Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Ricardo Augusto Rodrigues

2020

Tightening Up Security In Low Power Deterministic Networks

Authors
Tiberti, W; Vieira, B; Kurunathan, H; Severino, R; Tovar, E;

Publication
16th IEEE International Conference on Factory Communication Systems, WFCS 2020, Porto, Portugal, April 27-29, 2020

Abstract
The unprecedented pervasiveness of IoT systems is pushing this technology into increasingly stringent domains. Such application scenarios become even more challenging due to the demand for encompassing the interplay between safety and security. The IEEE 802.15.4 DSME MAC behavior aims at addressing such systems by providing additional deterministic, synchronous multi-channel access support. However, despite the several improvements over the previous versions of the protocol, the standard lacks a complete solution to secure communications. In this front, we propose the integration of TAKS, an hybrid cryptography scheme, over a standard DSME network. In this paper, we describe the system architecture for integrating TAKS into DSME with minimum impact to the standard, and we venture into analysing the overhead of having such security solution over application delay and throughput. After a performance analysis, we learn that it is possible to achieve a minor impact of 1% to 14% on top of the expected network delay, depending on the platform used, while still guaranteeing strong security support over the DSME network. © 2020 IEEE.

2020

WiCAR - Simulating Towards the Wireless Car

Authors
Kurunathan, H; Severino, R; Filho, EV; Tovar, E;

Publication
Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops - DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings

Abstract
Advanced driving assistance systems (ADAS) pose stringent requirements to a system’s control and communications, in terms of timeliness and reliability, hence, wireless communications have not been seriously considered a potential candidate for such deployments. However, recent developments in these technologies are supporting unprecedented levels of reliability and predictability. This can enable a new generation of ADAS systems with increased flexibility and the possibility of retrofitting older vehicles. However, to effectively test and validate these systems, there is a need for tools that can support the simulation of these complex communication infrastructures from the control and the networking perspective. This paper introduces a co-simulation framework that enables the simulation of an ADAS application scenario in these two fronts, analyzing the relationship between different vehicle dynamics and the delay required for the system to operate safely, exploring the performance limits of different wireless network configurations. © 2020, Springer Nature Switzerland AG.

2020

Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems

Authors
Li, K; Ni, W; Emami, Y; Shen, Y; Severino, R; Pereira, D; Tovar, E;

Publication
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS

Abstract
In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates control messages to the vehicles that follow. Securing wireless transmissions of the messages between the vehicles is critical for privacy and confidentiality of the platoon's driving pattern. However, due to the broadcast nature of radio channels, the transmissions are vulnerable to eavesdropping. In this article, we propose a cooperative secret key agreement (CoopKey) scheme for encrypting/decrypting the control messages, where the vehicles in PVCPS generate a unified secret key based on the quantized fading channel randomness. Channel quantization intervals are optimized by dynamic programming to minimize the mismatch of keys. A platooning testbed is built with autonomous robotic vehicles, where a TelosB wireless node is used for onboard data processing and multi-hop dissemination. Extensive real-world experiments demonstrate that CoopKey achieves significantly low secret bit mismatch rate in a variety of settings. Moreover, the standard NIST test suite is employed to verify randomness of the generated keys, where the p-values of our CoopKey pass all the randomness tests. We also evaluate CoopKey with an extended platoon size via simulations to investigate the effect of system scalability on performance.

2016

POSTER ABSTRACT: Towards Worst-Case Bounds Analysis of the IEEE 802.15.4e

Authors
Kurunathan, H; Severino, R; Koubaa, A; Tovar, E;

Publication
2016 IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS)

Abstract

2016

A cross-layer QoS management framework for ZigBee cluster-tree networks

Authors
Severino, R; Ullah, S; Tovar, E;

Publication
TELECOMMUNICATION SYSTEMS

Abstract
Wireless sensor networks show great potential to successfully address the timeliness and energy-efficiency requirements of different cyber-physical system applications. Generally, these requirements span several layers of the stack and demand an on-line mechanism capable of efficiently tuning several parameters, in order to better support highly dynamic traffic characteristics. This work presents a cross-layer QoS management framework for ZigBee cluster-tree networks. The proposed framework carries out an on-line control of a set of parameters ranging from the MAC sub-layer to the network layer, improving the successful transmission probability and minimizing the memory requirements and queuing delays through an efficient bandwidth allocation at the network clusters. Through extensive simulations in a real datacenter monitoring application scenario, we show that the proposed framework improves the successful transmission probability by 10%, and reduces the end-to-end delay by 94%.

2017

Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e

Authors
Kurunathan, H; Severino, R; Koubaa, A; Tovar, E;

Publication
IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS

Abstract
With an advancement towards the paradigm of Internet of Things (IoT), in which every device will be interconnected and communicating with each other, the field of wireless sensor networks has helped to resolve an ever-growing demand in meeting deadlines and reducing power consumption. Among several standards that provide support for IoT, the recently published IEEE 802.15.4e protocol is specifically designed to meet the QoS requirements of industrial applications. IEEE 802.15.4e provides five Medium-Access Control (MAC) behaviors, including three that target time-critical applications: Deterministic and Synchronous Multichannel Extension (DSME); Time Slotted Channel Hopping (TSCH) and Low Latency Deterministic Network (LLDN). However, the standard and the literature do not provide any worst-case bound analysis of these behaviors, thus it is not possible to effectively predict their timing performance in an application and accurately devise a network in accordance to such constraints. This paper fills this gap by contributing network models for the three time-critical MAC behaviors using Network Calculus. These models allow deriving the worst-case performance of the MAC behaviors in terms of delay and buffering requirements. We then complement these results by carrying out a thorough performance analysis of these MAC behaviors by observing the impact of different parameters. © 2017 IEEE.

  • 2
  • 4