skip to main content
10.1145/3551661acmconferencesBook PagePublication PagesmswimConference Proceedingsconference-collections
Q2SWinet '22: Proceedings of the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MSWiM '22: Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems Montreal Quebec Canada October 24 - 28, 2022
ISBN:
978-1-4503-9481-9
Published:
24 October 2022
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 07 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

We kindly welcome you to the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet '22). The Q2SWinet 2022 will exceptionally be held online due to the COVID-19 pandemic, on October 24th to October 28th, 2022.

The Q2SWinet Symposium aims at serving as a meeting point and a forum for exchanging ideas, discussing solutions, and sharing experiences among researchers, professionals, application developers, and practitioners from institutions around the world. As with the previous sixteen editions of the Q2SWinet symposium series, the scope of this year 's Symposium will remain on general issues related to QoS and security in wireless and mobile networks networking and computing.

The call for papers has attracted many high-quality submissions worldwide. Every paper submitted had been peer-reviewed by at least three referees from the Technical Program Committee, where 16 papers were accepted. The featured papers span from a wide range of topics related to network modeling and performance evaluation, network security, resource allocation, multimedia content delivery, 5G and wireless networks, and Internet of Things.

Skip Table Of Content Section
SESSION: Session 1: Measurement and Performance Evaluation
research-article
Open Access
A Simulation Environment for Software Defined Wireless Networks with Legacy Devices

The adoption of Software Defined Networks (SDNs) in a Mobile ad-hoc network (MANET) could present several benefits, such as adaptability and performance increase. However, to assess this possibility, a simulation tool may be necessary to test new ...

research-article
Open Access
Electromagnetic Field Strength Measurements in a Private 5G Campus Network

The deployment of fifth generation (5G) networks in Germany has been on the rise since 2019 and continues to expand rapidly. Unlike earlier generations, 5G technology supports the deployment of private campus networks that enables users to configure and ...

research-article
Experimental Analysis of LoRa Transmission Parameters

Cyber Physical Systems that pave the way to Industry 4.0 can often be looked upon as the combination of the Internet of Things (IoT) and Artificial Intelligence. IoT applications use wireless protocols such as LTE-M, NB-IoT, WiFi, BLE, LoRa, and Zigbee. ...

SESSION: Session 2: Network Resource Allocation
research-article
Max-min Fair Resource Allocation in SD-RAN

Software-Defined Radio Access Networks (SD-RANs), introduced for the first time in 5G networks, symbolize a paradigm shift in the way the allocation of cellular network resources is performed. The main feature of SD-RAN is the possibility to decouple ...

research-article
FORLORN: A Framework for Comparing Offline Methods and Reinforcement Learning for Optimization of RAN Parameters

The growing complexity and capacity demands for mobile networks necessitate innovative techniques for optimizing resource usage. Meanwhile, recent breakthroughs have brought Reinforcement Learning (RL) into the domain of continuous control of real-world ...

research-article
Proportionally Fair Resource Allocation Considering Geometric Blockage Modeling for Improved Mobility Management in 5G

Line of Sight (LoS) blockages are a common occurrence in densely deployed cellular networks, as is the case with 5G. This leads to a significant deterioration in the signal quality on the user side. Modeling LoS blockages is crucial for simulations to ...

SESSION: Session 3: Network Security
research-article
A Data Mining-based Intrusion Detection System for Cyber Physical Power Systems

The implication of Cyber-physical systems into smart grids has introduced some security breaches due to the lack of security mechanisms. This paper aims to come up with a novel methodology to detect false data injection attacks on cyber-physical power ...

research-article
Classification of Botnet Attacks in IoT Using a Convolutional Neural Network

Detecting malicious attacks on Internet of Things (IoT) devices is a current research trend due to the rise of Botnet attacks across different IoT environments and the lack of standardization in IoT's security field. To tackle these issues, deep ...

research-article
Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks

Nowadays, many industries rely on machine learning (ML) algorithms and their ability to learn from existing data to make inferences about new unlabeled data. Applying ML algorithms to the network security domain is not new. However, without proper data ...

SESSION: Session 4: IoT and WSN
research-article
Performance Evaluation of Edge Computing-Aided IoT Augmented Reality Systems

Envisioned mobile augmented reality (MAR) ushers a new plethora of smart applications. However, the resource-constrained nature of head-mounted devices (HMDs) has limited the development of MAR systems. In this regard, edge computing has emerged as a ...

research-article
A Randomized Algorithm for Wireless Sensor Network Lifetime Optimization

A wireless sensor network consists of a set of sensors S and a monitored set of targets (or an area) T. Typically, there are much more sensors than the targets, but their operation time is limited by the battery capacity. The sensors may be randomly ...

SESSION: Session 5: Performance Evaluation
research-article
Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers

The vulnerability of the Global Positioning System (GPS) against spoofing is known for quite some time. Also, the positioning and navigation of most semi-autonomous and autonomous drones are dependent on Global Navigation Satellite System (GNSS) ...

research-article
Empowering Synergies of Communities with Service Providers for the Bottom-up Deployment of Network Infrastructures

Ambitious plans for ubiquitous broadband connectivity call for huge investments in network infrastructures. Sharing the deployment costs of these infrastructures across multiple actors appears to be inevitable, but the exact form of sharing and the ...

SESSION: Session 6: Content Delivery
research-article
Modeling SCHC ACK-on-Error Fragment Delivery over Sigfox

The SCHC framework is a tool that enables IPv6 communication over Low-Power Wide-Area Networks (LPWANs). SCHC allows to carry large data packets, such as IPv6 datagrams, in LPWANs thanks to its compression and fragmentation mechanisms. The Sigfox ...

research-article
Open Access
Cache-Aided Delivery Network in a Shared Cache Framework with Correlated Sources

The increasing number of internet users and IoT devices, in addition to the widespread use of social media and streaming services, has put significant strain on current delivery networks. Content caching has emerged as a viable solution to combat the ...

research-article
Modeling of Edge Server Cache-Reservation for Virtual Reality Applications

Envisioned virtual reality (VR) systems include mobility as one of the important features of users' when interacting with virtual environments and objects. Thus, VR content encoding will be processed on cloud servers and delivered to users through the ...

Contributors
  • University of Ottawa
  • Duke Kunshan University

Recommendations

Acceptance Rates

Q2SWinet '22 Paper Acceptance Rate 16 of 47 submissions, 34%;
Overall Acceptance Rate 46 of 131 submissions, 35%
YearSubmittedAcceptedRate
Q2SWinet '22471634%
Q2SWinet '14301447%
Q2SWinet '10541630%
Overall1314635%