A Scheduling method for sporadic traffics in industrial IoT

Özceylan, Baver
Internet of Things technology continues to develop as a commercial value and it has become one of the core elements of Industry 4.0 paradigm. Together with that, IEEE 802.15.4e standard provides Time-Slotted Channel Hopping (TSCH) operation mode especially for industrial applications that have strict QoS requirements. In spite of the fact that the standard defines frame structure in MAC layer, there has been no standardization in scheduling for TSCH frame yet. It brings serious challenge for engineering design since industrial applications have stringent demands such as high reliability, low latency and energy efficiency. Industrial applications can generate two types of traffic flows, which are periodic and sporadic. There have been many studies on periodic traffic flow in which it is proven that dedicated cell property of TSCH can fulfill the requirements. Whereas, there is a lack of research on sporadic traffic, which can be handled with shared cell property of TSCH. To this end, a shared cell scheduling method for sporadic traffic flows in Industrial IoT is introduced in this thesis. Proposed method exploits the tree structure of RPL protocol, which is a decisive standard for Industrial IoT, in order to divide the network into independent subnetworks that consist of one parent node and a number of child nodes. The method takes its basis from the idea that the whole network optimization can be achieved by separate subnetwork optimizations, which corresponds to finding an optimum number of shared cells and distribution of child nodes among these cells to handle traffic, which originated from child nodes, with meeting QoS requirements. The method is based on estimations according to a heuristic model of the subnetworks. The results obtained by simulations prove that proposed method minimizes energy consumption without violating QoS requirements. It is also observed that optimum results can be accomplished with this method whether traffic generation rate of child nodes in a subnetwork are the same or different. Thus, granting parent nodes the ability to manage trade-offs between energy consumption, latency and reliability is the outcome of this thesis. 


A novel user activity prediction model for context aware computing systems
Peker, Serhat; Koçyiğit, Altan; Department of Information Systems (2011)
In the last decade, with the extensive use of mobile electronic and wireless communication devices, there is a growing need for context aware applications and many pervasive computing applications have become integral parts of our daily lives. Context aware recommender systems are one of the popular ones in this area. Such systems surround the users and integrate with the environment; hence, they are aware of the users' context and use that information to deliver personalized recommendations about everyday ...
An End-to-End Security Auditing Approach for Service Oriented Architectures
AZARMİ, Mehdi; BHARGAVA, Bharat; Angın, Pelin; RANCHAL, Rohit; AHMED, Norman; SİNCLAİR, Asher; LİNDERMAN, Mark; BEN OTHMANE, Lotfi (2012-10-11)
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The interactions of independent service domains in SOA could violate service policies or SLAs. In addition, users in SOA systems have no control on what happens...
A simulation environment for cybersecurity attack analysis based on network traffic logs
Daneshgadeh, Salva; Oney, Mehmet Ugur; Kemmerich, Thomas; Baykal, Nazife (2019-01-01)
The continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and...
A Big Data Analytical Approach to Cloud Intrusion Detection
Gulmez, Halim Gorkem; Tuncel, Emrah; Angın, Pelin (null; 2018-06-30)
Advances in cloud computing in the past decade have made it a feasible option for the high performance computing and mass storage needs of many enterprises due to the low startup and management costs. Due to this prevalent use, cloud systems have become hot targets for attackers aiming to disrupt reliable operation of large enterprise systems. The variety of attacks launched on cloud systems, including zero-day attacks that these systems are not prepared for, call for a unified approach for real-time detect...
A longest path problem for evaluating the worst case packet delay of switched ethernet
Schmidt, Klaus Verner; Schmidt, Şenan Ece (2010-07-09)
In the recent years, the use of real-time Ethernet protocols becomes more and more relevant for time-critical networked industrial applications. In this context, this paper presents a method to compute the worst-case packet delays on switched Ethernet. Based on an evaluation of the packet delays at each switch port and the network topology, we construct a weighted directed graph that allows to find the worst-case end-to-end packet delay by solving a conventional longest-path problem.
Citation Formats
B. Özceylan, “A Scheduling method for sporadic traffics in industrial IoT,” M.S. - Master of Science, Middle East Technical University, 2017.