Refine
Document Type
- Conference Proceeding (18)
- Article (1)
- Part of a Book (1)
Has Fulltext
- yes (20) (remove)
Is part of the Bibliography
- yes (20)
Keywords
Institute
- Fakultät IuI (19)
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with real, physical entities. These entities are devices of different categories and range in size from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires expert knowledge in order for them to work within the limited resources. That means to find a suitable configuration for the algorithms to perform properly on the device. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are captured in security policies, but they do not consider resource availability on the involved device and their consumption while executing security algorithms. This paper presents a resource aware information exchange model and a generation tool that uses high-level security policies as input. The model forms the conceptual basis for an automated security configuration recommendation system.
Process modeling languages help to define and execute processes and workflows. The Business Process Model and Notation (BPMN) 2.0 is used for business processes in commercial areas such as banks, shops, production and supply industry. Due to its flexible notation, BPMN is increasingly being used in non-traditional business process domains like Internet of Things (IoT) and agriculture. However, BPMN does not fit well to scenarios taking place in environments featuring limited, delayed, intermittent or broken connectivity. Communication just exists for BPMN - characteristics of message transfers, their priorities and connectivity parameters are not part of the model. No backup mechanism for communication issues exists, resulting in error-prone and failing processes. This paper introduces resilient BPMN (rBPMN), a valid BPMN extension for process modeling in unreliable communication environments. The meta model addition of opportunistic message flows with Quality of Service (QoS) parameters and connectivity characteristics allows to verify and enhance process robustness at design time. Modeling of explicit or implicit, decision-based alternatives ensures optimal process operation even when connectivity issues occur. In case of no connectivity, locally moved functionality guarantees stable process operation. Evaluation using an agricultural slurry application showed significant robustness enhancements and prevented process failures due to communication issues.
The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information. To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suited, as it does not require to create group keys. However, the creation of ABE cipher-texts is slow when executed on resource constraint devices, such as IoT sensors. In this paper, we present a modification of an ABE scheme, which not only allows to encrypt data efficiently using ABE, but also reduces the size of the cipher-text, that must be transmitted by the sensor. We also show how our modification can be used to realise an instantaneous key revocation mechanism.
High Performance and Privacy for Distributed Energy Management: Introducing PrivADE+ and PPPM
(2018)
Distributed Energy Management (DEM) will play a vital role in future smart grids. An important and often
overlooked factor in this concept is privacy. This paper presents two privacy-preserving DEM algorithms
called PrivADE+ and PPPM. PrivADE+ uses a round-based energy management procedure for switchable and
dynamically adaptable loads. PPPM utilises on the market-based PowerMatcher approach. Both algorithms
apply homomorphic encryption to privately gather aggregated data and exchange commands. Simulations
show that PrivADE+ and PPPM achieve good energy management quality with low communication requirements
and without negative influences on robustness.
In der Agrartechnik steht Landwirten und Lohnunternehmern eine steigende Anzahl digitaler Dienste zur Verfügung. Eine Modellierung, Ausführung und Steuerung von kooperativen Agrarprozessen ist aufgrund der verschiedenen, zueinander inkompatiblen IT-Lösungen nur eingeschränkt möglich. Es fehlt ein einheitlicher Standard zur Beschreibung dieser Prozesse. Der Beitrag stellt die Beschreibung von Agrarprozessen mit der Business Process Model and Notation (BPMN) dar. Domänenexperten (z.B. Landwirte, Lohnunternehmer, digitale Dienstanbieter) können kooperative Prozessabläufe plattformübergreifend gestalten, ohne dabei Prozessinterna mit anderen Akteuren teilen zu müssen. Als Brücke zwischen der kooperativen Prozessebene und der ausführenden Maschinenebene wird im Beitrag Message Queue Telemetry Transport (MQTT) eingesetzt: Mittels MQTT können Anweisungen und Informationen (z.B. Arbeitsaufträge, Statusdaten) zwischen beiden Ebenen in Echtzeit vermittelt und verarbeitet werden.
Die Unterstützung des Maschinenführers auf der Landmaschine durch digitale Dienste nimmt immer stärker zu. Die Darstellungsmöglichkeiten sind jedoch auf die Größe der eingesetzten Terminals beschränkt. Um Sichteinschränkungen aus der Kabine durch zusätzliche Terminals zu vermeiden, ist der Einsatz von Augmented Reality sinnvoll. Hier lassen sich die vorhandenen Informationen statisch oder dynamisch in das Sichtfeld des Landwirts einblenden. Doch erst durch die in diesen Beitrag gezeigte Overlay Darstellungsebene mit integrierten Informationen lässt sich das Potenzial der Augmented Reality vollständig nutzen.
Interpolation of data in smart city architectures is an eminent task for the provision of reliable services. Furthermore, it is a key functionality for information validation between spatiotemporally related sensors. Nevertheless, many existing projects use a simplified geospatial model that does not take the infrastructure, which affects events and effects in the real world, into account. There are various available algorithms for interpolation and the calculation of routes on infrastructure based graphs and distances on geospatial data. This work proposes a combined approach by interconnecting detailed geospatial data whilst regarding the underlying infrastructure model.
The wide distribution of smart phones allows to inform and interact with citizens in real-time, thus enabling the vision of smart cities. However, the reliability of smart city applications highly depends on the availability of appropriate, accurate, and trustworthy data. To increase the reliability of smart city applications, the European project CityPulse employs knowledge-based methods for monitoring and testing at all stages of the data stream processing and interpretation pipeline. During design-time testing validates the behaviour of applications with regard to different levels of quality of information. During run-time monitoring assesses the reliability of data streams, the plausibility of information, and the correct evaluation of extracted events. The monitored quality is exploited by fault recovery and conflict resolution mechanisms to ensure fault-tolerant execution of applications.
Ein modulares Framework zur Modellierung, Konfiguration und Regelung von kooperativen Agrarprozessen
(2016)
Die Komplexität vieler Agrarprozesse nimmt aufgrund von technischem Fortschritt, steigenden rechtlichen Anforderungen und Nachweispflichten beständig zu. Prozessketten werden in Kooperation verschiedener Akteure (Landwirt, Lohnunternehmer, Dienstleister, digitaler Vermittler, Behörde) gemeinsam bearbeitet, dokumentiert und geprüft. Ein ökonomisch und ökologisch ressourceneffizientes Management der Prozessausführung stellt eine Herausforderung für alle Akteure dar. Dynamische Prozessveränderungen führen vielfach zu manuellen Eingriffen in die Prozessregelung, die kostenintensive Verzögerungen verursachen. Das Forschungsvorhaben OPeRAte entwirft und evaluiert neu gestaltete Konzepte und Mechanismen zur durchgehenden Organisation und Regelung kooperativer Agrarprozesse. Es werden konfigurierbare und wiederverwendbare Module identifiziert, die sich an Prozessparameter anpassen und in artverwandten Prozessen erneut verwenden lassen. Das OPeRAte-Framework ermöglicht die Zusammenführung aller beteiligten Akteure und Ressourcen (Maschinen, Sensoren, Aktoren, Endgeräte, Server, Daten, etc.) über offene Schnittstellen. Prozessinhaber sollen durch autonome Prozesskonfigurationen und -adaptionen entlastet und durch Visualisierungen zu effizienten Entscheidungen befähigt werden. Die Konzepte dieses Beitrags dienen als Diskussionsgrundlage zur Formulierung von flexiblen und erweiterbaren Lösungsstrategien für die Landtechnik.