Refine
Year of publication
Document Type
- Conference Proceeding (145) (remove)
Conference Type
- Konferenzartikel (143)
- Konferenz-Abstract (1)
- Sonstiges (1)
Is part of the Bibliography
- yes (145)
Keywords
- Eingebettetes System (5)
- Kommunikation (5)
- Messung (3)
- Security (3)
- Sensortechnik (3)
- cryptography (3)
- Applikation (2)
- Energieversorgung (2)
- Internet der Dinge (2)
- Internet of Things (2)
- MEMS (2)
- Messtechnik (2)
- NB-IoT (2)
- Netzwerk (2)
- Neural networks (2)
- PKI (2)
- Predictive Maintenance (2)
- TLS (2)
- accelerometer (2)
- certificate management (2)
- efficient training (2)
- printed electronics (2)
- security (2)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 6LoWPAN (1)
- AIN Cantilever (1)
- Abbreviate Injury Scale (1)
- Accident Analysis (1)
- Advanced Driver Assistance System (1)
- Android (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- Automotive engineering (1)
- Bearings (1)
- Blockchain (1)
- Blockchains (1)
- Bussystem (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Car-to-Car-(C2C)-Communication (1)
- Cascading Style Sheets (1)
- Collision Point (1)
- Computerunterstützte Kommunikation (1)
- Cyber Physical Systems, (1)
- Data breech (1)
- Design (1)
- Drahtloses lokales Netz (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Electronic Commerce (1)
- Embedded AI (1)
- Embedded Software (1)
- Embedded Systems (1)
- Energieverbrauch (1)
- Fahrzeug (1)
- Failure analysis (1)
- Fault Classification (1)
- Federated Learning (1)
- Funktechnik (1)
- Gebäudeleittechnik (1)
- Haustechnik (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IEEE802.15.4 (1)
- IIoT (1)
- Implementation (1)
- Industrial Blockchain (1)
- Industrie 4.0 (1)
- IoT Security (1)
- IoT security (1)
- Kabel (1)
- LPWAN (1)
- Leistung (1)
- Load Flow Analysis (1)
- Long Term Evolution (1)
- Machine learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Monitoring (1)
- Monte-Carlo method (1)
- NETCONF security (1)
- Network Test (1)
- Niedrige Energie (1)
- OT security (1)
- PROFINET IO (1)
- PROFINET Security (1)
- Performance evaluation (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Power Loss (1)
- Produktion (1)
- RUL (1)
- Radio frequency (1)
- Real-Time Communication (1)
- Sicherheit (1)
- Sicherheitstechnik (1)
- Signaltechnik (1)
- Simulation (1)
- Smart Energy Metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Strahl (1)
- Synchronisation (1)
- System (1)
- TSN security (1)
- TTCN3 (1)
- Target Vehicle (1)
- Testbed (1)
- Testumgebung (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- TinyOS (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Trust management (1)
- Trägheit (1)
- Ultra-Low Energy (1)
- Ultraweitband (1)
- Umwelt (1)
- Unsupervised Learning (1)
- VRU eSafety (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Wasser (1)
- Wasserstand (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- algorithm-based data analysis (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- car2x networks (1)
- cellular radio (1)
- cluster (1)
- computer network management (1)
- credentials (1)
- crossbar (1)
- cybersecurity (1)
- degradation stages (1)
- dickkopf 3 (1)
- e-Mobilität (1)
- embedded systems (1)
- emulation (1)
- fingerprinting (1)
- gyroscope (1)
- hybrid systems (1)
- identification (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- inertial measurement unit (1)
- kabellos (1)
- localization (1)
- machine learning (1)
- machine-to-machine communication (1)
- metal oxide transistor (1)
- model driven design (1)
- mutual authentication (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- privacy (1)
- radio networks (1)
- real time (1)
- rekeying (1)
- resource efficiency (1)
- secondary surveillance radar (1)
- secure communication (1)
- smart metering (1)
- software defined radio (1)
- sparse backpropagation (1)
- standardization (1)
- subsystem design (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- transmit beamforming (1)
- wide area networks (1)
- Ökologie (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (101)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (88)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (54)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (2)
- Fakultät Medien (M) (ab 22.04.2021) (1)
Open Access
- Closed Access (81)
- Closed (31)
- Open Access (28)
- Bronze (9)
- Diamond (4)
- Gold (1)
One of the main requirements of spatially distributed Internet of Things (IoT) solutions is to have networks with wider coverage to connect many low-power devices. Low-Power Wide-Area Networks (LPWAN) and Cellular IoT(cIOT) networks are promising candidates in this space. LPWAN approaches are based on enhanced physical layer (PHY) implementations to achieve long range such as LoRaWAN, SigFox, MIOTY. Narrowband versions of cellular network offer reduced bandwidth and, simplified node and network management mechanisms, such as Narrow Band IoT (NB-IoT) and Long-Term Evolution for Machines (LTE-M). Since the underlying use cases come with various requirements it is essential to perform a comparative analysis of competing technologies. This article provides systematic performance measurement and comparison of LPWAN and NB-IoT technologies in a unified testbed, also discusses the necessity of future fifth generation (5G) LPWAN solutions.
IPv6 over resource-constrained devices (6Lo) emerged as a de-facto standard for the Internet of Things (IoT) applications especially in home and building automation systems. We provide results of an investigation of the applicability of 6LoWPAN with RPL mesh networks for home and building automation use cases. The proper selection of Trickle parameters and neighbor reachable time-outs is important in the RPL protocol suite to respond efficiently to any path failure. These parameters were analyzed in the context of energy consumption w.r.t the number of control packets. The measurements were performed in an Automated Physical Testbeds (APTB). The results match the recommendation by RFC 7733 for selecting various parameters of RPL protocol suite. This paper shows the relationship between various RPL parameters and control traffic overhead during network rebuild. Comparative measurement results with Bluetooth Low Energy (BLE) in this work showed that 6Lo with RPL outperformed BLE in this use case with less control traffic overheads.
The EREMI project is a 2-year project funded under the ERASMUS+ framework programme and its team has developed and will validate an advanced higher education program, including life-long learning, on the interdisciplinary topic of resource efficiency in manufacturing industries and the overall system optimization of low or not digitized physical infrastructure. All of these will be achieved by applying IoT technologies towards efficient industrial systems, and by utilizing a high-level educated human capital on these economically, politically, and technically crucial and highly relevant topics for the rapidly developing industries and economies of intensively economically and industrially transforming countries - Bulgaria, North Macedonia, and Romania. Efficiency will be attained by utilizing the experience and expertise of the involved German partner organisation.
The importance of machine learning has been increasing dramatically for years. From assistance systems to production optimisation to support the health sector, almost every area of daily life and industry comes into contact with machine learning. Besides all the benefits that ML brings, the lack of transparency and the difficulty in creating traceability pose major risks. While there are solutions that make the training of machine learning models more transparent, traceability is still a major challenge. Ensuring the identity of a model is another challenge. Unnoticed modification of a model is also a danger when using ML. One solution is to create an ML birth certificate and an ML family tree secured by blockchain technology. Important information about training and changes to the model through retraining can be stored in a blockchain and accessed by any user to create more security and traceability about an ML model.
The Transport Layer Security protocol is a widespread cryptographic protocol designed to provide secure communication over insecure networks by providing authenticity, integrity, and confidentiality. As a first step, in the TLS Handshake Protocol a common master secret is negotiated. In many configurations, this step makes considerable use of asymmetric cryptographic algorithms. It seems to be a prevalent assumption that the use of such asymmetric cryptographic algorithms is unsuitable for resource-constrained devices. Therefore, the work at hand analyzes the runtime performance of the TLS vl.2 session establishments on an embedded ARM Cortex-M4 platform. We measure the execution time to generate and parse session establishment messages for the client and server sides. In particular, we study the impact of different elliptic curves used for the ephemeral Diffie-Hellman key exchange and the impact of different lengths and subject public key algorithms of certification paths. Our analysis shows that the use of asymmetric cryptographic algorithms is well possible on resource-constrained devices, if carefully chosen and well implemented. This allows the use of the well-proven TLS protocol also for applications from the (Industrial) Internet of Things, including Fieldbus communication.
Android is an operating system which was developed for use in smart mobile phones and is the current leader in this market. A lot of efforts are being spent to make Android available to the embedded world, as well. Many embedded systems do not have a local GUI and are therefore called headless devices. This paper presents the results of an analysis of the general suitability of Anroid in headless embedded systems and ponders the advantages and disadvantages. It focuses on the hardware related issues, i.e. to what extent Android supports hardware peripherals normally used in embedded systems.
WirelessHART protocol was specifically designed for real-time communication in the wireless sensor networks domain for industrial process automation requirements. Whereas the major purpose of WirelessHART is the read-out of sensors with moderate real-time requirements, an increasing demand for integration of actuator applications can be observed. Therefore, it must be verified that the WirelessHART protocol gives sufficient support to real-time industry requirements. As a result, the delay of especially burst and command messages from actuator and sensor nodes to the gateway and vice versa must be analyzed. In this paper, we implemented a WirelessHART network scenario in WirelessHART simulator in NS-2 [8], simulated and analyzed its time characteristics under ideal and noisy conditions. We evaluated the performance of the implementation in order to verify whether the requirements of industrial process and control can be met. This implementation offers an early alternative to expensive test beds for WirelessHART in real-time actuator applications.
Temperature regulation is an important component for modern high performance single -core and multi-core processors. Especially high operating frequencies and architectures with an increasing number of monolithically integrated transistors result in a high power dissipation and - since processor chips convert the consumed electrical energy into thermal energy - in high operating temperatures. High operating temperatures of processors can have drastic consequences regarding chip reliability, processor performance, and leakage currents. External components like fans or heat spreaders can help to reduce the processor temperature - with the disadvantage of additional costs and reduced reliability. Therefore, software based algorithms for dynamic temperature management are an attractive alternative and well known as Dynamic Thermal Management (DTM). However, the existing approaches for DTM are not taking into account the requirements of real-time embedded computing, which is the objective in the given project. The first steps are the profiling and the thermal modeling of the system, which is reported in this paper for a Freescale i. MX6Q quad-core microprocessor. An analytical model is developed and verified by an extensive set of measurement runs.
Experiences with a telecare platform integration of ZigBee sensors into a middleware platform
(2012)
Die zunehmende Anzahl von Transistoren mit immer kleineren Strukturgrößen führt zu einer zunehmenden Leistungsaufnahme in modernen Prozessoren. Das gilt insbesondere für High-End Prozessoren, die mit einer hohen Taktfrequenz betrieben werden. Die aufgenommene Leistung wird in Wärme umgewandelt, die in einer Temperaturerhöhung der Prozessoren resultiert. Hohe Betriebstemperaturen verursachen u.a. eine verringerte Rechenleistung, eine kürzere Lebensdauer des Prozessors und höhere Leckströme. Aus diesen Gründen wird aktives, dynamisches thermisches Management immer wichtiger. Dieser Beitrag stellt eine Erweiterung zu dem Standard- Linux-Scheduler in der Kernel-Version 3.0 für eingebettete Systeme vor: einen PID-Regler, der unter Angabe einer Solltemperatur eine dynamische Frequenz- und Spannungsskalierung durchführt. Die Experimente auf dem Freescale LMX6 Quadcore-Prozessor zeigen, dass der PID-Regler die Betriebstemperatur des Prozessors an die Solltemperatur regeln kann. Er ist die Grundlage für eine in Zukunft zu entwickelnde prädiktive Regelung.
The monitoring of industrial environments ensures that highly automated processes run without interruption. However, even if the industrial machines themselves are monitored, the communication lines are currently not continuously monitored in todays installations. They are checked usually only during maintenance intervals or in case of error. In addition, the cables or connected machines usually have to be removed from the system for the duration of the test. To overcome these drawbacks, we have developed and implemented a cost-efficient and continuous signal monitoring of Ethernet-based industrial bus systems. Several methods have been developed to assess the quality of the cable. These methods can be classified to either passive or active. Active methods are not suitable if interruption of the communication is undesired. Passive methods, on the other hand, require oversampling, which calls for expensive hardware. In this paper, a novel passive method combined with undersampling targeting cost-efficient hardware is proposed.
Machine-to-machine communication is continuously extending to new application fields. Especially smart metering has the potential to become the first really large-scale M2M application. Although in the future distributed meter devices will be mainly connected via dedicated primary communication protocols, like ZigBee, Wireless
M-Bus or alike, a major percentage of all meters will be connected via point to point communication using GPRS or UMTS platforms. Thus, such meter devices have to be extremely cost and energy efficient, especially if the devices are battery based and powered several years by a single battery. This paper presents the development of an automated measurement unit for power and time, thus energy characteristics can be recorded. The measurement unit includes a hardware platform for the device
under test (DUT) and a database based software environment for a smooth execution and analysis of the measurements.
Active safety systems for advanced driver assistance systems act within a complex, dynamic traffic environment featuring various sensor systems which detect the vehicles’ surroundings and interior. This paper describes the recent progress towards a performance evaluation of car-to-car communication (C2C) for active safety systems - in particular for crash constellation prediction. The methodology introduced in this work is designed to evaluate the impact of different sensors on the accuracy of a crash constellation prediction algorithm. The benefit of C2C communication (viewed as a virtual sensor) within a sensor data fusion architecture for pre-crash collision prediction is explored. Therefore, a simulation environment for accident scenarios analysis reproducing real-world sensor behaviour, is designed and implemented. Performance evaluation results show that C2C increases confidence in the estimated position of the oncoming vehicle. With C2C enhancement the given accuracy in time-to-collision (TTC) estimation is achievable about 110 ms earlier for moderate velocities at TTC range of [0.5s..0.2s]. The uncertainty in the vehicle position prediction at the time of collision can be reduced about half by integrating C2C communication into the sensor data fusion.
During the day-to-day exploitation of localization systems in mines, the technical staff tends to incorrectly rearrange radio equipment: positions of devices may not be accurately marked on a map or their positions may not correspond to the truth. This situation may lead to positioning inaccuracies and errors in the operation of the localization system.This paper presents two Bayesian algorithms for the automatic corrections of positions of the equipment on the map using trajectories restored by the inertial measurement units mounted to mobile objects, like pedestrians and vehicles. As a basis, a predefined map of the mine represented as undirected weighted graph was used as input. The algorithms were implemented using the Simultaneous Localization and Mapping (SLAM) approach.The results prove that both methods are capable to detect misplacement of access points and to provide corresponding corrections. The discrete Bayesian filter outperforms the unscented Kalman filter, which, however, requires more computational power.
This paper presents an extended version of a previously published Bayesian algorithm for the automatic correction of the positions of the equipment on the map with simultaneous mobile object trajectory localization (SLAM) in underground mine environment represented by undirected graph. The proposed extended SLAM algorithm requires much less preliminary data on possible equipment positions and uses an additional resample move algorithm to significantly improve the overall performance.
6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is gaining more and more attraction for the seamless connectivity of embedded devices for the Internet of Things (IoT). Whereas the lower layers (IEEE802.15.4 and 6LoWPAN) are already well defined and consolidated with regard to frame formats, header compression, routing protocols and commissioning procedures, there is still an abundant choice of possibilities on the application layer. Currently, various groups are working towards standardization of the application layer, i.e. the ETSI Technical Committee on M2M, the IP for Smart Objects (IPSO) Alliance, Lightweight M2M (LWM2M) protocol of the Open Mobile Alliance (OMA), and OneM2M. This multitude of approaches leaves the system developer with the agony of choice. This paper selects, presents and explains one of the promising solutions, discusses its strengths and weaknesses, and demonstrates its implementation.