https://www.mdu.se/

mdu.sePublications
Change search
Refine search result
12 1 - 50 of 96
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abbasi, Shirin
    et al.
    Islamic Azad University, Iran.
    Rahmani, Amir Masoud
    Islamic Azad University, Tehran, Iran; National Yunlin University of Science and Technology, Taiwan.
    Balador, Ali
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Sahafi, Amir
    Islamic Azad University, Iran.
    A fault-tolerant adaptive genetic algorithm for service scheduling in internet of vehicles2023In: Applied Soft Computing, ISSN 1568-4946, E-ISSN 1872-9681, Vol. 143, article id 110413Article in journal (Refereed)
    Abstract [en]

    Over the years, a range of Internet of Vehicles services has emerged, along with improved quality parameters. However, the field still faces several limitations, including resource constraints and the time response requirement. This paper extracts cost, energy, processing power, service management, and resource allocation parameters. Mathematical equations are then defined based on these parameters. To simplify the process complexity and ensure scalability, we propose an algorithm that uses the genetic algorithm for fault and cost management during resource allocation to services. The main concept is to pick resources for services using a genetic algorithm. We discuss the processing and energy costs associated with this function, which is the algorithm's objective function and is created to optimize cost. Our approach goes beyond the conventional genetic algorithm in two stages. In the first step, services are prioritized, and resources are allocated in accordance with those priorities; in the second step, load balancing in message transmission paths is ensured, and message failures are avoided. The algorithm's performance is evaluated using various parameters, and it was shown to outperform other metaheuristic algorithms like the classic genetic algorithm, particle swarm, and mathematical models. Different scenarios with various nodes and service variables are defined in various system states, including fault occurrences to various percentages of 10, 20, and 30. To compare methods, we consider different parameters, the most significant being performance success rate. Moreover, the cost optimization has a good convergence after iterations, and the rate of improvement in the big scenario has slowed down after 150 iterations. Besides, it provides acceptable performance in response time for services.

  • 2.
    Adamsson, Maximilian
    et al.
    Mälardalen University, School of Business, Society and Engineering.
    Enehöjd, Pontus
    Mälardalen University, School of Business, Society and Engineering.
    Ledarskap - Nu på Digital nivå: En studie om hur digital kommunikation bör utformas för att organisationer ska bli mer effektiva och ha ett bra kommunikationsflöde med mindre informationsbortfall.2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Digital kommunikation är idag självklart för de allra flesta människor, alla kommunicerar digitalt via olika sorters enheter och kanaler. Dock kommer den digitala kommunikationen i väldigt många olika former så kan det ibland bli svårt och komplext för alla att hantera denna sorts kommunikation. Denna studie har för avsikt att skapa ett underlag för en mer komplett och kontrollerbar kommunikation via digitala medel, samt hur ledarskap kan främjas via kommunikation i digital form. Detta ska bidra med en grundläggande kunskap kring hur en organisation bör hantera och förmedla sin information och kommunikation via digitala medel.

    Studien fokuserar på att skapa en förståelse för hur digital kommunikation upplevs av mottagaren. För att därifrån kunna se hur denna upplevelse kan föras närmare den fysiska kommunikationen mellan en ledare och medarbetare. I ett samarbete med Barn och utbildningsförvaltningen, en väldigt stor organisation med ansvar för all grundutbildning i Eskilstuna kommun, det vill säga allt från förskola upp till gymnasial utbildning. Denna organisation har analyserats genom en induktiv forskningsmetod med kvalitativa intervjuer, dessa har varit grunden för att samla in data. Genom dessa kvalitativa intervjuer samlas åsikter och tankar in från medlemmar av alla olika delar av organisationen för att skapa en heltäckande bild om hur den digitala kommunikationen upplevs och fungerar.

    Kunskapsbidragets syfte för denna uppsats var att få fram kunskap om hur en digital kommunikationsmiljö bör utformas för att organisationer ska bli mer effektiva, ha ett bra kommunikationsflöde samt mindre informationsbortfall. Detta syfte anses vara uppfyllt genom slutsatserna utifrån teori och empiriinsamling. Där en organisation med en bra struktur, organisationskunskap samt grundtanke har alla möjligheter att då utveckla sina ledare. Detta kan i sin tur utveckla medarbetare och därmed skapa en mer effektiv organisation, med bra och tydliga kanaler där alla är införstådda hur dem fungerar.

    Download full text (pdf)
    fulltext
  • 3.
    Alexander, Karlsson
    Mälardalen University, School of Innovation, Design and Engineering.
    Design and Development of a Wireless Multipoint E-stop System for Autonomous Haulers2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Safety-related functions are important in autonomous industrial applications and are featured in an extensive body of work contained within the standards. The implementation of safety-related systems is commonly done by an external company at a great cost and with limited flexibility. Thus, the objective of this thesis was to develop and implement a safety-related system using o-the-shelf products and to analyse how well it can comply with the established standards of safety-related functions. This work has sought to review the current standards for safety-functions, the eectsof harsh radio environments on safety-related systems, and how to validate the safety-function.The system development process was used to gain knowledge by rst building the concept based on pre-study. After the pre-study was nished, the process moved to the development of software, designed to maintain a wireless heartbeat as well as to prevent collisions between the autonomous and manual-driven vehicles at a quarry, and implementation of the system in real hardware. Finally, a set of software (simulations) and hardware (measurements in an open-pit mine) tests were performed to test the functionality of the system. The wireless tests showed that the system adhered to the functional requirements set by the company, however, the evaluated performance level according to ISO 13849-1 resulted in performance level B which is insucient for a safety-related function. This work demonstrates that it is not possible to develop a safety-related system using the off-the-shelf products chosen, without hardware redundancy.

    Download full text (pdf)
    fulltext
  • 4.
    Alkamha, Saaid
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Ahmadi, Alireza
    Mälardalen University, School of Innovation, Design and Engineering.
    Upptäckandet av säkerhetshot i privata nätverk: Hur du skyddar ditt hemnätverk2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Due to Covid 19, most people have chosen to work from home and most households have an access point that enables communication between several devices. Attacks against Wi-Fi access points have increased in recent years due to vulnerabilities that may exist in the access point. When a vulnerable path is found in the access point, this can lead to the attacker using the vulnerable path to breach and damage one or more devices in the home network and even corporate devices. Advances in technology have helped us implement several security measures that can protect the access point in case of intrusion attempts. The purpose of this work is to focus on providing the right knowledge for new network technicians to increase awareness in home network security. The goal of this thesis is to provide a deeper knowledge for new network technicians to be able to prevent or minimize attacks caused by vulnerabilities in a home network with a Wi-Fi access point and develop a routine for how to protect it. After we have identified several attacks and performed it ourselves, the result showed that it was easy to manipulate a vulnerable access point with the selected attack tools in this work and the experiments have shown us the importance of implementing the right security measures and how well they protect the access point against an intrusion attempt.

    Download full text (pdf)
    fulltext
  • 5.
    Al-Rawi, Mohammed
    et al.
    Universidade de Aveiro, Portugal.
    Elmgren, Fredrik
    DeepVision AB, Linköping, Sweden.
    Frasheri, Mirgita
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Curuklu, Baran
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Yuan, Xin
    Universidad Politecnica de Madrid, Spain.
    Martínez, José-Fernán
    Universidad Politecnica de Madrid, Spain.
    Bastos, Joaquim
    Instituto de Telecomunicações - Pólo de Aveiro, Portugal.
    Rodriguez, Jonathan
    Universidade de Aveiro, Portugal.
    Pinto, Marc
    ECA Robotics, France.
    Algorithms for the Detection of First Bottom Returns and Objects in the Water Column in Side-Scan Sonar Images2017In: OCEANS '17 A Vision for our Marine Future OCEANS '17, Aberdeen, United Kingdom, 2017Conference paper (Refereed)
    Abstract [en]

    Underwater imaging has become an active research area in recent years as an effect of increased interest in underwater environments and is getting potential impact on the world economy, in what is called blue growth. Since sound propagates larger distances than electromagnetic waves underwater, sonar is typically used for underwater imaging. One interesting sonar image setting is comprised of using two parts (left and right) and is usually referred to as sidescan sonar. The image resulted from sidescan sonars, which is called waterfall image, usually has to distinctive parts, the water column and the image seabed. Therefore, the edge separating these two parts, which is called the first bottom return, is the real distance between the sonar and the seabed bottom (which is equivalent to sensor primary altitude). The sensory primary altitude can be measured if the imaging sonar is complemented by interferometric sonar, however, simple sonar systems have no way to measure the first bottom returns other than signal processing techniques. In this work, we propose two methods to detect the first bottom returns; the first is based on smoothing cubic spline regression and the second is based on a moving average filter to detect signal variations. The results of both methods are compared to the sensor primary altitude and have been successful in 22 images out of 25.

  • 6.
    Ashjaei, Mohammad
    Mälardalen University, School of Innovation, Design and Engineering. Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Multi-Hop Real-Time Communication over Switched Ethernet Technology2014Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Switched Ethernet technology has been introduced to be exploited in real-time communication systems due to its features such as its high throughput and wide availability, hence being a cost-effective solution. Many real-time switched Ethernet protocols have been developed, preserving the profits of traditional Ethernet technology, to overcome the limitations imposed by using commercially available (COTS) switches. These limitations mainly originate from the non-deterministic behavior of the Ethernet switches inherent in the use of FIFO queues and a limited number of priority levels.

     

    In our research we focus on two particular real-time communication technologies, one based on COTS Ethernet switches named the FTT-SE architecture and the other using a modified Ethernet switch called the HaRTES architecture. Both architectures are based on a master-slave technique supporting different and temporally isolated traffic types including real-time periodic, real-time sporadic and non-real-time traffic. Also, they provide mechanisms implementing adaptivity as a response to the requirements imposed by dynamic real-time applications. Nevertheless, the two mentioned architectures were originally developed for a simple network consisting of a single switch, and they were lacking support for multi-hop communication. In industrial applications, multi-hop communication is essential as the networks comprise a high number of nodes, that is far beyond the capability of a single switch.

     

    In this thesis, we study the challenges of building multi-hop communication using the FTT-SE and the HaRTES architectures. We propose different architectures to provide multi-hop communication while preserving the key characteristics of the single-switch architecture such as timeliness guarantee, resource efficiency, adaptivity and dynamicity. We develop a response time analysis for each proposed architecture and we compare them to assess their corresponding benefits and limitations. Further, we develop a simulation tool to evaluate the solutions.

    Download full text (pdf)
    fulltext
  • 7.
    Avni, G.
    et al.
    IST Austria, Klosterneuburg, Austria.
    Goel, S.
    IIT Bombay, Mumbai, India.
    Henzinger, T. A.
    IST Austria, Klosterneuburg, Austria.
    Rodriguez-Navas, Guillermo
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Computing scores of forwarding schemes in switched networks with probabilistic faults2017In: Lecture Notes in Computer Science, Volume 10206, Springer Verlag , 2017, p. 169-187Conference paper (Refereed)
    Abstract [en]

    Time-triggered switched networks are a deterministic communication infrastructure used by real-time distributed embedded systems. Due to the criticality of the applications running over them, developers need to ensure that end-to-end communication is dependable and predictable. Traditional approaches assume static networks that are not flexible to changes caused by reconfigurations or, more importantly, faults, which are dealt with in the application using redundancy. We adopt the concept of handling faults in the switches from non-real-time networks while maintaining the required predictability. We study a class of forwarding schemes that can handle various types of failures. We consider probabilistic failures. For a given network with a forwarding scheme and a constant ℓ, we compute the score of the scheme, namely the probability (induced by faults) that at least ℓ messages arrive on time. We reduce the scoring problem to a reachability problem on a Markov chain with a “product-like” structure. Its special structure allows us to reason about it symbolically, and reduce the scoring problem to #SAT. Our solution is generic and can be adapted to different networks and other contexts. Also, we show the computational complexity of the scoring problem is #P-complete, and we study methods to estimate the score. We evaluate the effectiveness of our techniques with an implementation.

  • 8.
    Bajracharya, Rojeena
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Shrestha, Rakesh
    Res Inst Sweden RISE, S-72212 Västerås, Sweden..
    Hassan, Syed Ali
    Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan..
    Jung, Haejoon
    Kyung Hee Univ, Dept Elect & Informat Convergence Engn, Yongin 17104, South Korea..
    Shin, Hyundong
    Kyung Hee Univ, Dept Elect & Informat Convergence Engn, Yongin 17104, South Korea..
    5G and Beyond Private Military Communication: Trend, Requirements, Challenges and Enablers2023In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 83996-84012Article in journal (Refereed)
    Abstract [en]

    Communication networks are becoming increasingly important in military operations, with task fields like time-critical targeting, covert special operations, command and control, training, and logistics, all relying heavily on the communication network and its services. On the other hand, commercial communication has dramatically transformed our society and the way we communicate. The newest network mode at present, 5G and beyond (5GB), is characterized by high speed, low latency, high reliability, and high communication density. Although the use of 5GB commercial networks for defense agencies can offer greater flexibility and efficiency, they also face a new challenge that requires high standards of network protection and harsh working conditions and environments. In this paper, we discuss the significance of communication networks in several potential military applications, particularly for warfare, training/drilling, logistics, and special mission-specific stations. We present the communication trends adopted in military applications. Then, we open up various 5GB key performance indexes and their use cases for the military communication systems. We also elaborate on unique challenges of the military communication networks that are unlikely to be resolved via commercial 5GB research. The various 5GB enabling technologies for military communication systems are discussed. Lastly, we present and analyze 5GB new radio for the private military communication under C-band.

  • 9.
    Barac, Filip
    et al.
    Mid Sweden University.
    Yu, Kan
    Mälardalen University, School of Innovation, Design and Engineering.
    Gidlund, Mikael
    ABB, Corporate Research.
    Åkerberg, Johan
    ABB, Corporate Research.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering.
    Towards Reliable and Lightweight Communication in Industrial Wireless Sensor Networks2012Conference paper (Refereed)
    Abstract [en]

    In this paper we address the issues of timeliness and transmission reliability of existing industrial communication standards. We combine a Forward Error Correction coding schemeon the Medium Access Control layer with a lightweight routing protocol to form an IEEE 802.15.4-conformable solution, whichcan be implemented into already existing hardware without violating the standard. After laying the theoretical foundations,we conduct a performance evaluation of the proposed solution.The results show a substantial gain in reliability and reducedlatency, compared to the uncoded transmissions, as well ascommon Wireless Sensor Network routing protocols.

    Download full text (pdf)
    fulltext
  • 10.
    Bergblomma, Marcus
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Ekström, Martin
    Mälardalen University, School of Innovation, Design and Engineering.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering.
    Ekström, Mikael
    Mälardalen University, School of Innovation, Design and Engineering.
    Gerdtman, Christer
    Motion Control AB, Västerås, Sweden .
    Lindén, Maria
    Mälardalen University, School of Innovation, Design and Engineering.
    A wireless low latency control system for harsh environments2012In: IFAC Proceedings Volumes (IFAC-PapersOnline): Vol. 11, PART 1, 2012, p. 17-22Conference paper (Refereed)
    Abstract [en]

    The use of wireless communication technologies in the industry offer severaladvantages. One advantage is the ability to deploy sensors where they previously could noteasily be deployed, for instance on parts that rotate. To use wireless communication in industrialcontrol loops, demands on reliability and latency requirements has to be met. This in anenvironment that may be harsh for radio communication. This work presents a reliable, lowlatency wireless communication system. The system is used in a wireless thyristor control loopin a hydro power plant generator. The wireless communication is based on Bluetooth radiomodules. The work shows a latency analysis together with empirical hardware based latencyand packet error rate measurements. The background noise of a hydro power plant station isalso investigated. The average latency between the Bluetooth modules for the proposed systemis 5.09 ms. The packet error rate is 0.00288 for the wireless low latency control system deployedin a hydro power plant.

  • 11.
    Bergström, Albert
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Automatic generation of network configuration in simulated time sensitive networking (TSN) applications2020Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The amount of data required to be processed in real-time embedded system is steadily increasing. This has caused industries to search for alternatives for reliable time-sensitive network communication. IEEE set of standards for Time-Sensitive Networking (TSN) is an attractive option for achieving this. It leverages the advantages of IEEE standards for Ethernet, such as high bandwidth and low hardware cost, while introducing deterministic behaviour. Simulation tools are used to facilitate verification and analysis of TSN networks. However, even simulation-assisted design of large complex networks is a challenging process. To alleviate this issue, this thesis investigates how TSN simulation can be improved by automatic generation of network configurations. So far, many different simulation frameworks have been developed in academia. This thesis builds on the OMNeT++ simulation framework and NeSTiNg simulation model. We prototype an automatic TSN configuration tool capable of generating configuration automatically through a graphical user interface (GUI). The purpose of the prototype is to demonstrate the feasibility of automatic configuration in TSN and how it eases design complexity. Furthermore, to verify the proposed tool a use case inspired by the vehicle industry is modelled. It is concluded that automatic configuration improves usability in five key areas, such as: (1) facilitating recollection of the network, (2) enabling automatic configuration, (3) increasing user-friendliness of a TSN simulation platform with a GUI, (4) increasing efficiency and usability of a TSN simulation platform, and (5) minimizing user error. The results gained in this thesis justify the usability of automation and could provide insights for future research and development of TSN simulation tools.

    Download full text (pdf)
    fulltext
  • 12.
    Biabani, M.
    et al.
    School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, 14395 515, Iran.
    Yazdani, N.
    School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, 14395 515, Iran.
    Fotouhi, Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Developing a Novel Hierarchical VPLS Architecture Using Q-in-Q Tunneling in Router and Switch Design2023In: Computers, E-ISSN 2073-431X, Vol. 12, no 9, article id 180Article in journal (Refereed)
    Abstract [en]

    Virtual Private LAN Services (VPLS) is an ethernet-based Virtual Private Network (VPN) service that provides multipoint-to-multipoint Layer 2 VPN service, where each site is geographically dispersed across a Wide Area Network (WAN). The adaptability and scalability of VPLS are limited despite the fact that they provide a flexible solution for connecting geographically dispersed sites. Furthermore, the construction of tunnels connecting customer locations that are separated by great distances adds a substantial amount of latency to the user traffic transportation. To address these issues, a novel Hierarchical VPLS (H-VPLS) architecture has been developed using 802.1Q tunneling (also known as Q-in-Q) on high-speed and commodity routers to satisfy the additional requirements of new VPLS applications. The Vector Packet Processing (VPP) performs as the router’s data plane, and FRRouting (FRR), an open-source network routing software suite, acts as the router’s control plane. The router is designed to seamlessly forward VPLS packets using the Request For Comments (RFCs) 4762, 4446, 4447, 4448, and 4385 from The Internet Engineering Task Force (IETF) integrated with VPP. In addition, the Label Distribution Protocol (LDP) is used for Multi-Protocol Label Switching (MPLS) Pseudo-Wire (PW) signaling in FRR. The proposed mechanism has been implemented on a software-based router in the Linux environment and tested for its functionality, signaling, and control plane processes. The router is also implemented on commodity hardware for testing the functionality of VPLS in the real world. Finally, the analysis of the results verifies the efficiency of the proposed mechanism in terms of throughput, latency, and packet loss ratio.

  • 13.
    Blazek, Thomas
    et al.
    Silicon Austria Labs GmbH, Australia.
    Ademaj, Fjolla
    Silicon Austria Labs GmbH, Australia.
    Marksteiner, Stefan
    Mälardalen University. AVL List GmbH, Australia.
    Priller, Peter
    AVL List GmbH, Australia.
    Bernhard, Hans-Peter
    Silicon Austria Labs GmbH, Australia; Johannes Kepler University Linz, Australia.
    Wireless Security in Vehicular Ad Hoc Networks: A Survey2022In: SAE International Journal of Connected and Automated Vehicles, ISSN 2574-0741, Vol. 6, no 2Article in journal (Refereed)
    Abstract [en]

    Vehicular communications face unique security issues in wireless communications. While new vehicles are equipped with a large set of communication technologies, product life cycles are long and software updates are not widespread. The result is a host of outdated and unpatched technologies being used on the street. This has especially severe security impacts because autonomous vehicles are pushing into the market, which will rely, at least partly, on the integrity of the provided information. We provide an overview of the currently deployed communication systems and their security weaknesses and features to collect and compare widely used security mechanisms. In this survey, we focus on technologies that work in an ad hoc manner. This includes Long-Term Evolution mode 4 (LTE-PC5), Wireless Access in Vehicular Environments (WAVE), Intelligent Transportation Systems at 5 Gigahertz (ITS-G5), and Bluetooth. First, we detail the underlying protocols and their architectural components. Then, we list security designs and concepts, as well as the currently known security flaws and exploits. Our overview shows the individual strengths and weaknesses of each protocol. This provides a path to interfacing separate protocols while being mindful of their respective limitations.

  • 14.
    Bujosa Mateu, Daniel
    Mälardalen University, School of Innovation, Design and Engineering.
    Enhancing TSN Adoption by Industry: Tools to Support Migrating Ethernet-based Legacy Networks into TSN2023Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    New technologies present opportunities and challenges for industries. One major challenge is the ease, or even feasibility, of its adoption. The Time-Sensitive Networking (TSN) standards offer a range of features relevant to various applications and are key for the transition to Industry 4.0. These features include deterministic zero-jitter, low-latency data transmission, transmission of traffic with various levels of time-criticality on the same network, fault tolerance mechanisms, and advanced network management allowing dynamic reconfiguration.

    This thesis aims to develop tools that enable the industry to adopt TSN easily and efficiently. Specifically, we create tools that facilitate the migration of legacy networks to TSN, enabling the preservation of most of the legacy systems and solutions while reducing costs and adoption time. Firstly, we introduce LETRA (Legacy Ethernet-based Traffic Mapping Tool), a tool for mapping Ethernet-based legacy traffic to the new TSN traffic classes. Secondly, we develop HERMES (Heuristic Multi-queue Scheduler), a heuristic Time-Triggered (TT) traffic scheduler that can meet the characteristics of legacy systems and provide quick results suitable for reconfiguration. Thirdly, we develop TALESS (TSN with Legacy End-Stations Synchronization), a mechanism to avoid adverse consequences caused by the lack of synchronization between legacy systems and TSN-based ones, as not all legacy systems need to support the TSN synchronization mechanisms. Finally, we improve Stream Reservation Protocol (SRP) to enhance Audio-Video Bridging (AVB) traffic configuration in terms of termination and consistency.

    Download full text (pdf)
    fulltext
  • 15.
    Bujosa Mateu, Daniel
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Innovation and Product Realisation.
    Ashjaei, Seyed Mohammad Hossein
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Proenza, Julián
    University of the Balearic Islands, Spain.
    Papadopoulos, Alessandro
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nolte, Thomas
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Improved Clock Synchronization in TSN Networks with Legacy End-Stations2023Report (Other academic)
    Abstract [en]

    In order to enable the adoption of Time Sensitive Networking (TSN) by the industry and be more environmentally sustainable, it is necessary to develop tools to integrate legacy systems with TSN. In this paper, we propose a solution for the coexistence of different time domains from different legacy systems with their corresponding synchronization protocols in a single TSN network. To this end, we experimentally identified the effects of replacing the communications subsystem of a legacy Ethernet-based network with TSN in terms of synchronization. Based on the results, we propose a solution called TALESS (TSN with Legacy End-Stations Synchronization). TALESS is able to identify the drift between the TSN communications subsystem and the integrated legacy devices (end-stations) and modify the TSN schedule to adapt to the different time domains to avoid the effects of the lack of synchronization between them. We validate TALESS through both simulations and experiments on a prototype. Thereby we demonstrate that thanks to TALESS, legacy systems are able to synchronize through TSN and even improve features such as their reception jitter or their integrability with other legacy systems.

  • 16.
    Castellanos Ardila, Julieth Patricia
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Gallina, Barbara
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards Efficiently Checking Compliance Against Automotive Security and Safety Standards2017In: The 7th IEEE International Workshop on Software Certification WoSoCer 2017, 2017, p. 317-324Conference paper (Refereed)
    Abstract [en]

    The growing connectivity of the systems that we rely on e.g. transportation vehicles is pushing towards the introduction of new standards aimed at providing a baseline to address cybersecurity besides safety. If the interplay of the two normative spaces is not mastered, compliance management might become more time consuming and costly, preventing engineers from dedicating their energies to system engineering. In this paper, we build on top of previous work aimed at increasing efficiency and confidence in compliance management. More specifically, we contribute to building a terminological framework needed to enable the systematization of commonalities and variabilities within ISO 26262 and SAE J3061. Then, we focus our attention on the requirements for software design and implementation and we use defeasible logic to prove compliance. Based on the compliance checking results, we reveal reuse opportunities. Finally, we draw our conclusions and sketch future research directions.

  • 17.
    Dao, Van-Lan
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Girs, Svetlana
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Reliability and Fairness for CANT Communication Based on Non-Orthogonal Multiple Access2019In: 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), IEEE , 2019Conference paper (Refereed)
    Abstract [en]

    Recently, communication using unmanned aerial vehicles (LAVO as relay nodes has been considered beneficial for a number of applications. Moreover, nomorthogonM multiple access (NONIA) with users being assigned different signal passer levels while sharing the same tune-frequency domain has been found effective to enhance spectrum utilization and provide predictable access to the channel. Thus, in this paper we consider an UAV communication system with NOMA and propose a solution to find the optimal values for the user's power allocation coefficients (PA(s) needed to achieve the required levels of communication reliability. We present a closed-form expression for the PAC of each user and also propose an algori for finding the optimal altitude of the UAV required to satisfy the fairness condition for all users. Finally, we provide numerical mutinies and compare the results tar three types of communication environments.

  • 18.
    Deivard, Johannes
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Johansson, Valentin
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Diagnostics Framework for Time-Critical Control Systems in Cloud-Fog Automation2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Evolving technology in wireless telecommunication, such as 5G, provides opportunities to utilize wireless communication more in an industrial setting where reliability and predictability are of great concern. More capable Industrial Internet of Things devices (IIoT) are, indeed, a catalyst for Industry 4.0. Still, before the IIoT devices can be deemed capable enough, a method to evaluate the IIoT systems unobtrusively—so that the evaluation does not affect the performance of the systems—must be established. This thesis aims to answer how the performance of a distributed control system can be unobtrusively evaluated, and also determine what the state-of-the-art is in latency measurements in distributed control systems. To answer the question, a novel diagnostics method for time-critical control systems in cloud-fog automation is proposed and extensively evaluated on real-life testbeds that use 5G, WiFi 6, and Ethernet in an edge-computing topology with real control systems. The feasibility of the proposed method was verified by experiments conducted with a diagnostics framework prototype developed in this thesis. In the proposed diagnostics framework, the controller application is monitored by a computing probe based on an extended Berkeley Packet Filter program. Network communication between the controller and control target is evaluated with a multi-channel Ethernet probe and custom-made software that computes several metrics related to the performance of the distributed system. The data from the unobtrusive probes are sent to a time-series database that is used for further analysis and real-time visualization in a graphical interface created with Grafana. The proposed diagnostics method together with the developed prototype can be used as a research infrastructure for future evaluations of distributed control systems.

    Download full text (pdf)
    cfa_diagnostics_framework
  • 19.
    Dust, Lukas Johannes
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Persson, Emil
    Mälardalen University, School of Innovation, Design and Engineering.
    Dynamic connection handling for scalable robotic systems using ROS22022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Multi-agent robot systems, especially for mobile robots in dynamic environments interacting with humans, have seen an increased interest over the past years. Many vehicle manufactures (e.g.Volvo GTO) have been following the trend and has started investigating a possible implementation of an autonomous-transport robot system for material delivery in production environments.First implementations of a system have been built using ROS2 and initialising static amounts of participating robots.Throughout this thesis, scalability is emphasised to enhance and add new use cases to the system.This thesis investigates possible improvements for the system by adding a dynamic connection handling, which allows robots to connect and disconnect under the system's run time.Furthermore, the performance of the connection handling in the system is evaluated in simulation for increasing system complexity in terms of the amount of connected robots.The first part of the thesis presents an approach for the dynamic connection and disconnection of robots to the network using service client communication approaches.An implementation is tested in a simulation based on an excerpt from the legacy system.Furthermore, two methods are proposed for detecting possible communication losses. The thesis work simulates the increase of the number of robots in the system at different publishing rates. It compares a many to one communication approach, where multiple robots communicate to a central node over one topic, to the one to one communication approach, where multiple robots communicate over particular topics to a central node.The simulations have shown that with an increase of nodes, the average data age and the data miss ratio in the one to one approach were significantly lower than in the multi to one approach.

    Download full text (pdf)
    fulltext
  • 20.
    Feljan, Juraj
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Karapantelakis, A.
    Ericsson Research, Sweden.
    Mokrushin, L.
    Ericsson Research, Sweden.
    Inam, R.
    SOCNE, Sweden.
    Fersman, E.
    KTH Royal Institute of Technology, Stockholm, Sweden.
    Azevedo, C. R. B.
    University of Campinas, Brazil.
    Raizer, K.
    University of Campinas, Brazil.
    Souza, R. S.
    University of Campinas, Brazil.
    Tackling IoT complexity2017In: Ericsson Technology Review, ISSN 0014-0171, Vol. 95, no 2, p. 60-69Article in journal (Refereed)
    Abstract [en]

    Internet of Things (IoT) applications transcend traditional telecom to include enterprise verticals such as transportation, healthcare, agriculture, energy and utilities. Given the vast number of devices and heterogeneity of the applications, both ICT infrastructure and IoT application providers face unprecedented complexity challenges in terms of volume, privacy, interoperability and intelligence. Cognitive automation will be crucial to overcoming the intelligence challenge.

  • 21.
    Fernandez, Z.
    et al.
    Information and Communication Technologies Area, Ikerlan Technology Research Centre, Mondragón, Spain.
    Val, I.
    Information and Communication Technologies Area, Ikerlan Technology Research Centre, Mondragón, Spain.
    Mendicute, M.
    Signal Theory and Communications Area, Mondragon University, Mondragón, Spain.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Analysis and Evaluation of Self-Organizing TDMA for Industrial Applications2019In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, Institute of Electrical and Electronics Engineers Inc. , 2019Conference paper (Refereed)
    Abstract [en]

    With the Industry 4.0 revolution, the inclusion of wireless communications with real-time requirements has been gaining popularity in industrial applications. As existing wireless technologies do not fully satisfy the stringent requirements of the most critical industrial applications, wired, centralized networks are often used. However, when the application requires mobility, there is no other way than to use wireless communications. Further, in applications where the topology changes dynamically and a large number of devices are mobile, centralized protocols are less suitable. Unfortunately, most decentralized medium access protocols are not predictable, and thereby not able to fulfil the real-time requirements. To address these challenges, in this paper Self-Organizing Time Division Multiple Access (STDMA) is analysed to assess its suitability for use in industrial applications. The analysis has been carried out through simulations under a multipath dispersed time-variant industrial channel while subject to a variable Doppler shift. To this end, several metrics such as channel access delay, slot occupation distribution (SOD), packet losses and packet inter-arrival time (PIAT) have been evaluated, using OMNeT++ in combination with the VEINS framework. 

  • 22.
    Fotouhi, Hossein
    et al.
    CISTER/INESC-TEC, ISEP, Polytechnic Institute of Porto, Portuga.
    Alves, Mário
    CISTER/INESC-TEC, ISEP, Polytechnic Institute of Porto, Portuga.
    Zuniga, Marco
    Delft University of Technology, The Netherlands.
    Koubâa, Anis
    CISTER/INESC-TEC, ISEP, Polytechnic Institute of Porto, Portuga.
    Reliable and fast hand-offs in low-power wireless networks2014In: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 13, no 11, p. 2620-2633Article in journal (Refereed)
    Abstract [en]

    Hand-off (or hand-over), the process where mobile nodes select the best access point available to transfer data, has been well studied in wireless networks. The performance of a hand-off process depends on the specific characteristics of the wireless links. In the case of low-power wireless networks, hand-off decisions must be carefully taken by considering the unique properties of inexpensive low-power radios. This paper addresses the design, implementation and evaluation of smart-HOP, a hand-off mechanism tailored for low-power wireless networks. This work has three main contributions. First, it formulates the hard hand-off process for low-power networks (such as typical wireless sensor networks - WSNs) with a probabilistic model, to investigate the impact of the most relevant channel parameters through an analytical approach. Second, it confirms the probabilistic model through simulation and further elaborates on the impact of several hand-off parameters. Third, it fine-tunes the most relevant hand-off parameters via an extended set of experiments, in a realistic experimental scenario. The evaluation shows that smart-HOP performs well in the transitional region while achieving more than 98 percent relative delivery ratio and hand-off delays in the order of a few tens of a milliseconds.

  • 23.
    Fotouhi, Hossein
    et al.
    Polytechnic Institute of Porto (ISEP-IPP), Porto, Portugal.
    Zúñiga, Marco
    Polytechnic Institute of Porto (ISEP-IPP), Porto, Portugal.
    Alves, Mário
    Polytechnic Institute of Porto (ISEP-IPP), Porto, Portugal.
    Koubâa, Anis
    Polytechnic Institute of Porto (ISEP-IPP), Porto, Portugal.
    Marrón, Pedro
    Polytechnic Institute of Porto (ISEP-IPP), Porto, Portugal.
    Smart-HOP: A Reliable Handoff Mechanism for Mobile Wireless Sensor Networks2012Conference paper (Refereed)
    Abstract [en]

    Handoff processes, the events where mobile nodes select the best access point available to transfer data, have been well studied in cellular and WiFi networks. However, wireless sensor networks (WSN) pose a new set of challenges due to their simple low-power radio transceivers and constrained resources. This paper proposes smart-HOP, a handoff mechanism tailored for mobile WSN applications. This work provides two important contributions. First, it demonstrates the intrinsic relationship between handoffs and the transitional region. The evaluation shows that handoffs perform the best when operating in the transitional region, as opposed to operating in the more reliable connected region. Second, the results reveal that a proper fine tuning of the parameters, in the transitional region, can reduce handoff delays by two orders of magnitude, from seconds to tens of milliseconds.

  • 24.
    Girs, Svetlana
    Mälardalen University, School of Innovation, Design and Engineering.
    Cooperative Communication for Increased Reliability in Industrial Wireless Networks2013Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Introducing wireless networks into distributed industrial systems may enable new or improved application areas and also great cost reductions due to lower complexity of installation and maintenance, compared to existing wired solutions. However, signals travelling through wireless channels are affected by pathloss, fading and shadowing, and, as a result, packet errors are both time-varying and more frequent than in e.g., existing wired fieldbuses. Packet errors or delays occurring in industrial systems can, in critical situations, lead to damage of expensive equipment or even danger to human life. Thus, wireless networks can be accepted for use in industrial networks only when sufficient levels of reliability and timeliness can be guaranteed.

    Relaying is a technique that has the potential to increase reliability with maintained delay. Having different geographical locations, and thus different wireless channel qualities, some nodes may overhear transmitted packets even in cases when the intended receiver did not, and then cooperate by relaying these packets to their final destination.

    This thesis deals with design of relaying strategies aiming to increase reliability in deadline-constrained industrial applications using wireless networks. The influence of several different parameters, such as positions of relay nodes, number of erroneous packets at the relay node and at the destination respectively, as well as the number of available time slots before the deadline, are evaluated to determine the best acting strategy for each relay node. Moreover, it is shown that when a specific relay node has the opportunity to aid more than one source node, performance can be improved even further if the relay node combines several packets, using Luby coding or packet aggregation, and instead relays such combined packets. Given the methods proposed in this thesis, the reliability in industrial wireless networks can be enhanced considerably, without increasing the delay, such that message deadlines still are kept.

    Download full text (pdf)
    fulltext
  • 25.
    Girs, Svetlana
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bergblomma, Marcus
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Halmstad University, Sweden.
    Štimac, Barbara
    University of Zagreb, Zagreb, Croatia .
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Design of Channel Measurement Guidelines for Characterization of Wireless Industrial Environments2013Report (Other academic)
    Abstract [en]

    Providing reliable and timely communication in wireless industrial systems requires careful design of error control schemes able to tackle the bit error patterns typically occurring in these environments. As most error control schemes target some specific characteristics of a wireless channel, the selection of channel model is crucial for proper performance assessment. There are a number of widely used channel models, but the question of the most appropriate choice of model for industrial environments still remains largely open. Not many indoor measurement campaigns have focused on industrial environments with their own specific characteristics. In this paper we present a set of measurement guidelines aiming to characterize industrial environments such that suitable channel models can be selected to properly evaluate error control schemes targeting reliable and timely wireless communications in industrial environments. 

    Download full text (pdf)
    fulltext
  • 26.
    Girs, Svetlana
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Halmstad University.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Increased Reliability of Reduced Delay in Wireless Industrial Networks Using Relaying and Luby Codes2013Conference paper (Refereed)
    Abstract [en]

    Providing reliable and timely communication in wireless industrial networks is crucial. Previous research has shown that relaying can aid in achieving this goal. We consider the case when relay resources are sparse such that each relay needs to aid e.g., three different sensor nodes and propose to combine relaying with Luby codes. We let the relay node construct a Luby coded packet using the three source packets as input. The destination can then use the Luby coded packet to recover an erroneous or lost source packet regardless of which source that packet belonged to. The performance evaluation shows that our proposed scheme significantly increases the number of correctly received packets before the corresponding deadlines, or alternatively that high reliability can be maintained even if fewer time slots are allocated for retransmissions, thus lowering the delay.

  • 27.
    Girs, Svetlana
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Uhlemann, Elisabeth
    Halmstad University.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering.
    The Effects of Relay Behavior and Position in Wireless Industrial Networks2012In: 2012 9th IEEE International Workshop on Factory Communication Systems, May 21-24, 2012 Lemgo, Germany: Proceedings, 2012, p. 183-190Conference paper (Refereed)
    Abstract [en]

    In wireless industrial networks, providing reliable and timely communication is crucial. Previous research has shown that relaying can be used to achieve this goal. However, we have found that different types of wireless channels encountered in industrial environments affect the benefits as well as the best behavior and position of relay nodes. We consider two types of behavior: the relay node always retransmits or it only retransmits if it has obtained a correct copy of the packet. We evaluate different positions of the relay node by conducting simulations for two types of fading channels: with and without line of sight. The results clearly show that the benefits, the best behavior and position of a relay node depends on the wireless channel, whether or not the bit errors appear randomly or in bursts and also on the distance between the source and the final destination.

  • 28.
    Girs, Svetlana
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Willig, Andreas
    University of Canterbury, Canterbury, New Zealand.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Halmstad University, Halmstad, Sweden.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    On the Role of Feedback for Industrial Networks Using Relaying and Packet Aggregation2013Report (Other academic)
    Abstract [en]

    To be accepted for use in industrial applications, wireless technologies must offer similar performance in terms of reliability and timeliness as provided by current wired solutions. Wireless channels, introducing time-varying packet error rates, impose a significant challenge to fulfill these requirements. One way to improve reliability in industrial wireless networks is to use relaying, whereas packet aggregation is a method that can reduce delay. Hence, in this paper, we propose to use a combination of relaying and packet aggregation. Based on the type of feedback provided by the controller, the relay node can choose the most suitable way to use its allocated time slots such that more packets can reach the controller before their deadlines. The results show that allowing this kind of flexibility at the relay node results in performance improvements. The more flexibility, the greater the gain, and thus further improvements can be made by adjusting the schedule to take different types of feedback into account.

  • 29.
    Gran, Mikael
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Karlsson, Claes
    Mälardalen University, School of Innovation, Design and Engineering.
    Survey of VMware NSX Virtualized Network Platform: Utvärdering av VMware NSX Virtualized Network Platform2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Atea Eskilstuna had the need of a platform that simplify and reduce the number of configurations while implementing customer environments. The purpose of this thesis was to do a survey of VMware NSX networking platform and compare it to traditional networking solutions. The virtualization is an important part in data centers and its operations today. With the use of virtualization both hardware resources and costs optimizes. Virtualization has primary been focusing on servers and clients and the network evolution has been overlooked. Therefore, some problems have occurred within traditional data centers regarding traffic flows, security and management. Traditional datacenters have previously been optimized for traffic flows inbound or outbound of the datacenter. This optimization has led to implementation of firewalls and security policies at the datacenter edge. However, in the modern datacenters there’s been an increase of traffic flows between devices inside the datacenter, which needs to be secured. Securing these internal traffic flows can be accomplished through internal policies on the network devices. Implementing these policies however is not a scalable solution as the number of configuration points increases. These problems can be handled through VMware NSX which virtualize network units and centralizes administration. NSX provides a distributed firewall function that through a central management platform can be applied directly on groups of virtual machines and virtual routers. This approach increases security inside the datacenter as well as decreasing the implementation time compared to traditional datacenters. This thesis focus how NSX work unlike physical network units and how it handles issues like hairpinning, security and automation. A lab environment was built up in Ravellos cloud service with virtual machines and a literature study was made for this purpose. The lab environment was used to implement different customers with the help of virtual network components and virtual machines. This lab environment served as a reference point how implementation of NSX, its functions and components was made. The literature study focus on what is possible in NSX and which pros and cons that comes with NSX compared to traditional solutions in data centers. Results shows that the only cons with NSX is license costs.

    Download full text (pdf)
    fulltext
  • 30.
    Grankvist, Henrik
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Kvarnström, William
    Mälardalen University, School of Innovation, Design and Engineering.
    Security Feature Test for Ethernet Switches2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    A new standard in network security for industrial control systems is about to be released by a number of working groups within the ISA99 organization. ABB has a certification program for network components that may be used together with the control system 800xA, which is named Industrial IT Certification. ABB now wants to introduce formal testing of network component’s security features according to this standard.The document IEC 62443-4-2 is the document within this standard that describes how the system requirements should be implemented on network components. This document is still a draft, so the document IEC 62443-3-3 which describes how the system requirements should be implemented on a whole industrial control system has been used to estimate the content of IEC 62443-4-2 when it is finished. Out of these two documents the requirements has been broken down into a test description which contains a number of tests to check which security features a switch has and that they work as described. Together with the test description, a test record template has been created to be used for documenting the result from the tests.Finally a comparison was made where the results from a number of different network equipment could be compared against each other regarding their security features. This comparison will in the future make it easier for ABB’s customers when they are in the process of buying new network equipment.In short the more expensive brands of switches have in general more security features implemented, and desktop switches has more security features implemented than industrial switches, with certain exceptions. The buyer needs to ask himself if he really needs all the security features. The choice of what switch to buy all depends on the placement of the switch and what purpose it should fulfill.

    Download full text (pdf)
    Thesis_HenrikGrankvist_WilliamKvarnstrom
  • 31.
    Gutiérrez, Marina
    et al.
    TTTech Computertechnik AG, Austria.
    Steiner, Wilfried
    TTTech Computertechnik AG, Austria.
    Dobrin, Radu
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Punnekkat, Sasikumar
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    A Configuration Agent based on the Time Triggered Paradigm for Real-Time Networks2015In: IEEE International Workshop on Factory Communication Systems - Proceedings, WFCS, 2015, Vol. Article number 7160584Conference paper (Refereed)
    Abstract [en]

    Distributed cyber-physical systems are growing in size and functionality and deterministic communication is an important requirement for those systems. The existing solutions based on the time-triggered paradigm pose certain limitations in regards to the configuration. Usually configuration is seen as a one-time event during the installation of the network. Future realtime networks need to be able to adapt more easily to changes in the network. Thus, the configuration becomes an ongoing service, e.g., as for network maintenance and re-configuration to add and remove new, respectively old, equipment. We postulate that configuration will emerge to a continued service that accompanies a real-time network throughout its different life-cycle phases. In this context of evolving and dynamic networks, we introduce the concept of a configuration agent for real-time networks and demonstrate the concept by a realization based on the time triggered paradigm.

  • 32.
    Gyllhamn, Claes
    Mälardalen University, School of Innovation, Design and Engineering.
    Centraliserad styrning av åtkomstlistor2011Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Can the Danish "Aftalesystemet", a system with the intention to simplify the use of services within health care, be used in Sweden? This project has investigated the possibility by installing and testing the system and explored its functions to detect any eventual problems. Analyses were made of the system's graphical part and the underlying code to see in greater detail how the communication between units occurred, since no actual documentation of it existed. Discussions with the developers took place regarding how the current system works and how further development should continue. In order to test the system, a completely virtual environment was used. Server, clients and routers were virtualized with VirtualBox and GNS3 in order to not disrupt any ongoing services. The results show that because of how the Danish infrastructure is constructed, and how the system is developed to function primarily in a Danish infrastructure, some changes are needed regarding the design of the database, the GUI and the generation of access lists. Because MedCom and Inera are cooperating on this project, some functions will only be available in either language. However, the plan is that the system will be generalized to such a degree in the future that it can be used cooperatively by several countries.

    Download full text (pdf)
    centraliserad styrning av åtkomstlistor
  • 33.
    Haq, M. U.
    et al.
    Department of Computer System Engineering, University of Engineering and Technology, Peshawar, 25120, Pakistan.
    Sethi, M. A. J.
    Department of Computer System Engineering, University of Engineering and Technology, Peshawar, 25120, Pakistan.
    Rehman, Atiq Ur
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Capsule Network with Its Limitation, Modification, and Applications—A Survey2023In: Machine Learning and Knowledge Extraction, ISSN 2504-4990, Vol. 5, no 3, p. 891-921Article in journal (Refereed)
    Abstract [en]

    Numerous advancements in various fields, including pattern recognition and image classification, have been made thanks to modern computer vision and machine learning methods. The capsule network is one of the advanced machine learning algorithms that encodes features based on their hierarchical relationships. Basically, a capsule network is a type of neural network that performs inverse graphics to represent the object in different parts and view the existing relationship between these parts, unlike CNNs, which lose most of the evidence related to spatial location and requires lots of training data. So, we present a comparative review of various capsule network architectures used in various applications. The paper’s main contribution is that it summarizes and explains the significant current published capsule network architectures with their advantages, limitations, modifications, and applications. 

  • 34.
    Hasan, Shahriar
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Fail-Operational and Fail-Safe Vehicle Platooningin the Presence of Transient Communication Errors2022Report (Other academic)
    Abstract [en]

    Recent advances in wireless technology facilitating Vehicle-to-Vehicle (V2V)communication has paved the way towards a more connected and Cooperative-Intelligent Transportation System (C-ITS). It has unveiled the possibility of many services which are anticipated to make the road transport eco system safer, cleaner, and more sustainable. Platooning is one such application that is expected to soon appear on the roads. In platooning, a group of connected and highly automated vehicles follow a lead vehicle with short inter-vehicle distances. They adapt their speed, acceleration, steering angle, etc., with the help of on-board sensors and inter-vehicle communications. Due to the highly automated driving and the very short inter-vehicle distances required to achieve fuel-efficiency, platooning is a complex and safety-critical system of systems. As a result, the consequences of component or system failure can endanger human life, cause damage to property, or the environment. Given that V2V communication is subject to packet losses due to interference, path loss, fading and shadowing, it is usually desirable to maintain a sufficient level of platooning functionality without compromising safety also during periods of transient errors. Moreover, a platoon can experience different sensor failures, permanent hardware/software failures, or a suddenly appearing road hazard,e.g., a moose. The platoon should, therefore, also be capable of dissolving and transitioning into a fail-safe state by performing emergency braking, safestop, or manual handover without causing any harm to the equipment, people, or to the environment. This research work focuses on incorporating fail-operational mechanisms in platooning in a fuel-efficient and safe way, even inthe presence of transient errors and enable transition into a fail-safe state inthe event of an emergency. To this end, a platoon runtime manager is proposed, which monitors the channel quality and keeps the platoon operational in cases of temporal failures by degrading the platoon performance to the level at which it will remain acceptably safe. Simulation results demonstrate that the runtime manager can avoid collisions in the platoon and still maintain fair performance in terms of fuel-efficiency by either adjusting the inter-vehicle distances or switching to a different controller during runtime. Furthermore, two emergency braking strategies, namely Synchronized Braking and Adaptive Emergency Braking, are proposed to address the emergency events that can arise while platooning. These braking strategies are compared to several state-of-the-art braking strategies in terms of their ability to avoid collisions, and the distance traversed by the lead vehicle. Simulation results show that Synchronized Braking and Adaptive Emergency Braking strategies can ensure fail-safe platooning while the other braking strategies fail to do so. Moreover, a simulation tool named PlatoonSAFE has been developed to facilitate the evaluation of fail-operational and fail-safe mechanisms in platooning under realistic traffic, vehicle dynamics, and communication scenarios. 

    Download full text (pdf)
    fulltext
  • 35.
    Hasan, Shahriar
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Girs, Svetlana
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Cooperative Automated Emergency Braking for CAVs under Time-Varying Communication Delays2023In: IAVVC 2023 - IEEE International Automated Vehicle Validation Conference, Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2023Conference paper (Refereed)
    Abstract [en]

    Connected and Automated Vehicles (CAVs) have the potential to significantly improve road safety, fuel efficiency, and traffic flow by forming platoons with short inter-vehicle gaps, enabled by vehicle-to-vehicle communications and onboard sensors. However, wireless connectivity for CAVs is subject to time-varying delays, which can significantly impact platoon safety during emergency braking. To this end, this paper evaluates the communication delays incurred by platoon vehicles during emergency braking under various data and traffic densities. Additionally, an emergency braking strategy named adaptive emergency braking is proposed and compared with five other strategies based on their ability to meet the functional requirements of collision avoidance and minimizing the stopping distance of the platoon lead vehicle, which are crucial for transitioning a platoon to a fail-safe state. Moreover, the emergency braking strategies are evaluated through rigorous simulations, considering non-functional criteria such as required inter-vehicle gaps, maximum allowable deceleration rates, and their robustness under time-varying communication delays. 

  • 36.
    Henriksson, Johannes
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Magnusson, Alexander
    Mälardalen University, School of Innovation, Design and Engineering.
    Impact of using cloud-based SDNcontrollers on the networkperformance2019Independent thesis Basic level (university diploma), 180 HE creditsStudent thesis
    Abstract [en]

    Software-Defined Networking (SDN) is a network architecture that differs from traditionalnetwork planes. SDN has tree layers: infrastructure, controller, and application. Thegoal of SDN is to simplify management of larger networks by centralizing control into thecontroller layer instead of having it in the infrastructure. Given the known advantages ofSDN networks, and the flexibility of cloud computing. We are interested if this combinationof SDN and cloud services affects network performance, and what affect the cloud providersphysical location have on the network performance. These points are important whenSDN becomes more popular in enterprise networks. This seems like a logical next step inSDN, centralizing branch networks into one cloud-based SDN controller. These questionswere created with a literature studies and answered with an experimentation method. Theexperiments consist of two network topologies both locally hosted SDN (baseline) and cloudhosted SDN. The topology used Zodiac FX switches and Linux hosts. The following metricswas measured: throughput, latency, jitter, packet loss, and time to add new hosts. Theconclusion is that SDN as a cloud service is possible and does not significantly affect networkperformance. One limitation with this thesis was the hardware, resulting in big fluctuationin throughput and packet loss.

    Download full text (pdf)
    fulltext
  • 37.
    Hoang, Le-Nam
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Jonsson, M.
    School of Information Technology, Halmstad University, Halmstad, Sweden.
    Relay Grouping to Guarantee Timeliness and Reliability in Wireless Networks2019In: IEEE Communications Letters, ISSN 1089-7798, E-ISSN 1558-2558, Vol. 23, no 9, p. 1661-1664, article id 8737952Article in journal (Refereed)
    Abstract [en]

    Relaying can increase reliability, range, or throughput. In many cyber-physical systems (CPS), relaying is used to maximize reliability before a given deadline. Since concurrent transmissions are not supported by most CPS, time-division multiple access (TDMA) is typically used. However, a major drawback of relaying in TDMA is that pre-allocated time-slots are wasted if their respective transmitters do not have any correctly received packet to relay. Therefore, in this letter, we propose a novel relay grouping scheme to overcome this drawback. Numerical results show that the proposed scheme significantly enhances the reliability while guaranteeing the deadline for each message. 

  • 38.
    Holmstedt, Christoffer
    Mälardalen University, School of Innovation, Design and Engineering.
    Model-checked Space Plug-and-Play Architecture Local Subnet Adaptation implemented in Ada with Ravenscar restrictions2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Space Plug-and-Play Architecture (SPA) is a set of standards to make it easier to build small satellites. Focus is put on improving the integration phase andthe time consuming validation and verification process by introducing plug-and-play functionality. From mission call-up to operational satellite it should only take six days.

    A SPA network consists of several different types of subnets with differentpros and cons. For each processing node there must be one Local Subnet Manager (SM-L). The SM-L can communicate over different communication protocols depending on how the respective local subnet is set up, one option is UDP/IP.

    In this thesis Ada Protected Objects is presented as a viable option for inter-process communication instead of UDP/IP in a SPA network. This thesis presents the initial work towards a SPA Local Subnet Adaptation that builds onlanguage constructs in Ada such as Ada Tasks and Protected Objects. The system design and implementation is verified deadlock free with UPPAAL but showsindications of livelock possibilities. The severity of these livelocksituations is discussed in the conclusion.

    Download full text (pdf)
    20141102_christoffer_holmstedt_master_thesis_679ea779
  • 39.
    Kailayanathan, Subaharan
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Kamdod, Saji
    Mälardalen University, School of Innovation, Design and Engineering.
    Development of Generic Communication Middleware for Embedded Sensor Systems Transmitting Health Parameters2020Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Health technology or e-Health is one of the most rapidly growing areas in healthcare today and it has been an important requirement as a new concept of healthcare industry. Since global society has been changed to aging society and the healthcare cost has been increasing in the 21st century since 2007. As the total number of people aged 65 or older is expected to increase from 12% to 22% in 2050 which is double the rate, and at the same time there is a decrease in in-fertility rates and increase in life expectancy due to the increase in life quality, there is a need to investigate the needs and requirements of an intelligent embedded sensor systems in health applications, and to develop a new communication protocol or set of protocols that can be used to send data collected from a hub within a house, home-care or a complex and send it securely and reliably to a central database where the gathered data can be monitored by a medical professional to make decisions for further interventions. The employed communication protocol should also be able to securely transmit confidential parameters from the hospital network to a central server outside of the hospital network. The final protocol must be inline with the regulations of the EU. This thesis is done in collaboration with Tjeders AB, Stille AB, and Embedded Sensor Systems for Health Plus (ESS-H+) research profile at Mälardalen University. In this thesis, different communication protocols such as IPSec and TLS and algorithms such as AES and RSA are examined and based on the requirements provided by the companies certain of these protocols and algorithms will be used in the final implementation. Different performance metrics such as overhead, round trip delay and throughput will be measured for the chosen communication protocols and recommendations will be given on which of the protocols and algorithms needs to be used to obtain an optimized, secure and reliable network.

    Download full text (pdf)
    fulltext
  • 40.
    Karlsson, Marcus
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Zaja, Oscar
    Mälardalen University, School of Innovation, Design and Engineering.
    Improving Security In Embedded Systems With IEEE 802.1X2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 41.
    Kiran, P.
    et al.
    Vidyavardhaka College of Engineering, India.
    Gururaj, H. L.
    Manipal Academy of Higher Education, India.
    Flammini, Francesco
    Mälardalen University, School of Innovation, Design and Engineering, Innovation and Product Realisation.
    Sunil Kumar, D. S.
    Administrative Management College, India.
    Veeraprathap, V.
    Alva’s Institute of Engineering and Technology, India.
    Machine learning based 64-QAM classification techniques for enhanced optical communication2023In: Optical and quantum electronics, ISSN 0306-8919, E-ISSN 1572-817X, Vol. 55, no 13, article id 1179Article in journal (Refereed)
    Abstract [en]

    Due to their greatly increased spectrum efficiency, high-order quadrature amplitude modulation (QAM) formats are especially successful at increasing transmission capacity. QAM is extremely sensitive to nonlinear distortion because of its dense constellation and SNR-hungry configuration. Autonomous neural network (ANN) derived nonlinear decision boundaries that are adaptively created by machine learning techniques can be used to classify symbols. The proposed work focusing on the quadrature amplitude modulation (QAM) scheme, the approach is to formulate an autonomous neural network (ANN) that can predict the class of each symbol from a signal stream of symbols. Experimental accuracy for each ANN's of proposed work achieves 89% by analysing all tests. Comprehensive results are presented with comparisons, demonstrating notable nonlinear mitigation with BER reductions. Additionally, it offers a glimpse into potential future research plans intended to raise the likelihood that predictions would come true and their accuracy.

  • 42.
    Lavassani, Mehrzad
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Rise - Research Institutes of Sweden, Sweden.
    Evolving Industrial Networks: Data-Driven Network Traffic Modelling and Monitoring2023Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The concept of Industrial IoT encompasses the joint applicability of operation and information technologies to expand the efficiency expectation of automation to green and flexible processes with innovative products and services. Future industrial networks need to accommodate, manage and guarantee the performance of converged traffic from different technologies. The network infrastructures are transforming to enable data availability for advanced applications and enhance flexibility. Nonetheless, the pace of IT–OT networks development has been slow despite their considered benefits in optimising performance and enhancing information flows. The hindering factors vary from general challenges in performance management of the diverse traffic for greenfield configuration to the lack of outlines for evolving from brownfield installations without interrupting the operation of ongoing processes. One tangible gap is the lack of insight into the brownfield installation in operation. This dissertation explores the possible evolutionary steps from brownfield installations to future industrial networks.The goal is to ensure the uninterrupted performance of brownfield installations on the path of evolving to the envisioned smart factories. It addresses the gap between the state of the art and state of practice, and the technical prerequisites of the integrated traffic classes for the development of an IIoT monitoring mechanism. A novel lightweight learning algorithm at the sensor level for an IIoT compliance monitoring system, together with a case study of traffic collected from a brownfield installation, provides the baseline of comparative analysis between the common assumptions and the state of practice. The identified gaps and challenges to address them directs the research for proposing a two-step aggregated traffic modelling by introducing new measurement method and performance indicator parameters for capturing the communication dynamics. Lastly, the sensor-level learning algorithm is refined with the knowledge gained from practice and research contributions to propose an in-band telemetry mechanism for monitoring aggregated network traffic.

    Download full text (pdf)
    fulltext
  • 43.
    Lavassani, Mehrzad
    et al.
    Department of Information and Communication Systems, IKS, Mid Sweden University, Sweden.
    Barac, Filip
    Department of Information and Communication Systems, IKS, Mid Sweden University, Sweden.
    Gidlund, Mikael
    Department of Information and Communication Systems, IKS, Mid Sweden University, Sweden.
    Zhang, Tingting
    Department of Information and Communication Systems, IKS, Mid Sweden University, Sweden.
    Handling event-triggered traffic of safety and closed-loop control systems in WSANs2017Conference paper (Refereed)
    Abstract [en]

    This work investigates various methods to expand the deployment of Wireless Sensor-Actuator Networks (WSANs) to mission critical applications. We address the neglected open issues of hard deadline and deterministic delivery for event-triggered traffic in safety and closed-loop regulatory systems. DeMAC algorithm is proposed by utilizing TDMA-based subslots in emergency access periods, group acknowledgement, alternative packet structure, and relay node. The proposed algorithm displayed promising results in comparison with contention-based methods, in improving delivery rate of critical data within the deadline, and lowering the worst-case delay

  • 44.
    Lavassani, Mehrzad
    et al.
    Mid Sweden University, Sweden.
    Forsström, Stefan
    Mid Sweden University, Sweden.
    Jennehag, Ulf
    Mid Sweden University, Sweden.
    Zhang, Tingting
    Mid Sweden University, Sweden.
    Combining Fog Computing with Sensor Mote Machine Learning for Industrial IoT2018In: Sensors, E-ISSN 1424-8220, Vol. 18, no 5, article id 1532Article in journal (Refereed)
    Abstract [en]

    Digitalization is a global trend becoming ever more important to our connected and sustainable society. This trend also affects industry where the Industrial Internet of Things is an important part, and there is a need to conserve spectrum as well as energy when communicating data to a fog or cloud back-end system. In this paper we investigate the benefits of fog computing by proposing a novel distributed learning model on the sensor device and simulating the data stream in the fog, instead of transmitting all raw sensor values to the cloud back-end. To save energy and to communicate as few packets as possible, the updated parameters of the learned model at the sensor device are communicated in longer time intervals to a fog computing system. The proposed framework is implemented and tested in a real world testbed in order to make quantitative measurements and evaluate the system. Our results show that the proposed model can achieve a 98% decrease in the number of packets sent over the wireless link, and the fog node can still simulate the data stream with an acceptable accuracy of 97%. We also observe an end-to-end delay of 180 ms in our proposed three-layer framework. Hence, the framework shows that a combination of fog and cloud computing with a distributed data modeling at the sensor device for wireless sensor networks can be beneficial for Industrial Internet of Things applications.

  • 45.
    Lavassani, Mehrzad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Research Institutes of Sweden, Industrial Systems, Sundsvall, Sweden.
    Åkerberg, Johan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Data-driven Method for In-band Network Telemetry Monitoring of Aggregated Traffic2022Conference paper (Refereed)
    Abstract [en]

    Under the vision of industry 4.0, industrial networks are expected to accommodate a large amount of aggregated traffic of both operation and information technologies to enable the integration of innovative services and new applications. In this respect, guaranteeing the uninterrupted operation of the installed systems is an indisputable condition for network management. Network measurement and performance monitoring of the underlying communication states can provide invaluable insight for safeguarding the system performance by estimating required and available resources for flexible integration without risking network interruption or degrading network performance. In this work, we propose a data-driven in-band telemetry method to monitor the aggregated traffic of the network at the switch level. The method learns and models the communication states by local network-level measurement of communication intensity. The approximated model parameters provide information for network management for prognostic purposes and congestion avoidance resource planning when integrating new applications. Applying the method also addresses the consequence of telemetry data overhead on QoS since the transmission of telemetry packets can be done based on the current state of the network. The monitoring at the switch level is a step towards the Network-AI for future industrial networks.

  • 46.
    Lavassani, Mehrzad
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Division of Industrial Systems, RISE-Research Institutes of Sweden, Sweden.
    Åkerberg, Johan
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    From brown-field to future industrial networks, a case study2021In: Applied Sciences, E-ISSN 2076-3417, Vol. 11, no 7, article id 3231Article in journal (Refereed)
    Abstract [en]

    The network infrastructures in the future industrial networks need to accommodate, manage and guarantee performance to meet the converged Internet technology (IT) and operational technology (OT) traffics requirements. The pace of IT-OT networks development has been slow despite their considered benefits in optimizing the performance and enhancing information flows. The hindering factors vary from general challenges in performance management of the diverse traffic for green-field configuration to lack of outlines for evolving from brown-fields to the converged network. Focusing on the brown-field, this study provides additional insight into a brown-field characteristic to set a baseline that enables the subsequent step development towards the future’s expected converged networks. The case study highlights differences between real-world network behavior and the common assumptions for analyzing the network traffic covered in the literature. Considering the unsatisfactory performance of the existing methods for characterization of brownfield traffic, a performance and dynamics mixture measurement is proposed. The proposed method takes both IT and OT traffic into consideration and reduces the complexity, and consequently improves the flexibility, of performance and configuration management of the brown-field.

  • 47.
    Lavassani, Mehrzad
    et al.
    Division of Industrial Systems, RISE—Research Institutes of Sweden, Sundsvall, Sweden.
    Åkerberg, Johan
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Modeling and Profiling of Aggregated Industrial Network Traffic2022In: Applied Sciences, E-ISSN 2076-3417, Vol. 12, no 2, article id 667Article in journal (Refereed)
    Abstract [en]

    The industrial network infrastructures are transforming to a horizontal architecture to enable data availability for advanced applications and enhance flexibility for integrating new tech-nologies. The uninterrupted operation of the legacy systems needs to be ensured by safeguarding their requirements in network configuration and resource management. Network traffic modeling is essential in understanding the ongoing communication for resource estimation and configuration management. The presented work proposes a two-step approach for modeling aggregated traffic classes of brownfield installation. It first detects the repeated work-cycles and then aims to identify the operational states to profile their characteristics. The performance and influence of the approach are evaluated and validated in two experimental setups with data collected from an industrial plant in operation. The comparative results show that the proposed method successfully captures the temporal and spatial dynamics of the network traffic for characterization of various communication states in the operational work-cycles. 

  • 48.
    Leander, Björn
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. ABB AB, Sweden.
    Dynamic Access Control for Industrial Systems2023Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Industrial automation and control systems (IACS) are taking care of our most important infrastructures, providing electricity and clean water, producing medicine and food, along with many other services and products we take for granted. The continuous, safe, and secure operation of such systems are obviously of great importance. Future iterations of IACS will look quite different from the ones we use today. Modular and flexible systems are emerging, powered by technical advances in areas such as artificial intelligence, cloud computing, and motivated by fluctuating market demands and faster innovation cycles. Design strategies for dynamic manufacturing are increasingly being adopted. These advances have a fundamental impact on industrial systems at component as well as architectural level. 

    As a consequence of the changing operational requirements, the methods used for protection of industrial systems must be revisited and strengthened. This for example includes access control, which is one of the fundamental cyber­security mechanisms that is hugely affected by current developments within IACS. The methods currently used are static and coarse-grained and therefore not well suited for dynamic and flexible industrial systems. A transition in security model is required, from implicit trust towards zero-trust, supporting dynamic and fine-grained access control. 

    This PhD thesis discusses access control for IACS in the age of Industry 4.0, focusing on dynamic and flexible manufacturing systems. The solutions pre­sented are applicable at machine-to-machine as well as human-to-machine in­teractions, using a zero-trust strategy. An investigation of the current state of practice for industrial access control is provided as a starting point for the work. Dynamic systems require equally dynamic access control policies, why several approaches on how dynamic access control can be achieved in indus­trial systems are developed and evaluated, covering strategies for policy for­mulations as well as mechanisms for authorization enforcement. 

    Download full text (pdf)
    fulltext
  • 49.
    Leclerc, Sebastian
    et al.
    Mälardalen University, School of Innovation, Design and Engineering.
    Kärrström, Philip
    Mälardalen University, School of Innovation, Design and Engineering.
    CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. Cloning attacks can deceive access control systems which may cause serious damage to organizations such asinformation leakage and financial loss. This type of attack attempts to deceive a system with anillegitimate cloned card that may be an identical copy of all the data on a card, parts of the data, orperhaps only by using its identification number. Therefore the existing security flaws that cloningattacks exploit are an important threat for organizations to acknowledge and manage.

    This thesis focuses on evaluating three different access control systems in use and demonstratessecurity flaws that exist in these systems. The systems are evaluated by how data can be extractedfrom the access control cards, this includes the time to collect all the data, reading distance, andinterfering objects. Systems are also evaluated by what information the systems validate. Compatible equipment for evaluating the different systems is necessary such as readers, writers, and otherpenetration testing tools. The type of card that the systems use is called Mifare classic whereastwo of the systems used a 1K version and one a 4K version, specifying the amount of availablememory on the card itself. The equipment also made it possible to perform and verify cloningattacks through different processes such as simulation and sniffing to explore what information certain access control systems deem necessary on the access cards.

    Rigorous experiments on the systems and the results reveal that crucial information on the accesscards could easily be extracted, reused, and simulated for accessing two of the systems. One systemproved to be more secure since it required more advanced methods to clone cards that the systemaccepted. The results of this thesis demonstrate that the evaluated access control systems cannotbe considered secure without additional layers of security added to them, instead, it is important tokeep the back-end system maintained through various applicable means.

    Download full text (pdf)
    fulltext
  • 50.
    Li, Ning
    et al.
    Universidad Politecnica de Madrid, Madrid, Spain .
    Cürüklü, Baran
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Bastos, Joaquim
    Instituto de Telecomunicacoes, Lisboa, Portugal .
    Sucasas, Victor
    Universidade de Aveiro, Aveiro, Portugal .
    Fernandez, Jose Antonio Sanchez
    Universidad Politecnica de Madrid, Madrid, Spain .
    Rodriguez, Jonathan
    Campus Universitário de Santiago, Lisboa, Portugal .
    A probabilistic and highly efficient topology control algorithm for underwater cooperating AUV networks2017In: Sensors, E-ISSN 1424-8220, Vol. 17, no 5, article id 1022Article in journal (Refereed)
    Abstract [en]

    The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) project is to make autonomous underwater vehicles (AUVs), remote operated vehicles (ROVs) and unmanned surface vehicles (USVs) more accessible and useful. To achieve cooperation and communication between different AUVs, these must be able to exchange messages, so an efficient and reliable communication network is necessary for SWARMs. In order to provide an efficient and reliable communication network for mission execution, one of the important and necessary issues is the topology control of the network of AUVs that are cooperating underwater. However, due to the specific properties of an underwater AUV cooperation network, such as the high mobility of AUVs, large transmission delays, low bandwidth, etc., the traditional topology control algorithms primarily designed for terrestrial wireless sensor networks cannot be used directly in the underwater environment. Moreover, these algorithms, in which the nodes adjust their transmission power once the current transmission power does not equal an optimal one, are costly in an underwater cooperating AUV network. Considering these facts, in this paper, we propose a Probabilistic Topology Control (PTC) algorithm for an underwater cooperating AUV network. In PTC, when the transmission power of an AUV is not equal to the optimal transmission power, then whether the transmission power needs to be adjusted or not will be determined based on the AUV’s parameters. Each AUV determines their own transmission power adjustment probability based on the parameter deviations. The larger the deviation, the higher the transmission power adjustment probability is, and vice versa. For evaluating the performance of PTC, we combine the PTC algorithm with the Fuzzy logic Topology Control (FTC) algorithm and compare the performance of these two algorithms. The simulation results have demonstrated that the PTC is efficient at reducing the transmission power adjustment ratio while improving the network performance.

12 1 - 50 of 96
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf