259 results on '"publish-subscribe"'
Search Results
2. Slow Subscribers: a novel IoT-MQTT based denial of service attack.
- Author
-
Liu, Yifeng and Al-Masri, Eyhab
- Subjects
- *
DENIAL of service attacks , *CYBERTERRORISM , *QUANTUM cryptography - Abstract
MQTT, a popular IoT messaging protocol, is frequently associated with numerous vulnerabilities, the majority of which are critical. Many IoT devices that utilize MQTT are susceptible to cyberattacks such as denial-of-service and buffer overflow. In this paper, we unveil a novel Denial of Service (DoS) attack in the MQTT protocol, referred to as Slow Subscribers, which has the potential to cause MQTT brokers to become single points of failure. Unlike existing MQTT DoS attacks, Slow Subscribers can occur on a single compromised node and could potentially disrupt a MQTT broker with minimal subscription permissions. We evaluated the reliability of Mosquitto and NanoMQ, two popular MQTT messaging brokers, to determine the effect of Slow Subscribers. According to the findings of our investigation, NanoMQ outperforms Mosquitto in response to the Slow Subscribers attack at QoS level 0. We also determine that the response to Slow Subscribers at QoS 2 is the worst for both broker implementations. In addition, the results of our experiments indicate that Eclipse Mosquitto achieves a higher rate of reliability than NanoMQ on cloud deployments whereas NanoMQ has proven to be well-suited for edge environments, especially edge IoT devices that require the use of QoS levels 0 and 1. Finally, we propose a Resilient Middleware for Message Queue Telemetry Transport (Remistry) framework that is capable of detecting misconfigurations while providing granular support of resource commitment errors, in particular the out-of-memory (OOM) problems for effectively mitigating the impact of Slow Subscribers attacks on MQTT brokers. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. A Comparison of Publish-Subscribe and Client-Server Models for Streaming IoT Telemetry Data
- Author
-
Ajayi, Olasupo, Bagula, Antoine, Bode, Joshua, Damon, Moegammad, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Masinde, Muthoni, editor, and Bagula, Antoine, editor
- Published
- 2023
- Full Text
- View/download PDF
4. Research of Automated Control Systems Development Based on 'Publish-Subscribe' Technology Over Low-Bandwidth Radio Networks
- Author
-
Strelkovskaya, Irina, Zolotukhin, Roman, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Ilchenko, Mykhailo, editor, Uryvsky, Leonid, editor, and Globa, Larysa, editor
- Published
- 2023
- Full Text
- View/download PDF
5. MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT).
- Author
-
Hintaw, Ahmed J., Manickam, Selvakumar, Aboalmaaly, Mohammed Faiz, and Karuppayah, Shankar
- Subjects
- *
INTERNET of things , *WIRELESS sensor networks , *ENERGY consumption , *WIRELESS communications , *DISCLOSURE , *ENERGY conservation , *CONSERVATION of energy , *TCP/IP - Abstract
Internet of Things (IoT) paved the way for devices and machine communication using TCP/IP protocol. Lightweight and stateless communication is imperative especially in a situation requiring conservation of energy usage, e.g. wireless sensor network. Representational State Transfer (REST) API method is based on web communication protocol, Hyper-Text Transfer Protocol (HTTP), and is widely used in IoT messaging. Some of these protocols are DPWS, XMPP, MQTT, COaP, AMQP. Among these protocols, MQTT is the most preferred protocol and is expected to be the de facto messaging IoT standard. MQTT uses a publisher/subscriber model to facilitate messaging between devices making messaging lightweight. Nevertheless, there are a number of security issues due to the design of the protocol itself. Some of the issues are denial of service, identity spoofing, information disclosure, elevation of privileges and data tampering. These issues can be caused by both internal and external perpetrators. Researchers have proposed various security techniques and mechanisms to address these issues. Incorporation of security has added processing overhead to the devices and this will have a bearing on IoT devices that are powered by a battery. This issue has opened up new research challenges in making the protocols more lightweight and at the same time not compromising the level of security provided. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. µRT: A lightweight real-time middleware with integrated validation of timing constraints
- Author
-
Thomas Schöpping, Svenja Kenneweg, Marc Hesse, and Ulrich Rückert
- Subjects
middleware ,real-time computing ,distributed computing ,embedded ,microcontroller ,publish–subscribe ,Mechanical engineering and machinery ,TJ1-1570 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Middlewares are standard tools for modern software development in many areas, especially in robotics. Although such have become common for high-level applications, there is little support for real-time systems and low-level control. Therefore, µRT provides a lightweight solution for resource-constrained embedded systems, such as microcontrollers. It features publish–subscribe communication and remote procedure calls (RPCs) and can validate timing constraints at runtime. In contrast to other middlewares, µRT does not rely on specific transports for communication but can be used with any technology. Empirical results prove the small memory footprint, consistent temporal behavior, and predominantly linear scaling. The usability of µRT was found to be competitive with state-of-the-art solutions by means of a study.
- Published
- 2023
- Full Text
- View/download PDF
7. An Energy-Efficient Communication Scheme for Multi-robot Coordination Deployed for Search and Rescue Operations
- Author
-
Rajesh, M., Nagaraja, S. R., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Sharma, Harish, editor, Gupta, Mukesh Kumar, editor, Tomar, G. S., editor, and Lipo, Wang, editor
- Published
- 2021
- Full Text
- View/download PDF
8. Intelligent Gateway for Data-Centric Communication in Internet of Things
- Author
-
Raj, Rohit, Sinha, Akash, Kumar, Prabhat, Singh, M. P., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Gupta, Deepak, editor, Khanna, Ashish, editor, Bhattacharyya, Siddhartha, editor, Hassanien, Aboul Ella, editor, Anand, Sameer, editor, and Jaiswal, Ajay, editor
- Published
- 2021
- Full Text
- View/download PDF
9. Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System
- Author
-
Li, Zhangtan, Cheng, Liang, Zhang, Yang, Feng, Dengguo, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Liu, Zhe, editor, Wu, Fan, editor, and Das, Sajal K., editor
- Published
- 2021
- Full Text
- View/download PDF
10. Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages
- Author
-
Norisvaldo Ferraz Junior, Anderson A.A. Silva, Adilson E. Guelfi, and Sergio T. Kofuji
- Subjects
IoT ,WSN ,Publish-subscribe ,Context-aware messages ,Security ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Background The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communicate with the cloud platform. However, IoT applications need context-aware messages to translate the data into contextual information, allowing the applications to act cognitively. Besides, end-to-end security of publish-subscribe messages on both ends (devices and cloud) is essential. However, achieving security on constrained IoT devices with memory, payload, and energy restrictions is a challenge. Contribution Messages in IoT need to achieve both energy efficiency and secure delivery. Thus, the main contribution of this paper refers to a performance evaluation of a message structure that standardizes the publish-subscribe topic and payload used by the cloud platform and the IoT devices. We also propose a standardization for the topic and payload for publish-subscribe systems. Conclusion The messages promote energy efficiency, enabling ultra-low-power and high-capacity devices and reducing the bytes transmitted in the IoT domain. The performance evaluation demonstrates that publish-subscribe systems (namely, AMQP, DDS, and MQTT) can use our proposed energy-efficient message structure on IoT. Additionally, the message system provides end-to-end confidentiality, integrity, and authenticity between IoT devices and the cloud platform.
- Published
- 2022
- Full Text
- View/download PDF
11. Using Data Distribution Service for IEEE 11073-10207 Medical Device Communication
- Author
-
Baake, Merle, Ingenerf, Josef, Andersen, Björn, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, O'Hare, Gregory M.P., editor, O'Grady, Michael J., editor, O’Donoghue, John, editor, and Henn, Patrick, editor
- Published
- 2020
- Full Text
- View/download PDF
12. Design of a Content-Based Communication Model Using Caching Technique for VANETs
- Author
-
Mastouri, Mohamed Anis, Hasnaoui, Salem, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Bouhlel, Med Salim, editor, and Rovetta, Stefano, editor
- Published
- 2020
- Full Text
- View/download PDF
13. Merging the Publish-Subscribe Pattern with the Shared Memory Paradigm
- Author
-
Cudennec, Loïc, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Mencagli, Gabriele, editor, B. Heras, Dora, editor, Cardellini, Valeria, editor, Casalicchio, Emiliano, editor, Jeannot, Emmanuel, editor, Wolf, Felix, editor, Salis, Antonio, editor, Schifanella, Claudio, editor, Manumachu, Ravi Reddy, editor, Ricci, Laura, editor, Beccuti, Marco, editor, Antonelli, Laura, editor, Garcia Sanchez, José Daniel, editor, and Scott, Stephen L., editor
- Published
- 2019
- Full Text
- View/download PDF
14. SEDIBLOFRA: A Blockchain-Based, Secure Framework for Remote Data Transfer in Unmanned Aerial Vehicles
- Author
-
Jesus Rodriguez-Molina, Beatriz Corpas, Christian Hirsch, and Pedro Castillejo
- Subjects
Cyber-physical systems ,blockchain ,publish-subscribe ,cryptography ,database ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Security attacks on Cyber-Physical Systems with operations that involve Unmanned Aerial Vehicles (UAVs) are a matter of great concern due to their major impact in the deployed systems, and a deal-breaker for their utilization; if a system is not perceived as secure, either it will not be used or its capabilities will be underutilized, regardless of how good they could be. This happens with particular intensity in missions with UAVs, as they can be hacked to tamper with their collected data or taken away by unauthorized parties. Development of security countermeasures is extensive both in theoretical and practical implementations, but the integration of these measures can be difficult, and performance might be affected because of it. This manuscript puts forward a SEDIBLOFRA (Secure, Distributed, Blockchain-based Framework) for remote maneuvering of UAVs, based on several distributed systems technologies that pile up to provide complementary functionalities. Asymmetric cryptography encrypts the data. Publish/Subscribe communications offer a way to enhance data delivery. Finally, blockchain provides a way to keep all the transferred data in a redundant and immutable manner. The proposed framework is also extensible to other kinds of unmanned vehicles, like Unmanned Ground Vehicles or Autonomous Underwater Vehicles.
- Published
- 2021
- Full Text
- View/download PDF
15. Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages.
- Author
-
Ferraz Junior, Norisvaldo, Silva, Anderson A.A., Guelfi, Adilson E., and Kofuji, Sergio T.
- Subjects
INTERNET of things ,INDUSTRY 4.0 ,ENERGY consumption ,COMPUTER storage devices - Abstract
Background: The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communicate with the cloud platform. However, IoT applications need context-aware messages to translate the data into contextual information, allowing the applications to act cognitively. Besides, end-to-end security of publish-subscribe messages on both ends (devices and cloud) is essential. However, achieving security on constrained IoT devices with memory, payload, and energy restrictions is a challenge. Contribution: Messages in IoT need to achieve both energy efficiency and secure delivery. Thus, the main contribution of this paper refers to a performance evaluation of a message structure that standardizes the publish-subscribe topic and payload used by the cloud platform and the IoT devices. We also propose a standardization for the topic and payload for publish-subscribe systems. Conclusion: The messages promote energy efficiency, enabling ultra-low-power and high-capacity devices and reducing the bytes transmitted in the IoT domain. The performance evaluation demonstrates that publish-subscribe systems (namely, AMQP, DDS, and MQTT) can use our proposed energy-efficient message structure on IoT. Additionally, the message system provides end-to-end confidentiality, integrity, and authenticity between IoT devices and the cloud platform. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. A Metadata-Driven Approach for Testing Self-Organizing Multiagent Systems
- Author
-
Nathalia Nascimento, Paulo Alencar, Carlos Lucena, and Donald Cowan
- Subjects
Metadata-oriented testing ,publish-subscribe ,failure diagnosis ,multiagent system ,self-organizing ,Internet of Things (IoT) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Multiagent Systems (MASs) have multiple different characteristics, such as autonomy, and asynchronous and social features, which make these systems difficult to understand. Thus, there is a lack of procedures guaranteeing that multiagent systems once implemented would behave as desired. Determining the reliability of such systems is further complicated by the fact that current agent-based approaches may also involve non-deterministic characteristics, such as learning, self-adaptation and self-organization (SASO). Nonetheless, there is a gap in the literature regarding the testing of systems with these features. This paper presents an approach based on metadata and the publish-subscribe paradigm to develop test applications that address the process of failure diagnosis in a self-organizing MAS. The novelty of the proposed approach involves its ability to test self-organizing MAS systems in the context of local and global behavior. To illustrate the use of this approach, we developed a self-organizing MAS system based on the Internet of Things (IoT), which simulates a set of smart street lights, and we performed functional ad-hoc tests. The street lights need to interact with each other in order to achieve the global goals of reducing energy consumption and maintaining the maximum value of visual comfort in illuminated areas. To achieve these global behaviors, the street lights develop local behaviors automatically through a self-organizing process based on machine-learning algorithms.
- Published
- 2020
- Full Text
- View/download PDF
17. An Information-Centric Networking Based Registry for Decentralized Identifiers and Verifiable Credentials
- Author
-
Bander Alzahrani
- Subjects
Identity management ,publish-subscribe ,privacy ,DID registry ,self-sovereignty ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Decentralized Identifiers (DIDs) are new self-manageable means of authentication, which is currently under standardization by the World Wide Web Consortium (W3C). Closely related to DIDs, verifiable credentials (VCs) are another ongoing standardization effort (by the same W3C working group) that enables privacy-preserving and cryptographically secure proofs of attribute ownership. Both these approaches assume in their core an immutable decentralized registry (e.g., a blockchain, or a p2p network) in which critical meta-data is recorded. However, W3C’s standards do not specify how this registry is implemented, instead this is left as an open implementation choice. In this paper we design, implement, and evaluate a secure DID/VC registry service using the emerging paradigm of Information Centric Networking (ICN). In order to achieve our goal, we combine the decentralized nature, and the “lookup by name” property of ICN, with a secure mechanism for maintaining synchronized replicas of an item in multiple locations. Due to ICN’s inherent support for multicast and caching, our construction imposes small network overhead, and achieves low lookup times.
- Published
- 2020
- Full Text
- View/download PDF
18. Publish-Subscribe Based Monitoring Model for Wireless Sensor Networks
- Author
-
Serdaroglu, Kemal Cagri, Kadioglu, Tevfik, Baydere, Sebnem, Kacprzyk, Janusz, Series editor, Yager, Ronald R., editor, and Pascual Espada, Jordán, editor
- Published
- 2018
- Full Text
- View/download PDF
19. TDLIoT: A Topic Description Language for the Internet of Things
- Author
-
Franco da Silva, Ana Cristina, Hirmer, Pascal, Breitenbücher, Uwe, Kopp, Oliver, Mitschang, Bernhard, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Mikkonen, Tommi, editor, Klamma, Ralf, editor, and Hernández, Juan, editor
- Published
- 2018
- Full Text
- View/download PDF
20. Efficient content routing in MANETs using distances to directories
- Author
-
Garcia-Luna-Aceves, J.J. and Li, Qian
- Subjects
MANET routing ,content routing ,publish-subscribe - Abstract
The content routing protocols for MANETs proposed to date require the flooding of content requests or link-state advertisements. The Adaptive Publish-subscribe Distance Vector (APDV) protocol is presented as an alternative. APDV combines routing to well-known directories using distance-vector signaling with publish-subscribe mechanisms to discover content. Named data objects (NDO) are published with directories, and consumers of content obtain routes to NDOs from those directories. Each node is covered dynamically by a minimum number of directories within a few hops. APDV is shown to be loop-free at every instant, to provide correct routes within a finite time, and to have a small route stretch. APDV is compared with representative protocols for routing to NDOs using link-state information and on-demand routing; the results show that APDV incurs orders of magnitude less control overhead in large wireless networks.
- Published
- 2014
21. A Comprehensive Security Framework for Publish/Subscribe-Based IoT Services Communication
- Author
-
Li Duan, Chang-Ai Sun, Yang Zhang, Wei Ni, and Junliang Chen
- Subjects
Access control ,publish-subscribe ,Internet of Things ,data privacy ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The publish/subscribe paradigm provides a loosely-coupled and scalable communication model for the large-scale IoT service systems, such as supervisory control and data acquisition (SCADA). Data confidentiality and service privacy are two crucial security issues for the publish/subscribe model deployed in different domains. The existing access control schemes for such model cannot address both the issues at the same time. In this paper, we propose a comprehensive access control framework (CACF) to bridge this gap. The design principle of the proposed framework is twofold: (a) a bi-directional policy matching scheme for protecting the privacy of IoT services; and (b) a fully homomorphic encryption scheme for encrypting published events to protect data confidentiality. We analyze the correctness and security of the CACF, moreover, we prototype CACF based on Apache ActiveMQ, an open source message broker, and evaluate its performance. The experimental results indicate that our security system meets the latency requirements for very high-quality SCADA services.
- Published
- 2019
- Full Text
- View/download PDF
22. MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
- Author
-
Marco Calabretta, Riccardo Pecori, Massimo Vecchio, and Luca Veltri
- Subjects
Internet of Things ,Security ,MQTT ,Publish-subscribe ,token-based authentication ,token-based authorization ,Computer software ,QA76.75-76.765 - Abstract
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more and more in our every-day lives. In this work we focus on MQTT (Message Queue Telemetry Transport), a message-based communication protocol explicitly designed for low-power machine-to-machine communications and based on the publish-subscribe paradigm. First of all, we provide an accurate analysis of some of the most recent security solutions and improvements of MQTT found in the literature. Secondly, we describe in detail a novel secure solution, called MQTT-Auth, to protect specific topics in MQTT. This solution is based on the AugPAKE security algorithm for guaranteeing confidentiality, and onto two tokens which permit to authenticate the usage of a topic and to guarantee authorization in accessing a topic respectively. MQTT-Auth can also be easily extended to a hierarchical structure of topics and entities. Finally, we compare MQTT-Auth with some solutions for securing MQTT being present in the relevant literature, and we provide some details on how MQTT-Auth has been implemented and successfully tested.
- Published
- 2018
23. A fault recovery protocol for brokers in centralized publish-subscribe systems targeting multiprocessor systems-on-chips.
- Author
-
Domingues, Anderson R. P., Hamerski, Jean Carlo, and Amory, Alexandre de Morais
- Subjects
MULTIPROCESSORS ,BROKERS ,COMPUTER software quality control ,SYSTEM downtime ,COMMUNICATION infrastructure ,PARALLEL processing - Abstract
The publish-subscribe programming model has been an alternative to the design of data-intensive distributed applications in many domains. Recently, this model has been ported to the domain of Multiprocessor Systems-on-Chips, in which applications must use the underlying Network-on-Chip communication infrastructure effectively due to restrictions on the architecture such as low power consumption and limited memory size. In such a scenario, the publish-subscribe model fulfills some of these requirements while providing high-level access to the network hardware to programmers, thus contributing to software quality. However, the publish-subscribe model relies on a single process dedicated to orchestrating the communication at the application level, the broker. Should a broker process crash, the communication between associated nodes may experience delays, downtime, or even inconsistent data. In extreme cases, communication is definitively ruined. Thus, a recovery strategy for brokers in the publish-subscribe model becomes crucial when the application has safety requirements. In this work, we extend a publish-subscribe protocol to add redundancy to brokers' sensitive data. Besides, we provide a recovery protocol to recover brokers in case of a failure. We also provide analytical models to estimate the communication overhead of our approach. We validate our approach in two distinct MPSoC platforms. The results show that our approach inserts a small memory footprint to the system while providing minimal system downtime during recovery. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
24. Exploration of Human Activities Using Message Streaming Brokers and Automated Logical Reasoning for Ambient-Assisted Services
- Author
-
Radoslaw Klimek
- Subjects
Pervasive computing ,context-aware services ,publish-subscribe ,message broker ,SAT solver ,middleware ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Intelligent environments combine physical spaces with pervasive computing technologies to provide context-aware, people-centred, and ambient-assisted strengthening of the activities of inhabitants in their daily lives. We propose a system to support mountain rescuers in their daily tasks. The system explores the activities of the mountain hikers, by analyzing data gathered from wireless sensor and mobile networks which cooperatively monitor an environment. The system utilizes message streaming brokers to transport data within the system. Massive amounts of data are pre-processed into formats, to allow analysis by logical SAT solvers. Pairing brokers and solvers as advanced technologies is challenging. The processed data contains valuable information about human activities and context situations, providing a basis for context reasoning and prediction. The resulting pro-active, hierarchical, and real-time smart decisions provide warnings about threatening situations, making tourists' stays safer. This combination of acting on predicted context, data streaming platforms, and logical solvers is a novel and innovative aspect of this approach. This strictly modeled system, intensively experimented, allows us to bridge the gap between the low-level observations produced by mobile and sensor networks and the high level smart services which support human activities.
- Published
- 2018
- Full Text
- View/download PDF
25. Sub-Linear Scalability of MQTT Clusters in Topic-Based Publish-Subscribe Applications.
- Author
-
Detti, Andrea, Funari, Ludovico, and Blefari-Melazzi, Nicola
- Abstract
Message Queuing Telemetry Transport (MQTT) is a widespread protocol for topic-based publish-subscribe architectures supporting IoT and social networks applications. MQTT brokers are logical entities that couple publishers and subscribers and play a critical role in such architectures. MQTT brokers can be implemented either as standalone servers or in a cluster configuration. Clusters of brokers increase reliability, availability and overall performance, since operations can be highly parallelized among the brokers that form the cluster. The load-balancing strategy in a cluster usually consists in connecting an incoming client to a randomly selected broker. This random-attach strategy, it is very simple, but generates a significant amount of inter-broker traffic, as we demonstrate through theoretical and experimental evaluations. Inter-broker traffic is an overhead for the system and it increases the CPU load of the brokers, compromising the scaling behavior of the whole cluster. Indeed, we found that a linear increase of the number of brokers forming a cluster does not necessarily provide an equivalent linear gain in performance, and such a scaling penalty can be surprisingly significant, in the order of 40%. To solve this issue and improve performance, we propose a novel load-balancing strategy that envisages the use of multiple MQTT sessions per client to reduce inter-broker traffic and that can be implemented by means of a greedy algorithm. We show feasibility and effectiveness of our strategy for IoT and social-network applications by means of simulations and real measurements. The resulting scaling penalty is reduced to 10%. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
26. تحسين أداء شبكات الند للند ضمن أنظمة النشر والاشتراك باستخدام محاكي Eclipse ضمن بيئة Peersim
- Author
-
وائل عبد الكريم حبيب and عبد الكريم السالم
- Abstract
Copyright of Journal of Engineering Sciences & Information Technology is the property of Arab Journal of Sciences & Research Publishing (AJSRP) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
27. Performance of State Distributing Message-Oriented Middleware Systems Using Publish-Subscribe
- Author
-
Edlund, Robin, Kettu, Johannes, Edlund, Robin, and Kettu, Johannes
- Abstract
Distributed simulations require efficient communication to represent complex scenarios, which presents a great challenge. This paper investigates the use of message-oriented middleware (MOM) to address this challenge by integrating the flight simulator X-Plane with the tactical simulator TACSI and evaluating the performance of different data transfer approaches. The study assesses performance by measuring the maximum sustainable throughput (MST) and the latency of a publish-subscribe-based MOM system. Two data distribution methods are compared: single-topic publishing and publishing to multiple subtopics. The results show that single-topic publishing achieves higher MST and lower latency when transmitting the same data volume. These findings provide valuable insights for deciding the state distribution method for publish-subscribe MOM systems. Additionally, this study highlights the limitations of manual determination of MST and underlines the need for accurate performance measurement techniques., Distribuerade system kräver effektiv kommunikation för att representera komplexa scenarion, vilket utgör en betydande utmaning. Denna rapport använder meddelandeorienterad mellanprogramvara (MOM) för att angripa denna utmaning genom att integrera flygsimulatorn X-Plane med den taktiska simulatorn TACSI och sedan utvärdera prestandan av olika dataöverföringsmetoder. Studien utvärderar prestandan genom att mäta den maximala genomströmningskapaciteten och latensen på ett publish-subscribe-baserat MOM-system. Två dataöverföringsmetoder jämförs: single-topic publicering och publicering på flera subtopics. Resultatet visar att single-topic publicering ger högre maximal genomströmningskapacitet och lägre latens vid samma mängd data. Dessa upptäckter ger värdefulla insikter när man ska bestämma metod för dataöverföring i publish-subscribe-baserade MOM-system. Slutligen visar denna studie på begränsningarna med att manuellt bestämma MST och behovet av mer noggranna tekniker för att mäta maximal genomströmningskapacitet.
- Published
- 2023
28. Jämförelse av OPS, MQTT och DDS med avseende på fördröjningstid och throughput
- Author
-
Nilsson, Kasper, Bergman, Alicia, Nilsson, Kasper, and Bergman, Alicia
- Abstract
In this study a comparison of the publish-subscribe communication protocols OPS, MQTT and DDS were conducted. The implementation used for DDS was fastDDS and the client library Paho Eclipse MQTT C++ was used for MQTT with the broker implementation Eclipse Mosquitto. The goal was to see which out of these protocols performs best in a peer-to-peer communication scenario when it comes to latency and throughput with varying payload size. Two experiments were carried out. The first experiment measures the round-trip-time of a message and is realized by a ping-pong application. The latency was then calculated by taking half of the round-trip-time. The second experiment was publishing messages from one client and being retrieved by another and counting the amount of messages being retrieved in one second. To get bytes per second the payload size was multiplied by the amount of messages retrieved by the subscriber. The result of the first experiment showed that OPS with the underlying transport protocol TCP had the most favorable result. For the second experiment OPS with UDP as the transport protocol had the highest throughput in most cases however for the highest payload used in the experiment fastDDS with UDP had the highest throughput. However, the results gave substantial differences between the protocols in regards to throughput which indicate that the configuration might not be optimal for a fair comparison. Further research of this is recommended before making a final conclusion in regards to the overall results., I denna studie genomfördes en jämförelse av kommunikationsprotokollen OPS, MQTT och DDS. Implementeringen som användes för DDS var fastDDS och klientbiblioteket Paho Eclipse MQTT C++ användes för MQTT med Eclipse Mosquitto som broker. Målet var att se vilket av dessa protokoll som fungerar bäst i ett peer-to-peer-kommunikationsscenario när det gäller fördröjningstid och throughput med varierande payloadstorlek. Två experiment utfördes. Det första experimentet mäter round-trip-time för ett meddelande och realiseras av en ping-pong-applikation. Fördröjningstiden beräknades sedan genom att ta hälften av round-trip-time. Det andra experimentet var att publicera meddelanden från en klient och mottas av en annan och räkna mängden meddelanden som mottas på en sekund. För att få byte per sekund multiplicerades payload storleken med mängden meddelanden som togs emot av prenumeranten. Resultatet av det första experimentet visade att OPS med det underliggande transportprotokollet TCP hade det mest gynnsamma resultatet. För det andra experimentet hade OPS med UDP som transportprotokoll den högsta throughput i de flesta fall, men för den största payloadstorleken som användes i experimentet hade fastDDS med UDP den högsta. Resultaten gav dock betydande skillnader mellan protokollen när det gäller throughput som indikerar att konfigurationen kanske inte är optimal för en rättvis jämförelse. Ytterligare forskning om detta rekommenderas för att utreda orsaken till dessa skillnader och därefter kunna skapa konfigurationer som ger rättvisa förutsättningar för en optimal jämförelse.
- Published
- 2023
29. Behavioural Types for Local-First Software (Artifact)
- Author
-
Roland Kuhn and Hernán Melgratti and Emilio Tuosto, Kuhn, Roland, Melgratti, Hernán, Tuosto, Emilio, Roland Kuhn and Hernán Melgratti and Emilio Tuosto, Kuhn, Roland, Melgratti, Hernán, and Tuosto, Emilio
- Abstract
This artifact supports the theory of swarm protocols presented in the related article. Specifically, following the top-down development typical of choreographic approaches, our artifact enables the specification of systems of peers communicating through an event notification mechanism from a global viewpoint which can then be projected to local specifications of peers, rendered as machines. To the best of our knowledge, ours is the first implementation of a behavioural type framework supporting the application of the principles of local-first software for network devices which collaborate on a common task while retaining full autonomy. The artifact can be integrated in the Actyx industrial platform; this proves this work a viable step towards reasoning about local-first and peer-to-peer software systems.
- Published
- 2023
- Full Text
- View/download PDF
30. Behavioural Types for Local-First Software
- Author
-
Roland Kuhn and Hernán Melgratti and Emilio Tuosto, Kuhn, Roland, Melgratti, Hernán, Tuosto, Emilio, Roland Kuhn and Hernán Melgratti and Emilio Tuosto, Kuhn, Roland, Melgratti, Hernán, and Tuosto, Emilio
- Abstract
Peer-to-peer systems are the most resilient form of distributed computing, but the design of robust protocols for their coordination is difficult. This makes it hard to specify and reason about global behaviour of such systems. This paper presents swarm protocols to specify such systems from a global viewpoint. Swarm protocols are projected to machines, that is local specifications of peers. We take inspiration from behavioural types with a key difference: peers communicate through an event notification mechanism rather than through point-to-point message passing. Our goal is to adhere to the principles of local-first software where network devices collaborate on a common task while retaining full autonomy: every participating device can locally make progress at all times, not encumbered by unavailability of other devices or network connections. This coordination-free approach leads to inconsistencies that may emerge during computations. Our main result shows that under suitable well-formedness conditions for swarm protocols consistency is eventually recovered and the locally observable behaviour of conforming machines will eventually match the global specification. Our model elaborates on the Actyx industrial platform and provides the basis for tool support: we sketch an implemented prototype which proves this work a viable step towards reasoning about local-first and peer-to-peer software systems.
- Published
- 2023
- Full Text
- View/download PDF
31. PCP: A Privacy-Preserving Content-Based Publish–Subscribe Scheme With Differential Privacy in Fog Computing
- Author
-
Qixu Wang, Dajiang Chen, Ning Zhang, Zhe Ding, and Zhiguang Qin
- Subjects
Publish–subscribe ,differential privacy ,fog computing ,privacy-preserving ,uncertain datasets ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Fog computing dramatically extends the cloud computing to the edge of the network and admirably solves the problem that the brokers (in publish-subscribe system) generally lack of computing capacity and energy power. However, brokers may be disguised, hacked, sniffed, and corrupted. The traditional security technology cannot protect the system privacy when facing a possible collusion attack. In this paper, we propose a privacy-preserving content-based publish/subscribe scheme with differential privacy in fog computing context, named PCP, where the fog nodes act as the brokers. Specifically, PCP firstly utilizes the U-Apriori algorithm to mine the top-K frequent itemsets (i.e., the attributes) from uncertain data sets, then applies the exponential and Laplace mechanism to ensure the differential privacy, and the broker uses the mined top-K itemsets to match appropriate publisher and subscriber finally. Security analysis shows that the PCP can guarantee differential privacy in theory. To evaluate the performance of PCP, we carry out experiments with real-world scenario data sets. The experimental results show that PCP efficiently achieves the tradeoff between the system cost and the privacy demand.
- Published
- 2017
- Full Text
- View/download PDF
32. EPypes: a framework for building event-driven data processing pipelines
- Author
-
Oleksandr Semeniuta and Petter Falkman
- Subjects
Computer vision ,Computational graph ,Publish-subscribe ,Robotics ,Python ,Pipeline ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Many data processing systems are naturally modeled as pipelines, where data flows though a network of computational procedures. This representation is particularly suitable for computer vision algorithms, which in most cases possess complex logic and a big number of parameters to tune. In addition, online vision systems, such as those in the industrial automation context, have to communicate with other distributed nodes. When developing a vision system, one normally proceeds from ad hoc experimentation and prototyping to highly structured system integration. The early stages of this continuum are characterized with the challenges of developing a feasible algorithm, while the latter deal with composing the vision function with other components in a networked environment. In between, one strives to manage the complexity of the developed system, as well as to preserve existing knowledge. To tackle these challenges, this paper presents EPypes, an architecture and Python-based software framework for developing vision algorithms in a form of computational graphs and their integration with distributed systems based on publish-subscribe communication. EPypes facilitates flexibility of algorithm prototyping, as well as provides a structured approach to managing algorithm logic and exposing the developed pipelines as a part of online systems.
- Published
- 2019
- Full Text
- View/download PDF
33. µRT: A lightweight real-time middleware with integrated validation of timing constraints
- Author
-
Schöpping, Thomas, Kenneweg, Svenja, Hesse, Marc, and Rückert, Ulrich
- Subjects
distributed computing ,middleware ,real-time computing ,microcontroller ,Artificial Intelligence ,publish–subscribe ,remote procedure call ,embedded ,prevention through design ,Computer Science Applications - Abstract
Middlewares are standard tools for modern software development in many areas, especially in robotics. Although such have become common for high-level applications, there is little support for real-time systems and low-level control. Therefore, µRT provides a lightweight solution for resource-constrained embedded systems, such as microcontrollers. It features publish–subscribe communication and remote procedure calls (RPCs) and can validate timing constraints at runtime. In contrast to other middlewares, µRT does not rely on specific transports for communication but can be used with any technology. Empirical results prove the small memory footprint, consistent temporal behavior, and predominantly linear scaling. The usability of µRT was found to be competitive with state-of-the-art solutions by means of a study.
- Published
- 2023
34. Secure Hash Authentication in IoT based Applications.
- Author
-
Sharma, Nishant, Parveen Sultana, H, Singh, Rahul, and Patil, Shriniwas
- Subjects
HASHING ,COMMUNICATION models ,INTERNET of things ,CONSTRUCTION laws ,ARCHITECTURE ,INSTANT messaging software - Abstract
Secure authentication while communicating data between sender and receiver nodes is a key concept when providing Internet of Things as a service. Hash algorithms can provide such an authentication mechanism for IoT based applications. The most recent secure hash algorithm technique standardized by the NIST is SHA-3. SHA-3 is fully apt in ensuring authentication for a sender and receiver transaction. A novel signature generating technique based on SHA-3 is presented in the paper. Two of the popular IoT communication models of publish subscribe and request response are examined under this authentication scheme. The sender generates a unique hash code for the data that it is about to send. This hash code serves as the authenticating token for the transaction. Mechanisms for the sender receiver interaction are built into the program codes in both the simulated communication models. The system architecture also manages interaction of the receiver with the cloud. This interaction ensures proper authentication through the mechanisms and api(s) provided by the cloud service providers, and these mechanisms are also integrated into the simulation. Both the cloud services used in the system architecture, i.e. cloud messaging as a service, and cloud database as a service ensure that the sender's identity is verified. In this way a blanket authentication system is set up for the aforementioned IoT architectures. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
35. Bridging IoT infrastructure and cloud application using cellular-based internet gateway device.
- Author
-
Pramukantoro, Eko Sakti, Luckies, Maxi, and Bakhtiar, Fariz Andri
- Subjects
- *
GATEWAYS (Computer networks) , *INTERNET , *IMAGE sensors , *INTERNET of things , *MIDDLEWARE - Abstract
An Internet of Things (IoT) middleware can solve interoperability problem among "things" in IoT infrastructure by collecting data. However, the sensor nodes' data that is collected by the middleware cannot be directly delivered to cloud applications since the sensor nodes and the middleware are located in intranet. A solution to this problem is an Internet Gateway Device (IGD) that retrieves data from the middleware in intranet then forwards them to cloud applications in the internet. In this study, an IGD based on cellular network is proposed to provide wide-coverage internet connectivity. Two test scenarios were conducted to measure delay and throughput between the IGD and the cloud application; using data from DHT22 sensor and image sensor respectively. The results of the first test scenario using DHT22 sensor show that the average delay is under 5 seconds and the maximum throughput is 120 bps, while the second one using image sensor concludes that the average delay is 595 seconds and the maximum throughput is 909 bps. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
36. Model‐based protocol specification.
- Author
-
Mordecai, Yaniv
- Subjects
- *
SYSTEMS engineering , *ELECTRONIC commerce , *BUSINESS process management , *INTERNET of things , *ELECTRIC vehicles , *TRANSPORTATION - Abstract
We propose a holistic Model‐Based Protocol Specification (MBPS) framework. Standards, procedures, and protocols are important anchors for interconnected systems: they facilitate the connectivity of billions of devices around the world, commodify advanced technologies and solutions, and enable efficient services involving trillions of transactions in aviation, medicine, e‐commerce, transportation, infrastructure, and other domains. Domain protocols allow for conventional interactions within a domain among ecosystem entities and humans (eg, airline ticketing, financial transactions, etc). Protocol specifications must be formal, consistent, and verifiable. Nevertheless, most current standard protocols are text‐based, unverifiable, and often inconsistent with themselves and with other standards. Text‐based standards are difficult to manage, track, control, and adopt. MBPS includes three critical enablers: a modeling language, a modeling process, and a model‐supported standardization process. This paper employs Object‐Process Methodology (OPM), a model‐based systems engineering framework, endorsed as ISO‐19450, for modeling and simulation of the generic protocol specification process and for two examples: (a) a Kerberos authentication protocol revision based on a previous Kerberos model and on a recently discovered vulnerability and (b) a domain‐specific Publish—Subscribe protocol application for selective information distribution. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
37. Implementation of a Publish-Subscribe Protocol in Microgrid Islanding and Resynchronization With Self-Discovery.
- Author
-
Starke, Michael, Herron, A., King, D., and Xue, Y.
- Abstract
Communications systems and protocols are becoming second nature to utilities operating distribution systems. Traditionally, centralized communication approaches are often used, while recently in microgrid applications, distributed communication, and control schema emerge offering several advantages such as improved system reliability, plug-and-play operation, and distributed intelligence. Still, operation and control of microgrids including distributed communication schema have been less of a discussion in the literature. To address the challenge of multiple-inverter microgrid synchronization, a publish-subscribe protocol based, data distribution service, communication schema for microgrids is proposed. The communication schema is discussed in details for individual devices such as generators, photovoltaic systems, energy storage systems, microgrid point of common coupling switch, and supporting applications. Finally, islanding and resynchronization of a microgrid are demonstrated on a test-bed utilizing this schema. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
38. MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities.
- Author
-
Calabretta, Marco, Pecori, Riccardo, Vecchio, Massimo, and Veltri, Luca
- Subjects
WIRELESS communications ,INTERNET of things ,COMPUTER security ,INTERNET security ,CLOUD computing - Abstract
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more and more in our every-day lives. In this work we focus on MQTT (Message Queue Telemetry Transport), a messagebased communication protocol explicitly designed for low-power machine-to-machine communications and based on the publishsubscribe paradigm. First of all, we provide an accurate analysis of some of the most recent security solutions and improvements of MQTT found in the literature. Secondly, we describe in detail a novel secure solution, called MQTT-Auth, to protect specific topics in MQTT. This solution is based on the AugPAKE security algorithm for guaranteeing confidentiality, and onto two tokens which permit to authenticate the usage of a topic and to guarantee authorization in accessing a topic respectively. MQTT-Auth can also be easily extended to a hierarchical structure of topics and entities. Finally, we compare MQTT-Auth with some solutions for securing MQTT being present in the relevant literature, and we provide some details on how MQTT-Auth has been implemented and successfully tested. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
39. Comparison of OPS, MQTT and DDS with regards to latency and throughput
- Author
-
Nilsson, Kasper and Bergman, Alicia
- Subjects
Programvaruteknik ,publish-subscribe ,Software Engineering ,communication protocol ,fördröjningstid ,kommunikationsprotokoll ,latency ,throughput - Abstract
In this study a comparison of the publish-subscribe communication protocols OPS, MQTT and DDS were conducted. The implementation used for DDS was fastDDS and the client library Paho Eclipse MQTT C++ was used for MQTT with the broker implementation Eclipse Mosquitto. The goal was to see which out of these protocols performs best in a peer-to-peer communication scenario when it comes to latency and throughput with varying payload size. Two experiments were carried out. The first experiment measures the round-trip-time of a message and is realized by a ping-pong application. The latency was then calculated by taking half of the round-trip-time. The second experiment was publishing messages from one client and being retrieved by another and counting the amount of messages being retrieved in one second. To get bytes per second the payload size was multiplied by the amount of messages retrieved by the subscriber. The result of the first experiment showed that OPS with the underlying transport protocol TCP had the most favorable result. For the second experiment OPS with UDP as the transport protocol had the highest throughput in most cases however for the highest payload used in the experiment fastDDS with UDP had the highest throughput. However, the results gave substantial differences between the protocols in regards to throughput which indicate that the configuration might not be optimal for a fair comparison. Further research of this is recommended before making a final conclusion in regards to the overall results. I denna studie genomfördes en jämförelse av kommunikationsprotokollen OPS, MQTT och DDS. Implementeringen som användes för DDS var fastDDS och klientbiblioteket Paho Eclipse MQTT C++ användes för MQTT med Eclipse Mosquitto som broker. Målet var att se vilket av dessa protokoll som fungerar bäst i ett peer-to-peer-kommunikationsscenario när det gäller fördröjningstid och throughput med varierande payloadstorlek. Två experiment utfördes. Det första experimentet mäter round-trip-time för ett meddelande och realiseras av en ping-pong-applikation. Fördröjningstiden beräknades sedan genom att ta hälften av round-trip-time. Det andra experimentet var att publicera meddelanden från en klient och mottas av en annan och räkna mängden meddelanden som mottas på en sekund. För att få byte per sekund multiplicerades payload storleken med mängden meddelanden som togs emot av prenumeranten. Resultatet av det första experimentet visade att OPS med det underliggande transportprotokollet TCP hade det mest gynnsamma resultatet. För det andra experimentet hade OPS med UDP som transportprotokoll den högsta throughput i de flesta fall, men för den största payloadstorleken som användes i experimentet hade fastDDS med UDP den högsta. Resultaten gav dock betydande skillnader mellan protokollen när det gäller throughput som indikerar att konfigurationen kanske inte är optimal för en rättvis jämförelse. Ytterligare forskning om detta rekommenderas för att utreda orsaken till dessa skillnader och därefter kunna skapa konfigurationer som ger rättvisa förutsättningar för en optimal jämförelse.
- Published
- 2023
40. Behavioural Types for Local-First Software (Artifact)
- Author
-
Kuhn, Roland, Melgratti, Hernán, and Tuosto, Emilio
- Subjects
local-first software ,Software and its engineering → Distributed programming languages ,Software and its engineering → Distributed systems organizing principles ,publish-subscribe ,Theory of computation → Distributed computing models ,Distributed coordination ,behavioural types ,asynchronous communication - Abstract
This artifact supports the theory of swarm protocols presented in the related article. Specifically, following the top-down development typical of choreographic approaches, our artifact enables the specification of systems of peers communicating through an event notification mechanism from a global viewpoint which can then be projected to local specifications of peers, rendered as machines. To the best of our knowledge, ours is the first implementation of a behavioural type framework supporting the application of the principles of local-first software for network devices which collaborate on a common task while retaining full autonomy. The artifact can be integrated in the Actyx industrial platform; this proves this work a viable step towards reasoning about local-first and peer-to-peer software systems., DARTS, Vol. 9, Special Issue of the 37th European Conference on Object-Oriented Programming (ECOOP 2023), pages 14:1-14:5
- Published
- 2023
- Full Text
- View/download PDF
41. En publish-subscribe-baserad tillståndsdistribuerande meddelandeorienterad mellanprogramvaras prestanda
- Author
-
Edlund, Robin and Kettu, Johannes
- Subjects
Datorsystem ,topic ,Message-oriented middleware ,Computer Systems ,publish-subscribe ,flygsimulator ,Communication Systems ,Meddelandeorienterad mellanprogramvara ,tactical simulator ,flight simulator ,taktisk simulator ,Kommunikationssystem - Abstract
Distributed simulations require efficient communication to represent complex scenarios, which presents a great challenge. This paper investigates the use of message-oriented middleware (MOM) to address this challenge by integrating the flight simulator X-Plane with the tactical simulator TACSI and evaluating the performance of different data transfer approaches. The study assesses performance by measuring the maximum sustainable throughput (MST) and the latency of a publish-subscribe-based MOM system. Two data distribution methods are compared: single-topic publishing and publishing to multiple subtopics. The results show that single-topic publishing achieves higher MST and lower latency when transmitting the same data volume. These findings provide valuable insights for deciding the state distribution method for publish-subscribe MOM systems. Additionally, this study highlights the limitations of manual determination of MST and underlines the need for accurate performance measurement techniques. Distribuerade system kräver effektiv kommunikation för att representera komplexa scenarion, vilket utgör en betydande utmaning. Denna rapport använder meddelandeorienterad mellanprogramvara (MOM) för att angripa denna utmaning genom att integrera flygsimulatorn X-Plane med den taktiska simulatorn TACSI och sedan utvärdera prestandan av olika dataöverföringsmetoder. Studien utvärderar prestandan genom att mäta den maximala genomströmningskapaciteten och latensen på ett publish-subscribe-baserat MOM-system. Två dataöverföringsmetoder jämförs: single-topic publicering och publicering på flera subtopics. Resultatet visar att single-topic publicering ger högre maximal genomströmningskapacitet och lägre latens vid samma mängd data. Dessa upptäckter ger värdefulla insikter när man ska bestämma metod för dataöverföring i publish-subscribe-baserade MOM-system. Slutligen visar denna studie på begränsningarna med att manuellt bestämma MST och behovet av mer noggranna tekniker för att mäta maximal genomströmningskapacitet.
- Published
- 2023
42. Behavioural Types for Local-First Software
- Author
-
Kuhn, Roland, Melgratti, Hernán, and Tuosto, Emilio
- Subjects
local-first software ,Software and its engineering → Distributed programming languages ,FOS: Computer and information sciences ,Computer Science - Logic in Computer Science ,Computer Science - Distributed, Parallel, and Cluster Computing ,Software and its engineering → Distributed systems organizing principles ,publish-subscribe ,Theory of computation → Distributed computing models ,Distributed coordination ,behavioural types ,Distributed, Parallel, and Cluster Computing (cs.DC) ,asynchronous communication ,Logic in Computer Science (cs.LO) - Abstract
Peer-to-peer systems are the most resilient form of distributed computing, but the design of robust protocols for their coordination is difficult. This makes it hard to specify and reason about global behaviour of such systems. This paper presents swarm protocols to specify such systems from a global viewpoint. Swarm protocols are projected to machines, that is local specifications of peers. We take inspiration from behavioural types with a key difference: peers communicate through an event notification mechanism rather than through point-to-point message passing. Our goal is to adhere to the principles of local-first software where network devices collaborate on a common task while retaining full autonomy: every participating device can locally make progress at all times, not encumbered by unavailability of other devices or network connections. This coordination-free approach leads to inconsistencies that may emerge during computations. Our main result shows that under suitable well-formedness conditions for swarm protocols consistency is eventually recovered and the locally observable behaviour of conforming machines will eventually match the global specification. The model we propose elaborates on an existing industrial platform and provides the basis for tool support (sketched here and fully described in a companion artifact paper), wherefore we consider this work to be a viable step towards reasoning about local-first and peer-to-peer software systems., Comment: to appear in ECOOP2023; full preprint version with appendices
- Published
- 2023
- Full Text
- View/download PDF
43. ndnIoT-FC: IoT Devices as First-Class Traffic in Name Data Networks
- Author
-
Luís Gameiro, Carlos Senna, and Miguel Luís
- Subjects
Internet of Things ,Smart City ,Information-Centric Network ,Named Data Networks ,publish-subscribe ,Information technology ,T58.5-58.64 - Abstract
In recent years we have been assisting a radical change in the way devices are connected to the Internet. In this new scope, the traditional TCP/IP host-centric network fails in large-scale mobile wireless distributed environments, such as IoT scenarios, due to node mobility, dynamic topologies and intermittent connectivity, and the Information-Centric Networking (ICN) paradigm has been considered the most promising candidate to overcome the drawbacks of host-centric architectures. Despite bringing efficient solutions for content distribution, the basic ICN operating principle, where content must always be associated with an interest, has serious restrictions in IoT environments in relation to scale, performance, and naming, among others. To address such drawbacks, we are presenting ndnIoT-FC, an NDN-based architecture that respects the ICN rules but offers special treatment for IoT traffic. It combines efficient hybrid naming with strategies to minimize the number of interests and uses caching strategies that virtually eliminates copies of IoT data from intermediate nodes. The ndnIoT-FC makes available new NDN-based application-to-application protocol to implement a signature model operation and tools to manage its life cycle, following a publisher-subscriber scheme. To demonstrate the versatility of the proposed architecture, we show the results of the efficient gathering of environmental information in a simulation environment considering different and distinct use cases.
- Published
- 2020
- Full Text
- View/download PDF
44. Configurable DDS as Uniform Middleware for Data Communication in Smart Grids
- Author
-
Alaa Alaerjan, Dae-Kyoo Kim, Hua Ming, and Hwimin Kim
- Subjects
communication ,configuration ,DDS ,feature ,publish–subscribe ,smart grid ,Technology - Abstract
Data Distribution Service (DDS) has emerged as a potential solution for data communication challenges in smart grids. DDS is designed to support quality communication for large scale real-time systems through a wide range of QoS policies. However, a smart grid involves various types of communication applications running on different computing environments. Some environments have limited computing resources such as small memory and low performance, which makes it difficult to accommodate DDS. In this paper, we present a feature-based approach for tailoring DDS to configure lightweight DDS by selecting only the necessary features for the application in consideration of the resource constraints of its running environment. This allows DDS to serve as a uniform communication middleware across the smart grid, which is critical for interoperability. We analyze DDS in terms of features and design them using Unified Modeling Language (UML) and Object Constraint Language (OCL) based on inheritance and overriding. We define a formal notion of feature composition to build DDS configurations. We implemented the approach in OpenDDS and demonstrate its application to different application environments. We also experimented the approach for the efficiency of configured DDS in terms of resource utilization. The results show that configured DDS is viable for efficient and quality data communication for applications that run on an environment with limited computing capability.
- Published
- 2020
- Full Text
- View/download PDF
45. A Fast Matching Algorithm for Content-Based Publish/Subscribe Systems
- Author
-
Xue, Tao, Jia, Qi, Kacprzyk, Janusz, editor, and Yang, George, editor
- Published
- 2013
- Full Text
- View/download PDF
46. Applying Event-Based Framework to Support Power System Integration
- Author
-
Lecek, Nenad, Dzafic, Izudin, J. (Jong Hyuk) Park, James, editor, Chao, Han-Chieh, editor, S. Obaidat, Mohammad, editor, and Kim, Jongsung, editor
- Published
- 2012
- Full Text
- View/download PDF
47. Implementation
- Author
-
Viterbo, José, Endler, Markus, Viterbo, José, and Endler, Markus
- Published
- 2012
- Full Text
- View/download PDF
48. Improving Cooperativity in a Workflow Coordination Model over a Pub/Sub Network
- Author
-
Morales, Augusto, Alcarria, Ramón, Robles, Tomás, Cedeño, Edwin, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Bravo, José, editor, López-de-Ipiña, Diego, editor, and Moya, Francisco, editor
- Published
- 2012
- Full Text
- View/download PDF
49. P3S: A Privacy Preserving Publish-Subscribe Middleware
- Author
-
Pal, Partha, Lauer, Greg, Khoury, Joud, Hoff, Nick, Loyall, Joe, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Narasimhan, Priya, editor, and Triantafillou, Peter, editor
- Published
- 2012
- Full Text
- View/download PDF
50. High-Performance Location-Aware Publish-Subscribe on GPUs
- Author
-
Cugola, Gianpaolo, Margara, Alessandro, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Narasimhan, Priya, editor, and Triantafillou, Peter, editor
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.