Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887664
L. Schenato, Nicola Fabbian, G. D. Santa, P. Simonini, F. D. Polo, Giacomo Tedesco, G. Marcato, S. Cola
In this work, we present the application of optical fiber sensors to monitor and characterize the soil temperature of river embankments. The soil temperature represents an indicator of possible seepage flows that may hamper the stability of the structure and can be used to characterize the hydraulic behavior of the embankment. Optical fiber sensors represent, to date, the only viable technology capable of measuring the temperature with the required spatial resolution in this kind of application.
{"title":"Distributed optical fiber sensors for the soil temperature measurement in river embankments","authors":"L. Schenato, Nicola Fabbian, G. D. Santa, P. Simonini, F. D. Polo, Giacomo Tedesco, G. Marcato, S. Cola","doi":"10.1109/MN55117.2022.9887664","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887664","url":null,"abstract":"In this work, we present the application of optical fiber sensors to monitor and characterize the soil temperature of river embankments. The soil temperature represents an indicator of possible seepage flows that may hamper the stability of the structure and can be used to characterize the hydraulic behavior of the embankment. Optical fiber sensors represent, to date, the only viable technology capable of measuring the temperature with the required spatial resolution in this kind of application.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121049331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887643
Alessandro Brighente, M. Conti, Gulshan Kumar, Reza Ghanbari, R. Saha
Distributed Ledger Technology (DLT) is one of the most promising technology at present with applications in different domains, such as Cyber-Physical Systems (CPS) and Internet of Thing (IoT). IOTA is an example of Directed Acyclic Graph (DAG)-based DLTs applicable to IoT, addressing the issues of scalability, consensus complexity, and mining incentives of blockchains. In order to join the network and to later disseminate fresh information, nodes exploit IOTA's autopeering module. The security of this module is hence of fundamental importance for the network liveness, however this requirement has never been analyzed in the literature. In this paper, we provide the first security analysis of the autopeering module of the Coordicide, IOTA's main framework. We divide the contribution in two parts: i) we show that the peer-discovery process in the autopeering module is vulnerable to flooding attack, a type of Denial of Service (DoS), and ii) we propose Time Constrained Identity Match (TID), a novel protocol to mitigate the flooding attack. In particular, we compare two implementations of TID: leaky-TID based on leaky bucket, and token-Tid based on token bucket. We discuss their suitability to IOTA both in terms of effectiveness in mitigating the flooding attack and in terms of resource consumption (memory and CPU). Based on the results, we observe that leaky-TID shows the better performance in preventing flooding attacks, reducing the traffic under attack by 67% and reducing memory consumption by 12.5%.
{"title":"Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering","authors":"Alessandro Brighente, M. Conti, Gulshan Kumar, Reza Ghanbari, R. Saha","doi":"10.1109/MN55117.2022.9887643","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887643","url":null,"abstract":"Distributed Ledger Technology (DLT) is one of the most promising technology at present with applications in different domains, such as Cyber-Physical Systems (CPS) and Internet of Thing (IoT). IOTA is an example of Directed Acyclic Graph (DAG)-based DLTs applicable to IoT, addressing the issues of scalability, consensus complexity, and mining incentives of blockchains. In order to join the network and to later disseminate fresh information, nodes exploit IOTA's autopeering module. The security of this module is hence of fundamental importance for the network liveness, however this requirement has never been analyzed in the literature. In this paper, we provide the first security analysis of the autopeering module of the Coordicide, IOTA's main framework. We divide the contribution in two parts: i) we show that the peer-discovery process in the autopeering module is vulnerable to flooding attack, a type of Denial of Service (DoS), and ii) we propose Time Constrained Identity Match (TID), a novel protocol to mitigate the flooding attack. In particular, we compare two implementations of TID: leaky-TID based on leaky bucket, and token-Tid based on token bucket. We discuss their suitability to IOTA both in terms of effectiveness in mitigating the flooding attack and in terms of resource consumption (memory and CPU). Based on the results, we observe that leaky-TID shows the better performance in preventing flooding attacks, reducing the traffic under attack by 67% and reducing memory consumption by 12.5%.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130646738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887767
P. Ferrari, P. Bellagente, A. Depari, D. F. Carvalho, A. Flammini, M. Pasetti, S. Rinaldi, E. Sisinni
The LoRa-REP is transparent enhancement of LoRa W Anthat can effectively handle emergency transmissions caused by important, but sporadic, events. LoRa-REP is designed to shorten the average latency and reduce emergency communication failure probability using a message replication approach, suitable for Internet-of- Things (loT) applications. A hardware implementation and a proof-of-concept scenario are realized, together with a simulator. Previous experiments demonstrate feasibility, while scalability is shown being somehow limited especially if short transaction delay are needed. For this reason, this work proposes a comparative analysis of the pre-existing LoRa-REP scalability and, for the first time, customizes standards slotted delay strategies to the specific LoRA-REP scenarios. The simulation considers up to 10 co-located LoRa-REP nodes and as much as 1000 standard LoRa W Annodes. The results show that the proposed LoRa-REP with slotted delay can scale, maintain compatibility with standard LoRa Wanbackend and, at the same time, optimize average performance (up to 10%). Moreover, the simulations can be used to obtain the set of parameters of LoRa-REP with slotted delay that match goals of each application.
LoRa- rep是LoRa W - an的透明增强,可以有效地处理由重要但零星的事件引起的紧急传输。LoRa-REP旨在利用消息复制方法缩短平均延迟并降低紧急通信失败概率,适用于物联网(loT)应用。实现了硬件实现和概念验证场景,以及模拟器。先前的实验证明了可行性,但可扩展性在一定程度上受到限制,特别是在需要短事务延迟的情况下。出于这个原因,本研究提出了对现有的LoRa-REP可扩展性的比较分析,并首次针对特定的LoRa-REP场景定制了标准槽延迟策略。该模拟考虑多达10个共存的LoRa- rep节点和多达1000个标准LoRa W节点。结果表明,提出的带槽延迟的LoRa- rep可以扩展,保持与标准LoRa Wanbackend的兼容性,同时优化平均性能(高达10%)。此外,通过仿真可以得到符合各应用目标的有槽延迟的LoRa-REP参数集。
{"title":"Improving LoRa-REP scalability in emergency scenarios by means of slotted delay","authors":"P. Ferrari, P. Bellagente, A. Depari, D. F. Carvalho, A. Flammini, M. Pasetti, S. Rinaldi, E. Sisinni","doi":"10.1109/MN55117.2022.9887767","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887767","url":null,"abstract":"The LoRa-REP is transparent enhancement of LoRa W Anthat can effectively handle emergency transmissions caused by important, but sporadic, events. LoRa-REP is designed to shorten the average latency and reduce emergency communication failure probability using a message replication approach, suitable for Internet-of- Things (loT) applications. A hardware implementation and a proof-of-concept scenario are realized, together with a simulator. Previous experiments demonstrate feasibility, while scalability is shown being somehow limited especially if short transaction delay are needed. For this reason, this work proposes a comparative analysis of the pre-existing LoRa-REP scalability and, for the first time, customizes standards slotted delay strategies to the specific LoRA-REP scenarios. The simulation considers up to 10 co-located LoRa-REP nodes and as much as 1000 standard LoRa W Annodes. The results show that the proposed LoRa-REP with slotted delay can scale, maintain compatibility with standard LoRa Wanbackend and, at the same time, optimize average performance (up to 10%). Moreover, the simulations can be used to obtain the set of parameters of LoRa-REP with slotted delay that match goals of each application.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121687519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887721
Paolo Caruso, Domenico Di Caro, S. D. Iacono, V. Paciello
In recent years, a growing necessity of monitoring facilities like gas or water pipelines has raised to ensure high security and proper maintenance of the infrastructures. In particular, in piping systems, there is the need to monitor the cathodic protection voltage, whose presence allows to protect the pipeline from corrosive effects and avoid damage to the system. The state of protection of the pipes also needs to be communicated outside of the measurement point. Unfortunately, most pipelines are located in places where creating a wireless communication network is very expensive. An innovative and unconventional way to achieve this goal is to use the pipelines as a communication channel, avoiding installing dedicated data communication systems. Starting from the authors' background, in this paper, an opamp-based circuit is presented and adopted for the information transfer over gas pipelines. A characterization of the presented circuit is made to find the relationship between the reflection coefficient and the impedance connected to a specific port of the circulator. Measured the pipeline input impedance and knowing the theory about the transmission lines, the output impedance of the circulator is adjusted to obtain the impedance matching with the line to have a complete transmission of the signal on the gas pipeline. In the last section of the paper, the effective improvement of the communication channel obtained by inserting the circulator in the communication link is shown. The final aim is to transmit a certain number of bytes with a private communication protocol, in order to avoid informatic attacks and to improve the cyber-security level.
{"title":"Impedance Adaptation Technique to Improve Pipeline Communication Distance","authors":"Paolo Caruso, Domenico Di Caro, S. D. Iacono, V. Paciello","doi":"10.1109/MN55117.2022.9887721","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887721","url":null,"abstract":"In recent years, a growing necessity of monitoring facilities like gas or water pipelines has raised to ensure high security and proper maintenance of the infrastructures. In particular, in piping systems, there is the need to monitor the cathodic protection voltage, whose presence allows to protect the pipeline from corrosive effects and avoid damage to the system. The state of protection of the pipes also needs to be communicated outside of the measurement point. Unfortunately, most pipelines are located in places where creating a wireless communication network is very expensive. An innovative and unconventional way to achieve this goal is to use the pipelines as a communication channel, avoiding installing dedicated data communication systems. Starting from the authors' background, in this paper, an opamp-based circuit is presented and adopted for the information transfer over gas pipelines. A characterization of the presented circuit is made to find the relationship between the reflection coefficient and the impedance connected to a specific port of the circulator. Measured the pipeline input impedance and knowing the theory about the transmission lines, the output impedance of the circulator is adjusted to obtain the impedance matching with the line to have a complete transmission of the signal on the gas pipeline. In the last section of the paper, the effective improvement of the communication channel obtained by inserting the circulator in the communication link is shown. The final aim is to transmit a certain number of bytes with a private communication protocol, in order to avoid informatic attacks and to improve the cyber-security level.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126455657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887739
J. Pereira, A. Espírito-Santo
IEEE 1451 standard has the properties required by smart transducers networks as defined by the cyber-physical System, Industrial Internet of Things and Industry 4.0 concepts. The open-access online platform designs and validates IEEE 1451 compliant transducers. Users can create, edit, and manage Transducer Electronic Data Sheets stored in a database. The solution presented generates automatically project templates for low-power microcontrollers MSP430. The transducer is evaluated and tested, observing the packages of messages exchanged between the Transducer Interface Module and the Network-Capable Application Processor.
{"title":"Open Access Online Platform for Transducers Development Conforming the IEEE 1451","authors":"J. Pereira, A. Espírito-Santo","doi":"10.1109/MN55117.2022.9887739","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887739","url":null,"abstract":"IEEE 1451 standard has the properties required by smart transducers networks as defined by the cyber-physical System, Industrial Internet of Things and Industry 4.0 concepts. The open-access online platform designs and validates IEEE 1451 compliant transducers. Users can create, edit, and manage Transducer Electronic Data Sheets stored in a database. The solution presented generates automatically project templates for low-power microcontrollers MSP430. The transducer is evaluated and tested, observing the packages of messages exchanged between the Transducer Interface Module and the Network-Capable Application Processor.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887768
L. Ferrigno, F. Milano, Valentina Pingerna, G. Cerro, M. Laracca
The localization task in sensor networks is partic-ularly critical whenever the sensor measurements are position-related, as in case of thermal and electromagnetic quantities. The deployment of a sensor network often requires the usage of low-cost devices able to achieve acceptable measurement accuracy and having the need to retrieve fast and accurate positioning information. In such networks, the localization task is generally performed by a special node coordinating the network. Nevertheless, its computing power is often limited. To this aim, in this paper we compare two different positioning techniques (least square minimization, grid search), to be applied in Ultra- Wide-Band positioning scheme, from the accuracy point of view and computing time required for accomplishing the task. They differ in working principle, needed a priori information, localization resolution and time to completion parameter. According to the available resources, the adoption of one of them should be prefer-able to the other one. Obtained results prove the goodness of both methods, specifically ranking them by application purposes. The paper is intended to give the designers an extensive analysis to evaluate pros and cons to adopt a completely blind positioning technique, namely the least square minimization, versus a more informed and constrained system, as the grid search case.
{"title":"Performance comparison in Ultra Wide Band positioning in sensor networks: least square minimization versus grid search approach","authors":"L. Ferrigno, F. Milano, Valentina Pingerna, G. Cerro, M. Laracca","doi":"10.1109/MN55117.2022.9887768","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887768","url":null,"abstract":"The localization task in sensor networks is partic-ularly critical whenever the sensor measurements are position-related, as in case of thermal and electromagnetic quantities. The deployment of a sensor network often requires the usage of low-cost devices able to achieve acceptable measurement accuracy and having the need to retrieve fast and accurate positioning information. In such networks, the localization task is generally performed by a special node coordinating the network. Nevertheless, its computing power is often limited. To this aim, in this paper we compare two different positioning techniques (least square minimization, grid search), to be applied in Ultra- Wide-Band positioning scheme, from the accuracy point of view and computing time required for accomplishing the task. They differ in working principle, needed a priori information, localization resolution and time to completion parameter. According to the available resources, the adoption of one of them should be prefer-able to the other one. Obtained results prove the goodness of both methods, specifically ranking them by application purposes. The paper is intended to give the designers an extensive analysis to evaluate pros and cons to adopt a completely blind positioning technique, namely the least square minimization, versus a more informed and constrained system, as the grid search case.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887744
Luis Garcia, G. Bartlett, Srivatsan Ravi, Harun Ibrahim, W. Hardaker, Erik Kline
Machine learning is increasingly applied to network traffic analysis to aid in tasks such as quality of service management, trend monitoring, and security. Recent advances in deep learning have enabled not only the classification of encrypted transits, but classification on a per-packet level. End-to-end deep learning models are becoming increasingly ubiq-uitous given their ease of use, i.e., developers do not need to engineer features, and their apparent versatility. However, deep learning entails black-box models that hinder the capability to debug and explain classifications. Moreover, the computational complexity of deep learning can incur unnecessary latency, which is problematic for real-time classification needs. In this paper, we propose a methodology to interpret black-box, deep learning-based encrypted network traffic classification models, with an attempt to understand the dominant features a classifier is focusing on for a given task. We evaluate our approach on state-of-the-art deep learning classification techniques for encrypted per-packet classification and demonstrate how interpretability can be used to debug and improve the training pipeline while significantly reducing the size of the deep learning model. We propose future directions toward optimizing model performance while maintaining explainability.
{"title":"Explaining Deep Learning Models for Per-packet Encrypted Network Traffic Classification","authors":"Luis Garcia, G. Bartlett, Srivatsan Ravi, Harun Ibrahim, W. Hardaker, Erik Kline","doi":"10.1109/MN55117.2022.9887744","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887744","url":null,"abstract":"Machine learning is increasingly applied to network traffic analysis to aid in tasks such as quality of service management, trend monitoring, and security. Recent advances in deep learning have enabled not only the classification of encrypted transits, but classification on a per-packet level. End-to-end deep learning models are becoming increasingly ubiq-uitous given their ease of use, i.e., developers do not need to engineer features, and their apparent versatility. However, deep learning entails black-box models that hinder the capability to debug and explain classifications. Moreover, the computational complexity of deep learning can incur unnecessary latency, which is problematic for real-time classification needs. In this paper, we propose a methodology to interpret black-box, deep learning-based encrypted network traffic classification models, with an attempt to understand the dominant features a classifier is focusing on for a given task. We evaluate our approach on state-of-the-art deep learning classification techniques for encrypted per-packet classification and demonstrate how interpretability can be used to debug and improve the training pipeline while significantly reducing the size of the deep learning model. We propose future directions toward optimizing model performance while maintaining explainability.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887712
Gabriele Di Renzone, G. Giorgi, A. Pozzebon
In this paper, we propose a hybrid LoRaWAN/GPS solution for the tracking of athletes performing outdoor sport activities. The combination of the two technologies has the main purpose of optimizing power consumption by limiting GPS usage and providing a continuous people tracking even in case of GPS-denied areas, for example when walking through woods and forests. In this case, GPS is replaced by LoRaWAN connectivity which, besides acting merely as a data transmission technology, thus sending the user's position to a remote server, is also used to estimate such position. To this aim, different localization techniques are evaluated, testing a simple technique based on preliminary area mapping and presenting a data fusion technique to improve the positioning accuracy. To demonstrate the feasibility of the proposed approach, a prototypical tracker was set up, integrating a GPS module with a LoRa transceiver. Then, field tests were performed correlating the positions along a pre-defined path, acquired by means of a GPS module, with the Received Signal Strength Indication (RSSI) values related to the LoRaWAN transmission. Acquired values suggest the usability of these parameters to estimate the user's position in case of lack of GPS coverage.
{"title":"Outdoor sports tracking by means of hybrid GPS-LoRaWAN localization","authors":"Gabriele Di Renzone, G. Giorgi, A. Pozzebon","doi":"10.1109/MN55117.2022.9887712","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887712","url":null,"abstract":"In this paper, we propose a hybrid LoRaWAN/GPS solution for the tracking of athletes performing outdoor sport activities. The combination of the two technologies has the main purpose of optimizing power consumption by limiting GPS usage and providing a continuous people tracking even in case of GPS-denied areas, for example when walking through woods and forests. In this case, GPS is replaced by LoRaWAN connectivity which, besides acting merely as a data transmission technology, thus sending the user's position to a remote server, is also used to estimate such position. To this aim, different localization techniques are evaluated, testing a simple technique based on preliminary area mapping and presenting a data fusion technique to improve the positioning accuracy. To demonstrate the feasibility of the proposed approach, a prototypical tracker was set up, integrating a GPS module with a LoRa transceiver. Then, field tests were performed correlating the positions along a pre-defined path, acquired by means of a GPS module, with the Received Signal Strength Indication (RSSI) values related to the LoRaWAN transmission. Acquired values suggest the usability of these parameters to estimate the user's position in case of lack of GPS coverage.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887655
Michael Rethfeldt, T. Brockmann, Richard Eckhardt, Benjamin Beichler, Lukas Steffen, C. Haubelt, D. Timmermann
Mesh networks based on the wireless local area network (WLAN) technology, as specified by the standards amendment IEEE 802.11s, provide for a flexible and low-cost interconnection of devices and embedded systems for various use cases. To assess the real-world performance of WLAN mesh networks and potential optimization strategies, suitable testbeds and measurement tools are required. Designed for highly automated transport-layer throughput and latency measurements, the software FLExible Network Tester (Flent) is a promising candidate. However, so far Flent does not integrate information specific to IEEE 802.11s networks, such as peer link status data or mesh routing metrics. Consequently, we propose Flent extensions that allow to additionally capture IEEE 802.11s information as part of the automated performance tests. For the functional validation of our extensions, we conduct Flent measurements in a mesh mobility scenario using the network emulation framework Mininet-WiFi.
{"title":"Extending the FLExible Network Tester (Flent) for IEEE 802.11s WLAN Mesh Networks","authors":"Michael Rethfeldt, T. Brockmann, Richard Eckhardt, Benjamin Beichler, Lukas Steffen, C. Haubelt, D. Timmermann","doi":"10.1109/MN55117.2022.9887655","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887655","url":null,"abstract":"Mesh networks based on the wireless local area network (WLAN) technology, as specified by the standards amendment IEEE 802.11s, provide for a flexible and low-cost interconnection of devices and embedded systems for various use cases. To assess the real-world performance of WLAN mesh networks and potential optimization strategies, suitable testbeds and measurement tools are required. Designed for highly automated transport-layer throughput and latency measurements, the software FLExible Network Tester (Flent) is a promising candidate. However, so far Flent does not integrate information specific to IEEE 802.11s networks, such as peer link status data or mesh routing metrics. Consequently, we propose Flent extensions that allow to additionally capture IEEE 802.11s information as part of the automated performance tests. For the functional validation of our extensions, we conduct Flent measurements in a mesh mobility scenario using the network emulation framework Mininet-WiFi.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-18DOI: 10.1109/MN55117.2022.9887741
G. Giorgi, A. Pozzebon, C. Narduzzi
LoRaWAN is well suited for the transmission of small amounts of numeric data, while its technical features are not conceived for the continuous real-time monitoring of time-evolving signals. The aim of this paper is to discuss the usability of the Long Range Wide Area Network (LoRaWAN) technology for the continuous transmission of signals characterized by different scales of variability. At the purpose the so-called burst-mode acquisition is considered and analyzed for a LoraWAN infrastructure. Furthermore, a very simple messaging protocol is introduced to increase data throughput, by allowing application-level messages to be sent using the same data message, avoiding extra overload. To demonstrate this approach, the paper focuses on possible techniques to perform a long-term monitoring of the electrocardiographic (ECG) signal over a LoRaWAN communication infrastructure where duty cycle induced constraints are carefully considered. The analysis of real signals proves the feasibility of the proposed system, which can be easily generalized for other kind of signals.
{"title":"Waveform monitoring with LoRaWAN: Is it feasible?","authors":"G. Giorgi, A. Pozzebon, C. Narduzzi","doi":"10.1109/MN55117.2022.9887741","DOIUrl":"https://doi.org/10.1109/MN55117.2022.9887741","url":null,"abstract":"LoRaWAN is well suited for the transmission of small amounts of numeric data, while its technical features are not conceived for the continuous real-time monitoring of time-evolving signals. The aim of this paper is to discuss the usability of the Long Range Wide Area Network (LoRaWAN) technology for the continuous transmission of signals characterized by different scales of variability. At the purpose the so-called burst-mode acquisition is considered and analyzed for a LoraWAN infrastructure. Furthermore, a very simple messaging protocol is introduced to increase data throughput, by allowing application-level messages to be sent using the same data message, avoiding extra overload. To demonstrate this approach, the paper focuses on possible techniques to perform a long-term monitoring of the electrocardiographic (ECG) signal over a LoRaWAN communication infrastructure where duty cycle induced constraints are carefully considered. The analysis of real signals proves the feasibility of the proposed system, which can be easily generalized for other kind of signals.","PeriodicalId":148281,"journal":{"name":"2022 IEEE International Symposium on Measurements & Networking (M&N)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}