43 research outputs found

    An Animation Framework for Improving the Comprehension of TinyOS Programs

    Get PDF
    To meet the increasing demand for monitoring of the physical world, there has been an increase in the development of wireless sensor network applications. The TinyOS platform has emerged as a de facto standard for developing these applications. The platform offers a number of advantages, with its support for concurrency, power-efficient operation, and resource-constrained hardware chief among them. However, the benefits come at a price. Even without the TinyOS platform, the inherent parallel and distributed nature of these applications makes it difficult for developers to reason about program behavior. Further, the TinyOS programming model adopts asynchronous, split-phase execution semantics. Developers must explicitly manage program control state across event-handlers, components, and devices. This makes the design, debugging, and comprehension of these programs even more difficult. In this work, we describe an animation framework for TinyOS programs, designed to enhance the comprehension of their runtime behavior. The framework enables application developers to specify, in the form of an XML configuration file, the runtime elements to be captured within a given system and the manner in which those elements should be displayed. The resulting visualization presents an animated play-back sequence of the events that occurred during execution. The framework also provides a visual representation that connects causally-related events in a distributed network. We describe the design and implementation of the animation framework and present an analysis of the runtime overhead it introduces

    Review of Open Source Simulators in ICS/IIoT Security Context

    Get PDF
    In industrial control systems (ICS), simulation has found widespread use during system design and in tuning process control parameters or exploring the effects of new control algorithms. Simulation enables the assessment of performance at scale and allows research to be conducted by those with limited access to real physical infrastructures. However, as ICSs are often no longer isolated from other networks and the internet, hence are subject to security and safety issues, simulation is also required to understand the issues and their solution. To foster transparent, collaborative and cost-effective studies, demonstrations, and solution development, and attract the broadest interest base, simulation is indeed critical and Open Source is a good way to go since simulators in this category are less expensive to access, install, and use, and can be run with general purpose (non-proprietary) computing equipment and setups. Findings This research presents the following key findings: 1. A lot of Open Source simulation tools exist and span applications areas such as communications and sensor networks (C&WSNs), ICS/SCADA, and IIoT. 2. The functional structures and characteristics that appear common in Open Source simulators include: supported licence types, programming languages, operating systems platforms, user interface types, and available documentation and types. 3. Typical research around Open Source simulators is built around modelling, analysis and optimisation of operations in relations to factors such as flexibility, mobility, scalability, and active user support. No single Open Source simulator addresses all conceivable characteristics. While some are strong in specific contexts relative to their development, they are often weak in other purpose-based research capabilities, especially in the context of IoT. 4. Most of the reviewed Open Source tools are not designed to address security contexts. The few that address security such as SCADASim only consider very limited contexts such as testing and evaluating Denial-of-Service (DoS), Man-in-the-middle (Mitm), Eavesdropping, and Spoofing attacks. Recommendations The following key recommendations are presented: 1. Future developments of Open Source simulators (especially for IIoT) should explore the potential for functionalities that can enable the integration of diverse simulators and platforms to achieve an encompassing setup. 2. Developers should explore the capabilities of generic simulators towards achieving architectures with expansible capabilities into multi-class domains, support easier and faster modelling of complex systems, and which can attract varied users and contributors. 3. Functional characteristics such as; ease of use, degree of community acceptance and use, and suitability for industrial applications, should also be considered as selection and development criteria, and to emphasise simulator effectiveness. This can support consistency, credibility, and simulation system relevance within a domain that is continually evolving. 4. Future Open Source simulation projects developments should consider and adopt the more common structural attributes including; Platform Type, Open Source Licence Type, Programming Language, User Interfaces, Documentation, and Communication Types. These should be further complemented by appropriate editorial controls spanning quality coding, revision control and effective project disseminations and management, to boost simulation tool credibility and wide acceptance. 5. The range of publication dates (earliest to latest) for: citations, code commits, and number of contributors associated to Open Source simulator projects can also support the decision for interests and adoption of specific Open Source projects. 6. Research objectives for ICS/IIoT Open Source simulators should also include security performance and optimisation with considerations towards enhancing confidentiality, integrity and availability. 7. Further studies should explore the evaluation of security topics which could be addressed by simulation – more specifically, proposing how this may be achieved and identifying what can't be addressed by simulation. Investigations into simulation frameworks that can allow multi-mode simulations to be configured and operated are also required. Research into Industry 4.0 System-of-Systems (SoS) security evaluations, dependency, and cascading impacts method or analysis is another area of importanc

    Situation-aware Edge Computing

    Get PDF
    Future wireless networks must cope with an increasing amount of data that needs to be transmitted to or from mobile devices. Furthermore, novel applications, e.g., augmented reality games or autonomous driving, require low latency and high bandwidth at the same time. To address these challenges, the paradigm of edge computing has been proposed. It brings computing closer to the users and takes advantage of the capabilities of telecommunication infrastructures, e.g., cellular base stations or wireless access points, but also of end user devices such as smartphones, wearables, and embedded systems. However, edge computing introduces its own challenges, e.g., economic and business-related questions or device mobility. Being aware of the current situation, i.e., the domain-specific interpretation of environmental information, makes it possible to develop approaches targeting these challenges. In this thesis, the novel concept of situation-aware edge computing is presented. It is divided into three areas: situation-aware infrastructure edge computing, situation-aware device edge computing, and situation-aware embedded edge computing. Therefore, the concepts of situation and situation-awareness are introduced. Furthermore, challenges are identified for each area, and corresponding solutions are presented. In the area of situation-aware infrastructure edge computing, economic and business-related challenges are addressed, since companies offering services and infrastructure edge computing facilities have to find agreements regarding the prices for allowing others to use them. In the area of situation-aware device edge computing, the main challenge is to find suitable nodes that can execute a service and to predict a node’s connection in the near future. Finally, to enable situation-aware embedded edge computing, two novel programming and data analysis approaches are presented that allow programmers to develop situation-aware applications. To show the feasibility, applicability, and importance of situation-aware edge computing, two case studies are presented. The first case study shows how situation-aware edge computing can provide services for emergency response applications, while the second case study presents an approach where network transitions can be implemented in a situation-aware manner

    Undergraduate and Graduate Course Descriptions, 2013 Summer

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Summer 2013

    Undergraduate and Graduate Course Descriptions, 2013 Summer

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Summer 2013

    Undergraduate and Graduate Course Descriptions, 2007 Winter

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Winter 2007

    Undergraduate and Graduate Course Descriptions, 2017 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2017

    Undergraduate and Graduate Course Descriptions, 2017 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2017

    Undergraduate and Graduate Course Descriptions, 2016 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2016

    Undergraduate and Graduate Course Descriptions, 2007 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2007
    corecore