Csaba Kiraly

Csaba Kiraly
FBK CREATE-NET · OpenIoT

PhD

About

59
Publications
22,565
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
751
Citations
Introduction
Csaba Kiraly currently works at the OpenIoT, FBK CREATE-NET. Csaba does research in Computer Communications (Networks), Computer Engineering and Communication Engineering. Their current project is 'AGILE: an Adaptive & Modular Gateway for the IoT'.

Publications

Publications (59)
Preprint
Full-text available
Advancements in ultra-low-power tiny machine learning (TinyML) systems promise to unlock an entirely new class of smart applications. However, continued progress is limited by the lack of a widely accepted and easily reproducible benchmark for these systems. To meet this need, we present MLPerf Tiny, the first industry-standard benchmark suite for...
Article
Full-text available
Modern protocols for wireless sensor networks efficiently support multi-hop upward traffic from many sensors to a collection point, a key functionality enabling monitoring applications. However, the ever-evolving scenarios involving low-power wireless devices increasingly require support also for downward traffic, e.g., enabling a controller to iss...
Article
Full-text available
The Internet Of Things (IoT) is an emerging paradigm that envisions a networked infrastructure enabling different types of devices to be interconnected. It creates different kinds of artifacts (e.g., services and applications) in various application domains such as health monitoring, sports monitoring, animal monitoring, enhanced retail services, a...
Preprint
Full-text available
Fog computing enables use cases where data produced in end devices are stored, processed, and acted on directly at the edges of the network, yet computation can be offloaded to more powerful instances through the edge to cloud continuum. Such offloading mechanism is especially needed in case of modern multi-purpose IoT gateways, where both demand a...
Preprint
Full-text available
Stringent latency requirements in advanced Internet of Things (IoT) applications as well as an increased load on cloud data centers have prompted a move towards a more decentralized approach, bringing storage and processing of IoT data closer to the end-devices through the deployment of multi-purpose IoT gateways. However, the resource constrained...
Article
Full-text available
In wireless environments, transmission and recep- tion costs dominate system power consumption, motivating re- search effort on new technologies capable of reducing the foot- print of the radio, paving the way for the Internet of Things. The most important challenge is to reduce power consumption when receivers are idle, the so called idle-listenin...
Article
Full-text available
RPL, the IPv6 Routing Protocol for low-power and lossy networks, is considered the de facto routing protocol for the Internet of Things (IoT). Since its standardization, RPL has contributed to the advancement of communications in the world of tiny, embedded networking devices by providing, along with other standards, a baseline architecture for IoT...
Conference Paper
The flourishing ecosystem of the Internet of Things (IoT) provides the enabling technologies for the development of smart cities. In intelligent urban settings, integrated and sustainable mobility plays a key role, especially for children, whose ability to move independently throughout their neighborhood is fundamental, both for themselves and thei...
Research
Deliverable D01 is an output document from Workpackage WP1.1, Applications and Services Development. The objectives of WP1.1 are to evaluate suitable existing applications and to develop new mobile and fixed applications that may be profitably carried on Broadband HAPs. D01 provides candidate applications and services for broadband HAPs delivery, i...
Conference Paper
Full-text available
RPL, the IPv6 Routing Protocol for Low-Power and Lossy Networks, supports both upward and downward traffic. The latter is fundamental for actuation, for queries, and for any bidirectional protocol such as TCP, yet its support is compromised by memory limitation in the nodes. In RPL storing mode, nodes store routing entries for each destination in t...
Article
Full-text available
This paper presents an extensive experimental evaluation of the layer 3 packet forwarding performance of virtual software routers based on the Linux kernel and the KVM virtual machine. The impact of various tuning and configuration options on forwarding performance is evaluated, focussing on the mechanism used for moving data to and from virtual ma...
Conference Paper
Full-text available
Low-power wireless actuation is attracting interest in many domains, yet it is significantly less investigated than its sensing counterpart, especially in large-scale scenarios. As a consequence, guidelines about which protocol, among the few existing ones, is best suited to a given scenario are generally lacking. In this paper, we investigate the...
Article
Full-text available
The goal of this paper is to investigate rate control mechanisms for unstructured P2P-TV applications adopting UDP as transport protocol. We focus on a novel class of Hose Rate Controllers (HRC), which aim at regulating the aggregate upload rate of each peer. This choice is motivated by the peculiar P2P-TV needs: video content is not elastic but it...
Article
Full-text available
Peer-to-peer live-streaming (P2P-TV) systems’ goal is disseminating real-time video content using peer-to-peer technology. Their performance is driven by the overlay topology, i.e., the virtual topology that peers use to exchange video chunks. Several proposals have been made in the past to optimize it, yet few experimental studies have corroborate...
Article
Full-text available
This paper describes an approach to perform reproducible performance tests on virtual routers, comparing different virtual routing architectures, different software versions and configurations. The presented approach is based on VRKit, a software tool that allows to build pre-configured bootable virtual router images with the desired characteristic...
Conference Paper
Full-text available
This paper shows how to use an open virtualisation architecture to analyse and improve the forwarding performance of a virtual router. In particular, the forwarding performance of the Linux kernel running inside a KVM virtual machine and the performance of some more advanced architectures based on virtual routers aggregation are analysed, showing h...
Article
Full-text available
In this paper we consider mesh based P2P streaming systems focusing on the problem of regulating peer transmission rate to match the system demand while not overloading each peer upload link capacity. We propose Hose Rate Control (HRC), a novel scheme to control the speed at which peers offer chunks to other peers, ultimately controlling peer uplin...
Conference Paper
Full-text available
Contrary to laboratory environments, real-world wireless sensor network deployments face harsh conditions where motes can be lost during deployment or in operation, for several reasons. Motes mounted on animals can easily detach. Fixed motes could get displaced by environmental conditions, e.g., heavy rains. These motes could contain valuable data...
Conference Paper
Full-text available
P2P-TV systems performance are driven by the overlay topology that peers form. Several proposals have been made in the past to optimize it, yet little experimental studies have corroborated results. The aim of this work is to provide a comprehensive experimental comparison of different strategies for the construction and maintenance of the overlay...
Article
Full-text available
Wireless Sensor Networks are emerging as one of the most promising research directions, due to the possibility of sensing the physical world with a granularity unimaginable before. In this chapter, we address some of the major challenges related to the collection and elaboration of data sourcing from such networks of distributed devices. In particu...
Conference Paper
Full-text available
In this paper we consider mesh based P2P streaming systems focusing on the problem of regulating peer upload rate to match the system demand while not overloading each peer upload link capacity. We propose Hose Rate Control (HRC), a novel scheme to control the speed at which peers offer chunks to other peers, ultimately controlling peer uplink capa...
Article
Full-text available
Peer to Peer streaming (P2P-TV) applications have recently emerged as cheap and efficient solutions to provide real time streaming services over the Internet. For the sake of simplicity, typical P2P-TV systems are designed and optimized following a pure layered approach, thus ignoring the effect of design choices on the underlying transport network...
Conference Paper
Full-text available
Splitting a P2P video distribution in multiple media flows with different priorities is an interesting approach for developing flexible and adaptive streaming systems, ranging from VoD to TV. Such an approach can both yield satisfactory quality to all end users and be light in network resources usage, because low-priority flows can be discarded a-p...
Conference Paper
Full-text available
P2P-TV systems have become part of the Internet landscape. The architecture of these (normally proprietary) applications is generally receiver-driven, in that receivers actively search for suitable peers to download from, trying to maximize their performance. The Napa-Wine EU project proposes an architecture where P2P-TV clients exploit network mea...
Conference Paper
Full-text available
P2P TV and video streaming are among the most bandwidth-hungry applications running over the Internet. One of the main reasons is that the scheduling of information transfer between peers is extremely aggressive and does not take network characteristics into account. Moreover, schedulers are not designed to be robust and configurable, so that their...
Conference Paper
Full-text available
P2P TV distribution is going commercial, and the video quality delivered to users becomes of the utmost importance. However, the impact of P2P distribution on the video quality is not completely understood yet, especially in live streaming situations. This work addresses the impact of P2P distribution when the delay of the playout is limited, as it...
Conference Paper
Full-text available
Scheduling the transmission of information in P2P applications is one of the main challenges, and one of the keys to success, for these applications. We concentrate on low-latency streaming applications (e.g. TV) and explore different combinations of chunk and peer scheduling strategies, finding that the majority of the proposals found in the liter...
Article
Full-text available
Practical implementation of new P2P streaming systems re-quires a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at solving this problem by pro-viding a set of open-source components conceived as basic building blocks for building new P2P streaming applicati...
Conference Paper
Full-text available
This paper describes SSSim, the Simple and Scalable Simulator for P2P streaming systems. SSSim is designed for performance and scalability, and allows the simulation of the diffusion of a very large number of chunks over large number of peers in reasonable times. This result has been obtained by optimising the simulator for recurrent workloads and...
Conference Paper
Full-text available
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents several threats to the right of protecting personal and sensitive data. One fundamental building block of privacy-respectful communications is protecting the communication parties...
Conference Paper
Full-text available
Recently several studies have been made on reducing overall network traffic by localizing P2P traffic. Interestingly, real world measurements show that these localization techniques often do not bring performance advantages to the P2P user, only to the underlying network by reducing average layer 3 hop count of individual transmissions. In this pap...
Conference Paper
Full-text available
Unstructured, chunk-based P2P streaming (TV and Video) systems are becoming popular and are subject of intense research. Chunk and peer selection strategies (or scheduling) are among the main driver of performance. This work presents the formal proof that there exist a distributed scheduling strategy which is able to distribute every chunk to all N...
Article
It is just getting common knowledge that private data entered on web pages is not safe at all. What is less known is that on the Internet, even if using encryption, simply by communicating, the communication pattern (services we connect to, amount and timing of communication) reveals a lot about ourselves. Attackers, or even the Internet Service Pr...
Chapter
Full-text available
Traffic Flow Confidentiality (TFC) mechanisms are techniques de- vised to hide/masquerade the traffic pattern to prevent statistical traffic analysis attacks. Their inclusion in widespread security protocols, in conjunction with the ability for deployers to flexibly control their operation, might boost their adoption and improve privacy of future n...
Conference Paper
Full-text available
Protection from statistical traffic analysis attacks calls for effective design of traffic flow confidentiality (TFC) mechanisms. These are devised to alter the traffic pattern in order to hide information about contents transmitted, which, despite encryption, can be revealed by malicious users through statistical analysis. Widespread diffusion of...
Article
Full-text available
Among the most important research topics in computer sciences, a primary role is played by design and control of next-generation communication networks (NGCNs). Such networks will be characterized by heterogeneity at all levels, encompassing a large variety of users, media, processes and channels. Another important feature of NGCNs will be the abil...
Article
Full-text available
A new technique for the analytical evaluation of distributions (and quantiles) of the completion time of short-lived TCP connections is presented and discussed. The proposed technique derives from known open multiclass queuing network (OMQN) models of the TCP protocol and computes a discrete approximation, with arbitrary accuracy, of the distributi...
Conference Paper
Full-text available
The CREATE-NET testbed is a long term project aiming at implementing a best state-of-the-art infrastructure able to link together research centers, both from academia and industrial bodies, in order to create a fruitful collaborative environment to help generating new ideas for advanced applications and services, developing new protocols, testing a...
Conference Paper
Full-text available
http://www.create-net.it Abstract. The amount of information in the new emerging all-embracing pervasive environments will be enormous. Current Internet protocol con- ceived almost forty years ago, were never planned for these emerging per- vasive environments. The communications requirements placed by these protocols on the low cost sensor and tag...
Technical Report
Full-text available
Including implications on network functionality and interfaces, e.g. for third-party network providers Abstract: Deliverable D01 is an output document from Workpackage WP1.1, Applications and Services Development. The objectives of WP1.1 are to evaluate suitable existing applications and to develop new mobile and fixed applications that may be prof...
Conference Paper
Full-text available
The All-IP network concept with end-to-end QoS provisioning has received particular attention in 3GPP recently. The UMTS proposals, however, have not yet solved some protocol interoperability issues. This paper analyzes the IP Multimedia Subsystem from the aspect of call control, resource reserva- tion and network policing interoperability from the...
Conference Paper
Full-text available
The All-IP network concept with end-to-end QoS provisioning has received particular attention in 3GPP recently. This paper describes a prototype implementation for the analysis of the IP Multimedia Subsystem from the aspect of call control, resource reservation and network policing interoperability. The experiences based on a prototype implementati...
Conference Paper
Full-text available
The International Telecommunications Union (ITU) has endorsed High Altitude Platforms (HAPs) as an alternative means of providing UMTS wireless services. The utilisation of HAPs (High Altitude Platforms) in the access part of the upcoming UMTS networks can provide great flexibility to UMTS from the viewpoint of service provisions and fast infrastru...
Article
Full-text available
Peer-to-Peer streaming systems (or P2P-TV) provide low cost infrastructures for the support of live video distribution over the Internet. They are attracting an increasing attention from the research community, the developers and practitioners. In this paper we consider P2P streaming systems based on mesh overlays and focus on the matter of automat...
Article
Full-text available
Traditional communication security focuses on protecting the delivered contents through strong encryption means. However, the statistical pattern of the traffic generated in a communication carries plenty of information which can be maliciously gathered through specially devised attacks. To duly protect the privacy of the users, further mechanisms...
Article
Full-text available
Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hops devised to void end-to-end linkage of the information, thus protecting users' identities (when needed) and privacy. Most Mix networks are based on hops built either on TLS or directly built by proprietary protocols. In the first part of this paper...
Article
Full-text available
This paper present a thorough and homogeneous comparison of chunk and peer selection strategies suitable for mesh-based, live, P2P streaming applications. Strategies are studied in a context of push protocols, and it is shown that none of the schedulers analyzed, which are, to the best of our knowledge, the majority of those proposed in the literat...
Article
Full-text available
Practical implementation of new P2P streaming systems requires a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and speed-up application development, by providing a set of open-source components conceived as basic build- ing blocks...

Network

Cited By

Projects

Projects (4)
Archived project
In the next few years we will assist to the explosion of the market of high quality video distribution over Internet (IPTV). The massive deployment of IPTV platforms will offer the opportunity to change the paradigm of current TV broadcasting, moving from the nowadays mass TV, toward personalized TV, thanks to the creation of a large number of thematic channels. IPTV services can be provided either exploiting IP multicast functionalities or relying on a pure end-to-end (P2P) approach. The first approach can be typically supplied only on a closed network infrastructure controlled by a single broadband operator. On the contrary, P2P approach has been successfully exploited to overcome these limits and potentially offer a scalable planetary infrastructure. On the other hand P2P-TV systems constitute also a fear for the current network carriers since the traffic they ingenerate may potentially grow without control, causing a strong degradation of quality of service perceived by Internet users or even the network collapse (and consequent failure of the P2P-TV service itself).Starting from these considerations this project is aimed: i)\tat providing a careful analysis of the impact that a large deployment of both general P2P-TV services may have on Internet, through an in deep characterization of traffic they generate;ii)\tat providing suggestions for P2P-TV developers regarding the design of systems that minimize the impact on the underlying transport network while optimizing the user perceived qualityiii)\tat providing suggestions for Internet Providers by showing simple and minimum cost actions that can be taken to better exploit the network bandwidth in presence of P2P-TV traffic.A software library containing many of the algorithms studied within the project will be made available to the community of P2P developers wishing to use them. At last network-aware P2P-TV application will be released, and its performance carefully evaluated.
Archived project
The deployment of highly pervasive services, the introduction of efficient surveillance systems, and the increasing usage of biometric technologies poses severe challenges to the privacy of the user and their "right to be forgotten": once personal data are spread in the information systems, they are permanently away from the control of the end-user, and only regulation provides the user with the trust that their data will be used in the "proper" manner. In such a context, DISCREET wants to challenge the following fundamental question: - Is pervasive technology forcing users to waive their privacy rights? - How much of our privacy (where I'm, who I'm, which services I'm exploiting, which contents I'm downloading,…) can be traded for security and/or new service opportunities? - How much of our privacy do we have to give up for better public safety? Discreet Service Provision in Smart Environment wants to contribute to break, what we argue to be a false dichotomy, in which systems designers force their users to sacrifice some part of a fundamental right - their privacy - in order to gain some utility - the use of the application. Specifically, we argue that a major leap in terms of societal acceptance of pervasive technologies would come from strict technical guarantees of privacy protection.