Comparative Analysis of Wireless Operating System
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Comparative Study on Operating System for Wireless Sensor Networks
ICACSIS 2011 ISBN: 978-979-1421-11-9 A Comparative Study on Operating System for Wireless Sensor Networks Thang Vu Chien, Hung Nguyen Chan, and Thanh Nguyen Huu Thai Nguyen University of Information and Communication Technology Quyet Thang Commune, Thai Nguyen City, Vietnam E-mail: [email protected], [email protected], [email protected] Abstract—Wireless Sensor Networks (WSNs) them work correctly and effectively without a conflict have been the subject of intensive research over the in support of the specific applications for which they last years. WSNs consist of a large number of are designed. Each sensor node needs an OS that can sensor nodes, and are used for various applications control the hardware, provide hardware abstraction to such as building monitoring, environment control, application software, and fill in the gap between wild-life habitat monitoring, forest fire detection, applications and the underlying hardware. industry automation, military, security, and health- The basic functionalities of an OS include resource care. Operating system (OS) support for WSNs abstractions for various hardware devices, interrupt plays a central role in building scalable distributed management and task scheduling, concurrency control, applications that are efficient and reliable. Over and networking support. Based on the services the years, we have seen a variety of operating provided by the OS, application programmers can systems (OSes) emerging in the sensor network conveniently use high-level application programming community to facilitate developing WSN interfaces (APIs) independent of the underlying applications. In this paper, we present OS for WSNs. We begin by presenting the major issues for hardware. -
AMNESIA 33: How TCP/IP Stacks Breed Critical Vulnerabilities in Iot
AMNESIA:33 | RESEARCH REPORT How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Published by Forescout Research Labs Written by Daniel dos Santos, Stanislav Dashevskyi, Jos Wetzels and Amine Amri RESEARCH REPORT | AMNESIA:33 Contents 1. Executive summary 4 2. About Project Memoria 5 3. AMNESIA:33 – a security analysis of open source TCP/IP stacks 7 3.1. Why focus on open source TCP/IP stacks? 7 3.2. Which open source stacks, exactly? 7 3.3. 33 new findings 9 4. A comparison with similar studies 14 4.1. Which components are typically flawed? 16 4.2. What are the most common vulnerability types? 17 4.3. Common anti-patterns 22 4.4. What about exploitability? 29 4.5. What is the actual danger? 32 5. Estimating the reach of AMNESIA:33 34 5.1. Where you can see AMNESIA:33 – the modern supply chain 34 5.2. The challenge – identifying and patching affected devices 36 5.3. Facing the challenge – estimating numbers 37 5.3.1. How many vendors 39 5.3.2. What device types 39 5.3.3. How many device units 40 6. An attack scenario 41 6.1. Other possible attack scenarios 44 7. Effective IoT risk mitigation 45 8. Conclusion 46 FORESCOUT RESEARCH LABS RESEARCH REPORT | AMNESIA:33 A note on vulnerability disclosure We would like to thank the CERT Coordination Center, the ICS-CERT, the German Federal Office for Information Security (BSI) and the JPCERT Coordination Center for their help in coordinating the disclosure of the AMNESIA:33 vulnerabilities. -
Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy
Journal of Sensor and Actuator Networks Review Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy Nahla S. Abdel Azeem 1, Ibrahim Tarrad 2, Anar Abdel Hady 3,4, M. I. Youssef 2 and Sherine M. Abd El-kader 3,* 1 Information Technology Center, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 2 Electrical Engineering Department, Al-Azhar University, Naser City, Cairo 11651, Egypt; [email protected] (I.T.); [email protected] (M.I.Y.) 3 Computers & Systems Department, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 4 Department of Computer Science & Engineering, School of Engineering and Applied Science, Washington University in St. Louis, St. Louis, MO 63130, 1045, USA; [email protected] * Correspondence: [email protected] Received: 19 March 2019; Accepted: 7 May 2019; Published: 15 May 2019 Abstract: The rabid growth of today’s technological world has led us to connecting every electronic device worldwide together, which guides us towards the Internet of Things (IoT). Gathering the produced information based on a very tiny sensing devices under the umbrella of Wireless Sensor Networks (WSNs). The nature of these networks suffers from missing sharing among them in both hardware and software, which causes redundancy and more budget to be used. Thus, the appearance of Shared Sensor Networks (SSNs) provides a real modern revolution in it. Where it targets making a real change in its nature from domain specific networks to concurrent running domain networks. That happens by merging it with the technology of virtualization that enables the sharing feature over different levels of its hardware and software to provide the optimal utilization of the deployed infrastructure with a reduced cost. -
Overview of Wireless Sensor Network (WSN) Security
Overview of Wireless Sensor Network (WSN) Security Aparicio Carranza Heesang Kim Xiao Lin Chen NYC College of Technology NYC College of Technology NYC College of Technology 186 Jay Street – V626 186 Jay Street 186 Jay Street Brooklyn, NY, USA Brooklyn, NY, USA Brooklyn NY, USA 718 – 260 – 5897 703 – 232 – 2001 917 – 285 - 5155 [email protected] [email protected] xiaolin,[email protected] ABSTRACT of different transmission schemes, allowing the connection Our civilization has entered an era of big data networking. to be made between different models. A router is a good Massive amounts of data is being converted into bits for example of a gateway. There are two common Wireless transmitting over the Internet and shared all over the world network topologies commonly used in WSN systems, they every second. The concept of “smart” devices has are “relay nodes” and “leaf nodes”. The relay network is a conquered preconceived notions of daily routines. broad network topology where the source and destination Smartphones and wearable device technologies have made are interconnected through some node. In these networks, humans to be continuously interconnected, making distance the source and destination cannot communicate directly a factor of no limitation. “Smart” systems are based on a with each other because the distance between the source single concept called the Internet of Things (IoT). IoT is a and destination is greater than the transmission range, due web of wirelessly networked devices embedded with to this an intermediate node needs to relay. The advantage electronic components and sensors that monitors physical of using the relay nodes is that the information can travel and environmental conditions and acquires data to be long distances even when the caller and recipient are far shared with other systems. -
Performance Study of Real-Time Operating Systems for Internet Of
IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results. -
Monitoring High Voltage Power Lines Using Efficient WSN
Advances in Energy and Power 7(1): 10-19, 2020 http://www.hrpub.org DOI: 10.13189/aep.2020.070102 Monitoring High Voltage Power Lines Using Efficient WSN Khaled Al-Maitah, Batool Al-Khriesat, Abdullah Al-Odienat* Department of Electrical Engineering, Faculty of Engineering, Mutah University, Jordan Received March 13, 2020; Revised April 22, 2020; Accepted April 27, 2020 Copyright©2020 by authors, all rights reserved. Authors agree that this article remains permanently open access under the terms of the Creative Commons Attribution License 4.0 International License Abstract The power transmission line is one of most [1]. Moreover, power systems are now highly critical components in electrical power system. In order to interconnected which allows the transfer of a large enhance the reliability of the large power systems, an electrical energy over long distances far from the source of advanced and efficient Wireless Sensor Network (WSN) generation to locations suffer of lack in electrical energy [2] must be employed along power transmission line. However, [3]. time delay has emerged as one of the most critical issues in In power systems, transmission lines are critical the design of WSN-based monitoring network of components from the reliability and stability view point. transmission lines. This paper proposes a new model for There is a real need for an efficient monitoring system of WSN for monitoring High Voltage Transmission Line the transmission lines to enhance the normal operation of (HVTL) which improves the needed time delay to transmit the power system and avoid the major disconnections and the measured quantity from transmission line towers to the blackouts [4]. -
RT-Druid Reference Manual
RT-Druid reference manual A tool for the design of embedded real-time systems version: 1.5.0 December 11, 2012 About Evidence S.r.l. Evidence is a spin-off company of the ReTiS Lab of the Scuola Superiore S. Anna, Pisa, Italy. We are experts in the domain of embedded and real-time systems with a deep knowledge of the design and specification of embedded SW. We keep providing signifi- cant advances in the state of the art of real-time analysis and multiprocessor scheduling. Our methodologies and tools aim at bringing innovative solutions for next-generation embedded systems architectures and designs, such as multiprocessor-on-a-chip, recon- figurable hardware, dynamic scheduling and much more! Contact Info Address: Evidence Srl, Via Carducci 56 Localit`aGhezzano 56010 S.Giuliano Terme Pisa - Italy Tel: +39 050 991 1122, +39 050 991 1224 Fax: +39 050 991 0812, +39 050 991 0855 For more information on Evidence Products, please send an e-mail to the following address: [email protected]. Other informations about the Evidence product line can be found at the Evidence web site at: http://www.evidence.eu.com. This document is Copyright 2005-2012 Evidence S.r.l. Information and images contained within this document are copyright and the property of Evidence S.r.l. All trademarks are hereby acknowledged to be the properties of their respective owners. The information, text and graphics contained in this document are provided for information purposes only by Evidence S.r.l. Evidence S.r.l. does not warrant the accuracy, or completeness of the information, text, and other items contained in this document. -
System Architecture Directions for Post-Soc/32-Bit Networked Sensors Hyung-Sin Kim, Michael P Andersen, Kaifei Chen, Sam Kumar, William J
System Architecture Directions for Post-SoC/32-bit Networked Sensors Hyung-Sin Kim, Michael P Andersen, Kaifei Chen, Sam Kumar, William J. Zhao, Kevin Ma, and David E. Culler Department of Electrical Engineering and Computer Sciences, University of California, Berkeley (hs.kim,m.andersen,kaifei,samkumar,william_zhao,kevinma.sd,culler)@berkeley.edu ABSTRACT those that have guided design over the past 20 years, since the The emergence of low-power 32-bit Systems-on-Chip (SoCs), which emergence of the field [31, 37]. While it is easy to observe high- integrate a 32-bit MCU, radio, and flash, presents an opportunity level trends and infer that at some point conventional concurrency to re-examine design points and trade-offs at all levels of the sys- models and networking stacks will fit on this class of computing tem architecture of networked sensors. To this end, we develop a platform, when dealing with low power embedded operation, the post-SoC/32-bit design point called Hamilton, showing that using devil is always in the details. integrated components enables a ∼$7 core and shifts hardware mod- The datasheets for modern 32-bit System-on-Chip units (SoCs) ularity to design time. We study the interaction between hardware with an integrated microcontroller (MCU) and radio are truly im- and embedded operating systems, identifying that (1) post-SoC pressive [10, 43]. Thread-based OSes have reemerged (e.g., RIOT motes provide lower idle current (5.9 µA) than traditional 16-bit [14]), and commercially-driven IPv6 network protocols have arrived motes, (2) 32-bit MCUs are a major energy consumer (e.g., tick (e.g., OpenThread [71]). -
A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks
A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks Kosmas Kritsis, Georgios Papadopoulos, Antoine Gallais, Periklis Chatzimisios, Fabrice Theoleyre To cite this version: Kosmas Kritsis, Georgios Papadopoulos, Antoine Gallais, Periklis Chatzimisios, Fabrice Theoleyre. A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks. Communications Surveys and Tutorials, IEEE Communications Society, Institute of Electrical and Electronics Engineers, 2018, 20 (3), pp.1799 - 1825. 10.1109/COMST.2018.2820810. hal-01886690 HAL Id: hal-01886690 https://hal.archives-ouvertes.fr/hal-01886690 Submitted on 23 Apr 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 1 A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks Kosmas Kritsis, Georgios Z. Papadopoulos, Member, IEEE, Antoine Gallais, Periklis Chatzimisios, Senior Member, IEEE, and Fabrice Theoleyre,´ Senior Member, IEEE, Abstract—Envisioned communication densities in Internet of may be used for counting the number of vehicles, such to Things (IoT) applications are increasing continuously. Because control optimally the street traffic lights and to reduce the these wireless devices are often battery powered, we need waiting time [3]. specific energy efficient (low-power) solutions. -
A Comparative Study Between Operating Systems (Os) for the Internet of Things (Iot)
VOLUME 5 NO 4, 2017 A Comparative Study Between Operating Systems (Os) for the Internet of Things (IoT) Aberbach Hicham, Adil Jeghal, Abdelouahed Sabrim, Hamid Tairi LIIAN, Department of Mathematic & Computer Sciences, Sciences School, Sidi Mohammed Ben Abdellah University, [email protected], [email protected], [email protected], [email protected] ABSTRACT Abstract : We describe The Internet of Things (IoT) as a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data in real time with the outside world. It therefore assumes an operating system (OS) which is considered as an unavoidable point for good communication between all devices “objects”. For this purpose, this paper presents a comparative study between the popular known operating systems for internet of things . In a first step we will define in detail the advantages and disadvantages of each one , then another part of Interpretation is developed, in order to analyze the specific requirements that an OS should satisfy to be used and determine the most appropriate .This work will solve the problem of choice of operating system suitable for the Internet of things in order to incorporate it within our research team. Keywords: Internet of things , network, physical object ,sensors,operating system. 1 Introduction The Internet of Things (IoT) is the vision of interconnecting objects, users and entities “objects”. Much, if not most, of the billions of intelligent devices on the Internet will be embedded systems equipped with an Operating Systems (OS) which is a system programs that manage computer resources whether tangible resources (like memory, storage, network, input/output etc.) or intangible resources (like running other computer programs as processes, providing logical ports for different network connections etc.), So it is the most important program that runs on a computer[1]. -
Contiki – a Lightweight and Flexible Operating System for Tiny Networked Sensors
Contiki – a Lightweight and Flexible Operating System for Tiny Networked Sensors Adam Dunkels, Björn Grönvall, Thiemo Voigt Swedish Institute of Computer Science IEEE EmNetS-I, 16 November 2004 Sensor OS trade-offs: static vs dynamic event-driven vs multi-threaded What we have done ● Contiki – an OS for sensor network nodes ● Ported Contiki to a number of platforms ● MSP430, AVR, HC12, Z80, 6502, x86, ... ● Simulation environment for BSD/Linux/Windows ● Built a few applications for experimental network deployments Contributions ● Dynamic loading of programs ● Selective reprogramming ● Static vs dynamic linking ● Concurrency management mechanisms ● Events vs threads ● Trade-offs: preemption, size Contiki design target ● “Mote”-class device ● 10-100 kilobytes of code ROM ● 1-10 kilobytes of RAM ● Communication (radio) ● ESB from FU Berlin ● MSP430, 2k RAM, 60k ROM Contiki size (bytes) Module Code MSP430 Code AVR RAM Kernel 810 1044 10 + e + p Program loader 658 - 8 Multi-threading library 582 678 8 + s Timer library 60 90 0 Memory manager 170 226 0 Event log replicator 1656 1934 200 µIP TCP/IP stack 4146 5218 18 + b Run-time reprogramming and loadable programs Reprogramming sensor nodes ● Software development for sensor nets ● Need to reprogram many nodes quite often ● Utilize radio for reprogramming ● Radio inherently broadcast ● Reprogram many nodes at once ● Much faster than firmware download via cable or programming adapter ● Reprogram deployed networks Traditional systems: entire system a monolithic binary ● Most systems statically -
Embedded Operating Systems
7 Embedded Operating Systems Claudio Scordino1, Errico Guidieri1, Bruno Morelli1, Andrea Marongiu2,3, Giuseppe Tagliavini3 and Paolo Gai1 1Evidence SRL, Italy 2Swiss Federal Institute of Technology in Zurich (ETHZ), Switzerland 3University of Bologna, Italy In this chapter, we will provide a description of existing open-source operating systems (OSs) which have been analyzed with the objective of providing a porting for the reference architecture described in Chapter 2. Among the various possibilities, the ERIKA Enterprise RTOS (Real-Time Operating System) and Linux with preemption patches have been selected. A description of the porting effort on the reference architecture has also been provided. 7.1 Introduction In the past, OSs for high-performance computing (HPC) were based on custom-tailored solutions to fully exploit all performance opportunities of supercomputers. Nowadays, instead, HPC systems are being moved away from in-house OSs to more generic OS solutions like Linux. Such a trend can be observed in the TOP500 list [1] that includes the 500 most powerful supercomputers in the world, in which Linux dominates the competition. In fact, in around 20 years, Linux has been capable of conquering all the TOP500 list from scratch (for the first time in November 2017). Each manufacturer, however, still implements specific changes to the Linux OS to better exploit specific computer hardware features. This is especially true in the case of computing nodes in which lightweight kernels are used to speed up the computation. 173 174 Embedded Operating Systems Figure 7.1 Number of Linux-based supercomputers in the TOP500 list. Linux is a full-featured OS, originally designed to be used in server or desktop environments.