Refine
Document Type
- Conference Proceeding (8)
- Part of a Book (2)
- Article (1)
Is part of the Bibliography
- yes (11)
Keywords
Institute
- Fakultät IuI (10)
The Internet of Things (IoT) relies on sensor devices to measure real-world phenomena in order to provide IoT services. The sensor readings are shared with multiple entities, such as IoT services, other IoT devices or other third parties. The collected data may be sensitive and include personal information. To protect the privacy of the users, the data needs to be protected through an encryption algorithm. For sharing cryptographic cipher-texts with a group of users Attribute-Based Encryption (ABE) is well suited, as it does not require to create group keys. However, the creation of ABE cipher-texts is slow when executed on resource constraint devices, such as IoT sensors. In this paper, we present a modification of an ABE scheme, which not only allows to encrypt data efficiently using ABE, but also reduces the size of the cipher-text, that must be transmitted by the sensor. We also show how our modification can be used to realise an instantaneous key revocation mechanism.
The wide distribution of smart phones allows to inform and interact with citizens in real-time, thus enabling the vision of smart cities. However, the reliability of smart city applications highly depends on the availability of appropriate, accurate, and trustworthy data. To increase the reliability of smart city applications, the European project CityPulse employs knowledge-based methods for monitoring and testing at all stages of the data stream processing and interpretation pipeline. During design-time testing validates the behaviour of applications with regard to different levels of quality of information. During run-time monitoring assesses the reliability of data streams, the plausibility of information, and the correct evaluation of extracted events. The monitored quality is exploited by fault recovery and conflict resolution mechanisms to ensure fault-tolerant execution of applications.
Reliable information processing is an indispensable task in Smart City environments. Heterogeneous sensor infrastructures of individual information providers and data portal vendors tend to offer a hardly revisable information quality. This paper proposes a correlation model-based monitoring approach to evaluate the plausibility of smart city data sources. The model is based on spatial, temporal, and domain dependent correlations between individual data sources. A set of freely available datasets is used to evaluate the monitoring component and show the challenges of different spatial and temporal resolutions.
he development of context-aware applications is a difficult and error-prone task. The dynamics of the environmental context combined with the complexity of the applications poses a vast number of possibilities for mistakes during the creation of new applications. Therefore it is important to test applications before they are deployed in a life system. For this reason, this paper proposes a testing tool, which will allow for automatic generation of various test cases from application description documents. Semantic annotations are used to create specific test data for context-aware applications. A test case reduction methodology based on test case diversity investigations ensures scalability of the proposed automated testing approach.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with real, physical entities. These entities are devices of different categories and range in size from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires expert knowledge in order for them to work within the limited resources. That means to find a suitable configuration for the algorithms to perform properly on the device. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are captured in security policies, but they do not consider resource availability on the involved device and their consumption while executing security algorithms. This paper presents a resource aware information exchange model and a generation tool that uses high-level security policies as input. The model forms the conceptual basis for an automated security configuration recommendation system.
Long Range Wide Area Network (LoRaWAN) operates in the ISM band with 868 MHz, where the Time on Air (ToA) is regulated in the EU to 1 %. LoRaWAN nodes use the Adaptive Data Rate (ADR) algorithm to adapt their data rates during operation. The standard ADR algorithm works well with stationary nodes, however is very slow in the adaptation for mobile nodes. This paper introduces a new ADR algorithm for LoRaWAN that is supported by higher level meta-data for sensor streams, namely Quality of Information (QoI). With the help of QoI it is possible to provide additional information to the new ADR algorithm, reducing the convergence time and thus improving the Packet Delivery Ratio (PDR) of data from mobile sensor nodes. The new algorithm requires only modifications on network server side and keeps backwards compatibility with LoRaWAN nodes. Results show a significant better PDR compared to the standard ADR in scenarios with a limited number of mobile nodes.
AI as a service
(2023)