Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2015

Reducing simulation runtime in wireless sensor networks: A simulation framework to reduce wsn simulation runtime by using multiple simultaneous instances

Autores
Pinto, P; Pinto, AA; Ricardo, M;

Publicação
Handbook of Research on Computational Simulation and Modeling in Engineering

Abstract
Wireless Sensor Networks (WSNs) can be deployed using available hardware and software. The Contiki is an operative system compatible with a wide range of WSN hardware. A Contiki development environment named InstantContiki is also available and includes the Cooja simulator, useful to test WSN simulation scenarios prior to their deployment. Cooja can provide realistic results since it uses the full Contiki's source code and some motes can be emulated at the hardware level. However this implies extending the simulation runtime, which is heightened since the Cooja is single threaded, i.e, it makes use of a single core per instant of time, not taking advantage of the current multi-core processors. This chapter presents a framework to automate the configuration and execution of Cooja simulations. When a multi-core processor is available, this framework runs multiple simultaneous Cooja instances to reduce simulations runtime in exchange of higher CPU load and RAM usage.

2015

Reducing WSN Simulation Runtime by using Multiple Simultaneous Instances

Autores
Pinto, P; Pinto, A; Ricardo, M;

Publicação
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2014 (ICNAAM-2014)

Abstract
WSN can be deployed using widely available hardware and software solutions. The Contiki is an open source operative system compatible with a wide range of WSN hardware. A Contiki development environment named InstantContiki is also available and includes the Cooja simulation tool, useful for the simulation of WSN scenarios, prior to their deployment. This simulation tool can provide realistic results since it uses the full Contiki's source code and some motes can be emulated at the hardware level. However, the Cooja simulator uses one process per simulation, not taking advantage of multiple core processors. In this paper we propose a framework to automate the execution of simulations of multiple scenarios and configurations in Cooja. When a multiple cores processor is available, this framework can run multiple simultaneous Cooja instances, taking advantage of processing resources and contributing to reduce the total simulation runtime.

2015

Cross-Layer Admission Control to Enhance the Support of Real-Time Applications in WSN

Autores
Pinto, P; Pinto, A; Ricardo, M;

Publicação
IEEE SENSORS JOURNAL

Abstract
Real-time monitoring applications may be used in a wireless sensor network (WSN) and may generate packet flows with strict quality of service requirements in terms of delay, jitter, or packet loss. When strict delays are imposed from source to destination, the packets must be delivered at the destination within an end-to-end delay (EED) hard limit in order to be considered useful. Since the WSN nodes are scarce both in processing and energy resources, it is desirable that they only transport useful data, as this contributes to enhance the overall network performance and to improve energy efficiency. In this paper, we propose a novel cross-layer admission control (CLAC) mechanism to enhance the network performance and increase energy efficiency of a WSN, by avoiding the transmission of potentially useless packets. The CLAC mechanism uses an estimation technique to preview packets EED, and decides to forward a packet only if it is expected to meet the EED deadline defined by the application, dropping it otherwise. The results obtained show that CLAC enhances the network performance by increasing the useful packet delivery ratio in high network loads and improves the energy efficiency in every network load.

2015

A Framework for the Secure Storage of Data Generated in the IoT

Autores
Costa, R; Pinto, A;

Publicação
Ambient Intelligence - Software and Applications - 6th International Symposium on Ambient Intelligence, ISAmI 2015, Salamanca, Spain, June 3-5, 2015.

Abstract
The Internet of Things can be seen has a growing number of things that inter-operate using an Internet-based infrastructure and that has evolved during the last years with little concern for the privacy of its users, especially regarding how the collected data is stored. Technological measures ensuring users privacy must be established. In this paper we will present a technological framework for the secure storage of data. Things can then interact with the framework's API much in the same way they now interact with its current servers, after which, the framework will performthe required operations in order to secure the data before storing it. Themethods adopted for the secure storage will maintain the sharing ability, conveniently allowing authorized access to other users, the initial user's terms (e.g. data anonymity) and the ability to revoke assigned privileges at all times. © Springer International Publishing Switzerland 2015.

2015

Uncoordinated Frequency Hopping for Secrecy with Broadband Jammers and Eavesdroppers

Autores
Sousa, JS; Vilela, JP;

Publicação
2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)

Abstract
Uncoordinated Frequency Hopping (UFH) has been proposed as a mechanism to address denial-of-service attacks, and consists of legitimate devices hopping uniformly at random between frequencies to cope with an attacker that aims to disrupt communication. We consider the use of UFH against an eavesdropper adversary that aims to overhear as much information as possible. We characterize the secrecy level of wireless networks under UFH, showing the harmful security effect of broadband eavesdropper adversaries capable of overhearing in multiple frequencies. To counter such eavesdroppers, we consider the use of broadband friendly jammers that are available to cause interference on eavesdroppers. Our results show that adding a limited number of broadband friendly jammers effectively improves the security level of such systems.

2015

Uncoordinated Frequency Hopping for secrecy with broadband jammers and eavesdroppers

Autores
Sousa, JS; Vilela, JP;

Publicação
IEEE International Conference on Communications

Abstract
Uncoordinated Frequency Hopping (UFH) has been proposed as a mechanism to address denial-of-service attacks, and consists of legitimate devices hopping uniformly at random between frequencies to cope with an attacker that aims to disrupt communication. We consider the use of UFH against an eavesdropper adversary that aims to overhear as much information as possible. We characterize the secrecy level of wireless networks under UFH, showing the harmful security effect of broadband eavesdropper adversaries capable of overhearing in multiple frequencies. To counter such eavesdroppers, we consider the use of broadband friendly jammers that are available to cause interference on eavesdroppers. Our results show that adding a limited number of broadband friendly jammers effectively improves the security level of such systems. © 2015 IEEE.

  • 109
  • 202