6 research outputs found

    WiFi-Direct InterNetworking

    Get PDF
    We are on the verge of having ubiquitous connectivity. However, there are still scenarios where public communication networks are not reachable, are saturated or simply cannot be trusted. In such cases, our mobile phones can leverage device-to-device communication to reach the public network or to enable local connectivity. A device-to-device communication technology, with at least WiFi speed and range, will offer sufficient connectivity conditions for interconnection in areas/situations where it is not currently possible. Such advance will foster a new breed of systems and applications. Their widespread adoption is, nonetheless, bound to their usage in off-the-shelf devices. This raises a problem because the device-to-device communication technologies currently available in off-the-shelf mobile devices have several limitations: Bluetooth is limited in speed and range,Wi-Fi Direct is limited in speed and connectivity for medium and large scenarios, and WiFi-Aware is a new and untested technology, whose specification does not cover large scenarios. In this thesis, we address this problem by presenting two communication topologies and a network formation algorithm that enable the use of Wi-Fi Direct communication between off-the-shelf mobile devices in medium and large scale scenarios. The communication topologies, named Group-Owner Client-Relay Group-Owner and Group-Owner Group-Owner, allow for Wi-Fi Direct intergroup communication, whilst the network formation algorithm, named RedMesh, systematically creates networks of Wi-Fi Direct groups. The algorithm proved to be very effective, achieving full connectivity in 97.28% of the 1 250 tested scenarios. The RedMesh algorithm distinguishes itself for being the first one to useWi-Fi Direct communication topologies that can form tree and mesh structures, and for being the first algorithm able to build networks that can rely only on unicast communication. We may hence conclude that the work developed in this thesis makes significant progress in the formation of large scale networks of off-the-shelf mobile devices

    Improving forwarding mechanisms for mobile personal area networks

    Get PDF
    This thesis presents novel methods for improving forwarding mechanisms for personal area networks. Personal area networks are formed by interconnecting personal devices such as personal digital assistants, portable multimedia devices, digital cameras and laptop computers, in an ad hoc fashion. These devices are typically characterised by low complexity hardware, low memory and are usually batterypowered. Protocols and mechanisms developed for general ad hoc networking cannot be directly applied to personal area networks as they are not optimised to suit their specific constraints. The work presented herein proposes solutions for improving error control and routing over personal area networks, which are very important ingredients to the good functioning of the network. The proposed Packet Error Correction (PEC) technique resends only a subset of the transmitted packets, thereby reducing the overhead, while ensuring improved error rates. PEC adapts the number of re-transmissible packets to the conditions of the channel so that unnecessary retransmissions are avoided. It is shown by means of computer simulation that PEC behaves better, in terms of error reduction and overhead, than traditional error control mechanisms, which means that it is adequate for low-power personal devices. The proposed C2HR routing protocol, on the other hand, is designed such that the network lifetime is maximised. This is achieved by forwarding packets through the most energy efficient paths. C2HR is a hybrid routing protocol in the sense that it employs table-driven (proactive) as well as on-demand (reactive) components. Proactive routes are the primary routes, i.e., packets are forwarded through those paths when the network is stable; however, in case of failures, the protocol searches for alternative routes on-demand, through which data is routed temporarily. The advantage of C2HR is that data can still be forwarded even when routing is re-converging, thereby increasing the throughput. Simulation results show that the proposed routing method is more energy efficient than traditional least hops routing, and results in higher data throughput. C2HR relies on a network leader for collecting and distributing topology information, which in turn requires an estimate of the underlying topology. Thus, this thesis also proposes a new cooperative leader election algorithm and techniques for estimating network characteristics in mobile environments. The proposed solutions are simulated under various conditions and demonstrate appreciable behaviour

    Contributions to Context-Aware Smart Healthcare: A Security and Privacy Perspective

    Get PDF
    Les tecnologies de la informaci贸 i la comunicaci贸 han canviat les nostres vides de manera irreversible. La ind煤stria sanit脿ria, una de les ind煤stries m茅s grans i de major creixement, est脿 dedicant molts esfor莽os per adoptar les 煤ltimes tecnologies en la pr脿ctica m猫dica di脿ria. Per tant, no 茅s sorprenent que els paradigmes sanitaris estiguin en constant evoluci贸 cercant serveis m茅s eficients, efica莽os i sostenibles. En aquest context, el potencial de la computaci贸 ubiqua mitjan莽ant tel猫fons intel路ligents, rellotges intel路ligents i altres dispositius IoT ha esdevingut fonamental per recopilar grans volums de dades, especialment relacionats amb l'estat de salut i la ubicaci贸 de les persones. Les millores en les capacitats de detecci贸 juntament amb l'aparici贸 de xarxes de telecomunicacions d'alta velocitat han facilitat la implementaci贸 d'entorns sensibles al context, com les cases i les ciutats intel路ligents, capa莽os d'adaptar-se a les necessitats dels ciutadans. La interacci贸 entre la computaci贸 ubiqua i els entorns sensibles al context va obrir la porta al paradigma de la salut intel路ligent, centrat en la prestaci贸 de serveis de salut personalitzats i de valor afegit mitjan莽ant l'explotaci贸 de grans quantitats de dades sanit脿ries, de mobilitat i contextuals. No obstant, la gesti贸 de dades sanit脿ries, des de la seva recollida fins a la seva an脿lisi, planteja una s猫rie de problemes desafiants a causa del seu car脿cter altament confidencial. Aquesta tesi t茅 per objectiu abordar diversos reptes de seguretat i privadesa dins del paradigma de la salut intel路ligent. Els resultats d'aquesta tesi pretenen ajudar a la comunitat cient铆fica a millorar la seguretat dels entorns intel路ligents del futur, aix铆 com la privadesa dels ciutadans respecte a les seves dades personals i sanit脿ries.Las tecnolog铆as de la informaci贸n y la comunicaci贸n han cambiado nuestras vidas de forma irreversible. La industria sanitaria, una de las industrias m谩s grandes y de mayor crecimiento, est谩 dedicando muchos esfuerzos por adoptar las 煤ltimas tecnolog铆as en la pr谩ctica m茅dica diaria. Por tanto, no es sorprendente que los paradigmas sanitarios est茅n en constante evoluci贸n en busca de servicios m谩s eficientes, eficaces y sostenibles. En este contexto, el potencial de la computaci贸n ubicua mediante tel茅fonos inteligentes, relojes inteligentes, dispositivos wearables y otros dispositivos IoT ha sido fundamental para recopilar grandes vol煤menes de datos, especialmente relacionados con el estado de salud y la localizaci贸n de las personas. Las mejoras en las capacidades de detecci贸n junto con la aparici贸n de redes de telecomunicaciones de alta velocidad han facilitado la implementaci贸n de entornos sensibles al contexto, como las casas y las ciudades inteligentes, capaces de adaptarse a las necesidades de los ciudadanos. La interacci贸n entre la computaci贸n ubicua y los entornos sensibles al contexto abri贸 la puerta al paradigma de la salud inteligente, centrado en la prestaci贸n de servicios de salud personalizados y de valor a帽adido mediante la explotaci贸n significativa de grandes cantidades de datos sanitarios, de movilidad y contextuales. No obstante, la gesti贸n de datos sanitarios, desde su recogida hasta su an谩lisis, plantea una serie de cuestiones desafiantes debido a su naturaleza altamente confidencial. Esta tesis tiene por objetivo abordar varios retos de seguridad y privacidad dentro del paradigma de la salud inteligente. Los resultados de esta tesis pretenden ayudar a la comunidad cient铆fica a mejorar la seguridad de los entornos inteligentes del futuro, as铆 como la privacidad de los ciudadanos con respecto a sus datos personales y sanitarios.Information and communication technologies have irreversibly changed our lives. The healthcare industry, one of the world鈥檚 largest and fastest-growing industries, is dedicating many efforts in adopting the latest technologies into daily medical practice. It is not therefore surprising that healthcare paradigms are constantly evolving seeking for more efficient, effective and sustainable services. In this context, the potential of ubiquitous computing through smartphones, smartwatches, wearables and IoT devices has become fundamental to collect large volumes of data, including people's health status and people鈥檚 location. The enhanced sensing capabilities together with the emergence of high-speed telecommunication networks have facilitated the implementation of context-aware environments, such as smart homes and smart cities, able to adapt themselves to the citizens needs. The interplay between ubiquitous computing and context-aware environments opened the door to the so-called smart health paradigm, focused on the provision of added-value personalised health services by meaningfully exploiting vast amounts of health, mobility and contextual data. However, the management of health data, from their gathering to their analysis, arises a number of challenging issues due to their highly confidential nature. In particular, this dissertation addresses several security and privacy challenges within the smart health paradigm. The results of this dissertation are intended to help the research community to enhance the security of the intelligent environments of the future as well as the privacy of the citizens regarding their personal and health data

    Correct-by-Construction Development of Dynamic Topology Control Algorithms

    Get PDF
    Wireless devices are influencing our everyday lives today and will even more so in the future. A wireless sensor network (WSN) consists of dozens to hundreds of small, cheap, battery-powered, resource-constrained sensor devices (motes) that cooperate to serve a common purpose. These networks are applied in safety- and security-critical areas (e.g., e-health, intrusion detection). The topology of such a system is an attributed graph consisting of nodes representing the devices and edges representing the communication links between devices. Topology control (TC) improves the energy consumption behavior of a WSN by blocking costly links. This allows a mote to reduce its transmission power. A TC algorithm must fulfill important consistency properties (e.g., that the resulting topology is connected). The traditional development process for TC algorithms only considers consistency properties during the initial specification phase. The actual implementation is carried out manually, which is error prone and time consuming. Thus, it is difficult to verify that the implementation fulfills the required consistency properties. The problem becomes even more severe if the development process is iterative. Additionally, many TC algorithms are batch algorithms, which process the entire topology, irrespective of the extent of the topology modifications since the last execution. Therefore, dynamic TC is desirable, which reacts to change events of the topology. In this thesis, we propose a model-driven correct-by-construction methodology for developing dynamic TC algorithms. We model local consistency properties using graph constraints and global consistency properties using second-order logic. Graph transformation rules capture the different types of topology modifications. To specify the control flow of a TC algorithm, we employ the programmed graph transformation language story-driven modeling. We presume that local consistency properties jointly imply the global consistency properties. We ensure the fulfillment of the local consistency properties by synthesizing weakest preconditions for each rule. The synthesized preconditions prohibit the application of a rule if and only if the application would lead to a violation of a consistency property. Still, this restriction is infeasible for topology modifications that need to be executed in any case. Therefore, as a major contribution of this thesis, we propose the anticipation loop synthesis algorithm, which transforms the synthesized preconditions into routines that anticipate all violations of these preconditions. This algorithm also enables the correct-by-construction runtime reconfiguration of adaptive WSNs. We provide tooling for both common evaluation steps. Cobolt allows to evaluate the specified TC algorithms rapidly using the network simulator Simonstrator. cMoflon generates embedded C code for hardware testbeds that build on the sensor operating system Contiki
    corecore