Swipe to navigate through the articles of this issue
Internet of Things (IoT) applications in several domains such as surveillance of civil infrastructure, smart grids, and smart healthcare are of utmost importance for our society and require dependable performance. Guaranteeing that application-specific dependability requirements are met is however still an open research challenge. The IoT indeed exposes highly resource-constrained computing devices to harsh environmental conditions (e.g., heat, mechanical shock, electromagnetic radiation) and physical attacks. Unfortunately, traditional methods to withstand these threats heavily rely on redundancy, a concept that is incompatible with the resource constraints of common IoT devices.
In this article, we illustrate our efforts in providing methods and tools to predict, guarantee, and raise the level of dependability of the IoT. We first outline our contributions in the area of dependable wireless networking and describe a cost-effective solution allowing to guarantee that IoT applications meet specific performance requirements despite the challenging interaction of low-power wireless networks with their surrounding environment.
We then argue that dependable networking alone is insufficient to guarantee the correct operation of a complex IoT system, and outline how we join different scientific disciplines in a long-term endeavor and work towards a coherent view of dependability.
Our product recommendations
Aichernig, B., Bloem, R., Pernkopf, F., Röck, F., Schrank, T., Tappler, M. (2016): Poster: Learning models of a network protocol using neural network language models. IEEE Secur. Priv.
Aigner, R. (2015): Tunable filters? Reality check foreseeable trends in system architecture for tunable RF filters. IEEE Microw. Mag., 16(7).
Avižienis, A., Laprie, J. C., Randell, B., Landwehr, C. (2004): Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput., 1(1).
Beurdouche, B., Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P., Zinzindohoue, J. (2015): A messy state of the union: taming the composite state machines of TLS. IEEE Secur. Priv.
Boano, C. A. (2014): Dependable wireless sensor networks. Ph.D. thesis, Graz University of Technology, Graz, Austria.
Boano, C. A., Römer, K. (2013): External radio interference. In Radio link quality estimation in low-power wireless networks. Springer briefs in electrical and computer engineering.
Boano, C. A., Römer, K., Tsiftes, N. (2014): Mitigating the adverse effects of temperature on low-power wireless protocols. In Proc. of the 11th IEEE MASS conf.
Boano, C. A., Römer, K., et al. (2015): RELYonIT: publishable summary report. Tech. rep.
Boano, C. A., Wennerström, H., et al. (2013): Hot Packets: a systematic evaluation of the effect of temperature on low power wireless transceivers. In Proc. of the 5th ExtremeCom conf.
Dunkels, A. (2011): The ContikiMAC radio duty cycling protocol. Tech. rep. T2011:13, Swedish Institute of Computer Science.
Durumeric, Z., Kasten, J., Adrian, D., Halderman, J., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., Paxson, V. (2014): The matter of heartbleed. In Proc. of the ACM IMC conf.
Geiger, B. (2014): Information loss in deterministic systems. Ph.D. thesis, Graz University of Technology, Graz, Austria.
Joye, M., Tunstall, M. (Eds.) (2012): Fault analysis in cryptography. Information security and cryptography. Berlin: Springer. MATH
Malenko, M., Baunach, M. (2016): Real-time and security requirements for the internet of things operating systems. In Proc. of the ECHTZEIT conf.
Mangard, S., Oswald, E., Popp, T. (2007): Power analysis attacks – revealing the secrets of smart cards. Berlin: Springer. MATH
Oppermann, F. J., Boano, C. A., Zúñiga, M. A., Römer, K. (2015): Automatic protocol configuration for dependable internet of things applications. In Proc. of the 10th IEEE SenseApp workshop.
Mastellone, S., Abdallah, C. T., Dorato, P. (2009): Stochastic control over finite capacity channels: causality and feedback. In Proc. of the ECC2009 conf.
Tang, P. L., de Silva, C. (2006): Compensation for transmission delays in an ethernet-based control network using variable-horizon predictive control. IEEE Trans. Control Syst. Technol., 14(4).
Witrisal, K., Meissner, P., et al. (2016): High-accuracy localization for assisted living: 5G systems will turn multipath channels from foe to friend. IEEE Signal Process. Mag., 33(2).
Zúñiga, M. A., Krishnamachari, B. (2004): Analyzing the transitional region in low-power wireless links. In Proc. of the 1st IEEE SECON conf.
- Dependability for the Internet of Things—from dependable networking in harsh environments to a holistic view on dependability
Carlo Alberto Boano
- Publication date
- Springer Vienna