco Nunes Pinheiro, Philippe Reiter, Cristiano Bonato Both, Johann M. Marquez-Barja
ANALYZING 5G NR-U AND WIGIG COEXISTENCE WITH MULTIPLE-BEAM DIRECTIONAL LBT ....................................................................................................................................... 272
Yao Ma, Susanna Mosleh, Jason Coder
A COMPREHENSIVE ANALYSIS ON NETWORK SLICING FOR SMART HOSPITAL APPLICATIONS .............................................................................................................................................. 276
Shalitha Wijethilaka, Pawani Porambage, Chamitha De Alwis, Madhusanka Liyanage
IMPACT ANALYSIS OF TRAINING IN DEEP REINFORCEMENT LEARNING-BASED RADIO ACCESS NETWORK SLICING ........................................................................................................ 280
I. Vilà, J. Pérez-Romero, O. Sallent, A. Umbert
A NON-INVASIVE SOCIAL MONITORING APPLICATION FOR DANGER SITUATIONS BASED ON A EDGE-BASED MACHINE LEARNING SOLUTION ........................................................... 284
Bilal Moussa Fares, Pietro Manzoni, Johann M. Marquez-Barja, Juan-Carlos Cano, Carlos T. Calafate
TRAIN IN AUSTRIA, RACE IN MONTECARLO: GENERALIZED RL FOR CROSS-TRACK F1TENTH LIDAR-BASED RACES .................................................................................................................... 290
Michael Bosello, Rita Tse, Giovanni Pau
BALANCING LATENCY AND ACCURACY ON DEEP VIDEO ANALYTICS AT THE EDGE ............. 299 Xuebing Li, Byungjin Cho, Yu Xiao
ON IMPLEMENTING SOCIALIZATION ALGORITHMS ON VIRTUAL OBJECTS IN THE SOCIAL IOT .................................................................................................................................................... 307
Silvia Corpino, Silvia Mirri, Mariella Sole, Daniele Giusto, Giovanni Pau, Roberto Girau
POLAR CODING FOR EFFICIENT TRANSPORT LAYER MULTICAST ................................................. 313 Pablo Gil Pereira, Thorsten Herfet
QOS-AWARE PRIORITY-BASED TASK OFFLOADING FOR DEEP LEARNING SERVICES AT THE EDGE ................................................................................................................................................ 319
Minoo Hosseinzadeh, Andrew Wachal, Hana Khamfroush, Daniel E. Lucani
LEARNING-BASED MULTIVARIATE REAL-TIME DATA PRUNING FOR SMART PMU COMMUNICATION ....................................................................................................................................... 326
Rushang Gupta, Varun Gupta, Akash Kumar Mandal, Swades De
SECURITY OF MICRO MEC IN 6G: A BRIEF OVERVIEW ...................................................................... 332 Ijaz Ahmad, Sergio Lembo, Felipe Rodriguez, Stephan Mehnert, Mikko Vehkaperä
TOWARDS THE OPTIMAL PATTERN OF JOINT BEAMFORMING, USER SCHEDULING AND POWER ALLOCATION IN A MULTI-RAT NETWORK ................................................................... 338
Jörg Von Mankowski, Hansini Vijayaraghavan, Alberto Martinez Alba, Leonardo Goratti, Wolfgang Kellerer
DNN-AIDED LOW-COMPLEXITY PHYSICAL-LAYER NETWORK CODING ENABLED NON-ORTHOGONAL MULTIPLE ACCESS ................................................................................................ 346
Guanyu Chen, Tse-Tin Chan, Haoyuan Pan, Jiaxin Liang
FRAME-CAPTURE-BASED CSI RECOMPOSITION PERTAINING TO FIRMWARE-AGNOSTIC WIFI SENSING .......................................................................................................................... 352
Ryosuke Hanahara, Sohei Itahara, Kota Yamashita, Yusuke Koda, Akihito Taya, Takayuki Nishio, Koji Yamamoto
DRONE POSITIONING FOR VISIBLE LIGHT COMMUNICATION WITH DRONE-MOUNTED LED AND CAMERA .................................................................................................................. 357
Yukito Onodera, Yu Nakayama, Hiroki Takano, Daisuke Hisano
AN ANOMALY DETECTION MODEL FOR IOT NETWORKS BASED ON FLOW AND FLAG FEATURES USING A FEED-FORWARD NEURAL NETWORK ................................................... 363
Imtiaz Ullah, Qusay H. Mahmoud
SHINING NEW LIGHT ON USEFUL FEATURES FOR NETWORK INTRUSION DETECTION ALGORITHMS ................................................................................................................................................ 369
Heather Lawrence, Uchenna Ezeobi, Gedare Bloom, Yanyan Zhuang
RHC: CLUSTER BASED FEATURE REDUCTION FOR NETWORK INTRUSION DETECTIONS ................................................................................................................................................. 378
Md. Hasan Tarek, Md. Mumtahin Habib Ullah Mazumder, Sadia Sharmin, Md. Shariful Islam, Mohammad Shoyaib, Muhammad Mahbub Alam
WIFI-BASED IOT DEVICES PROFILING ATTACK BASED ON EAVESDROPPING OF ENCRYPTED WIFI TRAFFIC ........................................................................................................................ 385
Mnassar Alyami, Ibrahim Alharbi, Cliff Zou, Yan Solihin, Karl Ackerman
FIRST EXPERIMENTAL RESULTS ON REAL-TIME CLEANING ACTIVITY MONITORING SYSTEM .......................................................................................................................................................... 393
Ryo Yaegashi, Yu Nakayama, Moe Matsuki, Ryoma Yasunaga, Marie Katsurai
AGE OF DATA AWARE INTERNET OF THINGS APPLICATIONS ......................................................... 399 Kaneez Fizza, Prem Prakash Jayaraman, Abhik Banerjee, Dimitrios Georgakopoulos, Rajiv Ranjan
A WEB OF THINGS CONTEXT-AWARE IOT SYSTEM LEVERAGING Q-LEARNING ........................ 405 Luca Bedogni, Francesco Poggi
A HIERARCHICAL ARCHITECTURAL MODEL FOR IOT END-USER SERVICE COMPOSITION ............................................................................................................................................... 411
Federico Montori, Vincenzo Armandi, Luca Bedogni
DECENTRALIZED AD-HOC SEAPORT TRUCK AUTHENTICATION .................................................... 417 Paulo C. Bartolomeu, Joana Bernardino, Joaquim Ferreira
A PRIVACY-PRESERVING SCHEME FOR PASSIVE MONITORING OF PEOPLE’S FLOWS THROUGH WIFI BEACONS ......................................................................................................................... 421
Kalkidan Gebru
TOWARDS AN OPTIMAL FEATURE SELECTION METHOD FOR AI-BASED DDOS DETECTION SYSTEM ................................................................................................................................... 425
Sajal Saha, Annita Tahsin Priyoti, Aakriti Sharma, Anwar Haque
DECEPTION FOR CHARACTERIZING ADVERSARIAL STRATEGIES IN COMPLEX NETWORKED SYSTEMS .............................................................................................................................. 429
Md Ali Reza Al Amin, Peter Foytik, Sachin Shetty, Jessica Dorismond, Marco Gamarra
BLOCKCHAIN-BASED DEVICE IDENTITY MANAGEMENT WITH CONSENSUS AUTHENTICATION FOR IOT DEVICES ..................................................................................................... 433
Munkenyi Mukhandi, Francisco Damião, Jorge Granjal, João P. Vilela
BUILDING REALISTIC EXPERIMENTATION ENVIRONMENTS FOR AI-ENHANCED MANAGEMENT AND ORCHESTRATION (MANO) OF 5G AND BEYOND V2X SYSTEMS ............... 437
Nina Slamnik-Kriještorac, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Marquez-Barja
ON DEEP LEARNING CLASSIFICATION OF DIGITALLY MODULATED SIGNALS USING RAW I/Q DATA .............................................................................................................................................. 441
John A. Snoap, Dimitrie C. Popescu, Chad M. Spooner
LEVERAGING UAV ROTATION TO INCREASE PHASE COHERENCY IN DISTRIBUTED TRANSMIT BEAMFORMING ....................................................................................................................... 445
Mahmoud Badi, N. Cameron Matson, Dinesh Rajan, Joseph Camp
QUALITY-AWARE VIDEO ANALYTICS IN EDGE COMPUTING ENVIRONMENTS .......................... 449 Mohammad Nazmus Sadat, Erwin Vargas-Alfonso, Rui Dai
LOW-COMPLEXITY ADAPTIVE DIGITAL PRE-DISTORTION WITH META-LEARNING BASED NEURAL NETWORKS ..................................................................................................................... 453
Alexis Falempin, Rafik Zayani, Jean-Baptiste Doré, Emilio Calvanese Strinati
MQTPP – TOWARDS MULTIPLE Q-TABLE BASED PATH PLANNING IN UAV ENVIRONMENTS .......................................................................................................................................... 457
Michael R. Jones, Soufiene Djahel, Kristopher Welsh
OFFLOADING ROBOT CONTROL WITH 5G ............................................................................................. 461 Peter Sossalla, Justus Rischke, Giang T. Nguyen, Frank H. P. Fitzek
FOREST FIRE SURVEILLANCE USING LIVE VIDEO STREAMING FROM UAV VIA MULTIPLE LTE NETWORKS ....................................................................................................................... 465
Koichi Nihei, Natsuki Kai, Yuki Maruyama, Toshiaki Yamashita, Dai Kanetomo, Takako Kitahara, Masaaki Maruyama, Takashi Ohki, Kitso Kusin, Hendrik Segah
DISTRIBUTED TRAJECTORY DESIGN FOR UNDERWATER MULTI-ROBOT RELAY NETWORKS .................................................................................................................................................... 469
Hongzhi Guo, Clifford Boakye-Mensah
UAV-FAP: USER FAIRNESS-DRIVEN ACCESS POINT ON UAV FOR WI-FI NETWORKS ................. 473 Yung-Chuan Wu, Hong-Rong Chang, Meng-Shou Wu, Chi-Yu Li, Kuochen Wang
HELP FROM ABOVE: UAV-EMPOWERED NETWORK RESILIENCY IN POST-DISASTER SCENARIOS .................................................................................................................................................... 477
Christian Esposito, Gianluca Rizzo
DYNAMIC GENERATION OF REVENUE THROUGH THE INSERTION OF ADVERTISEMENTS INTO VIDEO CONTENTS ......................................................................................... 481
Francisco Lopez-Navarrete, Joaquin Sanchez-Soriano, Oscar M Bonastre
IOT EDGE ORCHESTRATION FOR DISTRIBUTED DNN SERVICE WITH CONTAINERIZED RESOURCE ALLOCATION .......................................................................................... 483
Hyungbin Park, Taeyoung Kim, Younghwan Jin, Sukyoung Lee
NOVEL QUALITY OF EXPERIENCE EXPERIMENTATION FRAMEWORK THROUGH PROGRAMMABLE NETWORK MANAGEMENT ...................................................................................... 485
Ahmed Osama Basil, Mu Mu, Ali Al-Sherbaz
ENABLING VIDEO CONFERENCING IN LOW BANDWIDTH ................................................................ 487 Muzzafer Ali, Suchetana Chakraborty
IMPROVING DATA CONSISTENCY IN VEHICULAR MICRO CLOUDS ............................................... 489 Gurjashan Singh Pannu, Stephan Dunkel, Seyhan Ucar, Takamasa Higuchi, Onur Altintas, Falko Dressler
AN OPTIMISTIC SYNCHRONIZATION BASED SERVER SELECTION SCHEME WITH SUCCESSIVE PARTICIPATION ................................................................................................................... 491
Akio Kawabata, Bijoy Chand Chatterjee, Eiji Oki
DISTRIBUTED FOG-BASED CACHING SOLUTION FOR CONTENT-CENTRIC NETWORKING IN IOT .................................................................................................................................. 493
Youssef Sellami, Ghada Jaber, Ahmed Lounis
TOWARDS RISK ADJUSTED WIRELESS ACCESS UNDER JAMMING: RELIABILITY THROUGH MULTI-CONNECTIVITY .......................................................................................................... 495
Vladimir Marbukh
COMPUTING OFFLOADING AND LOAD BALANCING WITHIN UAV CLUSTERS ............................ 497 Sana Ben Aissa, Asma Ben Letaifa, Abderrahim Sahli, Abderrezak Rachedi
GRADUAL CONTROL METHOD FOR PROGRAM FILE PLACEMENT IN HIERARCHICAL CLOUD-EDGE PLATFORM .......................................................................................................................... 499
Keigo Kono, Takehiro Sato, Eiji Oki
PHASIC POLICY GRADIENT BASED RESOURCE ALLOCATION FOR INDUSTRIAL INTERNET OF THINGS ................................................................................................................................. 501
Lokesh Bommisetty, Venkatesh Tiruchirai Gopalakrishnan
EMPIRICAL DIFFERENCES IN LTE OPEN- AND CLOSED-LOOP POWER CONTROL ....................... 503 Aziz Kord, Jason Coder, Aric Sanders
APPLYING TIME-AWARE SHAPER CONSIDERING USER IDENTIFIER TO SERVICE PROVIDER NETWORK ................................................................................................................................. 505
Yuhei Kawakami, Hideo Kawata, Takahiro Kubo, Natsuki Yasuhara, Shinichi Yoshihara, Tomoaki Yoshida
RADIO AND POWER OVER DOUBLE CLAD FIBER SYSTEM FOR 4K/8K SATELLITE BROADCASTING ........................................................................................................................................... 507
Zixuan Guo, Jiang Liu, Shigeru Shimamoto
NEIGHBOR DISCOVERY IN A MULTI-TRANSCEIVER FREE-SPACE-OPTICAL AD HOC NETWORK ...................................................................................................................................................... 509
Jessica Vazquez-Estrada, Suman Bhunia, Mahmudur Khan, Yicheng Qian, Nero Tran Huu
AMBIENT BACKSCATTER COMMUNICATION SYSTEM UTILIZING MULTICARRIER SIGNAL ........................................................................................................................................................... 511
Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu
GENERALIZATION OF PROBABILISTIC SCHEDULING MODELS FOR REALIZING URLLC APPLICATIONS ................................................................................................................................ 513
Suyong Eum, Shin’Ichi Arakawa, Masayuki Murata
DEEP LEARNING TRANSCEIVER FOR TERAHERTZ BAND COMMUNICATION SYSTEM WITH 1-BIT ADC AND OVERSAMPLING .................................................................................................. 515
Metasebia D. Gemeda, Min S. Han, Ameha T. Abebe, Chung G. Kang
SIGNAL PROPAGATION THROUGH THE INSIDE OF ROBOT LEG FOR NON-WIRED ROBOT SYSTEM ............................................................................................................................................ 517
Chihyeh Chen, Megumi Saito, Shigeru Shimamoto
ROBUST FIRST PATH DETECTION BASED ON TWO-STAGE CNN FOR UNSPECIFIED UWB PULSE SHAPE ...................................................................................................................................... 519
Sehwan Choi, Chaehun Im, Chungyong Lee
TOPIC LOAD BALANCING IN A MULTI IOT GATEWAYS SCENARIO UNDER PUBLISH/SUBSCRIBE PARADIGM ............................................................................................................ 521
Mattia Giovanni Spina, Gerardo Mario Marotta, Stefano Gualtieri, Floriano De Rango
FLUIDS: FEDERATED LEARNING WITH SEMI-SUPERVISED APPROACH FOR INTRUSION DETECTION SYSTEM ............................................................................................................ 523
Ons Aouedi, Kandaraj Piamrat, Guillaume Muller, Kamal Singh
A LIDAR INFORMATION-BASED PRIVACY-PRESERVING AUTHENTICATION SCHEME USING ELLIPTIC CURVE CRYPTOSYSTEM IN VANETS ....................................................................... 525
Ting Gu, Kiho Lim, Gyu Ho Choi, Xiwei Wang
MALDIST: FROM ENCRYPTED TRAFFIC CLASSIFICATION TO MALWARE TRAFFIC DETECTION AND CLASSIFICATION ......................................................................................................... 527
Ofek Bader, Adi Lichy, Chen Hajaj, Ran Dubin, Amit Dvir
OHANA MEANS FAMILY: MALWARE FAMILY CLASSIFICATION USING EXTREME LEARNING MACHINES ................................................................................................................................ 534
Aaron Walker, Raj Mani Shukla, Tapadhir Das, Shamik Sengupta
CYBER DECEPTION USING HONEYPOT ALLOCATION AND DIVERSITY: A GAME THEORETIC APPROACH .............................................................................................................................. 543
Ahmed H. Anwar, Charles A. Kamhoua
LIGHTWEIGHT AUTHENTICATION AND AUTHORIZATION PROTOCOL FOR DYNAMIC CHARGING OF ELECTRIC VEHICLES ....................................................................................................... 550
Abdulaziz Alshaeri, Mohamed Younis
COMPARING THE PREDICTABILITY OF SENSOR MODALITIES TO DETECT STRESS FROM WEARABLE SENSOR DATA ........................................................................................................... 557
Ryan Holder, Ramesh Kumar Sah, Michael Cleveland, Hassan Ghasemzadeh
CHARACTERIZATION OF MAGNETIC COMMUNICATION THROUGH HUMAN BODY ................. 563 Rajpreet K Gulati, Sayemul Islam, Amitangshu Pal, Krishna Kant, Albert Kim
MULTI-FACTOR BEHAVIORAL AUTHENTICATION USING CORRELATIONS ENHANCED BY NEURAL NETWORK-BASED SCORE FUSION ............................................................ 569
Akira Miyazawa, Tran Phuong Thao, Rie Shigetomi Yamaguchi
X-FIDENCE: POST-PANDEMIC WELLNESS BY DENSITY MONITORING WITH PRIVACY PRESERVATION ............................................................................................................................................ 578
Raiful Hasan, Ragib Hasan
COOPERATIVE TASK-ORIENTED GROUP FORMATION FOR VEHICULAR NETWORKS ............... 584 Huiye Liu, Douglas M. Blough
VEHICULAR KNOWLEDGE NETWORKING AND MOBILITY-AWARE SMART KNOWLEDGE PLACEMENT ........................................................................................................................ 593
Seyhan Ucar, Takamasa Higuchi, Chang-Heng Wang, Duncan Deveaux, Onur Altintas, Jérôme Härri
REQUIRED-DATA-RATE-BASED DISTRIBUTED RESOURCE ALLOCATION SCHEME FOR MMWAVE V2V WITH RELAY ............................................................................................................ 599
Yue Yin, Tao Yu, Kei Sakaguchi
MITIGATING LOCATION-BASED ATTACKS USING PREDICATION MODELS IN VEHICULAR AD-HOC NETWORKS ........................................................................................................... 605
Adam Dean, Brennan Huber, Farah Kandah
CONTEXT-BASED MIXED-NUMEROLOGY PROFILE SELECTION FOR 5G AND BEYOND ............ 611 Dheeraj Kotagiri, Anan Sawabe, Eiji Takahashi, Takanori Iwai, Takeo Onishi, Yoshiaki Nishikawa
KNOWLEDGE TRANSFER BASED RADIO AND COMPUTATION RESOURCE ALLOCATION FOR 5G RAN SLICING ........................................................................................................ 617
Hao Zhou, Melike Erol-Kantarci
UNSUPERVISED ROOT-CAUSE IDENTIFICATION OF SOFTWARE BUGS IN 5G RAN ..................... 624 Tobias Sundqvist, Monowar Bhuyan, Erik Elmroth
LEARNING SEMANTICS: AN OPPORTUNITY FOR EFFECTIVE 6G COMMUNICATIONS ............... 631 Mohamed Sana, Emilio Calvanese Strinati
SLICING SCHEDULING FOR SUPPORTING CRITICAL TRAFFIC IN BEYOND 5G............................. 637 Ali Esmaeily, Katina Kralevska, Toktam Mahmoodi
END-TO-END QUALITY-OF-SERVICE ASSURANCE WITH AUTONOMOUS SYSTEMS: 5G/6G CASE STUDY ...................................................................................................................................... 644
Van Sy Mai, Richard J. La, Tao Zhang, Abdella Battou
MODELING AND ANALYSIS OF MMTC TRAFFIC IN 5G BASE STATIONS ........................................ 652 Fidan Mehmeti, Thomas F. La Porta
AN OPTIMIZED M-ARY AMPLITUDE PHASE SHIFT KEYING SCHEME FOR ULTRABROADBAND TERAHERTZ COMMUNICATION ........................................................................ 661
Priyangshu Sen, Viduneth Ariyarathna, Josep M. Jornet
DATA IMPORTANCE AWARE PERIODIC MACHINE LEARNING MODEL UPDATE FOR SPARSE MOBILE CROWDSENSING........................................................................................................... 667
Yuichi Inagaki, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki
A MOBILE APP TO PIN MEDIA TO THE REAL WORLD ......................................................................... 671 Mirko Franco, Pietro Giacomazzi, Claudio E. Palazzi
LSTM-BASED HIGH PRECISION PEDESTRIAN POSITIONING ............................................................. 675 Masaki Inoue, Suhua Tang, Sadao Obana
DEVELOPMENT OF A WINDOW POSITIONING METHOD CONSIDERING NETWORK CHARACTERISTICS FOR A MOBILE TILED DISPLAY ........................................................................... 679
Tohru Kondo, Hiroki Murakami, Kaori Maeda
EVALUATION OF THE BLUETOOTH-BASED PROXIMITY ESTIMATION FOR AUTOMATIC EXPOSURE DETERMINATION ........................................................................................... 683
Kamran Sayrafian, Brian Cloteaux, Vladimir Marbukh, Christian Emiyah
IMPLEMENTATION OF A SEA MONITORING SYSTEM BASED ON SOCIAL INTERNET OF THINGS ..................................................................................................................................................... 687
Andrea Piras, Silvia Mirri, Mariella Sole, Daniele Giusto, Giovanni Pau, Roberto Girau
TIME SERIES ANALYSIS FOR TEMPERATURE FORECASTING USING TINYML ............................. 691 Maria Francesca Alati, Giancarlo Fortino, Juan Morales, Jose M. Cecilia, Pietro Manzoni
BRINGING MQTT BROKERS TO THE EDGE: A PRELIMINARY EVALUATION ................................ 695 Daniele Ronzani, Claudio E. Palazzi, Pietro Manzoni
BLOCKCHAIN AND WEB OF THINGS FOR STRUCTURAL HEALTH MONITORING APPLICATIONS: A PROOF OF CONCEPT .................................................................................................. 699
Lorenzo Gigli, Luca Sciullo, Federico Montori, Alessandro Marzani, Marco Di Felice
MARS - TOWARDS MOBILE ASSISTED RSSI SECRET KEY EXTRACTION STRATEGY IN WBANS ........................................................................................................................................................... 703
Jack Hodgkiss, Soufiene Djahel
INTELLIGENCE AT THE IOT EDGE: ACTIVITY RECOGNITION WITH LOW-POWER MICROCONTROLLERS AND CONVOLUTIONAL NEURAL NETWORKS ........................................... 707
Alessandro Ghibellini, Luciano Bononi, Marco Di Felice
MBM-IOT: INTELLIGENT MULTI-BASELINE MODELING OF HETEROGENEOUS DEVICE BEHAVIORS AGAINST IOT BOTNET ........................................................................................................ 711
Jianyu Wang, Jianli Pan
AN UNSUPERVISED ENSEMBLE LEARNING APPROACH FOR NOVELTY-BASED BOTNET DETECTORS .................................................................................................................................. 713
Mehrdad Hajizadeh, Milad Abbaszadeh Jahromi, Thomas Bauschert
CASE STUDY OF ATTRIBUTE BASED ACCESS CONTROL FOR GENOMICS DATA USING NAMED DATA NETWORKING ...................................................................................................... 715
David Reddick, F. Alex Feltus, Susmit Shannigrahi
EVALUATION OF IMPACT OF INTERMEDIATE GPS SPOOFING TO MOBILE TERMINALS ................................................................................................................................................... 717
Tatsuya Ueki, Kazutoshi Yoshii, Shigeru Shimamoto, Katsunari Mizuno, Kenta Matsufuji
ON THE FEASIBILITY OF HANDWRITTEN SIGNATURE AUTHENTICATION USING PPG SENSOR ........................................................................................................................................................... 719
A B M Mohaimenur Rahman, Yetong Cao, Xinliang Wei, Pu Wang, Fan Li, Yu Wang
PROPAGATION CHARACTERISTICS OF 920 MHZ BAND LPWA FOR INSPECTIONS OF POWER TRANSMISSION LINES USING UAVS ........................................................................................ 721
Tekkan Okuda, Hiraku Okada, Hiroki Tanaka, Toshihiro Fujiwara, Nobuo Matsui, Chedlia Ben Naila, Masaaki Katayama
A STUDY ON DYNAMIC COLLECTION OF COOPERATIVE AWARENESS MESSAGES IN V2X SAFETY APPLICATIONS ..................................................................................................................... 723
Chaima Zoghlami, Rahim Kacimi, Riadh Dhaou
ROOFCOIN: A BLOCKCHAIN FOR INTERNET OF VEHICLES BASED ON THE ROOF STANDARD AND VSN .................................................................................................................................. 725
Abdellah Kaci, Abderrezak Rachedi
A RAN SLICING ARCHITECTURE FOR ITS-G5 COOPERATIVE INTELLIGENT TRANSPORT SYSTEM .................................................................................................................................. 727
Meroua Moussaoui, Rachedi Abdennour, Toufik Ahmed, Mohamed Mosbah
BENCHAV: A SECURITY BENCHMARKING FRAMEWORK FOR AUTONOMOUS DRIVING ......................................................................................................................................................... 729
Mohammad Aminul Hoque, Mahmud Hossain, Ragib Hasan
AN INTERACTION PROVENANCE-BASED TRUST MANAGEMENT SCHEME FOR CONNECTED VEHICLES .............................................................................................................................. 731
Mohammad Aminul Hoque, Ragib Hasan
CAVE-VR AND UNITY GAME ENGINE FOR VISUALIZING CITY SCALE 3D MESHES ................... 733 Calvin Davis, Jaired Collins, Joshua Fraser, Haoxiang Zhang, Shizeng Yao, Emily Lattanzio, Bimal Balakrishnan, Ye Duan, Prasad Calyam, Kannappan Palaniappan
DETECTING FORGED AS PATHS FROM BGP GRAPH FEATURES USING RECURRENT NEURAL NETWORKS ................................................................................................................................... 735
Kevin Hoarau, Pierre Ugo Tournoux, Tahiry Razafindralambo
PERFORMANCE OF FEDERATED LEARNING WITH LOCAL DIFFERENTIAL PRIVACY: FEDERATION OR INDIVIDUALƒ ................................................................................................................ 737
Yuta Kakizaki, Koya Sato, Keiichi Iwamura
A DECENTRALIZED MACHINE LEARNING SCHEME WITH INPUT PERTURBATION-BASED DIFFERENTIAL PRIVACY ............................................................................................................. 739
Masakazu Okamoto, Koya Sato, Keiichi Iwamura
CENTAIR: CENTRALITY BASED CROSS LAYER ROUTING FOR SOFTWARE-DEFINED AERIAL NETWORKS .................................................................................................................................... 741
Talip Tolga Sari, Gökhan Seçinti
SUSPICIOUS ARP ACTIVITY DETECTION AND CLUSTERING BASED ON AUTOENCODER NEURAL NETWORKS .................................................................................................... 743
Yuwei Sun, Hideya Ochiai, Hiroshi Esaki
A SCALABLE REAL-TIME DISTRIBUTED MULTIAGENT DECISION MAKING ALGORITHM WITH COST............................................................................................................................ 745
Paul Cotae, Myong Kang, Alexander Velazquez
MACHINE LEARNING-BASED URBAN MOBILITY MONITORING SYSTEM ..................................... 747 Marco Bertolusso, Michele Spanu, Vlad Popescu, Mauro Fadda, Daniele Giusto
DEPLOYMENT OPTIONS OF 5G NETWORK SLICING FOR SMART HEALTHCARE ......................... 749 Rakshitha De Silva, Yushan Siriwardhana, Tharaka Samarasinghe, Madhusanka Liyanage, Mika Ylianttila
ACAR: AN APPLICATION-AWARE NETWORK ROUTING SYSTEM USING SRV6 ............................ 751 Tomoki Sugiura, Keichi Takahashi, Kohei Ichikawa, Hajimu IIda
BASSA-ML — A BLOCKCHAIN AND MODEL CARD INTEGRATED FEDERATED LEARNING PROVENANCE PLATFORM .................................................................................................... 753
Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Juan Zhao, Xueping Liang
THE TRAGEDY OF THE MINERS ............................................................................................................... 760 Vijay Banerjee, Ryan Rabinowitz, Mark Stidd, Rory Lewis, Philip N. Brown, Gedare Bloom
T-HIBE: A NOVEL KEY ESTABLISHMENT SOLUTION FOR DECENTRALIZED, MULTI-TENANT IOT SYSTEMS ............................................................................................................................... 766
Sayon Duttagupta, Dave Singelée, Bart Preneel
ROBUST AND EFFICIENT DATA SECURITY SOLUTION FOR PERVASIVE DATA SHARING IN IOT ........................................................................................................................................... 775
Wassila Lalouani, Mohamed Younis, Mohammad Ebrahimabadi, Naghmeh Karimi
A RESIDUAL LSTM BASED MULTI-LABEL CLASSIFICATION FRAMEWORK FOR PROACTIVE SLA MANAGEMENT IN A LATENCY CRITICAL NFV APPLICATION USE-CASE ................................................................................................................................................................ 782
Nikita Jalodia, Mohit Taneja, Alan Davy, Behnam Dezfouli
A DEEP REINFORCEMENT LEARNING-BASED RESOURCE MANAGEMENT SCHEME FOR SDN-MEC-SUPPORTED XR APPLICATIONS ................................................................................... 790
Bao Trinh, Gabriel-Miro Muntean
COMPETITIVE MULTI-AGENT LOAD BALANCING WITH ADAPTIVE POLICIES IN WIRELESS NETWORKS ............................................................................................................................... 796
Pedro Enrique Iturria-Rivera, Melike Erol-Kantarci
ROBUST FUNCTION DEPLOYMENT AGAINST UNCERTAIN RECOVERY TIME WITH WORKLOAD-DEPENDENT FAILURE PROBABILITY ............................................................................. 802
Mengfei Zhu, Fujun He, Eiji Oki
MISBEHAVIOR DETECTION USING COLLECTIVE PERCEPTION UNDER PRIVACY CONSIDERATIONS ....................................................................................................................................... 808
Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki
A LIGHTWEIGHT PRIVACY-PRESERVING V2I MUTUAL AUTHENTICATION SCHEME USING CUCKOO FILTER IN VANETS ........................................................................................................ 815
Shafika Showkat Moni, D. Manivannan
ON FRAME FINGERPRINTING AND CONTROLLER AREA NETWORKS SECURITY IN CONNECTED VEHICLES .............................................................................................................................. 821
Alessio Buscemi, Ion Turcanu, German Castignani, Thomas Engel
ACCURATELY REDIRECTING A MALICIOUS DRONE .......................................................................... 827 Wenxin Chen, Yingfei Dong, Zhenhai Duan
JAVRIS: JOINT ARTIFICIAL VISUAL PREDICTION AND CONTROL FOR REMOTE-(ROBOT) INTERACTION SYSTEMS ........................................................................................................... 835
Andreas Ingo Grohmann, Johannes V. S. Busch, Adrian Bretschneider-Perez, Christopher Lehmann, Frank H. P. Fitzek
LOCATION INDEPENDENT GESTURE RECOGNITION USING CHANNEL STATE INFORMATION .............................................................................................................................................. 841
Israel Elujide, Chunhai Feng, Aref Shiran, Jian Li, Yonghe Liu
NN-KEY: A NEURAL NETWORK-BASED SECRET KEY FOR DEMAPPING OFDM SYMBOLS ....................................................................................................................................................... 847
Nasim Soltani, Yanyu Li, Deniz Erdogmus, Yanzhi Wang, Kaushik Chowdhury
PERFORMANCE ENHANCEMENT OF ROLLING SHUTTER BASED VISIBLE LIGHT COMMUNICATION VIA SELECTIVE RECEPTION USING DUAL CAMERAS ..................................... 853
Masayuki Kinoshita, Takumi Toguma, Shun Yamaguchi, Sora Ibaraki, Koji Kamakura, Takaya Yamazato
MULTI-CHANNEL AUTHENTICATION FOR SECURE D2D USING OPTICAL CAMERA COMMUNICATION ....................................................................................................................................... 858
Tianwen Li, Yukito Onodera, Yu Nakayama, Daisuke Hisano
TXOP SHARING WITH COORDINATED SPATIAL REUSE IN MULTI-AP COOPERATIVE IEEE 802.11BE WLANS ................................................................................................................................. 864
D. Nunez, F. Wilhelmi, S. Avallone, M. Smith, B. Bellalta
CLUSTERING AND TRANSMIT POWER CONTROL FOR SOCIAL ASSISTED D2D CELLULAR NETWORKS .............................................................................................................................. 871
Rahul Thakur, Swati Agarwal
CAMAF: A FRAMEWORK TO INCREASE SAFETY ON THE ROAD ...................................................... 877 Vincent Charpentier, Erik De Britto E Silva, Seilendria Hadiwardoyo, Johann Marquez-Barja
RESPIRATORY RATE ESTIMATION BASED ON WIFI FRAME CAPTURE .......................................... 881 Takamochi Kanda, Takashi Sato, Hiromitsu Awano, Sota Kondo, Koji Yamamoto
MONITORING ELECTRIC VEHICLES ON THE GO .................................................................................. 885 Davide Aguiari, Ka Seng Chou, Rita Tse, Giovanni Pau
NON-CONTACT BLOOD PRESSURE ESTIMATION BY MICROWAVE REFLECTION EMPLOYING MACHINE LEARNING .......................................................................................................... 889
Hinako Ochi, Jiang Liu, Shigeru Shimamoto
TRACEME: REAL-TIME CONTACT TRACING AND EARLY PREVENTION OF COVID-19 BASED ON ONLINE SOCIAL NETWORKS ................................................................................................ 893
Yesin Sahraoui, Ludovica De Lucia, Anna Maria Vegni, Chaker Abdelaziz Kerrache, Marica Amadeo, Ahmed Korichi
A LOAD BALANCING METHOD USING K-MEANS++ FOR P2P MMORPGS ....................................... 897 Ryo Kambe, Sumiko Miyata
OPTIMIZATION OF QUANTIZED PHASE SHIFTS FOR RECONFIGURABLE SMART SURFACES ASSISTED COMMUNICATIONS ............................................................................................ 901
Maximiliano Rivera, Mohammad Chegini, Wael Jaafar, Safwan Alfattani, Halim Yanikomeroglu
AN EFFICIENT RANGE SEARCH METHOD UTILIZING DETOUR ROUTES IN SKIP GRAPH ............................................................................................................................................................ 905
Yuya Miki, Takeshi Kaneko, Ryohei Banno, Kazuyuki Shudo
SDN-BASED PLATFORM ENABLING INTELLIGENT ROUTING WITHIN TRANSIT AUTONOMOUS SYSTEM NETWORKS ...................................................................................................... 909
Ons Fares, Abdulhalim Dandoush, Nadjib Aitsaadi
AN EXPERIMENTAL PLATFORM FOR HARD TSN ................................................................................. 913 Maël Guiraud, Brice Leclerc, Olivier Marcé
AN OPTIMAL ALLOCATION FRAMEWORK OF SECURITY VIRTUAL NETWORK FUNCTIONS IN 6G SATELLITE DEPLOYMENTS .................................................................................... 917
Antonio Petrosino, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia
DEMONSTRATION OF VIDEO CONFERENCING TOOL WITH OVERLAY NETWORK PROTOCOL ..................................................................................................................................................... 921
Taiki Yoshikawa, Hijiri Komura, Ren Goto, Kazushige Matama, Chihiro Nishiwaki, Katsuhiro Naito
DEMONSTRATING INTERNET OF SECURE ELEMENTS SERVER ....................................................... 923 Pascal Urien
BAKERYROBOT: 5G CONNECTED ROBOT FOR SMES .......................................................................... 925 Andreas Ingo Grohmann, Christopher Lehmann, Thomas Höschele, Frank H. P. Fitzek
DEMO: AN EXPERIMENTAL ENVIRONMENT BASED ON MINI-PCS FOR FEDERATED LEARNING RESEARCH ................................................................................................................................ 927
Felix Freitag, Pedro Vilchez, Lu Wei, Chun-Hung Liu, Mennan Selimi, Iordanis Koutsopoulos
AN END-TO-END SYSTEM FOR MONITORING IOT DEVICES IN SMART HOMES ........................... 929 Keith Erkert, Andrew Lamontagne, Jereming Chen, John Cummings, Mitchell Hoikka, Kuai Xu, Feng Wang
SMART CITY TECHNOLOGY FOR DISASTER MANAGEMENT: DEMONSTRATING THE USE OF BLUETOOTH LOW ENERGY (BLE) BEACONS FOR EMERGENCY ALERT DISSEMINATION ........................................................................................................................................... 931
Raiful Hasan, Ragib Hasan, Tanveer Islam
DEMONSTRATION OF IN-NETWORK AUDIO PROCESSING FOR LOW-LATENCY ANOMALY DETECTION IN SMART FACTORIES .................................................................................... 933
Huanzhuo Wu, Yunbin Shen, Máté Tömösközi, Giang T. Nguyen, Frank H. P. Fitzek
EXPERIENCING CAMAF FOR SAFER SMART MOBILITY ..................................................................... 935 Vincent Charpentier, Erik De Britto E Silva, Seilendria Hadiwardoyo, Nina Slamnik-Krijestorac, Johann Marquez-Barja
DEMONSTRATION OF MULTI-DIVERSITY WLAN SUPPORTING LOW-LATENCY AND SEAMLESS VIDEO STREAMING ................................................................................................................ 937
Yoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama
BITTEILER: DEMONSTRATION OF EFFICIENT AND PRIVATE MASSIVE INDUSTRIAL IOT COMMUNICATIONS ............................................................................................................................. 939
Máté Tömösközi, Maroua Taghouti, Huanzhuo Wu, Frank H. P. Fitzek
TEACHING DISTRIBUTED AND HETEROGENEOUS ROBOTIC CELLS .............................................. 941 Johannes Mey, Sebastian Ebert, Tianfang Lin, Giang T. Nguyen, Stefan Gumhold, Uwe Aßmann
REALISTIC EXPERIMENTATION ENVIRONMENTS FOR INTELLIGENT AND DISTRIBUTED MANAGEMENT AND ORCHESTRATION (MANO) IN 5G AND BEYOND ................. 943
Nina Slamnik-Kriještorac, Paola Soto-Arenas, Miguel Camelo Botero, Luca Cominardi, Steven Latré, Johann M. Marquez-Barja
OBJECT ESTIMATION METHOD FOR EDGE DEVICES INSPIRED BY MULTIMODAL INFORMATION PROCESSING IN THE BRAIN .......................................................................................... 945
Ryoga Seki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata, Masaya Fujiwaka
TOWARDS FEASIBILITY OF DEEP-LEARNING BASED INTRUSION DETECTION SYSTEM FOR IOT EMBEDDED DEVICES ................................................................................................. 947
Jonathan Hunter, Brennan Huber, Farah Kandah
TOWARDS INTERNET OF SECURE ELEMENTS ...................................................................................... 949 Pascal Urien
LATENCY GUARANTEE SERVICE SLICE IN 5G AND BEYOND .......................................................... 951 Lijun Dong, Richard Li
A HOST-BASED INVESTIGATION OF IPV6 IN ACADEMIA: THE CASES OF JAPAN AND VIETNAM........................................................................................................................................................ 953
Kien Nguyen, Phi Le Nguyen, Hiroo Sekiya
TOWARD SECURED INTERNET OF THINGS (IOT) NETWORKS: A NEW MACHINE LEARNING BASED TECHNIQUE FOR FINGERPRINTING OF RADIO DEVICES ................................ 955
Abdallah Abdallah, Marcos F. B. De Abreu, Flávio H. T. Vieira, Kleber V. Cardoso
BIANFE: OBJECT IDENTIFICATION AND AUTHENTICATION IN FEDERATED SCENARIOS .................................................................................................................................................... 957
Carolina Gonçalves, Bruno Sousa, Nuno Antunes
IMAGE SIZE REDUCTION BY ROAD-SIDE EDGE COMPUTING FOR WIRELESS RELAY TRANSMISSION AND OBJECT DETECTION ............................................................................................ 959
Weiran Yuan, Kazuki Maruta, Yu Nakayama, Daisuke Hisano, Kei Sakaguchi
TACTILE ELECTRONICS MEETS SOFTWARISED NETWORKS ............................................................ 961 Jens Wagner, Helmuth Morath, Jiajing Zhang, Florian Wieczorek, Lisa Lüneburg, Frank H. P. Fitzek, Giang T. Nguyen
EMERGENCYBLOCK: A BLOCKCHAIN-BASED PUBLIC EMERGENCY ALERT SYSTEM .............. 963 Zeynep Dündar, Oguzhan Kocatürk, Gökhan Seçinti
MULTI-OPERATOR INTELLIGENT UAV DELIVERY NETWORKS IN BEYOND VISUAL LINE OF SIGHT OPERATIONS .................................................................................................................... 965
Anindo Mahmood, Kevin Ramirez Reynoso, Mostafizur Rahman, Sheikh Ariful Islam
USING CFN FOR UNIFORM SAMPLING OF CLOUD-NATIVE DATACENTERS ................................. 967 Aviv Yehezkel, Eyal Elyashiv, Sharon Barkai
DYNAMIC TIME SLOT ALLOCATION ALGORITHM FOR QUADCOPTER SWARMS ....................... 969 Sharif Azem, Anam Tahir, Heinz Koeppl
CONCURRENT TRANSMISSION FOR MULTI-ROBOT COORDINATION ............................................ 975 Sourabha Bharadwaj, Karunakar Gonnabathula, Sudipta Saha, Chayan Sarkar, Rekha Raja
EFFICIENT LOAD MIGRATION SCHEME FOR FOG NETWORKS ........................................................ 981 Mohammed A. Jasim, Nazli Siasi, Nasir Ghani
SECURITY AND PRIVACY EVALUATION METHODS AND METRICS IN VEHICULAR NETWORKS .................................................................................................................................................... 987
Leila Benarous, Saadi Boudjit
OTA-NN: OBSERVATIONAL THERAPY-ASSISTANCE NEURAL NETWORK FOR ENHANCING AUTISM INTERVENTION QUALITY ................................................................................. 993
Minxiao Wang, Ning Yang
IMPROVING SEXTING SAFETY THROUGH MEDIA FORWARDING CONTROL ............................. 1000 Mirko Franco, Ombretta Gaggi, Claudio E. Palazzi
DESIGNING INTERACTIVE SYSTEMS FOR SENIORS: LIVING ON AN ISLAND ............................. 1006 Fabio Pittarello
ON THE SECURITY OF 6G USE CASES: THREAT ANALYSIS OF 'ALL-SENSES MEETING' .......... 1012 Zakaria Laaroussi, Elif Ustundag Soykan, Michael Liljenstam, Utku Gülen, Leyli Karaçay, Emrah Tomur
MACHINE LEARNING SUBSYSTEM FOR AUTONOMOUS COLLISION AVOIDANCE ON A SMALL UAS WITH EMBEDDED GPU .................................................................................................. 1018
Nicholas Polosky, Tyler Gwin, Sean Furman, Parth Barhanpurkar, Jithin Jagannath
REQUIREMENTS AND SPECIFICATIONS FOR THE ORCHESTRATION OF NETWORK INTELLIGENCE IN 6G ................................................................................................................................ 1025
Miguel Camelo, Luca Cominardi, Marco Gramaglia, Marco Fiore, Andres Garcia-Saavedra, Lidia Fuentes, Danny De Vleeschauwer, Paola Soto-Arenas, Nina Slamnik-Krijestorac, Joaquín Ballesteros, Chia-Yu Chang, Gabriele Baldoni, Johann M. Marquez-Barja, Peter Hellinckx, Steven Latré
AIDA-DB: A DATA MANAGEMENT ARCHITECTURE FOR THE EDGE AND CLOUD CONTINUUM ................................................................................................................................................ 1034
Nuno Faria, Daniel Costa, José Pereira, Ricardo Vilaça, Luís Ferreira, Fábio Coelho
ON DESIGNING A MOBILE APP TO SUPPORT PEOPLE WITH COGNITIVE DISABILITIES IN DAILY ACTIVITIES ............................................................................................................................... 1040
Lisa Cesario, Giovanni Delnevo, Massimiliano Malavasi, Lorenzo Desideri, Silvia Mirri
INTEROPERABILITY AND SCALABILITY TRADE-OFFS IN OPEN IOT PLATFORMS .................... 1046 Dener Ottolini, Ivan Zyrianoff, Carlos Kamienski
ALIGNING ACCESSIBILITY DESIGN TO NON-DISABLED PEOPLE’S PERCEPTIONS ................... 1052 Chantal Lengua, Vincenzo Rubano, Fabio Vitali
DYSLEXEASY-APP TO IMPROVE READABILITY THROUGH THE EXTRACTED SUMMARY FOR DYSLEXIC USERS ......................................................................................................... 1058
Marianna Di Gregorio, Marco Romano, Monica Sebillo, Giuliana Vitiello
ON ATTACKS TO FEDERATED LEARNING AND A BLOCKCHAIN-EMPOWERED PROTECTION ............................................................................................................................................... 1064
Christian Esposito, Giancarlo Sperlì, Vincenzo Moscato, Zhongliang Zhao
PATH AND FLOOR DETECTION IN OUTDOOR ENVIRONMENTS FOR FALL PREVENTION OF THE VISUALLY IMPAIRED POPULATION ............................................................. 1070
Xin Wang, Juan Calderon, Navid Khoshavi, Luis G. Jaimes
TRUSTED DECENTRALIZED FEDERATED LEARNING ....................................................................... 1076 Anousheh Gholami, Nariman Torkzaban, John S. Baras
INTEGRATING MOBILE IOT DEVICES INTO THE ARROWHEAD FRAMEWORK USING WEB OF THINGS ......................................................................................................................................... 1082
Chiara Bonsignori, Carlo Puliafito, Antonio Virdis, Enzo Mingozzi, Giuseppe Iannaccone
Author Index