Change search
Refine search result
1 - 26 of 26
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Boano, Carlo Alberto
    et al.
    Brown, James
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Roedig, Utz
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Low-power radio communication in industrial outdoor deployments: the impact of weather conditions and ATEX-compliance2009Conference paper (Refereed)
  • 2. Boano, Carlo Alberto
    et al.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Li, Yafei
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Zuniga, Marco
    Willig, Andreas
    Controllable radio interference for experimental and testing purposes in wireless sensor networks2009Conference paper (Refereed)
  • 3. Boano, Carlo Alberto
    et al.
    Römer, Kay
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Zuniga, Marco
    Willig, Andreas
    Demo Abstract: Generation of Controllable Radio Interference for Protocol Testing in Wireless Sensor Networks2009Conference paper (Refereed)
  • 4.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    An Adaptive Communication Architecture for Wireless Sensor Networks2007In: Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems, ACM Press , 2007, 1, , p. 14Conference paper (Refereed)
  • 5.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Demo abstract: Software-based sensor node energy estimation2007Conference paper (Refereed)
    Abstract [en]

    Being able to estimate the energy consumption of sensor nodes is essential both for evaluating existing sensor network mechanisms and for constructing new energy-aware mechanisms. We present a software-based mechanism for estimating the energy consumption of sensor node at run-time. Unlike previous energy estimation mechanisms, our mechanism does not require any additional hardware components or add-ons. Our demonstration shows the energy estimation in practice on a small network of Tmote Sky motes running the Contiki operating system. A PC connected to one of the motes shows the real-time energy estimation of the network nodes and where the energy is spent: CPU active, CPU sleeping, radio transmitting, radio listening, and LEDs

  • 6.
    Dunkels, Adam
    et al.
    RISE, Swedish ICT, SICS.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Software-based on-line energy estimation for sensor nodes2007In: Proceedings of the Fourth Workshop on Embedded Networked Sensors (Emnets IV), 2007, 1, , p. 5Conference paper (Refereed)
    Abstract [en]

    Energy is of primary importance in wireless sensor networks. By being able to estimate the energy consumption of the sensor nodes, applications and routing protocols are able to make informed decisions that increase the lifetime of the sensor network. However, it is in general not possible to measure the energy consumption on popular sensor node platforms. In this paper, we present and evaluate a softwarebased on-line energy estimation mechanism that estimates the energy consumption of a sensor node. We evaluate the mechanism by comparing the estimated energy consumption with the lifetime of capacitor-powered sensor nodes. By implementing and evaluating the X-MAC protocol, we show how software-based on-line energy estimation can be used to empirically evaluate the energy efficiency of sensor network protocols.

  • 7.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Implementation and evaluation of the sensornet protocol for Contiki2007Report (Other academic)
    Abstract [en]

    Sensornet Protocol (SP) is a link abstraction layer between the network layer and the link layer for sensor networks. SP was proposed as the core of a future-oriented sensor node architecture that allows flexible and optimized combination between multiple coexisting protocols. This thesis implements the SP sensornet protocol on the Contiki operating system in order to: evaluate the effectiveness of the original SP services; explore further requirements and implementation trade-offs uncovered by the original proposal. We analyze the original SP design and the TinyOS implementation of SP to design the Contiki port. We implement the data sending and receiving part of SP using Contiki processes, and the neighbor management part as a group of global routines. The evaluation consists of a single-hop traffic throughput test and a multihop convergecast test. Both tests are conducted using both simulation and experimentation. We conclude from the evaluation results that SP's link-level abstraction effectively improves modularity in protocol construction without sacrificing performance, and our SP implementation on Contiki lays a good foundation for future protocol innovations in wireless sensor networks.

  • 8.
    He, Zhitao
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Rethinking link-level abstractions for sensor networks2008Conference paper (Refereed)
    Abstract [en]

    For designers of the communication stack of sensor nodes there is a constant tension between performance and modularity. To alleviate this tension, researchers have come up with a number of modular architectures. In this work we take a refreshed view of the design of an abstract link level service, an important component in the communication stack. We start with a critical review of one such service, the Sensornet Protocol (SP), and then we implement an SP-flavored link level service featuring a novel combination of ARQ and MAC. Experimental results of transmission delay and energy efficiency highlight a few subtle architectural design trade-offs we have encountered, namely semantics binding, implicit information sharing, and time scope initialization. These aspects have significant impact on software modularity in tiny sensor nodes.

  • 9.
    He, Zhitao
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS. Assa Abloy AB, Sweden.
    Furuhed, Martin
    Technology Nexus Secured, Sweden .
    Raza, Shahid
    RISE - Research Institutes of Sweden, ICT, SICS.
    Indraj: Digital certificate enrollment for battery-powered wireless devices2019In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery, Inc , 2019, p. 117-127Conference paper (Refereed)
    Abstract [en]

    A public key infrastructure (PKI) has been widely deployed and well tested on the Internet. However, this standard practice of delivering scalable security has not yet been extended to the rapidly growing Internet of Things (IoT). Thanks to vendor hardware support and standardization of resource-efficient communication protocols, asymmetric cryptography is no longer unfeasible on small devices. To migrate IoT from poorly scalable, pair-wise symmetric encryption to PKI, a major obstacle remains: how do we certify the public keys of billions of small devices without manual checks or complex logistics? The process of certifying a public key in form of a digital certificate is called enrollment. In this paper, we design an enrollment protocol, called Indraj, to automate enrollment of certificate-based digital identities on resource-constrained IoT devices. Reusing the semantics of the Enrollment over Secure Transport (EST) protocol designed for Internet hosts, Indraj optimizes resource usage by leveraging an IoT stack consisting of Constrained Application Protocol (CoAP), Datagram Transport Layer Security (DTLS) and IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN).We evaluate our implementation on a low power 32-bit MCU, showing the feasibility of our protocol in terms of latency, power consumption and memory usage. Asymmetric cryptography enabled by automatic certificate enrollment will finally turn IoT devices into well behaved, first-class citizens on the Internet.

  • 10.
    He, Zhitao
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Hewage, Kasun
    Uppsala University, Sweden.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Arpeggio: a Penetration Attack on Glossy Networks2016In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2016, 9, article id 7732971Conference paper (Refereed)
    Abstract [en]

    Glossy networks make use of concurrent transmissions to achieve rapid network flooding in wireless networks with high reliability. They are robust against jamming and header injection attacks. We find that Glossy floods can be hijacked by a packet injection attacker to penetrate into the network and cause severe loss. We demonstrate the design of such an attacker by evaluating its effectiveness in a 30-node testbed.

  • 11.
    He, Zhitao
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks2013Conference paper (Refereed)
    Abstract [en]

    In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power efficiency. We term this the Droplet attack, as it attains enormous disruption by dropping small, payload-less frame headers to its victim's radio receiver, depriving the latter of bandwidth and sleep time. We demonstrate the Droplet attack's high damage rate to full duty-cycle receivers, and further show that a high frequency version of Droplet can even force nodes running on very low duty-cycle MAC protocols to drop most of their packets.

  • 12.
    He, Zhitao
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Precise Packet Loss Pattern Generation by Intentional Interference2011Conference paper (Refereed)
    Abstract [en]

    Abstract—Intermediate-quality links often cause vulnerable connectivity in wireless sensor networks, but packet losses caused by such volatile links are not easy to trace. In order to equip link layer protocol designers with a reliable test and debugging tool, we develop a reactive interferer to generate packet loss patterns precisely. By using intentional interference to emulate parameterized lossy links with very low intrusiveness, our tool facilitates both robustness evaluation of protocols and flaw detection in protocol implementation.

  • 13.
    He, Zhitao
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Zooming Into Radio Events by Bus Snooping2012Conference paper (Refereed)
    Abstract [en]

    In this position paper, we advocate the use of bus snooping to trace radio events. Highly precise and unintrusive, the technique leads to potentially more efficient code and enables more insightful protocol analysis than conventional code instrumentation techniques.

  • 14.
    Li, Yafei
    et al.
    RISE, Swedish ICT, SICS.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Leidelöf, Sanna
    A software radio-empowered sensor network2009In: 9th Scandinavian Workshop on Wireless Adhoc Networks (Adhoc'09), 2009, 1Conference paper (Refereed)
    Abstract [en]

    Low power wireless sensors are limited by current radio technologies to short communication range and low throughput. We envision that future radios with advanced software programmable encoding and modulation will bring sensor networks unprecedented flexibility and performance. We have taken a step towards realizing this vision by designing a softwarebased, narrow-band transceiver using the GNU Radio software and the Universal Software Radio Peripheral hardware. We have verified the compatibility of our implementation with existing wireless sensor platforms. We demonstrate the flexibility of our design with sensing applications running on a sensor network communicating over hybrid radios.

  • 15. O'Donovan, Tony
    et al.
    Sreenan, Cormac J.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Poster Abstract: Storage-Centric Debugging of Performance Problems in Sensor Networks2010Conference paper (Refereed)
  • 16. O'Donovan, Tony
    et al.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Sreenan, Cormac J.
    Detailed Diagnosis of Performance Anomalies in Sensornets2010Conference paper (Refereed)
    Abstract [en]

    We address the problem of analysing performance anomalies in sensor networks. In this paper, we propose an approach that uses the local flash storage of the motes for logging system data, in combination with online statistical analysis. Our results show not only that this is a feasible method but that the overhead is significantly lower than that of communication-centric methods, and that interesting patterns can be revealed when calculating the correlation of large data sets of separate event types.

  • 17. Pöttner, Wolf-Bastian
    et al.
    Wolf, Lars
    Cecílio, José
    Furtado, Pedro
    Silva, Ricardo
    Sa Silva, Jorge
    Santos, Amancio
    Gil, Paulo
    Cardoso, Alberto
    Do Ó, Jose Manuel
    Brown, James
    Roedig, Utz
    O'Donovan, Tony
    Sreenan, Cormac J.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    McCarthy, Ben
    Zinonos, Zinon
    Klein, Anja
    WSN Evaluation in Industrial Environments - First results and Lessons Learned2011Conference paper (Refereed)
  • 18. Qin, Yian
    et al.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    A Communication Monitor for Wireless Sensor Networks Based on Software Defined Radio2011Report (Other academic)
    Abstract [en]

    Link quality estimation of reliability-crucial wireless sensor networks (WSNs) is often limited by the observability and testability of single-chip radio transceivers. The estimation is often based on collection of packer-level statistics, including packet reception rate, or vendor-specific registers, such as CC2420's Received Signal Strength Indicator (RSSI) and Link Quality Indicator (LQI). The speed or accuracy of such metrics limits the performance of reliability mechanisms built in wireless sensor networks. To improve link quality estimation in WSNs, we designed a powerful wireless communication monitor based on Software Defined Radio (SDR). We studied the relations between three implemented link quality metrics and packet reception rate under different channel conditions. Based on a comparison of the metrics' relative advantages, we proposed using a combination of them for fast and accurate estimation of a sensor network link.

  • 19. Qin, Yian
    et al.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Link Quality Estimation for Future Cooperating Objects2011Conference paper (Refereed)
  • 20. Qin, Yian
    et al.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Towards Accurate and Agile Link Quality Estimation in Wireless Sensor Networks2011Conference paper (Refereed)
    Abstract [en]

    Link quality estimation has been an important research topic in the wireless sensor networking community and researchers have developed a large number of different methods to estimate link quality. The commonly used CC2420 radio provides simple signal quality indicators. These are agile in that they react fast to changing link quality but they are inaccurate under complicated channel conditions. More sophisticated link quality estimators combine these simple metrics with packet reception statistics collected by the network stack. These approaches compensate the hardware-based metrics to a limited degree but they compromise agility and incur extra overhead. In this paper, we take a novel approach and develop a number of link quality metrics using a software defined radio. We evaluate our metrics under several channel conditions. The results show that they have good accuracy and can handle complicated channel conditions if combined properly.

  • 21.
    Raza, Shahid
    et al.
    RISE, Swedish ICT, SICS, Security Lab.
    Misra, Prasant
    RISE, Swedish ICT, SICS. Indian Institute of Science, India.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Bluetooth Smart: An Enabling Technology for the Internet of Things2015In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2015, 6, p. 155-162, article id 7347955Conference paper (Refereed)
    Abstract [en]

    The past couple of years have seen a heightened interest in the Internet of Things (IoT), transcending industry, academia and government. As with new ideas that hold immense potential, the optimism of IoT has also exaggerated the underlying technologies well before they can mature into a sustainable ecosystem. While 6LoWPAN has emerged as a disruptive technology that brings IP capability to networks of resource constrained devices, a suitable radio technology for this device class is still debatable. In the recent past, Bluetooth Low Energy (LE) - a subset of the Bluetooth v4.0 stack - has surfaced as an appealing alternative that provides a low-power and loosely coupled mechanism for sensor data collection with ubiquitous units (e.g., smartphones and tablets). When Bluetooth 4.0 was first released, it was not targeted for IP-connected devices but for communication between two neighboring peers. However, the latest release of Bluetooth 4.2 offers features that makes Bluetooth LE a competitive candidate among the available low-power communication technologies in the IoT space. In this paper, we discuss the novel features of Bluetooth LE and its applicability in 6LoWPAN networks. We also highlight important research questions and pointers for potential improvement for its greater impact.

  • 22.
    Raza, Shahid
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS.
    Misra, Prasant
    TATA Consultancy Services Ltd, India .
    He, Zhitao
    RISE - Research Institutes of Sweden, ICT, SICS.
    Voigt, Thiemo
    RISE - Research Institutes of Sweden, ICT, SICS. Uppsala University, Sweden.
    Building the Internet of Things with Bluetooth Smart2017In: Ad hoc networks, ISSN 1570-8705, E-ISSN 1570-8713, Vol. 57, p. 19-31Article in journal (Refereed)
    Abstract [en]

    The Internet of Things, or the IoT, is an emerging, disruptive technology that enables physical devices to communicate across disparate networks. IP has been the de facto standard for seamless interconnectivity in the traditional Internet; and piggybacking on the success of IP, 6LoWPAN has been the first standardized technology to realize it for networks of resource-constrained devices. In the recent past Bluetooth Low Energy (BLE) a.k.a Bluetooth Smart - a subset of the Bluetooth v4.0 and the latest v4.2 stack, has surfaced as an appealing alternative, with many competing advantages over available low-power communication technologies in the IoT space such as IEEE 802.15.4. However, BLE is a closed standard and lacks open hardware and firmware support, something that hinders innovation and development in this field. In this article, we aim to overcome some of the constraints in BLE's core building blocks by making three contributions: first, we present the design of a new open hardware platform for BLE; second, we provide a Contiki O.S. port for the new platform; and third, we identify research challenges and opportunities in 6LoWPAN-connected Bluetooth Smart. We believe that the knowledge and insights will facilitate IoT innovations based on this promising technology

  • 23.
    Tsiftes, Nicolas
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Voigt, Thiemo
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Enabling Large-Scale Storage in Sensor Networks with the Coffee File System2009Conference paper (Refereed)
    Abstract [en]

    Persistent storage offers multiple advantages for sensor networks, yet the available storage systems have been unwieldy because of their complexity and device-specific designs. We present the Coffee file system for flash-based sensor devices. Coffee provides a programming interface for building efficient and portable storage abstractions. Unlike previous flash file systems, Coffee uses a small and constant RAM footprint per file, making it scale elegantly with workloads consisting of large files or many files. In addition, the performance overhead of Coffee is low: the throughput is at least 92\% of the achievable direct flash driver throughput. We show that network layer components such as routing tables and packet queues can be implemented on top of Coffee, leading to increased performance and reduced memory requirements for routing and transport protocols.

  • 24.
    Voigt, Thiemo
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Remote water monitoring with sensor networking technology2009In: ERCIM NewsArticle in journal (Refereed)
    Abstract [en]

    Sensor networks enable remote monitoring of natural environments such as glaciers, volcanoes and bodies of water. Within the project 'Sensor Networks to Monitor Marine Environment with Particular Focus on Climate Changes', SICS and partners are designing and implementing flexible, reprogrammable sensor network solutions suitable for monitoring the marine environment with high resolution in time and space.

  • 25.
    Voigt, Thiemo
    et al.
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Österlind, Fredrik
    RISE, Swedish ICT, SICS.
    Finne, Niclas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Eriksson, Joakim
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    Båmstedt, Ulf
    Schiller, Jochen
    Hjort, Klas
    Sensor Networking in Aquatic Environments - Experiences and New Challenges2007Conference paper (Refereed)
    Abstract [en]

    In this paper we present the design and implementation of a small-scale marine sensor network. The network monitors the temperature in the Baltic Sea on different heights from the water surface down to the bottom. Unlike many other wireless sensor networks, this network contains both a wired and a wireless part. One of the major challenges is that the network is hard to access after its deployment and hence both hard- and software must be robust and reliable. We also present the design of an advanced buoy system featuring a diving unit that achieves a better vertical resolution and discuss remaining challenges of sensor networking in aquatic environments.

  • 26.
    Österlind, Fredrik
    et al.
    RISE, Swedish ICT, SICS.
    Dunkels, Adam
    RISE, Swedish ICT, SICS.
    He, Zhitao
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Tsiftes, Nicolas
    RISE, Swedish ICT, SICS, Computer Systems Laboratory.
    Sensornet checkpointing between simulated and deployed networks2009In: IPSN'09, 2009, 1, , p. 2Conference paper (Refereed)
    Abstract [en]

    Sensor network development is notoriously difficult due to the low visibility of sensor platforms and systems. We propose sensornet checkpointing to increase the visibility of sensor networks. With sensornet checkpointing, we transfer network-wide application checkpoints between simulated and real networks. This approach enable advances in many research areas: visualization, repeatable experiments, fault injection, and application debugging. We demonstrate sensornet checkpointing on a network of Tmote Sky motes running Contiki.

1 - 26 of 26
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.35.7