We kindly welcome you to the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet '22). The Q2SWinet 2022 will exceptionally be held online due to the COVID-19 pandemic, on October 24th to October 28th, 2022.
The Q2SWinet Symposium aims at serving as a meeting point and a forum for exchanging ideas, discussing solutions, and sharing experiences among researchers, professionals, application developers, and practitioners from institutions around the world. As with the previous sixteen editions of the Q2SWinet symposium series, the scope of this year 's Symposium will remain on general issues related to QoS and security in wireless and mobile networks networking and computing.
The call for papers has attracted many high-quality submissions worldwide. Every paper submitted had been peer-reviewed by at least three referees from the Technical Program Committee, where 16 papers were accepted. The featured papers span from a wide range of topics related to network modeling and performance evaluation, network security, resource allocation, multimedia content delivery, 5G and wireless networks, and Internet of Things.
Proceeding Downloads
A Simulation Environment for Software Defined Wireless Networks with Legacy Devices
The adoption of Software Defined Networks (SDNs) in a Mobile ad-hoc network (MANET) could present several benefits, such as adaptability and performance increase. However, to assess this possibility, a simulation tool may be necessary to test new ...
Electromagnetic Field Strength Measurements in a Private 5G Campus Network
- Amina Fellan,
- Christopher Hobelsberger,
- Christian Schellenberger,
- Daniel Lindenschmitt,
- Hans D. Schotten
The deployment of fifth generation (5G) networks in Germany has been on the rise since 2019 and continues to expand rapidly. Unlike earlier generations, 5G technology supports the deployment of private campus networks that enables users to configure and ...
Experimental Analysis of LoRa Transmission Parameters
- Harish V. Mekali,
- Anurag Agarwal,
- Manvendra Singh,
- Jobish John,
- Gaurav S. Kasbekar,
- Maryam Shojaei Baghini
Cyber Physical Systems that pave the way to Industry 4.0 can often be looked upon as the combination of the Internet of Things (IoT) and Artificial Intelligence. IoT applications use wireless protocols such as LTE-M, NB-IoT, WiFi, BLE, LoRa, and Zigbee. ...
Max-min Fair Resource Allocation in SD-RAN
Software-Defined Radio Access Networks (SD-RANs), introduced for the first time in 5G networks, symbolize a paradigm shift in the way the allocation of cellular network resources is performed. The main feature of SD-RAN is the possibility to decouple ...
FORLORN: A Framework for Comparing Offline Methods and Reinforcement Learning for Optimization of RAN Parameters
The growing complexity and capacity demands for mobile networks necessitate innovative techniques for optimizing resource usage. Meanwhile, recent breakthroughs have brought Reinforcement Learning (RL) into the domain of continuous control of real-world ...
Proportionally Fair Resource Allocation Considering Geometric Blockage Modeling for Improved Mobility Management in 5G
Line of Sight (LoS) blockages are a common occurrence in densely deployed cellular networks, as is the case with 5G. This leads to a significant deterioration in the signal quality on the user side. Modeling LoS blockages is crucial for simulations to ...
A Data Mining-based Intrusion Detection System for Cyber Physical Power Systems
The implication of Cyber-physical systems into smart grids has introduced some security breaches due to the lack of security mechanisms. This paper aims to come up with a novel methodology to detect false data injection attacks on cyber-physical power ...
Classification of Botnet Attacks in IoT Using a Convolutional Neural Network
Detecting malicious attacks on Internet of Things (IoT) devices is a current research trend due to the rise of Botnet attacks across different IoT environments and the lack of standardization in IoT's security field. To tackle these issues, deep ...
Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks
Nowadays, many industries rely on machine learning (ML) algorithms and their ability to learn from existing data to make inferences about new unlabeled data. Applying ML algorithms to the network security domain is not new. However, without proper data ...
Performance Evaluation of Edge Computing-Aided IoT Augmented Reality Systems
Envisioned mobile augmented reality (MAR) ushers a new plethora of smart applications. However, the resource-constrained nature of head-mounted devices (HMDs) has limited the development of MAR systems. In this regard, edge computing has emerged as a ...
A Randomized Algorithm for Wireless Sensor Network Lifetime Optimization
A wireless sensor network consists of a set of sensors S and a monitored set of targets (or an area) T. Typically, there are much more sensors than the targets, but their operation time is limited by the battery capacity. The sensors may be randomly ...
Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers
The vulnerability of the Global Positioning System (GPS) against spoofing is known for quite some time. Also, the positioning and navigation of most semi-autonomous and autonomous drones are dependent on Global Navigation Satellite System (GNSS) ...
Empowering Synergies of Communities with Service Providers for the Bottom-up Deployment of Network Infrastructures
Ambitious plans for ubiquitous broadband connectivity call for huge investments in network infrastructures. Sharing the deployment costs of these infrastructures across multiple actors appears to be inevitable, but the exact form of sharing and the ...
Modeling SCHC ACK-on-Error Fragment Delivery over Sigfox
The SCHC framework is a tool that enables IPv6 communication over Low-Power Wide-Area Networks (LPWANs). SCHC allows to carry large data packets, such as IPv6 datagrams, in LPWANs thanks to its compression and fragmentation mechanisms. The Sigfox ...
Cache-Aided Delivery Network in a Shared Cache Framework with Correlated Sources
The increasing number of internet users and IoT devices, in addition to the widespread use of social media and streaming services, has put significant strain on current delivery networks. Content caching has emerged as a viable solution to combat the ...
Modeling of Edge Server Cache-Reservation for Virtual Reality Applications
Envisioned virtual reality (VR) systems include mobility as one of the important features of users' when interacting with virtual environments and objects. Thus, VR content encoding will be processed on cloud servers and delivered to users through the ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Q2SWinet '22 | 47 | 16 | 34% |
Q2SWinet '14 | 30 | 14 | 47% |
Q2SWinet '10 | 54 | 16 | 30% |
Overall | 131 | 46 | 35% |