7th IEEE Workshop on Cooperative and Cognitive Mobile Networks

IEEE CoCoNet Workshop 2015

Cooperative and Cognitive Mobile Networks

CoCoNet 7

collocated with IEEE ICC 2015 in London, UK
8th June 2015, Technical sponsorship: IEEE Communications Society
in collaboration with Green Mobile Clouds and Colorcast.
click here to submit your paper for CoCoNet 7

Scope of the Workshop

The scope of the CoCoNet7 workshop is to bring together a highly qualified group of people with interest in cooperative and cognitive wireless networks. Cooperation is a major subject in research in the wireless communication community as it has been identified as one of the underlying principles for future wireless communication systems. Cooperation, altruistic or non-altruistic, is the basis to break up the cellular concept and enrich it by multi hop, peer-to-peer, or cloud functionalities. The workshop will highlight the newest trends in this emerging area, complementing it with first practical implementations and demonstrations in this field. New technologies and concepts such as network coding and mobile clouds are the driving forces for cooperative and cognitive networks. Besides the technical insights, the workshop will encourage the participants to discuss among each other. The workshop is seeking papers for oral presentations and papers which will be presented in poster sessions possibly accompanied with demonstrations or test-beds.

Keynote Speech:

Assured High-Throughput Wireless Networking Through Cooperation in the Presence of Heterogeneous Cross-layer Attacks

by Tommaso Melodia, Associate Professor with the Department of Electrical and Computer Engineering, Northeastern University, USA


Wireless multi-hop networks are vulnerable to various attacks including, most notoriously, denial-of-service (DoS) attacks. Being exposed on the propagation channel, wireless transmissions can easily be degraded by malicious jammers. In traditional wireless security, jamming attacks are typically dealt with in isolation and independently of other attacks. While this divide-and-conquer approach has contributed to facilitating the analysis and design of effective countermeasures, it fails to capture the new challenges brought by heterogeneous cross-layer attacks. By utilizing multiple means at multiple layers of the protocol stack with a unified goal, the adversary may be able to obtain an unexpected edge. Traditional security approaches, however, fail to address the potential consequences of such heterogeneous cross-layer attacks.

In this talk, we will provide an overview of recent work aimed at developing a cooperative framework for assured high-throughput networking with heterogeneous cross-layer attacks. Our objective is to develop a unified universal framework capturing potential attacks at all layers to address the corresponding vulnerabilities.

We will first discuss a new mathematical framework to develop optimal cooperative anti-jamming strategies. While traditional anti-jamming schemes only exploit frequency diversity, we introduce the notion of cooperative anti-jamming, where denial-of-service attacks are dealt with by leveraging cooperation among different legitimate users. Two levels of cooperation are considered. At the physical layer, cooperative communication based on relaying is used to enhance the link throughput of jammed links; at the MAC layer, legitimate users cooperate to optimally regulate their channel access probabilities so that jammed users gain a higher share of channel utilization. The problem of developing optimal cooperation strategies is formulated as a distributed pricing-based optimization problem and a best response algorithm with provable convergence is proposed. We show that the proposed framework achieves close-to-global optimality.

We will then discuss how to integrate network layer and data security requirements into the framework. Most routing protocols for wireless multi-hop networks are based on controlling the network dynamics at multiple layers. This coupling implies that changes in the dynamics at layers other than the network layer also affect the routing decisions. As a result, an adversary may be able to extend attacks to the network layer by impacting functionalities at the physical layer through jamming. A jammer can in fact degrade the capacity of selected communication links. Then, because cross-layer routing protocols are often designed to avoid links with low capacity, jammed nodes are likely to redirect their traffic by choosing alternate paths. With proper collaboration from compromised nodes, data may directly to compromised nodes. We model hammer and attack and analyze the threat to wireless multi-hop networks. Characteristics helpful in countermeasure designs are observed, and, based on such observations, we design a trust-based cooperative countermeasure that shows considerable resistance to the attack.

Bio: Tommaso Melodia is an Associate Professor with the Department of Electrical and Computer Engineering at Northeastern University in Boston. He received his Ph.D. in Electrical and Computer Engineering from the Georgia Institute of Technology in 2007. He is a recipient of the National Science Foundation CAREER award, and coauthored a paper that was recognized as the ISI Fast Breaking Paper in the field of Computer Science for February 2009 and of an ACM WUWNet 2013 Best Paper Award. He serves in the Editorial Boards of IEEE Transactions on Mobile Computing, IEEE Transactions on Wireless Communications, IEEE Transactions on Multimedia, and Computer Networks (Elsevier). His current research interests are in modeling, optimization, and experimental evaluation of networked communication systems, with applications to ultrasonic intra-body networks, cognitive and cooperative networks, multimedia sensor networks, and underwater networks.

Professor Tomasso Melodia

Topics of interest are (but not limited to):

- Architectures of Cooperative Mobile Networks (CMN)
- Novel Mobile Cooperative Services and Applications
- Cooperative Service Discovery
- Network Coding for Cooperative and Cognitive Networks
- Compressed Sending for Cooperative and Cognitive Networks
- Self Organizing Peer-to-Peer Networks
- Cognitive Principles applied to Wireless and Mobile Networks
- Green Mobile Communications in cooperative and cognitve settings
- Device to Device (D2D) Communication
- Internet of Things (IoT)
- Machine to Machine (M2M)
- Context-aware Cloud Management
- Business Models for Cooperative Networking
- Spectrum Management Policy and Strategy for Cognitive Networks
- Social Mobile Networks
- Software Defined Radio
- Software Defined Networks
- Software Defined Storage
- Peer-to-Peer Technologies
- Cross-layer Optimization
- Security and Privacy in Cooperative Wireless Networks
- Mobile Cooperative Applications
- Sensor Networks
- Interplay of Social Networks and Communication Systems
- Mobile Clouds
- Massive Sensing Exploiting Mobile Devices
- Opportunistic Resource Sharing: Concepts, Resource Management and Novel Applications
- Practical Implementations, Test-beds and Demonstrations

Submission Guidelines:

IEEE CoCoNet Workshop accepts only novel, previously unpublished papers in the area of Cognitive and Cooperative Wireless Networks. Prospective authors are encouraged to submit a 5-page IEEE conference style paper (including all text, figures, and references) through EDAS submission system (http://www.edas.info ). (If you have any problems during submission, please contact: ff@es.aau.dk). Accepted papers must be presented at the workshop by one of the authors. The presenter must register for the workshop before the deadline given for author registration. Failure to register before the deadline will result in automatic withdrawal of the paper from the workshop proceedings and the program. Furthermore we encourage to submit full paper description of potential demonstration in the area of CoCoNet to be presented at the event. Those papers will be presented together with the demonstrator itself in a poster session. All papers (oral session and demonstrations) selected for publication will be published together with IEEE ICC 2015 proceedings and available on IEEE Xplore database. One final note, all papers will be on IEEExplorer if the paper is presented (and only if) by an author of that given paper. In the past we followed this policy strictly.


06.12.2014 - Adding Keynote / updating dates
19.09.2014 - Update of the web page
31.08.2014 - Workshop is approved by ICC
03.06.2015 - Setup new web page