Pub Date : 2016-11-08DOI: 10.5220/0004305600050015
Y. Georgalis, Yuzuru Tanaka, N. Spyratos, C. Stephanidis
This paper leverages previous work on the concept of smart object federations and proposes a new dynamic programming language for implementing and simulating smart objects and their interactions. Following their description in the proposed programming language, smart objects can be fully simulated and used for describing ambient intelligence scenarios. In this context, the contributions of the paper are two-fold: (a) the introduction of a new programming language whose runtime semantics allows for a simple and effective description of smart objects, and (b) the description of meaningful interaction strategies, that are implemented in the proposed language, through which executable smart object federations can be used for simulating and implementing ambient intelligence scenarios.
{"title":"Programming Smart Object Federations for Simulating and Implementing Ambient Intelligence Scenarios","authors":"Y. Georgalis, Yuzuru Tanaka, N. Spyratos, C. Stephanidis","doi":"10.5220/0004305600050015","DOIUrl":"https://doi.org/10.5220/0004305600050015","url":null,"abstract":"This paper leverages previous work on the concept of smart object federations and proposes a new dynamic programming language for implementing and simulating smart objects and their interactions. Following their description in the proposed programming language, smart objects can be fully simulated and used for describing ambient intelligence scenarios. In this context, the contributions of the paper are two-fold: (a) the introduction of a new programming language whose runtime semantics allows for a simple and effective description of smart objects, and (b) the description of meaningful interaction strategies, that are implemented in the proposed language, through which executable smart object federations can be used for simulating and implementing ambient intelligence scenarios.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123803075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005998701100115
E. Jang, A. Kim, Sang-Hyebo Kim, H. Yu, J. Sohn
In biomedical engineering application, mental/physical health monitoring using biosensors has been lately noticed because bio-signal acquisition by non-invasive sensors is relatively simple as well as bio-signal is less sensitive to social/cultural difference. In particular, although it is known that they are significantly correlated with human emotional state, whether the signals by various emotions are stable remains unknown. In this study, we examined the consistency of physiological responses induced by six basic emotions, happiness, sadness, anger, fear, disgust and surprise using an experiment that was repeated 10 times. Twelve college subjects participated in this experiment. For emotion induction, sixty different emotional stimuli were selected in a pilot experiment. Heart Rate (HR), Skin Conductance Level (SCL), mean of Skin Temperature (meanSKT), and mean of Photoplethysmograph (meanPPG) were measured before the presentation of stimuli as a baseline and during the presentation of the stimuli as emotional state. The results showed that physiological responses during emotional states for the 10 times the experiment was repeated were stable and consistent compared to the baseline. In particular, we could identify that physiological features such as SCL, HR, and PPG are very reliable. Our results suggest that bio-signals by six emotions are consistent over time regardless of various stimuli. This means that physiological responses are reliable and biosensors are useful tool for emotion recognition.
{"title":"Internal Consistency of Physiological Responses during Exposure to Emotional Stimuli using Biosensors","authors":"E. Jang, A. Kim, Sang-Hyebo Kim, H. Yu, J. Sohn","doi":"10.5220/0005998701100115","DOIUrl":"https://doi.org/10.5220/0005998701100115","url":null,"abstract":"In biomedical engineering application, mental/physical health monitoring using biosensors has been lately noticed because bio-signal acquisition by non-invasive sensors is relatively simple as well as bio-signal is less sensitive to social/cultural difference. In particular, although it is known that they are significantly correlated with human emotional state, whether the signals by various emotions are stable remains unknown. In this study, we examined the consistency of physiological responses induced by six basic emotions, happiness, sadness, anger, fear, disgust and surprise using an experiment that was repeated 10 times. Twelve college subjects participated in this experiment. For emotion induction, sixty different emotional stimuli were selected in a pilot experiment. Heart Rate (HR), Skin Conductance Level (SCL), mean of Skin Temperature (meanSKT), and mean of Photoplethysmograph (meanPPG) were measured before the presentation of stimuli as a baseline and during the presentation of the stimuli as emotional state. The results showed that physiological responses during emotional states for the 10 times the experiment was repeated were stable and consistent compared to the baseline. In particular, we could identify that physiological features such as SCL, HR, and PPG are very reliable. Our results suggest that bio-signals by six emotions are consistent over time regardless of various stimuli. This means that physiological responses are reliable and biosensors are useful tool for emotion recognition.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115731975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005953700400051
Armen Dzhagaryan, A. Milenković
The importance of optimizing data transfers between mobile computing devices and the cloud is increasing with an exponential growth of mobile data traffic. Lossless data compression can be essential in increasing communication throughput, reducing communication latency, achieving energy-efficient communication, and making effective use of available storage. In this paper we introduce analytical models for estimating effective throughput and energy efficiency of uncompressed data transfers and compressed data transfers that utilize common compression utilities. The proposed analytical models are experimentally verified using state-of-the-art mobile devices. These models are instrumental in developing a framework for seamless optimization of data file transfers.
{"title":"Analytical Models for Evaluating Effectiveness of Compressed File Transfers in Mobile Computing","authors":"Armen Dzhagaryan, A. Milenković","doi":"10.5220/0005953700400051","DOIUrl":"https://doi.org/10.5220/0005953700400051","url":null,"abstract":"The importance of optimizing data transfers between mobile computing devices and the cloud is increasing with an exponential growth of mobile data traffic. Lossless data compression can be essential in increasing communication throughput, reducing communication latency, achieving energy-efficient communication, and making effective use of available storage. In this paper we introduce analytical models for estimating effective throughput and energy efficiency of uncompressed data transfers and compressed data transfers that utilize common compression utilities. The proposed analytical models are experimentally verified using state-of-the-art mobile devices. These models are instrumental in developing a framework for seamless optimization of data file transfers.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115218361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005950800280039
Armen Dzhagaryan, A. Milenković, Mladen Milošević, E. Jovanov
Mobile devices such as smartphones, tablets, and e-readers have become the dominant type of computing platforms. Energy-efficiency has become a key design and operating requirement for applications running on mobile devices. It is further underscored by a growing reliance of consumers on services delivered through mobile devices and their growing complexity and sophistication. A detailed measurement-based characterization of energy needs of mobile applications is important for both device manufacturers and application developers, as it may identify energy-demanding activities and guide optimizations. In this paper, we describe an environment for automated energy measurements of applications running on Android mobile devices. We discuss hardware and software aspects of the environment and several approaches to runtime capturing and timestamping of activities of interest. Finally, we demonstrate the use of the environment in several case studies conducted on Googleâs Nexus 4 smartphone.
{"title":"An Environment for Automated Measuring of Energy Consumed by Android Mobile Devices","authors":"Armen Dzhagaryan, A. Milenković, Mladen Milošević, E. Jovanov","doi":"10.5220/0005950800280039","DOIUrl":"https://doi.org/10.5220/0005950800280039","url":null,"abstract":"Mobile devices such as smartphones, tablets, and e-readers have become the dominant type of computing platforms. Energy-efficiency has become a key design and operating requirement for applications running on mobile devices. It is further underscored by a growing reliance of consumers on services delivered through mobile devices and their growing complexity and sophistication. A detailed measurement-based characterization of energy needs of mobile applications is important for both device manufacturers and application developers, as it may identify energy-demanding activities and guide optimizations. In this paper, we describe an environment for automated energy measurements of applications running on Android mobile devices. We discuss hardware and software aspects of the environment and several approaches to runtime capturing and timestamping of activities of interest. Finally, we demonstrate the use of the environment in several case studies conducted on Googleâs Nexus 4 smartphone.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130523377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005997700700075
Ralph Weissnegger, M. Pistauer, Christian Kreiner, Markus Schuss, K. Römer, C. Steger
The increasing amount of new assistance features in todayâs vehicles to ensure safe and reliable operations, imply increasingly complex systems. Since millions of test kilometers have to be driven to ensure a reliable system, simulation-based verification is becoming more important to reduce costs and time-to-market. Furthermore requirements, design and verification have to follow the stringent specifications from standards such as ISO26262 for functional safety. To overcome the complexity issues of safety-critical systems, a modelbased approach helps to unites all stakeholder, and helps non safety specialists to understand problems in the design. In this paper, we present a novel methodology to automatically generate testbenches for simulation based verification from a first safety analysis. Through early simulation with constraint random stimuli and parameters we are able to derive further requirements for real-time applications. Furthermore, these testbenches can be used through the whole safety-lifecycle. Our approach allows a tight and seamless integration of requirements, design and verification into the safety-lifecycle of ISO26262.
{"title":"Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML","authors":"Ralph Weissnegger, M. Pistauer, Christian Kreiner, Markus Schuss, K. Römer, C. Steger","doi":"10.5220/0005997700700075","DOIUrl":"https://doi.org/10.5220/0005997700700075","url":null,"abstract":"The increasing amount of new assistance features in todayâs vehicles to ensure safe and reliable operations, \u0000 \u0000imply increasingly complex systems. Since millions of test kilometers have to be driven to ensure a reliable \u0000 \u0000system, simulation-based verification is becoming more important to reduce costs and time-to-market. Furthermore \u0000 \u0000requirements, design and verification have to follow the stringent specifications from standards such \u0000 \u0000as ISO26262 for functional safety. To overcome the complexity issues of safety-critical systems, a modelbased \u0000 \u0000approach helps to unites all stakeholder, and helps non safety specialists to understand problems in the \u0000 \u0000design. In this paper, we present a novel methodology to automatically generate testbenches for simulation \u0000 \u0000based verification from a first safety analysis. Through early simulation with constraint random stimuli and \u0000 \u0000parameters we are able to derive further requirements for real-time applications. Furthermore, these testbenches \u0000 \u0000can be used through the whole safety-lifecycle. Our approach allows a tight and seamless integration \u0000 \u0000of requirements, design and verification into the safety-lifecycle of ISO26262.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0006007100760084
Sumeyye Konak, Fulya Turan, M. Shoaib, Özlem Durmaz Incel
With their integrated sensors, wrist-worn devices, such as smart watches, provide an ideal platform for human activity recognition. Particularly, the inertial sensors, such as accelerometer and gyroscope can efficiently capture the wrist and arm movements of the users. In this paper, we investigate the use of accelerometer sensor for recognizing thirteen different activities. Particularly, we analyse how different sets of features extracted from acceleration readings perform in activity recognition. We categorize the set of features into three classes: motion related features, orientation-related features and rotation-related features and we analyse the recognition performance using motion, orientation and rotation information both alone and in combination. We utilize a dataset collected from 10 participants and use different classification algorithms in the analysis. The results show that using orientation features achieve the highest accuracies when used alone and in combination with other sensors. Moreover, using only raw acceleration performs slightly better than using linear acceleration and similar compared with gyroscope.
{"title":"Feature Engineering for Activity Recognition from Wrist-worn Motion Sensors","authors":"Sumeyye Konak, Fulya Turan, M. Shoaib, Özlem Durmaz Incel","doi":"10.5220/0006007100760084","DOIUrl":"https://doi.org/10.5220/0006007100760084","url":null,"abstract":"With their integrated sensors, wrist-worn devices, such as smart watches, provide an ideal platform for human \u0000 \u0000activity recognition. Particularly, the inertial sensors, such as accelerometer and gyroscope can efficiently capture \u0000 \u0000the wrist and arm movements of the users. In this paper, we investigate the use of accelerometer sensor for \u0000 \u0000recognizing thirteen different activities. Particularly, we analyse how different sets of features extracted from \u0000 \u0000acceleration readings perform in activity recognition. We categorize the set of features into three classes: motion \u0000 \u0000related features, orientation-related features and rotation-related features and we analyse the recognition \u0000 \u0000performance using motion, orientation and rotation information both alone and in combination. We utilize a \u0000 \u0000dataset collected from 10 participants and use different classification algorithms in the analysis. The results \u0000 \u0000show that using orientation features achieve the highest accuracies when used alone and in combination with \u0000 \u0000other sensors. Moreover, using only raw acceleration performs slightly better than using linear acceleration \u0000 \u0000and similar compared with gyroscope.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"121 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114004786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005938300170027
D. Christmann, T. Braun, Markus Engel, R. Gotzhein
Distributed real-time systems present a particular challenge, because two key problems have to be solved during their development: First, deployed protocols must provide deterministic behavior to enable a predictable outcome. Second, the implementations of the protocols have to be in compliance with the stringent timing constraints stated by the protocols to ensure that their runtime behavior remains deterministic. This, particularly, requires an adequate isolation of time-critical protocols from less preferential applications installed on the same node. In this paper, we present the protocol framework BiPS, which tackles these challenges for wireless sensor networks and Imote 2 hardware platforms. Besides summarizing the various MAC protocols â both best effort and real-time-capable protocols â and operating system functionalities provided by BiPS, this paper presents comparative evaluations with TinyOS, a state-of-the-practice operating system for wireless sensor networks, and the real-time operating system RIOT. The results show that protocols realized with BiPS outperforms these solutions w.r.t. predictability of execution times, thereby providing evidence of the advantages of BiPS for real-time systems.
{"title":"BiPS - A Real-time-capable Protocol Framework for Wireless Sensor Networks","authors":"D. Christmann, T. Braun, Markus Engel, R. Gotzhein","doi":"10.5220/0005938300170027","DOIUrl":"https://doi.org/10.5220/0005938300170027","url":null,"abstract":"Distributed real-time systems present a particular challenge, because two key problems have to be solved during \u0000 \u0000their development: First, deployed protocols must provide deterministic behavior to enable a predictable \u0000 \u0000outcome. Second, the implementations of the protocols have to be in compliance with the stringent timing \u0000 \u0000constraints stated by the protocols to ensure that their runtime behavior remains deterministic. This, particularly, \u0000 \u0000requires an adequate isolation of time-critical protocols from less preferential applications installed on \u0000 \u0000the same node. In this paper, we present the protocol framework BiPS, which tackles these challenges for \u0000 \u0000wireless sensor networks and Imote 2 hardware platforms. Besides summarizing the various MAC protocols \u0000 \u0000â both best effort and real-time-capable protocols â and operating system functionalities provided by BiPS, \u0000 \u0000this paper presents comparative evaluations with TinyOS, a state-of-the-practice operating system for wireless \u0000 \u0000sensor networks, and the real-time operating system RIOT. The results show that protocols realized with \u0000 \u0000BiPS outperforms these solutions w.r.t. predictability of execution times, thereby providing evidence of the \u0000 \u0000advantages of BiPS for real-time systems.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005938500630069
A. C. Marcén, J. Carro, V. Monasterio
Nocturnal agitation is one of the symptoms exhibited by dementia patients. Diagnosing and monitoring the evolution of agitation is difficult because patient monitoring requires a doctor, nurse or caregiver observing patients for extended periods of time. In this work, we propose to use an automatic monitoring system based on wearable technology that complements the caregiverâs work. The proposed system uses a wrist wearable device to record agitation data, which are subsequently classified through machine learning techniques as quantifiable indexes of nocturnal agitation. Preliminary tests performed with volunteers showed that the classification of recorded movements between nocturnal agitation or quiet periods was successful in 78.86% of the cases. This proof of concept demonstrates the feasibility of using wearable technology to monitor nocturnal agitation.
{"title":"Wearable Monitoring for the Detection of Nocturnal Agitation in Dementia","authors":"A. C. Marcén, J. Carro, V. Monasterio","doi":"10.5220/0005938500630069","DOIUrl":"https://doi.org/10.5220/0005938500630069","url":null,"abstract":"Nocturnal agitation is one of the symptoms exhibited by dementia patients. Diagnosing and monitoring the \u0000 \u0000evolution of agitation is difficult because patient monitoring requires a doctor, nurse or caregiver observing \u0000 \u0000patients for extended periods of time. In this work, we propose to use an automatic monitoring system based \u0000 \u0000on wearable technology that complements the caregiverâs work. The proposed system uses a wrist wearable \u0000 \u0000device to record agitation data, which are subsequently classified through machine learning techniques as \u0000 \u0000quantifiable indexes of nocturnal agitation. Preliminary tests performed with volunteers showed that the classification \u0000 \u0000of recorded movements between nocturnal agitation or quiet periods was successful in 78.86% of the \u0000 \u0000cases. This proof of concept demonstrates the feasibility of using wearable technology to monitor nocturnal \u0000 \u0000agitation.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005932800990104
A. Ahrens, C. Lange, C. Benavente-Peces
The energy demand of telecommunication equipment and networks has been identified to be significant. In the information society such networks are vital for societal and economic welfare as well as for the peopleâs private lives. Therefore an improved energy efficiency of telecommunication networks is essential in the context of sustainability and climate change. Load-adaptive regimes are a promising option for energy-efficient and sustainable network operation. As the capacity is adapted to temporally fluctuating traffic demands, they require a robust traffic demand estimation. As a potential solution to mitigate this problem, a method for reliable traffic demand forecasting on relevant time scales using Wiener filtering is presented. The results show that the capacity dimensioning based on the proposed Wiener filtering traffic estimation method leads to reliable outcomes enabling sustainable and efficient network operation.
{"title":"Traffic Estimation for Dynamic Capacity Adaptation in Load Adaptive Network Operation Regimes","authors":"A. Ahrens, C. Lange, C. Benavente-Peces","doi":"10.5220/0005932800990104","DOIUrl":"https://doi.org/10.5220/0005932800990104","url":null,"abstract":"The energy demand of telecommunication equipment and networks has been identified to be significant. In the \u0000 \u0000information society such networks are vital for societal and economic welfare as well as for the peopleâs private \u0000 \u0000lives. Therefore an improved energy efficiency of telecommunication networks is essential in the context of \u0000 \u0000sustainability and climate change. Load-adaptive regimes are a promising option for energy-efficient and \u0000 \u0000sustainable network operation. As the capacity is adapted to temporally fluctuating traffic demands, they \u0000 \u0000require a robust traffic demand estimation. As a potential solution to mitigate this problem, a method for \u0000 \u0000reliable traffic demand forecasting on relevant time scales using Wiener filtering is presented. The results \u0000 \u0000show that the capacity dimensioning based on the proposed Wiener filtering traffic estimation method leads to \u0000 \u0000reliable outcomes enabling sustainable and efficient network operation.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129168131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-25DOI: 10.5220/0005930000550062
Firoz Ahmed, Young-Bae Ko
To design a routing protocol for Low-power and Lossy Networks (LLNs), the IETF developed RPL (Routing Protocol for Low-power and lossy network) which is novel, standard and light weight routing protocol standardized for constrained environment and does not have the functionality like of traditional routing protocols. Providing security in RPL is still challenging as the devices are connected to the vulnerable Internet, limited resources, and the communication links are lossy. Therefore, an attacker can easily exploit the functionalities of RPL protocol. RPL exposed to a variety of attacks. One of the most inconsistency topological attacks is DODAG version number attack. In this paper, we proposed a distributed and cooperative verification mechanism to securely defend against the DODAG version number attack with low control overhead and high reliability. Simulation results show that the proposed approach defends DODAG version number attack reliably and reduces control overhead significantly.
为了设计一种适合低功耗和有损网络的路由协议,IETF开发了RPL (routing protocol for Low-power and Lossy network,低功耗和有损网络路由协议),它是一种新颖、标准、轻量级的路由协议,是为约束环境标准化的,不具有传统路由协议的功能。在RPL中提供安全性仍然具有挑战性,因为设备连接到脆弱的Internet,资源有限,并且通信链路是有损的。因此,攻击者可以很容易地利用RPL协议的功能。RPL暴露于各种攻击之下。最不一致的拓扑攻击之一是DODAG版本号攻击。本文提出了一种低控制开销、高可靠性的分布式协作验证机制,以安全防御DODAG版本号攻击。仿真结果表明,该方法可靠地防御了DODAG版本号攻击,显著降低了控制开销。
{"title":"A Distributed and Cooperative Verification Mechanism to Defend against DODAG Version Number Attack in RPL","authors":"Firoz Ahmed, Young-Bae Ko","doi":"10.5220/0005930000550062","DOIUrl":"https://doi.org/10.5220/0005930000550062","url":null,"abstract":"To design a routing protocol for Low-power and Lossy Networks (LLNs), the IETF developed RPL (Routing Protocol for Low-power and lossy network) which is novel, standard and light weight routing protocol standardized for constrained environment and does not have the functionality like of traditional routing protocols. Providing security in RPL is still challenging as the devices are connected to the vulnerable Internet, limited resources, and the communication links are lossy. Therefore, an attacker can easily exploit the functionalities of RPL protocol. RPL exposed to a variety of attacks. One of the most inconsistency topological attacks is DODAG version number attack. In this paper, we proposed a distributed and cooperative verification mechanism to securely defend against the DODAG version number attack with low control overhead and high reliability. Simulation results show that the proposed approach defends DODAG version number attack reliably and reduces control overhead significantly.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}