Skip to main content

2017 | Buch

Advances in Network Systems

Architectures, Security, and Applications

insite
SUCHEN

Über dieses Buch

This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

Inhaltsverzeichnis

Frontmatter
Network Architectures, Security, and Applications: An Introduction
Abstract
Owing to the ever growing communication systems, modern networks currently encompass a wide range of solutions and technologies, including wireless and wired networks and provide basis for network systems from multiple partly overlapping domains such as the Internet of Things (IoT), cloud services, and network applications. This appears in numerous active research areas with particular attention paid to the architecture and security of network systems. In parallel, novel applications are developed, in some cases strongly linked to rapidly developing network-based data acquisition and processing frameworks. This chapter presents a general introduction to the topics of network architectures, security, and applications in addition to short descriptions of the chapters included in this volume.
Maciej Grzenda, Janusz Furtak, Jarosław Legierski, Ali Ismail Awad

Network Architectures

Frontmatter
An Analytical Method of Server Placement in Regular Networks and Its Evaluation by Simulation Experiments
Abstract
In the paper, the problem of determining the optimal server placement in the hypercube network structure and its influence on the values of some performance metrics is investigated. The method for the optimal server placement is proposed. It consists of two phases: in the first one the server placement is determined and in the second phase the appropriate communication structure is generated. The usefulness of the method has been verified through simulation experiments prepared and performed in Riverbed Modeler environment. Some results of these simulation tests for exemplary structures along with degradation of the 4-dimensional hypercube network are presented.
Jan Chudzikiewicz, Tomasz Malinowski, Zbigniew Zieliński
Model and Case Studies of the Runtime UI Adaptation Process in Client-Server Systems
Abstract
The increasing diversity of end devices used by users to access their applications and systems strengthens the need for device-independent methods for implementing these applications. The Device-Independent Architecture (DIA) is one of the available approaches to this problem, but it does not directly address the issue of user interface (UI) device-independency. This issue can be addressed by runtime UI adaptation, but it is not clear whether the DIA architecture requires new UI adaptation methods or may use existing ones. Through theoretical model-based analysis of UI adaptation in various client-server systems and through case studies of practical UI adaptation solutions we came up with a conclusion that the DIA-based systems may use existing runtime UI adaptation methods. However, they have to be used with a different set of optimization criteria.
Jacek Chmielewski
Analysis of TCP Connection Performance Using Emulation of TCP State
Abstract
Transmission Control Protocol (TCP) is still used by vast majority of Internet applications. However, the huge increase in bandwidth availability during the last decade has stimulated the evolution of TCP and introduction of new versions, better suited for high speed networks. Many factors can influence the performance of TCP protocol, starting from scarcity of network resources, through client or server misconfiguration, to internal limitations of applications. Proper identification of the TCP performance bottlenecks is therefore an important challenge for network operators. In the paper we proposed the methodology for finding root causes of throughput degradation in TCP connections using passive measurements. This methodology was verified by experiments conducted in a live network with 4G wireless Internet access. The paper also presents selected details of its practical implementation.
Andrzej Bąk, Piotr Gajowniczek, Michał Zagożdżon
Firefly-Based Universal Synchronization Algorithm in Wireless Sensor Network
Abstract
Application areas of Wireless Sensor Network are spread in so many fields that the creation of an universal WSN is a big and challenging problem. But what unites almost all major solutions is the need for communication at some certain time slot or the need for communication between the nodes. Nodes usually have to make measurements, in some cases process the data and send them. Because of the mentioned reasons the synchronization of nodes in network, as well as use of real time communication in network is highly desirable. The detailed explanation of the node level of Firefly-based Universal Synchronization Algorithm and the network level is supported by the simulation results along with the implementation remarks. Then the real-time scheduler for real time operating system in small mobile robotics or WSN with strong modularity is described with features as advanced sleep modes and event driven programming. At the end we represent the basic concept of WSN with use of proposed methods on each node.
Michal Chovanec, Jana Milanová, Lukáš Čechovič, Peter Šarafín, Martin Húdik, Michal Kochláň
Comparison of Various Marker Localization Methods
Abstract
The presented paper is focused on analysis of two methods of marker localization. The markers are passive RFID transponders (without or with identification chip) consisting of tuned LC circuit and being used to mark and trace underground networks such as cables and pipes. Localization of the marker is based on evaluation of signal amplitude received from the excited marker, i.e. it is RSSI based localization method. The excitation of marker can be periodically repeated or continuous. In the first case the localization process consists of two stages—excitation and receiving of marker damped oscillations, in the second case the amplitude of continuously generated excitation signal is decreased by vicinity of the marker. Localization principle based on continuous marker excitation is analysed for serial or parallel resonant circuit of locator antenna. Both localization principles are mathematically analysed by modelling of their circuits using differential equations. The results of analysis are used to compare all methods and to evaluate their suitability for practical utilization. Whereas the markers have various working frequencies the analyses were done for all of them.
Peter Vestenický, Tomáš Mravec, Martin Vestenický
Decomposition Scheme for Flow Design in Photonic Data Transport Networks
Abstract
Development of sophisticated photonic transmission systems enabled evolution of photonic data transport networks towards cost-efficient and energy-efficient platforms capable to carry enormous traffic. Given access to technologically advanced equipment, network operator faces a series of decision problems related to how to efficiently use this technology. In this paper, we propose a mathematical model of network design problem applicable in the context of modern photonic network with wavelength division multiplexing (WDM). The mathematical models presented in the paper are given by means of Mixed-Integer-Programmes (MIPs). We first discuss a straight-forward formulation incorporating link-flow variables. The analysis of several real-size problem instances revealed that a need for a more advanced modeling approach, which will deliver problem formulations tractable by available hardware and solvers. Appropriate model was developed using Dantzing-Wolfe decomposition method. The resulting model uses link-flow based variables and incorporates significantly less constraints and variables if compared to the non-decomposed version.
Andrzej Bąk, Mateusz Dzida

Network Security

Frontmatter
Secure Transmission in Wireless Sensors’ Domain Supported by the TPM
Abstract
Wireless sensor networks are an essential component of the fast-growing Internet of Things. The nodes of such network usually have small energy resources and do not have big computing power. The big challenge is to secure transmissions between nodes of the network and continuous authentication of nodes in data link layer of such network. This paper presents a proposal to solve this kind of problem using TPM in the domain of sensors. A model of wireless sensor network as well as operations associated with authentication in the sensors domain are presented. Additionally, an implementation of selected operations in the sensors domain is described. The test environment including the construction of nodes equipped with the TPM and obtained results related to the transmission delay time and power consumption are presented.
Janusz Furtak, Jan Chudzikiewicz
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
Abstract
Tactical networks are typically of an ad-hoc nature operating in highly restricted environments and constrained resources. The frequent presence of communication disruptions and network partitioning must also be expected and managed, while core functionalities must be maintained, providing asynchronous invocation and access to services in a distributed manner. Supporting the required functionalities of the contemporary tactical environment, requires the dynamic evaluation of security policies, incorporating semantic knowledge from various network layers, together with facts and rules that are defined axiomatically a priori. However, the required basis for such policy decisions can be excessively extended and dynamic. Thus, it is desirable to locally minimize the scope of the policy maximizing efficiency. In this paper, we therefore analyze criteria and optimization goals for the a priori distribution and partitioning of security policies, ensuring the continuous support of the required capabilities, given the operational tasks of each deployed actor.
Vasileios Gkioulos, Stephen D. Wolthusen
Practical Extensions of Trust Management Credentials
Abstract
Trust management is a unified approach to access control in open distributed systems, where decisions connected with access control are based on policy statements made by many principals. The family of Role-based Trust management languages (RT) is an effective means for representing security policies, credentials and relationship in distributed, decentralized, large scale access control systems. It delivers a set of role assignment credentials and is used in systems where the identities of users are not the most important form of identification. A credential gives information about the privileges of users and the security policies issued by (usually more than one) trusted authorities. The main purpose of this article is to show how some credential extensions can make a trust management system more useful in practice. It shows how security systems can be made more realistic by maintaining the procedure or including timing information.
Anna Felkner, Adam Kozakiewicz
Performance and Energy Consumption Analysis of AES in Wireless Sensor Networks
Abstract
With WSN deployments increasing in popularity, securing those deployments becomes a necessity. This can be achieved by encrypting inter-node communications and/or using message authentication codes. AES is a well studied symmetric cipher, with no known practical vulnerabilities, that can be used to solve both problems. We provide an optimized implementation of AES, with five modes of operation for encryption (ECB, CBC, CFB, CTR and GCM) and two modes for authentication (CBC-MAC and GCM-MAC), that use the hardware accelerator available on the ATmega128RFA1 microcontroller, and compare it with the best known software implementation. We show that our hardware AES implementation is both faster and more energy efficient than a software implementation. This is not the case for previous sensor nodes and implementations, which show an improved execution speed, but with a higher energy consumption. We also show that our implementation of CTR is faster and more energy efficient than the unsecure fully hardware-supported ECB mode.
Dan Dragomir, Cristina Panait
Computer Support for Risk Management in Critical Infrastructures
Abstract
The paper deals with a methodology for the assessment and management of risk in critical infrastructures. A ready-made risk manager, which supports information security- and business continuity management systems, was adapted to a new application domain—critical infrastructure protection and was used in the EU Ciras project as one of its three basic pillars. First, the author reviewed security issues in critical infrastructures, with special focus on risk management. On this basis the assumptions were discussed how to adapt the ready-made risk manager for this domain. The experimentation tool was configured, including risk measures and system dictionaries. The operations of the tool were illustrated by examples from a case study performed in a previous work. The case study dealt with the collaborating railway- and energy critical infrastructures. The aim of this research is to assess the usefulness of such approach and to acquire knowledge for future project works.
Andrzej Bialas
An Innovative Web Platform for Flood Risk Management
Abstract
This paper presents an innovative real-time information system for enhanced support to flood risk emergency in urban and nearby coastal areas, targeting multiple users with distinct access privileges. The platform addresses several user requirements such as (1) fast, online access to relevant georeferenced information from wireless sensors, high-resolution forecasts and comprehensive risk analysis; and, (2) the ability for a two-way interaction with civil protection agents in the field. The platform adapts automatically and transparently to any device with data connection. Given its specific purpose, both data protection and tailored-to-purpose products are accounted for through user specific access roles. This paper presents the platform’s overall architecture and the technologies adopted for server-side, focusing on communication with the front-end and with the wireless sensor network, and the user interface development, using state-of-the-art frameworks for cross-platform standardized development. The advantages of the adopted solution are demonstrated for the Tagus estuary inundation information system.
João L. Gomes, Gonçalo Jesus, João Rogeiro, Anabela Oliveira, Ricardo Tavares da Costa, André B. Fortunato

Network Applications

Frontmatter
A Distributed Active Vibration Control System Based on the Wireless Sensor Network for Automotive Applications
Abstract
This paper presents a new approach of an adaptive vibration control system for automotive applications. We assume that a porting of a centralised system in a distributed system can improve its effectiveness. We present a wireless sensor network (WSN) for vibrations damping. These autonomous sensors are able to measure the vibrations, damp the vibrations and to harvest energy from vibrations by using a single piezoelectric element. We present the simulations and the measurements results. The new approach of distributed active vibration control system based on the wireless sensor network is presented. The designed distributed wireless network node reduces the vibrations of the plate with the efficiency up to 9.4 dB.
M. Zielinski, F. Mieyeville, D. Navarro, O. Bareille
Improvements of Video Delay in OTT Live TV Service
Abstract
The goal of this paper is to understand and quantify the end-to-end delay observed by users of Over The Top (OTT) Live TV services, using Adaptive Bit Rate (ABR) technology. The analysis and testbed measurements reveal to what extend the main architecture elements—encoder, packager, Content Delivery Network (CDN) and player—contribute to this overall delay. Some improvements at the architecture level and encoder implementation are proposed and partially evaluated by field experiments.
Marek Dąbrowski, Robert Kołodyński, Wojciech Zieliński, Raoul Monnier, Patrick Marchal
Power Aware MOM for Telemetry-Oriented Applications—Levee Monitoring Use Case
Abstract
The paper discusses the problem of the message-oriented middleware utilization in telemetry systems. The authors provide a survey and practical measurements of common data transmission protocols for telemetry applications and wireless sensing. Based on that survey the authors propose concepts of message aggregation mechanisms to improve power consumption of the data transmission channel. As the entry point, the authors assume the utilization of the MQTT protocol. The concepts described in this paper have been successfully implemented in a smart levee monitoring system.
Tomasz Szydlo, Piotr Nawrocki, Robert Brzoza-Woch, Krzysztof Zielinski
Monitoring Drip Irrigation System Using Wireless Sensor Networks
Abstract
Recently, adopting an optimized irrigation system has become a necessity due to the lack of the world water resource. Moreover, many researchers have treated this issue to improve the irrigation system by coupling the novel technologies from the information and communication field with the agricultural practices. The Wireless Sensor and Actuators Networks (WSANs) present a great example of this fusion. In this paper, we present a model architecture for a drip irrigation system using the WSANs. Our model includes the soil moisture, temperature and pressure sensors to monitor the irrigation operations. Specifically, we study the case where a system malfunction occurs, as when the pipes burst or the emitters are blocked. Furthermore, we differentiate two main traffic levels for the information transmitted by the WSAN, and by using an adequate priority-based routing protocol, we can achieve high QoS performances for the priority information. We have performed extensive simulations through TOSSIM simulators. The results show that our solution gives better performances in terms of delay and packet delivery ratio. Also we have realized a real test-bed to investigate the effectiveness of our approach. The experimentation results show considerable gain compared to other state-of-the-art protocol.
I. Bennis, H. Fouchal, O. Zytoune, D. Aboutajdine
BARBEI: A New Adaptive Battery Aware and Reliable Beacon Enabled Technique for IEEE 802.15.4 MAC
Abstract
The IEEE 802.15.4 standard supports both physical and Media Access Control (MAC) layers of low rate Wireless Sensor Networks (WSNs). However, this standard considers only the ideal linear power consumption, omitting the fact that the diffusion principle in batteries shows the nonlinear process when it releases a charge. Thus, this study proposes a technique that improves the performance of the IEEE 802.15.4 standard by allowing its MAC to exploit the nonlinear processes of the battery to prolong the WSN lifetime. To the best of our knowledge, the proposed technique is the first that considers both the battery status and network latency status through a cross layer model. The performance of the new algorithm has been examined and compared against that of the legacy IEEE 802.15.4 MAC algorithm through extensive simulation experiments. The results show that the new technique reduces significantly the energy consumption and the average End-to-End delay as well.
Marwa Salayma, Ahmed Al-Dubai, Imed Romdhani, Muneer Bani Yassein
A Multisource Energy Harvesting Platform for Wireless Methane Sensor
Abstract
Sensors used for detecting combustible gases consume significant amounts of power. Energy management for these sensors can become an important issue when they are used as part of a wireless sensor network. This is because of the fact that wireless sensors are usually powered by batteries. Batteries have a finite lifetime and their replacement can take a considerable amount of time in a gas monitoring application where thousands of sensor nodes are deployed to measure the concentration of flammable gases. Moreover, the battery replacement procedure can turn into a more complicated task if the gas monitoring network is located in a harsh environment. Energy harvesting is a method which can increase the operation time of wireless gas sensor networks. In this article, we present a multisource harvesting circuit for a wireless gas sensor node. As for ambient sources, we have chosen solar and wind energy. Energy from ambient sources is stored in supercapacitors which have a capacity of 400 F. We prove that a catalytic gas sensor can operate for 2 days without batteries by using the developed scheme.
Saba Akbari, Denis Spirjakin, Vladimir Sleptsov, Alexey Savkin
Backmatter
Metadaten
Titel
Advances in Network Systems
herausgegeben von
Maciej Grzenda
Ali Ismail Awad
Janusz Furtak
Jarosław Legierski
Copyright-Jahr
2017
Electronic ISBN
978-3-319-44354-6
Print ISBN
978-3-319-44352-2
DOI
https://doi.org/10.1007/978-3-319-44354-6

Premium Partner