Digitala Vetenskapliga Arkivet

Change search
Refine search result
12 1 - 50 of 62
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Arunachalam, Raghu
    et al.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Sadeh, Norman M.
    The Supply Chain Management Game for the Trading Agent Competition 20042004Report (Other academic)
    Abstract [en]

    This report is the specification for the Trading Agent Competition Supply Chain Management Game - TAC SCM-04, to be held between July 20-22, 2004, in New York in conjunction with AAMAS-04. Based on the experience of the 2003 Trading Agent Competition a few enhancements have been added to the original game: (1)The price function has been modified to better reflect demand; (2) storage costs have been introduced; and (3) customer demand has been segmented into multiple markets.

    Download full text (pdf)
    FULLTEXT01
  • 2. Casati, Fabio
    et al.
    Daniel, Florian
    Dantchev, Guenadi
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Karnouskos, Stamatis
    Moreno Montero, Patricio
    Mottola, Luca
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Oppermann, Felix
    Picco, Gian Pietro
    Quartulli, Antonio
    Römer, Kay
    Spiess, Patrik
    Tranquillini, Stefano
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Demo Abstract: From Business Process Specifications to Sensor Network Deployments2012Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 3. Casati, Fabio
    et al.
    Daniel, Florian
    Dantchev, Guenadi
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Karnouskos, Stamatis
    Moreno Montero, Patricio
    Mottola, Luca
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Oppermann, Felix
    Picco, Gian Pietro
    Quartulli, Antonio
    Römer, Kay
    Spiess, Patrik
    Tranquillini, Stefano
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Towards Business Processes Orchestrating the Physical Enterprise with Wireless Sensor Networks2012Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 4. Collins, John
    et al.
    Arunachalam, Raghu
    Sadeh, Norman M.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    The Supply Chain Management Game for the 2005 Trading Agent Competition2004Other (Other academic)
    Abstract [en]

    The Supply Chain Management Game for the 2005 Trading Agent Competition held during IJCAI 2005, in Edinburgh, Scotland. The supplier model has been substantially revised to overcome the "Day Zero" strategic singularity in TAC SCM 2003 and 2004.

    Download full text (pdf)
    FULLTEXT01
  • 5. Daniel, Florian
    et al.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Fuchs, Harald
    Gaglione, Andrea
    Karnouskos, Stamatis
    Moreno Montero, Patricio
    Mottola, Luca
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Oertel, Nina
    Oppermann, Felix
    Picco, Gian Pietro
    Römer, Kay
    Spiess, Patrik
    Tranquillini, Stefano
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    makeSense: Real-world Business Processes through Wireless Sensor Networks2013Conference paper (Refereed)
  • 6.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Powertrace: Network-level Power Profiling for Low-power Wireless Networks2011Report (Other academic)
    Abstract [en]

    Low-power wireless networks are quickly becoming a critical part of our everyday infrastructure. Power consumption is a critical concern, but power measurement and estimation is a challenge. We present Powertrace, which to the best of our knowledge is the first system for network-level power profiling of low-power wireless systems. Powertrace uses power state tracking to estimate system power consumption and a structure called energy capsules to attribute energy consumption to activities such as packet transmissions and receptions. With Powertrace, the power consumption of a system can be broken down into individual activities which allows us to answer questions such as “How much energy is spent forwarding packets for node X?”, “How much energy is spent on control traffic and how much on critical data?”, and “How much energy does application X account for?”. Experiments show that Powertrace is accurate to 94% of the energy consumption of a device. To demonstrate the usefulness of Powertrace, we use it to experimentally analyze the power behavior of the proposed IETF standard IPv6 RPL routing protocol and a sensor network data collection protocol. Through using Powertrace, we find the highest power consumers and are able to reduce the power consumption of data collection with 24%. It is our hope that Powertrace will help the community to make empirical energy evaluation a widely used tool in the low-power wireless research community toolbox.

    Download full text (pdf)
    FULLTEXT01
  • 7.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Low-power Interoperability for the IPv6-based Internet of Things2011Conference paper (Refereed)
    Abstract [en]

    The Internet of Things requires interoperability and low power consumption, but interoperability and low power consumption have thus far been mutually exclusive. This talk outlines the challenges in attaining low power operation for the IPv6-based Internet of Things, how this affects interoperability, and what must be done to combine the two.

  • 8.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Reprogramming wireless sensor networks with run-time dynamic linking in Contiki.2007In: Proceedings of Real-Time in Sweden 2007, 2007, 1Conference paper (Refereed)
  • 9.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Run-time dynamic linking for reprogramming wireless sensor networks2006Conference paper (Refereed)
    Abstract [en]

    From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energy, memory, and processing power make sensor network reprogramming a challenging task. Many different mechanisms for reprogramming sensor nodes have been developed ranging from full image replacement to virtual machines. We have implemented an in-situ run-time dynamic linker and loader that use the standard ELF object file format. We show that run-time dynamic linking is an effective method for reprogramming even resource constrained wireless sensor nodes. To evaluate our dynamic linking mechanism we have implemented an application-specific virtual machine and a Java virtual machine and compare the energy cost of the different linking and execution models. We measure the energy consumption and execution time overhead on real hardware to quantify the energy costs for dynamic linking. Our results suggest that while in general the overhead of a virtual machine is high, a combination of native code and virtual machine code provide good energy efficiency. Dynamic run-time linking can be used to update the native code, even in heterogeneous networks.

  • 10.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Mottola, Luca
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    The Announcement Layer: Beacon Coordination for the Sensornet Stack2011Conference paper (Refereed)
  • 11.
    Eriksson, Joakim
    Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Networked Embedded Systems.
    Scalable and Interoperable Low-Power Internet of Things Networks2023Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Internet of Things (IoT) is the concept of connecting devices to the Internet. IoT devices can be anything from small temperature sensors to self-driving cars. The devices are typically resource-constrained, connected wirelessly, and often battery-powered. In this thesis, we address energy efficiency and the tools required for estimating power consumption, interoperability between different implementations of IoT protocols, and scalability of the IoT networks in mesh configurations. The contributions are made in the five included research papers addressing these challenges. Firstly, we present and evaluate network-wide energy estimation support in our simulation tool COOJA/MSPSim. Due to the timing accuracy of the simulation and emulation, we get energy consumption estimates very close to hardware-based estimates. The second contribution evaluates the capabilities of simulation tools for interoperability testing. We show that it is possible to set up simulations of networks with multiple implementations of the same open standards (6LoWPAN/RPL) and that it is possible to get results beyond pure interoperability, including power consumption and network quality. Finally, we show that, by carefully managing neighbor updates, it is possible to scale IoT networks even when the IoT devices' memory limitations severely constrain the size of the neighbor table.

    The experimental systems research that resulted in this thesis also provided significant contributions to the open-source ecosystem around Contiki, an operating system for resource-constrained IoT devices. This software, Contiki and COOJA/MSPSim, has been a cornerstone in our capability to perform sound systems research and has been widely used by other research groups in resource-constrained IoT research in academia and many companies for developing commercial IoT devices.

    Download full text (pdf)
    UUThesis_J-Eriksson-2023
    Download (jpg)
    preview image
  • 12.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Mspsim - an extensible simulator for msp430-equipped sensor boards.2007Conference paper (Refereed)
  • 13.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Demo abstract: MSPsim - an extensible simulator for MSP430-equipped sensor boards2008Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 14.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Evolution of a supply chain management game for the trading agent competition2006In: AI Communications, Vol. 19, p. 1-12Article in journal (Refereed)
    Abstract [en]

    TAC SCM is a supply chain management game for the Trading Agent Competition (TAC). The purpose of TAC is to spur high quality research into realistic trading agent problems. We discuss TAC and TAC SCM: game and competition design, scientific impact, and lessons learnt.

    Download full text (pdf)
    fulltext
  • 15.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    SICS MarketSpace: an agent-based market infrastructure1998Conference paper (Refereed)
    Abstract [en]

    We present a simple and uniform communication framework for an agent-based market infrastructure, the goal of which is to enable automation of markets with self-interested participants distributed over the Internet.

    Download full text (pdf)
    fulltext
  • 16.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    To each and everyone an agent: augmenting web-based commerce with agents1998Conference paper (Refereed)
  • 17.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Towards self-managing systems2004In: ERCIM News, ISSN 0926-4981, E-ISSN 1564-0094, no 58Article in journal (Other (popular science, discussion, etc.))
  • 18.
    Eriksson, Joakim
    et al.
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Finne, Niclas
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Tsiftes, Nicolas
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Duquennoy, Simon
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Voigt, Thiemo
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Scaling RPL to Dense and Large Networks with Constrained Memory2018In: Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018, p. 126-134Conference paper (Refereed)
    Abstract [en]

    The Internet of Things poses new requirements for reliable, bi-directional communication in low-power and lossy networks, but these requirements are hard to fulfill since most existing protocols have been designed for data collection. In this paper, we propose standard-compliant mechanisms that make RPL meet these requirements while still scaling to large networks of IoT devices under significant resource constraints. Our aim is to scale far beyond what can be stored in RAM on the nodes of the network. The only node that needs to have storage for all the routing entries is the RPL root node. Based on experimentation with largescale commercial deployments, we suggest two mechanisms to make RPL scale under resource constraints: (1) end-to-end route registration with DAO and (2) a policy for managing the neighbor table. By employing these mechanisms, we show that the bi-directional packet reception rate of RPL networks increases significantly.

  • 19.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Gielda, Mikael
    Gielda, Peter
    Demo Abstract: EmuLink - Heterogeneous Sensor Network Simulation in Cooja2013Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 20.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    The trading agent competition: TAC 20022002In: ERCIM News, ISSN 0926-4981, E-ISSN 1564-0094, no 51Article in journal (Other (popular science, discussion, etc.))
    Abstract [en]

    The finals of the third annual Trading Agent Competition were held on 28 July 2002, co-located with AAA1-02 in Edmonton, Canada. The actual games took place on the Internet, with the game and auction servers running at SICS in Kista, Sweden. The agents resided at the home locations of the participating research groups.

  • 21.
    Eriksson, Joakim
    et al.
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Vikberg, Tommy
    RISE Research Institutes of Sweden, Built Environment, Building and Real Estate.
    Lindgren, Anders
    RISE Research Institutes of Sweden, Digital Systems, Industrial Systems.
    5G i träindustrin2022Report (Other academic)
    Abstract [sv]

    Privata 5G nätverk – antingen som en del av ett publikt eller som ett helt eget mobilnät erbjuder möjliga lösningar på ett antal av de utmaningar som finns kring WiFi och trådlösa uppkopplingar i logistik och produktion. Tekniken börjar bli väletablerad och antalet leverantörer ökar snabbt samtidigt som priser för infrastrukturen sjunker i pris. Förutom att femte generationens mobilnät löser problem kring mobilitet och uppkoppling så finns ett antal intressanta funktioner såsom positionering och standardiserad edge computing för lokala digitala tjänster. Dessa funktioner bör dock ses som en del av en framtida uppgradering snarare än något som finns tillgängligt idag (dock inte så långt bort in i framtiden). Alla de besökta sågverken hade liknande utmaningar kring trådlös uppkoppling och i vissa fall har även 4G-baserade lösningar börjat användas – med gott resultat.

    Tyvärr fick vi inte konkreta priser från de operatörer och leverantörer som dialog fördes med men via vissa leverantörer kan man ändå få en viss indikation (se t ex AWS erbjudande där det för ett privat nät med två radioaccespunkter ligger på ca 140 KSEK / månad totalt).

    Download full text (pdf)
    fulltext
  • 22.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Accurate power profiling for sensor network simulators2008Conference paper (Refereed)
  • 23.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Accurate, network-scale power profiling for sensor network simulators2009Conference paper (Refereed)
  • 24.
    Eriksson, Joakim
    et al.
    SICS.
    Österlind, Fredrik
    SICS.
    Finne, Niclas
    SICS.
    Dunkels, Adam
    SICS.
    Voigt, Thiemo
    SICS.
    Tsiftes, Nicolas
    SICS.
    Accurate, network-scale power profiling for sensor network simulators2009In: Proceedings of the 6th European Conference on Wireless Sensor Networks, EWSN 2009, Cork, Ireland, February 2009, 2009Conference paper (Refereed)
  • 25.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Sauter, Robert
    Marrón, Pedro José
    COOJA/MSPSim: Interoperability Testing for Wireless Sensor Networks2009Conference paper (Refereed)
  • 26.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Sauter, Robert
    Marrón, Pedro José
    Demo Abstract: Towards Interoperability Testing for Wireless Sensor Networks with COOJA/MSPSim2009Conference paper (Refereed)
  • 27.
    Eriksson, Joakim
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Raza, Shahid
    RISE, Swedish ICT, SICS, Security Lab.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Demo abstract: accurate power profiling of sensornets with the COOJA/MSPSim simulator2009Conference paper (Refereed)
    Abstract [en]

    Power consumption is of utmost concern in sensor networks. Researchers have several ways of measuring the power consumption of a complete sensor network, but they are typically either impractical or inaccurate. To meet the need for practical and scalable measurement of power consumption of sensor networks, we have developed a cycle-accurate simulator, called COOJA/MSPsim, that enables live power estimation of systems running on MSP430 processors. This demonstration shows the ease of use and the power measurement accuracy of COOJA/MSPsim. The demo setup consists of a small sensor network and a laptop. Beside gathering software-based power measurements from the motes, the laptop runs COOJA/MSPsim to simulate the same network. We visualize the power consumption of both the simulated and the real sensor network, and show that the simulator produces matching results.

  • 28.
    Finne, Niclas
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Experiences from two sensor network deployments - self-configuration a key to success2007Report (Other academic)
    Abstract [en]

    Various experiments have shown that the performance of wireless sensor networks is very hard to predict. It is also acknowledged that deploying sensor networks in real settings is a difficult and tedious task. To contribute to the understanding of wireless sensor network behavior we report on our experience from two recently deployed sensor networks: one in-door surveillance network in a factory complex and a combined out-door and in-door surveillance network. Both networks use advanced sensor network technology such as ad hoc routing and multi hop networking. Our results highlight the need for self-configuration in wireless sensor networks, especially in cases where fast deployment and dynamic environments are important aspects.

    Download full text (pdf)
    FULLTEXT01
  • 29.
    Finne, Niclas
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Experiences from two sensor network deployments: self-monitoring and self-configuration keys to success2008In: Wired/Wireless Internet Communications: 6th International Conference, WWIC 2008: Proceedings, Germany: Springer , 2008, 1, , p. 12Conference paper (Refereed)
    Abstract [en]

    Despite sensor network protocols being self-configuring, sensor network deployments continue to fail. We report our experience from two recently deployed IP-based multi-hop sensor networks: one in-door surveillance network in a factory complex and a combined out-door and in-door surveillance network. Our experiences highlight that adaptive protocols alone are not sufficient, but that an approach to self-monitoring and self-configuration that covers more aspects than protocol adaptation is needed. Based on our experiences, we design and implement an architecture for self-monitoring of sensor nodes. We show that the self-monitoring architecture detects and prevents the problems with false alarms encountered in our deployments. The architecture also detects software bugs by monitoring actual and expected duty-cycle of key components of the sensor node. We show that the energy-monitoring architecture detects bugs that cause the radio chip to be active longer than expected.

  • 30.
    Finne, Niclas
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Improving Sensornet Performance by Separating System Configuration from System Logic2010Conference paper (Refereed)
    Abstract [en]

    Many sensor network protocols are self-configuring, but independent self-configuration at different layers often results in suboptimal performance. We present Chi, a full-system configuration architecture that separates system logic from system configuration. Drawing from concepts in artificial intelligence, Chi allows full-system configuration that meets both changing application demands and changing environmental conditions. We show that configuration policies using Chi can improve throughput and energy efficiency without adding dependencies between layers. Our results show that sensornet systems can use Chi to adapt to changing conditions at all layers of the system, thus meeting the requirements of heterogeneous and continuously changing system conditions.

  • 31.
    Finne, Niclas
    et al.
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Eriksson, Joakim
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Voigt, Thiemo
    RISE Research Institutes of Sweden, Digital Systems, Data Science. Uppsala University, Sweden.
    Suciu, George
    BEIA, Romania.
    Sachian, Mari-Anais
    BEIA, Romania.
    Ko, JeongGil
    Yonsei University, South Korea.
    Keipour, Hossein
    RISE Research Institutes of Sweden, Digital Systems, Data Science. Blekinge Institute of Technology, Sweden.
    Multi-Trace: Multi-level Data Trace Generation with the Cooja Simulator2021In: 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2021, p. 390-395Conference paper (Refereed)
    Abstract [en]

    Wireless low-power, multi-hop networks are exposed to numerous attacks also due to their resource-constraints. While there has been a lot of work on intrusion detection systems for such networks, most of these studies have considered only a few topologies, scenarios and attacks. One of the reasons for this shortcoming is the lack of sufficient data traces that are required to train many machine learning algorithms. In contrast to other wireless networks, multi-hop networks do not contain one entity that can capture all the traffic which makes it more difficult to acquire such traces. In this paper we present Multi-Trace. Multi-Trace extends the Cooja simulator with multi-level tracing facilities that enable data logging at different levels while maintaining a global time. We discuss the opportunities that traces generated by Multi-Trace enable for researchers interested in input for their machine learning algorithms. We present experiments that show the efficiency with which Multi-Trace generates traces. We expect Multi-Trace to be a useful tool for the research community.

  • 32.
    Gonzalo Peces, Carlos
    et al.
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Eriksson, Joakim
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Tsiftes, Nicolas
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Sleepy Devices Versus Radio Duty Cycling: The Case of Lightweight M2M2019In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 2, p. 2550-2562Article in journal (Refereed)
    Abstract [en]

    Standard protocols for wireless Internet of Things (IoT) communication must be energy-efficient in order to prolong the lifetimes of IoT devices. Two energy-saving strategies for wireless communication are prevalent within the IoT domain: 1) sleepy devices and 2) radio duty cycling. In this paper, we conduct a comprehensive evaluation as to what types of application scenarios benefit the most from either type of energy-saving strategy. We select the lightweight machine to machine (LwM2M) protocol for this purpose because it operates atop the standard constrained application protocol, and has support for sleepy devices through its Queue Mode. We implement the Queue Mode at both the server side and client side, and design enhancements of Queue Mode to further improve the performance. In our experimental evaluation, we compare the performance and characteristics of Queue Mode with that of running LwM2M in a network stack with the standard time-slotted channel hopping as the duty cycling medium access control protocol. By analyzing the results with the support of an empirical model, we find that each energy-saving strategy has different advantages and disadvantages depending on the scenario and traffic pattern. Hence, we also produce guidelines that can help developers to select the appropriate energy-saving strategy based on the application scenario.

  • 33. Gonzalo Peces, Carlos
    et al.
    Eriksson, Joakim
    Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Networked Embedded Systems. Networked Embedded Systems Group, RISE SICS, Stockholm, Sweden.
    Tsiftes, Nicolas
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. Networked Embedded Systems Group, RISE SICS, Stockholm, Sweden.
    Sleepy Devices Versus Radio Duty Cycling: The Case of Lightweight M2M2019In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 2, p. 2550-2562Article in journal (Refereed)
    Abstract [en]

    Standard protocols for wireless Internet of Things (IoT) communication must be energy-efficient in order to prolong the lifetimes of IoT devices. Two energy-saving strategies for wireless communication are prevalent within the IoT domain: 1) sleepy devices and 2) radio duty cycling. In this paper, we conduct a comprehensive evaluation as to what types of application scenarios benefit the most from either type of energy-saving strategy. We select the lightweight machine to machine (LwM2M) protocol for this purpose because it operates atop the standard constrained application protocol, and has support for sleepy devices through its Queue Mode. We implement the Queue Mode at both the server side and client side, and design enhancements of Queue Mode to further improve the performance. In our experimental evaluation, we compare the performance and characteristics of Queue Mode with that of running LwM2M in a network stack with the standard time-slotted channel hopping as the duty cycling medium access control protocol. By analyzing the results with the support of an empirical model, we find that each energy-saving strategy has different advantages and disadvantages depending on the scenario and traffic pattern. Hence, we also produce guidelines that can help developers to select the appropriate energy-saving strategy based on the application scenario.

  • 34.
    Höglund, Joel
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Chauvenet, Cedric
    Pouillot, Mathieu
    Goudet, Pierre-Emmanuel
    Tourancheau, Bernard
    Genon-Catalot, Denis
    Poster Abstract: Interconnecting Low-Power Wireless and Power-Line Communications using IPv62010Conference paper (Refereed)
    Abstract [en]

    Wireless sensor networks for building automation and energy management has made great progress in recent years, but the inherent indoor radio range limitations can make communication unpredictable and system deployments difficult. Low-power radio can be combined with low-power Power-Line Communication (PLC) to extend the range and predictability of indoor communication for building management and automation systems. We take the first steps towards exploring the system implications for integration of low-power wireless and PLC in the same network. We leverage IPv6, which allow networks to exist over multiple physical communication media as well as the RPL routing protocol for low-power lossy networks.

    Download full text (pdf)
    fulltext
  • 35.
    Kanwar, John
    et al.
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Finne, Niclas
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Tsiftes, Nicolas
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Eriksson, Joakim
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Voigt, Thiemo
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    He, Zhitao
    ASSA ABLOY, Sweden.
    Åhlund, Christer
    Luleå University of Technology, Sweden.
    Saguna, Saguna
    Luleå University of Technology, Sweden.
    JamSense: Interference and Jamming Classification for Low-power Wireless Networks2021In: 2021 13th IFIP Wireless and Mobile Networking Conference (WMNC), 2021, p. 9-16Conference paper (Refereed)
    Abstract [en]

    Low-power wireless networks transmit at low output power and are hence susceptible to cross-technology interference. The latter may cause packet loss which may waste scarce energy resources by requiring the retransmission of packets. Jamming attacks are even more harmful than cross-technology interference in that they may totally prevent packet reception and hence disturb or even disrupt applications. Therefore, it is important to recognize such jamming attacks. In this paper, we present JamSense. JamSense extends SpeckSense, a system that is able to detect multiple sources of interference, with the ability to classify jamming attacks. As SpeckSense, JamSense runs on resource-constrained nodes. Our experimental evaluation on real hardware shows that JamSense is able to identify jamming attacks with high accuracy while not classifying Bluetooth or WiFi interference as jamming attacks.

  • 36. Ko, JeongGil
    et al.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dawson-Haggerty, Stephen
    Terzis, Andreas
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Culler, David
    ContikiRPL and TinyRPL: Happy Together2011Conference paper (Refereed)
  • 37. Ko, JeongGil
    et al.
    Eriksson, Joakim
    Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Networked Embedded Systems.
    Tsiftes, Nicolas
    Dawson-Haggerty, Stephen
    Vasseur, Jean-Philippe
    Durvy, Mathilde
    Terzin, Andreas
    Dunkels, Adam
    Culler, David
    Industry: Beyond Interoperability – Pushing the Performance of Sensor Network IP Stacks2011In: SenSys '11: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, 2011, p. 1-11Conference paper (Refereed)
    Abstract [en]

    Interoperability is essential for the commercial adoption of wireless sensor networks. However, existing sensor network architectures have been developed in isolation and thus interoperability has not been a concern. Recently, IP has been proposed as a solution to the interoperability problem of low-power and lossy networks (LLNs), considering its open and standards-based architecture at the network, transport, and application layers. We present two complete and interoperable implementations of the IPv6 protocol stack for LLNs, one for Contiki and one for TinyOS, and show that the cost of interoperability is low: their performance and overhead is on par with state-of-the-art protocol stacks custom built for the two platforms. At the same time, extensive testbed results show that the ensemble performance of a mixed network with nodes running the two interoperable stacks depends heavily on implementation decisions and parameters set at multiple protocol layers. In turn, these results argue that the current industry practice of interoperability testing does not cover the crucial topic of the performance and motivate the need for generic techniques that quantify the performance of such networks and configure their run-time behavior.

  • 38. Ko, JeongGil
    et al.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dawson-Haggerty, Stephen
    Vasseur, Jean-Philippe
    Durvy, Mathilde
    Terzis, Andreas
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Culler, David
    Demo: An Interoperability Development and Performance Diagnosis Environment2011Conference paper (Refereed)
    Abstract [en]

    Interoperability is key to widespread adoption of sensor network technology, but interoperable systems have traditionally been difficult to develop and test. We demonstrate an interoperable system development and performance diagnosis environment in which different systems, different software, and different hardware can be simulated in a single network configuration. This allows both development, verification, and performance diagnosis of interoperable systems. Estimating the performance is important since even when systems interoperate, the performance can be sub-optimal, as shown in our companion paper that has been conditionally accepted for SenSys 2011.

    Download full text (pdf)
    fulltext
  • 39. Ko, JeongGil
    et al.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dawson-Haggerty, Stephen
    Vasseur, Jean-Philippe
    Durvy, Mathilde
    Terzis, Andreas
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Culler, David
    Industry: Beyond Interoperability -- Pushing the Performance of Sensor Network IP Stacks2011Conference paper (Refereed)
  • 40.
    McNamara, Liam
    et al.
    RISE, Swedish ICT, SICS.
    Al Nahas, Beshr
    RISE, Swedish ICT, SICS.
    Duquennoy, Simon
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Demo Abstract: SicsthSense - Dispersing the Cloud2014Conference paper (Refereed)
    Abstract [en]

    —This demo presents SicsthSense, our open cloud platform for the Internet of Things. SicsthSense enables low power devices such as sensor nodes and smartphones to easily store their generated data streams in the cloud. This allows the data streams, and their history, to be made permanently available to users for visualisation, processing and sharing. Moving sensor data computation and monitoring into the cloud is a promising avenue to enable centralisation of control and redistribution of collected data. We showcase SicsthSense running with real sensor nodes collecting environmental data and posting it to our datastore. This live data is then visualised and made available for sharing between users of the platform. Our Android App will also be distributed to enable participants to stream their phone sensors into the system, demonstrating how simple it can be to start machine-to-machine interactions with SicsthSense.

    Download full text (pdf)
    fulltext
  • 41.
    Mottola, Luca
    et al.
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Picco, G. P.
    University of Trento, Italy.
    Oppermann, F. J.
    Graz University of Technology, Austria.
    Eriksson, Joakim
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Finne, Niclas
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    Fuchs, H.
    SAP, Germany.
    Gaglione, A.
    University of Trento, Italy.
    Karnouskos, S.
    SAP, Germany.
    Montero, P. M.
    Acciona Infraestructuras SA, Spain.
    Oertel, N.
    SAP, Germany.
    Romer, K.
    Graz University of Technology, Australia.
    Spiess, P.
    SAP, Germany.
    Tranquillini, S.
    University of Trento, Italy.
    Voigt, Thiemo
    RISE - Research Institutes of Sweden (2017-2019), ICT, SICS.
    MakeSense: Simplifying the Integration of Wireless Sensor Networks into Business Processes2019In: IEEE Transactions on Software Engineering, ISSN 0098-5589, E-ISSN 1939-3520, Vol. 45, no 6, p. 576-596, article id 8240710Article in journal (Refereed)
    Abstract [en]

    A wide gap exists between the state of the art in developing Wireless Sensor Network (WSN) software and current practices concerning the design, execution, and maintenance of business processes. WSN software is most often developed based on low-level OS abstractions, whereas business process development leverages high-level languages and tools. This state of affairs places WSNs at the fringe of industry. The makeSense system addresses this problem by simplifying the integration of WSNs into business processes. Developers use BPMN models extended with WSN-specific constructs to specify the application behavior across both traditional business process execution environments and the WSN itself, which is to be equipped with application-specific software. We compile these models into a high-level intermediate language-Also directly usable by WSN developers-And then into OS-specific deployment-ready binaries. Key to this process is the notion of meta-Abstraction, which we define to capture fundamental patterns of interaction with and within the WSN. The concrete realization of meta-Abstractions is application-specific; developers tailor the system configuration by selecting concrete abstractions out of the existing codebase or by providing their own. Our evaluation of makeSense shows that i) users perceive our approach as a significant advance over the state of the art, providing evidence of the increased developer productivity when using makeSense; ii) in large-scale simulations, our prototype exhibits an acceptable system overhead and good scaling properties, demonstrating the general applicability of makeSense; and, iii) our prototype-including the complete tool-chain and underlying system support-sustains a real-world deployment where estimates by domain specialists indicate the potential for drastic reductions in the total cost of ownership compared to wired and conventional WSN-based solutions.

  • 42.
    Mottola, Luca
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Baresi, Luciano
    Ghezzi, Carlo
    Anquiro: Enabling Efficient Static Verification of Sensor Network Software2010Conference paper (Refereed)
  • 43.
    Oikonomou, George
    et al.
    University of Bristol, UK.
    Duquennoy, Simon
    RISE Research Institutes of Sweden. Inria Lille, Framce.
    Elsts, Atis
    Institute of Electronics and Computer Science, Latvis.
    Eriksson, Joakim
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    Tanaka, Yasuyuki
    Toshiba Corporate Research and Development Center, Japan.
    Tsiftes, Nicolas
    RISE Research Institutes of Sweden, Digital Systems, Data Science.
    The Contiki-NG open source operating system for next generation IoT devices2022In: SoftwareX, E-ISSN 2352-7110, Vol. 18, article id 101089Article in journal (Refereed)
    Abstract [en]

    Contiki-NG (Next Generation) is an open source, cross-platform operating system for severely constrained wireless embedded devices. It focuses on dependable (reliable and secure) low-power communications and standardised protocols, such as 6LoWPAN, IPv6, 6TiSCH, RPL, and CoAP. Its primary aims are to (i) facilitate rapid prototyping and evaluation of Internet of Things research ideas, (ii) reduce time-to-market for Internet of Things applications, and (iii) provide an easy-to-use platform for teaching embedded systems-related courses in higher education. Contiki-NG started as a fork of the Contiki OS and retains many of its original features. In this paper, we discuss the motivation behind the creation of Contiki-NG, present the most recent version (v4.7), and highlight the impact of Contiki-NG through specific examples. © 2022 The Authors

  • 44. Oikonomou, George
    et al.
    Duquennoy, Simon
    Elsts, Atis
    Eriksson, Joakim
    RISE Research Institutes of Sweden, Kista, Sweden.
    Tanaka, Yasuyuki
    Tsiftes, Nicolas
    RISE.
    The Contiki-NG open source operating system for next generation IoT devices2022In: SoftwareX, ISSN 2352-7110, Vol. 18, article id 101089Article in journal (Refereed)
    Abstract [en]

    Contiki-NG (Next Generation) is an open source, cross-platform operating system for severely constrained wireless embedded devices. It focuses on dependable (reliable and secure) low-power communications and standardised protocols, such as 6LoWPAN, IPv6, 6TiSCH, RPL, and CoAP. Its primary aims are to (i) facilitate rapid prototyping and evaluation of Internet of Things research ideas, (ii) reduce time-to-market for Internet of Things applications, and (iii) provide an easy-to-use platform for teaching embedded systems-related courses in higher education. Contiki-NG started as a fork of the Contiki OS and retains many of its original features. In this paper, we discuss the motivation behind the creation of Contiki-NG, present the most recent version (v4.7), and highlight the impact of Contiki-NG through specific examples.

    Download full text (pdf)
    fulltext
  • 45.
    Pettinato, Paolo
    et al.
    RISE, Swedish ICT, SICS.
    Wirström, Niklas
    RISE, Swedish ICT, SICS.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Multi-Channel Two-way Time of Flight Sensor Network Ranging2012Conference paper (Refereed)
    Abstract [en]

    Two-way time of flight (ToF) ranging is one of the most interesting approaches for localization in wireless sensor networking since previous ToF ranging approaches using commercial off-the-shelf (COTS) devices have achieved good accuracy. The COTS-based approaches were, however, evaluated only in line-of-sight conditions. In this paper, we extend ToF ranging using multiple IEEE 802.15.4 channels. Our results demonstrate that with multiple channels we can achieve good accuracy even in non line-of-sight conditions. Furthermore, our measurements suggest that the variance between different channels serves as a good estimate of the accuracy of the measurements, which can be valuable information for applications that require localization information.

    Download full text (pdf)
    FULLTEXT01
  • 46.
    Pinol Pinol, Oriol
    et al.
    Yanzi Networks AB, Sweden.
    Raza, Shahid
    RISE, Swedish ICT, SICS, Security Lab.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory. Yanzi Networks AB, Sweden.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory. Uppsala University, Sweden.
    BSD-based Elliptic Curve Cryptography for the Open Internet of Things2015In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015, 6, article id 7266475Conference paper (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is the interconnection of everyday physical objects with the Internet and their representation in the digital world. Due to the connectivity of physical objects with the untrusted Internet, security has become an important pillar for the success of IoT-based services. Things in the IoT are resource-constrained devices with limited processing and storage capabilities. Often, these things are battery powered and connected through lossy wireless links. Therefore, lightweight and efficient ways of providing secure communication in the IoT are needed. In this context, Elliptic Curve Cryptography (ECC) is considered as a strong candidate to provide security in the IoT while being able to function in constrained environments. In this paper we present a lightweight implementation and evaluation of ECC for the Contiki OS. For fast, secure and cost-effective mass development of IoT-based services by different vendors, it is important that the IoT protocols are implemented and released as open source and open licensed. To the best of our knowledge our ECC is the first lightweight BSD-licensed ECC for the IoT devices. We show the feasibility of our implementation by a thorough performance analysis using several implementations and optimization algorithms. Moreover, we evaluate it on a real IoT hardware platform.

  • 47.
    Piñol Piñol, Oriol
    et al.
    Yanzi Networks AB, Sweden.
    Raza, Shahid
    RISE, Swedish ICT, SICS, Security Lab.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory. Yanzi Networks AB, Sweden.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    BSD-based ECC for the Contiki OS2015In: EWSN 2015: Posters and Demos, 2015, 6, p. 15-16Conference paper (Refereed)
    Abstract [en]

    Security has arisen as an important issue for the Internet of Things (IoT). Efficient ways to provide secure communication between devices and sensors is crucial for the IoT devices, which are becoming more and more used and spread in a variety of fields. In this context, Elliptic Curve Cryptography (ECC) is considered as a strong candidate to provide security while being able to be functional in an environment with strong requirements and limitations such as wireless sensor networks (WSN). Furthermore, it is a valid candidate to be used in industry solutions.

    In this demo we show a real use case of Elliptic Curve Cryptography for key establishment in combination with symmetric AES encryption. The demo will show the use of a BSD-licensed ECC library for the Contiki OS running on Yanzi Networks Contiki-based nodes that will securely communicate with a Yanzi Gateway.

  • 48. Sadeh, Norman M.
    et al.
    Arunachalam, Raghu
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Janson, Sverker
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    TAC-03: a supply-chain trading competition2003In: The AI Magazine, ISSN 0738-4602, Vol. 24, no 1, p. 92-94Article in journal (Refereed)
    Abstract [en]

    The Trading Agent Competition (TAC) has now become an annual fixture since its inception in 2000. The competition was conceived with the objective of studying automated trading strategies by focusing the research community on the development of competing solutions to a common trading scenario. The success of past TAC events has motivated broadening the scope of the competition beyond the context of the travel agent scenario used thus far. For the fourth edition of this competition, TAC-03, to be held in August 2003, the authors have created a novel supply-chain trading game with the aim of investigating automated agents in the context of dynamic supply-chain management.

  • 49.
    Tsiftes, Nicolas
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Poster Abstract: Low-Power Wireless IPv6 Routing with ContikiRPL2010Conference paper (Refereed)
    Download full text (pdf)
    fulltext
  • 50.
    Tsiftes, Nicolas
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Höglund, Joel
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    A Framework for Low-Power IPv6 Routing Simulation, Experimentation, and Evaluation2010Conference paper (Refereed)
    Abstract [en]

    Low-power networked devices, such as sensors and actuators, are becoming a vital part of our everyday infrastructure. Being networked, the continued development of these systems needs involvement of the networking community. We present a framework for simulation, experimentation, and evaluation of routing mechanisms for low-power IPv6 networking. The framework provides a detailed simulation environment for low-power routing mechanisms and allows the system to be directly uploaded to a physical testbed for experimental measurements.

12 1 - 50 of 62
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf