Eingereichte Fassung
Refine
Document Type
Has Fulltext
- yes (3)
Is part of the Bibliography
- yes (3)
Keywords
Institute
- Fakultät IuI (2)
The wide distribution of smart phones allows to inform and interact with citizens in real-time, thus enabling the vision of smart cities. However, the reliability of smart city applications highly depends on the availability of appropriate, accurate, and trustworthy data. To increase the reliability of smart city applications, the European project CityPulse employs knowledge-based methods for monitoring and testing at all stages of the data stream processing and interpretation pipeline. During design-time testing validates the behaviour of applications with regard to different levels of quality of information. During run-time monitoring assesses the reliability of data streams, the plausibility of information, and the correct evaluation of extracted events. The monitored quality is exploited by fault recovery and conflict resolution mechanisms to ensure fault-tolerant execution of applications.
High Performance and Privacy for Distributed Energy Management: Introducing PrivADE+ and PPPM
(2018)
Distributed Energy Management (DEM) will play a vital role in future smart grids. An important and often
overlooked factor in this concept is privacy. This paper presents two privacy-preserving DEM algorithms
called PrivADE+ and PPPM. PrivADE+ uses a round-based energy management procedure for switchable and
dynamically adaptable loads. PPPM utilises on the market-based PowerMatcher approach. Both algorithms
apply homomorphic encryption to privately gather aggregated data and exchange commands. Simulations
show that PrivADE+ and PPPM achieve good energy management quality with low communication requirements
and without negative influences on robustness.
The Internet of Things (IoT) is the enabler for new innovations in several domains. It allows the connection of digital services with physical entities in the real world. These entities are devices of different categories and sizes range from large machinery to tiny sensors. In the latter case, devices are typically characterized by limited resources in terms of computational power, available memory and sometimes limited power supply. As a consequence, the use of security algorithms requires of them to work within the limited resources. This means to find a suitable implementation and configuration for a security algorithm, that performs properly on the device, which may become a challenging task. On the other side, there is the desire to protect valuable assets as strong as possible. Usually, security goals are recorded in security policies, but they do not consider resource availability on the involved device and its power consumption while executing security algorithms. This paper presents an IoT security configuration tool that helps the designer of an IoT environment to experiment with the trade-off between maximizing security and extending the lifetime of a resource constrained IoT device. The tool is controlled with high-level description of security goals in the form of policies. It allows the designer to validate various (security) configurations for a single IoT device up to a large sensor network.