17 research outputs found

    A self-integration testbed for decentralized socio-technical systems

    Get PDF
    The Internet of Things (IoT) comes along with new challenges for experimenting, testing, and operating decentralized socio-technical systems at large-scale. In such systems, autonomous agents interact locally with their users, and remotely with other agents to make intelligent collective choices. Via these interactions they self-regulate the consumption and production of distributed (common) resources, e.g., self-management of traffic flows and power demand in Smart Cities. While such complex systems are often deployed and operated using centralized computing infrastructures, the socio-technical nature of these decentralized systems requires new value-sensitive design paradigms; empowering trust, transparency, and alignment with citizens’ social values, such as privacy preservation, autonomy, and fairness among citizens’ choices. Currently, instruments and tools to study such systems and guide the prototyping process from simulation, to live deployment, and ultimately to a robust operation of a high Technology Readiness Level (TRL) are missing, or not practical in this distributed socio-technical context. This paper bridges this gap by introducing a novel testbed architecture for decentralized socio-technical systems running on IoT. This new architecture is designed for a seamless reusability of (i) application-independent decentralized services by an IoT application, and (ii) different IoT applications by the same decentralized service. This dual self-integration promises IoT applications that are simpler to prototype, and can interoperate with decentralized services during runtime to self-integrate more complex functionality, e.g., data analytics, distributed artificial intelligence. Additionally, such integration provides stronger validation of IoT applications, and improves resource utilization, as computational resources are shared, thus cutting down deployment and operational costs. Pressure and crash tests during continuous operations of several weeks, with more than 80K network joining and leaving of agents, 2.4M parameter changes, and 100M communicated messages, confirm the robustness and practicality of the testbed architecture. This work promises new pathways for managing the prototyping and deployment complexity of decentralized socio-technical systems running on IoT, whose complexity has so far hindered the adoption of value-sensitive self-management approaches in Smart Cities

    Security Risk Management for the Internet of Things

    Get PDF
    In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT systems. Risk assessments for modern IoT systems must be frequent, dynamic and driven by knowledge about both cyber and physical assets. Furthermore, they should be more proactive, more automated, and able to leverage information shared across IoT value chains. This book introduces a set of novel risk assessment techniques and their role in the IoT Security risk management process. Specifically, it presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm. It also highlights machine learning techniques that boost the automation and proactiveness of IoT security risk assessments. Furthermore, blockchain solutions for open and transparent sharing of IoT security information across the supply chain are introduced. Frameworks for privacy awareness, along with technical measures that enable privacy risk assessment and boost GDPR compliance are also presented. Likewise, the book illustrates novel solutions for security certification of IoT systems, along with techniques for IoT security interoperability. In the coming years, IoT security will be a challenging, yet very exciting journey for IoT stakeholders, including security experts, consultants, security research organizations and IoT solution providers. The book provides knowledge and insights about where we stand on this journey. It also attempts to develop a vision for the future and to help readers start their IoT Security efforts on the right foot

    DevOps for Trustworthy Smart IoT Systems

    Get PDF
    ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU. The overall goal of the ENACT project was to provide a novel set of solutions to enable DevOps in the realm of trustworthy Smart IoT Systems. Smart IoT Systems (SIS) are complex systems involving not only sensors but also actuators with control loops distributed all across the IoT, Edge and Cloud infrastructure. Since smart IoT systems typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and adapt to their new environment is decisive to ensure and increase their trustworthiness, quality and user experience. DevOps has established itself as a software development life-cycle model that encourages developers to continuously bring new features to the system under operation without sacrificing quality. This book reports on the ENACT work to empower the development and operation as well as the continuous and agile evolution of SIS, which is necessary to adapt the system to changes in its environment, such as newly appearing trustworthiness threats

    DevOps for Trustworthy Smart IoT Systems

    Get PDF
    ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU. The overall goal of the ENACT project was to provide a novel set of solutions to enable DevOps in the realm of trustworthy Smart IoT Systems. Smart IoT Systems (SIS) are complex systems involving not only sensors but also actuators with control loops distributed all across the IoT, Edge and Cloud infrastructure. Since smart IoT systems typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and adapt to their new environment is decisive to ensure and increase their trustworthiness, quality and user experience. DevOps has established itself as a software development life-cycle model that encourages developers to continuously bring new features to the system under operation without sacrificing quality. This book reports on the ENACT work to empower the development and operation as well as the continuous and agile evolution of SIS, which is necessary to adapt the system to changes in its environment, such as newly appearing trustworthiness threats

    Interference and Volatility in Evolutionary Agent-Based Systems

    Get PDF
    Agents that exist and pursue individual goals in shared environments can indirectly affect one another in unanticipated ways, such that the actions of others in the environment can interfere with the ability to achieve goals. Despite this, the impact that these unintended interactions and interference can have on agents is not currently well understood. This is problematic as these goal-oriented agents are increasingly situated in complex sociotechnical systems, that are composed of many actors that are heterogeneous in nature. The primary aim of this thesis is to explore the effect that indirect interference from others has on evolution and goal-achieving behaviour in agent-based systems. More specifically, this is investigated in the context of agents that do not possess the ability to perceive or learn about others within the environment, as information about others may not be readily available at runtime, or there may be a distinct lack of capacity to obtain such information. By conducting three experimental studies, it is established that evolutionary volatility is a consequence of indirect interactions between goal-oriented agents in a shared environment, and that these consequences can be mitigated by designing more socially-sensitive agents. Specifically, agents that employ social action are demonstrated to reduce the evolutionary volatility experienced by goal-oriented agents, without aecting the tness received. Additionally, behavioural plasticity achieved via neuromodulation is shown to allow coexisting agents to achieve their goals more often with less evolutionary volatility in highly variable environments. While sufficient approaches to mitigate interference include learning about or modelling others, or for agents to be explicitly designed to identify interference to mitigate its consequences, this thesis demonstrates that these are not necessary. Instead, more socially-sensitive agents are shown to be capable of achieving their goals and mitigating interference without this knowledge of others, simply by shifting the focus from goal-oriented actions to more socially-oriented behaviour

    An RF-Isolated Real-Time Multipath Testbed for Performance Analysis of WLANs

    Get PDF
    Real-time performance evaluation of wireless local area networks (WLANs) is an extremely challenging topic. The major drawback of real-time performance analysis in actual network installations is a lack of repeatability due to uncontrollable interference and propagation complexities. These are caused by unpredictable variations in the interference scenarios and statistical behavior of the wireless propagation channel. This underscores the need for a Radio Frequency (RF) test platform that provides isolation from interfering sources while simulating a real-time wireless channel, thereby creating a realistic and controllable radio propagation test environment. Such an RF-isolated testbed is necessary to enable an empirical yet repeatable evaluation of the effects of the wireless channel on WLAN performance. In this thesis, a testbed is developed that enables real-time laboratory performance evaluation of WLANs. This testbed utilizes an RF-isolated test system, Azimuthâ„¢ Systems 801W, for isolation from external interfering sources such as cordless phones and microwave ovens and a real-time multipath channel simulator, Elektrobit PROPSimâ„¢ C8, for wireless channel emulation. A software protocol analyzer, WildPackets Airopeek NX, is used to capture data packets in the testbed from which statistical data characterizing performance such as data rate and Received Signal Strength (RSS) are collected. The relationship between the wireless channel and WLAN performance, under controlled propagation and interference conditions, is analyzed using this RF-isolated multipath testbed. Average throughput and instantaneous throughput variation of IEEE 802.11b and 802.11g WLANs operating in four different channels - a constant channel and IEEE 802.11 Task Group n (TGn) Channel Models A, B, and C - are examined. Practical models describing the average throughput as a function of the average received power and throughput variation as a function of the average throughput under different propagation conditions are presented. Comprehensive throughput models that incorporate throughput variation are proposed for the four channels using Weibull and Gaussian probability distributions. These models provide a means for realistic simulation of throughput for a specific channel at an average received power. Also proposed is a metric to describe the normalized throughput capacity of WLANs for comparative performance evaluation

    Acta Polytechnica Hungarica 2016

    Get PDF

    Spectrum measurement, sensing, analysis and simulation in the context of cognitive radio

    Get PDF
    The radio frequency (RF) spectrum is a scarce natural resource, currently regulated locally by national agencies. Spectrum has been assigned to different services and it is very difficult for emerging wireless technologies to gain access due to rigid spectmm policy and heavy opportunity cost. Current spectrum management by licensing causes artificial spectrum scarcity. Spectrum monitoring shows that many frequencies and times are unused. Dynamic spectrum access (DSA) is a potential solution to low spectrum efficiency. In DSA, an unlicensed user opportunistically uses vacant licensed spectrum with the help of cognitive radio. Cognitive radio is a key enabling technology for DSA. In a cognitive radio system, an unlicensed Secondary User (SU) identifies vacant licensed spectrum allocated to a Primary User (PU) and uses it without harmful interference to the PU. Cognitive radio increases spectrum usage efficiency while protecting legacy-licensed systems. The purpose of this thesis is to bring together a group of CR concepts and explore how we can make the transition from conventional radio to cognitive radio. Specific goals of the thesis are firstly the measurement of the radio spectrum to understand the current spectrum usage in the Humber region, UK in the context of cognitive radio. Secondly, to characterise the performance of cyclostationary feature detectors through theoretical analysis, hardware implementation, and real-time performance measurements. Thirdly, to mitigate the effect of degradation due to multipath fading and shadowing, the use of -wideband cooperative sensing techniques using adaptive sensing technique and multi-bit soft decision is proposed, which it is believed will introduce more spectral opportunities over wider frequency ranges and achieve higher opportunistic aggregate throughput.Understanding spectrum usage is the first step toward the future deployment of cognitive radio systems. Several spectrum usage measurement campaigns have been performed, mainly in the USA and Europe. These studies show locality and time dependence. In the first part of this thesis a spectrum usage measurement campaign in the Humber region, is reported. Spectrum usage patterns are identified and noise is characterised. A significant amount of spectrum was shown to be underutilized and available for the secondary use. The second part addresses the question: how can you tell if a spectrum channel is being used? Two spectrum sensing techniques are evaluated: Energy Detection and Cyclostationary Feature Detection. The performance of these techniques is compared using the measurements performed in the second part of the thesis. Cyclostationary feature detection is shown to be more robust to noise. The final part of the thesis considers the identification of vacant channels by combining spectrum measurements from multiple locations, known as cooperative sensing. Wideband cooperative sensing is proposed using multi resolution spectrum sensing (MRSS) with a multi-bit decision technique. Next, a two-stage adaptive system with cooperative wideband sensing is proposed based on the combination of energy detection and cyclostationary feature detection. Simulations using the system above indicate that the two-stage adaptive sensing cooperative wideband outperforms single site detection in terms of detection success and mean detection time in the context of wideband cooperative sensing
    corecore