Csaba KiralyFBK CREATE-NET · OpenIoT
Csaba Kiraly
PhD
About
60
Publications
29,758
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
942
Citations
Introduction
Csaba Kiraly currently works at the OpenIoT, FBK CREATE-NET. Csaba does research in Computer Communications (Networks), Computer Engineering and Communication Engineering. Their current project is 'AGILE: an Adaptive & Modular Gateway for the IoT'.
Publications
Publications (60)
Rapid adoption of machine learning (ML) technologies has led to a surge in power consumption across diverse systems, from tiny IoT devices to massive datacenter clusters. Benchmarking the energy efficiency of these systems is crucial for optimization, but presents novel challenges due to the variety of hardware platforms, workload characteristics,...
Advancements in ultra-low-power tiny machine learning (TinyML) systems promise to unlock an entirely new class of smart applications. However, continued progress is limited by the lack of a widely accepted and easily reproducible benchmark for these systems. To meet this need, we present MLPerf Tiny, the first industry-standard benchmark suite for...
Modern protocols for wireless sensor networks efficiently support multi-hop upward traffic from many sensors to a collection point, a key functionality enabling monitoring applications. However, the ever-evolving scenarios involving low-power wireless devices increasingly require support also for downward traffic, e.g., enabling a controller to iss...
The Internet Of Things (IoT) is an emerging paradigm that envisions a networked infrastructure enabling different types of devices to be interconnected. It creates different kinds of artifacts (e.g., services and applications) in various application domains such as health monitoring, sports monitoring, animal monitoring, enhanced retail services, a...
Fog computing enables use cases where data produced in end devices are stored, processed, and acted on directly at the edges of the network, yet computation can be offloaded to more powerful instances through the edge to cloud continuum. Such offloading mechanism is especially needed in case of modern multi-purpose IoT gateways, where both demand a...
Stringent latency requirements in advanced Internet of Things (IoT) applications as well as an increased load on cloud data centers have prompted a move towards a more decentralized approach, bringing storage and processing of IoT data closer to the end-devices through the deployment of multi-purpose IoT gateways. However, the resource constrained...
In wireless environments, transmission and recep- tion costs dominate system power consumption, motivating re- search effort on new technologies capable of reducing the foot- print of the radio, paving the way for the Internet of Things. The most important challenge is to reduce power consumption when receivers are idle, the so called idle-listenin...
RPL, the IPv6 Routing Protocol for low-power and lossy networks, is considered the de facto routing protocol for the Internet of Things (IoT). Since its standardization, RPL has contributed to the advancement of communications in the world of tiny, embedded networking devices by providing, along with other standards, a baseline architecture for IoT...
The flourishing ecosystem of the Internet of Things (IoT) provides the enabling technologies for the development of smart cities. In intelligent urban settings, integrated and sustainable mobility plays a key role, especially for children, whose ability to move independently throughout their neighborhood is fundamental, both for themselves and thei...
Deliverable D01 is an output document from Workpackage WP1.1, Applications and Services Development.
The objectives of WP1.1 are to evaluate suitable existing applications and to develop new mobile and fixed applications that may be profitably carried on Broadband HAPs.
D01 provides candidate applications and services for broadband HAPs delivery, i...
RPL, the IPv6 Routing Protocol for Low-Power
and Lossy Networks, supports both upward and downward
traffic. The latter is fundamental for actuation, for queries,
and for any bidirectional protocol such as TCP, yet its support
is compromised by memory limitation in the nodes. In RPL
storing mode, nodes store routing entries for each destination
in t...
This paper presents an extensive experimental evaluation of the layer 3 packet forwarding performance of virtual software routers based on the Linux kernel and the KVM virtual machine. The impact of various tuning and configuration options on forwarding performance is evaluated, focussing on the mechanism used for moving data to and from virtual ma...
Low-power wireless actuation is attracting interest in many domains, yet it is significantly less investigated than its sensing counterpart, especially in large-scale scenarios. As a consequence, guidelines about which protocol, among the few existing ones, is best suited to a given scenario are generally lacking.
In this paper, we investigate the...
The goal of this paper is to investigate rate control mechanisms for unstructured P2P-TV applications adopting UDP as transport protocol. We focus on a novel class of Hose Rate Controllers (HRC), which aim at regulating the aggregate upload rate of each peer. This choice is motivated by the peculiar P2P-TV needs: video content is not elastic but it...
Peer-to-peer live-streaming (P2P-TV) systems’ goal is disseminating real-time video content using peer-to-peer technology. Their performance is driven by the overlay topology, i.e., the virtual topology that peers use to exchange video chunks. Several proposals have been made in the past to optimize it, yet few experimental studies have corroborate...
This paper describes an approach to perform reproducible performance tests on virtual routers, comparing different virtual routing architectures, different software versions and configurations. The presented approach is based on VRKit, a software tool that allows to build pre-configured bootable virtual router images with the desired characteristic...
This paper shows how to use an open virtualisation architecture to analyse and improve the forwarding performance of a virtual router. In particular, the forwarding performance of the Linux kernel running inside a KVM virtual machine and the performance of some more advanced architectures based on virtual routers aggregation are analysed, showing h...
In this paper we consider mesh based P2P streaming systems focusing on the problem of regulating peer transmission rate to match the system demand while not overloading each peer upload link capacity. We propose Hose Rate Control (HRC), a novel scheme to control the speed at which peers offer chunks to other peers, ultimately controlling peer uplin...
Contrary to laboratory environments, real-world wireless sensor network deployments face harsh conditions where motes can be lost during deployment or in operation, for several reasons. Motes mounted on animals can easily detach. Fixed motes could get displaced by environmental conditions, e.g., heavy rains. These motes could contain valuable data...
P2P-TV systems performance are driven by the overlay topology that peers form. Several proposals have been made in the past to optimize it, yet little experimental studies have corroborated results. The aim of this work is to provide a comprehensive experimental comparison of different strategies for the construction and maintenance of the overlay...
Wireless Sensor Networks are emerging as one of the most promising research directions, due to the possibility of sensing the physical world with a granularity unimaginable before. In this chapter, we address some of the major challenges related to the collection and elaboration of data sourcing from such networks of distributed devices. In particu...
In this paper we consider mesh based P2P streaming systems focusing on the problem of regulating peer upload rate to match the system demand while not overloading each peer upload link capacity. We propose Hose Rate Control (HRC), a novel scheme to control the speed at which peers offer chunks to other peers, ultimately controlling peer uplink capa...
Peer to Peer streaming (P2P-TV) applications have recently emerged as cheap and efficient solutions to provide real time streaming services over the Internet. For the sake of simplicity, typical P2P-TV systems are designed and optimized following a pure layered approach, thus ignoring the effect of design choices on the underlying transport network...
Splitting a P2P video distribution in multiple media flows with different priorities is an interesting approach for developing flexible and adaptive streaming systems, ranging from VoD to TV. Such an approach can both yield satisfactory quality to all end users and be light in network resources usage, because low-priority flows can be discarded a-p...
Practical implementation of new P2P streaming systems re-quires a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at solving this problem by pro-viding a set of open-source components conceived as basic building blocks for building new P2P streaming applicati...
P2P-TV systems have become part of the Internet landscape. The architecture of these (normally proprietary) applications is generally receiver-driven, in that receivers actively search for suitable peers to download from, trying to maximize their performance. The Napa-Wine EU project proposes an architecture where P2P-TV clients exploit network mea...
P2P TV and video streaming are among the most bandwidth-hungry applications running over the Internet. One of the main reasons is that the scheduling of information transfer between peers is extremely aggressive and does not take network characteristics into account. Moreover, schedulers are not designed to be robust and configurable, so that their...
P2P TV distribution is going commercial, and the video quality delivered to users becomes of the utmost importance. However, the impact of P2P distribution on the video quality is not completely understood yet, especially in live streaming situations. This work addresses the impact of P2P distribution when the delay of the playout is limited, as it...
Scheduling the transmission of information in P2P applications is one of the main challenges, and one of the keys to success, for these applications. We concentrate on low-latency streaming applications (e.g. TV) and explore different combinations of chunk and peer scheduling strategies, finding that the majority of the proposals found in the liter...
This paper describes SSSim, the Simple and Scalable Simulator for P2P streaming systems. SSSim is designed for performance and scalability, and allows the simulation of the diffusion of a very large number of chunks over large number of peers in reasonable times. This result has been obtained by optimising the simulator for recurrent workloads and...
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents several threats to the right of protecting personal and sensitive data. One fundamental building block of privacy-respectful communications is protecting the communication parties...
Recently several studies have been made on reducing overall network traffic by localizing P2P traffic. Interestingly, real world measurements show that these localization techniques often do not bring performance advantages to the P2P user, only to the underlying network by reducing average layer 3 hop count of individual transmissions. In this pap...
Unstructured, chunk-based P2P streaming (TV and Video) systems are becoming popular and are subject of intense research. Chunk
and peer selection strategies (or scheduling) are among the main driver of performance. This work presents the formal proof
that there exist a distributed scheduling strategy which is able to distribute every chunk to all N...
It is just getting common knowledge that private data entered on web pages is not safe at all. What is less known is that on the Internet, even if using encryption, simply by communicating, the communication pattern (services we connect to, amount and timing of communication) reveals a lot about ourselves. Attackers, or even the Internet Service Pr...
Traffic Flow Confidentiality (TFC) mechanisms are techniques de- vised to hide/masquerade the traffic pattern to prevent statistical
traffic analysis attacks. Their inclusion in widespread security protocols, in conjunction with the ability for deployers
to flexibly control their operation, might boost their adoption and improve privacy of future n...
Protection from statistical traffic analysis attacks calls for effective design of traffic flow confidentiality (TFC) mechanisms. These are devised to alter the traffic pattern in order to hide information about contents transmitted, which, despite encryption, can be revealed by malicious users through statistical analysis. Widespread diffusion of...
Among the most important research topics in computer sciences, a primary role is played by design and control of next-generation communication networks (NGCNs). Such networks will be characterized by heterogeneity at all levels, encompassing a large variety of users, media, processes and channels. Another important feature of NGCNs will be the abil...
A new technique for the analytical evaluation of distributions (and quantiles) of the completion time of short-lived TCP connections is presented and discussed. The proposed technique derives from known open multiclass queuing network (OMQN) models of the TCP protocol and computes a discrete approximation, with arbitrary accuracy, of the distributi...
The CREATE-NET testbed is a long term project aiming at implementing a best state-of-the-art infrastructure able to link together research centers, both from academia and industrial bodies, in order to create a fruitful collaborative environment to help generating new ideas for advanced applications and services, developing new protocols, testing a...
http://www.create-net.it Abstract. The amount of information in the new emerging all-embracing pervasive environments will be enormous. Current Internet protocol con- ceived almost forty years ago, were never planned for these emerging per- vasive environments. The communications requirements placed by these protocols on the low cost sensor and tag...
Including implications on network functionality and interfaces, e.g. for third-party network providers Abstract: Deliverable D01 is an output document from Workpackage WP1.1, Applications and Services Development. The objectives of WP1.1 are to evaluate suitable existing applications and to develop new mobile and fixed applications that may be prof...
The All-IP network concept with end-to-end QoS provisioning has received particular attention in 3GPP recently. The UMTS proposals, however, have not yet solved some protocol interoperability issues. This paper analyzes the IP Multimedia Subsystem from the aspect of call control, resource reserva- tion and network policing interoperability from the...
The All-IP network concept with end-to-end QoS provisioning has received particular attention in 3GPP recently. This paper describes a prototype implementation for the analysis of the IP Multimedia Subsystem from the aspect of call control, resource reservation and network policing interoperability. The experiences based on a prototype implementati...
The International Telecommunications Union (ITU) has endorsed High Altitude Platforms (HAPs) as an alternative means of providing UMTS wireless services. The utilisation of HAPs (High Altitude Platforms) in the access part of the upcoming UMTS networks can provide great flexibility to UMTS from the viewpoint of service provisions and fast infrastru...
Peer-to-Peer streaming systems (or P2P-TV) provide low cost infrastructures for the support of live video distribution over the Internet. They are attracting an increasing attention from the research community, the developers and practitioners. In this paper we consider P2P streaming systems based on mesh overlays and focus on the matter of automat...
Traditional communication security focuses on protecting the delivered contents through strong encryption means. However, the statistical pattern of the traffic generated in a communication carries plenty of information which can be maliciously gathered through specially devised attacks.
To duly protect the privacy of the users, further mechanisms...
Anonymization (Mix) networks are based on the delivery of messages through a sequence of overlay hops devised to void end-to-end linkage of the information, thus protecting users' identities (when needed) and privacy. Most Mix networks are based on hops built either on TLS or directly built by proprietary protocols. In the first part of this paper...
This paper present a thorough and homogeneous comparison of chunk and peer selection strategies suitable for mesh-based, live, P2P streaming applications. Strategies are studied in a context of push protocols, and it is shown that none of the schedulers analyzed, which are, to the best of our knowledge, the majority of those proposed in the literat...
Practical implementation of new P2P streaming systems requires a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and speed-up application development, by providing a set of open-source components conceived as basic build- ing blocks...