European Conference/Workshop on Wireless Sensor Networks最新文献

筛选
英文 中文
Modeling the Trade-off between Throughput and Reliability in a Bluetooth Low Energy Connection 蓝牙低功耗连接中吞吐量与可靠性之间的权衡建模
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2024-05-02 DOI: 10.5555/3639940.3639944
Bozheng Pang, Tim Claeys, H. Hallez, J. Boydens
{"title":"Modeling the Trade-off between Throughput and Reliability in a Bluetooth Low Energy Connection","authors":"Bozheng Pang, Tim Claeys, H. Hallez, J. Boydens","doi":"10.5555/3639940.3639944","DOIUrl":"https://doi.org/10.5555/3639940.3639944","url":null,"abstract":"The use of Bluetooth Low Energy in low-range Internet of Things systems is growing exponentially. Similar to other wireless communication protocols, throughput and reliability are two key performance metrics in Bluetooth Low Energy communications. However, electromagnetic interference from various sources can heavily affect the performance of wireless devices, leading to dropped throughput and unreliable communication. Therefore, there is a need for both theoretical and practical studies capable of quantifying the BLE communication performance, e.g. throughput and reliability, subject to interference. In this paper, a mathematical model to predict throughput of a BLE connection under interference is derived first, and linked to the reliability model we developed in [1]. After that, extensive practical experiments are performed in various scenarios to sufficiently validate the theoretical results from both models. Finally, the trade-off between throughput and reliability is investigated through the validated models to give some inside properties of BLE communications. The similarity between the theoretical results and the experimental ones highlights the accuracy of the proposed throughput and reliability models. Hence, the two models can be used to explore the performance of various BLE designs or deployments from diverse perspectives.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"40 5","pages":"32-39"},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141018272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OSF: An Open-Source Framework for Synchronous Flooding over Multiple Physical Layers OSF:多物理层同步泛洪的开源框架
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2022-08-26 DOI: 10.48550/arXiv.2208.12850
Michael Baddeley, Yevgen Gyl, Markus Schuss, Xiaoyuan Ma, C. Boano
{"title":"OSF: An Open-Source Framework for Synchronous Flooding over Multiple Physical Layers","authors":"Michael Baddeley, Yevgen Gyl, Markus Schuss, Xiaoyuan Ma, C. Boano","doi":"10.48550/arXiv.2208.12850","DOIUrl":"https://doi.org/10.48550/arXiv.2208.12850","url":null,"abstract":"Flooding protocols based on concurrent transmissions are regarded as the most reliable way to collect or disseminate data across a multi-hop low-power wireless mesh network. Recent works have shown that such protocols are effective for narrowband communication not only over IEEE 802.15.4, but also over the BLE 5 physical layers (PHYs). However, to date, existing literature has only built synchronous flooding solutions on top of a single PHY, and there has been no attempt to leverage different PHYs at runtime to increase performance. This paper fills this gap and presents OSF, an open-source framework that enables the design of multi-PHY synchronous flooding solutions thanks to a novel radio driver and middle-ware architecture capable of dynamically switching the underlying physical layer. This allows exploitation of the specific benefits of each PHY (e.g., higher data-rate, increased robustness) on-demand during each flood, increasing performance. We tailor OSF to the off-the-shelf nRF52840 platform, and showcase its benefits by comparing single-PHY and multi-PHY synchronous flooding solutions on a real-world testbed.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API 物联网操作系统的可用安全性:在通用API下集成大量嵌入式加密组件
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2022-08-19 DOI: 10.48550/arXiv.2208.09281
Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, T. Schmidt, Matthias Wählisch
{"title":"Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API","authors":"Lena Boeckmann, Peter Kietzmann, Leandro Lanzieri, T. Schmidt, Matthias Wählisch","doi":"10.48550/arXiv.2208.09281","DOIUrl":"https://doi.org/10.48550/arXiv.2208.09281","url":null,"abstract":"IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage. An operating system should provide uniform access to these heterogeneous hardware features, which is a particular challenge in the resource constrained IoT. Effective security is tied to the usability of cryptographic interfaces. A thoughtful API design is challenging, and it is beneficial to re-use such an interface and to share the knowledge of programming embedded security widely. In this paper, we integrate an emerging cryptographic interface into usable system-level calls for the IoT operating system RIOT, which runs on more than 240 platforms. This interface supports ID-based key handling to access key material in protected storage without exposing it to anyone. Our design foresees hardware acceleration on all available variants; our implementation integrates diverse cryptographic hardware and software backends via the uniform interface. Our performance measurements show that the overhead of the uniform API with integrated key management is negligible compared to the individual crypto operation. Our approach enhances the usability, portability, and flexibility of cryptographic support in the IoT.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing Synchronous Flooding Communications: An Atomic-SDN Implementation 保护同步泛洪通信:原子sdn实现
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2022-08-03 DOI: 10.5555/3578948.3578988
C. Lockie, Ioannis Mavromatis, Aleksandar Stanoev, Yichao Jin, G. Oikonomou
{"title":"Securing Synchronous Flooding Communications: An Atomic-SDN Implementation","authors":"C. Lockie, Ioannis Mavromatis, Aleksandar Stanoev, Yichao Jin, G. Oikonomou","doi":"10.5555/3578948.3578988","DOIUrl":"https://doi.org/10.5555/3578948.3578988","url":null,"abstract":"Synchronous Flooding (SF) protocols can enhance the wireless connectivity between Internet of Things (IoT) devices. However, existing SF solutions fail to introduce sufficient security measures due to strict time synchronisation requirements, making them vulnerable to malicious actions. Our paper presents a design paradigm for encrypted SF communications. We describe a mechanism for synchronising encryption parameters in a network-wide fashion. Our solution operates with minimal overhead and without compromising communication reliability. Evaluating our paradigm on a real-world, large-scale IoT testbed, we have proven that a communication layer impervious to a range of attacks is established without sacrificing the network performance.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114200064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge Sardino:移动边缘安全视觉传感的超快速动态集成
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2022-04-18 DOI: 10.48550/arXiv.2204.08189
Qun Song, Zhenyu Yan, W. Luo, Rui Tan
{"title":"Sardino: Ultra-Fast Dynamic Ensemble for Secure Visual Sensing at Mobile Edge","authors":"Qun Song, Zhenyu Yan, W. Luo, Rui Tan","doi":"10.48550/arXiv.2204.08189","DOIUrl":"https://doi.org/10.48550/arXiv.2204.08189","url":null,"abstract":"—Adversarial example attack endangers the mobile edge systems such as vehicles and drones that adopt deep neural networks for visual sensing. This paper presents Sardino , an active and dynamic defense approach that renews the inference ensemble at run time to develop security against the adaptive adversary who tries to exfiltrate the ensemble and construct the corresponding effective adversarial examples. By applying consistency check and data fusion on the ensemble’s predictions, Sardino can detect and thwart adversarial inputs. Compared with the training-based ensemble renewal, we use HyperNet to achieve one million times acceleration and per-frame ensemble renewal that presents the highest level of difficulty to the prerequisite exfiltration attacks. Moreover, the robustness of the renewed ensembles against adversarial examples is enhanced with adversarial learning for the HyperNet. We design a run- time planner that maximizes the ensemble size in favor of security while maintaining the processing frame rate. Beyond adversarial examples, Sardino can also address the issue of out-of-distribution inputs effectively. This paper presents extensive evaluation of Sardino’s performance in counteracting adversarial examples and applies it to build a real-time car-borne traffic sign recognition system. Live on-road tests show the built system’s effectiveness in maintaining frame rate and detecting out-of- distribution inputs due to the false positives of a preceding YOLO-based traffic sign detector.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115313567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Clock Reconfiguration for the Constrained IoT and its Application to Energy-efficient Networking 受限物联网的动态时钟重构及其在节能网络中的应用
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2021-02-20 DOI: 10.5555/3578948.3578964
Michel Rottleuthner, T. Schmidt, Matthias Wählisch
{"title":"Dynamic Clock Reconfiguration for the Constrained IoT and its Application to Energy-efficient Networking","authors":"Michel Rottleuthner, T. Schmidt, Matthias Wählisch","doi":"10.5555/3578948.3578964","DOIUrl":"https://doi.org/10.5555/3578948.3578964","url":null,"abstract":"Clock configuration takes a key role in tuning constrained general-purpose microcontrollers for performance, timing accuracy, and energy efficiency. Configuring the underlying clock tree, however, involves a large parameter space with complex dependencies and dynamic constraints. We argue for clock configuration as a generic operating system module that bridges the gap between highly configurable but complex embedded hardware and easy application development. In this paper, we propose a method and a runtime subsystem for dynamic clock reconfiguration on constrained Internet of Things (IoT) devices named ScaleClock. ScaleClock derives measures to dynamically optimize clock configurations by abstracting the hardware-specific clock trees. The ScaleClock system service grants portable access to the optimization potential of dynamic clock scaling for applications. We implement the approach on the popular IoT operating system RIOT for two target platforms of different manufacturers and evaluate its performance in static and dynamic scenarios on real devices. We demonstrate the potential of ScaleClock by designing a platform-independent dynamic voltage and frequency scaling (DVFS) mechanism that enables RIOT to autonomously adapt the hardware performance to requirements of the software currently executed. In a use case study, we manage to boost energy efficiency of constrained network communication by reducing the MCU consumption by 40 % at negligible performance impact.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134574598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ChirpBox: An Infrastructure-Less LoRa Testbed ChirpBox:无基础设施的LoRa测试平台
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2021-02-17 DOI: 10.5555/3451271.3451282
Pei Tian, Xiaoyuan Ma, Carlo Alberto Boano, Ye Liu, Fengxu Yang, Xin Tian, Dan Li, Jianming Wei
{"title":"ChirpBox: An Infrastructure-Less LoRa Testbed","authors":"Pei Tian, Xiaoyuan Ma, Carlo Alberto Boano, Ye Liu, Fengxu Yang, Xin Tian, Dan Li, Jianming Wei","doi":"10.5555/3451271.3451282","DOIUrl":"https://doi.org/10.5555/3451271.3451282","url":null,"abstract":"A key obstacle hindering the development of large-scale LoRa testbeds outdoors is the common lack of a backbone infrastructure allowing to easily communicate with the nodes and supply them with power. As a result, many LoRa instal-lations are just deployed indoors or only support a handful outdoor devices, which does not allow proper testing. In this paper, we present ChirpBox, an infrastructure-less low-cost testbed in which the LoRa nodes are used not only to run experiments, but also to orchestrate all operations, including the dissemination of firmwares and the collection of log traces. We achieve this, among others, by developing an all-to-all multi-channel protocol based on concurrent transmissions that allows an efficient communication over multi-hop LoRa networks. After presenting ChirpBox’s design and implementation, we deploy a test installation to evaluate its performance experimentally and showcase its operations.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116858088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hermes: Decentralized Dynamic Spectrum Access System for Massive Devices Deployment in 5G Hermes:面向5G海量设备部署的分散动态频谱接入系统
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2021-01-08 DOI: 10.5555/3451271.3451273
Zhihui Gao, Ang Li, Yunfan Gao, Yu Wang, Yiran Chen
{"title":"Hermes: Decentralized Dynamic Spectrum Access System for Massive Devices Deployment in 5G","authors":"Zhihui Gao, Ang Li, Yunfan Gao, Yu Wang, Yiran Chen","doi":"10.5555/3451271.3451273","DOIUrl":"https://doi.org/10.5555/3451271.3451273","url":null,"abstract":"With the incoming 5G network, the ubiquitous Internet of Things (IoT) devices can benefit our daily life, such as smart cameras, drones, etc. With the introduction of the millimeter-wave band and the thriving number of IoT devices, it is critical to design new dynamic spectrum access (DSA) system to coordinate the spectrum allocation across massive devices in 5G. In this paper, we present Hermes, the first decentralized DSA system for massive devices deployment. Specifically, we propose an efficient multi-agent reinforcement learning algorithm and introduce a novel shuffle mechanism, addressing the drawbacks of collision and fairness in existing decentralized systems. We implement Hermes in 5G network via simulations. Extensive evaluations show that Hermes significantly reduces collisions and improves fairness compared to the state-of-the-art decentralized methods. Furthermore, Hermes is able to adapt the environmental changes within 0.5 seconds, showing its deployment practicability in dynamic environment of 5G.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
6TiSCH++ with Bluetooth 5 and Concurrent Transmissions 6TiSCH++与蓝牙5和并发传输
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2020-10-19 DOI: 10.5555/3451271.3451274
Michael Baddeley, Adnan Aijaz, Usman Raza, Aleksandar Stanoev, Yichao Jin, Markus Schuss, C. Boano, G. Oikonomou
{"title":"6TiSCH++ with Bluetooth 5 and Concurrent Transmissions","authors":"Michael Baddeley, Adnan Aijaz, Usman Raza, Aleksandar Stanoev, Yichao Jin, Markus Schuss, C. Boano, G. Oikonomou","doi":"10.5555/3451271.3451274","DOIUrl":"https://doi.org/10.5555/3451271.3451274","url":null,"abstract":"Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power mesh networks. Yet, despite an overwhelming body of literature covering both centralized and distributed scheduling schemes for 6TiSCH, an effective control solution for large-scale multi-hop mesh networks remains an open challenge. This paper addresses this with a novel approach that eliminates much of the routing and link-layer overhead incurred by centralized schedulers, and provides a robust mechanism for data dissemination synchronization within 6TiSCH. Specifically, we leverage the physical layer (PHY) switching capabilities of modern low-power wireless platforms to build on recent work demonstrating the viability of Concurrent Transmission (CT)-based flooding protocols across the Bluetooth 5 (BT 5) PHYs. By switching the PHY and MAC layer at runtime, we inject a BT 5-based CT flood within a standard IEEE 802.15.4 TSCH slotframe, thereby providing a reliable, low-latency scheme for 6TiSCH control messaging. We present an analytical model and experimental evaluation showing how our solution not only exploits the BT 5 high data-rate PHY layers for rapid data dissemination, but can also provide reliable 6TiSCH association and synchronization even under external radio interference. We further discuss how the proposed technique can be used to address other open challenges within the standard.","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Automated Pollen Detection with an Affordable Technology 一种经济实惠的自动花粉检测技术
European Conference/Workshop on Wireless Sensor Networks Pub Date : 2020-02-19 DOI: 10.5555/3400306.3400320
Nam Cao, Matthias Meyer, L. Thiele, O. Saukh
{"title":"Automated Pollen Detection with an Affordable Technology","authors":"Nam Cao, Matthias Meyer, L. Thiele, O. Saukh","doi":"10.5555/3400306.3400320","DOIUrl":"https://doi.org/10.5555/3400306.3400320","url":null,"abstract":"","PeriodicalId":443547,"journal":{"name":"European Conference/Workshop on Wireless Sensor Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信