Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Storage-Centric System Architectures for Networked, Resource-Constrained Devices
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Computer Systems. SICS.
2016 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The emergence of the Internet of Things (IoT) has increased the demand for networked, resource-constrained devices tremendously. Many of the devices used for IoT applications are designed to be resource-constrained, as they typically must be small, inexpensive, and powered by batteries. In this dissertation, we consider a number of challenges pertaining to these constraints: system support for energy efficiency; flash-based storage systems; programming, testing, and debugging; and safe and secure application execution. The contributions of this dissertation are made through five research papers addressing these challenges.

Firstly, to enhance the system support for energy-efficient storage in resource-constrained devices, we present the design, implementation, and evaluation of the Coffee file system and the Antelope DBMS. Coffee provides a sequential write throughput that is over 92% of the attainable flash driver throughput, and has a constant memory footprint for open files. Antelope is the first full-fledged relational DBMS for sensor networks, and it provides two novel indexing algorithms to enable fast and energy-efficient database queries.

Secondly, we contribute a framework that extends the functionality and increases the performance of sensornet checkpointing, a debugging and testing technique. Furthermore, we evaluate how different data compression algorithms can be used to decrease the energy consumption and data dissemination time when reprogramming sensor networks.

Lastly, we present Velox, a virtual machine for IoT applications. Velox can enforce application-specific resource policies. Through its policy framework and its support for high-level programming languages, Velox helps to secure IoT applications. Our experiments show that Velox monitors applications' resource usage and enforces policies with an energy overhead below 3%.

The experimental systems research conducted in this dissertation has had a substantial impact both in the academic community and the open-source software community. Several of the produced software systems and components are included in Contiki, one of the premier open-source operating systems for the IoT and sensor networks, and they are being used both in research projects and commercial products.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2016. , 60 p.
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 1331
Series
SICS Dissertation Series, ISSN 1101-1335 ; 74
Keyword [en]
Internet of Things, wireless sensor networks, resource-constrained devices, file system, database management system, virtual machine, data compression, reprogramming, checkpointing
National Category
Computer Science
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:uu:diva-267628ISBN: 978-91-554-9441-4 (print)OAI: oai:DiVA.org:uu-267628DiVA: diva2:882135
Public defence
2016-02-18, ITC/2446, Lägerhyddsvägen 2, Uppsala, 13:15 (English)
Opponent
Supervisors
Available from: 2016-01-22 Created: 2015-11-25 Last updated: 2016-11-02
List of papers
1. Efficient Sensor Network Reprogramming through Compression of Executable Modules
Open this publication in new window or tab >>Efficient Sensor Network Reprogramming through Compression of Executable Modules
2008 (English)In: Proceedings of Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008): June 16-20, 2008, San Francisco, California, USA. 2008, 2008Conference paper, Published paper (Refereed)
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-142776 (URN)
Conference
Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008): June 16-20, 2008, San Francisco, California, USA. 2008
Projects
wisenet
Available from: 2011-01-17 Created: 2011-01-17 Last updated: 2016-02-12
2. Enabling Large- Scale Storage in Sensor Networks with the Coffee File System
Open this publication in new window or tab >>Enabling Large- Scale Storage in Sensor Networks with the Coffee File System
2009 (English)In: Proceedings of the 8th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2009), San Francisco, USA, April 2009, 2009Conference paper, Published paper (Refereed)
Identifiers
urn:nbn:se:uu:diva-142686 (URN)
Conference
8th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2009), San Francisco, USA, April 2009
Projects
wisenet
Available from: 2011-01-14 Created: 2011-01-14 Last updated: 2016-02-12
3. A Database in Every Sensor
Open this publication in new window or tab >>A Database in Every Sensor
2011 (English)Conference paper, Published paper (Refereed)
Keyword
Antelope, database, energy-efficiency, sensor network
National Category
Computer Science
Research subject
Computer Science with specialization in Database Technology
Identifiers
urn:nbn:se:uu:diva-267634 (URN)
Conference
The 9th ACM Conference on Embedded Networked Sensor Systems (SenSys 2011)
Funder
EU, FP7, Seventh Framework Programme, FP7-ICT-224282EU, FP7, Seventh Framework Programme, FP7-2007-2-224053Swedish Foundation for Strategic Research
Available from: 2015-11-25 Created: 2015-11-25 Last updated: 2016-02-12
4. Efficient and Flexible Sensornet Checkpointing
Open this publication in new window or tab >>Efficient and Flexible Sensornet Checkpointing
2014 (English)In: Wireless Sensor Networks, volume 8354, 2014, -65 p.Conference paper, Published paper (Refereed)
Abstract [en]

Developing sensornet software is difficult partly because ofthe limited visibility of the system state of deployed nodes. Sensor-net checkpointing is a method that allows developers to save and restore full system state of nodes. We present four extensions to sensornetcheckpointing—compression, binary diffs, selective checkpointing, and checkpoint inspection—that reduce the time required for checkpointing operations considerably, and improve the granularity at which system state can be examined and manipulated down to the variable level. We show through an experimental evaluation that the checkpoint sizes can be reduced by 70%-93%, and the time can be reduced by at least 50% because of these improvements. The reduced time and increased granularity benefits multiple checkpointing use cases, including automated testing, network visualization, and software debugging.

National Category
Computer Systems
Identifiers
urn:nbn:se:uu:diva-211145 (URN)0.1007/978-3-319-04651-8_4 (DOI)000340395900004 ()978-3-319-04650-1 (ISBN)978-3-319-04651-8 (ISBN)
Conference
EWSN 2014: The European Conference on Wireless Sensor Networks; 17-19 February 2014; University of Oxford; Oxford, UK
Projects
ProFuN
Available from: 2013-11-20 Created: 2013-11-20 Last updated: 2016-02-12Bibliographically approved
5. Velox: A Virtual Machine for IoT Software Security and Resource Protection
Open this publication in new window or tab >>Velox: A Virtual Machine for IoT Software Security and Resource Protection
(English)Manuscript (preprint) (Other academic)
National Category
Computer Science
Research subject
Computer Science
Identifiers
urn:nbn:se:uu:diva-268870 (URN)
Funder
VINNOVAKnowledge Foundation
Available from: 2015-12-10 Created: 2015-12-10 Last updated: 2016-02-12

Open Access in DiVA

fulltext(398 kB)400 downloads
File information
File name FULLTEXT01.pdfFile size 398 kBChecksum SHA-512
1a4b628a60ac8eb12cfdd5ca7ac115b37cce09502143f1c41d42319625e84bee1addbee3f63db6a13655e50a3e07615c0c4f7244a8582442fda31d881ee1bb6c
Type fulltextMimetype application/pdf
Buy this publication >>

Search in DiVA

By author/editor
Tsiftes, Nicolas
By organisation
Computer SystemsDivision of Computer Systems
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 400 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1697 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf