Jochen Hermann Schiller

Jochen Hermann Schiller
Freie Universität Berlin | FUB · Department of Mathematics and Computer Science

Prof. Dr.-Ing.

About

221
Publications
35,677
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,429
Citations
Additional affiliations
April 2001 - present
Freie Universität Berlin
Position
  • Professor (Full)
April 1996 - April 1997
Uppsala University
Position
  • PostDoc Position
April 1993 - March 2001
Karlsruhe Institute of Technology
Position
  • Senior Researcher

Publications

Publications (221)
Article
Full-text available
We developped an open source library called RcdMathLib for solving multivariate linear and nonlinear systems. RcdMathLib supports on-the-fly computing on low-cost and resource-constrained devices, e.g., microcontrollers. The decentralized processing is a step towards ubiquitous computing enabling the implementation of Internet of Things (IoT) appli...
Conference Paper
Full-text available
The Internet of Thing (IoT) and the Machine to Machine (M2M) communication technologies are leading toward a paradigm shift allowing the connectivity of very large number of heterogeneous devices such as smartphones, wired and wireless sensors, and vehicles. Also, we present a surveillance system using a Real Time Location System (RTLS), the IoT an...
Preprint
Full-text available
During disasters, crisis, and emergencies the public relies on online services provided by authorities to receive timely alerts, trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their Web services. This includes proper naming (e.g., against phishing attacks), name pro...
Conference Paper
In this demo, we showcase NDNSSEC. NDNSSEC provides a namespace management solution for named-data networking (NDN) based on the DNS ecosystem and its security extensions. Our prototype allows content consumers to verify the name ownership in commonly used NDN software.
Conference Paper
Names are the cornerstone of every Information-Centric Network (ICN), nonetheless, namespace management has been by far neglected in ICN. A global and scalable namespace management approach is a challenge which not only concerns technical, but also requires attention to non-technical, e.g., organizational issues. In this paper, we present both a cl...
Article
As a step towards ubiquitous and mobile computing, a decentralized localization platform allows positioning for objects and persons. The decentralized computation of the position enables to shift the application-level knowledge into a Mobile Station (MS) and avoids the communication with a remote device such as a server. In addition, computing a po...
Article
Full-text available
Currently available wearables are usually based on a single sensor node with integrated capabilities for classifying different activities. The next generation of cooperative wearables could be able to identify not only activities, but also to evaluate them qualitatively using the data of several sensor nodes attached to the body, to provide detaile...
Article
Versatility and real world applicability are key features of Wireless Sensor Networks. In order to achieve these benefits we have to face the challenges of high practical relevance during application. We deploy and evaluate the concrete example of a fence monitoring task to reveal how our distributed event detection system is able to perform under...
Conference Paper
Full-text available
The combination of small wireless sensor nodes and inertial sensors such as accelerometers and gyroscopes provides a cheap to produce ubiquitous technology module for human motion analysis. We introduce a system architecture for in-network motion characterization and assessment with a wireless body area network based on motion fragments. We present...
Conference Paper
Inertial Measurement Unit (IMU) is one option for the positioning system. Due to its independence and invulnerability, the IMU-based approaches could serve as an effective complementarity for the positioning systems applying communication networks, when the infrastructures are insufficient or unreliable. For pedestrians the Step and Heading System...
Conference Paper
Wireless Sensor Networks continuously extend their practicability in real world applications and are passing their break-even to hit the consumer market. An increasing number of miniaturized wireless sensor nodes is acquirable, mostly intended to stream environmental data as well as tracking health with single node devices. A lack of distributed pr...
Conference Paper
A mathematic model for running step length estimation is introduced in this paper. Because of the reasons about infrastructures, the current WLAN based localization technologies usually take inertial sensors as an alternative data source for position tracking. By updating the users’ location with each step length and heading angle, the current posi...
Conference Paper
Recently various indoor positioning techniques have been developed based on smartphone. However, most of them need external signals. In this paper a self-contained approach relying on build-in inertial sensors is implemented. Taking advantage of Pedestrian Dead Reckoning, it updates the current position by measuring the length and the heading of ea...
Chapter
This book presents a general picture of recent research activities related to location-based services. Such activities emerged in the last years especially concerning issues of outdoor/indoor positioning, smart environment, spatial modelling, personalization and context-awareness, cartographic communication, novel user interfaces, crowdsourcing, so...
Conference Paper
This paper analyzes the requirements of mobile health applications concerning real-time criteria and describes the current state of real-time capabilities on constrained devices and low-power networks. Based on this analysis we observe that for these applications real-time capabilities are not only required per system, but also for the entire distr...
Conference Paper
Full-text available
Disasters lead to devastating structural damage not only to buildings and transport infrastructure, but also to other critical infrastructure, such as the power grid and communication backbones. Following such an event, the availability of minimal communication services is however crucial to allow efficient and coordinated disaster response, to ena...
Article
Full-text available
Disasters lead to devastating structural damage not only to buildings and transport infrastructure, but also to other critical infrastructure, such as the power grid and communication backbones. Following such an event, the availability of minimal communication services is however crucial to allow efficient and coordinated disaster response, to ena...
Conference Paper
Nowadays positioning and navigation technologies based on smartphone are sprouting up for numerous application scenarios. In this paper a more self-contained approach is introduced by which merely inertial units within the smartphone are utilized. By the Pedestrian Dead Reckoning technique, all kinds of indoor location information are provided at u...
Conference Paper
Inertial Navigation Systems with three 3D sensors are used to localize moving persons. The accuracy of the localization depends on the quality of the sensor data of the multi-sensor system. In order to improve the accuracy, a self-calibration process based on the automatic 3D calibration was developed. Based on the calibration procedure of the acce...
Article
Full-text available
In this paper, we show that a micro unmanned aerial vehicle (UAV) equipped with commercially available gas sensors can address environmental monitoring and gas source localization (GSL) tasks. To account for the challenges of gas sensing under real-world conditions, we present a probabilistic approach to GSL that is based on a particle filter (PF)....
Article
Full-text available
Gas source localization (GSL) with mobile robots is a challenging task due to the unpredictable nature of gas dispersion, the limitations of the currents sensing technologies, and the mobility constraints of ground-based robots. This work proposes an integral solution for the GSL task, including source declaration. We present a novel pseudo-gradien...
Article
Full-text available
In the domain of wireless sensor networks, simulation is the predominant way of evaluating new algorithms. One com-monly found drawback of simulation tools is that they pro-vide a programming environment that does not match the one present on real-world platforms. In this paper, we address this problem by presenting the steps required to port an ex...
Article
Full-text available
Mobile nodes, in particular smartphones are one of the most relevant devices in the current Internet in terms of quantity and economic impact. There is the common believe that those devices are of special interest for attackers due to their limited resources and the serious data they store. On the other hand, the mobile regime is a very lively netw...
Conference Paper
In this paper, we show that a micro unmanned aerial vehicle (UAV) equipped with commercially available gas sensors can address environmental monitoring and gas source localization (GSL) tasks. To account for the challenges of gas sensing under real-world conditions, we present a probabilistic approach to GSL that is based on a particle filter (PF)....
Article
Full-text available
Event detection in wireless sensor networks is a sophisticated method for processing sampled data directly on the sensor nodes, thereby reducing the need for multihop communication with the base station of the network. In contrast to application-agnostic compression or aggregation techniques, event detection pushes application-level knowledge into...
Conference Paper
A major current focus in multi-sensor systems for indoor localisation is how to calibrate the sensors. In this study, we introduce a new method for this task. By using the datafusion of the combined sensor data, we were able to eliminate the errors of an individual sensor. The challenging matter was the connection of the different sensors for a con...
Conference Paper
Full-text available
Smart cities use networks of sensors, actuators, and centralized computing clusters to observe physical reality, derive information, and thereby influence citizens and authorities. Smart city applications therefore require three components to work: wireless sensor networks, geo-information systems, and frameworks for distributed analysis of sensor...
Article
Full-text available
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in particular if an adversary targets specifically on mobile or non-mobile devices. Based on a mobile honeypot that extracts first statistical results, our findings indicate...
Article
Smartphones are popular attack targets, but usually too weak in applying common protection concepts. SKIMS designs and implements a cooperative, cross-layer security system for mobile devices. Detection mechanisms as well as a proactive and reactive defense of attacks are core components of this project. In this demo, we show a comprehensive proof-...
Conference Paper
Full-text available
Smartphones are popular attack targets, but usually too weak in applying common protection concepts. SKIMS designs and implements a cooperative, cross-layer security system for mobile devices. Detection mechanisms as well as a proactive and reactive defense of attacks are core components of this project. In this demo, we show a comprehensive proof-...
Article
Full-text available
Mobiles are nowadays the most relevant communication devices in terms of quantity and flexibility. Like in most MANETs ad-hoc communication between two mobile phones requires mutual trust between the devices. A new way of establishing this trust conducts social trust from technically measurable data (e.g., interaction logs). To explore the relation...
Article
Full-text available
Location-based services oer a powerful approach to provide highly relevant information and functionality to a mobile user. Addressing the problem of location in- ference, we expand the design space by proposing to employ rule-based programming techniques. Based on position coordinates as well as data gathered by environmental sensors, either a prec...
Conference Paper
Several ways to estimate the position of a Wireless-Sensor-Network (WSN) node have been discussed in the past years. Unlike in outdoor solutions where the Global Positioning System (GPS) could be used in most applications, a general solution for indoor usage has not been found. The few existing indoor localization solutions on the market are highly...
Conference Paper
Sensor based person tracking is a challenging topic. The main objective is positioning in areas without GPS connection, i.e. indoors. A research project is carried out at BAM, Federal Institute for Materials Research and Testing, to develop and to validate a multi-sensor system for 3D localization. It combines body motion sensing and a guard system...
Article
Full-text available
This article presents the development and validation of an autonomous, gas sensitive microdrone that is capable of estimating the wind vector in real time using only the onboard control unit of the microdrone and performing gas distribution mapping (DM). Two different sampling approaches are suggested to address this problem. On the one hand, a pre...
Chapter
In this chapter, we present two service placement algorithms, one for centralized and one for distributed services. Both are specifically designed to implement the placement intelligence within the SPi framework. The Graph Cost/Single Instance ( GCSI ) algorithm places the single service instance of centralized services, and the Graph Cost/Multiple...
Chapter
This chapter gives brief introductions facility location theory which forms the basis for service placement in ad hoc networks. We also provide an extensive review of the current state of the art in service placement and evaluate recent proposals. With this qualitative evaluation we lay the foundation for the quantitative evaluation of service plac...
Chapter
In this chapter, we present a quantitative evaluation of the SPi service placement framework running the Graph Cost/Single Instance and the Graph Cost/Multiple Instances service placement algorithms. We compare the performance of our approach with both a traditional client/server architecture without active service placement as well as several serv...
Chapter
In this final chapter, we summarize our findings and list the key contributions of the research presented in this text. Afterwards, we discuss open issues and possible directions of future work. Finally, we conclude with some remarks regarding the overall outlook.
Chapter
In this chapter, we present the \(\texttt{SP{\!\it{\textsf{i}}}}\) service placement framework as our contribution towards enabling service placement in ad hoc networks. Our framework is applicable to the placement of both centralized and distributed services as defined in the introductory chapter. It supports both the Graph Cost/Single Instance an...
Article
Full-text available
We want to monitor our environment or security relevant areas for specific and critical events. Surveillance solutions often promise complete surveillance by introducing cameras or guards, That kind of strict surveillance has often proven to be complex and is socially not accepted. In contrast to this, it is possible to pre-specific such events and...
Chapter
Full-text available
Event detection allows for a wireless sensor network to reliably detect application-specific events based on data sampled from the environment. Events, in this context, may range from the comparatively easy to detect outbreak of a fire to the more complex stumbling and falling of a patient, or even to an intrusion into a restricted area. Distribute...
Conference Paper
Full-text available
Fences are used all over the world to protect areas against unauthorized access. While most fences meet these requirements by building a physical and psychological barrier against intruders, this is not sufficient for areas of particular interest like restricted areas of an airport or construction sites with expensive goods. To detect intruders we...
Article
Full-text available
The MANIAC Challenge is a competition for cooperation strategies in wireless ad-hoc networks with the focus on experimental evaluation. We present the results of the MANIAC Challenge and discuss characteristics of real networks such as link instability and mobility, which are often simplified in common network simulators. We introduce our strategy...
Conference Paper
Full-text available
Existing security systems for Wireless Sensor Networks are either not able to cover all security requirements or are seriously effected by too high communications expenses to enable realistic deployments. We present a new security system for event-driven Wireless Sensor Networks, called PaRSec, that covers all security re-quirements with adequate e...
Conference Paper
Full-text available
In ad hoc communication, data packets are relayed over several hops before reaching their destination. Spontaneous communication requires that nodes trust each other as communication can be intentionally disturbed or privacy compromised by the intermediate nodes. Establishing this trust relationship within a MANET without access to a central author...
Conference Paper
Full-text available
This paper presents a sampling strategy for mobile gas sensors. Sampling points are selected using a modified artificial potential field (APF) approach, which balances multiple criteria to direct sensor measurements towards locations of high mean concentration, high concentration variance and areas for which the uncertainty about the gas distributi...
Article
Athletes can improve their skills by using supervising training devices with integrated digital feedback. For example, martial art techniques are often complex in detail and need to be perfectly adopted from the teacher. Distributed event detection systems for digital devices enhance the individual training, resulting in a higher precision of the t...
Article
Full-text available
In diesem Beitrag stellen wir die Integration einer verteilten Ereigniserkennung in einem realem Zaunüberwachungssystem mit den daran gekoppelten Herausforderungen vor. Die verteilte Ereigniserkennung vereint die lokale Intelligenz eines Sensorknotens mit dem verteilten Weitblick eines Sensornetzes, indem die Daten eines jeden Sensorknotens lokal v...
Conference Paper
Full-text available
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident has occurred based on the raw data gathered by individual sensor nodes. In this context, an event may be anything from a malfunction of monitored machinery to an intrusion i...
Article
Full-text available
In the first days of the emergence of Wireless Sensor Networks (WSN) programming software involved expertise in both hard-ware and networking. Since then, various middleware architectures have been proposed to achieve a suitable abstraction from distribution and management tasks of sensor devices. This allows users to focus on the application devel...
Conference Paper
Full-text available
Distributed event detection in wireless sensor networks is an approach to increase event recognition accuracy by fusing correlated parts of events, recognized by multiple sensor nodes. Events range from simple threshold detection to complex events requiring pattern analysis. Our previous deployment in this area of research investigates the possibil...