Abstract:
During the past 15 years, the Internet revolution has redefined the industry landscape. The advent of the Internet of Things (IoT) is changing our lives by provisioning a wide range of novel applications that leverage the ecosystem of " smart " and highly heterogeneous devices. This is expected to dramatically transform manufacturing, energy, agriculture, transportation, and other industrial sectors. The Industrial Internet of Things (IIoT) brings along a new wave of Internet evolution and will offer unprecedented opportunities in Machine Type Communications (MTC) — intelligent industrial products, processes, and services that communicate with each other and with people over the global network. This paper delivers a technology overview of the currently utilized Wireless M-Bus communication protocol within the IIoT landscape together with describing a demonstration prototype development. In our trial implementation, the IQRF modules are utilized to be compatible with the protocol of interest. The constructed WM-Bus receiver is further integrated as part of a complex MTC Gateway, which receives the MTC data via a secure communication channel from various types of smart-metering devices.
Wireless M-Bus in Industrial IoT: Technology Overview and Prototype Implementation (PDF Download Available).
- Associate Professor, Department of Telecommunications, Brno University of Technology
- Head of the WISLAB research laboratory, Department of Telecommunications, Brno University of Technology
- Senior Research Scientist within the SIX Research Centre, Brno University of Technology
- General Co-chair of the International Congress on Ultra Modern Telecommunications and Control Systems - ICUMT
2005
Bachelor degree in Teleinformatics, Brno University of Technology.
2007
Master degree in Telecommunication and Information Technology, Brno University of Technology.
2011
Ph.D. in Electrical Engineering and Communication in the study area of Teleinformatics, Brno University of Technology.
2016
Associated Professor (doc.) in Teleinformatics, Brno University of Technology.
Teaching
Lectures for students of the course: "Communication Technology" (for international students taught in English).
Social activities
- Czechoslovakia Section IEEE, Local Chapter CAS/COM/SP (secretary and treasurer, 2015 – up to now)
- IEEE Communication Society (member, 2017 – up to now)
- International Congress on Ultra-Modern Telecommunications and Control Systems – ICUMT (General Co-chair, 2015 – up to now)
- Telecommunications and Signal Processing – TSP (Co-chair, 2014 – up to now)
Research interests
- networking technologies
- wireless communications
- quality of service
- user experience
- IoT applications
Keywords
5G, Cellular systems, Internet of Things, QoS, User experience, Wireless technologies
Science
- WISLAB (http://wislab.cz) research group coordinator and Senior Researcher at Brno University of Technology.
- Coordinating a unique full-scale 3GPP LTE-A laboratory delivered by Huawei Technologies, Czech and deployed at Department of Telecommunications, Brno University of Technology.
- Dealing mostly with industry-oriented R&D projects in the area of future mobile networks, Internet of Things and home automation services.
- On the results of studies published over 80 scientific articles (Hirsch index: 6 (Scopus), 3 (WoS)).
- Participation in international scientific projects:
- 2014-2016 - HS18457025 Development of Universal Smart Gateway for Home Automation (Contractual research for Telekom Austria Group).
- 2016-2017 - TF02000036 New Methods for Optimization of Energy Efficiency and Scalability of Ultra-Wideband Real-time Locating Systems (Technology Agency of the Czech Republic).
- 2016-2018 - MVČR VI1VS/031 Research and development of Smart system for control of energy networks and identification of threads in energy infrastructure.
- 2017-2018 - An Intelligent Voice-controlled Smart Home System – Case Study and Proof of Concept Demonstration (Contractual research for Telekom Austria Group).
Abstract:
Nowadays, many emerging technologies, such as Augmented and Virtual reality, require extremely high-rate data transmissions. This imposes an increasing demand on the network throughput, which currently surpasses the capabilities of commercially available wireless communication systems. To address this constraint, some companies are considering the implementation of high-throughput wired technologies, such as optical fibers, as part of their products. This approach is effective in terms of communication link capacity, but on the other hand may bring disadvantages and constraints in terms of user mobility (i.e., the limited length of cables). Therefore, we are currently witnessing much faster development of novel high-rate wireless technologies, which are considered to be enablers for future 5G applications. This paper offers an evaluation of the emerging IEEE 802.11ad (WiGig) wireless technology capable of delivering multi-gigabit data transfer rates. This hands-on assessment aims at real-world experimentation as well as simulation-based study of selected scenarios to assess the usability of the millimeter-wave technology in prospective 5G applications. All of our practical measurements were conducted on the commercially available WiGig-ready Dell D5000 hardware platforms. The obtained data was comprehensively compared with the corresponding simulation scenario in Network Simulator 3. Emerging 5G Applications over mmWave: Hands-on Assessment of WiGig Radios (PDF Download Available).
Nowadays, many emerging technologies, such as Augmented and Virtual reality, require extremely high-rate data transmissions. This imposes an increasing demand on the network throughput, which currently surpasses the capabilities of commercially available wireless communication systems. To address this constraint, some companies are considering the implementation of high-throughput wired technologies, such as optical fibers, as part of their products. This approach is effective in terms of communication link capacity, but on the other hand may bring disadvantages and constraints in terms of user mobility (i.e., the limited length of cables). Therefore, we are currently witnessing much faster development of novel high-rate wireless technologies, which are considered to be enablers for future 5G applications. This paper offers an evaluation of the emerging IEEE 802.11ad (WiGig) wireless technology capable of delivering multi-gigabit data transfer rates. This hands-on assessment aims at real-world experimentation as well as simulation-based study of selected scenarios to assess the usability of the millimeter-wave technology in prospective 5G applications. All of our practical measurements were conducted on the commercially available WiGig-ready Dell D5000 hardware platforms. The obtained data was comprehensively compared with the corresponding simulation scenario in Network Simulator 3. Emerging 5G Applications over mmWave: Hands-on Assessment of WiGig Radios (PDF Download Available).
Abstract:
Device-to-Device (D2D) communication constitutes an emerging network paradigm that promises to unlock decisive capacity gains without the need for expensive cellular resources. However, while deployment of this promising enabler technology in 5G-grade mobile networks is currently underway, the complete understanding of feasible use cases and their respective limitations has not yet been provided in literature. Today, employing D2D connectivity both in human-to-human and machine-to-machine scenarios, the attention of research community focuses on security, privacy, and trust. Inspired by this increasing demand, we provide in this paper a comprehensive summary on our live trial of secure cellular-assisted D2D communication technology within the full-featured 3GPP LTE network deployment. Correspondingly, we describe a novel D2D framework capable of delivering secure direct connectivity even if the managing cellular link is temporarily not available (unreliable), so that communicating devices could continue to exchange confidential data in their private coalitions. To this end, our prototype implementation characterizes the practical capabilities of secure D2D communication in dynamic, urban environments suffering from intermittent 3GPP LTE connectivity.
Device-to-Device (D2D) communication constitutes an emerging network paradigm that promises to unlock decisive capacity gains without the need for expensive cellular resources. However, while deployment of this promising enabler technology in 5G-grade mobile networks is currently underway, the complete understanding of feasible use cases and their respective limitations has not yet been provided in literature. Today, employing D2D connectivity both in human-to-human and machine-to-machine scenarios, the attention of research community focuses on security, privacy, and trust. Inspired by this increasing demand, we provide in this paper a comprehensive summary on our live trial of secure cellular-assisted D2D communication technology within the full-featured 3GPP LTE network deployment. Correspondingly, we describe a novel D2D framework capable of delivering secure direct connectivity even if the managing cellular link is temporarily not available (unreliable), so that communicating devices could continue to exchange confidential data in their private coalitions. To this end, our prototype implementation characterizes the practical capabilities of secure D2D communication in dynamic, urban environments suffering from intermittent 3GPP LTE connectivity.
Abstract:
As next-generation mobile networks are rapidly taking shape driven by the target standardization requirements and initial trial implementations, a range of accompanying technologies prepare to support them with more reliable wireless access and improved service provisioning. Among these are more advanced spectrum sharing options enabled by the emerging Licensed Shared Access (LSA) regulatory framework, which aims to efficiently employ the capacity of underutilized frequency bands in a controlled manner. The concept of LSA promises to equip network operators with the much needed additional spectrum on the secondary basis and thus brings changes to the existing cellular network management. Hence, additional research is in prompt demand to determine the required levels of Quality of Service (QoS) and service provisioning reliability, especially in cases of dynamic geographical and temporal LSA sharing. Motivated by this recent urge and having at our disposal a fully-functional 3GPP LTE cellular deployment, we have committed to implement and trial the principles of dynamic LSA-compatible spectrum management. This paper is our first disclosure on the comprehensive experimental evaluation of this promising technology. We expect that these unprecedented practical results together with the key lessons learned will become a valuable reference point for the subsequent integration of flexible LSA-based services, suitable for inter-operator and multi-tenant spectrum sharing.
As next-generation mobile networks are rapidly taking shape driven by the target standardization requirements and initial trial implementations, a range of accompanying technologies prepare to support them with more reliable wireless access and improved service provisioning. Among these are more advanced spectrum sharing options enabled by the emerging Licensed Shared Access (LSA) regulatory framework, which aims to efficiently employ the capacity of underutilized frequency bands in a controlled manner. The concept of LSA promises to equip network operators with the much needed additional spectrum on the secondary basis and thus brings changes to the existing cellular network management. Hence, additional research is in prompt demand to determine the required levels of Quality of Service (QoS) and service provisioning reliability, especially in cases of dynamic geographical and temporal LSA sharing. Motivated by this recent urge and having at our disposal a fully-functional 3GPP LTE cellular deployment, we have committed to implement and trial the principles of dynamic LSA-compatible spectrum management. This paper is our first disclosure on the comprehensive experimental evaluation of this promising technology. We expect that these unprecedented practical results together with the key lessons learned will become a valuable reference point for the subsequent integration of flexible LSA-based services, suitable for inter-operator and multi-tenant spectrum sharing.
Abstract:
The unprecedented growth of today's cities together with increased population mobility are fueling the avalanche in the numbers of vehicles on the roads. This development led to the new challenges for the traffic management, including the mitigation of road congestion, accidents, and air pollution. Over the last decade, researchers have been focusing their efforts on leveraging the recent advances in sensing, communications, and dynamic adaptive technologies to prepare the deployed road traffic management systems (TMS) for resolving these important challenges in future smart cities. However, the existing solutions may still be insufficient to construct a reliable and secure TMS that is capable of handling the anticipated influx of the population and vehicles in urban areas. Along these lines, this work systematically outlines a perspective on a novel modular environment for traffic modeling, which allows to recreate the examined road networks in their full resemblance. Our developed solution is targeted to incorporate the progress in the Internet of Things (IoT) technologies, where low-power, embedded devices integrate as part of a next-generation TMS. To mimic the real traffic conditions, we recreated and evaluated a practical traffic scenario built after a complex road intersection within a large European city.
The unprecedented growth of today's cities together with increased population mobility are fueling the avalanche in the numbers of vehicles on the roads. This development led to the new challenges for the traffic management, including the mitigation of road congestion, accidents, and air pollution. Over the last decade, researchers have been focusing their efforts on leveraging the recent advances in sensing, communications, and dynamic adaptive technologies to prepare the deployed road traffic management systems (TMS) for resolving these important challenges in future smart cities. However, the existing solutions may still be insufficient to construct a reliable and secure TMS that is capable of handling the anticipated influx of the population and vehicles in urban areas. Along these lines, this work systematically outlines a perspective on a novel modular environment for traffic modeling, which allows to recreate the examined road networks in their full resemblance. Our developed solution is targeted to incorporate the progress in the Internet of Things (IoT) technologies, where low-power, embedded devices integrate as part of a next-generation TMS. To mimic the real traffic conditions, we recreated and evaluated a practical traffic scenario built after a complex road intersection within a large European city.
Abstract:
Today, direct contacts between users are being facilitated by the network-assisted device-to-device (D2D) technology, which employs the omnipresent cellular infrastructure for the purposes of control to facilitate advanced mobile social applications. Together with its undisputed benefits, this novel type of connectivity creates new challenges in constructing meaningful proximity-based services with high levels of user adoption. They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations where cellular control is not available or reliable at all times. In this paper, we study the crucial aspects of social trust associations over proximity-based direct communications technology, with a primary focus on developing a comprehensive proof-of-concept implementation. Our recently developed prototype delivers rich functionality for dynamic management of security functions in proximate devices, whenever a new device joins a secure group of users or an existing one leaves it. To characterize the behavior of our implemented demonstrator, we evaluate its practical performance in terms of computation and transmission delays from the user perspective. In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.
Today, direct contacts between users are being facilitated by the network-assisted device-to-device (D2D) technology, which employs the omnipresent cellular infrastructure for the purposes of control to facilitate advanced mobile social applications. Together with its undisputed benefits, this novel type of connectivity creates new challenges in constructing meaningful proximity-based services with high levels of user adoption. They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations where cellular control is not available or reliable at all times. In this paper, we study the crucial aspects of social trust associations over proximity-based direct communications technology, with a primary focus on developing a comprehensive proof-of-concept implementation. Our recently developed prototype delivers rich functionality for dynamic management of security functions in proximate devices, whenever a new device joins a secure group of users or an existing one leaves it. To characterize the behavior of our implemented demonstrator, we evaluate its practical performance in terms of computation and transmission delays from the user perspective. In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.
Abstract:
Decisive progress in 5G mobile technology, fueled by a rapid proliferation of computation- hungry and delay-sensitive services, puts economic pressure on the research community to rethink the fundamentals of underlying networking architectures. Along these lines, the first half of this article offers a first-hand tutorial on the most recent advances in content-centric networking, emerging user applications, as well as enabling system architectures. We establish that while significant progress has been made along the individual vectors of communications, caching, and computing, together with some promising steps in proposing hybrid functionalities, the ultimate synergy behind a fully integrated solution is not nearly well understood. Against this background, the second half of this work carefully brings into perspective additional important factors, such as user mobility patterns, aggressive application requirements, and associated operator deployment capabilities, to conduct comprehensive system-level analysis. Furthermore, supported by a full-fledged practical trial on a live cellular network, our systematic findings reveal the most dominant factors in converged 5G-grade communications, caching, and computing layouts, as well as indicate the natural optimization points for system operators to leverage the maximum available benefits.
Decisive progress in 5G mobile technology, fueled by a rapid proliferation of computation- hungry and delay-sensitive services, puts economic pressure on the research community to rethink the fundamentals of underlying networking architectures. Along these lines, the first half of this article offers a first-hand tutorial on the most recent advances in content-centric networking, emerging user applications, as well as enabling system architectures. We establish that while significant progress has been made along the individual vectors of communications, caching, and computing, together with some promising steps in proposing hybrid functionalities, the ultimate synergy behind a fully integrated solution is not nearly well understood. Against this background, the second half of this work carefully brings into perspective additional important factors, such as user mobility patterns, aggressive application requirements, and associated operator deployment capabilities, to conduct comprehensive system-level analysis. Furthermore, supported by a full-fledged practical trial on a live cellular network, our systematic findings reveal the most dominant factors in converged 5G-grade communications, caching, and computing layouts, as well as indicate the natural optimization points for system operators to leverage the maximum available benefits.
Abstract:
Today, the rapid adoption of mobile social networking is changing how and where humans communicate. As a result, in recent years we have been increasingly moving from physical (e.g., face-to-face) to virtual interaction. However, there is also a new emerging category of social applications that take advantage of both worlds, that is, using virtual interaction to enhance physical interaction. This novel form of networking is enabled by D2D communication between/among the laptops, smartphones, and wearables of persons in proximity of each other. Unfortunately, it has remained limited by the fact that most people are simply not aware of the many potential virtual opportunities in their proximity at any given time. This is a result of the very real digital privacy and security concerns surrounding direct communication between "stranger" devices. Fortunately, these concerns can be mitigated with the help of a centralized trusted entity, such as a cellular service provider, which can not only authenticate and protect the privacy of devices involved into D2D communication, but also facilitate the discovery of device capabilities and their available content. This article offers an extensive research summary behind this type of "cellular-assisted" D2D communication, detailing the enabling technology and its implementation, relevant usage scenarios, security challenges, and user experience observations from large-scale deployments.
Today, the rapid adoption of mobile social networking is changing how and where humans communicate. As a result, in recent years we have been increasingly moving from physical (e.g., face-to-face) to virtual interaction. However, there is also a new emerging category of social applications that take advantage of both worlds, that is, using virtual interaction to enhance physical interaction. This novel form of networking is enabled by D2D communication between/among the laptops, smartphones, and wearables of persons in proximity of each other. Unfortunately, it has remained limited by the fact that most people are simply not aware of the many potential virtual opportunities in their proximity at any given time. This is a result of the very real digital privacy and security concerns surrounding direct communication between "stranger" devices. Fortunately, these concerns can be mitigated with the help of a centralized trusted entity, such as a cellular service provider, which can not only authenticate and protect the privacy of devices involved into D2D communication, but also facilitate the discovery of device capabilities and their available content. This article offers an extensive research summary behind this type of "cellular-assisted" D2D communication, detailing the enabling technology and its implementation, relevant usage scenarios, security challenges, and user experience observations from large-scale deployments.
Abstract:
Internet of Things (IoT) is expected to become a driver in an emerging era of interconnected world through the advanced connectivity of smart devices, systems, and services. IoT goes beyond a broad range of Machine-to-Machine (M2M) communication technologies and covers a wide variety of networking protocols. There exist solutions like MQTT or SIP collecting data from sensors, CoAP for constrained devices and networks, or XMPP for interconnecting devices and people. Also there is a plethora of standards and frameworks (OSGi, AllJoyn) bringing closer the paradigm of IoT vision. However, the main constraint of most existing platforms is their limited mutual interoperability. To this end, we provide a comprehensive description of protocols suitable to support the IoT vision. Further, we advocate an alternative approach to already known principles and employ the SIP protocol as a container for M2M data. We provide description of data structures and practical implementation principles of the proposed structures (JSON and Protocol Buffers are discussed in detail) transmitted by SIP as a promising enabler for efficient M2M communication in the IoT world. Our reported findings are based on extensive hands-on experience collected after the development of advanced M2M smart home gateway in cooperation with the operator Telekom Austria Group.
Internet of Things (IoT) is expected to become a driver in an emerging era of interconnected world through the advanced connectivity of smart devices, systems, and services. IoT goes beyond a broad range of Machine-to-Machine (M2M) communication technologies and covers a wide variety of networking protocols. There exist solutions like MQTT or SIP collecting data from sensors, CoAP for constrained devices and networks, or XMPP for interconnecting devices and people. Also there is a plethora of standards and frameworks (OSGi, AllJoyn) bringing closer the paradigm of IoT vision. However, the main constraint of most existing platforms is their limited mutual interoperability. To this end, we provide a comprehensive description of protocols suitable to support the IoT vision. Further, we advocate an alternative approach to already known principles and employ the SIP protocol as a container for M2M data. We provide description of data structures and practical implementation principles of the proposed structures (JSON and Protocol Buffers are discussed in detail) transmitted by SIP as a promising enabler for efficient M2M communication in the IoT world. Our reported findings are based on extensive hands-on experience collected after the development of advanced M2M smart home gateway in cooperation with the operator Telekom Austria Group.
Abstract:
The Internet of Things (IoT) brings together a large variety of devices of different platforms, computational capacities and functionalities. The network heterogeneity and the ubiquity of IoT devices introduce increased demands on both security and privacy protection. Therefore, the cryptographic mechanisms must be strong enough to meet these increased requirements but, at the same time, they must be efficient enough for the implementation on constrained devices. In this paper, we present a detailed assessment of the performance of the most used cryptographic algorithms on constrained devices that often appear in IoT networks. We evaluate the performance of symmetric primitives, such as block ciphers, hash functions, random number generators, asymmetric primitives, such as digital signature schemes, and privacy-enhancing schemes on various microcontrollers, smart-cards and mobile devices. Furthermore, we provide the analysis of the usability of upcoming schemes, such as the homomorphic encryption schemes, group signatures and attribute-based schemes.
The Internet of Things (IoT) brings together a large variety of devices of different platforms, computational capacities and functionalities. The network heterogeneity and the ubiquity of IoT devices introduce increased demands on both security and privacy protection. Therefore, the cryptographic mechanisms must be strong enough to meet these increased requirements but, at the same time, they must be efficient enough for the implementation on constrained devices. In this paper, we present a detailed assessment of the performance of the most used cryptographic algorithms on constrained devices that often appear in IoT networks. We evaluate the performance of symmetric primitives, such as block ciphers, hash functions, random number generators, asymmetric primitives, such as digital signature schemes, and privacy-enhancing schemes on various microcontrollers, smart-cards and mobile devices. Furthermore, we provide the analysis of the usability of upcoming schemes, such as the homomorphic encryption schemes, group signatures and attribute-based schemes.