miun.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Österberg, Patrik
Publications (10 of 39) Show all publications
Farag, H., Gidlund, M. & Österberg, P. (2019). DeP-D: A Decentralized Primal-Dual Optimization Algorithm for Industrial Wireless Sensor Networks. In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS): . Paper presented at 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, 27-29 May, 2019. IEEE, Article ID 8757934.
Open this publication in new window or tab >>DeP-D: A Decentralized Primal-Dual Optimization Algorithm for Industrial Wireless Sensor Networks
2019 (English)In: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, article id 8757934Conference paper, Published paper (Refereed)
Abstract [en]

Industrial Wireless Sensor Networks (IWSNs) are emerged as flexible and cost-efficient alternatives to the traditional wired networks in various monitoring and control applications within the industrial domain. Low delay is a key feature of delay-sensitive applications as the data is typically valid for a short interval of time. If data arrives too late it is of limited use which may lead to performance drops or even system outages which can create significant economical losses. In this paper, we propose a decentralized optimization algorithm to minimize the End-to-End (E2E) delay of multi-hop IWSNs. Firstly, we formulate the optimization problem by considering the objective function as the network delay where the constraint is the stability criteria based on the total arrival rate and the total service rate. The objective function is proved to be strictly convex for the entire network, then a Decentralized Primal-Dual (DeP-D) algorithm is proposed based on the sub-gradient method to solve the formulated optimization problem. The performance of the proposed DeP-D is evaluated through simulations and compared with WirelessHART network and the results show that the proposed DeP-D can achieve at least 40% reduction in the average E2E delay.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
IWSN, Optimization, Sheduling, Protocol, Delay
National Category
Communication Systems
Identifiers
urn:nbn:se:miun:diva-36761 (URN)10.1109/WFCS.2019.8757934 (DOI)2-s2.0-85070111073 (Scopus ID)978-1-7281-1268-8 (ISBN)
Conference
15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, 27-29 May, 2019
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)TIMELINESS
Funder
European Regional Development Fund (ERDF)Knowledge Foundation
Available from: 2019-07-29 Created: 2019-07-29 Last updated: 2019-09-09Bibliographically approved
Butun, I. & Österberg, P. (2019). Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions. In: Riaz Ahmed Shaikh (Ed.), Secure Cyber-Physical Systems for Smart Cities: (pp. 74-102). Hershey, USA: IGI Global
Open this publication in new window or tab >>Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions
2019 (English)In: Secure Cyber-Physical Systems for Smart Cities / [ed] Riaz Ahmed Shaikh, Hershey, USA: IGI Global, 2019, p. 74-102Chapter in book (Refereed)
Abstract [en]

Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.

Place, publisher, year, edition, pages
Hershey, USA: IGI Global, 2019
Keywords
cyber-physical, security, IDS, smart cities
National Category
Computer Systems Communication Systems Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:miun:diva-36056 (URN)10.4018/978-1-5225-7189-6 (DOI)9781522571896 (ISBN)
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Available from: 2019-04-27 Created: 2019-04-27 Last updated: 2019-09-09Bibliographically approved
Butun, I., Österberg, P. & Gidlund, M. (2019). Preserving location privacy in cyber-physical systems. In: 2019 IEEE Conference on Communications and Network Security (CNS): . Paper presented at 2019 IEEE Conference on Communications and Network Security (CNS), Washington DC, DC, USA, 10-12 June 2019 (pp. 1-6). IEEE
Open this publication in new window or tab >>Preserving location privacy in cyber-physical systems
2019 (English)In: 2019 IEEE Conference on Communications and Network Security (CNS), IEEE, 2019, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]

The trending technological research platform is Internet of Things (IoT)and most probably it will stay that way for a while. One of the main application areas of IoT is Cyber-Physical Systems (CPSs), in which IoT devices can be leveraged as actuators and sensors in accordance with the system needs. The public acceptance and adoption of CPS services and applications will create a huge amount of privacy issues related to the processing, storage and disclosure of the user location information. As a remedy, our paper proposes a methodology to provide location privacy for the users of CPSs. Our proposal takes advantage of concepts such as mix-zone, context-awareness, and location-obfuscation. According to our best knowledge, the proposed methodology is the first privacy-preserving location service for CPSs that offers adaptable privacy levels related to the current context of the user.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
cyber-physical systems, data privacy, Internet of Things, location based services, mobile computing, location privacy, CPSs, IoT devices, actuators, sensors, public acceptance, user location information, location-obfuscation, privacy-preserving location service, mix-zone, context-awareness, public adoption, CPS, IoT, location obfuscation, security, trust, vulnerabilities
National Category
Engineering and Technology
Identifiers
urn:nbn:se:miun:diva-37174 (URN)10.1109/CNS.2019.8802666 (DOI)2-s2.0-85071727543 (Scopus ID)
Conference
2019 IEEE Conference on Communications and Network Security (CNS), Washington DC, DC, USA, 10-12 June 2019
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Available from: 2019-09-09 Created: 2019-09-09 Last updated: 2019-09-24Bibliographically approved
Farag, H., Sisinni, E., Gidlund, M. & Österberg, P. (2019). Priority-Aware Wireless Fieldbus Protocol for Mixed-Criticality Industrial Wireless Sensor Networks. IEEE Sensors Journal, 19(7), 2767-2780
Open this publication in new window or tab >>Priority-Aware Wireless Fieldbus Protocol for Mixed-Criticality Industrial Wireless Sensor Networks
2019 (English)In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 19, no 7, p. 2767-2780Article in journal (Refereed) Published
Abstract [en]

Industrial wireless sensor networks are becoming popular for critical monitoring and control applications in industrial automation systems. For such type of applications, providing reliable real-time performance regarding data delivery is considered as a fundamental challenge. The problem becomes more prominent with mixed-criticality systems, where different data flow with different levels of criticality (importance) coexist and characterized by different requirements regarding delay and reliability. In this paper, we propose a wireless fieldbus protocol to enable real-time communication and service differentiation for cluster-based mixed-criticality networks. A process monitoring scenario of plastic extrusion is used to define the protocol requirements and elaborate the working principle of the proposed work. In our proposed protocol, each data flow is scheduled for channel access based on its criticality level using a distributed prioritized medium access mechanism that ensures a guaranteed channel access for the most critical traffic over other traffic types. The performance of the proposed protocol is analyzed analytically using a discrete-time Markov chain model to evaluate the performance in terms of delay and throughput. Moreover, the extensive simulations are conducted to prove the analytical claims and different performance assessments are provided, which also demonstrate the effectiveness of the proposed approach compared with the related existing work.

Keywords
Industrial wireless sensor networks, mixed-criticality systems, real-time, wireless fieldbus
National Category
Communication Systems
Identifiers
urn:nbn:se:miun:diva-35807 (URN)10.1109/JSEN.2018.2888729 (DOI)000460683600042 ()2-s2.0-85058876428 (Scopus ID)
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Note

Available from: 2019-03-19 Created: 2019-03-19 Last updated: 2019-10-16Bibliographically approved
Butun, I., Sari, A. & Österberg, P. (2019). Security Implications of Fog Computing on the Internet of Things. In: International Conference on Consumer Electronics (ICCE): . Paper presented at ICCE 2019, IEEE 37th International Conference on Consumer Electronics (ICCE), Jan 11- 13, 2019, Las Vegas, NV, USA. IEEE, Article ID 8661909.
Open this publication in new window or tab >>Security Implications of Fog Computing on the Internet of Things
2019 (English)In: International Conference on Consumer Electronics (ICCE), IEEE, 2019, article id 8661909Conference paper, Published paper (Refereed)
Abstract [en]

Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications. Index Terms—IoT, IIoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability.

Place, publisher, year, edition, pages
IEEE, 2019
Series
IEEE International Symposium on Consumer Electronics
Keywords
IoT, ItoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:miun:diva-34863 (URN)000462912600020 ()2-s2.0-85063790412 (Scopus ID)978-1-5386-7910-4 (ISBN)
Conference
ICCE 2019, IEEE 37th International Conference on Consumer Electronics (ICCE), Jan 11- 13, 2019, Las Vegas, NV, USA
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Available from: 2018-11-08 Created: 2018-11-08 Last updated: 2019-09-09Bibliographically approved
Farag, H., Gidlund, M. & Österberg, P. (2018). A Delay-Bounded MAC Protocol for Mission- and Time-Critical Applications in Industrial Wireless Sensor Networks. IEEE Sensors Journal, 18(6), 2607-2616
Open this publication in new window or tab >>A Delay-Bounded MAC Protocol for Mission- and Time-Critical Applications in Industrial Wireless Sensor Networks
2018 (English)In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 18, no 6, p. 2607-2616Article in journal (Refereed) Published
Abstract [en]

Industrial Wireless Sensor Networks (IWSNs) designedfor mission- and time-critical applications require timelyand deterministic data delivery within stringent deadline bounds.Exceeding delay limits for such applications can lead to system malfunction or ultimately dangerous situations that can threaten human safety. In this paper, we propose SS-MAC, an efficient slot stealing MAC protocol to guarantee predictable and timely channel access for time-critical data in IWSNs. In the proposed SS-MAC, aperiodic time-critical traffic opportunistically steals time slots assigned to periodic non-critical traffic. Additionally, a dynamic deadline-based scheduling is introduced to provide guaranteed channel access in emergency and event-based situations where multiple sensor nodes are triggered simultaneously to transmit time-critical data to the controller. The proposed protocol is evaluated mathematically to provide the worst-case delay bound for the time-critical traffic. Performance comparisons are carried out between the proposed SS-MAC and WirelessHARTstandard and they show that, for the time-critical traffic, theproposed SS-MAC can achieve, at least, a reduction of almost 30% in the worst-case delay with a significant channel utilization efficiency.

National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:miun:diva-32771 (URN)10.1109/JSEN.2018.2793946 (DOI)000425981100048 ()2-s2.0-85041646182 (Scopus ID)
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Available from: 2018-01-30 Created: 2018-01-30 Last updated: 2019-09-09Bibliographically approved
Beltramelli, L., Mahmood, A., Gidlund, M., Österberg, P. & Jennehag, U. (2018). Interference Modelling in a Multi-Cell LoRa System. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob): . Paper presented at The 14th International Conference on Wireless and Mobile Computing, Networking and Communications, Limassol, Cyprus, October 15-17, 2018. IEEE
Open this publication in new window or tab >>Interference Modelling in a Multi-Cell LoRa System
Show others...
2018 (English)In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, 2018Conference paper, Published paper (Refereed)
Abstract [en]

As the market for low-power wide-area network (LPWAN) technologies expands and the number of connected devices increases, it is becoming important to investigate the performance of LPWAN candidate technologies in dense deployment scenarios. In dense deployments, where the networks usually exhibit the traits of an interference-limited system, a detailed intra- and inter-cell interference analysis of LPWANs is required. In this paper, we model and analyze the performance of uplink communication of a LoRa link in a multi-cell LoRa system. To such end, we use mathematical tools from stochastic geometry and geometric probability to model the spatial distribution of LoRa devices. The model captures the effects of the density of LoRa cells and the allocation of quasi-orthogonal spreading factors (SF) on the success probability of the LoRa transmissions. To account for practical deployment of LoRa gateways, we model the spatial distribution of the gateways with a Poisson point process (PPP) and Matèrn hard-core point process (MHC). Using our analytical formulation, we find the uplink performance in terms of success probability and potential throughput for each of the available SF in LoRa’s physical layer. Our results show that in dense multi-cell LoRa deployment with uplink traffic, the intercell interference noticeably degrades the system performance.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
stochastic geometry, interference modelling, LoRa
National Category
Communication Systems Computer Systems Telecommunications
Identifiers
urn:nbn:se:miun:diva-34715 (URN)10.1109/WiMOB.2018.8589100 (DOI)000459858400010 ()2-s2.0-85060784032 (Scopus ID)978-1-5386-6876-4 (ISBN)
Conference
The 14th International Conference on Wireless and Mobile Computing, Networking and Communications, Limassol, Cyprus, October 15-17, 2018
Projects
TIMELINESS
Funder
Knowledge Foundation
Available from: 2018-10-12 Created: 2018-10-12 Last updated: 2019-03-19Bibliographically approved
Beltramelli, L., Guntupalli, L., Gidlund, M., Österberg, P. & Jennehag, U. (2018). Modeling of Enhanced Distributed Channel Access with Station Grouping: A Throughput Analysis. In: Proc. IEEE 88th Vehicular Technology Conference (VTC'18-fall), Chicago, USA, Aug. 2018.: . Paper presented at IEEE 88th Vehicular Technology Conference (VTC'18-fall), Chicago, USA, 27-30 Aug. 2018. IEEE conference proceedings, Article ID 8690814.
Open this publication in new window or tab >>Modeling of Enhanced Distributed Channel Access with Station Grouping: A Throughput Analysis
Show others...
2018 (English)In: Proc. IEEE 88th Vehicular Technology Conference (VTC'18-fall), Chicago, USA, Aug. 2018., IEEE conference proceedings, 2018, article id 8690814Conference paper, Published paper (Refereed)
Abstract [en]

Machine to Machine (M2M) communication networksare expected to connect a large number of power constrained devices in long range applications with differentquality of service (QoS) requirements. Medium access control with QoS support such as the Enhanced Distributed Channel Access (EDCA) defined by IEEE 802.11e provides traffic differentiation and corresponding priority classes, which guarantees QoSaccording to the needs of applications. In this paper, we employa station grouping mechanism for enhancing the scalability of EDCA to handle the massive number of access attempts expected in large M2M networks. Furthermore, we develop a discrete time Markov chain (DTMC) model to analyze the performance of EDCA with station grouping. Using the developed DTMC model, we calculate throughput for each access category as well as for different combinations of grouping and EDCA parameters. Thenumerical results show that the model can precisely reveal the behavior of EDCA mechanism. Moreover, it is demonstrated that employing the proposed grouping mechanism for EDCA increasesthe normalized throughput significantly for all classes of priority.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2018
Keywords
EDCA, IEEE 802.11e, Grouping, Throughput
National Category
Computer Engineering Communication Systems Telecommunications
Identifiers
urn:nbn:se:miun:diva-34526 (URN)10.1109/VTCFall.2018.8690814 (DOI)2-s2.0-85064912874 (Scopus ID)
Conference
IEEE 88th Vehicular Technology Conference (VTC'18-fall), Chicago, USA, 27-30 Aug. 2018
Projects
TIMELINESSSMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Funder
Knowledge Foundation
Available from: 2018-09-27 Created: 2018-09-27 Last updated: 2019-09-09Bibliographically approved
Farag, H., Mahmood, A., Gidlund, M. & Österberg, P. (2018). PR-CCA MAC: A Prioritized Random CCA MAC Protocol for Mission-Critical IoT Applications. In: 2018 IEEE International Conference on Communications (ICC): . Paper presented at IEEE International Conference on Communications (ICC'18), Kansas, USA, 20-24 May 2018.. IEEE, Article ID 8423018.
Open this publication in new window or tab >>PR-CCA MAC: A Prioritized Random CCA MAC Protocol for Mission-Critical IoT Applications
2018 (English)In: 2018 IEEE International Conference on Communications (ICC), IEEE, 2018, article id 8423018Conference paper, Published paper (Refereed)
Abstract [en]

A fundamental challenge in Mission-Critical Internetof Things (MC-IoT) is to provide reliable and timely deliveryof the unpredictable critical traffic. In this paper, we propose an efficient prioritized Medium Access Control (MAC) protocol for Wireless Sensor Networks (WSNs) in MC-IoT control applications. The proposed protocol utilizes a random Clear Channel Assessment (CCA)-based channel access mechanism to handlethe simultaneous transmissions of critical data and to reduce thecollision probability between the contending nodes, which in turn decreases the transmission latency. We develop a Discrete-Time Markov Chain (DTMC) model to evaluate the performance of the proposed protocol analytically in terms of the expected delay and throughput. The obtained results show that the proposed protocolcan enhance the performance of the WirelessHART standard by 80% and 190% in terms of latency and throughput, respectively along with better transmission reliability.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
IWSN, IoT, Determinism, MAC, Low latency
National Category
Communication Systems Computer Engineering
Identifiers
urn:nbn:se:miun:diva-33671 (URN)10.1109/ICC.2018.8423018 (DOI)2-s2.0-85051413092 (Scopus ID)978-1-5386-3180-5 (ISBN)978-1-5386-3181-2 (ISBN)
Conference
IEEE International Conference on Communications (ICC'18), Kansas, USA, 20-24 May 2018.
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)TIMELINESSASIS
Funder
European Regional Development Fund (ERDF)Knowledge Foundation
Available from: 2018-05-28 Created: 2018-05-28 Last updated: 2019-09-09Bibliographically approved
Forsström, S., Jennehag, U., Österberg, P., Kardeby, V. & Lindqvist, J. (2018). Surveying and Identifying the Communication Platforms of the Internet of Things. In: 2018 Global Internet of Things Summit (GIoTS): . Paper presented at Global Internet of Things Summit, Bilbao, Spain, 4-7 June 2018 (pp. 121-126). IEEE, Article ID 8534556.
Open this publication in new window or tab >>Surveying and Identifying the Communication Platforms of the Internet of Things
Show others...
2018 (English)In: 2018 Global Internet of Things Summit (GIoTS), IEEE, 2018, p. 121-126, article id 8534556Conference paper, Published paper (Refereed)
Abstract [en]

Research and industry invest time and resources in producing Internet of Things-based services, and the concept of Internet of Things platforms is climbing in the hype cycle for emerging technologies. Consequently, there is a vast number of enabling technologies, making it difficult to find the most suitable platform. The aim and goal of this article is to list and identify the currently available communication platforms for the Internet of Things. In this work, we surveyed the area and found over \numTot different platforms for communication of data between things and services, out of which \numProm fulfilled our listed basic requirements for being an IoT communication platform.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
Internet of Things, Standards, Protocols, Security, Industries
National Category
Computer Engineering
Identifiers
urn:nbn:se:miun:diva-34345 (URN)10.1109/GIOTS.2018.8534556 (DOI)000456099600021 ()2-s2.0-85059058415 (Scopus ID)978-1-5386-6451-3 (ISBN)
Conference
Global Internet of Things Summit, Bilbao, Spain, 4-7 June 2018
Projects
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Available from: 2018-09-07 Created: 2018-09-07 Last updated: 2019-09-09Bibliographically approved
Organisations

Search in DiVA

Show all publications