mdh.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 64) Show all publications
Fernandez, Z., Val, I., Mendicute, M. & Uhlemann, E. (2019). Analysis and Evaluation of Self-Organizing TDMA for Industrial Applications. In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS: . Paper presented at 15th IEEE International Workshop on Factory Communication Systems, WFCS 2019, 27 May 2019 through 29 May 2019. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Analysis and Evaluation of Self-Organizing TDMA for Industrial Applications
2019 (English)In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, Institute of Electrical and Electronics Engineers Inc. , 2019Conference paper, Published paper (Refereed)
Abstract [en]

With the Industry 4.0 revolution, the inclusion of wireless communications with real-time requirements has been gaining popularity in industrial applications. As existing wireless technologies do not fully satisfy the stringent requirements of the most critical industrial applications, wired, centralized networks are often used. However, when the application requires mobility, there is no other way than to use wireless communications. Further, in applications where the topology changes dynamically and a large number of devices are mobile, centralized protocols are less suitable. Unfortunately, most decentralized medium access protocols are not predictable, and thereby not able to fulfil the real-time requirements. To address these challenges, in this paper Self-Organizing Time Division Multiple Access (STDMA) is analysed to assess its suitability for use in industrial applications. The analysis has been carried out through simulations under a multipath dispersed time-variant industrial channel while subject to a variable Doppler shift. To this end, several metrics such as channel access delay, slot occupation distribution (SOD), packet losses and packet inter-arrival time (PIAT) have been evaluated, using OMNeT++ in combination with the VEINS framework. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2019
Keywords
Ad-hoc networks, Industrial communications, Real-time communications, Self-Organizing TDMA, Wireless communications, Ad hoc networks, Packet networks, Analysis and evaluation, Centralized protocols, Channel access delays, Medium access protocol, Real-time communication, Stringent requirement, Time division multiple access
National Category
Computer Engineering Communication Systems
Identifiers
urn:nbn:se:mdh:diva-45018 (URN)10.1109/WFCS.2019.8758039 (DOI)2-s2.0-85070072400 (Scopus ID)9781728112688 (ISBN)
Conference
15th IEEE International Workshop on Factory Communication Systems, WFCS 2019, 27 May 2019 through 29 May 2019
Available from: 2019-08-15 Created: 2019-08-15 Last updated: 2019-08-15Bibliographically approved
Quach, T., Tran, H. V., Uhlemann, E., Kaddoum, G. & Tran, Q. (2019). Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks. Wireless networks, 25(4), 1477-1489
Open this publication in new window or tab >>Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks
Show others...
2019 (English)In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 25, no 4, p. 1477-1489Article in journal (Refereed) Published
Abstract [en]

This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU. 

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-43118 (URN)10.1007/s11276-017-1605-z (DOI)000463885400004 ()2-s2.0-85033487528 (Scopus ID)
Projects
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 
Available from: 2019-04-16 Created: 2019-04-16 Last updated: 2019-05-02Bibliographically approved
Uhlemann, E. (2019). Trusting autonomous vehicles [Connected and automated vehicles]. IEEE Vehicular Technology Magazine, 14(2), 121-124, Article ID 8721585.
Open this publication in new window or tab >>Trusting autonomous vehicles [Connected and automated vehicles]
2019 (English)In: IEEE Vehicular Technology Magazine, ISSN 1556-6072, E-ISSN 1556-6080, Vol. 14, no 2, p. 121-124, article id 8721585Article in journal (Refereed) Published
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2019
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-43883 (URN)10.1109/MVT.2019.2905521 (DOI)000469837900017 ()2-s2.0-85066471029 (Scopus ID)
Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2019-06-18Bibliographically approved
Balador, A., Uhlemann, E., Calafate, C. T. & Cano, J.-C. -. (2018). Supporting beacon and event-driven messages in vehicular platoons through token-based strategies. Sensors, 18(4), Article ID 955.
Open this publication in new window or tab >>Supporting beacon and event-driven messages in vehicular platoons through token-based strategies
2018 (English)In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, no 4, article id 955Article in journal (Refereed) Published
Abstract [en]

Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. 

National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-38912 (URN)10.3390/s18040955 (DOI)000435574800027 ()29570676 (PubMedID)2-s2.0-85044467893 (Scopus ID)
Projects
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 Vinnova
Available from: 2018-04-05 Created: 2018-04-05 Last updated: 2019-06-18Bibliographically approved
Uhlemann, E. (2018). The Next Step: Acquisitions and Open Collaboration Platforms. IEEE Vehicular Technology Magazine, 13(2), 14-14
Open this publication in new window or tab >>The Next Step: Acquisitions and Open Collaboration Platforms
2018 (English)In: IEEE Vehicular Technology Magazine, ISSN 1556-6072, E-ISSN 1556-6080, Vol. 13, no 2, p. 14-14Article in journal, Editorial material (Other academic) Published
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-39825 (URN)10.1109/MVT.2018.2813441 (DOI)000433094600004 ()
Available from: 2018-06-14 Created: 2018-06-14 Last updated: 2018-06-14Bibliographically approved
Gutiérrez Peón, P., Uhlemann, E., Steiner, W. & Björkman, M. (2017). Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol. In: 2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING): . Paper presented at IEEE 85th Vehicular Technology Conference VTC2017-Spring, 04 Jun 2017, Sydney, Australia. , Article ID 8108663.
Open this publication in new window or tab >>Applying Time Diversity for Improved Reliability in a Real-Time Heterogeneous MAC Protocol
2017 (English)In: 2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017, article id 8108663Conference paper, Published paper (Refereed)
Abstract [en]

Supporting real-time applications over wireless networks is challenging for several reasons. The medium access control (MAC) layer has a key role in enabling real-time guarantees by providing bounded access time to the transmission medium. Unfortunately, even when timely access is granted, transmissions can still be compromised, specially in the wireless domain, due to the unreliable transmission medium. A common way to increase the reliability of a communication system is to apply redundancy in the form of time diversity, i.e., transmitting several copies of the same message at different points in time. In this paper we propose a wireless MAC protocol capable of handling traffic with different levels of criticality and where transmissions and retransmissions are tailored to deadlines, so that the reliability of the communication system is increased and real-time guarantees can be provided. We focus on the traffic scheduling problem, and extend an already existing solution, Time-Triggered Ethernet, suitable for real-time traffic over wired multi-hop networks. The extension enables transmission of heterogeneous traffic over hybrid wired-wireless networks, and provides timely retransmissions in the wireless segment, such that the real-time guarantees are met. Further, we are able to schedule traffic to better cope with interference patterns of different duration, frequency and level of persistence. The results show that the MAC protocol can be successfully applied to combat different kinds of interference while meeting real-time deadlines.

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-37002 (URN)10.1109/VTCSpring.2017.8108663 (DOI)000426875802118 ()2-s2.0-85040610511 (Scopus ID)978-1-5090-5932-4 (ISBN)
Conference
IEEE 85th Vehicular Technology Conference VTC2017-Spring, 04 Jun 2017, Sydney, Australia
Projects
RetNet - The European Industrial Doctorate Programme on Future Real-Time NetworksSafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 Vinnova
Available from: 2017-11-27 Created: 2017-11-27 Last updated: 2019-04-23Bibliographically approved
Lisova, E., Causevic, A., Uhlemann, E. & Björkman, M. (2017). Clock Synchronization Considerations in Security Informed Safety Assurance of Autonomous Systems of Systems. In: IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY: . Paper presented at 43rd Annual Conference of the IEEE Industrial Electronics Society IECON 2017, 30 Oct 2017, Beijing, China (pp. 8385-8390).
Open this publication in new window or tab >>Clock Synchronization Considerations in Security Informed Safety Assurance of Autonomous Systems of Systems
2017 (English)In: IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, p. 8385-8390Conference paper, Published paper (Refereed)
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-37065 (URN)000427164808040 ()2-s2.0-85046668958 (Scopus ID)978-1-5386-1127-2 (ISBN)
Conference
43rd Annual Conference of the IEEE Industrial Electronics Society IECON 2017, 30 Oct 2017, Beijing, China
Projects
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless CommunicationSAFSEC-CPS -- Securing the safety of autonomous cyber-physical systems
Funder
EU, Horizon 2020, 692529 Vinnova
Available from: 2017-11-07 Created: 2017-11-07 Last updated: 2019-04-17Bibliographically approved
Gutiérrez Peón, P., Rodríguez, P. M., Fernández, Z., Pozo Pérez, F. M., Uhlemann, E., Val, I. & Steiner, W. (2017). Cognitive Radio for Improved Reliability in a Real-Time Wireless MAC Protocol based on TDMA. In: International Conference on Emerging Technologies And Factory Automation ETFA'17: . Paper presented at International Conference on Emerging Technologies And Factory Automation ETFA'17, 12 Aug 2017, Limassol, Cyprus.
Open this publication in new window or tab >>Cognitive Radio for Improved Reliability in a Real-Time Wireless MAC Protocol based on TDMA
Show others...
2017 (English)In: International Conference on Emerging Technologies And Factory Automation ETFA'17, 2017Conference paper, Published paper (Refereed)
Abstract [en]

Wireless communications enables introduction of Internet of Things (IoT) in industrial networks. Unfortunately, real-time guarantees required for many IoT applications, may be compromised in wireless networks due to an unreliable transmission medium. A key component in enabling real-time communications is the medium access control (MAC) layer and its ability to effectively avoid concurrent transmissions that causes deadline misses. Also, deploying the network in a harsh interference environment can lead to low reliability. Time diversity, based on transmitting several copies of the same data at different instants, increases reliability but at the expense of increased jitter and bandwidth. A more efficient resource utilization is expected from cognitive radio, which dynamically takes into account the status of the wireless environment before performing transmissions. This paper proposes a wireless MAC protocol based on scheduled timeslots to avoid concurrent transmissions, combined with two different mechanisms to increase reliability, one based on time diversity and another on cognitive radio. The protocol and its mechanisms to enhance reliability are compared in different interference scenarios, and show that cognitive radios achieves better performance than time diversity, especially when the interference is produced by a jammer.

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-37015 (URN)10.1109/ETFA.2017.8247602 (DOI)000427812000037 ()2-s2.0-85044439376 (Scopus ID)9781509065059 (ISBN)
Conference
International Conference on Emerging Technologies And Factory Automation ETFA'17, 12 Aug 2017, Limassol, Cyprus
Projects
RetNet - The European Industrial Doctorate Programme on Future Real-Time NetworksSafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 Vinnova
Available from: 2017-11-27 Created: 2017-11-27 Last updated: 2019-06-25Bibliographically approved
Lisova, E., Uhlemann, E., Åkerberg, J. & Mats, B. (2017). Delay attack versus clock synchronization - A time chase. In: Proceedings of the IEEE International Conference on Industrial Technology: . Paper presented at 2017 IEEE International Conference on Industrial Technology, ICIT 2017, 23 March 2017 through 25 March 2017 (pp. 1136-1141).
Open this publication in new window or tab >>Delay attack versus clock synchronization - A time chase
2017 (English)In: Proceedings of the IEEE International Conference on Industrial Technology, 2017, p. 1136-1141Conference paper, Published paper (Refereed)
Abstract [en]

Clock synchronization is one of the most essential assets for distributed real-time systems, as sensing, control and actuation require synchronized communication to meet real-time deadlines. We propose a distributed monitoring method to detect if an adversary is interfering with the clock synchronization protocol. The monitor uses certain network indicators and a set of rules to decide about switching between Normal, Quarantine or Attack Detected states. Further, we propose a way to define thresholds for decision-making based on theoretical analysis of the indicator values influenced by an attack. In addition, we formulate the problem of adversary influence detection in the network as a detection theory problem and use it to derive an additional indicator for the network monitor. Finally, we analyze the time chase between the monitor and an adversary to investigate which factors influence the final outcome. 

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-35632 (URN)10.1109/ICIT.2017.7915522 (DOI)000404252400188 ()2-s2.0-85019646283 (Scopus ID)9781509053209 (ISBN)
Conference
2017 IEEE International Conference on Industrial Technology, ICIT 2017, 23 March 2017 through 25 March 2017
Projects
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 Vinnova
Available from: 2017-06-09 Created: 2017-06-09 Last updated: 2019-04-23Bibliographically approved
Bello, L. L., Åkerberg, J., Gidlund, M. & Uhlemann, E. (2017). Guest Editorial Special Section on New Perspectives on Wireless Communications in Automation: From Industrial Monitoring and Control to Cyber-Physical Systems. IEEE Transactions on Industrial Informatics, 13(3), 1393-1396, Article ID 7938563.
Open this publication in new window or tab >>Guest Editorial Special Section on New Perspectives on Wireless Communications in Automation: From Industrial Monitoring and Control to Cyber-Physical Systems
2017 (English)In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 13, no 3, p. 1393-1396, article id 7938563Article in journal, Editorial material (Refereed) Published
Place, publisher, year, edition, pages
IEEE Computer Society, 2017
National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-35988 (URN)10.1109/TII.2017.2695585 (DOI)000402929700046 ()2-s2.0-85020620535 (Scopus ID)
Available from: 2017-06-29 Created: 2017-06-29 Last updated: 2017-06-29Bibliographically approved
Projects
Reliable Real-Time Communications [2008-03431_Vinnova]; Halmstad University
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6497-4099

Search in DiVA

Show all publications