Évaluation Et Amélioration Des Plates-Formes Logicielles Pour Réseaux De Capteurs Sans-Fil, Pour Optimiser La Qualité De Service Et L’Énergie Kévin Roussel

Total Page:16

File Type:pdf, Size:1020Kb

Évaluation Et Amélioration Des Plates-Formes Logicielles Pour Réseaux De Capteurs Sans-Fil, Pour Optimiser La Qualité De Service Et L’Énergie Kévin Roussel Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans-fil, pour optimiser la qualité de service et l’énergie Kévin Roussel To cite this version: Kévin Roussel. Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans- fil, pour optimiser la qualité de service et l’énergie. Autre [cs.OH]. Université de Lorraine, 2016. Français. NNT : 2016LORR0051. tel-01754653 HAL Id: tel-01754653 https://hal.univ-lorraine.fr/tel-01754653 Submitted on 30 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle. articles L 122. 4 Code de la Propriété Intellectuelle. articles L 335.2- L 335.10 http://www.cfcopies.com/V2/leg/leg_droi.php http://www.culture.gouv.fr/culture/infos-pratiques/droits/protection.htm Ecole´ doctorale IAEM Lorraine Evaluation´ et am´eliorationdes plates-formes logicielles pour r´eseaux de capteurs sans-fil, pour optimiser la qualit´ede service et l'´energie THESE` pr´esent´eeet soutenue publiquement le 3 juin 2016 pour l'obtention du Doctorat de l'Universit´ede Lorraine (mention informatique) par K´evinRoussel Composition du jury Pr´esident: Fran¸coisCharpillet Directeur de Recherches INRIA Rapporteurs : Thierry Val Professeur des Universit´es Thomas No¨el Professeur des Universit´es Examinateurs : Thomas Watteyne Charg´ede Recherches INRIA Emmanuel Baccelli Charg´ede Recherches INRIA Encadrants : Ye-Qiong Song Professeur des Universit´es Olivier Zendra Charg´ede Recherches INRIA Invit´e: Jean-Philippe Blanchard Responsable du P^oleInnovation du Cr´editAgricole S.A. INRIA Nancy Grand-Est Laboratoire Lorrain de Recherche en Informatique et ses Applications | UMR 7503 Version 3.1416 du 30 juin 2016 Mis en page avec la classe thesul. i À mes parents, À mes grand-parents. iii Remerciements Je tiens, dans la présente section, à exprimer toute ma gratitude envers tous ceux qui ont permis, directement ou indirectement, à ce travail de thèse de Doctorat d’arriver à son terme. Je remercie donc tout d’abord le Professeur Ye-Qiong SONG, et le Docteur Olivier ZENDRA, mes encadrants, qui m’ont supporté à tout point de vue durant toute la durée de cette thèse, « contre vents et marées » pourrait-on dire. J’adresse également ma profonde reconnaissance aux Professeurs Thierry VAL et Thomas NOËL, pour l’œil exigeant mais également bienveillant avec lequel ils ont accepté d’évaluer les présents travaux de thèse. Ma reconnaissance va aussi aux Docteurs Thomas WATTEYNE et Emmanuel BACCELLI, ainsi qu’au Professeur François CHARPILLET pour l’intérêt qu’ils ont bien voulu porter aux dits travaux, respectivement en tant qu’examinateurs et président du jury de soutenance. Je remercie aussi l’équipe Madynes, ses dirigeants (Olivier FESTOR puis Isabelle CHRISMENT) et tous ses membres pour leur compréhension et leurs encouragements dans les moments difficiles qui sont régulièrement survenus lors de cette période. Je me dois également d’exprimer ma reconnaissance au Service des Ressources Humaines de l’INRIA au sein duquel s’est déroulée la présente thèse, notamment François THAVEAU et Patricia VENTURIN, et toutes les personnes intervenues à la demande de ces derniers pour me sortir de l’impasse : il s’agit notamment du Dr. Marie-Hélène GLOC (médecin du travail) et Rachel GRÉGOIRE (assistante sociale), ainsi que des membres du cabinet parisien ARIHM. Parmi ces derniers, j’adresse mes respectueux remerciements au Dr. Gisèle BIRCK pour son écoute et ses conseils, et surtout ma reconnaissance amicale à Timy CASSEREAU pour sa présence, son soutien et sa confiance sans failles et sans interruptions. Plus généralement, je dois également mes remerciements à l’Université de Lor- raine et plus précisément au LORIA où s’est déroulée cette thèse, sans qui rien n’aurait bien évidemment été possible. J’adresse également mes remerciements par- ticuliers au Dr. Jean-Philippe BLANCHARD, coordinateur du projet LAR qui a financé ma thèse, et n’a jamais ménagé ses efforts mais aussi sa sympathie et son énergie durant toute la durée du dit projet. J’adresse également mes sentiments amicaux et reconnaissants aux confrères, doctorants et ingénieurs, qui m’ont cotoyé, soutenu et souvent encouragé durant ces trois années, entre autres : Élian AUBRY, Abdallah DIB, François DESPAUX, Iñaki FERNÁNDEZ PÉREZ, Éric FINICKEL, Gaëtan HUREL, Anthéa MAYZAUD, Saïd SEDDIKI, Wazen SHBAIR, Mohamed TLIG, Evangelia TSIONTSIOU, Shouguo ZHUO. ainsi que tous les amis moniteurs de l’ENSEM. Je ne vous oublie pas, et vous souhaite bonne chance (pour ceux qui doivent encore finir leur propre thèse) et bonne continuation et succès (à tous). Enfin, j’adresserai les dernières paroles de cette section à mes parents et à feu mes grands-parents, à qui cette thèse est dédiée. Puissent ces modestes travaux vous apporter un peu de fierté, comme je souhaite qu’ils apportent quelques avancées — aussi modestes soient-elles — à la science et à l’informatique. v Sommaire Table des figures xi Liste des tableaux xv 1 Introduction 1 2 Contexte et problématique 7 2.1 Réseaux de capteurs et actionneurs sans-fil ............... 7 2.1.1 Définitions ............................ 7 2.1.2 Constitution d’une “mote” .................... 8 2.1.3 Les réseaux de capteurs sans-fil et leur trafic . 10 2.1.4 Spécificités des WSN ....................... 12 2.2 La Qualité de Service (QdS) ....................... 14 2.2.1 Notion de QdS .......................... 14 2.2.2 Critères de QdS .......................... 15 2.2.3 Stratégies d’assurance de la QdS . 15 2.2.4 Niveaux de service ........................ 16 2.2.5 QdS dans les réseaux de capteurs sans-fil . 16 2.3 Applications des WSN (et de l’IoT) ................... 17 2.4 Contexte .................................. 19 2.4.1 Applications d’e-santé des WSN . 19 2.4.2 Le projet LAR .......................... 19 2.5 Problématique .............................. 21 2.5.1 Exposé de la problématique ................... 21 2.5.2 Stratégie préconisée ....................... 21 vii viii Sommaire 3 Analyse critique de l’état de l’art 25 3.1 Le protocole IEEE 802.15.4 ....................... 25 3.1.1 Couche physique ......................... 26 3.1.2 Couche MAC ........................... 29 3.2 Protocoles MAC ............................. 34 3.2.1 Protocoles MAC synchrones ................... 35 3.2.2 Protocoles MAC asynchrones LPL . 37 3.2.3 Protocoles MAC asynchrones LPP . 40 3.2.4 Protocoles MAC à ordonnancement temporel . 43 3.2.5 Protocoles MAC multicanaux . 45 3.2.6 Protocoles hybrides avancés ................... 46 3.2.7 Discussion : les protocoles MAC / RDC . 60 3.3 Systèmes d’exploitation dédiés ...................... 61 3.3.1 Rappels sur les notions de multi-tâche . 61 3.3.2 TinyOS .............................. 63 3.3.3 Contiki .............................. 65 3.3.4 Nano-RK ............................. 66 3.3.5 RIOT OS ............................. 68 3.3.6 Autres OS spécialisés ....................... 70 3.3.7 OS temps-réel classiques / généralistes . 72 3.3.8 Discussion : les systèmes d’exploitation dédiés . 74 3.4 Conclusion : protocoles MAC / RDC et OS spécialisés . 75 4 Plates-formes logicielles : évaluation, problèmes et améliorations 79 4.1 Contiki : développement et limitations . 79 4.1.1 Documentation minimaliste ................... 80 4.1.2 Limitations techniques ...................... 81 4.1.3 Fonctionnalités temps-réel insuffisantes . 86 4.2 RIOT OS : découverte et contributions . 87 4.2.1 La plate-forme logicielle RIOT OS . 87 4.2.2 Contributions au projet RIOT OS . 88 4.2.3 Évolution du système RIOT OS . 95 4.3 La nouvelle pile réseau de RIOT : une analyse critique . 95 4.3.1 Description ............................ 95 ix 4.3.2 Avantages ............................. 98 4.3.3 Inconvénients et manques .................... 99 4.3.4 Discussion : la pile « gnrc » . 100 4.4 Discussion : plates-formes logicielles, contributions et conclusions . 101 5 Évaluation et comparaison des implantations de deux protocoles MAC / RDC : ContikiMAC et S-CoSenS 103 5.1 Premières plates-formes matérielles . 103 5.2 Implantation de S-CoSenS sous RIOT OS : précision de la synchronisation entre noeuds . 105 5.3 Évaluation des performances : comparaison avec ContikiMAC . 109 5.3.1 Configuration des expériences . 109 5.3.2 Taux de réception des paquets . 110 5.3.3 Délai total (« de bout-en-bout ») de transmission des trames 114 5.3.4 Consommation d’énergie : “Duty Cycles” . 117 5.3.5 Stabilité et contraintes mémoire . 120 5.3.6 Influence de l’optimisation des implantations . 121 5.3.7 Comparaison avec essais sur matériel . 123 5.4 Améliorations potentielles des protocoles MAC /RDC . 125 5.4.1 Propositions d’améliorations algorithmiques . 125 5.4.2 Évaluation de ces propositions : difficultés et inadéquation des simulations ............................ 127 5.5 Discussion : évaluation et comparaison de protocoles MAC / RDC, contributions et conclusion ........................ 132 6 Validation des expérimentations sur plates-formes réelles 135 6.1 Motivation : limitations et inexactitudes des simulations . 136 6.1.1 Rappels sur Cooja et MSPSim . 136 6.1.2 Inexactitudes des délais sous MSPSim . 138 6.1.3 Risques et conséquences potentiels . 143 6.1.4 Discussion : limites des simulations et émulations .
Recommended publications
  • Communications Protocols for Wireless Sensor Networks in Perturbed Environment
    COMMUNICATIONS PROTOCOLS FOR WIRELESS SENSOR NETWORKS IN PERTURBED ENVIRONMENT by Ndeye Bineta SARR THESIS PRESENTED TO ÉCOLE DE TECHNOLOGIE SUPÉRIEURE AND UNIVERSITY OF POITIERS (CO-TUTORSHIP) IN PARTIAL FULFILLMENT FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Ph.D. MONTREAL, MARCH, 25, 2019 ÉCOLE DE TECHNOLOGIE SUPÉRIEURE UNIVERSITÉ DU QUÉBEC Ndéye Bineta Sarr, 2019 This Creative Commons license allows readers to download this work and share it with others as long as the author is credited. The content of this work may not be modified in any way or used commercially. Université de Poitiers Faculté des Sciences Fondamentales et Appliquées (Diplôme National - Arrêté du 25 mai 2016) École doctorale ED no 610 : Sciences et Ingénierie des Systèmes, Mathématiques, Informatique Co-tutelle avec l’École de Technologie Supérieure de Montréal (ETS), Canada THÈSE Pour l’obtention du Grade de Docteur délivré par l’Université de Poitiers et Ph. D. de l’École de Technologie Supérieure de Montréal (ETS) Secteur de Recherche : Électronique, microélectronique, nanoélectronique et micro-ondes Présentée et soutenue par Ndéye Bineta SARR 31 Janvier 2019 PROTOCOLES DE COMMUNICATIONS POUR RESEAUX DE CAPTEURS EN MILIEU FORTEMENT PERTURBÉ COMMUNICATIONS PROTOCOLS FOR WIRELESS SENSOR NETWORKS IN PERTURBED ENVIRONMENT Directeurs de Thèse : Rodolphe Vauzelle, François Gagnon Co-directeurs de Thèse : Hervé Boeglen, Basile L. Agba Jury Basile L. AGBA, Chercheur, Institut de Recherche d’Hydro-Québec…..…………………Examinateur Hervé BOEGLEN, Maître de Conférences, Université
    [Show full text]
  • A Holistic Framework for Open Low-Power Internet of Things
    A Holistic Framework for Open Low-Power Internet of Things Technology Ecosystems Peng Hu1, Member, IEEE Abstract The low-power Internet of Things (IoT) has been thriving because of the recent technological advancement and ecosystems meeting the vertical application requirements and market needs. An open IoT technology ecosystem of the low-power IoT has become increasingly important to all the players and stakeholders and to the research community. However, there are several mainstream low-power IoT ecosystems available out of industry consortia or research projects and there are different models implied in them. We need to identify the working framework behind the scene and find out the principle of driving the future trends in the industry and research community. With a close look at these IoT technology ecosystems, four major business models are identified that can lead to the proposed ecosystem framework. The framework considers the technical building blocks, market needs, and business vertical segments, where these parts are making the IoT evolve as a whole for the years to come. I. Introduction Internet advances with the openness in mind, so does the Internet of Things (IoT). An IoT system benefit from various kinds of technologies and developmental efforts driven by open IoT technology ecosystems involving open standards, open source tools, and open platforms with key stakeholders. Over the past decade, the innovative sensors, embedded systems, cloud computing, wireless networking technologies have been enriching the openness of IoT systems and fulfilling the needs of IoT system development. As a result, on the one hand, these technologies enable the extremely less power consumption on IoT devices than before, which enables a broad spectrum of zero-battery and battery-powered applications.
    [Show full text]
  • Towards Usage of Wireless MEMS Networks in Industrial Context
    Towards Usage of Wireless MEMS Networks in Industrial Context Pascale Minet Julien Bourgeois INRIA University of Franche-Comte Rocquencourt FEMTO-ST Institute 78153 Le Chesnay cedex, France UMR CNRS 6174 Email: [email protected] 1 cours Leprince-Ringuet, 25200 Montbeliard, France Email: [email protected] Abstract—Industrial applications have specific needs which All these applications require an operational network to fulfill require dedicated solutions. On the one hand, MEMS can be their missions, usually without external human intervention. used as affordable and tailored solution while on the other hand, wireless sensor networks (WSNs) enhance the mobility and give more freedom in the design of the overall architecture. Application scenarios for WSNs often involve battery- Integrating these two technologies would allow more optimal powered nodes being active for a long period, without external solutions in terms of adaptability, ease of deployment and human control after initial deployment. In the absence of reconfigurability. The objective of this article is to define the energy efficient techniques, a node would drain its battery new challenges that will have to be solved in the specific context within a couple of days. This need has led researchers to of wireless MEMS networks applied to industrial applications. To illustrate the current state of development of this domain, two design protocols able to minimize energy consumption. Unlike projects are presented: the Smart Blocks project and the OCARI other networks, it can be hazardous, very expensive or even project. impossible to charge or replace exhausted batteries due to the hostile nature of environment. Energy efficiency, [1] and [2], I.
    [Show full text]
  • An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home
    Wireless Sensor Network, 2014, 6, 192-204 Published Online September 2014 in SciRes. http://www.scirp.org/journal/wsn http://dx.doi.org/10.4236/wsn.2014.69019 An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home Juan Lu1,2, Adrien Van Den Bossche1,3, Eric Campo1,2 1Univ de Toulouse, Toulouse, France 2CNRS, LAAS, Toulouse, France 3CNRS, IRIT, Toulouse, France Email: [email protected], [email protected], [email protected] Received 21 July 2014; revised 20 August 2014; accepted 19 September 2014 Copyright © 2014 by authors and Scientific Research Publishing Inc. This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ Abstract Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are interested in the study and the proposal of a solution allowing distributed sensor nodes to communicate with each other in an optimal way adapted to the specific applica- tion constraints. More precisely, we want to build a wireless network that consists of several short range sensor nodes exchanging data between them according to a communication protocol at MAC (Medium Access Control) level. This protocol must be able to optimize energy consumption, trans- mission time and loss of information. To achieve this objective, we have analyzed the advan- tages and the limitations of WSN (Wireless Sensor Network) technologies and communication protocols currently used in relation to the requirements of our application.
    [Show full text]
  • A Survey on Industrial Internet with ISA100 Wireless
    Received July 28, 2020, accepted August 21, 2020, date of publication August 26, 2020, date of current version September 9, 2020. Digital Object Identifier 10.1109/ACCESS.2020.3019665 A Survey on Industrial Internet With ISA100 Wireless THEOFANIS P. RAPTIS , ANDREA PASSARELLA , AND MARCO CONTI Institute of Informatics and Telematics, National Research Council, 56124 Pisa, Italy Corresponding author: Theofanis P. Raptis ([email protected]) This work was supported in part by the European Commission through the H2020 INFRAIA-RIA Project SoBigDataCC: European Integrated Infrastructure for Social Mining and Big Data Analytics under Grant 871042, and in part by the H2020 INFRADEV Project SLICES-DS Scientific Large-scale Infrastructure for Computing Communication Experimental Studies—Design Study under Grant 951850. ABSTRACT We present a detailed survey of the literature on the ISA100 Wireless industrial Internet standard (also known as ISA100.11a or IEC 62734). ISA100 Wireless is the IEEE 802.15.4-compatible wireless networking standard ``Wireless Systems for Industrial Automation: Process Control and Related Applications''. It features technologies such as 6LoWPAN, which renders it ideal for industrial Internet edge applications. The survey focuses on the state of the art research results in the frame of ISA100 Wireless from a holistic point of view, including aspects like communication optimization, routing mechanisms, real-time control, energy management and security. Additionally, we present a set of reference works on the related deployments around the globe (experimental testbeds and real-terrain installations), as well as of the comparison to and co-existence with another highly relevant industrial standard, WirelessHART. We conclude by discussing a set of open research challenges.
    [Show full text]
  • Wireless Sensor Networks Technology and Simulation Software’S
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 5, May 2016 An Overview on Wireless Sensor Networks Technology and Simulation Software’s Vijay S. Kale1, Rohit D. Kulkarni2 Associate Professor, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India1 M. Phil. Student, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India2 Abstract: Advances in wireless networking, micro-fabrication and integration of sensors and actuators manufactured using micro-electromechanical system (MEMS) technology and embedded microprocessors have enabled a new generation of massive-scale sensor networks suitable for a range of commercial and military applications. Sensor networks promise to couple end users directly to sensor measurements and provide information that is precisely localized in time and/or space, according to the user’s needs or demands. Node-level design simulators simulate the behaviour of a sensor network on a per-node basis. Using simulation, designers can quickly study the performance in terms of timing, power, bandwidth, and scalability without implementing them on actual hardware and dealing with the actual physical phenomena. The present communication gives the brief survey of wireless sensor network (WSN), WSN components, details of operating systems (TinyOS, RIOT, Nano-RK, MANTIS etc.) and WSN simulation software’s (NS2, OMNET++, J-Sim, JiST, GloMoSim, SSFNet etc.). The aim is to provide a better understanding of the current research issues in this field and outline the use of certain tools to meet the design objectives which will be useful to learner/researcher to develop WSNs applications. Keywords: Sensor nodes, Architecture, Operating system, Simulation software, Wireless technology.
    [Show full text]
  • Deployment of Tinyos for Online Water Sensing
    TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.6, June 2014, pp. 4802 ~ 4807 DOI: 10.11591/telkomnika.v12i6.5525 4802 Deployment of TinyOS for Online Water Sensing Xin Wang*, Pan Xu Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), Jiangnan University, Wuxi 214122, PR China *Corresponding author, e-mail: [email protected] Abstract Current quality assessment methods of water parameters are mainly laboratory based, require fresh supplies of chemicals, trained staff and are time consuming. Sensor networks are great alternatives for such requirements. We present a practical application of wireless networks: a remote water monitoring system running TinyOS. The contents of several chemicals in the water are sensed and transmitted. The sensor data are collected and transmitted via ZigBee and GPRS. Instead of focusing on theoretic issues such as routing algorithms, network lifetime and so on, we investigate special techniques involved in the implementation of the system while employing TinyOS and its special programming language. Keywords: TinyOS, hierarchical network, embedded operating system, water sensing 1. Introduction TinyOS is an open source, BSD-licensed operating system designed for low-power wireless devices, such as those used in sensor networks, ubiquitous computing, personal area networks, smart buildings, and smart meters. To confront the water pollution, various water monitoring systems based on cellular mobile network have been developed [1, 2]. These systems may assist environmental protection agencies in providing continuous water monitoring with minimum interaction of man interference. But, with such systems, the rare channel resources and hardware are greatly wasted when the monitoring nodes are distributed in higher density.
    [Show full text]
  • Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7
    Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7 Helen Fornazier, Aurélien Martin, Scott Messner 16 march 2012 Abstract This article has for objective to introduce the basic concepts of and to compare dierent wireless technologies applied to embedded systems. It focuses on Wi-Fi, Bluetooth, IEEE 802.15.4 and Dash7. For each technology, this article covers multiplexing, topology, range, energy consumption, data rate, application, security and peculiarities. At the end of the article, the developer should be able to choose the best wireless technology for their own embedded application and have a basic notion as to how to integrate the technology into their system. Contents 1 Introduction 3 2 Wi-Fi 3 2.1 Origins . 3 2.2 Frequency Channels . 4 2.3 Multiplexing . 4 2.4 Network Topology . 4 2.4.1 Infrastructure Topology (Point-to-Point or Point- to-Multipoint) . 4 2.4.2 Ad-Hoc Topology . 5 2.5 Layers Denitions . 5 2.6 Range, Power Consumption, Data Rate . 8 2.7 Security . 8 2.8 Particularities and Embedded Applications . 8 2.8.1 Wi-Fi Conguration Interface . 10 2.8.2 Embedded Software integration . 10 2.8.3 Other Considerations . 10 2.8.4 Applications of Ad Hoc: Wi-Fi Direct . 12 3 Bluetooth 12 3.1 Origins . 12 3.2 Frequency Channels . 12 3.3 Multiplexing . 13 1 3.4 Network Topology . 13 3.4.1 Piconet Topology . 13 3.4.2 Scatternet Topology . 13 3.5 Layers Denitions . 13 3.5.1 The Bluetooth Controller . 15 3.5.2 The Bluetooth Host .
    [Show full text]
  • Source Code Vulnerabilities in Iot Software Systems
    Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 3, 1502-1507 (2017) ASTESJ www.astesj.com ISSN: 2415-6698 Special Issue on Recent Advances in Engineering Systems Source Code Vulnerabilities in IoT Software Systems Saleh Mohamed Alnaeli*,1, Melissa Sarnowski2, Md Sayedul Aman3, Ahmed Abdelgawad3, Kumar Yelamarthi3 1CSEPA, University of Wisconsin-Colleges, 53715, USA 2Computer Science, University of Wisconsin-Fox Valley, 54952, USA 3College of Science and Engineering, Central Michigan University, 48859, USA A R T I C L E I N F O A B S T R A C T Article history: An empirical study that examines the usage of known vulnerable statements in software Received: 02 June, 2017 systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 Accepted: 21 July, 2017 open source systems comprised of millions of lines of code and containing thousands of Online: 15 August, 2017 files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen) that are well-known among research Keywords: communities to cause potential risks and security concerns, thereby decreasing a system’s unsafe commands robustness and quality. These unsafe statements are banned by many companies (e.g., vulnerable software Microsoft). The use of these commands should be avoided from the start when writing code scientific and should be removed from legacy code over time as recommended by new C/C++ security language standards. Each system is analyzed and the distribution of the known unsafe static analysis commands is presented.
    [Show full text]
  • A Survey of Internet of Things (Iot) Authentication Schemes †
    sensors Article A Survey of Internet of Things (IoT) Authentication Schemes † Mohammed El-hajj 1,2,*, Ahmad Fadlallah 1 , Maroun Chamoun 2 and Ahmed Serhrouchni 3,* 1 University of Sciences and Arts in Lebanon, Beirut 1002, Lebanon; [email protected] 2 Saint Joseph University, Beirut 1514, Lebanon; [email protected] 3 Telecom ParisTech, 75013 Paris, France * Correspondence: [email protected] (M.E.-h.); [email protected] (A.S.) † This paper is an extended version of two papers previously published by the authors in 2017. The first one is: In Proceedings of the 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 18–20 October 2017; pp. 1–3 and the second one is: In Proceedings of the 2017 IEEE 15th Student Conference on Research and Development (SCOReD), Putrajaya, Malaysia, 13–14 December 2017; pp. 67–71. (check the references section). Received: 23 January 2019; Accepted: 27 February 2019; Published: 6 March 2019 Abstract: The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system.
    [Show full text]
  • Contributions to the Optimized Deployment of Connected Sensors on the Internet of Things Collection Networks Sami Mnasri
    Contributions to the optimized deployment of connected sensors on the Internet of Things collection networks Sami Mnasri To cite this version: Sami Mnasri. Contributions to the optimized deployment of connected sensors on the Internet of Things collection networks. Networking and Internet Architecture [cs.NI]. Université Toulouse le Mirail - Toulouse II, 2018. English. NNT : 2018TOU20046. tel-02447194 HAL Id: tel-02447194 https://tel.archives-ouvertes.fr/tel-02447194 Submitted on 21 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE En vue de l’obtention du DOCTORAT DE L’UNIVERSITÉ DE TOULOUSE Délivré par : Université Toulouse - Jean Jaurès Présentée et soutenue par : Sami MNASRI le mercredi 27 Juin 2018 Titre : Contributions to the optimized deployment of connected sensors on the Internet of Things collection networks École doctorale et discipline ou spécialité : ED MITT : Domaine STIC : Réseaux, Télécoms, Systèmes et Architecture Unité de recherche : Institut de Recherche en Informatique de Toulouse (IRIT), équipe RMESS Directeur de Thèse : Thierry VAL, Professeur à l'Université de Toulouse Jury : Pr. Belhassen ZOUARI, Université de Carthage, Rapporteur HDR Dr. Hanen IDOUDI, Ecole Nationale des Sciences de I'nformatique de Tunis, Rapporteur Dr.
    [Show full text]
  • A Long-Distance RF-Powered Sensor Node with Adaptive Power Management for Iot Applications
    sensors Article A Long-Distance RF-Powered Sensor Node with Adaptive Power Management for IoT Applications Matteo Pizzotti 1,2,* ID , Luca Perilli 1 ID , Massimo del Prete 2, Davide Fabbri 2, Roberto Canegallo 3, Michele Dini 1, Diego Masotti 2 ID , Alessandra Costanzo 1,2, Eleonora Franchi Scarselli 1,2 ID and Aldo Romani 1,2 ID 1 Advanced Research Center on Electronic Systems, University of Bologna, Via Toffano 2/2, Bologna 40126, Italy; [email protected] (L.P.); [email protected] (M.D.); [email protected] (A.C.); [email protected] (E.F.S.); [email protected] (A.R.) 2 Department of Electrical, Electronic, and Information Engineering, University of Bologna, Via Risorgimento 2, Bologna 40126, Italy; [email protected] (M.d.P.); [email protected] (D.F.); [email protected] (D.M.) 3 STMicroelectronics, Via Camillo Olivetti, Agrate Brianza 20864, Italy; [email protected] * Correspondence: [email protected]; Tel.: +39-054-733-9537 Received: 30 June 2017; Accepted: 26 July 2017; Published: 28 July 2017 Abstract: We present a self-sustained battery-less multi-sensor platform with RF harvesting capability down to −17 dBm and implementing a standard DASH7 wireless communication interface. The node operates at distances up to 17 m from a 2 W UHF carrier. RF power transfer allows operation when common energy scavenging sources (e.g., sun, heat, etc.) are not available, while the DASH7 communication protocol makes it fully compatible with a standard IoT infrastructure. An optimized energy-harvesting module has been designed, including a rectifying antenna (rectenna) and an integrated nano-power DC/DC converter performing maximum-power-point-tracking (MPPT).
    [Show full text]