DEPENDABLE INTERNET OF THINGS FOR NETWORKED CARS
DOI:
https://doi.org/10.47839/ijc.16.4.911Keywords:
Dependability, Internet of Things, Car2X, UWB, Security, Testing, Networked Control.Abstract
The Internet of Things (IoT) extends the Internet to include also wireless embedded computers that are often equipped with sensors and actuators to monitor and control their physical environment. The IoT is increasingly used for safety-critical applications such as smart factories or networked cars, where a failure of the IoT may lead to catastrophic consequences. The IoT is therefore in urgent need of dependability, where reliability, availability, and security properties can be guaranteed even in harsh environments (e.g., radio interference) and under deliberate attacks (e.g., exploiting side channels). In this paper we give an overview of recent research activities in the LEAD project “Dependable Internet of Things in Adverse Environments” towards a dependable IoT, specifically dependable wireless communication and localization using Ultra-Wide-Band technology, secure execution of real-time software, protocol testing and verification, and dependable networked control. We also present the TruckLab testbed, where our research results can be integrated and validated in a platooning use case. In this testbed, model trucks are automatically controlled to follow a lead truck.References
B. Kempke, et al., “SurePoint: Exploiting ultra wideband flooding and diversity to provide robust, scalable, high-fidelity indoor localization,” Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, 2016.
S. Marano, W. M. Gifford, H. Wymeersch and M. Z. Win, “NLOS identification and mitigation for localization based on UWB experimental data,” IEEE Journal on Selected Areas in Communications, Vol. 28, No. 7, pp. 1026-1035, 2010.
Decawave, [Online]. Available: http://www.decawave.com.
Y. Yarom, D. Genkin and N. Heninger, “CacheBleed: a timing attack on OpenSSL constant-time RSA,” Journal of Cryptographic Engineering, Vol. 7, No. 2, pp. 99-112, 2017.
G. Doychev, B. Köpf, L. Mauborgne and J. Reineke, “CacheAudit: A tool for the static analysis of cache side channels,” ACM Transactions on Information and System Security, Vol. 18, No. 1, pp. 4:1-4:32, 2015.
G. V. Bochmann and A. Petrenko, “Protocol testing: review of methods and relevance for software testing,” Proceedings of the 1994 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 109-124, 1994.
B. Steffen, F. Howar, and M. Merten, “Introduction to active automata learning from a practical perspective,” Lecture Notes in Computer Science, Vol. 6659, pp. 256–296, 2011.
M. Tappler, B. K. Aichernig, and R. Bloem, “Model-based testing IoT communication via active automata learning,” Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, pp. 276–287, 2017.
B. K. Aichernig, M. Tappler, “Learning from faults: Mutation testing in active automata learning,” Lecture Notes in Computer Science, Vol. 10227, pp. 19–34, 2017
B. K. Aichernig, M. Tappler, “Probabilistic black-box reachability checking,” Lecture Notes in Computer Science, Vol. 10548, 2017.
Edited by Andrew Banks and Rahul Gupta, “MQTT Version 3.1.1. OASIS Standard”, October 2014.
D. Angluin, “Learning regular sets from queries and counterexamples,” Inf. Comput., Vol. 75, No. 2, pp. 87–106, 1987.
Mosquitto, [Online]. Available: https://mosquitto.org/.
HBMQTT, [Online]. Available: https://github.com/beerfactory/hbmqtt.
J. Ludwiger, et. al., “Towards networked sliding mode control,” Proceedings of the 56th IEEE Conference on Decision and Control, 2017.
Tamiya Modelltrucks, [Online]. Available: http://www.tamiya.de/de/produkte/rcmodelltrucks.htm.
BeagleBone Black Board, [Online]. Available: https://beagleboard.org/black.
MATLAB Support Package for BeagleBone Black Hardware, [Online]. Available: https://de.mathworks.com/help/supportpkg/beagleboneio/.
A. Manecy, N. Marchand, and S. Viollet. “RT-MaG: An open-source SIMULINK toolbox for linux-based real-time robotic applications,” Proceedings of the IEEE International Conference on Robotics and Biomimetics (ROBIO 2014), 2014.
RT PREEMPT patch for BeagleBone, [Online]. Available: http://elinux.org/BeagleBoardDebian#Mainline_.284.4.x_lts.29.
Logitech WebCam C930e, [Online]. Available: http://www.logitech.com/de-at/product/c930e-webcam
E. Olson. “AprilTag: A robust and flexible visual fiducial system,” Proceedings of the IEEE International Conference on Robotics and Automation, 2011.
AprilTags C++ Library, [Online]. Available: http://people.csail.mit.edu/kaess/apriltags/
European truck platooning challenge, [Online]. Available: https://www.eutruckplatooning.com.
A. Alam, J. Mårtensson, and K.H. Johansson. “Experimental evaluation of decentralized cooperative cruise control for heavy-duty vehicle platooning,” Control Engineering Practice, Vol. 38, pp. 11–25, 2015.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.