Refine
Year of publication
Document Type
- Conference Proceeding (22)
- Article (2)
- Part of a Book (1)
Is part of the Bibliography
- yes (25)
Keywords
- time synchronization (2)
- 5G (1)
- 802.1AS (1)
- AVB/TSN (1)
- BPMN (1)
- Business Process Modeling (1)
- DMN (1)
- DTNs (1)
- DiffServ (1)
- Distributed Energy Management, Smart Grid, Privacy, Communication Performance, Robustness (1)
Institute
- Fakultät IuI (25) (remove)
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with real, physical entities. These entities are devices of different categories and range in size from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires expert knowledge in order for them to work within the limited resources. That means to find a suitable configuration for the algorithms to perform properly on the device. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are captured in security policies, but they do not consider resource availability on the involved device and their consumption while executing security algorithms. This paper presents a resource aware information exchange model and a generation tool that uses high-level security policies as input. The model forms the conceptual basis for an automated security configuration recommendation system.
The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information. To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suited, as it does not require to create group keys. However, the creation of ABE cipher-texts is slow when executed on resource constraint devices, such as IoT sensors. In this paper, we present a modification of an ABE scheme, which not only allows to encrypt data efficiently using ABE, but also reduces the size of the cipher-text, that must be transmitted by the sensor. We also show how our modification can be used to realise an instantaneous key revocation mechanism.
The 3GPP release 16 integrates TSN functionality into 5G and standardizes various options for TSN time synchronization over 5G such as transparent mode and bridge mode. The time domains for the TSN network and the 5G network are kept separate with an option to synchronize either of the networks to the other. The TSN time synchronization over 5G is possible either by using the IEEE 1588 generalized Precision Time Protocol (gPTP) based on UDP/IP multicast or via IEEE 802.1AS based on Ethernet PDUs. The INET and Simu5G simulation frameworks, which are both based on the OMNeT++ discrete event simulator, are widely used for simulating TSN and 5G networks. The INET framework comprises the 802.1AS based time synchronization mechanism, and Simu5G provides the 5G user plane carrying IP PDUs. We modified the 802.1AS-based synchronization model of INET so that it works over UDP/IP. With that, it is possible to synchronize TSN slaves (connected to 5G UEs), across a 5G network, with a TSN master clock, present within a TSN network, that is connected to the 5G core network. Our simulation results show that 500 microseconds of synchronization accuracy can be achieved with the corrected asymmetric propagation delay of uplink and downlink between the gNodeB (gNB) and the User Equipment (UE). Furthermore, the synchronization accuracy can be improved if the delay difference between uplink and downlink is known.
Recent real-time networking developments have enabled ultra reliability, very low latency and high data rates in wired networks. Wireless networking developments have also shown that they can achieve very high data rates with consistency, but they still lack in providing ultra reliability and extremely low latency. Time Sensitive Networking (TSN) developments have brought these capabilities in Industry automation and Automotive industry too. Although TSN is standardized for wired networks for a long time, for wireless networks it will be standardized within the IEEE 802.11be standard for Wi-Fi and 3GPP Release 17 for 5G in the near future. This paper provides an overview of TSN in wired and wireless networks with the aim of comparing different simulators and presenting their offered functionality and shortcomings. These tools can be used to make oneself familiar with TSN algorithms, standards, and for the development and testing of time sensitive networks. Afterwards, the paper discusses open research questions for using TSN over wireless networks.
Long Range Wide Area Network (LoRaWAN) operates in the ISM band with 868 MHz, where the Time on Air (ToA) is regulated in the EU to 1 %. LoRaWAN nodes use the Adaptive Data Rate (ADR) algorithm to adapt their data rates during operation. The standard ADR algorithm works well with stationary nodes, however is very slow in the adaptation for mobile nodes. This paper introduces a new ADR algorithm for LoRaWAN that is supported by higher level meta-data for sensor streams, namely Quality of Information (QoI). With the help of QoI it is possible to provide additional information to the new ADR algorithm, reducing the convergence time and thus improving the Packet Delivery Ratio (PDR) of data from mobile sensor nodes. The new algorithm requires only modifications on network server side and keeps backwards compatibility with LoRaWAN nodes. Results show a significant better PDR compared to the standard ADR in scenarios with a limited number of mobile nodes.
Analysis of methods for prioritizing critical data transmissions in agricultural vehicular networks
(2020)
Applying wireless communication technologies to agricultural vehicular networks often results in high end-to-end delays and loss of packets due to intermittent or broken connectivity. This paper analyses the methods for the successful delivery of the vehicular data within acceptable delay times. Different kinds of data that are generated and transmitted in agricultural networks are considered in this paper, followed by the data prioritization methods which allow critical data to be prioritized against other data. In this regard, Enhanced Distributed Channel Access, Differentiated Services, and application-based data rate variation are discussed in conjunction with the Simple Network Management Protocol. These techniques are simulated or tested separately and then together and the results show that even in poor network conditions, high-prioritized data is not lost or delayed.
Auf vielen Landmaschinen wird der CAN-Bus zur Übertragung von Daten zwischen Sensoren, Aktoren und Steuergeräten genutzt. Anwendungen wie Rückfahrkameras und Bird-ViewAnzeigen erfordern in der Regel zusätzliche, breitbandige Kommunikationskanäle. Dieser Beitrag untersucht, inwieweit ein gemeinschaftliches Kommunikationsmedium auf Basis von Ethernet zur Realisierung aktueller und zukünftiger Anwendungen auf Landmaschinen genutzt werden kann. Zusätzlich wird der Einsatz aktueller Technologien wie Audio/Video Bridging, Time-Sensitive Networking und Wifi auf einem Landmaschinengespann untersucht und bewertet.
High Performance and Privacy for Distributed Energy Management: Introducing PrivADE+ and PPPM
(2018)
Distributed Energy Management (DEM) will play a vital role in future smart grids. An important and often
overlooked factor in this concept is privacy. This paper presents two privacy-preserving DEM algorithms
called PrivADE+ and PPPM. PrivADE+ uses a round-based energy management procedure for switchable and
dynamically adaptable loads. PPPM utilises on the market-based PowerMatcher approach. Both algorithms
apply homomorphic encryption to privately gather aggregated data and exchange commands. Simulations
show that PrivADE+ and PPPM achieve good energy management quality with low communication requirements
and without negative influences on robustness.
Ein modulares Framework zur Modellierung, Konfiguration und Regelung von kooperativen Agrarprozessen
(2016)
Die Komplexität vieler Agrarprozesse nimmt aufgrund von technischem Fortschritt, steigenden rechtlichen Anforderungen und Nachweispflichten beständig zu. Prozessketten werden in Kooperation verschiedener Akteure (Landwirt, Lohnunternehmer, Dienstleister, digitaler Vermittler, Behörde) gemeinsam bearbeitet, dokumentiert und geprüft. Ein ökonomisch und ökologisch ressourceneffizientes Management der Prozessausführung stellt eine Herausforderung für alle Akteure dar. Dynamische Prozessveränderungen führen vielfach zu manuellen Eingriffen in die Prozessregelung, die kostenintensive Verzögerungen verursachen. Das Forschungsvorhaben OPeRAte entwirft und evaluiert neu gestaltete Konzepte und Mechanismen zur durchgehenden Organisation und Regelung kooperativer Agrarprozesse. Es werden konfigurierbare und wiederverwendbare Module identifiziert, die sich an Prozessparameter anpassen und in artverwandten Prozessen erneut verwenden lassen. Das OPeRAte-Framework ermöglicht die Zusammenführung aller beteiligten Akteure und Ressourcen (Maschinen, Sensoren, Aktoren, Endgeräte, Server, Daten, etc.) über offene Schnittstellen. Prozessinhaber sollen durch autonome Prozesskonfigurationen und -adaptionen entlastet und durch Visualisierungen zu effizienten Entscheidungen befähigt werden. Die Konzepte dieses Beitrags dienen als Diskussionsgrundlage zur Formulierung von flexiblen und erweiterbaren Lösungsstrategien für die Landtechnik.
Der wirtschaftliche Druck in der Landwirtschaft mit weniger Ressourcen höhere Erträge zu erwirtschaften hat zu einer zunehmenden Automatisierung und Industrialisierung agrartechnischer Prozesse geführt. Die Vernetzung von kooperativen Agrarprozessen verfügt über außerordentliches wirtschaftliches Potenzial, birgt aber auch große Gefahren für die Datensicherheit. Daten werden vielfach nicht durch den Dateneigentümer erfasst, sondern von beauftragten Dienstleistern (z.B. von Lohnunternehmen). Bei einer Datenerfassung durch Dienstleister sind Datenzugriffe nicht kontrollierbar und nachträgliche Datenmanipulationen nicht auszuschließen. Datensicherheitslösungen aus anderen Wirtschaftsbereiche lassen sich nur unzureichend auf die Landtechnik übertragen. Dieser Beitrag stellt ein Basiskonzept zur bereichsübergreifenden Datensicherheit in der Landtechnik vor. Das Ziel des Konzeptes ist, die Datenhoheit durch den Eigentümer zu jeder Zeit zu gewährleisten und ausgewählte Prozessdaten manipulationssicher zu dokumentieren.