46 research outputs found

    Intentions: a confident-based interaction design for smart spaces

    Get PDF
    The paradigm of ubiquitous computing has become a reference for the design of Smart Spaces. Current trends in Ambient Intelligence are increasingly related to the scope of Internet of Things. This paradigm has the potential to support cost-effective solutions in the fields of telecare, e-health and Ambient Assisted Living. Nevertheless, ubiquitous computing does not provide end users with a role for proactive interactions with the environment. Thus, the deployment of smart health care services at a private space like the home is still unsolved. This PhD dissertation aims to define a person-environment interaction model to foster acceptability and users confidence in private spaces by applying the concept of user-centred security and the human performance model of seven stages of action

    Predictable MAC-level Performance in Low-power Wireless Under Interference

    Get PDF
    Predictable performance is key for many WSN applications. Recent efforts use models of the environment, the employed hardware and protocols to predict network performance. Towards this end, we present an intentionally simple model of ContikiMAC, Contikiâ\u80\u99s default MAC layer, targeting worst-case bounds for packet delivery rate and latency. Our experiments reveal problems in the performance of ContikiMAC which makes the protocol perform much worse than predicted and hence prohibits predictable performance with the current ContikiMAC implementation. We show that the reason for this performance degradation is that ContikiMAC looses phase-lock. To solve this problem, we add fine-grained timing information into the acknowledgment. We show that this mechanism solves these problems and enables predictable performance with ContikiMAC even under high external interference

    Sensor function virtualization to support distributed intelligence in the internet of things

    Get PDF
    It is estimated that-by 2020-billion devices will be connected to the Internet. This number not only includes TVs, PCs, tablets and smartphones, but also billions of embedded sensors that will make up the "Internet of Things" and enable a whole new range of intelligent services in domains such as manufacturing, health, smart homes, logistics, etc. To some extent, intelligence such as data processing or access control can be placed on the devices themselves. Alternatively, functionalities can be outsourced to the cloud. In reality, there is no single solution that fits all needs. Cooperation between devices, intermediate infrastructures (local networks, access networks, global networks) and/or cloud systems is needed in order to optimally support IoT communication and IoT applications. Through distributed intelligence the right communication and processing functionality will be available at the right place. The first part of this paper motivates the need for such distributed intelligence based on shortcomings in typical IoT systems. The second part focuses on the concept of sensor function virtualization, a potential enabler for distributed intelligence, and presents solutions on how to realize it

    The Monkey, the Ant, and the Elephant:Addressing Safety in Smart Spaces

    Get PDF
    Smart spaces deliver digital services to optimize space use and enhance user experience. The impact of ill-programmed applications in such spaces goes beyond loss of data or a computer crash; there is the potential risk of physical harm to the space and its users. Ensuring safety in this type of cyberphysical system is critically important

    A Misuse-Based Intrusion Detection System for ITU-T G.9959 Wireless Networks

    Get PDF
    Wireless Sensor Networks (WSNs) provide low-cost, low-power, and low-complexity systems tightly integrating control and communication. Protocols based on the ITU-T G.9959 recommendation specifying narrow-band sub-GHz communications have significant growth potential. The Z-Wave protocol is the most common implementation. Z-Wave developers are required to sign nondisclosure and confidentiality agreements, limiting the availability of tools to perform open source research. This work discovers vulnerabilities allowing the injection of rogue devices or hiding information in Z-Wave packets as a type of covert channel attack. Given existing vulnerabilities and exploitations, defensive countermeasures are needed. A Misuse-Based Intrusion Detection System (MBIDS) is engineered, capable of monitoring Z-Wave networks. Experiments are designed to test the detection accuracy of the system against attacks. Results from the experiments demonstrate the MBIDS accurately detects intrusions in a Z-Wave network with a mean misuse detection rate of 99%. Overall, this research contributes new Z-Wave exploitations and an MBIDS to detect rogue devices and packet injection attacks, enabling a more secure Z-Wave network

    Competition: Adaptive Time-Slotted Channel Hopping

    Get PDF
    International audienceTime-Slotted Channel Hopping (TSCH) from the IEEE 802.15.4-2015 standard uses channel hopping to combat interference and frequency-selective fading. It has attracted large attention from the research community due to its properties: high reliability in terms of packet delivery rates, and increased predictability in terms of energy consumption and latency, as compared to commonly used low-power CSMA MAC protocols. This work makes use of the Contiki OS implementation of the TSCH protocol. We extend the standardized TSCH protocol with adaptive channel selection, adaptive time synchronization , and adaptive guard time selection to improve its energy efficiency and reliability properties
    corecore