Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CTM

2014

Security vulnerabilities and risks in industrial usage of wireless communication

Authors
Plosz, S; Farshad, A; Tauber, M; Lesjak, C; Ruprechter, T; Pereira, N;

Publication
19th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2014

Abstract
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain. © 2014 IEEE.

2014

Experiments with a Sensing Platform for High Visibility of the Data Center

Authors
Loureiro, J; Pereira, N; Santos, P; Tovar, E;

Publication
Internet of Things Based on Smart Objects, Technology, Middleware and Applications

Abstract
Data centers are large energy consumers and a substantial portion of this power consumption is due to the control of physical parameters, which bring the need of high efficiency environmental control systems. In this work, we describe a hardware sensing platform specifically tailored to collect physical parameters (temperature, pressure, humidity and power consumption) in large data centers. Our system architecture is composed of Smart Objects, the datacenter racks, that cooperate to contribute for the overall goal of finding opportunities to optimize energy consumption and achieving energy-efficient data centers.We also introduce an analysis of the delay to obtain the sensing data from the sensor network. This analysis provides an insight into the time scales supported by our platform, and also allows to study the delay for different data center topologies. Finally, we exemplify some capabilities of the system with a real deployment. © Springer International Publishing Switzerland 2014.

2014

Poster abstract: A harmony of sensors: Achieving determinism in multi-application sensor networks

Authors
Gupta, V; Tovar, E; Pereira, N; Rajkumar, RR;

Publication
IPSN 2014 - Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (Part of CPS Week)

Abstract
Several concurrent applications running on a sensor network may cause a node to transmit packets at distinct periods, which increases the radio-switching rate and has significant impact in terms of the overall energy consumption. We propose to batch the transmissions together by defining a harmonizing period to align the transmissions from multiple applications at periodic boundaries. This harmonizing period is then leveraged to design a distributed protocol called Network-Harmonized Scheduling (NHS) that coordinates transmissions across nodes and provides real-time guarantees in a multi-hop network. © 2014 IEEE.

2014

SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WIRELESS COMMUNICATION

Authors
Plosz, S; Farshad, A; Tauber, M; Lesjak, C; Ruprechter, T; Pereira, N;

Publication
2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA)

Abstract
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.

2014

Network-Harmonized Scheduling for Multi-Application Sensor Networks

Authors
Gupta, V; Pereira, N; Gaur, S; Tovar, E; Rajkumar, R;

Publication
2014 IEEE 20TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA)

Abstract
Support for multiple concurrent applications is an important enabler for promoting the use of sensor networks as an infrastructure technology, where multiple users can deploy their applications independently. In such a scenario, different applications on a node may transmit packets at distinct periods, causing the node to change from sleep to active state more often, which negatively impacts the energy consumption of the whole network. In this paper, we propose to batch the transmissions together by defining a harmonizing period to align the transmissions from multiple applications at periodic boundaries. This harmonizing period is then leveraged to design a protocol that coordinates the transmissions across nodes and provides real-time guarantees in a multi-hop network. This protocol, which we call Network-Harmonized Scheduling (NHS), takes advantage of the periodicity introduced to assign offsets to nodes at different hop-levels such that collisions are always avoided, and deterministic behavior is enforced. NHS is a light-weight and distributed protocol that does not require any global state-keeping mechanism. We implemented NHS on the Contiki operating system and show how it can achieve a duty-cycle comparable to an ideal TDMA approach.

2014

Dynamic cluster scheduling for cluster-tree WSNs

Authors
Severino, R; Pereira, N; Tovar, E;

Publication
SPRINGERPLUS

Abstract
While Cluster-Tree network topologies look promising for WSN applications with timeliness and energy-efficiency requirements, we are yet to witness its adoption in commercial and academic solutions. One of the arguments that hinder the use of these topologies concerns the lack of flexibility in adapting to changes in the network, such as in traffic flows. This paper presents a solution to enable these networks with the ability to self-adapt their clusters' duty-cycle and scheduling, to provide increased quality of service to multiple traffic flows. Importantly, our approach enables a network to change its cluster scheduling without requiring long inaccessibility times or the re-association of the nodes. We show how to apply our methodology to the case of IEEE 802.15.4/ZigBee cluster-tree WSNs without significant changes to the protocol. Finally, we analyze and demonstrate the validity of our methodology through a comprehensive simulation and experimental validation using commercially available technology on a Structural Health Monitoring application scenario.

  • 200
  • 324